Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transaction or the like
First Claim
1. A transaction device which has stored thereon electronically readable data, said data comprisinga composite encrypted file comprised of a) physical verification information about an individual and b) an encrypted identity file, said composite encrypted file having been created by encrypting, together, said physical verification information and said encrypted identity file using a public key encryption key whose matching decryption key is publicly known,said encrypted identity file including identity information relative to said individual, said encrypted identity file having been created by encrypting said identity information with an encryption key whose matching decryption key is not publicly known.
2 Assignments
0 Petitions
Accused Products
Abstract
Individuals are provided with a transaction card which is to be presented for at least certain classes of transactions, e.g., truck rentals, purchases of chemicals, etc. Encoded electronically within the card are a) physical verification information and b) identity information. The identity information is encrypted, to create an encrypted identity file, using an "identity encryption key." The matching "identity decryption key" is held in secret by an appropriate government agency or agencies. The encrypted identity file and the physical verification information are then commingled and encrypted together using the "public encryption key" of a so-called public key encryption/decryption pair to create a composite encrypted file. The matching "public decryption key" is distributed to the society at large and is, in particular, stored at points-of-sale/transaction.
When a transaction is entered into, the purchaser presents his/her transaction card to the vendor as a requirement for the completion of the transaction. The composite encryption file stored in the card is decrypted, yielding a) a "clear text" version of the physical identification information and b) the encrypted identity file, which is saved along with information about the transaction. The encrypted identity file can be decrypted only under court order at such time as an item or substance involved in a crime is traced back to the transaction in question. Even though the purchaser'"'"'s identity information has been captured by the point-of-sale/transaction terminal, his/her privacy is maintained because the vendor cannot decrypt that information and therefore cannot actually read or display the information.
203 Citations
9 Claims
-
1. A transaction device which has stored thereon electronically readable data, said data comprising
a composite encrypted file comprised of a) physical verification information about an individual and b) an encrypted identity file, said composite encrypted file having been created by encrypting, together, said physical verification information and said encrypted identity file using a public key encryption key whose matching decryption key is publicly known, said encrypted identity file including identity information relative to said individual, said encrypted identity file having been created by encrypting said identity information with an encryption key whose matching decryption key is not publicly known.
-
5. A method comprising the steps of
receiving a transaction device having stored thereon electronically readable data, said data including a composite encrypted file comprised of a) physical verification information about an individual and b) an encrypted identity file, said composite encrypted file having been created by encrypting, together, said physical verification information and said encrypted identity file using a public key encryption key whose matching decryption key is publicly known, said encrypted identity file including identity information relative to said individual, said encrypted identity file having been created by encrypting said identity information with an encryption key whose matching decryption key is not publicly known and is maintained in a state of secrecy, reading said composite encrypted file from said device, decrypting the composite encrypted file information thus read, isolating a clear text version of said physical verification information from the file thus decrypted, comparing said clear text version of said physical verification information to at least one corresponding physical characteristic of a presenting individual to determine if said presenting individual is the same person as said particular individual, and if the result of said comparing is that said presenting individual is the same person as said particular individual, then isolating said encrypted identity file from the decrypted composite encrypted file and storing said isolated encrypted identity file in association with information stored about a transaction being entered into by said presenting individual.
Specification