Biometric identification device
First Claim
1. An apparatus comprising:
- a housing;
an identity verification module carried by the housing and comprisinga biometric sensor configured to receive a biometric input from a user,a memory configured to store a control designation and a biometric template associated with the user, anda first processor comprising a comparator configured to authenticate the user based upon matching of the biometric input with the biometric template;
a user input device; and
a second processor carried by the housing and cooperating with the first processor toinitiate a financial transaction based upon authentication of the user and having a user non-negotiable constraint associated with the financial transaction, the user non-negotiable constraint relating to a number of personal data fields to be provided for participating in the transaction and a minimum discount set by the user prior to initiating the transaction to be received in exchange for providing the personal data fields;
receive a first public key associated with an information processor from a certification repository database responsive to initiating the financial transaction,encrypt the control designation along with date and time information using the first public key and send the encrypted control designation to the information processor,receive a challenge message from the information processor encrypted using a second public key associated with the apparatus,decrypt the encrypted challenge message using the a second private key associated with the apparatus, andre-encrypt the challenge message using the first public key, send the re-encrypted challenge message to the information processor for verification to perform the transaction based upon the original challenge message and the re-encrypted challenge message, and send the user non-negotiable constraint to the information processor as a pre-condition for participation in the transaction.
7 Assignments
0 Petitions
Accused Products
Abstract
The invention is directed towards methods, systems and apparatuses, see FIG. 1, (100) for providing secure and private interactions. The invention provides capability for verifying the identity of a party initiating an electronic interaction with another party through data input module (140) which is verified by the identity verification module (150), which further includes a self-destruct mechanism (153). Embodiments of the invention include secure methods for conducting transactions and for limiting the transfer and distribution of personal data to only those data that are absolutely necessary for the completion of the transactions. The invention facilitates the transfer of additional personal data contingent upon an agreement that appropriately compensates the provider of the personal data.
168 Citations
15 Claims
-
1. An apparatus comprising:
-
a housing; an identity verification module carried by the housing and comprising a biometric sensor configured to receive a biometric input from a user, a memory configured to store a control designation and a biometric template associated with the user, and a first processor comprising a comparator configured to authenticate the user based upon matching of the biometric input with the biometric template; a user input device; and a second processor carried by the housing and cooperating with the first processor to initiate a financial transaction based upon authentication of the user and having a user non-negotiable constraint associated with the financial transaction, the user non-negotiable constraint relating to a number of personal data fields to be provided for participating in the transaction and a minimum discount set by the user prior to initiating the transaction to be received in exchange for providing the personal data fields; receive a first public key associated with an information processor from a certification repository database responsive to initiating the financial transaction, encrypt the control designation along with date and time information using the first public key and send the encrypted control designation to the information processor, receive a challenge message from the information processor encrypted using a second public key associated with the apparatus, decrypt the encrypted challenge message using the a second private key associated with the apparatus, and re-encrypt the challenge message using the first public key, send the re-encrypted challenge message to the information processor for verification to perform the transaction based upon the original challenge message and the re-encrypted challenge message, and send the user non-negotiable constraint to the information processor as a pre-condition for participation in the transaction. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for using an apparatus comprising a housing, a user input device carried by the housing, and an identity verification module carried by the housing, the identity verification module comprising a biometric sensor configured to receive a biometric input from a user, a memory configured to store a control designation and a biometric template associated with the user, and a first processor comprising a comparator, and wherein the apparatus further comprises a second processor carried by the housing, the method comprising:
-
using the comparator to authenticate the user based upon matching of the biometric input with the biometric template; and using the second processor to initiate a financial transaction based upon authentication of the user and having a user non-negotiable constraint associated with the financial transaction, the user non-negotiable constraint relating to a number of personal data fields to be provided for participation in the transaction and a minimum discount set by the user prior to initiating the transaction to be received in exchange for providing the personal data field; receive a first public key associated with an information processor from a certification repository database responsive to initiating the financial transaction; encrypt the control designation along with date and time information using the first public key and sending the encrypted control designation to the information processor; receive a challenge message from the information processor encrypted using a second public key associated with the apparatus; decrypt the encrypted challenge message using a second private key associated with the apparatus; re-encrypt the challenge message using the first public key; and send the re-encrypted challenge message to the information processor for verification to perform the transaction based upon the original challenge message and the re-encrypted challenge message, and sending the user non-negotiable constraint to the information processor as a pre-condition for participation in the transaction. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium for an apparatus comprising a housing, a user input device carried by the housing, and an identity verification module carried by the housing, the identity verification module comprising a biometric sensor configured to receive a biometric input from a user, a memory configured to store a control designation and a biometric template associated with the user, and a first processor comprising a comparator, and wherein the apparatus further comprises a second processor carried by the housing, the non-transitory computer-readable medium having computer-executable instructions for causing the apparatus to perform steps comprising:
-
using the comparator to authenticate the user based upon matching of the biometric input with the biometric template; and using the second processor to initiate a financial transaction based upon authentication of the user and having a user non-negotiable constraint associated with the financial transaction, the user non-negotiable constraint relating to a number of personal data fields to be provided for participation in the transaction and a minimum discount set by the user prior to initiating the transaction to be received in exchange for providing the personal data field; receive a first public key associated with an information processor from a certification repository database responsive to initiating the financial transaction; encrypt the control designation along with date and time information using the first public key and sending the encrypted control designation to the information processor; receive a challenge message from the information processor encrypted using a second public key associated with the apparatus; decrypt the encrypted challenge message using a second private key associated with the apparatus; re-encrypt the challenge message using the first public key; and send the re-encrypted challenge message to the information processor for verification to perform the transaction based upon the original challenge message and the re-encrypted challenge message, and sending the user non-negotiable constraint to the information processor as a pre-condition for participation in the transaction. - View Dependent Claims (12, 13, 14, 15)
-
Specification