×

Tokenless identification system for authorization of electronic transactions and electronic transmissions

DC
  • US 5,613,012 A
  • Filed: 05/17/1995
  • Issued: 03/18/1997
  • Est. Priority Date: 11/28/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. A voluntary tokenless identification computer system for determining an individual'"'"'s identity from an examination of at least one biometric sample and a personal identification code gathered during a bid step, and comparison with previously recorded biometric sample and personal identification code gathered during a registration step, wherein the system is authenticated to the individual, said system comprising:

  • a. at least one computer;

    b. first gathering and display means for voluntary input of at least one biometric sample, personal identification code, and a private code from an individual during the registration step, wherein the private code is not used for gaining access to the system;

    c. second gathering and display means for voluntary input of at least one biometric sample and personal identification code, from an individual during a bid step;

    d. first interconnecting means for interconnecting said first and second gathering and display means to said computer for transmitting the gathered biometric sample, personal identification code, or private code from said first and second gathering means to said computer;

    e. means for comparison of biometric sample and personal identification code gathered during the bid step with the biometric samples and personal identification codes gathered during the registration step, for producing an evaluation;

    f. execution means within said computer for storage of data and processing and execution of commands for producing a determination;

    g. means for output of said evaluation, determination, or private code from said computer; and

    h. system authentication means wherein the private code gathered during the registration step, is displayed to the authorized user of the system during the output step to authenticate that the computer system was accessed.

View all claims
  • 20 Assignments
Timeline View
Assignment View
    ×
    ×