Claims
- 1. A device for accessing information comprising an authenticator for verifying that a user of the device is the authorized user, the authenticator comprising:
a memory in which a verification user signal is stored; a locator for generating a location signal indicative of the proximate location of the user at the time of authentication; and a processor, coupled to the memory and locator, for generating a passcode including the location signal.
- 2. The device of claim 1, wherein the processor comprises:
a reader for reading a signal entered by the user; and a code generator for generating a unique code when the signal is equivalent to the stored verification user signal, wherein the code and the location signal are encrypted to generate the passcode.
- 3. The device of claim 2, further comprising a display area for displaying the passcode.
- 4. The device of claim 3, wherein the unique code is generated in accordance with a user specific algorithm.
- 5. The device of claim 2, wherein the locator comprises a geo-locator for receiving location information over a Global Positioning System.
- 6. The device of claim 2, wherein the locator comprises a geo-locator for receiving location information over a cellular network.
- 7. The device of claim 3, further comprising a sensor for sensing the fingerprint of said user, wherein said user signal is a fingerprint signal.
- 8. The device of claim 7, wherein said device is a card.
- 9. The device of claim 7, wherein said device is a keyfob.
- 10. The device of claim 7, wherein said device is a watch.
- 11. A method for authorizing use of the device of claim 1, comprising the steps of:
reading a signal entered by the user; comparing the read signal to a stored verification user signal; if the read signal is equivalent to the verification user signal,
retrieving location information relating to the proximate location of the user at the time of authentication; and generating a passcode including the location information; forwarding to an issuer, at an issuer network, the passcode; and authorizing the use of the device in response to the received passcode.
- 12. The method of claim 11, further comprising:
generating a pseudo-random code for combining with said location information; and encrypting the combined location information and the pseudo-random code, thereby generating said passcode.
- 13. The method of claim 12, wherein said authorizing step comprises:
retrieving user specific customer information; decrypting the received passcode; verifying that the pseudo-random code generated by said device is equivalent to a pseudo-random code generated by said issuer; and verifying that the location information from the user is within a location range set by the issuer.
- 14. The method of claim 13, wherein the issuer network comprises:
a customer database having customer information for a plurality of users; an issuer code processor, responsive to said customer database, for decrypting said passcode from said user and determining whether said user is allowed access to said information; and a response generator for generating an authorization signal in response to said code processor and said database.
- 15. A method for authorizing use of a device, said method comprising the steps of:
reading a signal entered by the user; comparing the read signal to a stored verification user signal; if the read signal is equivalent to the verification user signal,
retrieving location information relating to the proximate location of the user at the time of authentication; and generating a passcode including the location information; forwarding to an issuer, at and issuer network, the passcode; and authorizing the use of the device in response to the received passcode.
- 16. The method of claim 15, further comprising:
generating a pseudo-random code for combining with said location information; and encrypting the combined location information and the pseudo-random code, thereby generating said passcode.
- 17. The method of claim 16, wherein said authorizing step comprises:
retrieving user specific customer information; decrypting said received passcode; verifying that the pseudo-random code generated by said device is equivalent to a pseudo-random code generated by said issuer; and verifying that the location information from the user is within a location range set by the issuer.
- 18. The method of claim 17, wherein the issuer network comprises:
a customer database having customer information for a plurality of users; an issuer code processor, responsive to said customer database, for decrypting said passcode from said user and determining whether said user is allowed access to said information; and a response generator for generating an authorization signal in response to said code processor and said database.
- 18. A system for authorizing use of a device to access information, said system comprising:
the device comprising an authenticator for verifying that the user of the device is an authorized user, the authenticator comprising:
a memory for storing a verification user signal; a locator for generating a location signal indicative of the proximate location of a user at the time of authentication; and a processor, coupled to the memory and locator, for generating a passcode including the location signal, said passcode forwarded to an issuer network for authorizing access; and the issuer network comprising:
a customer database having customer information for a plurality of users; an issuer code processor, responsive to said customer database, for decrypting said passcode from said user and determining whether said user is allowed access; and a response generator for generating an authorization signal in response to said code processor and said database.
REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority to U.S. Provisional Application No. 60/474,030, filed May 29, 2003, which disclosure is incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60474030 |
May 2003 |
US |