Method, apparatus and system for identity authentication
First Claim
1. A method in a computer system for authenticating the identity of a person, the computer system having a miniaturized computer comprising a memory for storing personal data, an interface and a first processor for receiving and comparing personal data at various security levels, the method of authentication comprising the steps of:
- receiving personal data through the interface of the miniaturized computer;
verifying personal data by comparing the personal data received to personal data maintained in the memory of the miniaturized computer; and
displaying the authentication result.
0 Assignments
0 Petitions
Accused Products
Abstract
A device, a method and a computer system to replace a bulky low tech, non-secure wallet with built-in security protocol is provided. A robust, high-memory capacity, portable miniaturized computer system includes a processing unit, memory, power source, reader and interface. The miniaturized computer is capable of storing large amounts of data and transmitting this data to a reader via a robust button interface, wireless transmitter or USB port or other connection configuration. The data contained within the computer is safeguarded by the need of the owner to access the data or remotely shut the computer down.
267 Citations
23 Claims
-
1. A method in a computer system for authenticating the identity of a person, the computer system having a miniaturized computer comprising a memory for storing personal data, an interface and a first processor for receiving and comparing personal data at various security levels, the method of authentication comprising the steps of:
-
receiving personal data through the interface of the miniaturized computer;
verifying personal data by comparing the personal data received to personal data maintained in the memory of the miniaturized computer; and
displaying the authentication result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for authenticating identity of person, comprising:
-
a miniaturized computer having a memory, a first processor and an interface for receiving and transmitting personal data, the interface being communicably linked to said first processor, wherein said miniaturized computer verifies said personal data to authenticate the identity of the person; and
a remote device having a reader and an interpreter, said interpreter having a second processor for authorizing an action or a transaction. - View Dependent Claims (10, 11, 13, 14, 15, 16, 18, 19)
-
-
12. A computer system for authenticating identity of person, comprising:
-
a miniaturized computer having a memory for storing an identifier code, a first processor and an interface for receiving and transmitting personal data, the interface being communicably linked to said first processor, wherein said miniaturized computer verifies the personal data to authenticate the identity of the person;
a remote device having a reader and an interpreter, said interpreter having a second processor for authorizing an action or a transaction.; and
a remote processing unit communicably linked to said remote device.
-
-
17. A memory for storing data for access by a computer readable program being executed on a computer, comprising:
a data structure stored in said memory, said data structure including information resident in a database used by the computer readable program and including;
personal information, credit card information, medical information, nonpublic identification information, electronic currency, and identifier code.
-
20. A portable miniaturized computer for authenticating the identity of a person and to process transactions that require proof of identification and access to other personal data comprising:
-
a first processor having a high capacity memory wherein a personal data is maintained in said memory; and
an interface for communicating personal data from a receiver to said first processor and transmitting data to a remote device. - View Dependent Claims (21, 22)
-
-
23. A computer-readable medium containing instructions for controlling a computer to authenticate the identity of a person, by:
-
receiving personal data through an interface of a portable miniaturized computer, said computer accessing and processing the data for making transactions or actions that require proof of identification and other personal data;
verifying personal data by comparing the data to an identifier code maintained in the memory of the miniaturized computer; and
displaying the authentication results.
-
Specification