Method of using personal device with internal biometric in conducting transactions over a network
First Claim
1. A method of authorizing a commercial transaction between a customer and a provider of goods or services over a network, wherein the provider of goods or services requests that the customer provide authentication by activating a fingerprint identification device, and the provider of goods or services receives at least an authentication code of the customer over the network from the fingerprint identification device, the method comprising the steps of:
- providing the customer with the fingerprint identification device which produces the authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device;
receiving at least the authentication code from the provider of goods or services over the network; and
authorizing the transaction if at least the authentication code is valid.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authorizing a commercial transaction between a customer and a provider of goods or services over a network, wherein the provider of goods or services requests that the customer provide authentication by activating a fingerprint identification device, and the provider of goods or services receives at least an authentication code of the customer over the network from the fingerprint identification device, the method comprising the steps of: providing the customer with the fingerprint identification device which produces the authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device; receiving at least the authentication code from the provider of goods or services over the network; and authorizing the transaction if at least the authentication code is valid.
148 Citations
50 Claims
-
1. A method of authorizing a commercial transaction between a customer and a provider of goods or services over a network, wherein the provider of goods or services requests that the customer provide authentication by activating a fingerprint identification device, and the provider of goods or services receives at least an authentication code of the customer over the network from the fingerprint identification device, the method comprising the steps of:
-
providing the customer with the fingerprint identification device which produces the authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device;
receiving at least the authentication code from the provider of goods or services over the network; and
authorizing the transaction if at least the authentication code is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
establishing an electronic connection over the network between the customer and a managing entity of the electronic safety deposit box;
requesting that the customer provide authentication to the managing entity of the electronic safety deposit box by activating the fingerprint identification device;
receiving at least the authentication code at the managing entity of the electronic safety deposit box over the network from the fingerprint identification device; and
permitting access to the electronic safely deposit box if at least the authentication code is valid.
-
-
9. The method of claim 8, further comprising the step of receiving at least the authentication code and an electronic safety deposit box account number of the customer at the managing entity of the electronic safety deposit box over the network from the fingerprint identification device.
-
10. The method of claim 8, wherein the electronic safety deposit box is operable to contain at least one of a will, a title to one or more securities, a title to real or personal property, a contract, a certificate, and an insurance policy.
-
11. The method of claim 1, wherein the provider of goods or services receives at least an authentication code and an account number of the customer over the network from the fingerprint identification device and the step of receiving at least the authentication code from the provider of goods or services over the network includes receiving an account number of the customer over the network from the fingerprint identification device.
-
12. The method of claim 11, wherein at least one of the authentication code and account number are received over the network in an encrypted form.
-
13. The method of claim 11, further providing a method of permitting the customer to access the account, comprising the steps of:
-
establishing an electronic connection over the network between the customer and a managing entity of the account;
requesting that the user provide authentication to the managing entity of the account by activating the fingerprint identification device;
receiving at least the authentication code and the account number of the customer at the managing entity of the account over the network from the fingerprint identification device; and
permitting access to the account if the authentication code is valid.
-
-
14. The method of claim 13, wherein the customer is permitted to at least one of (i) transfer funds from the account;
- and (ii) deposit funds into the account, when the managing entity of the account has permitted access thereto.
-
15. The method of claim 1, further providing a method of permitting the customer to conduct an investment transaction over the network, the method comprising the steps of:
-
establishing an electronic connection over the network between the customer and a settlement bank over which the customer may provide investment instructions;
requesting that the customer provide authentication to the settlement bank by activating the fingerprint identification device;
receiving at least the authentication code at the settlement bank over the network from the fingerprint identification device;
receiving investment instructions at the settlement bank over the network from the customer; and
transmitting the investment instructions to a third party if at least the authentication code is valid.
-
-
16. The method of claim 15, further comprising the steps of:
- receiving an instruction from the customer as to whether it wishes to keep its identity anonymous; and
transmitting the investment instructions to the third party without identifying the customer if the customer so wishes.
- receiving an instruction from the customer as to whether it wishes to keep its identity anonymous; and
-
17. The method of claim 15, wherein the third party is at least one of an investment bank, a brokerage, and an off-shore bank.
-
18. The method of claim 15, further comprising the step of receiving at least the authentication code and an investment account number of the customer at the settlement bank over the network from the fingerprint identification device.
-
19. The method of claim 12, further comprising the steps of:
-
receiving a transaction record from the third party indicating that the investment instructions were carried out; and
settling with the third party by at least one of (i) transferring funds from the customer'"'"'s investment account to the third party; and
(ii) transferring funds into the customer'"'"'s investment account from the third party.
-
-
20. A method of conducting a commercial transaction between a customer and a provider of goods or services over a network, the method comprising the steps of:
-
providing the customer with a fingerprint identification device which produces an authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device;
maintaining an electronic site on the network over which the customer may request goods or services from the provider of goods or services;
requesting that the customer provide authentication by activating the fingerprint identification device;
receiving at least the authentication code and a account number of the customer at the provider of goods or services over the network from the fingerprint identification device;
transmitting the authentication code and the account number from the provider of goods or services to a managing entity of the account over the network in encrypted form, and requesting authorization to complete the transaction; and
completing the transaction if the managing entity of the account provides the authorization.
-
-
21. A method of accessing an electronic safety deposit box over a network, the method comprising the steps of:
-
providing a user with a fingerprint identification device which produces an authentication code when a fingerprint of the user matches a stored fingerprint within the fingerprint identification device;
establishing an electronic connection over the network between the user and a managing entity of the electronic safety deposit box;
requesting that the user provide authentication to the managing entity of the electronic safety deposit box by activating the fingerprint identification device;
receiving at least the authentication code at the holder of the electronic safety deposit box over the network from the fingerprint identification device; and
permitting access to the electronic safely deposit box if the authentication code is valid. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A method of conducting an investment transaction over a network, the method comprising the steps of:
-
providing an investor with a fingerprint identification device which produces an authentication code when a fingerprint of the investor matches a stored fingerprint within the fingerprint identification device;
establishing an electronic connection over the network between the investor and a settlement bank over which the investor may provide investment instructions;
requesting that the investor provide authentication to the settlement bank by activating the fingerprint identification device;
receiving at least the authentication code at the settlement bank over the network from the fingerprint identification device;
receiving investment instructions at the settlement bank over the network from the investor; and
transmitting the investment instructions to a third party if at least the authentication code is valid. - View Dependent Claims (27, 28, 29, 30, 31, 32)
receiving a transaction record from the third party indicating that the investment instructions were carried out; and
settling with the third party by at least one of (i) transferring funds from the investor'"'"'s account to the third party; and
(ii) transferring funds into the investor'"'"'s account from the third party.
-
-
33. An apparatus for authorizing a commercial transaction between a customer and a provider of goods or services over a network, the apparatus comprising:
-
a fingerprint identification device capable of being in the possession of the customer and being operable to produce an authentication code when the fingerprint of the customer matches a stored fingerprint, the fingerprint identification device being connectable to the network such that the provider of goods or services may receive at least the authentication code over the network; and
a processing unit operable to (i) receive at least the authentication code from the provider of goods or services over the network, and (ii) authorize the transaction if at least the authentication code is valid. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
a network server operable to (i) establish an electronic connection over the network with the customer;
(ii) request that the customer provide authentication by activating the fingerprint identification device;
(iii) receive at least the authentication code over the network from the fingerprint identification device; and
(iv) permit access to the electronic safety deposit box if at least the authentication code is valid.
-
-
40. The apparatus of claim 39, wherein the processing unit is further operable to receive at least the authentication code and an electronic safety deposit box account number of the customer over the network from the fingerprint identification device.
-
41. The method of claim 39, wherein the electronic safety deposit box is operable to contain at least one of a will, a title to one or more securities, a title to real or personal property, a contract, a certificate, and an insurance policy.
-
42. The method of claim 33, wherein the fingerprint identification device is operable to provide at least the authentication code and an account number of the customer over the network to the provider of goods or services.
-
43. The apparatus of claim 42, wherein at least one of the authentication code and account number are in an encrypted form.
-
44. The apparatus of claim 42, wherein the processing unit is operable to permit the customer to access the account, the processing unit comprising:
a network server operable to (i) establish an electronic connection over the network with the customer;
(ii) request that the user provide authentication by activating the fingerprint identification device;
(iii) receive at least the authentication code and the account number of the customer over the network from the fingerprint identification device; and
(iv) permit access to the account if the authentication code is valid.
-
45. The apparatus of claim 44, wherein the processing unit is further operable to permit the customer to at least one of (i) transfer funds from the account;
- and (ii) deposit funds into the account, when access is permitted.
-
46. The apparatus of claim 33, wherein the processing unit is operable to permit the customer to conduct an investment transaction over the network, the processing unit comprising:
a network server operable to (i) establish an electronic connection over the network with the customer over which the customer may provide investment instructions;
(ii) request that the customer provide authentication by activating the fingerprint identification device;
(iii) receive at least the authentication code over the network from the fingerprint identification device;
(iv) receive investment instructions at the settlement bank over the network from the customer; and
(v) transmit the investment instructions to a third party if at least the authentication code is valid.
-
47. The apparatus of claim 46, wherein the processing unit is further operable to (i) receive an instruction from the customer as to whether it wishes to keep its identity anonymous;
- and (ii) transmit the investment instructions to the third party without identifying the customer if the customer so wishes.
-
48. The apparatus of claim 46, wherein the third party is at least one of an investment bank, a brokerage, and an off-shore bank.
-
49. The apparatus of claim 46, wherein the processing unit is further operable to receive at least the authentication code and an investment account number of the customer over the network from the fingerprint identification device.
-
50. The apparatus of claim 49, wherein the processing unit is operable to (i) receive a transaction record from the third party indicating that the investment instructions were carried out;
- and (ii) settle with the third party by at least one of (i) transferring funds from the customer'"'"'s investment account to the third party; and
(ii) transferring funds into the customer'"'"'s investment account from the third party.
- and (ii) settle with the third party by at least one of (i) transferring funds from the customer'"'"'s investment account to the third party; and
Specification