Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication
First Claim
Patent Images
1. A method of issuing a unique personal identification token comprising the steps of:
- a. Receiving identity and biometric information to assist in establishing a unique identity,b. Searching a database before issuing the token to determine whether a token was previously issued to a person having said identity and biometric information,c. Registering the identity and biometric information in the database, andd. Issuing the token.
0 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and methods for implementing a secure personal identification Token are disclosed. The Token may utilize biometric matching, encryption, access codes, holograms, and bar codes to improve security and confidentiality of data relating to the holder of the token. To further improve security, methods of ensuring the uniqueness of the holder may be implemented. Methods to protect unauthorized access to a holder'"'"'s Token are also disclosed.
81 Citations
16 Claims
-
1. A method of issuing a unique personal identification token comprising the steps of:
-
a. Receiving identity and biometric information to assist in establishing a unique identity, b. Searching a database before issuing the token to determine whether a token was previously issued to a person having said identity and biometric information, c. Registering the identity and biometric information in the database, and d. Issuing the token. - View Dependent Claims (2)
-
-
3. A method for determining whether a person in possession of a token is authorized to use the token, said method comprising the steps of:
-
a. Presenting a token to a relying party, said token comprising a memory containing a stored biometric template and a stored access code, b. Collecting biometric data from the person, c. Collecting an access code from the person, d. Reducing said biometric data to a template, e. Executing a program stored in the memory of the token that determines whether the stored access code matches said code collected in step c, f. Outputting the result of the program of step e, g. Executing a program stored in the memory of the token that calculates a reliability score based on the correlation of the template collected in step b and the biometric template stored in the memory of the token, h. Outputting the result of the program of step g, and i. Using the results of steps f and h to determine whether the person in possession of the token is authorized to use the token. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A method of accessing information stored in a memory of a token comprising the steps of:
-
a. Providing a token with a memory for storing information, b. Storing an access code in the memory of the token, c. Providing a suspension phrase used to notify a relying party that reliance on the token has been suspended, d. Storing a distress access code in the memory of the token, and e. Notifying a relying party that the holder of the token is in distress by using said distress access code. - View Dependent Claims (11, 12)
-
-
13. A method of accessing information stored in a memory of a token comprising the steps of:
-
a. Providing a token with a memory for storing information, b. Storing an access code in the memory of the token, c. Providing a suspension phrase used to notify a relying party that reliance on the token has been suspended, d. Storing a distress access code in the memory of the token, and e. Providing said suspension phrase to a real time authentication service to suspend reliance on the token. - View Dependent Claims (14)
-
-
15. A method of issuing a unique personal identification token comprising the steps of:
-
a. Receiving identity and biometric information to assist in establishing a unique identity, b. Reducing the biometric information to a template, c. Searching a database before issuing the token to determine whether said template matches any existing templates stored in the database, d. Registering the identity and biometric information in the database, and e. Issuing the token. - View Dependent Claims (16)
-
Specification