Personal digital key initialization and registration for secure transactions
First Claim
1. A method comprising:
- determining, by a reader device, that a portable electronic device is located within a proximity zone of the reader device;
establishing, by the reader device, a wireless communication channel between the reader device and the portable electronic device responsive to determining that the portable electronic device is located within the proximity zone;
capturing, by the portable electronic device, a face image of a user requesting a financial transaction;
comparing, by the portable electronic device, the face image of the user and a profile stored in the portable electronic device;
determining, by the portable electronic device, that the face image of the user matches the profile stored in the portable electronic device based on the comparing;
responsive to determining that the face image of the user matches the profile stored in the portable electronic device, transmitting transaction information for the financial transaction from the portable electronic device to the reader device via the wireless communication channel;
requesting, by the reader device, validation information associated with the portable electronic device from a database using the transaction information, wherein the validation information is based on an amount limit associated with the user; and
performing, by the reader device, the financial transaction for the user using the transaction information transmitted from the portable electronic device responsive to receiving the validation information from the database.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes.
811 Citations
22 Claims
-
1. A method comprising:
-
determining, by a reader device, that a portable electronic device is located within a proximity zone of the reader device; establishing, by the reader device, a wireless communication channel between the reader device and the portable electronic device responsive to determining that the portable electronic device is located within the proximity zone; capturing, by the portable electronic device, a face image of a user requesting a financial transaction; comparing, by the portable electronic device, the face image of the user and a profile stored in the portable electronic device; determining, by the portable electronic device, that the face image of the user matches the profile stored in the portable electronic device based on the comparing; responsive to determining that the face image of the user matches the profile stored in the portable electronic device, transmitting transaction information for the financial transaction from the portable electronic device to the reader device via the wireless communication channel; requesting, by the reader device, validation information associated with the portable electronic device from a database using the transaction information, wherein the validation information is based on an amount limit associated with the user; and performing, by the reader device, the financial transaction for the user using the transaction information transmitted from the portable electronic device responsive to receiving the validation information from the database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 21)
-
-
11. A system comprising:
- one or more processors, and a memory storing instructions that when executed by the one or more processors, cause the system to;
determine, by a reader device, that a portable electronic device is located within a proximity zone of the reader device; establish, by the reader device, a wireless communication channel between the reader device and the portable electronic device responsive to determining that the portable electronic device is located within the proximity zone; capture, by the portable electronic device, a face image of a user requesting a financial transaction, compare, by the portable electronic device, the face image of the user and a profile stored in the portable electronic device; determine, by the portable electronic device, that the face image of the user matches the profile stored in the portable electronic device based on the comparing; responsive to determining that the face image of the user matches the profile stored in the portable electronic device, transmit transaction information for the financial transaction from the portable electronic device to the reader device via the wireless communication channel; request, by the reader device, validation information associated with the portable electronic device from a database using the transaction information, wherein the validation information is based on an amount limit associated with the user; and perform, by the reader device, the financial transaction for the user using the transaction information transmitted from the portable electronic device responsive to receiving the validation information from the database. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 22)
- one or more processors, and a memory storing instructions that when executed by the one or more processors, cause the system to;
Specification