×

Biometric access data encryption

  • US 8,645,709 B2
  • Filed: 11/14/2006
  • Issued: 02/04/2014
  • Est. Priority Date: 11/14/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • obtaining, by at least one processor, first identity verification data, wherein the first identity verification data is encrypted;

    obtaining, by the at least one processor, second identity verification data, wherein the second identity verification data is encrypted by a gaming device;

    comparing, by the at least one processor, the first identity verification data in its encrypted form with the second identity verification data in its encrypted form to determine whether there is a match between the encrypted first identity verification data and the encrypted second identity verification data;

    enabling, by the at least one processor, at least one gaming service on the gaming device based on a determined match between the encrypted first identity verification data and the encrypted second identity verification data;

    subsequent to enabling the at least one gaming service, obtaining, by the at least one processor, during the at least one gaming service second user-change data regarding a user of the gaming device, wherein the second user-change data does not comprise the second identity verification data, and wherein the second user-change data comprises at least one of;

    body movement, blood pressure, body temperature, and pulse rate;

    obtaining, by the at least one processor, first user-change data, wherein the first user-change data does not comprise the first identity verification data, and wherein the first user-change data is collected after comparing the first identity verification data with the second identity verification and prior to obtaining the second-user change data;

    comparing, by the at least one processor, the first user-change data and the second user-change data;

    determining, by the at least one processor, that the first user-change data does not match with the second user-change data; and

    in response to determining that the first user-change data does not match the second user-change data, prompting, by the at least one processor, the user of the gaming device to provide third identity verification data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×