Biometric financial transaction system and method

Information

  • Patent Grant
  • 8630932
  • Patent Number
    8,630,932
  • Date Filed
    Thursday, August 16, 2012
    12 years ago
  • Date Issued
    Tuesday, January 14, 2014
    11 years ago
Abstract
Tokenless biometric authorization of transaction between a consumer and a merchant uses an identicator and an access device. A consumer registers with the identicator a biometric sample taken from the consumer. The consumer and merchant establish communications via the access device. The merchant proposes a transaction to the consumer via the access device. The access device communicates to the merchant associated with the access device. After the consumer and merchant have agreed on the transaction, the consumer and the identicator use the access device to establish communications. The access device communicates to the identicator the code associated with the access device. The identicator compares biometric sample from the consumer with registered biometric sample. Upon successful identification, the identicator forwards information regarding the consumer to the merchant. These steps accomplish a biometrically authorized electronic financial transaction without the consumer having to present any personalized man-made memory tokens.
Description
FIELD OF THE INVENTION

This invention relates to the field of tokenless biometric financial transactions. Specifically, this invention is directed towards a system and method for processing tokenless financial transactions using a wired or wireless communication system such as a conventional telephone, a cellular telephone, or a wireless personal digital assistant (PDA) wherein a biometric, such as a finger image or voice print, is used to authorize the transaction.


BACKGROUND OF THE INVENTION

There is an increasing need for consumers to be able to conveniently and securely purchase goods and services over the telephone (be it wired or wireless) or via a wireless PDA such as a Palm Pilot.


Conventionally, purchases made over the telephone are accomplished via the use of a credit card. The consumer calls the merchant, places an order for the appropriate goods and services, and then chooses a credit card with which to pay for the transaction. The consumer then reads the account number and expiration date off the credit card to the customer service representative at the merchant, who copies this information down and uses it to charge the account.


Purchases made using a wireless PDA or other device for accessing the Internet follow a similar pattern: the consumer connects to the merchant's web site, places an order, and then fills in a “form” with credit card account number and expiration information. The merchant's computer system uses this information to charge the credit card account.


There are numerous problems with this conventional approach. First, the system is inconvenient for the consumer, in that the consumer must recite or enter a significant amount of information. Second, the system is insecure, in that the credit card account information is generally transmitted “in the clear,” making it subject to loss or compromise via interception. Third, the system is inflexible, in that the only payment mechanism that lends itself to use is the credit card; it is difficult, for example, to use one's checking account to pay via telephone.


A fourth problem is that transactions made without the card being physically present (as in the case of a telephone or Internet order) are charged a higher “discount rate” than transactions where the card is present. The discount rate is the amount that the credit card associations, issuing banks, acquiring banks, and third-party transaction processors collectively charge the merchant on each transaction, generally expressed as a percentage of the gross transaction amount. Discount rates of 3%-5% for card-not-present transactions are common.


The fifth, and perhaps largest, problem is that the consumer can repudiate the transaction at a later date, leaving the merchant liable for the amount of the transaction. That is, a consumer can order goods or services via telephone or the Internet, pay using his or her credit card, and then later dispute the transaction. In the event of a dispute, credit card association rules place the burden on the merchant to produce a signed receipt showing that the customer authorized the transaction. Of course, in the case where the order took place over the telephone or the Internet, no such signed receipt exists. As a result, the consumer can always claim that they didn't authorize the transaction. Such a claim is called a “chargeback.” In the event of a chargeback, the merchant not only ends up losing the transaction amount, but generally also must pay a chargeback fee of $10-$25.


A sixth problem is that many previously proposed solutions to the problems cited require the consumer to physically possess a personalized, portable, man-made memory device—referred to in this specification as a “token”—to carry out a transaction. “Personalized” means that a token that contains in memory information that is in some way unique to the consumer. An example of personalized data include a credit card number, a checking account number, or any other unique account number. Example tokens include credit cards, debit cards, paper checks, and smart cards. A token can also be a PDA or wireless telephone that has programmed with information personalized to the consumer that is used to complete a financial transaction. The problems with requiring the use of a token to complete a financial transaction are numerous: the consumer must carry the token, which may be cumbersome; the loss or theft of a consumer's token financially incapacitates the consumer; and stealing a consumer's token may allow a thief to make fraudulent charges using the token. Tokenless transaction systems are known in the art; examples include U.S. Pat. No. 5,613,012 to Hoffman et al., U.S. Pat. No. 5,838,812 to Pare, Jr. et al., U.S. Pat. No. 5,870,723 to Pare, Jr. et al., U.S. Pat. No. 6,230,148 to Pare, Jr. et al., and U.S. Pat. No. 6,154,879 to Pare, Jr. et al., all of which are assigned to VeriStar Corporation, the assignee of the instant invention, and all of which are incorporated by reference.


As a result, there is a need for a new electronic financial transaction system that solves these problems for telephone and wireless PDA-style transactions. Accordingly, it is an object of this invention to provide a new system and method for biometric financial transactions.


In particular, it is an object of the invention that each transaction authorized using the invention cannot be repudiated by the consumer, thus eliminating chargebacks.


It is another object of the invention that the system and method be convenient for the consumer, eliminating the need to recite or otherwise enter credit card or other account numbers into a telephone or PDA.


It is another object of the invention that the system and method be secure, eliminating the possibility of fraud via intercepting transmissions from the telephone or PDA.


It is still another object of the invention that the system and method provide the flexibility of supporting multiple types of financial accounts, e.g., credit cards, debit cards, and checking (ACH) accounts.


It is another object of this invention that the consumer be able to complete a transaction on a tokenless basis. As such, this tokenless transaction occurs without the consumer being required to possess or present any man-made, portable devices which contain in memory data that is personalized to the consumer, i.e., tokens. Although the consumer may optionally possess such tokens, the invention is expressly designed to function without requiring their use and as such, the invention is designed to be tokenless.


It is yet another object of the invention that the system and method, through its superior security and non-repudiation capabilities, justify a reduced discount rate for the merchant.


It is still another object of the invention that it be easy to integrate with existing merchant computer, information, and payment systems.


SUMMARY OF THE INVENTION

This invention provides a method for tokenless biometric authorization of an electronic transaction between a consumer and a merchant using an electronic identicator and an access device. The method comprises the following steps: In a consumer registration step, a consumer registers with the electronic identicator at least one registration biometric sample taken directly from the consumer's person. In a first communications establishment step, the consumer and merchant establish communications with each other via an access device capable of biometric input, and wherein the access device is not required to contain in memory any data that is personalized to the consumer. In a proposal step, the merchant proposes a commercial transaction to the consumer via the access device. In a first access device identification step, the access device communicates to the merchant an identification code associated with the access device. In a second communications establishment step, after the consumer and merchant have agreed on the proposed commercial transaction, the consumer and the electronic identicator use the access device to establish communications with each other. In a second access device identification step, the access device communicates to the electronic identicator the identification code associated with the access device. In a consumer identification step, the electronic identicator compares a bid biometric sample taken directly from the consumer's person with at least one previously registered biometric sample to produce a successful or failed identification of the consumer. In an information forwarding step, upon successful identification of the consumer, the electronic identicator electronically forwards information regarding the consumer to the merchant. Upon successful identification of the consumer, these steps enable a biometrically authorized electronic financial transaction without the consumer being required to present any personalized man-made memory tokens.


Optionally, the electronic identicator may perform an electronic financial transaction authorization. In this embodiment, there is a transaction forwarding step, the merchant forwards information regarding the commercial transaction to the electronic identicator. In an identification code forwarding step, the merchant communicates to the electronic identicator the identification code associated with the access device that was previously communicated to the merchant. In an association step, the identification code associated with the access device is used to associate the biometric identification accomplished in the consumer identification step with the information regarding the commercial transaction. Finally, there is a financial transaction authorization step: the electronic identicator executes a financial transaction on behalf of the merchant.


Alternatively, the merchant may optionally perform an electronic financial transaction authorization. In this embodiment, there is an identification code forwarding step, wherein the electronic identicator forwards to the merchant the identification code associated with the access device that was previously communicated to the electronic identicator. In an association step, the identification codes associated with the access device are used to associate the information regarding the consumer with the commercial transaction. In a financial transaction authorization step, the merchant executes a financial transaction.


The invention also includes a system for tokenless biometric authorization of an electronic transaction between a consumer and a merchant. The system includes an electronic identicator, comprising at least one computer further comprising at least one database wherein the consumer registers at least one registration biometric sample taken directly from the consumer's person. It also includes an access device capable of establishing communications between the consumer and the merchant, and between the consumer and the electronic identicator, and further comprising biometric input means, said access device not being required to contain in memory any data that is personalized to the consumer. There is a communication means for enabling communications between the consumer and the merchant, and between the consumer and the electronic identicator, and capable of transmission of a bid biometric sample obtained by the access device from the person of the consumer to the electronic identicator. A comparator engine is used to compare a bid biometric sample to at least one registration biometric sample. An execution module is used for authorizing a transfer of a transaction amount from a financial account of the consumer to a financial account of the payor. The system enables a financial transaction to be conducted without the consumer being required to possess any man-made tokens containing information in memory that is personalized to the consumer.


The electronic identicator can include means responsive to a comparison matching the bid biometric sample to the registration biometric sample to forward information to the merchant regarding the consumer.


Information forwarded regarding the consumer may comprise a previously registered financial account identifier belonging to the consumer, or the consumer's age, or name, or address. It may also indicate the success or failure of a financial transaction. Financial account identifiers may comprise a credit card number, a debit card number, or a bank account number.


The access device may be a wireline telephone, a wireless telephone, a two-way pager, a personal digital assistant, or a personal computer. Identification codes associated with an access may include telephone numbers, electronic serial numbers (ESN), a hardware identification code, or encryption of a challenge message using a private key.


Communication of the identification code may be accomplished via caller ID, and the first and second communication establishment steps may be implemented using a telephone call, three-way calling, induced three-way calling, or packet switching.


Biometrics used in the invention may include finger images, facial images, retinal images, iris images, or voiceprints.


The execution module may optionally be located or operated by the merchant, or by the electronic identicator, or by a third party.


The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment of the invention which proceeds with reference to the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows the overall collection of elements comprising the system.



FIGS. 2, 3, and 4 illustrate examples of operation of the system of FIG. 1 according to the invention.





DETAILED DESCRIPTION

Overall Architecture


As shown in FIG. 1, the invention comprises the following components. There is at least one consumer who is able to use the invention for purchasing goods or services. Similarly, there is at least one merchant who is able to fulfill orders from the consumer. The consumer has access to an access device. As described in greater detail below, an access device is simply a device that is capable of both communicating an order to a merchant and also accepting a biometric from the consumer. A biometric or a biometric sample is any unique human characteristic of which a scan or image is taken directly from the person. The biometric or biometric sample may be, but is not limited to, any of the following: a voice print, a fingerprint, a retinal image, an iris image, a facial image.


A third-party identicator provides the ability to accept biometric and other data as input, to identify the consumer from this data, and to either complete a financial transaction on behalf of the merchant or to provide information to the merchant to enable the merchant to complete a financial transaction. Throughout this specification the terms “third-party identicator” and “electronic identicator” are used interchangeably; it is understood that the electronic identicator may be owned and/or operated by the merchant, the consumer, or a third party, without loss of generality.


Communication Links


Communication links exist or can be established between the access device and the merchant, the access device and the third-party identicator, and the merchant and the third-party identicator. A communication link can be a permanent connection (e.g., a leased line), a temporary switched-circuit connection (e.g., a dialup telephone call), or a virtual connection (e.g., via packet switching). Encryption can be employed on all communication links to protect sensitive data, as is standard in the industry.


Access Device


An access device is any device that is capable of communicating an order to a merchant and also accepting a biometric sample from the consumer. Different access devices are preferable in different situations. The access device is not required to contain in memory any data which is personalized to or unique to the consumer in order for the consumer to complete a financial transaction. Example access devices include:


A standard wireline telephone. A consumer can use such a device to call a merchant and place an order, as is done today. Additionally, it can be used as a biometric input device using the consumer's voice as a biometric.


A wireless or cellular telephone. Just like a standard wireline telephone, a wireless telephone can also be used as an access device using voice biometrics.


A wireless or cellular telephone with a built-in finger image scanner or other biometric sensor. This is like the example above, but uses a biometric other than voice, e.g., a finger image.


A wireless personal digital assistant (PDA) with a microphone or other biometric sensor. The wireless PDA can be used to enter and communicate an order to a merchant, and a microphone or other biometric sensor can be used to input a biometric. Other access devices will be apparent to those of ordinary skill in the art.


Every access device possesses an identification (ID) code. This ID code is preferably unique to the device, but is not required to be. Examples of ID codes include a digital certificate stored in a PDA or wireless telephone, a telephone or ESN number stored in a wireless telephone, or a telephone number in the case of a wire-line phone. Note that in this last example the ID code (the telephone number) is not unique to the device (the telephone) but is rather unique to the telephone line.


Third-Party Identicator


The third-party identicator is a data and call-processing center comprising a database of biometric and financial account information for at least one, and ordinarily for many consumers.


An identicator can be a single computer that serves a particular merchant or a large collection of computers that serve a number of different merchants. The third-party identicator accepts queries of biometric data and identifies consumers from this data. Once identified, the third-party identicator retrieves financial account data associated with that consumer. This financial account information either is then used to directly charge the financial account, or is provided to the merchant to charge the account.


Third-party identicators are known in the art; an example third-party identicator is given in section 1.5 “System Description: Data Processing Center” in U.S. Pat. No. 5,613,012 to Hoffman, et al., which is assigned to the same entity that this invention is assigned to, and which is hereby incorporated by reference.


Use of the System Via Telephone Access Device


In one embodiment a telephone is the access device used. Use of the system in this embodiment proceeds as follows.


1. The consumer uses the access device (telephone) to contact the merchant.


2. The consumer and the merchant work out and agree upon the details of the transaction, including the goods or services to be ordered, the ship to and bill to addresses, and the transaction amount.


3. The merchant receives the ID code from the access device. In one embodiment, this is via caller ID.


4. The merchant sends the ID code, the merchant identifying information, and the transaction amount to the third-party identicator. This information may be sent via an out-of-band channel (e.g., a separate network connection or via a virtual private network) or it may be passed in-band at the start of step 5, below.


5. The merchant transfers the telephone call to the third-party identicator.


6. The third-party identicator prompts the consumer to enter their biometric. In one embodiment this biometric is a finger image. In another embodiment it is a voiceprint. Other biometrics are known. This biometric information is sent to the third-party identicator.


7. The third-party identicator uses the biometric information to identify the consumer. In the event that the consumer cannot be identified from the supplied biometric, the third-party identicator prompts the consumer to try again. If the consumer cannot be identified after repeated tries, the third-party identicator transfers the call to a human customer service assistant, who can use other means to identify the consumer.


8. In the event of a successful identification the third-party identicator retrieves account information for the consumer. Account information consists of credit card or other financial account data sufficient to complete a financial transaction.


9. If necessary, the third-party identicator uses the ID to assist in matching up the transaction information (merchant identification information and amount) with the individual.


10. In one embodiment, the third-party identicator performs a financial transaction using the retrieved financial account information. In another embodiment, the third-party identicator returns this financial account information to the merchant so that the merchant can complete a financial transaction.


Use of System via Personal Digital Assistant


In another embodiment, a wireless PDA is the access device used. As discussed above, different biometrics are possible. For illustrative purposes, a voice biometric is used in this embodiment. Use of the system in this embodiment proceeds as follows:


1. The consumer uses the access device (wireless PDA) to contact the merchant's web site or its equivalent.


2. The consumer and the merchant work out and agree upon the details of the transaction, including the goods or services to be ordered, the ship to and bill to addresses, and the transaction amount.


3. The merchant receives the ID code from the access device. In this embodiment, this is either a digital certificate identification or a number stored in the device.


4. The merchant sends the ID code, the merchant identifying information, and the transaction amount to the third-party identicator.


5. The merchant sends a message to the device indicating that the device should contact the third-party identicator.


6. The third-party identicator sends a message to the device instructing it to prompt the consumer to enter his or her biometric. As described above, a voice biometric is used for illustrative purposes in this embodiment, but other biometrics are possible. This biometric information is sent to the third-party identicator.


7. The third-party identicator uses the biometric information to identify the consumer. In the event that the consumer cannot be identified from the supplied biometric, the third-party identicator prompts the consumer to try again. If the consumer cannot be identified after repeated tries, the third-party identicator alerts a human customer service assistant, who can use other means to identify the consumer.


8. In the event of a successful identification, the third-party identicator retrieves account information for the consumer. Account information may consist of credit card account number or other financial account data sufficient to complete a financial transaction.


9. If necessary, the third-party identicator uses the ID to assist in matching up the transaction information (merchant identification information and amount) with the individual.


10. In one embodiment, the third-party identicator performs a financial transaction using the retrieved financial account information. In another embodiment, the third-party identicator returns this financial account information to the merchant so that the merchant can complete a financial transaction.


Use of System Via Telephone with Induced Three-Way Calling


In another embodiment, a telephone having a feature known as “induced three-way calling is the access device used. In this embodiment, an external entity (e.g., the merchant) can request that the telephone put the current connection on hold and then dial out and establish another connection. While this feature does not exist in current generation telephones, implementation of such a feature would be straightforward for one of ordinary skill in the art. For illustrative purposes, a voice biometric is used in this embodiment. Use of the system in this embodiment proceeds as follows:


1. The consumer uses the access device (telephone) to contact the merchant.


2. The consumer and the merchant work out the details of the transaction, including the goods or services to be ordered, the ship to and bill to addresses, and the transaction amount.


3. The merchant receives the ID code from the access device. In one embodiment, this is via caller ID.


4. The merchant sends the ID code, the merchant identifying information, and the transaction amount to the third-party identicator. This information may be sent via an out-of-band channel (e.g., a separate network connection or via a virtual private network) or it may be passed in-band at the start of step 5, below.


5. The merchant sends a message to the access device (telephone) instructing it to put the current call to the merchant on hold and to call the third-party identicator.


6. The third-party identicator obtains the access device ID from the access device. In one embodiment, this is via caller ID.


7. The third-party identicator prompts the consumer to enter their biometric. In one embodiment this biometric is a finger image. In another embodiment it is a voiceprint. Other biometrics are known. This biometric information is sent to the third-party identicator.


8. The third-party identicator uses the biometric information to identify the consumer. In the event that the consumer cannot be identified from the supplied biometric, the third-party identicator prompts the consumer to try again. If the consumer cannot be identified after repeated tries, the third-party identicator transfers the call to a human customer service assistant, who can use other means to identify the consumer.


9. In the event of a successful identification the third-party identicator retrieves account information for the consumer. Account information consists of credit card or other financial account data sufficient to complete a financial transaction.


10. If necessary, the third-party identicator uses the ID to assist in matching up the transaction information (merchant identification information and amount) with the individual.


11. In one embodiment, the third-party identicator performs a financial transaction using the retrieved financial account information. In another embodiment, the third-party identicator returns this financial account information to the merchant so that the merchant can complete a financial transaction.


12. The third-party identicator sends a message to the access device instructing it to terminate the call and resume the call with the merchant.


13. The merchant now verifies that the transaction completed successfully.


From the foregoing it will be appreciated how the objects of the invention are met. As can be seen from the above, the invention is marked advantageous over existing systems in numerous ways:


First, because each transaction is authorized using a biometric received from the consumer's person, the transaction cannot be repudiated, eliminating chargebacks.


Second, the invention is convenient for the consumer, in that the third-party identicator handles all financial account information, eliminating the need to recite or otherwise enter credit card or other account numbers into a telephone or PDA.


Third, the use of biometrics and encryption provides security, eliminating the possibility of fraud via intercepting transmissions from the telephone or PDA.


Fourth, the system supports the use of multiple types of financial accounts, providing flexibility for the consumer.


Fifth, through its superior security and non-repudiation capabilities, the invention justifies a reduced discount rate for the merchant.


Sixth, by using ordinary telephone connections or existing wireless connections, the invention is easy to integrate with existing merchant computer, information, and payment systems.


Seventh, the invention does not require the consumer to use or possess any portable, man-made tokens containing data personalized to the user in order to complete a financial transaction.


Although the invention has been described with respect to a particular biometric electronic transaction system and method for its use, it will be appreciated that various modifications of the system and method are possible without departing from the invention.

Claims
  • 1. A method, comprising: receiving, at a data processing center via a first device, a first request to enable a transaction, wherein the first request includes data pertaining to a transaction between an entity and an individual who has registered with the data processing center at least a registered biometric sample, wherein the first device is operated by the entity;receiving, at the data processing center, a second request to enable the transaction, wherein the second request is received via a second device in short-range communication with a third device, wherein the second device enables a communication link between the third device and the data processing center and the third device is a wireless device operated by the individual;receiving, at the data processing center from the second device, a biometric sample, wherein the biometric sample is transmitted from the third device to the second device via short-range communication;comparing, at the data processing center, the biometric sample with one or more registered biometric samples to produce a successful or failed identification of the individual;enabling the transaction at the data processing center, based upon a successful identification of the individual and according to the data pertaining to the transaction; and wherein upon the successful identification of the individual, the enabling comprises at least one of: retrieving, at the data processing center, financial account data that the individual has registered with the data processing center and that is associated with the registered biometric sample; andforwarding, to the first device, the retrieved financial account data.
  • 2. The method of claim 1, wherein upon the successful identification of the individual, the enabling comprises utilizing the received transaction data and consumer financial account data that the individual has registered with the data processing center and that is associated with the registered biometric sample to perform the transaction.
  • 3. The method of claim 1, comprising indicating that the individual authorizes the transaction with the received biometric sample.
  • 4. The method of claim 1, wherein the enabling comprises at least one of: confirming that the individual has authorized the transaction via provision of the biometric sample anddenying the individual an ability to repudiate the transaction.
  • 5. The method of claim 1, wherein the second device is operated by the entity.
  • 6. The method of claim 1, wherein the second device is operated by a third party.
  • 7. The method of claim 1, wherein upon the successful identification of the individual, the enabling comprises at least one of: retrieving, at the data processing center, age data that the individual has registered with the data processing center and that is associated with the registered biometric sample; andforwarding, to the first device, the retrieved age data.
  • 8. The method of claim 1, wherein the data pertaining to the transaction includes at least one of: individual device identifying data, wherein the individual device identifying data is used to match the first request and second request; goods or services to be purchased; a shipping address; a billing address; the transaction amount; and first device identifying data.
  • 9. A method, comprising: receiving, at a data processing center via an entity device, a request to enable a transaction, wherein the request includes data pertaining to a transaction between an entity and an individual, the individual having registered with the data processing center a first biometric sample;prompting, at an individual device, the individual to present a second biometric sample, wherein the prompt is communicated via a system device in short-range communication with the individual device, wherein the system device enables a communication link between the individual device and the data processing center;receiving, at the data processing center from the system device, the second biometric sample, wherein the second biometric sample is transmitted from the individual device to the system device via short-range communication;comparing, at the data processing center, the second biometric sample with the first biometric sample to produce a successful or failed identification of the individual;enabling, at the data processing center based upon a successful identification of the individual and according to the data pertaining to the transaction, the transaction;and wherein the enabling comprising at least one of: retrieving, at the data processing center, financial account data that the individual has registered with the data processing center and that is associated with the first biometric sample; andforwarding, to the entity device, the retrieved financial account data.
  • 10. The method of claim 9, comprising the data processing center initiating the prompting.
  • 11. The method of claim 9, comprising at least one of: the data pertaining to the transaction including individual device identifying data; andthe data processing center using the individual device identifying data to identify the individual device to prompt.
  • 12. The method of claim 9, wherein the enabling comprises utilizing the received transaction data and consumer financial account data that the individual has registered with the data processing center and that is associated with the first biometric data to perform the transaction.
  • 13. A method, comprising: receiving, at a data processing center via an entity device, a first request to enable a transaction, including data pertaining to the transaction between an entity and an individual;receiving, at the data processing center, a second request to enable the transaction, wherein the second request is received via an individual device in short-range communication with a virtual connection device that enables a communication link between the individual device and the data processing center;receiving, at the data processing center via the virtual connection device, a biometric sample wherein the biometric sample is transmitted from the individual device to the virtual connection device via short-range communication;comparing, at the data processing center, the biometric sample with one or more registered biometric samples to produce a successful or failed identification of the individual; andenabling, at the data processing center based upon a successful identification of the individual and according to the data pertaining to the transaction, the transaction; andwherein the virtual connection device that enables the communication link between the individual device and the data processing center is operated by one or more of the data processing center and a third party.
  • 14. The method of claim 13, wherein the individual device is a wireless device operated by the individual.
  • 15. The method of claim 13, comprising the data processing center prompting the individual device via the virtual connection device to present the biometric sample.
  • 16. The method of claim 13, comprising negotiating the transaction between the entity and the individual via the entity device and the individual device.
  • 17. The method of claim 16, wherein the entity device and the individual device communicate via the virtual connection device.
CROSS-REFERENCE

This application is a continuation of U.S. application Ser. No. 13/284,219, filed Oct. 28, 2011, now issued U.S. Pat. No. 8,452,680, issued on May 8, 2013, which is a continuation of U.S. application Ser. No. 13/108,703, filed May 16, 2011, now issued U.S. Pat. No. 8,073,756, issued on Dec. 6, 2011, which is a continuation of U.S. application Ser. No. 12/423,628, filed Apr. 14, 2009, now issued U.S. Pat. No. 7,970,678, issued on Jun. 28, 2011, which is a division of U.S. application Ser. No. 09/871,241, filed May 30, 2001, now issued U.S. Pat. No. 7,565,329, issued on Jul. 21, 2009, which claims the benefit of U.S. provisional application Ser. No. 60/208,680, filed May 31, 2000, herein incorporated by reference.

US Referenced Citations (231)
Number Name Date Kind
3639905 Yaida et al. Feb 1972 A
3876864 Clark et al. Apr 1975 A
3943335 Kinker et al. Mar 1976 A
3975711 McMahon Aug 1976 A
4048618 Hendry Sep 1977 A
4151512 Riganati et al. Apr 1979 A
4208651 McMahon Jun 1980 A
4213038 Silverman et al. Jul 1980 A
4227805 Schiller Oct 1980 A
4253086 Szwarcbier Feb 1981 A
4321672 Braun et al. Mar 1982 A
4322163 Schiller Mar 1982 A
4353056 Tsikos Oct 1982 A
4358677 Ruell et al. Nov 1982 A
4390968 Hennessy et al. Jun 1983 A
4429413 Edwards Jan 1984 A
4484328 Schlafly Nov 1984 A
4537484 Fowler et al. Aug 1985 A
4544267 Schiller Oct 1985 A
4582985 Lofberg Apr 1986 A
4618988 Schiller Oct 1986 A
4649563 Riskin Mar 1987 A
4675815 Kuroki et al. Jun 1987 A
4696046 Schiller Sep 1987 A
4699149 Rice Oct 1987 A
4720869 Wadia Jan 1988 A
4728186 Eguchi et al. Mar 1988 A
4734858 Schlafly Mar 1988 A
4747050 Brachtl et al. May 1988 A
4752966 Schiller Jun 1988 A
D298536 Brefka Nov 1988 S
4784484 Jensen Nov 1988 A
4790564 Larcher et al. Dec 1988 A
4799156 Shavit et al. Jan 1989 A
4805223 Denyer Feb 1989 A
4821118 Lafreniere Apr 1989 A
4837422 Dethloff et al. Jun 1989 A
4845636 Walker Jul 1989 A
4868376 Lessin et al. Sep 1989 A
4926480 Chaum May 1990 A
4946276 Chilcott Aug 1990 A
4947028 Gorog Aug 1990 A
4947443 Costello Aug 1990 A
4961142 Elliott et al. Oct 1990 A
4993068 Piosenka et al. Feb 1991 A
4995086 Lilley et al. Feb 1991 A
4998279 Weiss Mar 1991 A
5025372 Burton Jun 1991 A
5036461 Elliott et al. Jul 1991 A
5054089 Uchida et al. Oct 1991 A
5054090 Knight et al. Oct 1991 A
5056019 Schultz et al. Oct 1991 A
5073950 Colbert et al. Dec 1991 A
5077803 Kato et al. Dec 1991 A
5088817 Igaki et al. Feb 1992 A
5095194 Barbanell Mar 1992 A
5103486 Grippi Apr 1992 A
5105467 Kim et al. Apr 1992 A
5109427 Yang Apr 1992 A
5109428 Igaki et al. Apr 1992 A
5144680 Kobayashi et al. Sep 1992 A
5146102 Higuchi et al. Sep 1992 A
5161204 Hutcheson et al. Nov 1992 A
5168520 Weiss Dec 1992 A
5180901 Hiramatsu Jan 1993 A
5191611 Lang Mar 1993 A
5210588 Lee May 1993 A
5210797 Usui et al. May 1993 A
5222152 Fishbine et al. Jun 1993 A
5224164 Eisner Jun 1993 A
5224173 Kuhns et al. Jun 1993 A
5229764 Matchett et al. Jul 1993 A
5230025 Fishbine et al. Jul 1993 A
5239583 Parrillo Aug 1993 A
5241606 Horie Aug 1993 A
5251259 Mosley Oct 1993 A
D340919 Lee Nov 1993 S
5265162 Bush et al. Nov 1993 A
5267324 Kumagai Nov 1993 A
5274695 Green Dec 1993 A
5276314 Martino et al. Jan 1994 A
5280527 Gullman et al. Jan 1994 A
5280627 Flaherty et al. Jan 1994 A
5321242 Heath, Jr. Jun 1994 A
5321765 Costello Jun 1994 A
5325442 Knapp Jun 1994 A
5329589 Fraser et al. Jul 1994 A
5335288 Faulkner Aug 1994 A
5343529 Goldfine et al. Aug 1994 A
5351303 Willmore Sep 1994 A
5354974 Eisenberg Oct 1994 A
5359669 Shanley Oct 1994 A
5371794 Diffie et al. Dec 1994 A
5371797 Bocinsly, Jr. Dec 1994 A
5383113 Kight et al. Jan 1995 A
5386104 Sime Jan 1995 A
5400662 Tamori Mar 1995 A
5412738 Brunelli et al. May 1995 A
5416573 Sartor, Jr. May 1995 A
5429006 Tamori Jul 1995 A
5457747 Drexler Oct 1995 A
5465290 Hampton et al. Nov 1995 A
5465303 Levison et al. Nov 1995 A
5466919 Havakimian Nov 1995 A
5469506 Berson et al. Nov 1995 A
5484988 Hills et al. Jan 1996 A
5485510 Colbert Jan 1996 A
D367044 Arakaki Feb 1996 S
5493621 Matsumura Feb 1996 A
5499288 Hunt et al. Mar 1996 A
5513272 Bogosian, Jr. Apr 1996 A
5517558 Schalk May 1996 A
5533123 Force et al. Jul 1996 A
5534855 Shockley et al. Jul 1996 A
5546471 Merjanian Aug 1996 A
5546523 Gatto Aug 1996 A
5561718 Trew et al. Oct 1996 A
5572597 Chang et al. Nov 1996 A
5577120 Penzias Nov 1996 A
5578808 Taylor Nov 1996 A
5594806 Colbert Jan 1997 A
5598474 Johnson Jan 1997 A
5602933 Blackwell et al. Feb 1997 A
5604802 Holloway Feb 1997 A
5613012 Hoffman et al. Mar 1997 A
5615277 Hoffman Mar 1997 A
5621812 Deaton et al. Apr 1997 A
5635723 Fujieda et al. Jun 1997 A
5636038 Lynt et al. Jun 1997 A
5636282 Holmquist et al. Jun 1997 A
5647364 Schneider et al. Jul 1997 A
5650217 Skrivanek et al. Jul 1997 A
5655116 Kirk et al. Aug 1997 A
5677989 Rabin et al. Oct 1997 A
5719950 Osten et al. Feb 1998 A
5745555 Mark Apr 1998 A
5748780 Stolfo May 1998 A
5757917 Rose et al. May 1998 A
5764789 Pare, Jr. et al. Jun 1998 A
5768134 Swaelens et al. Jun 1998 A
5770849 Novis et al. Jun 1998 A
5787187 Bouchard et al. Jul 1998 A
5790668 Tomko Aug 1998 A
5794207 Walker et al. Aug 1998 A
5796857 Hara Aug 1998 A
5799156 Hogan et al. Aug 1998 A
D397682 Yotukura Sep 1998 S
5802199 Pare, Jr. et al. Sep 1998 A
5805719 Pare, Jr. et al. Sep 1998 A
D400191 Butts et al. Oct 1998 S
5822737 Ogram Oct 1998 A
5825907 Russo Oct 1998 A
5825924 Kobayashi Oct 1998 A
5826241 Stein et al. Oct 1998 A
5826245 Sandberg-Diment Oct 1998 A
5832464 Houvener et al. Nov 1998 A
5838812 Pare, Jr. et al. Nov 1998 A
5844287 Hassan et al. Dec 1998 A
5845005 Setlak et al. Dec 1998 A
5848400 Chang Dec 1998 A
5850442 Muftic Dec 1998 A
5870723 Pare, Jr. et al. Feb 1999 A
5876926 Beecham Mar 1999 A
5892824 Beatson et al. Apr 1999 A
5892838 Brady Apr 1999 A
5910988 Ballard Jun 1999 A
5926555 Ort et al. Jul 1999 A
5930804 Yu et al. Jul 1999 A
5933515 Pu Aug 1999 A
5935071 Schneider et al. Aug 1999 A
5943235 Earl et al. Aug 1999 A
5943423 Muftic Aug 1999 A
5956700 Landry Sep 1999 A
5982914 Lee et al. Nov 1999 A
5986746 Metz et al. Nov 1999 A
5991372 D'Ingianni et al. Nov 1999 A
6011858 Stock et al. Jan 2000 A
6012039 Hoffman et al. Jan 2000 A
6016476 Maes et al. Jan 2000 A
6023688 Ramachandran et al. Feb 2000 A
6028950 Merjanian Feb 2000 A
6029195 Herz Feb 2000 A
6040783 Houvener et al. Mar 2000 A
6041309 Laor Mar 2000 A
6045039 Stinson et al. Apr 2000 A
6052675 Checchio Apr 2000 A
6064751 Smithies et al. May 2000 A
6070141 Houvener et al. May 2000 A
6072894 Payne Jun 2000 A
6073840 Marion Jun 2000 A
6084967 Kennedy et al. Jul 2000 A
6105010 Musgrave Aug 2000 A
6111977 Scott et al. Aug 2000 A
6119096 Mann et al. Sep 2000 A
6154727 Karp et al. Nov 2000 A
6154879 Pare, Jr. et al. Nov 2000 A
6182076 Yu et al. Jan 2001 B1
6192142 Pare, Jr. et al. Feb 2001 B1
6202151 Musgrave et al. Mar 2001 B1
6208746 Musgrave Mar 2001 B1
6219439 Burger Apr 2001 B1
6225890 Murphy May 2001 B1
6230148 Pare, Jr. et al. May 2001 B1
6233565 Lewis et al. May 2001 B1
6233618 Shannon May 2001 B1
6256737 Bianco et al. Jul 2001 B1
6260024 Shkedy Jul 2001 B1
6268788 Gray Jul 2001 B1
6269348 Pare, Jr. et al. Jul 2001 B1
6275944 Kao et al. Aug 2001 B1
6310966 Dulude et al. Oct 2001 B1
6311272 Gressel Oct 2001 B1
6317834 Gennaro et al. Nov 2001 B1
6327578 Linehan Dec 2001 B1
6366682 Hoffman et al. Apr 2002 B1
6377228 Jenkin et al. Apr 2002 B1
6397198 Hoffman et al. May 2002 B1
6411728 Lee et al. Jun 2002 B1
6496107 Himmelstein Dec 2002 B1
6522772 Morrison et al. Feb 2003 B1
6928546 Nanavati et al. Aug 2005 B1
7133792 Murakami et al. Nov 2006 B2
7152787 Cheng Dec 2006 B2
20010000045 Yu et al. Mar 2001 A1
20010000535 Lapsley et al. Apr 2001 A1
20010011247 O'Flaherty et al. Aug 2001 A1
20010033661 Prokoski Oct 2001 A1
20010034837 Kausik et al. Oct 2001 A1
20010044775 Saito et al. Nov 2001 A1
20010051924 Uberti Dec 2001 A1
20030061172 Robinson Mar 2003 A1
Foreign Referenced Citations (29)
Number Date Country
0581421 Feb 1994 EP
0598469 May 1994 EP
0651357 May 1995 EP
0823701 Feb 1998 EP
0652540 Sep 2000 EP
57-212851 Dec 1982 JP
59-368860 Feb 1984 JP
61-187838 Aug 1986 JP
63-003369 Jan 1988 JP
63-120385 May 1988 JP
63-261492 Oct 1988 JP
03-189756 Aug 1991 JP
03-288954 Dec 1991 JP
04-322382 Nov 1992 JP
04-324583 Nov 1992 JP
05-062057 Mar 1993 JP
05-250524 Sep 1993 JP
06-149980 May 1994 JP
06-176135 Jun 1994 JP
11-003382 Jan 1999 JP
11-039540 Feb 1999 JP
11-154260 Jun 1999 JP
WO 9410659 May 1994 WO
WO 9513591 May 1995 WO
WO 9809227 Mar 1998 WO
WO 9823062 May 1998 WO
WO 9825227 Jun 1998 WO
WO 9850875 Nov 1998 WO
WO 9928847 Jun 1999 WO
Non-Patent Literature Citations (23)
Entry
Anderson, Teresa, et al., “Security Works,” Security Management, v. 27, No. 11, Nov. 1993, pp. 17-19.
Anonymous, “A Credit Union Points a Finger at Biometrics,” Bank Network News, vol. 15, No. 16, Jan. 13, 1997, p. 2.
Anonymous, “Is it Time for Biometrics?”, Banking Automation Bulletin for Europe, London, Sep. 1992, Issue 115, (ProQuest document ID 7415352), 1 page.
“Biometric ID Cards,” store from Totse.com, Feb. 1996, 10 pages.
“Biometric Payment Firm Pay by Touch Secures $10 Million Funding,” Finextra.com, Oct. 2003, 3 pages.
“Biometrics Comparison Chart,” ncsc.dni.us, 2002, 2 pages.
Cavoukian, Ann, “Consumer Biometric Applications: A Discussion Paper,” Information and Privacy Commissioner, Ontario, Canada, Sep. 1999, 65 pages.
Cavoukian, Ann, “Go Beyond Security—Build in Privacy: One Does Not Equal the Other,” CardTec/SecurTech 96 Conference, Atlanta, GA, May 14-16, 1996, 7 pages.
Hall, Joseph, “Scanning Lets Fingerprints do Talking Scrambled Image Ensures Privacy Developer Says,” Toronto Star, May 15, 1997, p. A6.
Holmes, James P., et al., “A Performance Evaluation of Biometric Identification Devices,” Sandia National Laboratories, Jun. 1991, 27 pages.
Kolor, Joanna, “Biometric Technology Goes Live,” Bank Network News, May 1, 1996, 7 pages.
Lange, et al., “Digital Identification: It's Now at our Fingertips,” Electronic Engineering Times, No. 946, Mar. 24, 1997, p. 142.
“Pay by Touch Announces First UK Customer,” Pay by Touch Press Release, May 11, 2004, 2 pages.
Radcliff, Deborah, “When Data Warehouse Become Open Houses,” Software Magazine, vol. 16, No. 11, Nov. 26, 1996, 2pages.
“Recently Granted Patents in the USA,” Transponder News, Sep. 1998, 5 pages.
Rechtin, Mark, “Fingerprint Technology Makes for Best ID System,” Orange County Business Journal, vol. 22, Issue 51, Section 1, May 14, 1990, 3 pages (ProQuest Document ID 6020297).
Scally, Robert, “CompUSA Tests Fingerprinting to Help Secure Transactions,” Discount Store News, vol. 36, No. 10, May 19, 1997, 2 pages.
Stosz, Jonathan D., et al., “Automated System for Fingerprint Authentication Using Pores and Ridge Structure,” Proceedings of the International Society for Optical Engineering, vol. 2277, Jul. 28-29, 1994, pp. 210-223.
“Supermarkets and Shopper Registration Guide,” Nocards.org, printed on Dec. 26, 2007, 19 pages.
“TCP Protocol Overview,” printed on Dec. 26, 2007, 3 pages.
“Veridicom Showcases New Customers and Applications at COMDEX,” Veridicom Press Release, Nov. 16, 1998, 3 pages.
“What Are Food Stamps?”, Virginia Department of Social Services, Nov. 10, 2005, 1 page.
“Why do you call them “registration and monitoring” programs?”, Frequently Asked Questions, Nocards.org, printed on Feb. 26, 2007, 1 page.
Provisional Applications (1)
Number Date Country
60208680 May 2000 US
Divisions (1)
Number Date Country
Parent 09871241 May 2001 US
Child 12423628 US
Continuations (3)
Number Date Country
Parent 13284219 Oct 2011 US
Child 13587708 US
Parent 13108703 May 2011 US
Child 13284219 US
Parent 12423628 Apr 2009 US
Child 13108703 US