Method for identity verification
First Claim
1. A method for verifying identity for a payment, the method comprising:
- a. initiating the processing of a payment for goods or services, confirmation of the payment requiring a user signature image, the user signature image being generated by use of a stylus, a first fingerprint sensor being disposed in the stylus;
b. capturing the user signature image that is generated;
c. capturing a user fingerprint image, the user fingerprint image being captured by touching the fingerprint sensor in the stylus, the stylus used to generate the user signature image being used to capture the user fingerprint image;
d. comparing the user fingerprint image to a first reference fingerprint image, the first reference fingerprint image being captured during a registration; and
e. comparing the user signature image to a first reference signature image, the first reference signature image being captured during the registration;
whereby the comparison of the user fingerprint image to the first reference fingerprint image, and the comparison of the user signature image to the first reference signature image are used to verify user identity; and
whereby processing of the payment proceeds once the user identity is verified.
3 Assignments
0 Petitions
Accused Products
Abstract
The method for identity verification employs biometric technology. Positioned at the center of the system is a stylus with any of a number of biometric properties or their combination or with one or more metric sensors, while the customer uses the stylus to sign his/her name, or even for writing anything. The identity verification system is used at point-of-sale terminals, in various closed environments, to access a computer network, in applications involving pen-based computers and smart-pens, and for e-commerce. When fingerprint sensors are used, the sensors are positioned in the stylus grip, one sensor for the index finger, and a second sensor for the thumb. In one variation, one-to-one biometric matching is used. Each participant carries on his/her person a device that includes an encrypted biometric for reference purposes to gain access Into the system. Processing is simplified since the system need only make a “MATCH” or “NO MATCH” decision. In a second variation that is particularly useful in closed environments, one-to-many biometric matching is used. During each event access request, the community of reference prints is searched for a match with the applicant. Each member of the community need carry nothing on his/her person to participate in the system. In either variation, the stylus is either attached to each site or is portable, one such stylus being carried by each participant.
95 Citations
28 Claims
-
1. A method for verifying identity for a payment, the method comprising:
-
a. initiating the processing of a payment for goods or services, confirmation of the payment requiring a user signature image, the user signature image being generated by use of a stylus, a first fingerprint sensor being disposed in the stylus; b. capturing the user signature image that is generated; c. capturing a user fingerprint image, the user fingerprint image being captured by touching the fingerprint sensor in the stylus, the stylus used to generate the user signature image being used to capture the user fingerprint image; d. comparing the user fingerprint image to a first reference fingerprint image, the first reference fingerprint image being captured during a registration; and e. comparing the user signature image to a first reference signature image, the first reference signature image being captured during the registration; whereby the comparison of the user fingerprint image to the first reference fingerprint image, and the comparison of the user signature image to the first reference signature image are used to verify user identity; and
whereby processing of the payment proceeds once the user identity is verified. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for verifying identity for request, the method comprising:
-
a. initiating the processing of the request, confirmation of the request requiring a user signature image, the user signature image being generated by use of a stylus, a first fingerprint sensor being disposed in the stylus; b. capturing the user signature image that is generated; c. capturing a user fingerprint image, the user fingerprint image being captured by touching the fingerprint sensor in the stylus, the stylus used to generate the user signature image being used to capture the user fingerprint image; d. comparing the user fingerprint image to a first reference fingerprint image, the first reference fingerprint image being captured during a registration; and e. comparing the user signature image to a first reference signature image, the first reference signature image being captured during the registration; whereby the comparison of the user fingerprint image to the first reference fingerprint image, and the comparison of the user signature image to the first reference signature image are used to verify user identity; and
whereby processing of the request proceeds once the user identity has been verified. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for verifying identity for a request, the method comprising:
-
a. initiating the processing of the request, confirmation of the request requiring a user signature image and a first user primary identifier, the user signature image being generated by use of a stylus, a first fingerprint sensor being disposed in the stylus; b. capturing a user fingerprint image, the user fingerprint image being captured by touching the first fingerprint sensor in the stylus, the stylus used to generate the user signature image being used to capture the user fingerprint image; c. capturing a user primary identifier; d. comparing the user fingerprint image and to a first reference fingerprint image, the first reference fingerprint image being captured during a registration; and e. comparing the user primary identifier to a first reference primary identifier, the first reference primary identifier being captured during the registration; whereby the comparison of the user fingerprint image and the reference fingerprint image, and the comparison of the user primary identifier with the first reference primary identifier are used to verify user identity; and
whereby processing of the request proceeds once the user identity has been verified. - View Dependent Claims (12, 13, 14)
-
-
15. A method for verifying identity for a request, the method comprising:
-
a. initiating the processing of the request, confirmation of the request requiring a user signature image, the user signature image being generated by use of a stylus, a first fingerprint sensor being disposed in the stylus; b. capturing a user fingerprint image, the user fingerprint image being captured by touching the fingerprint sensor in the stylus; c. capturing a first user metric, the first user metric being captured while the user signature image is being generated, the stylus being used to generate the user signature image being used to capture the user fingerprint image; d. comparing the user fingerprint image to a first reference fingerprint image, the first reference fingerprint image being captured during a registration; and e. comparing the first user metric to a first reference metric, the first reference metric being captured during the registration; whereby the comparison of the user fingerprint image to the first reference fingerprint image, and the comparison of the first user metric to the first reference metric are used to verify user identity; and whereby processing of the request proceeds once the user identity has been verified. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method for verifying identity for a request, the method comprising:
-
a. initiating the processing of the request, confirmation of the request requiring a user signature image, the user signature image being generated by use of a stylus, a first fingerprint sensor being disposed in the stylus; b. capturing a user fingerprint image, the user fingerprint image being captured by touching the fingerprint sensor in the stylus, the stylus used to generate the user signature image being used to capture the user fingerprint image; c. capturing first user biometric image, the first user biometric image being different from the fingerprint image, the first user biometric image being captured while the request is being submitted; d. comparing the user fingerprint image to a first reference fingerprint image, the first reference fingerprint image being captured during a registration; and e. comparing the first user biometric image to a first reference biometric image, the first reference biometric image;
being captured during the registration;whereby the comparison of the user fingerprint image to the first reference fingerprint image, and the comparison of the first user biometric image to the first reference biometric image are used to verify user identity; and whereby processing of the request proceeds once the user identity has been verified. - View Dependent Claims (22, 23, 24)
-
-
25. A method for verifying identity for a request, the method comprising:
-
a. initiating the processing of the request, confirmation of the request requiring a user signature image and a first user PIN or password, the user signature image being generated by use of a stylus, a first fingerprint sensor being disposed in the stylus; b. capturing a user fingerprint image, the user fingerprint image being captured by touching the fingerprint sensor in the stylus, the stylus used to generate the user signature image being used to capture the user fingerprint image; c. capturing the first user PIN or password; d. comparing the user fingerprint image to a first reference fingerprint image, the first reference fingerprint image being captured during a registration; and e. comparing the first user PIN or password to a first reference PIN or password, the first reference PIN or password being captured during the registration; whereby the comparison of the user fingerprint image to the first reference fingerprint image, and the comparison of the first user PIN or password to the first reference PIN or password are used to verify user identity; and whereby processing of the request proceeds once the user identity has been verified. - View Dependent Claims (26, 27, 28)
-
Specification