The present application is related to concurrently filed U.S. patent application Ser. No. 14/596,508, filed Jan. 14, 2015 entitled “System and Method for Requesting Reconciliation of Electronic Transactions for Enhanced Security”; U.S. patent application Ser. No. 14/596,472, filed Jan. 14, 2015 entitled “System and Method for Comparing Electronic Transaction Records for Enhanced Security”; and U.S. patent application Ser. No. 14/596,420, filed Jan. 14, 2015 entitled “System and Method for Reconciling Electronic Transaction Records for Enhanced Security,” which are all incorporated herein by reference in their entirety.
The present disclosure relates generally to smart cards, and more particularly, some embodiments relate to smart card systems comprising a card and a carrier.
Electronic transactions, such as credit card transactions, can be conducted using smart cards. A smart card is a card with embedded integrated circuits that include a processor and a memory. Smart cards can provide identification, authentication, data storage, and application processing, as well as serving as credit or ATM debit cards, phone or fuel cards, and high-security access-control cards for granting access to a building or computer. Smart cards can authenticate the identity of a user by employing a public key infrastructure (PKI). This authentication process may be conducted in a variety of ways, including through the use of a pin, password, or biometric authentication, or a combination of methods for added layers of security.
Smart card readers come in many different form factors and operate in many different ways. Some readers require insertion of the entire card into the reader. Others may allow a portion of the card to remain accessible by the user. These differences between smart card readers make it difficult to include additional layers of security, such as biometric authentication, because such features may be physically incompatible with the operation of the smart card reader.
Contactless transactions allow for the completion of transactions using smart cards wirelessly using near field communications (NFC) and RFID technologies. These contactless smart cards are built with compatible antennas inside the card. However, adding contactless capability increases the complexity of the smart card design and manufacture. In addition, such transactions may only be conducted using smart card readers designed for such transactions. Moreover, to provide a smart card with the capability to communicate over different wireless standards, such as Wi-Fi or Bluetooth, would require a more complex and powerful transceiver within the card. This adds to the complexity of the card design through the need to include a greater number of computing components within the form factor of the card, including an on-board power source.
According to various embodiments of the disclosed technology, a smart card carrier is provided comprising a housing having an opening configured to accept a smart card; a smart card interface configured to be coupled to the smart card when the smart card is accepted into the opening and configured to provide a data communication link with one or more processors in the smart card; a wireless transceiver configured to engage in wireless data communication with a transaction terminal when the smart card interface is coupled to the smart card; and a power source configured to supply power to the wireless transceiver and the smart card interface.
According to various embodiments of the disclosed technology, a method for facilitating wireless transactions with a smart card through a smart card carrier is provided, comprising receiving from a transaction terminal a request related to a transaction involving the smart card; engaging in data communication related to the request with one or more processors in the smart card through a smart card interface coupled to an interface on the smart card; and transmitting a response to the request to the transaction terminal through the wireless transceiver.
Other features and aspects of the disclosed technology will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, which illustrate, by way of example, the features in accordance with embodiments of the disclosed technology. The summary is not intended to limit the scope of any inventions described herein, which are defined solely by the claims attached hereto.
The technology disclosed herein, in accordance with one or more various embodiments, is described in detail with reference to the following figures. The drawings are provided for purposes of illustration only and merely depict typical or example embodiments of the disclosed technology. These drawings are provided to facilitate the reader's understanding of the disclosed technology and shall not be considered limiting of the breadth, scope, or applicability thereof. It should be noted that for clarity and ease of illustration these drawings are not necessarily made to scale.
The figures are not intended to be exhaustive or to limit the invention to the precise form disclosed. It should be understood that the invention can be practiced with modification and alteration, and that the disclosed technology be limited only by the claims and the equivalents thereof.
Embodiments of the technology disclosed herein are directed toward a system for and method of conducting wireless transactions using a smart card. More particularly, the various embodiments of the technology disclosed herein relate to providing wireless transaction capability to a contact smart card.
Before describing the technology disclosed in detail, it is useful to describe example smart cards with which the technology can be implemented. Smart cards come in a variety of types, examples of which are shown and described in
In various embodiments, card 110 may comprise a terminal interface 114. Terminal interface 114 is communicatively coupled to processing module 112. Terminal interface 114 may be configured for use when card 110 is being used by itself (i.e., without the carrier 140), for example, when card 110 is engaged directly in a sales transaction via a point-of-sale (POS) terminal at a retail store or a kiosk or an access control transaction at a computer or building. In various embodiments, terminal interface 114 may include one or more conductive pads or pins that make electrical contact with corresponding conductive pads or pins provided in the terminal or smart card reader. Data communication between card 110 and the terminal occurs through terminal interface 114. In various embodiments, when card 110 is engaged with the terminal or smart card reader for a transaction, some of the conductive pads of terminal interface 114 provide paths by which electrical power flows from the terminal to processing module 112 and memory 113 via power line 119. This eliminates the need for card 110 to have its own on-board power source, simplifying design and manufacture.
In various embodiments, card 110 may also include a carrier interface 116. Carrier interface 116 is communicatively coupled to processing module 112. Carrier interface 116 may be configured for use with carrier 140. In various embodiments, carrier interface 116 may include one or more conductive pads or pins that make electrical contact with a corresponding card interface 144 in smart card carrier 140. In various embodiments, when card 110 is engaged with smart card carrier 140, some of the conductive pads or pins of carrier interface 116 provide paths by which electrical power flows from power source 146 of carrier 140 to processing module 112 and memory 113 via power line 119, similar to the power management described above between card 110 and a terminal while conducting a transaction.
Although shown in
In various embodiments, carrier 140 comprises a housing, a wireless transceiver module 142, a card interface 144, a power source 146, and an user interface 148. In various embodiments, the housing of carrier may 140 may be constructed of one of more of plastic, metal, ceramic, glass, or other form-sustaining material. In various embodiments, the housing may comprise multiple panels made of one or more form-sustaining materials, or the housing may be constructed through injection molding techniques. In various embodiments, the housing of carrier 140 may comprise multiple layers.
In various embodiments, the components may be affixed to the housing in various ways. In some embodiments, the components may be affixed to the housing by physical fasteners, such as screws or rivets. In various embodiments, the components may be affixed to the housing through crimping, welding, soldering, taping, gluing or cementing. In various embodiments, the housing may include brackets and the components may be designed to be held in place by the brackets. In some embodiments, a printed circuit board (PCB) including at least some of the components may be affixed to the housing. In various embodiments, a combination of different affixation techniques may be employed.
In various embodiments, the components of carrier 140 are powered by power source 146 via power line 149. In various embodiments, power source 149 may be a removable battery, a rechargeable battery, a solar cell, an inductive loop, or other power storage and/or generating components. In various embodiments, the battery may be both a removable battery and a rechargeable battery, and the battery may be recharged by removing the battery from the carrier and using an external charging station to recharge. In various embodiments, recharging of a rechargeable battery may be accomplished through an input on carrier 140, such as a micro USB port, or through induction technologies. In various embodiments, carrier 140 may include an input for receiving power from an external source, such as from an external power supply.
In various embodiments, wireless transceiver module 142 may be configured to transmit and receive communications over several different wireless communications standards and/or technologies. Such standards/technologies may include Wi-Fi, Bluetooth, near field communications (NFC), RFID, WiMAX, LTE, or other standards. In various embodiments, wireless transceiver module 142 may be configured to transmit and receive over one or more wireless communications standards/technologies. Wireless transceiver module 142 may comprise multiple transmitter modules and receiver modules, and necessary modulation and demodulation modules as required to conduct wireless communications.
Carrier 140 also includes an antenna 143 for conducting wireless communications. Antenna 143 is communicatively coupled to wireless transceiver module 142. In various embodiments, antenna 143 may a multi-purpose antenna, designed to transmit and receive over various communication standards, or antenna 143 may comprise more than one antenna for different communication standards. In various embodiments, antenna 143 may be a directional antenna for increased security of wireless transmission.
User interface 148 provides information to the user regarding the status of the transaction occurring. In various embodiments, user interface 148 may comprise one or more indicator lights configured to convey status information to the user in a variety of ways. The indicator lights may be LEDs or any other visual components. In various embodiments, only one indicator light may be provided that is configured to show a different color based on whether card 110 is probably connected with carrier 140 (red), whether the system is operational (green), or whether a transaction is processing (yellow). The recitation of green, red, and yellow as the colors of the indicators merely used as an example; any combination of colors is in accordance with the technology herein disclosed. Instead of using colors, in various embodiments there may be an indicator light for each of a number of different labeled indicators, such as “ON,” “TRANSMITTING,” “ERROR,” or other type of information that would be pertinent to the user while conducting a transaction.
In various embodiments, user interface 148 may be a visual display, such as an LCD display or other visual/textual display. In these embodiments, user interface 148 would indicate in a visual manner to the user the status of the system and any transactions being conducted. In various embodiments, the visual display may be a touch-screen.
In various embodiments, user interface 148 may also include a power-on capability. This capability may be a switch, button, or other method of powering on and off carrier 140. In various embodiments, this capability may be separate from user interface 148.
In various embodiments, user interface 148 may a combination of the different interfaces discussed above. For example, user interface 148 may include a row of indicator lights and an LCD display, providing both visual indications from the indicator lights as well as textual explanations of the current status of the system.
In various embodiments, carrier 140 may also include a processing module (not shown) and memory (not shown) for performing operations related to user interface 148. In some embodiments, user interface 148 may be embedded on card 110. In such embodiments, the user interface may operate in the same manner as discussed above with regards to user interface 148 on carrier 140. In some embodiments, both carrier 148 and card 110 may include a user interface.
As described above, there are many different types of smart card architectures that may be used by card designers. Card 110 in
Card 210 includes similar components of card 110, including a processing module 112, a memory 113, a carrier interface 116, a terminal interface 114, and power line 119. These components operate in a similar fashion to the discussion above with respect to
Controller 226 is a processing module configured to execute authentication application programming stored in memory 224. In various embodiments, controller 226 accepts a biometric input from sensor 222 and creates a biometric image template for authentication, as described in more detail below. In other embodiments, controller 226 can receive an already created biometric image template from sensor 222 already formatted for authentication purposes. In various embodiments, controller 226 performs the biometric authentication process by comparing the biometric image template with the stored biometric data from authentication memory 224. Controller 226 is coupled to processing module 112 through connection 229. When a transaction is occurring, processing module 112 sends an authentication request to controller 226. Controller 222 then compares the biometric image template against the biometric data (e.g., a biometric template or image) stored in authentication memory 224. In some embodiments, controller 226 determines if the biometric image template is within a predetermined threshold value of the stored biometric data. Such a threshold value can be stored in authentication memory 224. If there is a match, controller 226 sends an indication to processing module 112 that the user is authenticated and the transaction may proceed. If there is not a match, controller 226 sends an indication to processing module 112 that the user is not authorized to conduct the transaction and to terminate the transaction session. In various embodiments, controller 226 may be a separate hardware processing module from processing module 112. In various embodiments, controller 226 may be implemented in software, such as a virtual machine (VM) executed using processing module 112. In such an embodiment, additional security features may be implemented within processing module 112, such as partitioning between the VM and the card operating system to ensure that no unauthorized access to the controller module occurs. In various embodiments, the authentication application programming executed by controller 226 may be stored in memory 113 and accessible by controller 226 through processing module 112. In various embodiments, controller 226 may have direct access to memory 113.
In various embodiments, biometric sensor 222 is a biometric reader or scanner capable of reading or scanning one or more biometrics of a user. Biometrics are human characteristics unique to an individual. In various embodiments, biometric sensor 222 may be configured as a fingerprint scanner, an iris scanner, a voice-identification unit, or other physiological characteristic of an individual. As discussed above, the biometric input from sensor 222 can be sent directly to controller 226 in order to allow controller 226 to create the biometric image template. In various embodiments, sensor 222 may be capable of turning the biometric input from the user into the biometric image template necessary for comparison.
In various embodiments, card 210 may have only a single component for processing both the transaction and authentication functions of card 210. In various embodiments, this single processing component may be processing module 112, and processing module 112 may be configured to execute both transaction applications and the functions of controller 226 described above. This eliminates the need for multiple processing units on the card and lowers the complexity of the design.
It may be useful to allow for the processing functions of the smart card to be performed by the carrier in certain situations, such as when the card designer intended for the processing to occur off the card to achieve a simpler card design. Such an example system is shown in
In various embodiments of the system depicted in
Although carrier 340 has been described as performing the authentication functions of card 310, this should not be read to limit the functionality of carrier 340. Carrier 340 may be designed to perform any transaction or function associated with card 310, or any other smart card employed. In various embodiments, carrier 340 may perform any function stored on or designed to be performed by card 310, or other smart card employed in the system. In various embodiments, memory 354 may store all the applications necessary to conduct any financial transaction or access authorization to a facility or computer system.
Although
In various embodiments, carrier 340 may be restricted to use with only certain smart cards. For example, memory 354 may store an authorized list of the smart cards with which carrier 340 may operate. In various embodiments, the authorized list may identify the authorized smart cards based on a serial number or other identifying information of the cards themselves.
Instead of restricting use of carrier 340 to only certain smart cards, use can be restricted to only certain individuals. Memory 354 may store a set of authentication data, such as a copy of the biometric data stored in authentication memory 224, a passcode, or PIN, for each individual authorized to use carrier 340. When a person attempts to use carrier 340 with a smart card enabled with additional levels of security, carrier 340 may refuse to allow wireless communication until the person is authorized to use carrier 340. In this way, the carrier could be personalized for use only be one individual, in the event that someone tries to use carrier 340 to conduct wireless transactions.
In various embodiments, the smart card carrier may include a cut-out providing access to a biometric sensor provided on a smart card and facilitate the use of the biometric security layer.
Although
To conduct a transaction, terminal 910 sends a request to conduct a transaction via interface 914 to card 210 via terminal interface 114. Processing module 112 receives the request and sends an activation message to controller 226 to activate biometric authentication module 220. As discussed above, card 210 receives power through terminal interface 114 from terminal 910, which powers the components of card 210 via power line 119. After activation, controller 226 receives biometric input from sensor 222. The biometric input received is contingent on the type of sensor employed, such as a fingerprint scanner or an iris scanner. After controller 226 receives one or more inputs from biometric sensor 222, controller 226 access the stored biometric data in authentication memory 224 and determines whether there is a match. If there is a match, controller 226 sends a message to processing module 112 via connection 229 that the transaction is authorized to be conducted. After receiving the authentication notification, processing module 112 may execute application instructions stored in memory 113 and transmit to terminal 910 the information (e.g., a password or certificate) necessary to complete the transaction via terminal interface 114. In some embodiments, the password or certificate is encrypted before it is transmitted.
In various embodiments, if controller 226 determines that there is not a match between the biometric input from sensor 222 and the biometric data stored in memory 224, controller 226 sends an indication or notification to processing module 112 over connection 229 that the user is not authorized to conduct the transaction. In various embodiments, processing module 112 may simply not respond to the request from terminal 910. In other embodiments, processing module 112 may execute an application instruction stored in memory 113 regarding unauthorized access attempts and send a notification to terminal 910. In some embodiments, upon receiving one or more indications of unauthorized use from controller 226, processing module 112 deactivates the card 210 to prevent a further attempt.
In accordance with the technology disclosed herein, the same transaction process discussed above in regards to
Wireless transceiver module 142 then transfers the request message to card interface 146, which is communicatively coupled to carrier interface 116 of card 210. In this way, the message from terminal 1010 is communicated to processing module 112 of card 210 without card 210 physically in contact with terminal 1010. Processing module 112 operates in the same manner as if it was in physical contact with terminal 1010, similar to the operation discussed above in regards to
Just as terminal 910 provided power to card 210 through terminal interface 914, carrier 140 supplies power from power source 146 to card 210 through card interface 146. In this way, no on-board power source is required on card 210 to power authentication module 220, processing module 112, or any other components that might be present in card 210. In this way, the enhanced capability of conducting wireless transactions may be provided to a simple contact smart card. Wireless transceivers capable of Bluetooth, Wi-Fi, or other higher-protocol communication standards or technologies require more power than could feasibly be included in the form factor of a credit card in a cost effective manner.
Moreover, use of an external contactless transaction system in accordance with the technology disclosed herein, like carrier 140, allows for smart cards with additional layers of security to be created and compatible with many different systems. For example, a smart card with a biometric sensor such as card 210 of
As technology continues to advance, transactions are occurring not only at POS terminals in fixed locations, but also with mobile devices. In various embodiments, these mobile devices may include hand held POS terminals, mobile card readers, smartphones, PDAs, laptop computers, tablet computers, or other portable computing devices. Accordingly,
An example method of conducting wireless transactions with a contact smart card using a smart card carrier in accordance with the technology disclosed herein is provided.
At step 620, the smart card carrier engages in data communication with one or more processors on a smart card. In various embodiments, the data communication involves request by the smart card carrier for information from the smart card. For example, where the smart card carrier is capable of conducting an authentication process, the data communication may be a request for the smart card to transmit stored biometric or other authentication-related data from a memory on the smart card to the carrier. In other embodiments, the data communication between the smart card carrier and the smart card may be a transfer of the transaction request as received by the smart card carrier to the smart card for processing. In other embodiments, the data communication could be any other type of communication related to the transaction request, such as communications about where the authentication procedure occurs or the an indication of the results of authentication. The smart card interface is communicatively coupled to the contacts of the contact smart card.
The method transitions at point A to the example processing of the request by the smart card, illustrated in
At step 710, the smart card receives the data communication related to the transaction request of a terminal from the smart card carrier through the smart card's contact points. In some embodiments, the request appears as an ordinary request through the smart card's contact points because it is engaged with the smart card carrier in the same fashion as if the smart card was engaged with the terminal directly, e.g., via terminal interface 114 shown in
If the smart card has additional layers of security, the authentication process is activated at step 720. In this example, the authentication process is a biometric security check. In various embodiments, other types of layered security may be used, such as a PIN or a password, in lieu of or in addition to the biometric authentication. In embodiments where the authentication process occurs at the smart card carrier, one or more of the steps 720-770 may occur at the smart card carrier instead of on the biometric smart card.
At step 730, the card receives the user's biometric signature. In various embodiments, the user's biometric signature may be a fingerprint, a voice sample, an iris scan, or other biometric characteristic utilized to authenticate the user's identity. In various embodiments, the user may enter a PIN or password associated with the user at step 730.
At step 740, the user's biometric signature is compared with a biometric template stored on the smart card. This biometric template may be stored in an authentication memory separate from any other memory of the smart card, or it could be stored in the same memory with other applications and data used by the smart card. In various embodiments, the template stored in memory may be a copy of the user's PIN or password for comparison.
The smart card decides whether the biometric signature is authentic at step 750. The particular level of similarity or the metrics used to determine if a biometric signature is the same or similar enough to the template to qualify as authentic may vary.
If the signature is determined to be authentic, a notification of a successful authentication is sent to the card's contact points at step 762. This notification could be a simple notice that the user is the authentic user, the relevant information requested by the terminal, or a combination of both. In various embodiments, the notification could also include additional indications, such as the level of accuracy of the authentication process or requests from the card for additional information from the terminal. The content of the notification may vary depending on the complexity built into the smart card applications or applications.
If the smart card determines the signature is not authentic, a notification of a failed authentication is sent to the card's contact points at step 764. Similar to the notification for a success, the notification of failure may include additional information related to the failure, such as request for the terminal to contact the smart card issuer or a request to restart the transaction process. In various embodiments, if the authentication is unsuccessful the smart card could send no message to the contact points and instead merely ignore the transaction request.
At step 770, the smart card can deactivate the authentication module. In various embodiments, the authentication process may need to only be completed once during a transaction session. The result of a successful authentication could be stored in a memory of the smart card for the duration of a transaction session. In other embodiments, the authentication process may be repeated for each request received by the smart card.
After the smart card processes the transaction request, a response is received from the smart card via the card interface of the smart card carrier at step 630 of
At step 640, the card interface transfers the response to the wireless transceiver for transmission to the requesting terminal. This is done in the same, but reversed, manner as step 620.
At step 650, the wireless transceiver transmits the response to terminal. If no further action is required the transaction is completed. If more information is needed or additional actions are to be taken, the method may repeat itself.
In various embodiments, cards 110, 210, and/or 310 may include a GPS antenna, beacon, or other indicator component that allows for determining the location of the card. This additional functionality allows for an added layer of transaction security by allowing authentication to occur based on location, in addition to other authentication methods such as biometrics or passcodes (PINs), for example. In various embodiments, carriers 140 or 340 may include such a GPS antenna, beacon, or other indicator component. When a transaction is occurring in an unfamiliar location based on the user's identity, carriers 140 or 340 may request additional verification of the user, either through performing on-board biometric authentication as described in
Use of location-based authentication may also provide additional security when the smart card is being used as a method of restricting access to certain areas within a facility. A particular smart card may be issued to a certain individual, who is authorized to enter certain areas of a facility, base, headquarters, or other location. Carriers 140 or 340 may be used with the issued card to allow for wireless communication with the internal network of the facility controlling access to different areas. In various embodiments, the network administrator may send out a request for reauthentication to ensure that the person has access to the area in which they are located. The holder would then conduct the authentication procedure as described above with respect to
As used herein, the term module might describe a given unit of functionality that can be performed in accordance with one or more embodiments of the technology disclosed herein. As used herein, a module might be implemented utilizing any form of hardware, software, or a combination thereof. For example, one or more processors, controllers, ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routines or other mechanisms might be implemented to make up a module. In implementation, the various modules described herein might be implemented as discrete modules or the functions and features described can be shared in part or in total among one or more modules. In other words, as would be apparent to one of ordinary skill in the art after reading this description, the various features and functionality described herein may be implemented in any given application and can be implemented in one or more separate or shared modules in various combinations and permutations. Even though various features or elements of functionality may be individually described or claimed as separate modules, one of ordinary skill in the art will understand that these features and functionality can be shared among one or more common software and hardware elements, and such description shall not require or imply that separate hardware or software components are used to implement such features or functionality.
While various embodiments of the disclosed technology have been described above, it should be understood that they have been presented by way of example only, and not of limitation. Likewise, the various diagrams may depict an example architectural or other configuration for the disclosed technology, which is done to aid in understanding the features and functionality that can be included in the disclosed technology. The disclosed technology is not restricted to the illustrated example architectures or configurations, but the desired features can be implemented using a variety of alternative architectures and configurations. Indeed, it will be apparent to one of skill in the art how alternative functional, logical or physical partitioning and configurations can be implemented to implement the desired features of the technology disclosed herein. Also, a multitude of different constituent module names other than those depicted herein can be applied to the various partitions. Additionally, with regard to flow diagrams, operational descriptions and method claims, the order in which the steps are presented herein shall not mandate that various embodiments be implemented to perform the recited functionality in the same order unless the context dictates otherwise.
Although the disclosed technology is described above in terms of various exemplary embodiments and implementations, it should be understood that the various features, aspects and functionality described in one or more of the individual embodiments are not limited in their applicability to the particular embodiment with which they are described, but instead can be applied, alone or in various combinations, to one or more of the other embodiments of the disclosed technology, whether or not such embodiments are described and whether or not such features are presented as being a part of a described embodiment. Thus, the breadth and scope of the technology disclosed herein should not be limited by any of the above-described exemplary embodiments.
Terms and phrases used in this document, and variations thereof, unless otherwise expressly stated, should be construed as open ended as opposed to limiting. As examples of the foregoing: the term “including” should be read as meaning “including, without limitation” or the like; the term “example” is used to provide exemplary instances of the item in discussion, not an exhaustive or limiting list thereof; the terms “a” or “an” should be read as meaning “at least one,” “one or more” or the like; and adjectives such as “conventional,” “traditional,” “normal,” “standard,” “known” and terms of similar meaning should not be construed as limiting the item described to a given time period or to an item available as of a given time, but instead should be read to encompass conventional, traditional, normal, or standard technologies that may be available or known now or at any time in the future. Likewise, where this document refers to technologies that would be apparent or known to one of ordinary skill in the art, such technologies encompass those apparent or known to the skilled artisan now or at any time in the future.
The presence of broadening words and phrases such as “one or more,” “at least,” “but not limited to” or other like phrases in some instances shall not be read to mean that the narrower case is intended or required in instances where such broadening phrases may be absent. The use of the term “module” does not imply that the components or functionality described or claimed as part of the module are all configured in a common package. Indeed, any or all of the various components of a module, whether control logic or other components, can be combined in a single package or separately maintained and can further be distributed in multiple groupings or packages or across multiple locations.
Additionally, the various embodiments set forth herein are described in terms of exemplary block diagrams, flow charts and other illustrations. As will become apparent to one of ordinary skill in the art after reading this document, the illustrated embodiments and their various alternatives can be implemented without confinement to the illustrated examples. For example, block diagrams and their accompanying description should not be construed as mandating a particular architecture or configuration.
Number | Name | Date | Kind |
---|---|---|---|
4453074 | Weinstein et al. | Jun 1984 | A |
4582985 | Loefberg | Apr 1986 | A |
4725719 | Oncken et al. | Feb 1988 | A |
4747147 | Sparrow | May 1988 | A |
4910521 | Mellon | Mar 1990 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5175416 | Mansvelt et al. | Dec 1992 | A |
5180901 | Hiramatsu | Jan 1993 | A |
5180902 | Schick et al. | Jan 1993 | A |
5193114 | Moseley et al. | Mar 1993 | A |
5245329 | Gokcebay | Sep 1993 | A |
5259649 | Shomron | Nov 1993 | A |
5321751 | Ray et al. | Jun 1994 | A |
5438184 | Roberts et al. | Aug 1995 | A |
5461217 | Claus et al. | Oct 1995 | A |
5513272 | Bogosian et al. | Apr 1996 | A |
5521363 | Tannenbaum | May 1996 | A |
5521966 | Friedes et al. | May 1996 | A |
5534857 | Laing et al. | Jul 1996 | A |
5539825 | Akiyama et al. | Jul 1996 | A |
5541985 | Ishii et al. | Jul 1996 | A |
5559504 | Itsumi et al. | Sep 1996 | A |
5559887 | Davis et al. | Sep 1996 | A |
5577121 | Davis et al. | Nov 1996 | A |
5578808 | Taylor et al. | Nov 1996 | A |
5581630 | Bonneau et al. | Dec 1996 | A |
5590038 | Pitroda | Dec 1996 | A |
5590197 | Chen et al. | Dec 1996 | A |
5602918 | Chen et al. | Feb 1997 | A |
5604801 | Dolan et al. | Feb 1997 | A |
5613001 | Bakhoum | Mar 1997 | A |
5677953 | Dolphin | Oct 1997 | A |
5703753 | Mok | Dec 1997 | A |
5721781 | Deo et al. | Feb 1998 | A |
5737439 | Lapsley et al. | Apr 1998 | A |
5739512 | Tognazzini | Apr 1998 | A |
5742756 | Dillaway et al. | Apr 1998 | A |
5742845 | Wagner | Apr 1998 | A |
5757917 | Rose et al. | May 1998 | A |
5764789 | Pare, Jr. et al. | Jun 1998 | A |
5778173 | Apte et al. | Jul 1998 | A |
5796831 | Paradinas et al. | Aug 1998 | A |
5799087 | Rosen | Aug 1998 | A |
5806045 | Biorge et al. | Sep 1998 | A |
5815252 | Price et al. | Sep 1998 | A |
5815657 | Williams et al. | Sep 1998 | A |
5826241 | Stein et al. | Oct 1998 | A |
5826243 | Musmanno et al. | Oct 1998 | A |
5835894 | Adcock et al. | Nov 1998 | A |
5838818 | Herley et al. | Nov 1998 | A |
5857079 | Claus et al. | Jan 1999 | A |
5869822 | Meadows et al. | Feb 1999 | A |
5875432 | Sehr | Feb 1999 | A |
5884271 | Pitroda | Mar 1999 | A |
5884292 | Baker et al. | Mar 1999 | A |
5889941 | Tushie | Mar 1999 | A |
5892211 | Davis et al. | Apr 1999 | A |
5898838 | Wagner | Apr 1999 | A |
5901239 | Kamei | May 1999 | A |
5905908 | Wagner | May 1999 | A |
5907620 | Klemba et al. | May 1999 | A |
5912446 | Wong et al. | Jun 1999 | A |
5915973 | Hoehn et al. | Jun 1999 | A |
5917913 | Wang et al. | Jun 1999 | A |
5917925 | Moore et al. | Jun 1999 | A |
5920058 | Weber et al. | Jul 1999 | A |
5920629 | Rosen | Jul 1999 | A |
5920847 | Kolling et al. | Jul 1999 | A |
5930767 | Reber et al. | Jul 1999 | A |
5931917 | Nguyen et al. | Aug 1999 | A |
5936226 | Aucsmith | Aug 1999 | A |
5942761 | Tuli | Aug 1999 | A |
5987155 | Dunn et al. | Nov 1999 | A |
5988497 | Wallace et al. | Nov 1999 | A |
5991411 | Kaufman et al. | Nov 1999 | A |
5995014 | DiMaria | Nov 1999 | A |
6012039 | Hoffman et al. | Jan 2000 | A |
6012636 | Smith et al. | Jan 2000 | A |
6016476 | Maes et al. | Jan 2000 | A |
6018739 | McCoy et al. | Jan 2000 | A |
6041410 | Hsu et al. | Mar 2000 | A |
6047281 | Wilson et al. | Apr 2000 | A |
6047282 | Wilson et al. | Apr 2000 | A |
6060815 | Nysen | May 2000 | A |
6070159 | Wilson et al. | May 2000 | A |
6091835 | Smithies et al. | Jul 2000 | A |
6095413 | Tetro et al. | Aug 2000 | A |
6101477 | Hohle et al. | Aug 2000 | A |
6104311 | Lastinger | Aug 2000 | A |
6104922 | Baumann et al. | Aug 2000 | A |
6116736 | Stark et al. | Sep 2000 | A |
6120461 | Smyth | Sep 2000 | A |
6130623 | MacLellan et al. | Oct 2000 | A |
6148093 | McConnell et al. | Nov 2000 | A |
6154879 | Pare, Jr. et al. | Nov 2000 | A |
6175656 | Hoang | Jan 2001 | B1 |
6182892 | Angelo et al. | Feb 2001 | B1 |
6199079 | Gupta et al. | Mar 2001 | B1 |
6199762 | Hohle | Mar 2001 | B1 |
6219639 | Bakis et al. | Apr 2001 | B1 |
6223984 | Renner et al. | May 2001 | B1 |
6233348 | Fujii et al. | May 2001 | B1 |
6256690 | Carper | Jul 2001 | B1 |
6257486 | Teicher et al. | Jul 2001 | B1 |
6257620 | Kenney | Jul 2001 | B1 |
6263446 | Kausik et al. | Jul 2001 | B1 |
6265977 | Vega et al. | Jul 2001 | B1 |
6268788 | Gray | Jul 2001 | B1 |
6269348 | Pare, Jr. et al. | Jul 2001 | B1 |
6270011 | Gottfried | Aug 2001 | B1 |
6272562 | Scott et al. | Aug 2001 | B1 |
6298146 | Ilan et al. | Oct 2001 | B1 |
6307956 | Black | Oct 2001 | B1 |
6325285 | Baratelli | Dec 2001 | B1 |
6327578 | Linehan | Dec 2001 | B1 |
6332193 | Glass et al. | Dec 2001 | B1 |
6338048 | Mori | Jan 2002 | B1 |
6338435 | Carper | Jan 2002 | B1 |
6345761 | Seelbach et al. | Feb 2002 | B1 |
6357663 | Takahashi et al. | Mar 2002 | B1 |
6360953 | Lin et al. | Mar 2002 | B1 |
6390374 | Carper et al. | May 2002 | B1 |
6424249 | Houvener | Jul 2002 | B1 |
6442286 | Kramer | Aug 2002 | B1 |
6446862 | Mann | Sep 2002 | B1 |
6480825 | Sharma et al. | Nov 2002 | B1 |
6480935 | Carper et al. | Nov 2002 | B1 |
6483929 | Murakami et al. | Nov 2002 | B1 |
6483932 | Martinez et al. | Nov 2002 | B1 |
6490443 | Freeny, Jr. | Dec 2002 | B1 |
6496594 | Prokoski | Dec 2002 | B1 |
6507662 | Brooks | Jan 2003 | B1 |
6519565 | Clements et al. | Feb 2003 | B1 |
6539101 | Black | Mar 2003 | B1 |
6560581 | Fox et al. | May 2003 | B1 |
6588660 | Buescher et al. | Jul 2003 | B1 |
6588673 | Chan et al. | Jul 2003 | B1 |
6591249 | Zoka | Jul 2003 | B2 |
6601759 | Fife et al. | Aug 2003 | B2 |
6601762 | Piotrowski | Aug 2003 | B2 |
6609656 | Elledge | Aug 2003 | B1 |
6615191 | Seeley | Sep 2003 | B1 |
6628813 | Scott et al. | Sep 2003 | B2 |
6629591 | Griswold et al. | Oct 2003 | B1 |
6631201 | Dickinson et al. | Oct 2003 | B1 |
6636620 | Hoshino | Oct 2003 | B1 |
6655585 | Shinn | Dec 2003 | B2 |
6657614 | Ito et al. | Dec 2003 | B1 |
6658164 | Irving et al. | Dec 2003 | B1 |
6662166 | Pare, Jr. et al. | Dec 2003 | B2 |
6669086 | Abdi et al. | Dec 2003 | B2 |
6681328 | Harris et al. | Jan 2004 | B1 |
6687391 | Scott et al. | Feb 2004 | B1 |
6697947 | Matyas, Jr. et al. | Feb 2004 | B1 |
6703918 | Kita | Mar 2004 | B1 |
6719200 | Wiebe | Apr 2004 | B1 |
6732919 | Macklin et al. | May 2004 | B2 |
6734887 | Field | May 2004 | B2 |
6744909 | Kostrzewski et al. | Jun 2004 | B1 |
6744910 | McClurg et al. | Jun 2004 | B1 |
6765470 | Shinzaki | Jul 2004 | B2 |
6776332 | Allen et al. | Aug 2004 | B2 |
6799726 | Stockhammer | Oct 2004 | B2 |
6816058 | McGregor et al. | Nov 2004 | B2 |
6819219 | Bolle et al. | Nov 2004 | B1 |
6826000 | Lee et al. | Nov 2004 | B2 |
6828299 | Yang et al. | Dec 2004 | B2 |
6828960 | Parry | Dec 2004 | B2 |
6834795 | Rasmussen et al. | Dec 2004 | B1 |
6867850 | McClurg | Mar 2005 | B2 |
6870946 | Teng | Mar 2005 | B1 |
6873974 | Schutzer | Mar 2005 | B1 |
6877097 | Hamid et al. | Apr 2005 | B2 |
6886104 | McClurg et al. | Apr 2005 | B1 |
6892940 | Kocarev et al. | May 2005 | B2 |
6901154 | Dunn | May 2005 | B2 |
6914517 | Kinsella | Jul 2005 | B2 |
6917695 | Teng et al. | Jul 2005 | B2 |
6925439 | Pitroda | Aug 2005 | B1 |
6925565 | Black | Aug 2005 | B2 |
6928181 | Brooks | Aug 2005 | B2 |
6928195 | Scott et al. | Aug 2005 | B2 |
6929413 | Schofield | Aug 2005 | B2 |
6931538 | Sawaguchi | Aug 2005 | B1 |
6934861 | Haala | Aug 2005 | B2 |
6944768 | Siegel et al. | Sep 2005 | B2 |
6954260 | Arnold et al. | Oct 2005 | B2 |
6968453 | Doyle et al. | Nov 2005 | B2 |
6970582 | Langley | Nov 2005 | B2 |
6971031 | Haala | Nov 2005 | B2 |
6983062 | Smith | Jan 2006 | B2 |
6988665 | Schofield | Jan 2006 | B2 |
6996259 | Cannon et al. | Feb 2006 | B2 |
7010148 | Irving et al. | Mar 2006 | B2 |
7028893 | Goodman et al. | Apr 2006 | B2 |
7049962 | Atherton et al. | May 2006 | B2 |
7051925 | Schwarz, Jr. | May 2006 | B2 |
7059159 | Lanigan et al. | Jun 2006 | B2 |
7059531 | Beenau et al. | Jun 2006 | B2 |
7068822 | Scott | Jun 2006 | B2 |
7073711 | Fernandez et al. | Jul 2006 | B2 |
7079007 | Siegel et al. | Jul 2006 | B2 |
7095880 | Martinez et al. | Aug 2006 | B2 |
7102523 | Shanks et al. | Sep 2006 | B2 |
7103201 | Scott et al. | Sep 2006 | B2 |
7127088 | Grajewski et al. | Oct 2006 | B1 |
7132946 | Waldner et al. | Nov 2006 | B2 |
7155039 | Lo | Dec 2006 | B1 |
7162060 | Barton et al. | Jan 2007 | B1 |
7164440 | Cannon | Jan 2007 | B2 |
7165716 | Mödl et al. | Jan 2007 | B1 |
7171662 | Misra et al. | Jan 2007 | B1 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7203344 | McClurg et al. | Apr 2007 | B2 |
7218202 | Bacchiaz et al. | May 2007 | B2 |
7239227 | Gupta et al. | Jul 2007 | B1 |
7266848 | Moyer et al. | Sep 2007 | B2 |
7271881 | Arnold et al. | Sep 2007 | B2 |
7278025 | Saito et al. | Oct 2007 | B2 |
7289649 | Walley et al. | Oct 2007 | B1 |
7303120 | Beenau et al. | Dec 2007 | B2 |
7305563 | Bacchiaz et al. | Dec 2007 | B2 |
7308122 | McClurg et al. | Dec 2007 | B2 |
7314164 | Bonalle et al. | Jan 2008 | B2 |
7314165 | Bonalle et al. | Jan 2008 | B2 |
7319565 | Arnold et al. | Jan 2008 | B2 |
7325724 | Bonalle et al. | Feb 2008 | B2 |
7466348 | Morikawa et al. | Dec 2008 | B2 |
7506172 | Bhakta | Mar 2009 | B2 |
7543337 | D'Agnolo | Jun 2009 | B2 |
7724137 | Page | May 2010 | B2 |
7730526 | Lamplough | Jun 2010 | B2 |
7751593 | Hombo | Jul 2010 | B2 |
7938329 | Tran | May 2011 | B2 |
7946501 | Borracci | May 2011 | B2 |
7992789 | Borracci | Aug 2011 | B2 |
8186580 | Cannon et al. | May 2012 | B2 |
8253531 | Davis et al. | Aug 2012 | B2 |
8276816 | Gardner | Oct 2012 | B2 |
8307207 | Bacchiaz et al. | Nov 2012 | B2 |
8360322 | Bonalle et al. | Jan 2013 | B2 |
8485442 | McNeal | Jul 2013 | B2 |
8490872 | Kim | Jul 2013 | B2 |
8499164 | Ortiz et al. | Jul 2013 | B2 |
8553251 | Iizuka | Oct 2013 | B2 |
8572395 | Ito | Oct 2013 | B2 |
8598981 | Idsøe et al. | Dec 2013 | B2 |
8607063 | Ikeuchi | Dec 2013 | B2 |
8708230 | Cannon et al. | Apr 2014 | B2 |
8713660 | Carper | Apr 2014 | B2 |
8756680 | Shashidhar | Jun 2014 | B2 |
8782427 | Fedronic et al. | Jul 2014 | B2 |
8783578 | Kim | Jul 2014 | B2 |
8786033 | Saito | Jul 2014 | B2 |
8799167 | Carper | Aug 2014 | B2 |
20020059523 | Bacchiaz et al. | May 2002 | A1 |
20020095587 | Doyle et al. | Jul 2002 | A1 |
20020153424 | Li | Oct 2002 | A1 |
20030046554 | Leydier et al. | Mar 2003 | A1 |
20030159044 | Doyle | Aug 2003 | A1 |
20040129787 | Saito et al. | Jul 2004 | A1 |
20040188519 | Cassone | Sep 2004 | A1 |
20040266267 | Inaba | Dec 2004 | A1 |
20050035200 | Hendrick | Feb 2005 | A1 |
20050139685 | Kozlay | Jun 2005 | A1 |
20050144354 | Murashita | Jun 2005 | A1 |
20050182947 | Bacchiaz et al. | Aug 2005 | A1 |
20050240778 | Saito | Oct 2005 | A1 |
20060032905 | Bear et al. | Feb 2006 | A1 |
20060113381 | Hochstein et al. | Jun 2006 | A1 |
20060161789 | Doughty | Jul 2006 | A1 |
20060208066 | Finn et al. | Sep 2006 | A1 |
20070040017 | Kozlay | Feb 2007 | A1 |
20070043594 | Lavergne | Feb 2007 | A1 |
20070073619 | Smith | Mar 2007 | A1 |
20070124536 | Carper | May 2007 | A1 |
20070154018 | Watanabe | Jul 2007 | A1 |
20080005425 | Saito | Jan 2008 | A1 |
20080016370 | Libin | Jan 2008 | A1 |
20080019578 | Saito et al. | Jan 2008 | A1 |
20080040615 | Carper et al. | Feb 2008 | A1 |
20080054875 | Saito | Mar 2008 | A1 |
20080072065 | Bonalle et al. | Mar 2008 | A1 |
20080097924 | Carper et al. | Apr 2008 | A1 |
20080164325 | Borracci | Jul 2008 | A1 |
20080201658 | Saito et al. | Aug 2008 | A1 |
20080223921 | Salazar et al. | Sep 2008 | A1 |
20080223925 | Saito et al. | Sep 2008 | A1 |
20080230613 | Leibenguth | Sep 2008 | A1 |
20090084858 | Borracci | Apr 2009 | A1 |
20090313493 | Ide | Dec 2009 | A1 |
20090322477 | Celorio | Dec 2009 | A1 |
20100039234 | Soliven et al. | Feb 2010 | A1 |
20100148312 | Jung | Jun 2010 | A1 |
20100153451 | Delia et al. | Jun 2010 | A1 |
20100215224 | Saito | Aug 2010 | A1 |
20100257359 | Currie | Oct 2010 | A1 |
20100260388 | Garrett | Oct 2010 | A1 |
20110256832 | Park | Oct 2011 | A1 |
20120016798 | Carper | Jan 2012 | A1 |
20120079273 | Bacchiaz et al. | Mar 2012 | A1 |
20120218079 | Kim | Aug 2012 | A1 |
20120241524 | Blot et al. | Sep 2012 | A1 |
20120297467 | Carper | Nov 2012 | A1 |
20120313754 | Bona | Dec 2012 | A1 |
20130026230 | Cannon et al. | Jan 2013 | A1 |
20130036463 | Shashidhar | Feb 2013 | A1 |
20130056540 | Blot et al. | Mar 2013 | A1 |
20130080788 | Bacchiaz et al. | Mar 2013 | A1 |
20140046785 | Jenkins | Feb 2014 | A1 |
20140232526 | Carper | Aug 2014 | A1 |
Number | Date | Country |
---|---|---|
200238203 | Nov 2002 | AU |
757159 | Feb 2003 | AU |
2003274967 | Apr 2004 | AU |
2004218720 | Nov 2004 | AU |
784438 | Apr 2006 | AU |
2006311596 | May 2007 | AU |
2007229728 | Oct 2007 | AU |
2010224455 | Jan 2011 | AU |
2346592 | Nov 2001 | CA |
2498288 | Mar 2004 | CA |
2564707 | Nov 2005 | CA |
2629435 | May 2007 | CA |
2748563 | Mar 2012 | CA |
2844003 | Feb 2013 | CA |
60111892 | Aug 2005 | DE |
10393215 | Sep 2005 | DE |
994439 | Apr 2000 | EP |
1256908 | Nov 2002 | EP |
1537526 | Jun 2005 | EP |
1157906 | Jul 2005 | EP |
1647942 | Apr 2006 | EP |
1716660 | Nov 2006 | EP |
1759337 | Mar 2007 | EP |
1924976 | May 2008 | EP |
1952244 | Aug 2008 | EP |
2290625 | Mar 2011 | EP |
2434462 | Mar 2012 | EP |
2569735 | Mar 2013 | EP |
2953619 | Jun 2011 | FR |
2959847 | Nov 2011 | FR |
2473283 | Mar 2011 | GB |
02118790 | May 1990 | JP |
11039483 | Feb 1999 | JP |
2001250064 | Sep 2001 | JP |
2001323691 | Nov 2001 | JP |
2002183706 | Jun 2002 | JP |
2005242650 | Sep 2005 | JP |
2005326995 | Nov 2005 | JP |
2006257871 | Sep 2006 | JP |
2007156785 | Jun 2007 | JP |
2008078820 | Apr 2008 | JP |
2011090686 | May 2011 | JP |
2012074011 | Apr 2012 | JP |
0116707 | Mar 2001 | WO |
0116759 | Mar 2001 | WO |
0116865 | Mar 2001 | WO |
0116873 | Mar 2001 | WO |
0116874 | Mar 2001 | WO |
0139427 | Mar 2001 | WO |
2004025545 | Mar 2004 | WO |
2005104704 | Nov 2005 | WO |
2006102625 | Sep 2006 | WO |
2007022423 | Feb 2007 | WO |
2007056476 | May 2007 | WO |
2007064429 | Jun 2007 | WO |
2007143670 | Dec 2007 | WO |
2007146681 | Dec 2007 | WO |
2008010899 | Jan 2008 | WO |
2008079491 | Jul 2008 | WO |
2010019961 | Feb 2010 | WO |
2010077999 | Jul 2010 | WO |
2010133469 | Nov 2010 | WO |
2011067543 | Jun 2011 | WO |
2011141659 | Nov 2011 | WO |
Entry |
---|
Jung, Stefan, “A Low-Power and High-Performance CMOS Fingerprint Sensing and Encoding Architecture,” IEEE Journal of Solid-State Circuits, Jul. 1999, pp. 978-984, vol. 34, No. 7. |
Noore, Afzel, “Highly Robust Biometric Smart Card Design,” IEEE Transactions on Consumer Electronics, Nov. 2000, pp. 1059-1063, vol. 46, No. 4. |
Sanchez-Reillo, Raul, et al., “Fingerprint Verification Using Smart Cards for Access Control Systems,” 2001, pp. 250-253. |
Sanchez-Reillo, Raul, et al., “Microprocessor Smart Cards with Fingerprint User Authorization,” IEEE AESS Systems Magazine, Mar. 2003, pp. 22-24. |
Sung, Bum Pan, et al., “An Ultra-Low Memory Fingerprint Matching Algorithm and Its Implementation on a 32-bit Smart Card,” IEEE, Mar. 26, 2003, pp. 453-459. |
Kim, Dong-Sun, “On the Design of an Embedded Biometric Smart Card Reader,” IEEE, Apr. 16, 2008, pp. 573-577. |
Kim, Seong-Jin, “A CMOS Fingerprint System-on-a-Chip With Adaptable Pixel Networks and Column-Parallel Processors for Image Enhancement and Recognition,” IEEE Journal of Solid-State Circuits, Nov. 2008, pp. 2558-2567, vol. 43, No. 11. |
Nixon, Jenny, “Reconciling your Quicken Account with the Bank Statement,” University of Nebraska, Lincoln, 2005. |
“Biometric Technology for Secure Access,” Sep. 18, 2007, Biometric Associates, Inc., Baltimore, MD, USA. |
Patent Cooperation Treaty, International Search Report for PCT/US2016/000020, May 12, 2016, pp. 4-5. |
Patent Cooperation Treaty, International Search Report for PCT/US2016/000026, May 6, 2016, pp. 4-5. |
Number | Date | Country | |
---|---|---|---|
20160203346 A1 | Jul 2016 | US |