METHOD AND A SYSTEM FOR SECURE LOGIN TO A COMPUTER, COMPUTER NETWORK, AND COMPUTER WEBSITE USING BIOMETRICS AND A MOBILE COMPUTING WIRELESS ELECTRONIC COMMUNICATION DEVICE
First Claim
1. A method of conducting a login transaction on a computer, computer network, and online computer website comprising:
- i) enrolling a conducting party with an authenticating party at a physical and/or at an unmanned authenticating computer, wherein enrollment comprises receiving from the conducting party documented proof of identity. Biometric identifying samples of the conducting party and receiving from the conducting party personal and mobile, computing, wireless, electronic, communication device information through which the conducting party will conduct login transactions that can identify both the conducting party and the conducting party'"'"'s mobile, computing, wireless, electronic, communication device used for login;
ii) receiving, at the authenticating party or at the unmanned authenticating computer, information relating to the mobile, computing, wireless, electronic, communication device that the conducting party will use for login;
iii) communicating, based on the enrollment, with the conducting party to authenticate that the conducting party is a party that performed the login and authorized to login to the computer, computer network, and/or online computer website;
iv) transferring data based on the authentification, from the authenticating computer and authorization for login to a computer, computer network, and online computer website;
v) wherein at least one of the conducting, receiving, communicating, and/or transferring of data, is performed by at least one or more computers.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating and certifying that the conducting party that is conducting at least one of: (i) secure login to a computer; (ii) secure login to a computer network; (iii) secure login to a computer website, is (i) the authorized conducting party authorized to login and (ii) using the conducting party'"'"'s authorized mobile computing wireless electronic communication device to login. More particularly, the conducting party that conducts a login is not required to know or type in the conducting party'"'"'s User Names and Passwords or required to remember or know a Username or Password. The authentication and certification of a conducting party is performed by using biometric technology means and a mobile computing wireless electronic communication device.
61 Citations
22 Claims
-
1. A method of conducting a login transaction on a computer, computer network, and online computer website comprising:
-
i) enrolling a conducting party with an authenticating party at a physical and/or at an unmanned authenticating computer, wherein enrollment comprises receiving from the conducting party documented proof of identity. Biometric identifying samples of the conducting party and receiving from the conducting party personal and mobile, computing, wireless, electronic, communication device information through which the conducting party will conduct login transactions that can identify both the conducting party and the conducting party'"'"'s mobile, computing, wireless, electronic, communication device used for login; ii) receiving, at the authenticating party or at the unmanned authenticating computer, information relating to the mobile, computing, wireless, electronic, communication device that the conducting party will use for login; iii) communicating, based on the enrollment, with the conducting party to authenticate that the conducting party is a party that performed the login and authorized to login to the computer, computer network, and/or online computer website; iv) transferring data based on the authentification, from the authenticating computer and authorization for login to a computer, computer network, and online computer website; v) wherein at least one of the conducting, receiving, communicating, and/or transferring of data, is performed by at least one or more computers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 11, 12, 13)
-
-
8. A system for conducting a login to a computer, computer network, and online computer website;
- comprising;
a) one or more computers adapted to operate in a communications network, wherein, the one or more computers are adapted to communicate with one or more authenticating party computers to enroll an enrolling party with an authenticating party, wherein enrollment comprises receiving from the conducting party biometric identifying information of the conducting party and receiving from the conducting party personal and communication information through which the conducting party can be identified and contacted. b) wherein the one or more computers are adapted to receive, at the authenticating party'"'"'s computers, information requesting login privileges to a computer, computer network, or online computer website sent by the conducting party from the conducting party'"'"'s mobile, computing, wireless, electronic, communication device containing the mobile, computing, wireless, electronic, communication device'"'"'s identification information including one or more mobile phone numbers and the conducting party'"'"'s biometric authentification information. c) receiving from the authenticating computer authorization or denial to login to a computer, computer network, or an online computer website based on the authenticity of the authentification information sent by the conducting party to the authenticating computers. - View Dependent Claims (10, 14, 15)
- comprising;
-
16. A machine tangible, non-transitory, readable medium adapted to store computer code that can be executed by one or more computers comprising:
-
a) code configured to enroll a conducting party with an authenticating party, wherein the enrollment comprises receiving from the conducting party biometric identifying information of the conducting party and receiving from the conducting party personal and communication information through which the conducting party can be identified and contacted by the authenticating party, and b) code configured to receive, at an authenticating party'"'"'s computer, information relating to a conducting party'"'"'s identity, a conducting party'"'"'s mobile, computing, wireless, electronic, communication device, a computer, a computer network, or an online computer website that the conducting party is requesting to login; and c) code configured to communicate, based on the enrollment, with a conducting party to authenticate that a conducting party is a party that is authorized to login to a computer, computer network, or online computer website; and d) code configured to transfer, based on the authentification of a conducting party, from the authenticating party'"'"'s computers to a computer, computer network, or an online computer website, authorization or denial to login. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A machine tangible, non-transitory, readable medium adapted to store computer code by a mobile, computing, wireless, electronic, communication device that can be executed by a mobile, computing, wireless, electronic, communication device:
-
a) code configured to record and/or capture a conducting party'"'"'s biometric identifying information through which the conducting party can be identified and contacted by the authenticating party, and b) code configured to communicate, with an authenticating party to authenticate that a conducting party is a party that is authorized to login to a computer, computer network, or online computer website.
-
Specification