System and method of providing system integrity and positive audit capabilities to a positive identification system
First Claim
1. A system for providing access integrity and positive audit capabilities to a positive identification system comprising:
- a point of identification terminal having a means for accepting an access authority information unit presented by a user of the system in order to gain access to the system, a means for accepting information presented by a person to be positively identified at a point of identification and a means for displaying digital photographic images of persons;
at least one remote database site having stored therein a database comprising a plurality of said access authority information units and a plurality of digital photographic images of persons to be identified, wherein each of said access authority information units corresponds to a single system user and at least one of said digital photographic images corresponds to said information accepted at the point of identification terminal;
a means of communciating between said point of identification terminal and said remote database site to interchange information between the two;
a means for verifying that said point of identification terminal is authorized to access said remote database site; and
a means for verifying that said system user has compared the digital photographic images displayed on the display means with the physical appearance of said person being identified at the point of identification terminal and that a match exists between at least one of said digital photographic images and the physical appearance of said person being identified.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a system and method of providing system integrity and positive audit capabilities to a positive identification system. The use of access authority information units to gain access to the positive identification system solves the problems of open, unsecured and unauditable access to data for use in point of use identification systems. In order to secure the rights to the data that is needed to make mass identification systems operate, it must be shown that records will be closed and secure, as well as that there will be an audit trail of access that is made to the data. This system solves those problems through the use of a system and method for identification with biometric data and/or personal identification numbers and/or personalized devices embedded with codes unique to their assigned users.
167 Citations
11 Claims
-
1. A system for providing access integrity and positive audit capabilities to a positive identification system comprising:
-
a point of identification terminal having a means for accepting an access authority information unit presented by a user of the system in order to gain access to the system, a means for accepting information presented by a person to be positively identified at a point of identification and a means for displaying digital photographic images of persons; at least one remote database site having stored therein a database comprising a plurality of said access authority information units and a plurality of digital photographic images of persons to be identified, wherein each of said access authority information units corresponds to a single system user and at least one of said digital photographic images corresponds to said information accepted at the point of identification terminal; a means of communciating between said point of identification terminal and said remote database site to interchange information between the two; a means for verifying that said point of identification terminal is authorized to access said remote database site; and a means for verifying that said system user has compared the digital photographic images displayed on the display means with the physical appearance of said person being identified at the point of identification terminal and that a match exists between at least one of said digital photographic images and the physical appearance of said person being identified. - View Dependent Claims (2, 3, 4)
-
-
5. A method for providing access integrity and positive audit capabilities to a positive identification system comprising the steps of:
-
registering a plurality of system users by assigning at least one unique access authority information unit to each said system user; logging a system user onto the positive identification system by inputting at least one access authority information unit assigned to said system user into said positive identification system; establishing communications between a point of identification terminal and at least one database site having maintained therein a database comprising a plurality of valid access authority information units and a plurality of biometric images associated with persons to be identified, verifying that said positive identification terminal is authorized to access said remote database site and interchanging information, including biometric images between the two; comparing each said access authority information unit input into said positive identification system with said database of valid access authority information units maintained at said remote database site; granting access to said system user if a match exists between each said access authority information unit input into the system and a valid access authority information unit maintained in said valid access authority information unit database; accepting information presented by a person to be positively identified at a point of identification and inputting said information presented into said positive identification system; comparing at least one digital biometric image displayed on a display means at said point of identification terminal with a physical biometric of the person to be positively identified; acknowledging the verification of the identity of the person to be identified if a match exists; and storing the access authority information unit along with said information presented at said point of identification in a transaction record. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for providing access integrity and positive audit capabilities to a positive identification system comprising the steps of:
-
registering a plurality of system users by assigning at least one unique access authority information unit to each said system user; mapping a biometric associated with each system user to each unique access authority information unit assigned to said system user; logging a system user onto the system by inputting at least one of said access authority information units assigned to said system user into said positive identification system; comparing each said access authority information unit input into said positive identification system with a database of valid access authority information units maintained by the positive identification system at a remote database site; displaying said biometric mapped to said access authority information unit input into said positive identification system at said point of identification; performing a third party comparison of said biometric displayed at said point of identity verification with the corresponding physical biometric of said system user present at the point of identification; indicating that a match exists by inputting an access authority information unit assigned to the third party responsible for verifying the identity of the system user into the system at the point of identification; storing the third parties access authority information unit with the system user'"'"'s authority information unit as a system user verification transaction record; granting access to said system user if a biometric match exists and a match exists between each said access authority information unit input into the system and a valid access authority information unit maintained in said valid access authority information unit database; accepting information presented by a person to be positively identified at a point of identification and inputting said information presented into said positive identification system; comparing a second, identifying information unit provided at the point of identification with a biometric of the person to be positively identified; verifying the identity of the person to be identified if a match exists; and storing the access authority information unit along with said information presented at said point of identification and said identifying information unit as a transaction record. - View Dependent Claims (11)
-
Specification