Claims
- 1. A method comprising the steps of:
authenticating identification data from a first object; after successfully performing said authenticating step of the first object, authenticating identification data from a second object; and after successfully performing said authenticating of the second object, permitting the first object to interact with the second object.
- 2. The method of claim 1, wherein said interacting step comprises allowing a first object that is a guardian to obtain custody of the second object that is a child at a school or day care.
- 3. The method of claim 1, wherein said interacting step comprises allowing the first object that is a law enforcement official to obtain information from the second object that is a member of the public.
- 4. The method of claim 1, wherein said interacting step comprises allowing the first object that is a requestor to gain control of as aspect of the second object that is a requestee.
- 5. The method of claim 1, wherein said interacting step comprises performing a financial transaction between the first object that is a consumer and a second object that is a provider.
- 6. The method of claim 1, wherein said interacting step comprises performing a product transaction between the first object that is a consumer and the second object that is a provider.
- 7. The method of claim 1, wherein said interacting step comprises performing a service transaction between a first object that is a consumer and the second object that is a provider.
- 8. The method of claim 1, wherein the identification data from the first and second objects is biometric data and a universally unique identifier (UUID).
- 9. The method of claim 8, wherein the biometric data is a print.
- 10. The method of claim 1, further comprising the steps of transmitting the identification data of the first and second objects to a remote location to perform said authenticating steps.
- 11. The method of claim 10, wherein said transmitting is done via a wireless network.
- 12. The method of claim 1, further comprising the step of storing information about said interacting step.
- 13. The method of claim 12, further comprising the step of generating results based on the stored information.
- 14. The method of claim 13, wherein said generating results comprises the step of generating statistical results.
- 15. The method of claim 14, further comprising the step of determining if the first object that is a law enforcement official is using racial profiling to perform said interacting step with the second object that is a member of the public.
- 16. The method of claim 1, further comprising the step of capturing the identification data of the first object with a wireless transceiver biometric device to send the identification data to a device that performs said authenticating step.
- 17. The method of claim 1, further comprising the step of capturing the identification data of the second object with a wireless transceiver biometric device to send the identification data to a device that performs said authenticating step.
- 18. The method of claim 1, further comprising the step of capturing the identification data of the first object and the second object with at least one wireless transceiver biometric device to send the identification data to a device that performs said authenticating steps.
RELATED APPLICATIONS
[0001] This application claims priority under 35 U.S.C. § 119(e) to U.S. Provisional Application Ser. No. 60/330,794, filed Oct. 31, 2001, which is incorporated herein by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60330794 |
Oct 2001 |
US |