Universal secure registry
First Claim
1. A method of authenticating an identity of a first entity, comprising the acts of:
- wirelessly transmitting from a first device to a second device, first encrypted authentication information of the first entity, wherein authentication information of the first entity included in the first encrypted authentication information includes each of a PIN provided by the first entity, a first portion of biometric data of the first entity and a time-varying value generated by the first device;
transmitting, from the second device over a network, at least a portion of the authentication information of the first entity to a secure database;
receiving, with the second device, a second portion of the biometric data of the first entity from the secure database;
decrypting with the second device, the first encrypted authentication information to provide the authentication information of the first entity to the second device;
combining, with the second device, the first portion of the biometric data and the second portion of the biometric data;
authenticating with the second device the identity of the first entity based upon the authentication information and the combination of the first portion of the biometric data and the second portion of the biometric data of the first entity; and
allowing the first entity to proceed with a computer assisted transaction or preventing the first entity from proceeding with the computer assisted transaction, respectively, based upon the authentication information and the combination of the first portion of the biometric data and the second portion of the biometric data.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for validating an identity of a user to enable or prevent an occurrence of an event is disclosed. In one embodiment, the system includes a first device including a wireless transmitter which is configured to transmit validation information, a second device including a wireless receiver configured to receive the validation information and to further transmit the validation information, and a secure system in communication with the second device. The secure system includes a database configured to receive the validation information transmitted from the second device, and to transmit additional information to the second device following a receipt of the validation information to assist the second device in either enabling or preventing the occurrence of the event.
100 Citations
43 Claims
-
1. A method of authenticating an identity of a first entity, comprising the acts of:
-
wirelessly transmitting from a first device to a second device, first encrypted authentication information of the first entity, wherein authentication information of the first entity included in the first encrypted authentication information includes each of a PIN provided by the first entity, a first portion of biometric data of the first entity and a time-varying value generated by the first device; transmitting, from the second device over a network, at least a portion of the authentication information of the first entity to a secure database; receiving, with the second device, a second portion of the biometric data of the first entity from the secure database; decrypting with the second device, the first encrypted authentication information to provide the authentication information of the first entity to the second device; combining, with the second device, the first portion of the biometric data and the second portion of the biometric data; authenticating with the second device the identity of the first entity based upon the authentication information and the combination of the first portion of the biometric data and the second portion of the biometric data of the first entity; and allowing the first entity to proceed with a computer assisted transaction or preventing the first entity from proceeding with the computer assisted transaction, respectively, based upon the authentication information and the combination of the first portion of the biometric data and the second portion of the biometric data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification