The present invention generally relates to credit and identity verification systems. More particularly, the present invention relates to credit approval and fraud protection at the point-of-sale for a transaction wherein biometric information is used to verify the identity of a person presenting a token for payment as an authorized user for the associated account and that the account is in order for the transaction. Transaction tokens can include a negotiable instrument, a credit card, a smart card, a loyalty card and a debit card. Information on the authorized accounts can be stored in either a token-based or tokenless electronic transaction system.
There are devices known in the art that gather biometric data from persons for storage or for comparison with stored biometric data for purposes of identity verification. An example of storing biometric data for identity verification is U.S. Pat. No. 4,213,038 to Silverman, et al., for an access security system. Silverman, et al., discloses storing a fingerprint on a card, in either an actual print or “micropattern,” and the card is read by a control means. The fingerprint recordation is ancillary to the preferred function of the card which is identification based upon solely the microperforation of the card, which is not directly related to the fingerprint.
Check funds verification systems are also known in the art that allow merchants and others to verify that customers have funds available in a specific checking account. U.S. Pat. No. 5,484,988 to Hills, et al., discloses a check-writing point-of-sale system that provides for remote verification of funds availability. Hills, et al., is particularly directed to the purchase of goods through an electronic funds transfer.
U.S. Pat. No. 4,253,086 to Szwarcbier discloses a process and apparatus for positive identification of customers that is particularly disclosed as using a fingerprint on a credit card and comparing the fingerprint of the customer to that on the card, and selectively, with a master print on file. Szwarcbier also discloses a printed fingerprint card.
There are “smart cards” known in the art which include fingerprint identification means, such as U.S. Pat. No. 4,995,086 to Lilley, et al., U.S. Pat. No. 4,582,985 to Löfberg, U.S. Pat. No. 4,993,068 to Piosenka, et al., and U.S. Pat. No. 5,180,901 to Hiramatsu. All of these references disclose smart cards that have, at least, a stored fingerprint in a local memory (such as magnetic tape or integrated circuit) that interacts with a reading means at the point-of-sale to assist in customer identification.
An example of an actual fingerprint sensor is U.S. Pat. No. 5,745,096 to Hsumi, et al., which is for a surface-shaped sensor identification device. The Hsumi, et al. device is focused on the specific element of sensing and recording the fingerprint, as opposed to a complete identity verification system.
There are various types of biometric measurements in common use today. The types of biometric measurements include fingerprint verification, hand geometry, voice recognition, retinal scanning, iris scanning, signature verification, and facial recognition. Each biometric device and system has its own operating methodology. The process for any given individual usually begins with an enrollment process. The system captures one or more samples of the biometric. The samples are stored in a “biometric template” (also referred to herein as a biometric database), and are used for future comparison during authentication. Once enrollment and storage are complete, users authenticate themselves by matching the template against current input (“live data”). Comparison of the live data and the template results in a simple binary yes/no match.
Fingerprint verification is a well-known type of biometric measurement. If properly implemented, fingerprints provide high accuracy and at relatively low cost. Hand geometry measures physical characteristics of the individual's hand and fingers and is widely used in physical access control systems. Voice recognition remains difficult to implement. Despite recent advances in voice recognition technology, background noise, microphone quality, the common cold, and anxiety can alter the human voice enough to make voice recognition difficult, if not impossible. Voice recognition technologies include telephone authentication. Extraction and pattern matching algorithms embedded on computer chips are used to analyze voices. Retinal scanning is well established and highly accurate, however, it requires that the individual look directly into the retinal reader. Retinal scans shoot a low-intensity beam of light into the eye and record the pattern of veins in the eye. Iris scanning overcomes most of the problems of retinal scanners and does not require direct contact with the scanner, nor does it require the individual to remove eyeglasses. The technology works by scanning the unique random patterns of the iris. Unlike retinal vein patterns that can change over time, the iris is unique and does not change during a person's lifetime. Facial recognition systems measure characteristics such as the distance between facial features (e.g., pupil to pupil) or the dimensions of the features themselves (such as the width of the mouth). Neural network technology or statistical correlations of the facial geometric shapes are used with this kind of system. Signature verification is a relatively accurate system and is treated separately from the other forms of biometric systems described herein.
With fraudulent check losses alone reaching ten billion dollars annually, the banking industry is striving for ways to reduce these losses. Many proposals have been presented over the last five to ten years. One approach is placing the individual's fingerprint on a sticker and attaching the sticker to the check being presented. Among the more sophisticated approaches is the use of smart cards that have a chip containing biometric information of the account holder. The biometric information stored on the chip can be compared with the biometric information of the person presenting the smart card at the transaction location. However, these alternative methods of reducing fraudulent activity are not meeting the needs of industry. The use of fingerprint stickers are a deterrent for a less sophisticated forger, but the process of identifying the fingerprint on a sticker can take a long time in crime labs due to their backlog and their obvious priority of processing fingerprints obtained from crime scenes in which felonies involving violence occurred. Smart cards with embedded biometric chips are used with credit cards or debit cards, but still do not prevent the more sophisticated identity thief. The more sophisticated identity thief steals account information and then produces his own credit card containing his own biometric information embedded in the chip. When the identity thief presents his biometric information at the transaction location, the verification is being made against an already faulty biometric sample stored on the chip.
Tokenless point-of-sale payment processing systems have also been developed recently. One such system is described in U.S. Pat. No. 6,581,042 to Pare, et al. that uses biometrics obtained at the point-of-sale for verifying the identity of an individual as an authorized user of the tokenless payment system. Tokenless processing systems are intended to speed up the process of check-out at a transaction location by not requiring the person to present a physical token and by verifying the identity of the person presenting payment with the tokenless processing system. A drawback of current tokenless systems is that they only verify tokenless transactions. Tokenless systems do not verify the individual's identity or cross compare with a token-based transaction processing system when a transaction token is presented for payment at the point-of-sale. Therefore, unless the tokenless transaction system can be combined with verification of token transactions presented at the point-of-sale the tokenless transaction system does not prevent and is vulnerable to fraud. For example, a person registers with the tokenless processing system by providing account information and a biometric for identification during the processing of purchases at the point-of-sale by the tokenless processing system. The person registering with the tokenless system believes that all purchases will be authenticated by his biometric. However, this does not prevent a thief from either stealing or fabricating the registered person's physical token (e.g., check, credit card, etc.) and presenting it at a location that uses the tokenless processing system. Unless the physical token presented is checked against the tokenless processing payment system to determine if the account being accessed needs to be authenticated by a biometric, the physical token could be accepted without verifying the identity of the person presenting the token for payment.
Various embodiments described herein, combine the use of valid biometric samples obtained from authentic identifications (IDs) with biometric samples provided by a person at a transaction location, thereby verifying that the biometric information presented for a transaction is a valid biometric for a particular person. In addition, the ID and the biometric sample can also be checked against known invalid users. Although it is possible for someone to counterfeit what is believed to be the authentic ID, in such cases, the identity thief provides an actual fingerprint that has been taken and placed on the token or on the transaction slip. When the token is returned to the transaction location as forged, counterfeit, stolen, etc., the fingerprint is entered into the database of known invalid users, thus preventing any further identity theft activity by this person on the verification system. Various embodiments add additional safeguards, such as verifying the ID with information from the state. This ensures that an ID has not been altered, and is in fact an authentic state-issued ID (e.g., driver's license). Another such safeguard is verifying the information at the processing center of the token with the original information that a bank or token company obtained at the creation of the bank or token account.
Various embodiments include a verification system for check/negotiable instruments or other form of tokens, which has the ability to scan the information from negotiable instruments such as the magnetic ink character recognition (MICR) line, and gather biometric data such as fingerprints. The system alternately and/or additionally scans driver's licenses or other identification cards, and obtains and transmits a signature of a customer, preferably all occurring at a transaction location (e.g., point-of-sale) for purposes of identity and fund verification. However, the electronic transaction can occur at places other than a point-of-sale. For example, the electronic transaction can occur over the Internet, as part of an Internet-based transaction and include transmission of biometric data or signatures for user verification. Therefore, in general, transaction location refers to the place where the user or customer enters his information, such as account data or biometric data into the electronic transaction verification system. The verification system preferably digitizes various indicia of the check, the preferred indicia being the magnetic ink (MICR line) on the check, tendered by the customer at the transaction location, and transmits the data through a communications medium, to a processing system including a negotiable instrument information database, whereby the inputted data is compared with an existing database of information to determine if the customer at the point-of-sale is in fact authorized to use the account, and if the account is in satisfactory condition for transaction approval. The communications medium can be a broadband connection, a dial-up connection, a direct communications link, a satellite link, or fiber optic cable or any other communication link that allows communications between a transaction location and a central or local processing system and database.
In this exemplary embodiment, the verification system alternatively includes a device and method for recording and/or transmitting a biometric measurement of the customer at the location of the transaction and, in the case of a fingerprint biometric, printing the fingerprint on the negotiable instrument, either in actual or digitally encoded form, such that the fingerprint can be later checked against a biometric database of existing fingerprints at such time as the instrument is processed at a bank, which provides an added means of security in the event that fraudulent activity has been discovered between the time of receiving the token at the transaction location and the time it is presented at the processing center. If the system includes a device for scanning an information card that contains biometric data, such as a proper fingerprint printed on a driver's license, and/or signature, then the fingerprint and signature of the user can alternatively be compared to the recorded data on the card, in addition to or instead of, transmission of the various databases.
In another embodiment of the verification system, a negotiable instrument or other token is swiped and the fingerprint is simultaneously taken and digitized whereby the combined data is transmitted to a central (or local) processing system that includes an account information database and a biometric database, and the transmitted data is compared with identification data already on file, and the central (or local) processing system determines if the identification data of an authorized user on file matches with the transmitted data from the user at the transaction location. Local system, in the present context refers to a system that is in physical proximity to the transaction location (e.g., same store). The system then returns the results of the decision on approval to the transaction location. A device at the transaction location displays the decision data and/or prints out a hard copy indicating whether the negotiable instrument/token was approved or denied.
As is well known in the banking industry, the MICR line on a check includes the bank routing number, account number, check number, check amount, and other information, that can be printed near the bottom of the check in magnetic ink in accordance with generally applicable industry standards. In operation, the central (or local) processing system receives data from the transaction location and then determines if the “ABA” magnetic number on the MICR line of the check is a valid number, if the fingerprint data is that of an account owner authorized to use that account, and/or if the signature is that of the authorized account owner, whereby any negative response to these decisions preferably causes return of the data indicative of the negative response to the transaction location. Upon affirmative indications in the decisions, the central (or local) system retrieves the frequency of the account accesses to determine if the current requested access is in excess of a pre-determined limit of an allowable number of accesses. If the current access is in excess of the pre-determined allowable limit, then the data is returned to the transaction location indicating the unacceptable request to exceed the limit, and thus, disapproval of the transaction. If the current access is not in excess of the allowable determined limit, then the verification of the check is approved and such verification is used to update the frequency of account access database, and the approval is returned to the transaction location. Various account conditions can be used, alternatively, to verify the condition of an account. Such conditions can include “outstanding checks,” “returned checks,” and “account closed” among others. For example, if there are outstanding checks on the system for a user's account, then in various embodiments, an indication can be returned to the transaction location that the user's account is not in condition to satisfy the negotiable instrument. Likewise, if the token is a credit card, debit card, loyalty card, smart card or similar-type token, the condition of an account can include “exceeding credit limit,” unpaid balance,” “insufficient funds,” etc.
In a further exemplary embodiment, the transaction database and/or the biometric database within a tokenless payment system can be used to verify or authenticate the person presenting a token at the transaction location. The token being presented at the transaction location is swiped obtaining the necessary account information and sent to a processor for comparison with account information stored in the transaction information database within the tokenless processing system. If a match occurs with account information stored in the transaction database of the tokenless system, the token system then requires the token to be authenticated by a biometric. The biometric information is then sent either separately or in parallel with the transaction information to the tokenless system for approval.
The verification system preferably includes the capability to provide reports on user/customer activity to a merchant or business upon request. The merchant directs an inquiry to the central (or local) system which is in communication with a series of databases and which preferably includes databases indicative of: a number of transactions for a specific account; the location of the transactions for such account; and a user/customer list and relevant data associated with the user/customer. Depending upon the inquiry generated from the merchant, the main (or local) system retrieves the requested information to generate a report on a specific customer, and then returns the report to the merchant.
Alternatively, the verification system can be used in conjunction with a bank proofing machine during batch processing of checks. When the proofing machine scans the magnetic number from the check, the identification data imprinted on a check at the transaction location is compared with account owner identification data as recorded and maintained by the bank to determine if the correct account owner submitted the check. The verification system can also be used in conjunction with an Electronic Check Exchange (ECE) system in which the check information is exchanged electronically, in lieu of or in addition to the exchange of paper checks. For forward presentment, an ECE system is usually referred to as an Electronic Check Presentment (ECP) system. The verification system can be used in conjunction with Automatic Clearinghouse (ACH) processing systems. Furthermore, the verification system can be used in conjunction with a token processing system such as a credit card or debit card processing center to verify the information read from the magnetic strip on the token with information recorded and maintained by the credit or debit card processing center.
In various embodiments, a transaction verification system or a negotiable instrument system for use at a location where a transaction instrument (e.g. a check, a negotiable instrument, a cashiers check, money order, token, credit card, debit card, check card, decoupled debit card, a physical object or device that includes a user's financial account information, a physical object or device that includes information representative of a user's financial account information, a food stamp, etc.) is disclosed. The system comprises a transaction instrument scanner (sometimes referred to as a negotiable instrument reader) that is configured to read encoded information on the transaction instrument when it is presented by a receiving entity. The system further comprises a biometric scanner (sometimes referred to as a biometric reader) configured to generate a biometric data from an individual representing the receiving entity and an electronic communication system configured to transmit information to a central processing system and receive information from the central processing system. In various embodiments, the central processing system can be in communication with the transaction instrument scanner and the biometric scanner. In several embodiments, the central processing system can comprise one or more information stores configured such that the one or more information stores include information associated with a plurality of transaction instruments previously provided by an issuing entity issuing the plurality of transaction instruments. In various embodiments, the one or more information stores can further include biometric information from a plurality of receiving entities, each of the plurality of receiving entities having received at least one of the plurality of transaction instruments from the issuing entity. In various embodiments, the transaction instrument information and the biometric data are compared to the one or more information stores, and a result of the comparison is analyzed to determine if the transaction instrument should be accepted.
In various embodiments, a transaction verification system or a negotiable instrument system for use at a location where a transaction instrument (e.g., a check, a negotiable instrument, a cashiers check, money order, token, credit card, debit card, check card, decoupled debit card, a physical object or device that includes a user's financial account information, a physical object or device that includes information representative of a user's financial account information, a food stamp, etc.) is disclosed. The system includes a transaction instrument scanner (sometimes referred to as a negotiable instrument reader) that is configured to read encoded negotiable instrument information from a negotiable instrument issued by an issuing entity. The system further includes a biometric scanner (also referred to as a biometric data reader) configured to generate biometric data from an individual representing the receiving entity and an electronic communication system configured to transmit at least negotiable instrument information and the biometric data to a central processing system and receive information from the central processing system. In various embodiments, the central processing system can be in communication with the transaction instrument scanner and the biometric scanner. In several embodiments, the central processing system can be configured to access one or more information stores, the one or more information stores including information associated with a configured such that the one or more information stores include information associated with a plurality of transaction instruments (or negotiable instruments). The negotiable instrument information stored in the one or more information stores is previously provided by the issuing entity. In various embodiments, the one or more information stores can further include biometric information associated with a plurality of individuals, each of said plurality of individuals associated with the receiving entity. The electronic communication system is further configured to provide an indication as to whether the negotiable instrument should be accepted, said indication based on a comparison between the negotiable instrument information, the biometric data and data from the one or more information stores. In various embodiments, the comparison can be performed by the negotiable instrument system, or the central processing system, or by an electronic system at a remote location.
Various embodiments described herein disclose a method of processing a transaction (or negotiable) instrument issued by an issuing entity tendered by a receiving entity. The method includes receiving, encoded information associated with the transaction (or negotiable) instrument tendered by the receiving entity. The encoded information can be obtained by a transaction instrument scanning device or a negotiable instrument reading device. The method further includes obtaining biometric information, related to an individual associated with the receiving entity tendering the transaction (or negotiable) instrument. In various embodiments, the biometric information can be obtained by a biometric scanning device or a biometric information reader. The method further includes accessing information from one or more information stores accessible via a central processing system and comparing the information obtained from the transaction instrument and the biometric information with the accessed information. In various embodiments, the one or more information stores can include information associated with a plurality of transaction (or negotiable) instruments, said information previously provided by an issuing entity, and biometric information related to a plurality of individuals. Each of the plurality of individuals can be associated with at least one receiving entity. In various embodiments, each receiving entity may have received at least one transaction (or negotiable) instrument from the issuing entity. A determination of whether the transaction instrument should be accepted or rejected is made based on a result of the comparison. The result of the comparison or the decision regarding accepting or rejecting the transaction instrument can be communicated to an output device. In various embodiments, the output device may include but not be limited to a display device or a printing device. In various embodiments, the negotiable instrument information and the biometric information can be received in substantially real time.
Various embodiments described herein disclose a method of processing a transaction at a location where a transaction token is presented by an individual. The method includes obtaining encoded information from a transaction token at the time the transaction token is tendered by an individual. The encoded information can be obtained using a device configured to read the token. The method further includes obtaining biometric information from the individual tendering the transaction token. The biometric information can be obtained using a biometric reader. The method further includes accessing one or more information stores to determine if any biometric information is associated with the transaction token and if no biometric information is associated with the token, then the biometric information obtained from the individual is associated with the transaction token in the one or more information stores. The biometric information obtained for a few initial uses can serve as a template by which subsequent transactions can be verified. For example, in various embodiments, the biometric information obtained at a subsequent time the transaction token is presented by the individual can be compared to the biometric information previously associated with the transaction token to verify that the individual is an authorized user of the token. If it is determined, that the transaction token is invalid because it is forged or counterfeit and/or the obtained biometric information does not match the previously stored biometric information, then the biometric information associated with that token can be added to an information store that includes a list of invalid users.
Various embodiments described herein disclose a method of processing a transaction token. The method includes enrolling one or more users in a verification system, the enrolling process including receiving user information related to one or more users, the user information including at least a biometric datum; receiving transaction token information associated with one or more transaction tokens issued to the one or more users by an issuing entity and storing said user information and transaction token information in one or more data stores accessible by a central processing system. The method further comprises providing said stored user and transaction token information to a transaction token processor. The method further includes processing a transaction token including receiving, in substantially real time, encoded information from the transaction token tendered by a user, the encoded information obtained by a transaction token reading device and also receiving, in substantially real time, biometric data from the user tendering the transaction token, the biometric data obtained by a biometric scanning device. The method further includes accessing the one or more data stores and comparing the encoded information obtained from the transaction token and the biometric data obtained from the user with information stored in the one or more data stores. The method further includes determining if the transaction token should be accepted based on a result of the comparison; and communicating to a system point of access, in substantially real time, the result of the determination. In various embodiments, enrolling the one or more users is performed prior to processing the transaction token. In various embodiments, the transaction token information is provided by the issuing entity every time a transaction token is issued, for example, every week, every two weeks or every month. In various embodiments, the biometric information includes a finger print, a retinal scan or a face scan. In various embodiments, the transaction token includes a physical object that includes information representative of the individual's or issuing entity's account information. In various embodiments, the transaction token includes a negotiable instrument, a credit card, a debit card, a loyalty card, a decoupled debit card, a device enabled with radio frequency identification, a smart card, a flash drive, a usb thumb drive, a usb pen drive, a usb pin drive, or food stamp.
Various embodiments described herein disclose a method of processing a transaction token. The method includes enrolling one or more users in a verification system, the enrolling process including receiving user information related to one or more users, the user information including at least a biometric datum; receiving transaction token information associated with one or more transaction tokens issued to the one or more users by an issuing entity and storing said user information and transaction token information in one or more data stores accessible by a central processing system. The method further comprises providing said stored user and transaction token information to a transaction token processor. The transaction token processor can be configured to receiving encoded information related to the transaction token tendered by a user, the encoded information obtained by a transaction token reading device and also receiving, biometric data associated with the user tendering the transaction token, the biometric data obtained by a biometric scanning device. The method further includes accessing the one or more data stores and comparing the encoded information obtained from the transaction token and the biometric data obtained from the user with information stored in the one or more data stores. The method further includes determining if the transaction token should be accepted based on a result of the comparison; and communicating to a system point of access the result of the determination. In various embodiments, receiving the encoded transaction token information, receiving the biometric information and communicating the result of the determination can be performed in substantially real time. In various embodiments, enrolling the one or more users is performed prior to processing the transaction token. In various embodiments, the transaction token information is provided by the issuing entity every time a transaction token is issued, for example, every week, every two weeks or every month. In various embodiments, the biometric information includes a finger print, a retinal scan or a face scan. In various embodiments, the transaction token includes a physical object that includes information representative of the individual's or issuing entity's account information. In various embodiments, the transaction token includes a negotiable instrument, a credit card, a debit card, a loyalty card, a decoupled debit card, a device enabled with radio frequency identification, a smart card, a flash drive, a usb thumb drive, a usb pen drive, a usb pin drive, or food stamp.
Accordingly, various embodiments described herein have a practical application in that they provide an electronic transaction verification system to a merchant for use at a transaction location, which determines if the user/customer is authorized to use a specific account, and if the account is in satisfactory condition to remit funds for the negotiable instrument drawn against it.
Various embodiments of the electronic transaction verification system described herein further have industrial applicability in that they provide a computer system which correlates biometric data that is precise with not easily forgeable measurements of a customer, such as fingerprints and/or data from identification cards, and that can be digitally encoded and processed along with the information relative to a negotiable instrument such that the risk of the merchant accepting a bad instrument is greatly reduced. Thus, the various embodiments can be quite economically beneficial to a merchant utilizing the system.
More generally, the embodiments described herein are applicable to electronic transaction verification of a person initiating a transaction with a token at a transaction location. In various embodiments, without limitation, a transaction token can include a negotiable instrument, a check payable on demand, a substitute check, a traveler's check, a debit card, a credit card, a smart card, a promissory note, food stamps, or any other token presented at the point-of-sale for payment. The point-of-sale can be a physical or virtual (i.e., web site) store location. The token is presented at a transaction location to a vendor or merchant. The transaction is initiated by the user presenting a token at the transaction location along with a biometric measurement being taken to verify the identity of the individual against information stored in a database. Information read electronically from the token is used to determine the condition of a user account.
A substitute check, as used herein, has the meaning given to it in the “Check Clearing for the 21st Century Act,” Public Law 108-100, Oct. 28, 2003. A substitute check is a legal equivalent of the original check that has been truncated. It contains an image of the front and back of the original check and bears a MICR line containing all information appearing on the MICR line of the original check.
The disclosure is better understood by reading the following detailed description of the various embodiments in conjunction with the accompanying drawings.
The following detailed description is directed to certain specific embodiments. Those skilled in the relevant art will recognize that many changes can be made to the embodiments described, while still obtaining the beneficial results described herein. It will also be apparent that some of the desired benefits of the various embodiments described herein can be obtained by selecting some of the features of the embodiments described herein without utilizing other features. Accordingly, those who work in the art will recognize that many modifications and adaptations to the present invention are possible and may even be desirable in certain circumstances and are a part of the present invention. Thus, the following description is provided as illustrative of the principles of the various embodiments of the electronic transaction verification system and not in limitation thereof, since the scope of the present disclosure is defined by the claims.
Referring now in greater detail to the drawings, in which like numerals represent like components throughout the several views,
Many check scanning devices are known in the art that scan the magnetic ink on the bottom of checks and such devices range in use from point-of-sale devices to scanners used at banks, where the more advanced devices are referred to as bank “proofing” machines. However, such device alternately and/or additionally includes the capability of video digitization of the check or gathering of other characteristics of the check that are useful for comparison.
The biometric recording device 18 preferably digitizes the fingerprint of a customer at the point-of-sale for transmission to a remote biometric database. Many devices for digitization and transmission of fingerprints are well known in the art, such as the devices of digital biometrics. Other biometric devices such as retinal scanners and voiceprints are alternately and/or additionally used with, or in lieu of, the exemplary fingerprint scanner. Such biometric devices are commercially available and adaptable for use with the various embodiments of the electronic transaction verification system described herein. The electronic transaction verification unit 10 also preferably includes a card reader/scanner, such as a driver's license scanner 20 which scans information from a driver's license, which is especially useful in states that put information, such as fingerprints, in a computer-readable medium such as a magnetic strip (e.g., a California license) or a bar code (e.g., a Georgia license) on the driver's license. When the license contains this information, the electronic transaction verification unit 10 can perform an initial comparison between the biometric recorder device 18 and the device's license scanner 20 for determination of the user's/customer's identity, in addition to or instead of, transmitting biometric data to the biometric database of the central processing system 12. The information gathered from the license scanner 20 can also be verified with information licensed from a state division of motor vehicles in order to authenticate a driver's license. Finally, the electronic transaction verification unit 10 preferably includes a signature-taking device 22 that allows a customer to write his or her signature on the device that then encodes the signature into digital format for transmission. Such transmissions can occur with or separately from the transmission of the check identification and biometric data. There are many devices known in the art that allow a signature to be digitized for storage and comparison, and any of such devices will work satisfactorily in the present inventive system.
The electronic transaction verification unit 10 is preferably a computer platform which has the capability to receive, digitize and process the incoming data from the devices, shown by block 24, for transmission to a central processing system 12. The central processing system 12 can be remotely located from the electronic transaction stations or can be at the same location as the electronic transaction station, e.g., an in-store central processor and database connected to electronic transaction stations by a local area network. The other devices can be integrated with the computer platform of the electronic transaction verification unit 10, however, the devices can also be independent from the computer platform as long as they are in connection with the electronic transaction verification unit 10 sufficient to transmit and have received by the unit 10 the relevant data from the devices. The central processing system 12 is in connection with, at least, an identification database 14, which at a minimum contains the relevant specific identification data related to various checking and/or credit accounts. The identification database 14 can be a hard drive on the central processing system 12, computer platform, or other type of memory device located either locally or remotely, but in connection with, the central processing system 12. Thus, in a basic form, the embodiments described herein solely generate and record identification data of the customer relevant to a single sale and acceptance of a token at a transaction location through recordation of the specific token identification and biometric data of the customer at the transaction location, which is then transmitted by the various devices of the electronic transaction verification unit 10 for recordation. When the simple recordation of the event is effected, it is preferable that the electronic transaction verification unit 10 output a fingerprint (or other biometric data) for inputting on the specific check, negotiable instrument, or in conjunction with another type of token at the transaction location, shown by output 26, either in actual or digitally encoded form, whereby this identifying characteristic of the person cashing or tendering the check is contained upon the check itself and banks processing the check have the capability to compare that imprinted fingerprint with fingerprints on file for the actual account holders, if necessary. However, the printing of the fingerprint on the check or in conjunction with the token (e.g., credit card receipt) can be alternately and/or additionally used in any embodiment of the present inventive verification system.
Various embodiments of the system described herein can be used to verify, validate and/or process various transaction instruments issued by an issuing entity to a receiving entity. As used herein, a transaction instrument can include but is not limited to personal checks, payroll checks, cashier or teller's check, traveller's check, negotiable instruments, a draft payable on demand and drawn on a bank, money orders, credit cards, debit cards, decoupled debit cards, loyalty cards, check cards, smart cards, flash drives, usb thumb drives, usb pen drives, usb pin drives, memory stick, food stamps, tokens, etc. In various embodiments, the transaction instrument or a transaction token can include a physical object, apparatus or device that holds information related to one or more financial accounts associated with a user. In some embodiments the transaction instrument or transaction token can include a physical device that is enabled with radio frequency identification (RFID) tag that holds information associated with or representative of one or more financial accounts associated with a user. As used herein an issuing entity can be any entity that issues the transaction instrument. Examples of issuing entities include but are not limited to an individual, an employer, a corporation, municipal, state and federal government, etc. As used herein, a receiving entity can be any entity to whom the transaction instrument is issued by the issuing entity. Examples of a receiving entity are individuals, employees, corporations, partnerships, etc. As an example, in some embodiments, the receiving entity is an employee of the issuing entity which is an employer or a company. In this example, the employee can receive a payroll check or a reimbursement check from the employer.
In various embodiments, the receiving entity can exchange the transaction instrument for money, goods and/or commodities at a transaction facilitating entity. As used herein, a transaction facilitating entity is an entity that accepts and processes various transaction instruments described above and exchange these transaction instruments money, goods and/or commodities. Examples of transaction facilitating entities are banks, retailers, super-markets, check cashing companies, payment processing companies, etc.
Upon presentation of the transaction instrument, the verification system can scan and/or read the transaction instrument to obtain information encoded therein by a reading device 16 configured to scan and/or read the transaction instrument. In various embodiments, the reading device 16 can be a check scanner or a token reader as described above. In various embodiments, the encoded information can include but is not limited to name of the receiving entity, “ABA” number, account number, card number, serial number or check number, date of issue of the transaction instrument, expiry date of the transaction instrument, the value of the transaction instrument, the amount specified on the transaction instrument, etc.
The verification system can also obtain biometric information from the individual presenting the transaction instrument using the biometric data gathering device 18 described above. In various embodiments, the biometric information can be at least one fingerprint, a retinal scan or some other biometric signature. The encoded information and the biometric information gathered by the verification system can be transmitted to the central processor 12 by an electronic communication system as shown by the logic block 28.
In various embodiments, the electronic communication system can include a wired or a wireless network. In various embodiments, the gathered information may be transmitted to the central processor 12 in substantially real time such that central processor 12 receives the gathered information in less than approximately 1 minute, 2 minutes, 3 minutes or 5 minutes after the transaction instrument is scanned or read. In some embodiments, the gathered information may be transmitted to the central processor 12 over a time period which extends over a few hours or a few days. As described above with reference to
The central processor 12 is configured to access one or more information stores 17 to verify, validate and/or process the received information. For example, in some embodiments, the central processor 12 can access data and/or one or more lists stored in the one or more information stores 17. The plurality of information stores 17 and the data stored therein can be maintained by a transaction validating entity that verifies, validates and/or processes transaction instruments. Examples of transaction validating entities are banks, financial institutions, payment processing companies, check clearing companies, etc. In various embodiments, the transaction facilitating entity and the transaction validating entity may be same.
The data and lists can be previously provided to the transaction validating entity by an individual or a company associated with the issuing entity. In various embodiments, the lists can include information associated with a plurality of transaction instruments issued by the issuing entity and biometric information of one or more individuals associated with or representing one or more receiving entities. In some embodiments, the individual whose biometric information is included in the list can be the receiving entity. In other embodiments, the individual whose biometric information is included in the list can be a person authorized by the receiving entity to act on its behalf. In various embodiments, the issuing entity can obtain the biometric information while registering or enrolling the receiving entity in a transaction verification system such as a payroll program whereas in other embodiments, the biometric information gathered the first few times a transaction instrument is presented can provide a template by which future transactions are verified. A method of enrolling individuals associated with or representing one or more receiving entities in a transaction verification system is illustrated in
If the encoded information obtained by the reading device 16 matches an item in one or more information stores 17 and the biometric information obtained from the biometric data gathering device 18 matches the stored biometric information for the individual associated with the receiving entity to whom the transaction instrument was issued, then the transaction validating entity can make a decision to approve the transaction. However, in some embodiments, if the obtained encoded information does not match any item in the one or more information stores 17 and/or the biometric information does not match the stored biometric information for the individual associated with the receiving entity, then the transaction validating entity can reject the transaction. Alternatively, if the obtained encoded information and/or the biometric information does not match one or more entries in the one or more information stores, then the transaction validating entity can seek approval from the issuing entity prior to making a decision on the transaction.
The decision can be returned to the transaction location as illustrated by the logic block 48. In various embodiments, the decision can be output to an output device as shown in the output block 21. In various embodiments, the output device can include but not be limited to a display device or a printing device or both. Other types of output devices known to persons having ordinary skill in the art can be also used. In various embodiments, the above described method can performed in substantially real time such that a decision on the transaction instrument can be returned to the transaction location and output to the output device in less than approximately 1 minute, 2 minutes, 3 minutes or 5 minutes from the time the transaction instrument is read or scanned. In some embodiments, the decision on the transaction instrument can be returned to the transaction location in a time period which extends over a few hours or a few days from the time the transaction instrument is read or scanned.
To enroll users in the transaction verification system, an issuing entity or an individual or company associated with the issuing entity gathers user information as shown in block 4. The gathered user information may include information such as name, identification number (e.g., social security number, employee identification number, etc.), date of birth, address, etc. The gathered user information can also include biometric data associated with the user. The biometric data as referred to herein includes a characteristic of the user's body. For example, biometric data can include but not be limited to related to any one or more of a user's fingerprint, eye retina and iris, handprint, voice pattern, facial pattern, etc.
The gathered user information can be transmitted to the central processor 12 as shown in block 6. The central processor 12 can store the gathered user information in one or more information or data stores 17. As discussed above, in various embodiments, the one or more information stores 17 can be maintained by the transaction validating entity.
In various embodiments, when the issuing entity issues a transaction instrument or token to the user, information associated with the transaction instrument or token can be transmitted to the central processor 12 as shown in block 8 of
In various embodiments, the central processor 12 may send a confirmation as shown in block 11 of
The above described method of enrolling users in a transaction verification system can be used for example by a company that has several employees and issues payroll checks to the employees. In this example, the users of the transaction verification system can be the employees. The employees can be enrolled in the transaction verification system at the time they accept employment with the company subscribing or using the transaction verification system. Subsequently, every time the company issues payroll checks to its employees, information associated with the payroll checks, such as the payee on the check, check number, amount of the check, etc. can be transmitted to the central processor 12.
When the user presents the payroll check for encashment, information from the payroll check and the biometric data of the user can be compared with the corresponding information stored in the one or more information stores and the results of the comparison can be used to accept or reject the payroll check. A person skilled in the art can recognize that the users can be enrolled in the transaction verification system only once and it is not required to transmit the user information every time a payroll check is issued to the user.
The above described method of enrolling and verifying transaction instruments or tokens can also be used by municipal, state and/or federal government agencies that provide assistance to the public such as unemployment benefits, food stamps, social security benefits, disability benefits, medical benefits, etc.
At the central processor 12, the incoming data is compared, either in parallel with or separately with token identification data, with the existing known data for authorized users of accounts stored in central database 30, shown by decision block 32, and an approval is made as to whether or not to accept the token. Either a yes decision 34 or a no decision 36 on approval is then re-transmitted back to the computer hardware platform 28 of the check verification unit 10. While the check verification unit 10 is shown in communication with a processor 12 and database 30 remotely located thereto, it is not necessary that the central processing system 12 or the database 30 be located remotely to the electronic transaction verification unit 10. In fact, the electronic transaction verification unit 10 and central processing system 12 can be self-contained at the transaction location whereby the central database 30, or the account information and biometric databases are continually updated within the electronic transaction verification unit 10 through either a data connection to a master database or through periodic manual updates from storage media such as floppy disks or CD ROMs. In such an embodiment, the electronic transaction verification system is preferably self-contained and includes all the necessary devices for scanning drivers' licenses 20, gathering biometric data (e.g., fingerprints) 18, or scanning checks/reading tokens 16 (gathering check or token information data) within one unit including the system.
In some embodiments, if the encoded information and/or the biometric information obtained when the transaction instrument is presented to the verification system does not match the previously stored encoded information and/or biometric information which is associated with the transaction instrument, then the central processor 12 can add the transaction instrument information and the biometric information to an information store that includes a list of invalid users and/or transaction instruments.
Various embodiments described herein accordingly utilize an inventive digital process whereby a dataset originates from the transaction location from the electronic transaction verification unit 10, shown by logic block 54, as shown in the processing logic flow chart of
Once affirmative responses have been received to decisions 56, 62, and 68, then the data can be further processed by accessing a frequency of access database 78 which has information on accounts based upon the numbers of inquiries to the system for a specific account, shown by logic block 76, and such information is maintained and updated in the frequency of account access database, shown by database 78, which can be either integrated with or remote to the central processing system 12. Then a decision is made as to whether the current access is in excess of a predetermined allowable amount of access inquires to the system for a specific account, shown by decision block 80, and if the current access is in excess of the allowable pre-determined amount, shown by “yes” arrow 82, then the data is returned to the transaction location indicating that the requested access exceeds the allowable amount, shown by logic block 84, and thus that the transaction is disapproved. Otherwise, if the current access is not in excess of the allowable pre-determined amount, shown by “no” arrow 86, then the electronic transaction verification request is approved, shown by logic block 88. Other measures can also be used in lieu of, or in addition, to these steps, to verify the condition of the account. Several of the measures were identified above.
Upon approval, the information regarding approval is transmitted, shown by arrow 90, to the frequency of account access database 78 for updating of the records contained therein. The information regarding the approval of the electronic transaction is then returned to the transaction location and electronic transaction verification unit 10, shown by logic block 92.
The steps of the processes set forth in
In the exemplary embodiment illustrated in
If the account information is sent to the tokenless system transaction processor 15 and there is no existing account in transaction database 33, then the transaction information would be processed by the normal procedures for handling the token at the transaction location by electronic verification unit 10. If the transaction location normally requires a biometric for the processing of a token then the check/token account information 16 and the biometric information 18 can be gathered at the onset of the transaction and the tokenless databases 33, 35 then would be additional databases that would be checked. The transaction information database 33 and the biometric database 35 can be the same databases for both token-based and tokenless systems. Likewise, the central processor 12 handling token-based transactions (arrow 29) can be a separate processor or the same processor handling the tokenless transactions.
In one embodiment, the electronic transaction verification system preferably includes the capability to return a report to a merchant/vendor upon request, as shown in
The present inventive electronic transaction verification system further provides that after the biometric identification data, such as a fingerprint, has been imprinted on the check, the system can alternately and/or additionally be used at a bank in conjunction with the proofing machine to determine if the biometric identification data on the check is that of the account owner. As shown in
In the embodiment shown in
The embodiments described herein can be utilized in a variety of forms with a variety of sources of information other than those described in detail herein. As an example, the electronic transaction verification system can be interfaced to various transaction and identification information databases containing customer account information and biometric information.
While there have been shown a preferred and alternate embodiments of the electronic transaction verification system, it is to be understood that the electronic transaction verification system may be embodied otherwise than is herein specifically shown and described, and that within the embodiments, certain changes may be made in the form and arrangement of the parts without departing from the underlying ideas or principles of the embodiments of an electronic transaction verification system set forth in the claims appended herewith.
This application is a continuation of U.S. application Ser. No. 17/491,231, filed Sep. 30, 2021, which is a continuation of U.S. application Ser. No. 16/882,079, filed May 22, 2020, now U.S. Pat. No. 11,138,594, entitled ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION, which is a continuation of U.S. application Ser. No. 16/409,609, filed May 10, 2019, now U.S. Pat. No. 10,664,834, entitled ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION, which is a continuation of U.S. application Ser. No. 15/833,406, filed Dec. 6, 2017, now U.S. Pat. No. 10,304,054, entitled ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION, which is a continuation of U.S. application Ser. No. 15/377,412, filed Dec. 13, 2016, now U.S. Pat. No. 9,846,875, entitled ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION, which is a continuation of U.S. application Ser. No. 14/611,571, filed Feb. 2, 2015, which is a continuation of U.S. application Ser. No. 13/934,864, filed on Jul. 3, 2013, now U.S. Pat. No. 9,141,951, entitled ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION, which is a continuation of U.S. application Ser. No. 12/497,512, filed on Jul. 2, 2009, now U.S. Pat. No. 8,485,442, entitled ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION. Each of the above-identified applications is incorporated by reference herein in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4048618 | Hendry | Sep 1977 | A |
4109238 | Creekmore | Aug 1978 | A |
4187498 | Creekmore | Feb 1980 | A |
4213038 | Silverman et al. | Jul 1980 | A |
4253086 | Szwarcbier | Feb 1981 | A |
4315309 | Coli | Feb 1982 | A |
4582985 | Lofberg | Apr 1986 | A |
4672377 | Murphy et al. | Jun 1987 | A |
4947443 | Costello | Aug 1990 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
4995086 | Lilley et al. | Feb 1991 | A |
5180901 | Hiramatsu | Jan 1993 | A |
5305196 | Deaton et al. | Apr 1994 | A |
5321765 | Costello | Jun 1994 | A |
5325294 | Keene | Jun 1994 | A |
5444794 | Uhland, Sr. | Aug 1995 | A |
5484988 | Hills et al. | Jan 1996 | A |
5509083 | Abtahi et al. | Apr 1996 | A |
5530232 | Taylor | Jun 1996 | A |
5576952 | Stutman et al. | Nov 1996 | A |
5578808 | Taylor | Nov 1996 | A |
5590038 | Pitroda | Dec 1996 | A |
5592377 | Lipkin | Jan 1997 | A |
5594226 | Steger | Jan 1997 | A |
5598474 | Johnson | Jan 1997 | A |
5602933 | Blackwell et al. | Feb 1997 | A |
5612870 | Welner | Mar 1997 | A |
5613012 | Hoffman et al. | Mar 1997 | A |
5623522 | Ito | Apr 1997 | A |
5657389 | Houvener | Aug 1997 | A |
5668874 | Kristal et al. | Sep 1997 | A |
5668897 | Stolfo | Sep 1997 | A |
5677955 | Doggett et al. | Oct 1997 | A |
5703344 | Bezy | Dec 1997 | A |
5745046 | Itsumi et al. | Apr 1998 | A |
5748765 | Takhar | May 1998 | A |
5748780 | Stolfo | May 1998 | A |
5764789 | Pare, Jr. et al. | Jun 1998 | A |
5772585 | Lavin et al. | Jun 1998 | A |
5774879 | Custy et al. | Jun 1998 | A |
5789727 | Teradaira et al. | Aug 1998 | A |
5789733 | Jachimowicz et al. | Aug 1998 | A |
5790674 | Houvener et al. | Aug 1998 | A |
5799092 | Kristal et al. | Aug 1998 | A |
5802199 | Pare, Jr. et al. | Sep 1998 | A |
5815252 | Price-Francis | Sep 1998 | A |
5815598 | Hara et al. | Sep 1998 | A |
5818955 | Smithies et al. | Oct 1998 | A |
5826245 | Sandberg | Oct 1998 | A |
5832464 | Houvener et al. | Nov 1998 | A |
5834747 | Cooper | Nov 1998 | A |
5852670 | Setlak et al. | Dec 1998 | A |
5867688 | Simmon et al. | Feb 1999 | A |
5876926 | Beecham | Mar 1999 | A |
5884271 | Pitroda | Mar 1999 | A |
5892824 | Beatson et al. | Apr 1999 | A |
5897625 | Gustin et al. | Apr 1999 | A |
5897989 | Beecham | Apr 1999 | A |
5924074 | Evans | Jul 1999 | A |
5974146 | Randle et al. | Oct 1999 | A |
5987439 | Gustin et al. | Nov 1999 | A |
6018713 | Coli et al. | Jan 2000 | A |
6032119 | Brown et al. | Feb 2000 | A |
6032137 | Ballard | Feb 2000 | A |
6038553 | Hyde, Jr. | Mar 2000 | A |
6041315 | Pollin | Mar 2000 | A |
6044353 | Pugliese, III | Mar 2000 | A |
6072894 | Payne | Jun 2000 | A |
6073106 | Rozen et al. | Jun 2000 | A |
6091835 | Smithies et al. | Jul 2000 | A |
6105011 | Morrison, Jr. | Aug 2000 | A |
6131811 | Gangi | Oct 2000 | A |
6145738 | Stinson et al. | Nov 2000 | A |
6149056 | Stinson et al. | Nov 2000 | A |
6164528 | Hills et al. | Dec 2000 | A |
6193152 | Fernando et al. | Feb 2001 | B1 |
6208264 | Bradney et al. | Mar 2001 | B1 |
6226378 | Quattrocchi | May 2001 | B1 |
6270011 | Gottfried | Aug 2001 | B1 |
6293642 | Gangi | Sep 2001 | B1 |
6308890 | Cooper | Oct 2001 | B1 |
6376251 | Braun et al. | Apr 2002 | B1 |
6390362 | Martin | May 2002 | B1 |
6402029 | Gangi | Jun 2002 | B1 |
6424249 | Houvener | Jul 2002 | B1 |
6438601 | Hardy | Aug 2002 | B1 |
6463417 | Schoenberg | Oct 2002 | B1 |
6473519 | Pidhirny et al. | Oct 2002 | B1 |
6581012 | Aryev et al. | Jun 2003 | B1 |
6581042 | Pare, Jr. et al. | Jun 2003 | B2 |
6592029 | Brikho | Jul 2003 | B2 |
6695203 | Iki et al. | Feb 2004 | B2 |
6695204 | Stinson et al. | Feb 2004 | B1 |
6698653 | Diamond et al. | Mar 2004 | B1 |
6707857 | Cairns | Mar 2004 | B1 |
6728397 | McNeal | Apr 2004 | B2 |
6755344 | Mollett et al. | Jun 2004 | B1 |
6764005 | Cooper | Jul 2004 | B2 |
6898299 | Brooks | May 2005 | B1 |
6938022 | Singhal | Aug 2005 | B1 |
6938821 | Gangi | Sep 2005 | B2 |
6963241 | Lindell | Nov 2005 | B2 |
6983882 | Cassone | Jan 2006 | B2 |
7003142 | Kruse | Feb 2006 | B1 |
7047204 | Wood | May 2006 | B1 |
7058585 | Wood | Jun 2006 | B1 |
7083087 | Gangi | Aug 2006 | B1 |
7083094 | Cooper | Aug 2006 | B2 |
7107220 | Novack et al. | Sep 2006 | B2 |
7110987 | Engelhart | Sep 2006 | B2 |
7209886 | Kimmel | Apr 2007 | B2 |
7231068 | Tibor | Jun 2007 | B2 |
7251828 | Hamid et al. | Jul 2007 | B1 |
7269737 | Robinson | Sep 2007 | B2 |
7272723 | Abbott | Sep 2007 | B1 |
7278025 | Saito et al. | Oct 2007 | B2 |
7314164 | Bonalle | Jan 2008 | B2 |
7318550 | Bonalle et al. | Jan 2008 | B2 |
7330571 | Svensson et al. | Feb 2008 | B2 |
7334732 | Cooper | Feb 2008 | B2 |
7336185 | Turner et al. | Feb 2008 | B2 |
7349557 | Tibor | Mar 2008 | B2 |
7349885 | Gangi | Mar 2008 | B2 |
7357312 | Gangi | Apr 2008 | B2 |
7421398 | Kimmel | Sep 2008 | B2 |
7421399 | Kimmel | Sep 2008 | B2 |
7451481 | Bauer et al. | Nov 2008 | B2 |
7516886 | Gangi | Apr 2009 | B2 |
7530495 | Cooper | May 2009 | B2 |
7533408 | Arnouse | May 2009 | B1 |
7673327 | Polis et al. | Mar 2010 | B1 |
7708198 | Gangi | May 2010 | B2 |
7712658 | Gangi | May 2010 | B2 |
7724137 | Page | May 2010 | B2 |
7812779 | Turner et al. | Oct 2010 | B2 |
7828208 | Gangi | Nov 2010 | B2 |
7864992 | Riedijk et al. | Jan 2011 | B2 |
7886000 | Polis et al. | Feb 2011 | B1 |
7908647 | Polis et al. | Mar 2011 | B1 |
8090787 | Polis et al. | Jan 2012 | B2 |
8095592 | Polis et al. | Jan 2012 | B2 |
8108460 | Polis et al. | Jan 2012 | B2 |
8112476 | Polis et al. | Feb 2012 | B2 |
8122080 | Polis et al. | Feb 2012 | B2 |
8150772 | Mardikar et al. | Apr 2012 | B2 |
8156183 | Polis et al. | Apr 2012 | B2 |
8296360 | Polis et al. | Oct 2012 | B2 |
8353705 | Dobson et al. | Jan 2013 | B2 |
8438223 | Polis et al. | May 2013 | B2 |
8458256 | Polis et al. | Jun 2013 | B2 |
8458292 | Polis et al. | Jun 2013 | B2 |
8458347 | Polis et al. | Jun 2013 | B2 |
8468202 | Polis et al. | Jun 2013 | B2 |
8485442 | McNeal | Jul 2013 | B2 |
8678273 | McNeal | Mar 2014 | B2 |
8903142 | Storm et al. | Dec 2014 | B2 |
8922406 | Jansson | Dec 2014 | B2 |
8959156 | Polis et al. | Feb 2015 | B2 |
8990340 | Polis et al. | Mar 2015 | B1 |
8996654 | Polis et al. | Mar 2015 | B2 |
9141951 | McNeal | Sep 2015 | B2 |
9152841 | Riedijk | Oct 2015 | B1 |
9195878 | Weber | Nov 2015 | B2 |
9323975 | Riedijk et al. | Apr 2016 | B2 |
9331708 | Sundblad | May 2016 | B2 |
9350374 | Sundblad et al. | May 2016 | B2 |
9366843 | Prabhakar et al. | Jun 2016 | B2 |
9383876 | Riedijk et al. | Jul 2016 | B2 |
9442273 | Prabhakar et al. | Sep 2016 | B2 |
9449212 | Riedijk | Sep 2016 | B2 |
9449214 | Lundahl | Sep 2016 | B2 |
9460576 | Riedijk | Oct 2016 | B2 |
9477872 | Sarve et al. | Oct 2016 | B2 |
9489559 | Weber et al. | Nov 2016 | B2 |
9507992 | Lundahl | Nov 2016 | B1 |
9508122 | Setterberg et al. | Nov 2016 | B2 |
9514349 | Weber et al. | Dec 2016 | B2 |
9514352 | Setterberg et al. | Dec 2016 | B2 |
9519819 | Hansen et al. | Dec 2016 | B2 |
9521314 | Setterberg | Dec 2016 | B2 |
9524416 | Rommel | Dec 2016 | B1 |
9576177 | Lundahl | Feb 2017 | B2 |
9582704 | Jägemalm et al. | Feb 2017 | B2 |
9582716 | Prabhakar | Feb 2017 | B2 |
9589171 | Larsson et al. | Mar 2017 | B1 |
9600705 | Riedijk | Mar 2017 | B2 |
9600706 | Hansen et al. | Mar 2017 | B2 |
9600707 | Ramberg et al. | Mar 2017 | B1 |
9602123 | Sundblad et al. | Mar 2017 | B2 |
9613428 | Setterberg et al. | Apr 2017 | B2 |
9646193 | Setterberg et al. | May 2017 | B2 |
9672341 | Danikhno et al. | Jun 2017 | B2 |
9672401 | Riedijk et al. | Jun 2017 | B2 |
9672403 | Tuneld et al. | Jun 2017 | B2 |
9672407 | Lundahl | Jun 2017 | B2 |
9672409 | Jonsson et al. | Jun 2017 | B2 |
9684812 | Riedijk et al. | Jun 2017 | B2 |
9710690 | Carling et al. | Jul 2017 | B1 |
9773150 | Setterberg | Sep 2017 | B1 |
9773153 | Slottner | Sep 2017 | B1 |
9779278 | Nilsson | Oct 2017 | B2 |
9779281 | Hansen et al. | Oct 2017 | B2 |
9779282 | Ghavanini | Oct 2017 | B1 |
9792421 | Weber | Oct 2017 | B1 |
9805244 | Lundahl | Oct 2017 | B2 |
9811708 | Carling et al. | Nov 2017 | B2 |
9818106 | Weber et al. | Nov 2017 | B2 |
9842242 | Larsson et al. | Dec 2017 | B1 |
9842243 | Lundahl | Dec 2017 | B2 |
9842244 | Lundahl | Dec 2017 | B2 |
9842245 | Setterberg et al. | Dec 2017 | B1 |
9846875 | McNeal | Dec 2017 | B2 |
9864895 | Larsson et al. | Jan 2018 | B1 |
9881197 | Ramberg et al. | Jan 2018 | B2 |
9898640 | Ghavanini | Feb 2018 | B2 |
9904841 | Thörnblom et al. | Feb 2018 | B2 |
9911026 | Andesson | Mar 2018 | B2 |
9922231 | Riedijk et al. | Mar 2018 | B1 |
9934418 | Mienko et al. | Apr 2018 | B2 |
9934421 | Nilsson | Apr 2018 | B1 |
9946943 | Ivanisov et al. | Apr 2018 | B2 |
9953204 | Sundblad et al. | Apr 2018 | B2 |
9971434 | Setterberg et al. | May 2018 | B2 |
9971925 | Setterberg et al. | May 2018 | B2 |
9971926 | Riedijk et al. | May 2018 | B2 |
9971930 | Östlund | May 2018 | B2 |
9977945 | Lundahl et al. | May 2018 | B2 |
9984274 | Ramberg et al. | May 2018 | B2 |
10304054 | McNeal | May 2019 | B2 |
10664834 | McNeal | May 2020 | B2 |
10891459 | Lundahl | Jan 2021 | B2 |
10896311 | Hansen | Jan 2021 | B2 |
10936840 | Mienko et al. | Mar 2021 | B2 |
11138594 | Tibor | Oct 2021 | B2 |
11783320 | Tibor | Oct 2023 | B2 |
20020095389 | Gaines | Jul 2002 | A1 |
20020095588 | Shigematsu | Jul 2002 | A1 |
20020113122 | Brikho | Aug 2002 | A1 |
20030074317 | Hofi | Apr 2003 | A1 |
20030128866 | McNeal | Jul 2003 | A1 |
20030149661 | Mitchell et al. | Aug 2003 | A1 |
20040026500 | Brikho | Feb 2004 | A1 |
20040050930 | Rowe | Mar 2004 | A1 |
20040195314 | Lee | Oct 2004 | A1 |
20040234117 | Tibor | Nov 2004 | A1 |
20060000891 | Bonalle et al. | Jan 2006 | A1 |
20060010007 | Denman et al. | Jan 2006 | A1 |
20060064380 | Zukerman | Mar 2006 | A1 |
20060273436 | Naifeh et al. | Dec 2006 | A1 |
20070043594 | Lavergne | Feb 2007 | A1 |
20070078780 | Tran et al. | Apr 2007 | A1 |
20070101419 | Dawson | May 2007 | A1 |
20070156436 | Fisher | Jul 2007 | A1 |
20070168232 | Kimmel | Jul 2007 | A1 |
20070208662 | Jeronimus et al. | Sep 2007 | A1 |
20070260484 | Kimmel | Nov 2007 | A1 |
20080041940 | Weeks | Feb 2008 | A1 |
20080072064 | Franchi | Mar 2008 | A1 |
20080156866 | McNeal | Jul 2008 | A1 |
20080290157 | Robinson | Nov 2008 | A1 |
20090055924 | Trotter | Feb 2009 | A1 |
20090083179 | Gustave et al. | Mar 2009 | A1 |
20090100499 | Bauer et al. | Apr 2009 | A1 |
20090166406 | Pigg et al. | Jul 2009 | A1 |
20090171851 | Beenau et al. | Jul 2009 | A1 |
20090173785 | Cooper | Jul 2009 | A1 |
20090319789 | Wilson et al. | Dec 2009 | A1 |
20100042846 | Trotter et al. | Feb 2010 | A1 |
20100181380 | Trotter | Jul 2010 | A1 |
20100250290 | Lefkowitz | Sep 2010 | A1 |
20100274634 | Ifrah | Oct 2010 | A1 |
20110000961 | McNeal | Jan 2011 | A1 |
20120054842 | Rodriguez et al. | Mar 2012 | A1 |
20120109829 | McNeal | May 2012 | A1 |
20130002400 | Tibor | Jan 2013 | A1 |
20130002401 | Tibor | Jan 2013 | A1 |
20140025583 | McNeal | Jan 2014 | A1 |
20140089197 | Talbert | Mar 2014 | A1 |
20150317636 | McNeal | Nov 2015 | A1 |
20170186012 | McNeal | Jun 2017 | A1 |
20170316406 | McNeal | Nov 2017 | A1 |
20180096346 | McNeal | Apr 2018 | A1 |
20190333050 | McNeal | Oct 2019 | A1 |
20210049587 | Tibor | Feb 2021 | A1 |
Number | Date | Country |
---|---|---|
1760904 | Apr 2006 | CN |
2429092 | Feb 2007 | GB |
2437557 | Oct 2007 | GB |
2002149969 | May 2002 | JP |
2003141471 | May 2003 | JP |
2004021663 | Jan 2004 | JP |
2004030334 | Jan 2004 | JP |
20030006464 | Jan 2003 | KR |
20040034978 | Apr 2004 | KR |
20060057369 | May 2006 | KR |
20060062684 | Jun 2006 | KR |
1999017304 | Feb 2007 | KR |
I 264918 | Oct 2006 | TW |
WO 199801820 | Jan 1998 | WO |
WO 199832076 | Jul 1998 | WO |
WO 200000923 | Jan 2000 | WO |
WO 200114974 | Mar 2001 | WO |
WO 200165443 | Sep 2001 | WO |
WO 200241236 | May 2002 | WO |
WO 2003077076 | Sep 2003 | WO |
WO 2009130538 | Oct 2009 | WO |
Entry |
---|
International Search Report & Written Opinion in PCT/US2011/58460 dated Mar. 16, 2012. |
Apple, “iPhone 5S: About Touch ID Security,” Last Modified Mar. 28, 2014. |
Apple, “iPhone 5S: Using Touch ID,” Last modified May 6, 2014. |
Apple, “iTunes: How to set up an Apple ID within iTunes,”. |
Apple ID Summary. |
Baatz, “Will Your Business Model Float”?, WebMaster Magazine, Oct. 1996 Issue. |
“Banc One to Pilot Check-Cashing Units”, Bank Systems Technology, p. 18, Jan. 1998. |
“Check Fraud Stakes Rise”, American Bankers Association, ABA Banking Journal, pp. 42-48 and 63, Aug. 1997; 89, 8; ProQuest. |
Chandler, Ian, “Cardholder Verification—Realities at Point-of-Sale”, Information Security Technical Report, vol. 3, No. 1, pp. 81-85, 1998. |
Chorafas, Dimitris et al., “Applying AI in DP Operations,” Chapter 13 of Expert Systems in Banking, New York University Press,p. 284-307, 1990. |
Chorafas, Dimitris N., Steinmann, Heinrich, “Expert Systems in Banking: a guide for senior managers”, ISBN 0-8147-1449-8, Chapter 13, pp. 284-307. |
Dimauro, G., et al., “A System for Bankchecks Processing”, Proceedings of the Second International Conference on Document Analysis and Recognition, pp. 454-459, Oct. 20-22, 1993. |
Dinan, R.F., et al., “ImagePlus High Performance Transaction System”, pp. 421-434, IBM Systems Journal, vol. 29, No. 3, 1990. |
EScreen 123 Brochure, downloaded from the web at http://www.escreen.com/products/products.htm on Mar. 13, 2003. |
“eScreen News,” dated May 14, 2001, downloaded from the web at http://www.escreen.com/news/news05.htm on Jun. 6, 2002. |
Farrell, James, “Smartcards Become an International Technology”, IEEE Computer Society, pp. 134-140, Dec. 4-7, 1996. |
“Finger Scans for Park Passes,” obtained from http://allears.net, Date unavailable. |
Gil, Paul, “PayPal 101: How PayPal Works, 2014,” obtained from http://nelforbeginners.about.com/od/ebay101/ss/ paypal101_2.htm, Nov. 2014. |
Grabianowski, E. and Crawford, S., “How PayPal Works,” obtained from http://money.howstuffworks.com/ paypal.htm, Dec. 13, 2005. |
Harmel, Karen “Walt Disney World: The Government's Tomorrowland?,” News 21, a Journalism Initiative of the Carnegie and Knight Foundations, Sep. 1, 2006. |
Hicks, John H., “New system to prevent fraud—and turn checks into single-use debit cards?” Journal of Retail Banking Services, vol. 18, No. 3, Sep. 1, 1996. |
“How PayPal Works,” obtained from http://faculty.ist.psu.edu/bagby/432Fall07/T7/howWorks.html, 2007. |
“How Payment Systems Changes Affect Cash Management”, Corporate EFT Report, Phillips Business Information, Inc., CEFT vol. 12, No. 26, Dec. 30, 1992, in 4 pages. |
Hui, Siu-Cheung et al., “The Design of an Intelligent Signature Processing System for Banking Environment”, Proceedings of the Region 10 Annual International Conference (TENCON),US,New York, IEEE, vol. CONF. 9, Aug. 22, 1994 (Aug. 22, 1994), pp. 976-980. |
“iOS 7 offers big improvements for big business,”. |
Jonatansson, “Iceland's health sector database: A significant head start in the search for biological grail or an irreversible error?” American Journal of Law and Medicine 2000. |
Koerich, Alsseandro, et al., “Automatic Extraction of Filled Information from Bankchecks”, International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation, pp. 2151-2156, vol. 3, Oct. 12-15, 1997. |
Lunt, Penny, “Electronic check presentment on the move”, pp. 53-56, ABA Banking Journal; 87,8, Aug. 1995. |
Macdonald, Ayang, “Fingerprint Cards partners to roll out biometric payment cards in Japan” Website URL: https://www.biometricupdate.com/202107/fingerprint-cards-partners-to-roll-out-biometric-payment-cards-in-japan, Accessed on Jul. 14, 2021, in 5 pages. |
Meckler, Jack M., “Chapter Four: Risks in Check Transactions,” from the Corporate Guide to Payments System Risk, Assessing and Controlling Payments Risk, Treasury Management Association, Probus Publishing, Chicago, IL, Cambridge, England, pp. 51-72, 1995. |
Murphy, Patricia A., “Electronic check clearing alternatives take shape”, ABA Banking Journal, pp. 62-66, May 1993; 85, 5; ProQuest. |
O'Mahony, Donal et al., “Characteristics of Current Payment Systems”, Chapter 2 of Electronic Payment Systems, pp. 5-17, Artech House Inc., 1997. |
“PayPal Name-Value Pair API Basics,” obtained from https://developer.paypal.com/docs/classic/api/NVPAPIOverview/, Date Unavailable. |
“PayPal and Samsung Allow Consumers to Shop and Pay with Fingerprint Authentication on New Samsung Galaxy S5 ,” obtained from http://www.businesswire.com/news/home/20140224006788/en/PayPal-Samsung-Consumers- Shop-Pay-Fingerprint-Authentication#.VRmLRk85Dcs, Mobile World Congress 2014, Feb. 25, 2014. |
“PayPal Security Key FAQ,” obtained from hllps://www.paypal.com/cgibin/webscr?cmd=xpl/Marketing_CommandDriven/securitycenter/PayPalSecurityKeyFAQ-outside, Date Unavailable. |
“PayPal: Account Setup,” obtained from hllps://www.paypal.com/webapps/mpp/account-setup, Date Unavailable. |
“Paying with PayPal: The fast, easy way to pay without revealing your credit card number,” Date Unavailable. |
Phillips Business Information, Inc., “How Payment System Changes Affect Cash Management”, pp. 1-4, Dec. 30, 1992. |
Raghupathi, et al., “Strategic uses of information technology in health care: A state-of-the-art survey”, Topics in Health Information Management, Frederick; Aug. 1999. |
Ranganathan, A. “Pioneering Fingerprint Authentication for Payments,” obtained from https://www.paypal- engineering.com/tags/security, Apr. 11, 2014. |
Screenshots obtained from http://iclarified.com. |
Sherman, Stephen A. et al., “Secure Network Access Using Multiple Applications of AT&T's Smart Card”, AT&T Technical Journal, pp. 61-72, Sep./Oct. 1994. |
Sinha, Robin, “PayPal releases payment app with Samsung Galaxy S5 fingerprint-reader support,” obtained from http://gadgets.ndtv.com/apps/news/paypal-releases-payment-app-with-samsung-galaxy-s5-fingerprint-reader- support-50832, Apr. 14, 2014. |
Siwicki B., “PayPal enables fast mobile checkout via fingerprint recognition,” obtained fromhttps://www. internetretailer.com/2014/05/05/paypal-enables-fast-mobile-checkout-fingerprint-recognition, May 5, 2014. |
Thomas, Mike “Finger Scanners at Disney: Just what are they scanning?”, Orlando Sentinel, May 22, 2007. |
“Use your Fingerprint and PayPal to Shop:Frequently asked questions,” obtained from hllps://www.paypal-pages.com/ samsunggalaxys5/us/index-faq.html, Date Unavailable. |
Weber, “Web sites of tomorrow: How the Internet will transform healthcare”, Health Forum Journal; May/Jun. 1999. |
“White Paper on IOS Security,” Feb. 2014, pp. 3-10. |
International Search Report & Written Opinion in PCT/US2011/58460 dated Match 16, 2012. |
Office Action received in Canadian App No. 2562964 dated Aug. 22, 2011. |
Office Action received in Chinese App No. 200580011962.6 dated Sep. 1, 2010. |
Office Action received in European App No. 05732679.5 dated Jul. 10, 2009. |
Office Action received in Japanese App No. 2007-506328 dated Sep. 7, 2011. |
Office Action received in Japanese App No. 2007-506328 dated Jan. 17, 2011. |
Office Action received in Taiwan App No. 94110477 dated Jun. 24, 2011. |
Number | Date | Country | |
---|---|---|---|
20240104554 A1 | Mar 2024 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17491231 | Sep 2021 | US |
Child | 18462263 | US | |
Parent | 16882079 | May 2020 | US |
Child | 17491231 | US | |
Parent | 16409609 | May 2019 | US |
Child | 16882079 | US | |
Parent | 15833406 | Dec 2017 | US |
Child | 16409609 | US | |
Parent | 15377412 | Dec 2016 | US |
Child | 15833406 | US | |
Parent | 14611571 | Feb 2015 | US |
Child | 15377412 | US | |
Parent | 13934864 | Jul 2013 | US |
Child | 14611571 | US | |
Parent | 12497512 | Jul 2009 | US |
Child | 13934864 | US |