Method of using personal device with internal biometric in conducting transactions over a network

Information

  • Patent Grant
  • 8838502
  • Patent Number
    8,838,502
  • Date Filed
    Tuesday, April 10, 2012
    12 years ago
  • Date Issued
    Tuesday, September 16, 2014
    10 years ago
Abstract
A method of authorizing a commercial transaction between a customer and a provider of goods or services over a network, wherein the provider of goods or services requests that the customer provide authentication by activating a fingerprint identification device, and the provider of goods or services receives at least an authentication code of the customer over the network from the fingerprint identification device, the method comprising the steps of: providing the customer with the fingerprint identification device which produces the authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device; receiving at least the authentication code from the provider of goods or services over the network; and authorizing the transaction if at least the authentication code is valid.
Description
BACKGROUND OF THE INVENTION

The present invention relates to a method and system for authorizing a transaction between two parties over a network and, more particularly, to authorizing a transaction over the network when an authorization code has been received by an authorizing entity, the authorization code being produced by a fingerprint identification device in response to comparing a fingerprint of one of the parties to a stored fingerprint in the device.


As the use of networks, for example the Internet, become more prevalent, an ever expanding quantum of electronic commerce will be conducted between users over these networks. Typically, a consumer of goods and/or services electronically connects to a provider of goods and/or services over a network, for example, by way of a website. Using known website browser software, the consumer may review and select goods or services and request that such goods or services be delivered to a specified address.


The provider of goods or services, of course, expects to be paid for any goods or services requested by the consumer. Typically, this is accomplished by asking the consumer to enter his or her credit card number and expiration date. Sometime thereafter, and most likely after the consumer has disconnected from the provider's website, the provider telephones an authorizing entity (e.g., the originator or managing entity) of the credit card and requests authorization to complete the transaction. In particular, the provider of goods and/or services transmits the credit card number, expiration date, consumer name, and purchase amount to the authorizing entity and awaits authorization. The authorizing entity accesses the consumer's credit card account and verifies that the consumer is in good standing and that the purchase amount will not cause the consumer's credit balance to exceed his or her credit limit. If the authorizing entity's review of the consumer's credit account is favorable, then authorization is transmitted to the provider of goods and/or services to complete the transaction with the consumer.


As the provider of goods and/or services never actually sees the consumer and cannot assess the consumer in terms of whether or not the consumer is attempting to fraudulently utilize the credit card, both the provider of goods and/or services and the authorizing entity (originator of the credit card) must assume that the consumer is the authorized user of the credit card. It is only when the authorized user of a lost or stolen credit card calls the authorizing entity (or its representative) to report the lost and/or stolen card, that fraudulent uses of the credit card may be avoided.


Similar problems occur when goods and/or services are requested and confirmed by a user of the network simply by connecting with the provider's website. For example, when a provider of goods and/or services requires an initial registration with a particular consumer that authorizes billing the consumer for use of the website, accidental (or fraudulent) use of the website is likely by non-authorized users. More particularly, a parent (authorized user) may contract with a provider of goods and/or services to permit the authorized consumer to utilize the website. The terms of the contract (or registration) may be that the consumer's credit card will be charged for an amount representing use of the website by the authorized consumer (e.g., obtaining information from the website or purchasing goods). Unfortunately, the only way that the provider of goods and/or services knows that a user of the website is an authorized consumer is by way of an identification number (e.g., password etc.) given by the authorized consumer or automatically transmitted by the authorized consumer's personal computer. Thus, any user of the authorized consumer's personal computer who obtains the password (if employed) may access the website and incur charges without the knowledge of the authorized consumer.


Accordingly, there is a need in the art for a new method and system for facilitating and authorizing transactions between parties over a network which provides all parties to the transaction with confidence that the initiator of the transaction is authorized to enter into the transaction.


SUMMARY OF THE INVENTION

In order to overcome the disadvantages of the prior art, the present invention provides a method of conducting a commercial transaction between a customer and a provider of goods or services over a network. The method includes the steps of: providing the customer with a fingerprint identification device which produces an authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device; maintaining an electronic site on the network over which the customer may request goods or services from the provider of goods or services; requesting that the customer provide authentication by activating the fingerprint identification device; receiving at least the authentication code and a account number of the customer at the provider of goods or services over the network from the fingerprint identification device; transmitting the authentication code and the account number from the provider of goods or services to a managing entity of the account over the network in encrypted form, and requesting authorization to complete the transaction; and completing the transaction if the managing entity of the account provides the authorization.


Preferably, the stored fingerprint is in an encrypted format and at least one of the authentication code and account number are received over the network in an encrypted form.


The method of the present invention also contemplates permitting the customer to access the account. The steps according to this aspect of the invention include: establishing an electronic connection over the network between the customer and a managing entity of the account; requesting that the user provide authentication to the managing entity of the account by activating the fingerprint identification device; receiving at least the authentication code and the account number of the customer at the managing entity of the account over the network from the fingerprint identification device; and permitting access to the account if the authentication code is valid.


The customer is permitted to at least one of (i) transfer funds from the account; and (ii) deposit funds into the account, when the managing entity of the account has permitted access thereto.


According to another aspect of the invention, the customer is permitted access to an electronic safety deposit box. The steps according to this aspect of the invention further include establishing an electronic connection over the network between the customer and a managing entity of the electronic safety deposit box; requesting that the customer provide authentication to the managing entity of the electronic safety deposit box by activating the fingerprint identification device; receiving at least the authentication code at the managing entity of the electronic safety deposit box over the network from the fingerprint identification device; and permitting access to the electronic safety deposit box if at least the authentication code is valid.


According to yet another aspect of the invention, the customer is permitted to conduct an investment transaction over the network. The steps according to this aspect of the invention include: establishing an electronic connection over the network between the customer and a settlement bank over which the investor may provide investment instructions; requesting that the customer provide authentication to the settlement bank by activating the fingerprint identification device; receiving at least the authentication code at the settlement bank over the network from the fingerprint identification device; receiving investment instructions at the settlement bank over the network from the customer; and transmitting the investment instructions to a third party if at least the authentication code is valid.


Other objects, features, and advantages will become apparent to those skilled in the art in light of the description herein taken in conjunction with the accompanying drawing.





BRIEF DESCRIPTION OF THE DRAWINGS

For the purposes of illustrating the invention, there are shown in the drawings forms which are presented preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown.



FIG. 1 is a block diagram illustrating a preferred system for carrying out the invention.



FIG. 2 is a schematic diagram of a fingerprint identification device which is connectable to a computer in accordance with the present invention.



FIG. 3 is a flow diagram illustrating process steps for authorizing a transaction between a consumer and a provider of goods and/or services over a network in accordance with one aspect of the invention.



FIG. 4 is a flow diagram illustrating a settlement sequence following the transaction process of FIG. 3.



FIG. 5 is a flow diagram illustrating process steps for facilitating an investment transaction over a network in accordance with another aspect of the present invention.



FIG. 6 is a flow diagram illustrating process steps for facilitating access to an electronic account, such as an electronic safety deposit box, in accordance with another aspect of the present invention.





DETAILED DESCRIPTION OF THE INVENTION

Reference is now made to FIG. 1 which illustrates a block diagram of a system suitable for carrying out the present invention. The system preferably includes a bank 10, such as a payor bank, settlement bank, originating bank, etc. The payor bank 10 preferably includes a processing unit 22 (such as a central computer, distributed computer, networked computer, etc.) in communication with one or more interface units 20 (for example, network interfaces, wireless interfaces, network servers, etc.). The processing unit 22 is also in communication with a plurality of back office and/or electronic functional units, including, for example, one or more electronic safety deposit boxes 24, bank accounts 26, settlement credit/debit accounts 28, lease accounts 30, and finance accounts 32. Each of the functional units preferably includes one or more databases containing information concerning the accounts thereof and the customers utilizing them.


Preferably, the payor bank 10 issues a plurality of fingerprint identification devices 50 to a plurality of customers 52. The fingerprint identification devices 50 may take any of a number of forms, e.g., a card, a smart card, a cellular phone, and a universal serial bus stick. It is preferred that each fingerprint identification device 50 is associated with one or more of the functional accounts of the payor bank 10. For example, the payor bank 10 may issue a fingerprint identification device 50 to a customer 52 which is associated with a bank account 26. That customer 52 may be issued another fingerprint identification device 50 associated with an electronic safety deposit box 24. It is understood, however, that the payor bank 10 may issue a single fingerprint identification device 50 which is associated with both the bank account 26 and electronic safety deposit box 24 (and any other functional account) without departing from the scope of the invention.


With reference to FIG. 2, the fingerprint identification device 50 is preferably in the form of a card or thin box which contains information about the owner of the device, the payor bank, the functional account number, etc. The fingerprint identification device 50 includes a microprocessor, memory, and fingerprint sensor 51 which are interconnected and programmed in order to compare a fingerprint of the customer 52 with a stored fingerprint of that customer 52. The card issues an authorization code only when the fingerprint of the customer 52 matches the stored fingerprint. Those skilled in the art will appreciate that any of the known hardware suitable to implement the fingerprint identification device 50 may be employed, such as that disclosed in U.S. patent application Ser. No. 09/466,965, entitled AUTHENTICATION SYSTEM, FINGERPRINT IDENTIFICATION UNIT, AND AUTHENTICATION METHOD, the entire disclosure of which is hereby incorporated by reference.


It is most preferred that the stored fingerprint and other information regarding the customer 52 are in encrypted form (e.g., using known PKI technology) and that this encrypted information remain encrypted when transmitted from the device 50 to any other device. It is preferred that the fingerprint identification device 50 is connectable to a computer 54 (such as a PC) through an interface 56. The fingerprint identification device 50 may include a connector 57 which is matable with a corresponding connector 58 on the interface 56. The interface 56 preferably receives information from the fingerprint identification device 50 through the connectors 57, 58 and transfers at least some of this information to the PC 54 by way of the universal serial bus (USB) interface.


Alternatively, the device 50 may include an integral interface for connecting to the computer 54 by way of the universal serial bus (USB). Thus, the information on the fingerprint identification device 50 may be transmitted over a network (e.g., the Internet) from the computer 54, preferably in encrypted form (e.g., using API data transfer, PKS 11).


Most preferably, the fingerprint identification device 50 is a small, stand alone unit (e.g., measuring about 8.5 cm×5.4 cm×0.9 cm and weighting about 35 grams). It is most preferred that the fingerprint sensor 51 include a matrix of pixels formed in a semiconductor chip, a 128×192 matrix of pixels being preferred. Any of the known fingerprint matching algorithms may be employed, such as pattern matching. See, for example, U.S. Pat. No. 4,582,985, entitled DATA CARRIER, the entire disclosure of which is hereby incorporated by reference.


In an alternative embodiment, the fingerprint identification device may be integral with the interface 56 or the interface 56 may contain separate fingerprint identification circuitry (including sensor 51) such that the device 50 is not required to execute fingerprint recognition and matching. In another alternative embodiment of the invention, the computer 54 may contain fingerprint identification circuitry (including sensor 51) integrally disposed therein such that neither the device 50 nor the interface 56 is required to execute fingerprint recognition and matching.


Referring to FIG. 1, any of the customers 52 may conduct transactions with one or more providers of goods and/or services, such as on-line brokerages 60, on-line goods providers 62, on-line services service providers 64, on-line investment account providers 66, providers of large capital purchases 68, brick and mortar merchants 70 or brick and mortar service providers 72.


Reference is now made to FIG. 3 which is a flow diagram illustrating process steps which are preferably carried out in accordance with the invention. In particular, the process steps illustrated in FIG. 3 relate to a commercial transaction conducted over a network (such as the Internet) between a customer 52 and an on-line provider of goods and/or services, such as the on-line brokerage 60, the on-line goods provider 62, or the on-line services provider 64.


At action 100, the customer 52 connects to the on-line provider of goods and/or services 60, 62 or 64 by way of the network in a manner well known to those skilled in the art. For example, the customer 52 may utilize a personal computer (PC) 54 (FIG. 2) to execute a browser program operable to electronically connect to a website of the provider of goods and/or services. Using the browser program, the customer 52 may view the goods and/or services available from the provider 60, 62 or 64 and select particular goods or services for one or more transactions (action 102).


At action 104, the provider of goods and/or services prompts the customer 52 to authenticate himself or herself as being authorized to use a particular mode for making remittance, for example, debiting a demand deposit account (DDA), debiting a credit card account, etc. In particular, the provider of goods and/or services prompts the customer 52 to authenticate himself by activating the fingerprint identification device 50.


At action 106, the customer 52 activates the fingerprint identification device 50 in a manner consistent with known techniques such that the fingerprint identification device compares the customer's fingerprint with a stored fingerprint (action 108) and produces an authorization code indicating that a match exists between the customer's fingerprint and the stored fingerprint. At action 110, the customer 52 inserts the fingerprint identification device 50 into an interface device 56 (FIG. 2). The customer 52 may alternatively authenticate himself by activating fingerprint identification circuitry in the interface 56 or in the computer 54. Whichever technique is employed, the customer 52 preferably uses the personal computer 54 to access the Internet. Data transfer is then conducted between the fingerprint identification device 50 (or other fingerprint identification circuitry if employed) and the provider of goods and/or services 60, 62 or 64 (action 112). The data transfer preferably includes at least one of the authentication code, payor bank identification number, customer account number, and delivery address. Most preferably, the data of this transfer are in encrypted form.


At action 114, if the customer 52 fails to transfer the authentication code to the provider of goods and/or services 60, 62 or 64, then it is preferred that the provider of goods and/or services rejects the transaction and again requests that the customer authenticate himself (action 104). When at least the authentication code is received by the provider of goods and/or services 60, 62 or 64, then the processing of the transaction is permitted to continue.


At action 116, the provider of good and/or services 60, 62 or 64 preferably transfers data to the payor bank 10, which data preferably includes at least one of the authentication code, payor bank identification number, customer account number, and purchase amount. It is most preferred that at least the authentication code be provided to the payor bank 10. The payor bank 10 then analyzes at least one of the payor bank identification number (action 118), the customer account number (action 120), the purchase amount (action 122) and the authorization code (124) to determine whether one or all of the data are valid. Most preferably, the payor bank 10 analyzes the authentication code (action 124) to verify its validity prior to authorizing the transaction. As illustrated, the queries at actions 118, 120, 122, and 124 are linked serially through the affirmative (“Y”) branch of each. It is noted, however, that the queries of actions 118, 120, 122, and 124 may be linked in parallel without departing from the scope of the invention. It is intended that an affirmative determination at one or more of the queries of actions 118, 120, 122 and 124 tends to advance the process flow toward action 128. If, however, any one or more of the data are not valid and the queries at one or more of actions 118, 120, 122 and 124 are negative (“N”), then the payor bank 10 preferably establishes a negative authorization condition (action 126).


At action 128, the payor bank 10 preferably transmits the authorization condition to the provider of goods and/or services and the provider of goods and/or services determines whether the authorization condition is positive or negative (action 130). When the authorization condition is negative, the provider of goods and/or services refuses to complete the transaction (action 132). Conversely, when the authorization condition is positive, the provider of goods and/or services completes the transaction (action 134).


Those skilled in the art will appreciate that commercial transactions conducted at the point of sale, for example, at brick and mortar stores, 70, 72, may be carried out in accordance with the invention using the steps illustrated in FIG. 3 with the exception of those concerning the transmission of data from the customer 52 to the provider 60, 62 or 64 over the network. Instead, the data (e.g., at least one of the authentication code, payor bank identification number, customer account number, delivery address, etc.) would be provided to, for example, the merchant 70 and/or service provider 72 at the point of sale (action 112).


With reference to FIG. 4, once the commercial transaction has been completed (FIG. 3), the transaction is settled (action 150). Initially, a determination is made as to whether the provider of goods and/or services 70, 72 utilizes the payor bank 10 in settling its transactions (action 152). If it does, a transaction receipt is transmitted from the provider of goods and/or services 70, 72 to the payor bank 10. If not, then the provider of goods and/or services 70, 72 may settle the transaction through its own bank (e.g., a merchant bank 74) by transmitting the transaction receipt to that bank (action 156). The provider's bank would then transmit the transaction receipt to the payor bank 10 (action 154).


At action 158, the payor bank 10 debits the customer's account and at action 160, a determination is again made as to whether the provider of goods and/or services 70, 72 utilizes the same payor bank 10 as the customer 52. If it does, the payor bank 10 directly credits the bank account of the provider of goods and/or services (action 162). If not, the payor bank 10 transmits a credit to the bank of the provider of goods and/or services (action 164) and that bank credits the provider's bank account (action 166).


Reference is now made to FIG. 5 which is a flow diagram illustrating process steps in accordance with another aspect of the present invention. In particular, the process steps represent actions to be taken to facilitate an investment transaction between a customer 52 and an on-line investment service provider 66 (FIG. 1). In accordance with the invention, the on-line investment provider 66 may be an investment bank, a brokerage, etc., and may be located domestically or off-shore. Preferably, the investment transaction is conducted through the settlement bank 10 (the term settlement being used to indicate that the customer's bank account within the settlement bank 10 may be debited or credited depending on the investment transaction).


At action 200, the customer 52 preferably accesses the settlement bank 10 via a network, such as the Internet, using any of the known techniques. After the customer 52 has indicated that he or she is interested in conducting an investment transaction, the settlement bank 10 prompts the customer 52 to authenticate himself or herself (action 202). In response, the customer 52 preferably activates the fingerprint identification device 50 (action 204) which causes the device to compare the customer's fingerprint with a stored fingerprint (action 206) and produce an authentication code if a match is obtained.


At action 208, the customer preferably inserts the fingerprint identification device 50 into an interface 56 (FIG. 2) suitable for transmitting data between the fingerprint identification device 50 and the settlement bank 10, for example, via the universal serial bus of the computer 54. Alternatively, the customer 52 may authenticate himself or herself by activating fingerprint identification circuitry in the interface 56 or in the computer 54. Whichever technique is employed, the customer 52 preferably uses the computer 54 to access the Internet. At action 210, data is preferably transmitted from the fingerprint identification device 50 (or other fingerprint identification circuit if employed) to the settlement bank 10, the data including at least one of the authentication code and the customer investment account number (in encrypted form).


At action 212, if the settlement bank 10 receives the authentication code (and, if required, the investment account number), then the investment transaction is permitted to continue. If not, then the process flows back to action 202 where the customer 52 is again prompted to authenticate himself or herself.


At action 214, the customer 52 preferably provides investment instructions to the settlement bank 10 over the network, such as “buy 100 shares of xyz corporation” and, at action 216, the settlement bank 10 transmits the instructions to the on-line investment provider 66 (e.g., an investment bank). It is noted that the investment instructions may be transmitted to the on-line investment provider 66 in a way which maintains the customer's anonymity. Indeed, the customer's name, account number, etc., need not be transmitted to the investment provider 66. The customer 52, however, may instruct the settlement bank 10 as to whether or not he or she wishes to maintain such anonymity.


At action 218, the on-line investment provider 66 executes the investment instructions and does not require authorization because, by previous agreement, the receipt of investment instructions from the settlement bank 10 itself is authorization enough. At action 220, a transaction receipt is transmitted to the settlement bank 10 indicating whether remittance is required or payment is being made. At action 224, the settlement bank 10 credits or debits the customer's investment account in accordance with the transaction receipt and, at action 226, the settlement bank 10 debits and/or credits the on-line investment provider's 66 account.


Reference is now made to FIG. 6 which is a flow diagram illustrating process steps in accordance with yet another aspect of the present invention. In particular, the process steps represent actions to be taken to facilitate access an electronic account within the payor bank 10. Preferably, the electronic bank account is an electronic safety deposit box 24, it being understood that any of the functional accounts (e.g., bank deposit account 26, credit/debit account 28, lease account 30, finance account 32, etc.) may be accessed in a similar way. At action 300, the customer 52 preferably accesses the payor bank 10 via the network using any of the known techniques. After the customer 52 has indicated that he or she is interested in accessing an electronic account (such as an electronic safety deposit box 24), the payor bank 10 then prompts the customer 52 to authenticate himself or herself (action 302). In response, the customer 52 preferably activates the fingerprint identification device 50 (action 304) which causes the device to compare the customer's fingerprint with a stored fingerprint (action 306) and produce an authentication code if a match is obtained.


At action 308, the customer preferably inserts the fingerprint identification device 50 into an interface 56 (FIG. 2) suitable for transmitting data between the fingerprint identification device 50 and the payor bank 10, for example, via the universal serial bus of the computer 54. Alternatively, the customer 52 may authenticate himself or herself by activating fingerprint identification circuitry in the interface 56 or in the computer 54. Whichever technique is employed, the customer 52 preferably uses the computer 54 to access the Internet. At action 310, data is preferably transmitted from the fingerprint identification device 50 (or other fingerprint identification device if employed) to the payor bank 10 (in encrypted form), the data including at least one of the authentication code and the number of the electronic account.


At action 312, if the payor bank 10 receives the authentication code (and, if required, the account number), then the access process continues. If not, the process flows back to action 302 where the customer 52 is again prompted to authenticate himself or herself. At action 314, the customer 52 may again request access to the electronic account, e.g., the electronic safety deposit box 24, and, at action 316, the payor bank 10 grants the customer's request and permits the customer 52 to manipulate, receive, and/or transmit electronic file(s) to the account. Those skilled in the art will appreciate that the files contained in an electronic safety deposit box 24 may include will(s), codicil(s), title to securities or other property, contract(s), certificate(s), insurance policies, etc. These files are represented by the “database” shown in the electronic safety deposit box 24 shown in FIG. 1.


Advantageously, the method and system of the present invention readily provides for authorizing transactions over a network in which all parties to the transaction maintain confidence that the initiator (e.g., the customer) of the transaction is authorized to enter into the transaction. The transactions are not limited to commercial transactions for goods/services, but may include investment transactions, and access to electronic bank accounts, such as electronic safety deposit boxes 24, bank deposit accounts 26, settlement credit/debit accounts 28, etc.


Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims.

Claims
  • 1. A method comprising: storing an encrypted fingerprint in a fingerprint authentication device for authenticating a user's fingerprint, the fingerprint authentication device comprising a memory for the stored encrypted fingerprint and a processor for comparing the stored fingerprint with a scanned fingerprint, the stored encrypted fingerprint remaining in the fingerprint authentication device in order to perform subsequent authentications in the fingerprint authentication device;performing a comparison of the stored fingerprint and a scanned fingerprint in the fingerprint authentication device;generating authentication information using the fingerprint authentication device when the user's fingerprint matches the fingerprint stored in the fingerprint authentication device;transmitting the authentication information to a managing entity;authenticating a user of the fingerprint authentication device based upon at least the authentication information;transmitting an authentication to at least one provider of goods or services; and in response to the authentication being valid, accessing the at least one provider of goods or services.
  • 2. The method of claim 1 wherein the authentication information includes an authentication code.
  • 3. The method of claim 2 wherein the authentication code is encrypted.
  • 4. The method of claim 1 further comprising: conducting a transaction if the authentication information is valid.
  • 5. The method of claim 1 further comprising: receiving a request for authentication from the at least one provider of goods or services.
  • 6. The method of claim 1 wherein the authentication information is encrypted.
  • 7. The method of claim 1 further comprising: initiating a connection to the at least one provider of goods or services using an interface device.
  • 8. A system comprising: a fingerprint authentication device having an encrypted fingerprint stored therein for checking a user's fingerprint and for generating authentication information if a fingerprint of a user of the fingerprint authentication device matches a fingerprint stored within the fingerprint authentication device, the fingerprint authentication device comprising a memory for the stored encrypted fingerprint and with a processor to compare the stored fingerprint with a scanned fingerprint, the stored fingerprint remaining in the fingerprint authentication device in order to perform subsequent matches in the fingerprint authentication device;a managing entity device to receive the authentication information, the managing entity device authenticates a user of the fingerprint authentication device based upon the authentication information; andat least one provider of goods or services to receive an authentication from the managing entity, wherein the user of the fingerprint authentication device accesses the at least one provider of goods or services if the authentication is valid.
  • 9. The system of claim 8 wherein the authentication information includes an authentication code.
  • 10. The system of claim 8 wherein the user of the fingerprint authentication device conducts a transaction if the authentication information is valid.
  • 11. The system of claim 8 wherein the fingerprint authentication device receives a request for authentication from the at least one provider of goods or services.
  • 12. The system of claim 8 wherein the authentication information is encrypted.
  • 13. The system of claim 8 wherein the fingerprint authentication device initiates a connection to the at least one provider of goods or services using an interface device.
CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a divisional of U.S. patent application Ser. No. 10/207,529, filed on Jul. 29, 2002, which is a continuation of U.S. patent application Ser. No. 09/510,811, filed Feb. 23, 2000, the entire disclosure of which is hereby incorporated by reference.

US Referenced Citations (166)
Number Name Date Kind
4582985 Lofberg Apr 1986 A
4766293 Boston Aug 1988 A
4805222 Young et al. Feb 1989 A
4816653 Anderl et al. Mar 1989 A
5056019 Schultz et al. Oct 1991 A
5131038 Puhl et al. Jul 1992 A
5173851 Off et al. Dec 1992 A
5221838 Gutman et al. Jun 1993 A
5256863 Ferguson et al. Oct 1993 A
5276736 Chaum Jan 1994 A
5280527 Gullman et al. Jan 1994 A
5323146 Glaschick et al. Jun 1994 A
5329589 Fraser et al. Jul 1994 A
5436972 Fischer Jul 1995 A
5457747 Drexler et al. Oct 1995 A
5461217 Claus Oct 1995 A
5475758 Kikuchi et al. Dec 1995 A
5521362 Powers May 1996 A
5521890 Miche et al. May 1996 A
5537314 Kanter Jul 1996 A
5545139 Kriesel Aug 1996 A
5550358 Tait et al. Aug 1996 A
5557518 Rosen Sep 1996 A
5557541 Schulhof et al. Sep 1996 A
5561709 Remillard Oct 1996 A
5594230 Waite et al. Jan 1997 A
5598474 Johnson Jan 1997 A
5604805 Brands Feb 1997 A
5615277 Hoffman Mar 1997 A
5623552 Lane Apr 1997 A
5650761 Gomm et al. Jul 1997 A
5661807 Guski et al. Aug 1997 A
5696827 Brands Dec 1997 A
5710887 Chelliah et al. Jan 1998 A
5712913 Chaum Jan 1998 A
5734838 Robinson et al. Mar 1998 A
5737701 Rosenthal et al. Apr 1998 A
5744787 Teicher Apr 1998 A
5748737 Daggar May 1998 A
5761308 Torii et al. Jun 1998 A
5778068 Johnson et al. Jul 1998 A
5778384 Provino et al. Jul 1998 A
5796832 Kawan Aug 1998 A
5809212 Shasha Sep 1998 A
5815665 Teper et al. Sep 1998 A
5825876 Peterson, Jr. Oct 1998 A
5838812 Pare, Jr. et al. Nov 1998 A
5841871 Pinkas et al. Nov 1998 A
5856659 Drupsteen et al. Jan 1999 A
5870723 Pare, Jr. et al. Feb 1999 A
5878138 Yacobi Mar 1999 A
5878139 Rosen Mar 1999 A
5878235 Porterfield et al. Mar 1999 A
5884271 Pitroda Mar 1999 A
5884272 Walker et al. Mar 1999 A
5887140 Itsumi et al. Mar 1999 A
5892900 Ginter et al. Apr 1999 A
5897622 Blinn et al. Apr 1999 A
5903721 Sixtus May 1999 A
5915022 Robinson et al. Jun 1999 A
5917913 Wang Jun 1999 A
5923016 Fredregill et al. Jul 1999 A
5926624 Katz et al. Jul 1999 A
5926798 Carter et al. Jul 1999 A
5936220 Hoshino et al. Aug 1999 A
5943423 Muftic Aug 1999 A
5945652 Ohki et al. Aug 1999 A
5948040 DeLorme et al. Sep 1999 A
5949411 Doerr et al. Sep 1999 A
5956699 Wong et al. Sep 1999 A
5960411 Hartman et al. Sep 1999 A
5966704 Furegati et al. Oct 1999 A
5987134 Shin et al. Nov 1999 A
5990804 Koyama Nov 1999 A
6000832 Franklin et al. Dec 1999 A
6002770 Tomko et al. Dec 1999 A
6002787 Takhar et al. Dec 1999 A
6003014 Lee et al. Dec 1999 A
6006200 Boies et al. Dec 1999 A
6009415 Shurling et al. Dec 1999 A
6012039 Hoffman et al. Jan 2000 A
6014636 Reeder Jan 2000 A
6016476 Maes et al. Jan 2000 A
6018724 Arent Jan 2000 A
6021496 Dutcher et al. Feb 2000 A
6023679 Acebo et al. Feb 2000 A
6026491 Hiles Feb 2000 A
6029150 Kravitz Feb 2000 A
6035403 Subbiah et al. Mar 2000 A
6047268 Bartoli et al. Apr 2000 A
6047269 Biffar Apr 2000 A
6073124 Krishnan et al. Jun 2000 A
6076075 Teicher et al. Jun 2000 A
6076167 Borza et al. Jun 2000 A
6078891 Riordan et al. Jun 2000 A
6085178 Bigus et al. Jul 2000 A
6088731 Kiraly et al. Jul 2000 A
6105010 Musgrave Aug 2000 A
6108644 Goldschlag et al. Aug 2000 A
6119096 Mann et al. Sep 2000 A
6122737 Bjorn et al. Sep 2000 A
6128602 Northington et al. Oct 2000 A
6129274 Suzuki Oct 2000 A
6138911 Fredregill et al. Oct 2000 A
6141754 Choy Oct 2000 A
6148241 Ludtke et al. Nov 2000 A
6151600 Dedrick Nov 2000 A
6163772 Kramer et al. Dec 2000 A
6167517 Gilchrist et al. Dec 2000 A
6174124 Smith et al. Jan 2001 B1
6182076 Yu et al. Jan 2001 B1
6226618 Downs et al. May 2001 B1
6243689 Norton Jun 2001 B1
6260021 Wong et al. Jul 2001 B1
6263446 Kausik et al. Jul 2001 B1
6269348 Pare, Jr. et al. Jul 2001 B1
6270011 Gottfried Aug 2001 B1
6279112 O'Toole, Jr. et al. Aug 2001 B1
6282653 Berstis et al. Aug 2001 B1
6289323 Gordon et al. Sep 2001 B1
6310966 Dulude et al. Oct 2001 B1
6314196 Yamaguchi et al. Nov 2001 B1
6353811 Weissman Mar 2002 B1
6356905 Gershman et al. Mar 2002 B1
6366953 Inoue Apr 2002 B2
6370629 Hastings et al. Apr 2002 B1
6434535 Kupka et al. Aug 2002 B1
6442692 Zilberman Aug 2002 B1
6453301 Niwa Sep 2002 B1
6487662 Kharon et al. Nov 2002 B1
6502748 Berg et al. Jan 2003 B2
6529885 Johnson Mar 2003 B1
6556976 Callen Apr 2003 B1
6560741 Gerety et al. May 2003 B1
6574607 Carter et al. Jun 2003 B1
6578014 Murcko, Jr. Jun 2003 B1
6592044 Wong et al. Jul 2003 B1
6615264 Stoltz et al. Sep 2003 B1
6655585 Shinn Dec 2003 B2
6662166 Pare, Jr. et al. Dec 2003 B2
6687390 Avni et al. Feb 2004 B2
6695207 Norris, Jr. Feb 2004 B1
6871287 Ellingson Mar 2005 B1
6910132 Bhattacharya Jun 2005 B1
6941462 Tsukamura et al. Sep 2005 B1
6968453 Doyle et al. Nov 2005 B2
6970836 Paltenghe et al. Nov 2005 B1
7003495 Burger et al. Feb 2006 B1
7124300 Lemke Oct 2006 B1
7181297 Pluvinage et al. Feb 2007 B1
7188110 Ludtke et al. Mar 2007 B1
7251633 Ludtke et al. Jul 2007 B2
7284266 Morris et al. Oct 2007 B1
7565541 Tarbouriech Jul 2009 B1
7613659 Hoffman et al. Nov 2009 B1
20010045458 Polansky Nov 2001 A1
20010449061 Kanevsky et al. Nov 2001
20010051996 Cooper et al. Dec 2001 A1
20020123967 Wang Sep 2002 A1
20020123971 Maritzen et al. Sep 2002 A1
20020128980 Ludtke et al. Sep 2002 A1
20020147914 Arnold Oct 2002 A1
20020191816 Maritzen et al. Dec 2002 A1
20040044627 Russell et al. Mar 2004 A1
20040177097 Yu et al. Sep 2004 A1
20040199469 Barillova et al. Oct 2004 A1
Foreign Referenced Citations (24)
Number Date Country
0917119 May 1999 EP
0949595 Oct 1999 EP
1 033 687 Sep 2000 EP
1 085 424 Mar 2001 EP
3060424 Mar 1991 JP
9722857 Feb 1997 JP
10240691 Sep 1998 JP
11501423 Feb 1999 JP
9978521 Mar 1999 JP
11096363 Apr 1999 JP
99164179 Jun 1999 JP
11345266 Dec 1999 JP
351799 Feb 1999 TW
87107650 Feb 1999 TW
9513591 May 1995 WO
9618162 Jun 1996 WO
9906928 Feb 1999 WO
9908217 Feb 1999 WO
9921321 Apr 1999 WO
0108055 Feb 2001 WO
0122351 Mar 2001 WO
0150428 Jul 2001 WO
0159732 Aug 2001 WO
2005033830 Apr 2005 WO
Non-Patent Literature Citations (35)
Entry
“Ethenticator MS 3000” product page from ethentica.com. Observed by the Internet Archive on Aug. 15, 2000 (2 pages) http://web.archive.org/web/20000815235523/www.ethentica.com/ms3000.pdf.
“Expansion Packs” product page from compaq.com Observed by the Internet Archive on Aug. 15, 2000 (2 pages) http://web.archive.org/web/20000815202017/www.compaq.com/products/handhelds/pocketpc/jackets.html.
“Microsoft Introduces DirectX for Windows CE” Published Feb. 29, 2000 (2 pages) http://www.microsoft.com/presspass/press/2000/feb00/dxpackpr.mspx.
“Multimedia Streaming on Microsoft Windows CE 3.0” © 2000 Microsoft Corporation (Jun. 2000 (8 pages) http://msdn.microsoft.com/en-us/library/ms834433.aspx.
“Musicbank and Sony Music Entertainment Ink Licensing Agreement”. @Oct. 30, 2000 Musicbank.com Archived at http:/Mebarchive.orgtweb/20001210002400/www.musicbank.com/pr6.html.
“My.MP3.com—Help” Publication date of Nov. 9, 2000 as verified by the Internet Archive (2 pages) http://web.archive.org/web/200011090135/http://help.mp3.com/help/mymp3/tutorial/page2.html.
“Pocket PC User's Guide” © 2000 Casio Computer Co., LTD. (67 pages) http://ftp.casio.co.jp/pub/world—manual/ce/en/e115/e115ug.pdf.
Beam-itTM: Adding music from your CD collection to My.MP3.com is easy Publication date of Mar. 1, 2000 as verified by the Internet Archive (2 pages) http://web.archive.org/web/20000301100556/http://www.mp3.com/my/beamit/index.html.
Borland, John. “Sprint POS unveils wireless MP3 ambitions” @Oct. 31, 2000 CNET Networks Inc. http://news.com.com/2102-1033—3-247916html?tag=st.util.print.
Co-pending U.S. Appl. No. 09/466,965, Authentication System, Fingerprint Identification Unit, and Authentication Method, filed Dec. 20, 1999.
Crawford, Sharon, “Windows 2000 Pro: The Missing Manual” © 2000 O'Reilly Media Inc. Excerpts from Chapters 9 & 13 (32 pages total).
Delio, Michelle. “PC Expo: It's All About the Hand”. Published Jun. 27, 2000 by wired.com (2 pages) http://www.wired.com/print/science/discoveries/news/2000/06/37266.
Drury; Demand Jumps for High-Tech ID Producer; Business First; Oct. 22, 2001; vol. 18, No. 3, p. 1.
Hacker, Scot. “MP3: The Definitive Guide” © 2000 O'Reilly Media Inc. Excerpt from Chapter 8 (pp. 271-277).
Hacker, Scot. “MP3: The Definitive Guide” © 2000 O'Reilly Media Inc. Excerpt from Chapter 6, pp. 201 and 220-224 (7 pages total).
Harmon, Amy. “Deal Settles Suit Against MP3.com” @Nov. 15, 2000 New York Times Company. http:/www nytimes.corril2000/11/15/technology/i 5MUSI. html?ex=i 1 27275200&en843336327cff1333&ei=5070&printpage=yes.
Heltzel, Paul. “Access your CDs anywhere” @Oct. 18, 1999 CNN,com http://www.cnn.com/TECH/computing/9910/18/cds.anywhere.idg.
John Borland, The Latest in Anti-piracy Efforts: Keystroke Recognition, http://news.cnet.com/news/0-1005-202-2066437.html, pp. 1-2 (dated Jun. 13, 2000).
Kevin Featherly, Can Typing Style ‘ID’ Thwart Online Music Piracy?, http://www.ecommercetimes.com/news/articles2000/000613-nb1.shtml, pp. 1-5 (dated Jun. 13, 2000).
King, Brad. “MP3.com Lets Streams Flow”. © 2000 Wired News/Lycos Inc. http:f/wired-vig.wired, com/newsfprint/O, 1294,40536,00.html.
King, Brad. “Under the Influence: Majors control Licensing, therefore control music streaming services” © 2001 Variety.com http://www.variety.com/article/VR1 1 17792024?categoryid=16&cs=1&s=h&p=0.
McKendrick, Joseph, Creating a Password for Life from the Tip of a Finger, Nov. 3, 1999, ent, v4, n19, p. 22.
Music to be Protected by BioPassword, http://hitsquad.com/smm/news/275/, pp. 1-3 (dated Jun. 15, 2000)?.
MyPlay.com: “Play your music” Published May 11, 2000 as verified by the Internet Archive. http://web.archive.org/web/20000511000039/www.myplay.com/corp/tour—play. html.
Myplay.com: “The Free myplay DropBox”. Published Feb. 8, 2001 as verified by the Internet ArChive. http://web.archive.org/web/200102081> 00057www.myplay.com/mp/1ocker/client.jsp.
Net Nanny Licenses Biopassword® to Musicrypt.com, Provides Biometric Security for Digital Music Transactions, http://www.netnanny.com/press/press—20000612.htm, pp. 1-3 (dated Jun. 12, 2000).
Office Action from corresponding Japanese Application No. 2001-562427 dated Dec. 13, 2010.
Office Action from corresponding Japanese Application No. 2001-562427 dated Jun. 14, 2010.
Pack: “Traditional Retailers Plan Interactive Stores”, Orlando Sentinel, May 25, 1995.
Sommefeldt, Ryszard. “Compaq iPAQ H3630 PocketPC Review”. Published Jan. 23, 2001 by hexus.net (7 pages) http://www.hexus.net/content/item—print.php?item=130.
Stephanie Izarek, Let's See Some ID, http://www.foxnews.com/vtech/122199/biometrics.sml, pp. 1-4 (dated Dec. 21, 1999).
U.S. Appl. No. 09/483,584, filed Dec. 11, 2000, entitled “Secure Electronic Commerce System”.
U.S. Appl. No. 10/014,112, filed Dec. 11, 2001, entitled “System and Method for Conducting Secure Transactions Over a Network”.
U.S. Appl. No. 10/014,960, filed Dec. 11, 2001, entitled “Method and System for Executing Deferred Transactions”.
U.S. Appl. No. 10/015,070, filed Dec. 11, 2001, entitled “Method and System of Conducting Network-Based Transactions”.
Related Publications (1)
Number Date Country
20120197808 A1 Aug 2012 US
Divisions (1)
Number Date Country
Parent 10207529 Jul 2002 US
Child 13443303 US
Continuations (1)
Number Date Country
Parent 09510811 Feb 2000 US
Child 10207529 US