Security authentication method and system
First Claim
1. A method for processing an access request, the method comprising:
- a. capturing user reference data from a wireless device carried by a user, the user reference data including user biometric data or user metric data, the user reference data having been submitted during user registration;
b. capturing user sensed data as the user writes a name, the name being written with a stylus, the user sensed data including user biometric data or user metric data;
c. transmitting the user sensed data and the user reference data to a processor, the user reference data being transmitted to the processor by means of radio-frequency transmission;
d. comparing the user sensed data against the user reference data in the processor;
e. authenticating the identity of the user based upon the results of the comparison; and
f. enabling user access to an account, a network, or a physically secure location if the processor confirms user identity and other system criteria confirms the access request should be approved the other system criteria being fund availability, network clearance, or physical clearance, respectively.
3 Assignments
0 Petitions
Accused Products
Abstract
This identity authentication system is used in commercial transactions at a point-of-sale terminal. The system comprises a device for capturing a customer signature (signature pad or a smart pen), a sensor for capturing a biometric property of the customer during the transaction, a local processor, a wireless device carried by the customer, a device reader positioned at the point-of-sale terminal, and a host computer. The customer registers advising the system of a customer account that is to be used for payment. The customer also submits an electronic signature (written script of name) and a digital signature for reference purposes—a fingerprint. The customer is then issued a wireless device, the wireless device having memory. The memory may be an ID card, a credit card, a smart card, a transponder, a barcode, or a combination of these memories. A identifying device reader (such as a card reader, an interrogator, a scanner) is located at the point-of-sale terminal that is compatible with the wireless device. Thereafter, when the customer uses a stylus to submit written data—an electronic signature is generated. Similarly, a sensor in the stylus captures data that is used to generate a digital signature. A reference print is then accessed through the memory in the wireless device carried by the customer. The digital and electronic signatures are then compared against the reference data to authentic identity.
-
Citations
6 Claims
-
1. A method for processing an access request, the method comprising:
-
a. capturing user reference data from a wireless device carried by a user, the user reference data including user biometric data or user metric data, the user reference data having been submitted during user registration; b. capturing user sensed data as the user writes a name, the name being written with a stylus, the user sensed data including user biometric data or user metric data; c. transmitting the user sensed data and the user reference data to a processor, the user reference data being transmitted to the processor by means of radio-frequency transmission; d. comparing the user sensed data against the user reference data in the processor; e. authenticating the identity of the user based upon the results of the comparison; and f. enabling user access to an account, a network, or a physically secure location if the processor confirms user identity and other system criteria confirms the access request should be approved the other system criteria being fund availability, network clearance, or physical clearance, respectively.
-
-
2. A method for processing an access request, the method comprising:
-
a. capturing a user record number from a wireless device carried by a user, the user record number having been submitted in a registration process; b. capturing user sensed data as the user writes a name, the user sensed data including user biometric data or user metric data, the name being written with a stylus; c. transmitting the user sensed data and the user record number to a processor system, the user record number being transmitted to the processor by means of radio-frequency transmission; d. using the user record number to retrieve user reference data, the user reference data including user biometric data, user metric data, or user signature data; e. comparing tile user sensed data with the user reference data in the processor; f. authenticating the identity of the user based upon the results of the comparison; and g. enabling user access to an account, a network, or a physically secure location if the processor confirms user identity and other system criteria confirms the access request should be approved the other system criteria being fund availability, network clearance, or physical clearance, respectively.
-
-
3. A method for processing an access request, the method comprising:
-
a. capturing user reference data involving user biometric data or user metric data from a wireless device carried by a user, the user reference data being embedded in a barcode, the user reference data having been submitted in a registration process; b. capturing user sensed data as the user writes a name, the name being written with a stylus, the user sensed data including user biometric data or user metric data; c. transmitting the user sensed data and the user reference data to a processor system, the user reference data being transmitted to the processor by means of a barcode reader; d. comparing the user sensed data against the user reference data in the processor; e. authenticating the identity of the user based upon the results of the comparison; and f. enabling user access to an account, a network, or a physically secure location if the processor confirms user identity and other system criteria confirms the access request should be approved the other system criteria being fund availability, network clearance, or physical clearance, respectively.
-
-
4. A method for processing an access request, the method comprising:
-
a. capturing a user record number from a wireless device carried by a user, the user record number being embedded in a barcode having been submitted in a registration process; b. capturing user sensed data as the user writes a name, the name being written with a stylus, the user sensed data including user biometric data or user metric data; c. transmitting the user sensed data and the user record number to a processor system, the user record number being transmitted to the processor by means of a barcode scanner; d. using the user record number to retrieve user reference data, the user reference data including user biometric data, user metric data, or user signature data; e. comparing the user sensed data with the user reference data in the processor; f. authenticating the identity of the user based upon the results of the comparison; and g. enabling user access to an account, a network, or a physically secure location if the processor confirms user identity and other system criteria confirms the access request should be approved, the other system criteria being fund availability, network clearance, or physical clearance, respectively.
-
-
5. A method for enabling a user to process a payment for goods or services from a provider, the method comprising:
-
a. tendering funds sufficient to pay for the goods or services, fund tendering being by a payment card and through a cardreader; b. capturing user reference data involving user biometric data or user metric data from a wireless device carried by the user, the wireless device being separate and apart from the payment card, the user reference data having been submitted in a registration process; c. capturing user sensed data, the user sensed data including user biometric data or user metric data; d. transmitting the user sensed data and the user reference data to a processor system, the user reference data being transmitted to the processor by means of radio-frequency transmission; e. comparing the user sensed data against the user reference data; and f. advising the provider of the goods or services when user identity is denied resulting from the comparison of the user sensed data with the user reference data.
-
-
6. A method for processing an access request, the method comprising:
-
a. capturing user sensed data as the user writes a name, the name being written with a stylus, the user sensed data including user biometric data or user metric data; b. transmitting the user sensed data to a smart card, the smart card including a smart-card processor, the smart-card processor including memory, the memory including user reference data, the user reference data including user biometric data or user metric data; c. comparing the user sensed data against the user reference data in the smart-card processor; d. authenticating the identity of the user based upon the results of the comparison; and e. enabling user access to an account, a network, or a physically secure location if the processor confirms user identity and other system criteria confirms the access request should be approved the other system criteria being fund availability, network clearance, or physical clearance, respectively.
-
Specification