Transfer of verification data
First Claim
1. A method of transferring verification data from a first carrier to a second carrier, the method comprising the steps of:
- placing the first carrier in a reader connected to a computing device; and
operating the computing device to perform steps of;
verifying the verification data on the first carrier;
reading the verification data;
securing the verification data; and
writing the verification data to the second carrier in a machine readable format;
wherein the step of verifying the verification data includes the steps of controlling access to the first carrier by verifying the credentials of an operator designated to implement at least the reading step and verifying the identity of the holder of the first carrier, where said operator and said holder are separate from one another, and where the operator and holder verification steps each comprise at least one of a PIN code, a password, or a biometrically-based verification procedure.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system are provided for transferring verification data from a first carrier to at least a second carrier in a secure manner. A first carrier, which is typically a smart card based ID card, contains verification data to identify the card holder securely. The method of the invention verifies the verification data on the ID smart card, reads the verification data, compresses and encrypts it, and writes it onto a second carrier, which may be a second smart card or a printed document, for example, in a machine readable form. The invention permits verification data to be securely transferred from one carrier to another, which permits a high degree of security in numerous applications such as the issuing of bank cards, medical aid claims, and other valuable documents.
-
Citations
21 Claims
-
1. A method of transferring verification data from a first carrier to a second carrier, the method comprising the steps of:
-
placing the first carrier in a reader connected to a computing device; and operating the computing device to perform steps of; verifying the verification data on the first carrier; reading the verification data; securing the verification data; and writing the verification data to the second carrier in a machine readable format; wherein the step of verifying the verification data includes the steps of controlling access to the first carrier by verifying the credentials of an operator designated to implement at least the reading step and verifying the identity of the holder of the first carrier, where said operator and said holder are separate from one another, and where the operator and holder verification steps each comprise at least one of a PIN code, a password, or a biometrically-based verification procedure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
- 18. A system for transferring verification data from a first carrier to at least a second carrier in a secure manner, the system including means for verifying the verification data on the first carrier, means for reading the verification data, means for securing the verification data, and means for writing the verification date to a second carrier in a machine readable format, said means for verifying the verification data including means for controlling access to the first carrier by verifying the credentials of an operator designated to implement at least the reading of the verification data and the identity of the holder of the first carrier, where the operator and holder are separate from one another, and where verifying the credentials of an operator and the identity of the holder of the first carrier each comprise at least one of a PIN code, a password, or a biometrically-based verification procedure.
Specification