WO1996036934A1 - Tokenless identification system for authorization of electronic transactions and electronic transmissions - Google Patents
Tokenless identification system for authorization of electronic transactions and electronic transmissions Download PDFInfo
- Publication number
- WO1996036934A1 WO1996036934A1 PCT/US1996/007185 US9607185W WO9636934A1 WO 1996036934 A1 WO1996036934 A1 WO 1996036934A1 US 9607185 W US9607185 W US 9607185W WO 9636934 A1 WO9636934 A1 WO 9636934A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bia
- individual
- biometric
- code
- dpc
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/28—Determining representative reference patterns, e.g. by averaging or distorting; Generating dictionaries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/18—Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/77—Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
- G06V10/772—Determining representative reference patterns, e.g. averaging or distorting patterns; Generating dictionaries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/201—Accessories of ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/207—Surveillance aspects at ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F9/00—Details other than those peculiar to special kinds or types of apparatus
- G07F9/002—Vending machines being part of a centrally controlled network of vending machines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/14—With a sequence of inputs of different identification information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- a token would be any inanimate object which confers a capability to the individual presenting the object.
- Remote access of every financial account is through the use of tokens or plastic cards. Whether buying groceries with debit cards or consumer goods with credit cards, at the heart of that transaction is a money transfer enabled by a token, which acts to identify an individual and the financial account he is accessing.
- the reason for the migration from metal coins to plastic cards is simple and straightforward: access to money in this money transfer system is vastly safer and more convenient for both merchants and consumers than handling large quantities of coins and notes.
- tokens do not have a very strong connection with the individual. Identification of the rightful owner of the token through the token is tenuous at best. This is easily demonstrated by the fact that individuals other than the rightful owners of the tokens have been using these tokens to defraud merchants and other consumer goods suppliers.
- Fraud losses in the credit card industry stem from many different areas due to the highly vulnerable nature of the system, but they are mainly due to either lost, stolen, or counterfeit cards.
- Credit cards operate without the use of a personal identification code (PIC), therefore a lost credit card can be turned into cash if the card falls into the wrong hands.
- PICC personal identification code
- Counterfeit credit cards are manufactured by a more technically sophisticated criminal by acquiring a cardholder's valid account number and then producing a counterfeit card using that valid number. The counterfeiter encodes the magnetic strip, and embosses the counterfeit plastic card with the account number. The card is then presented to merchants and charged up to the rightful cardholder's account.
- Another form of loss is by a criminal merchant who surreptitiously obtains the cardholder's account number. Yet another type of fraud is committed by the authorized cardholder when the token is used for making purchases and thereafter a claim is made that the token was either lost or stolen. It is estimated that losses due to all types of fraud exceeds $950 million dollars annually.
- debit cards are used in conjunction with a personal identification code (PIC). Counterfeiting a debit card is more difficult as the criminal must acquire not only the account number, but also the PIC, and then manufacture the card as in the credit card example.
- PIC personal identification code
- Card blanks are manufactured under very tight security. Then they are individualized with the account number, expiration date, and are then mailed to the cardholder. Manufacturing and distributing the card alone costs the industry approximately one billion dollars annually. The standard card costs the financial industry $2 for each, but only $0.30 of this
- Sma ⁇ cards contain as much computing power as did some of the first home computers.
- Current cost projections for a first-generation smart card is estimated at approximately $3.50, not including distribution costs, which is significantly higher than the $0.30 plastic card blank. This significant increase in cost has forced the industry to look for new ways of using the power in the smart card in addition to simple transaction authorization.
- smart cards may also store phone numbers, frequent flyer miles, coupons obtained from stores, a transaction history, electronic cash usable at tollbooths and on public transit systems, as well as the customer's name, vital statistics, and perhaps even medical records.
- the PIC code can be varied and made specific to the calendar day or date of the access attempt.
- a time-variable element is introduced to generate a non-predictable personal identification code that is revealed only to an authorized user at the time of access.
- biometrics are recorded from a user of known identity and stored for future reference on a token.
- the user is required to enter physically the requested biometrics, which are then compared to the authenticated biometrics on the token to determine if the two match in order to verify user identity.
- biometrics are uniquely personal to the user and because the act of physically entering the biometrics are virtually irreproducible, a match is putative of actual identity, thereby decreasing the risk of fraud.
- biometrics have been suggested, such as finger prints, hand prints, voice prints, retinal images, handwriting samples and the like.
- token-based security system which relies on a biometrics of a user can be found in United States Patent 5,280,527 to Gullman et al.
- a biometrics security apparatus containing a microchip in which is recorded characteristics of the authorized user's voice.
- the user In order to initiate the access procedure, the user must insert the token into a terminal such as an ATM, and then speak into the terminal to provide a biometrics input for comparison with an authenticated input stored in the microchip of the presented token.
- the process of identity verification is generally not isolated from potential tampering by one attempting unauthorized access. If a match is found, the remote terminal may then signal the host computer that access should be permitted, or may prompt the user for an additional code, such as a PIN (also stored on the token), before sending the necessary verification signal to the host computer.
- Such systems must be simple to operate, accurate and reliable. There is also a need for a computer access system that can allow a user to access multiple accounts and procure all services authorized to the user, and carry out transactions in and between all financial accounts, make point of purchase payments, receive various services, etc.
- the present invention satisfies these needs by providing an improved identification system for determining an individual's identity from a comparison of an individual's biometrics sample and personal identification code gathered during a bid step with biometrics sample and personal identification code for that individual gathered during a registration step and stored at a remote site wherein there is a data processing center.
- the invention comprises a computer network host system with means for comparing the entered biometrics sample and personal identification code, and is equipped with various data bases and memory modules.
- the invention is provided with biometrics and personal identification code input apparatus and terminals for entering data to provide information for execution of the requested transactions and transmissions by the host system once the identity of the individual is determined.
- the invention is also provided with means for connecting the host system with the terminal and the biometrics input apparatus.
- the computer also has means for execution of various transactions and transmission in addition to traditional storing of and modification of data. Additionally, the computer can output the evaluation of the biometrics- PIC ("personal identification code") comparison, and the determination of an identification evaluation, or status of any execution of transactions or transmissions. Furthermore, the computer system notifies and authenticates to the individual being identified that the computer system was accessed, by returning to the individual a private code which was previously selected by that individual during the registration step. Preferably, the computer system is protected from electronic eavesdropping and electronic intrusion and viruses.
- the devices used by the computer for gathering biometric samples and personal identification codes would comprise: a) at least one biometric input device for gathering biometric samples, which would have a hardware and a software component; b) at least one terminal device that is functionally partially or fully integrated with the biometric input means for input of and appending ancillary information; c) at least one data entry device for input of a personal identification code whereby this data entry device is integrated either with the biometric input device or the terminal device; and, d) a means for interconnecting the biometric input device, data entry device and the terminal.
- the terminal device also has at least one display device for displaying data and information.
- the computer system uniquely identifies the biometric input apparatus, and the counter party or merchant through a counter party or merchant identification code relating to the terminal that is connected to the biometric input device. It is also preferred that the biometric input apparatus be secured from physical and electronic tampering, and that in case of physical breach of the device, means be employed to physically and/or electronically destroy components within the apparatus and/or erase critical data from the device's memory modules.
- the biometric input apparatus would have a hardware component comprising: a) at least one computing module for data processing; b) erasable and non-erasable memory modules for storage of data and software; c) a biometric scanner device for input of biometric data; d) a data entry device for entering data; e) a digital communications port; f) a device for prevention of electronic eavesdropping.
- a hardware component comprising: a) at least one computing module for data processing; b) erasable and non-erasable memory modules for storage of data and software; c) a biometric scanner device for input of biometric data; d) a data entry device for entering data; e) a digital communications port; f) a device for prevention of electronic eavesdropping.
- the host computer network is also connected to and is able to communicate with other independent computer systems, databases, facsimile machines, and other computer networks through conventional means.
- the method of the present invention includes voluntarily identifying an individual without the use of any tokens by means of examination of at least one biometrics sample provided by that the individual and a personal identification code also provided by that individual.
- the individual is to register with the system an authenticated biometric sample, a personal identification code and a private code.
- the biometrics sample and personal identification code of the individual is gathered and compared to the ones registered during the registration step. A match of the personal identification codes and biometrics sample will result in the positive identification of the individual.
- the individual's private code which was collected at the registration step, is returned to the individual.
- the method of the invention include a method for examining the biometrics samples during registration and comparing such biometrics with a collection of biometrics samples from individuals who have been designated as having previously attempted to perpetrate or who have actually perpetrated fraud upon the system.
- the invention includes a method for notifying authorities of the presence of exigent circumstances or that the authorized user is under duress.
- the method include steps for the individual to choose various financial accounts, and choose various modes of electronic transmissions.
- the method include a method for archiving of data and electronic transmissions, and retrieval of the archived data using a tracking code.
- any document such as a facsimile or an electronic mail message be uniquely checksummed using algorithm for future identification of the document.
- Yet another method of the invention is to be able to rapidly identify an individual from an examination of his biometrics sample and personal identification code by storing several dissimilar biometrics samples from different individuals in an electronic basket that is identified by one personal identification code.
- the computer system can allow individuals to select their own personal identification code (or "PIC") from a group of PICs selected by the remote data processing center. This is performed in a method whereby once the individual's biometric is gathered, the data processing center selects several PICs at random which may be conducive to being memorized. The data processing center then conducts a comparison of the biometric gathered with those already in those PIC baskets or groups. In the event the new registrant's biometric is to similar to any previously registered biometric which has been allotted to any one of those randomly selected PIC groups, then that PIC is rejected by the database for use by the new individual and an alternative PIC is selected for another such biometric comparison.
- PIC personal identification code
- a method for rapid search of at least one first previously stored biometric sample from a first individual, using a personal identification code-basket that is capable of containing at least one algorithmically unique second biometric sample that is from at least one second individual, and which is identified by said personal identification code-basket comprising, firstly, a storage step further comprising: a) the selection of a private code by a first individual; b) the selection of a personal identification code by said first individual; c) the entering a biometric sample from said first individual; d) locating the personal identification code-basket identified by the personal identification code selected by said first individual; e) comparison of the biometric sample taken from said first individual with any previously stored biometric samples in said selected personal identification code-basket to make sure that the biometric sample entered by said first individual is algorithmically unique from the
- a bid step further comprising: a) entering said selected personal identification code by said first individual, and; b) entering a biometric sample by said first individual.
- a comparison step comprising: a) finding the personal identification code-basket that is identified by said personal identification code entered by said first individual, and; b) comparison of the entered biometric sample from said first individual with said at least one stored biometric sample from said at least one second individual in said entered personal identification code-basket for producing either a successful or failed identification result.
- the host system is positioned in series between the individual being identified and other computer networks that are to be accessed, thereby acting as an interface. It will be appreciated that in this embodiment, the user tenders an access request directly to the host computer system of the invention, which is operationally interactive with other independent secured computer systems such as VIS ANET. The computer system would therefore maintain authenticated biometrics data samples for all authorized users of each secured computer system that it services.
- the security system provides to the user a listing of systems that he is authorized to access, and prompts the user to select the desired network. Thereafter, the requested execution step and information regarding the transaction is forwarded to the selected independent computer network similar to the type of communications sent today between merchants and credit card companies.
- the host system may also carry out the functions of the other independent computer systems such as debiting or crediting a financial account.
- the computer system of the invention carries out the functions requested by the individual without use of external, independent computer networks.
- a means for alerting predesignated authorities during an access attempt during which the user has been coerced by a third party to request access to the host computer system.
- an authorized user would have a number of codes, most of which would be recognized by the computer system as the standard access codes, and others which would be recognized as emergency codes.
- the comparison means of the computer system of the invention would be configured to accept and recognize at least one code per authorized user, and to activate the emergency alert means whenever the code entered by the user matched an emergency code.
- the determination of an authorized identity for the user would result in the user being afforded access to the requested secured computer system perhaps on an access level that has been predetermined to be restricted or perhaps resulting in the display of misleading data (i.e.,
- the present invention is clearly advantageous over the prior art in a number of ways.
- it is extremely easy and efficient for the user, particularly where the user is accessing financial accounts, because it eliminates the need to carry and present any tokens in order to access one's accounts.
- the present invention eliminates all the inconveniences associated with carrying, safeguarding and locating any desired tokens.
- tokens are often specific to a particular computer system that further requires remembering a secret code assigned to the particular token, this invention eliminates all such tokens and thereby significantly reduces the amount of memorization and diligence increasingly required of consumers by providing access to all assets using only one personal identification code.
- the consumer can efficiently and securely conduct virtually any commercial exchange or electronic message, from withdrawing cash from a bank account, to authorization his agreement to the terms of a contract, to making a purchase directly from television, to paying local property taxes.
- the consumer is now uniquely empowered, by means of this invention, to conveniently conduct his personal and/or professional electronic transmissions and transactions at any time without dependence upon tokens which may be stolen, lost or damaged.
- the invention is clearly advantageous from a convenience standpoint to retailers and financial institutions by making purchases and other financial transactions less cumbersome and more spontaneous.
- the paper work of financial transactions is significantly reduced as compared to cunent systems, such as credit card purchase wherein separate receipts are generated for use by the credit card company, the merchant and the consumer.
- Such electronic transactions also save merchants and banks considerable time and expense by greatly reducing operational costs.
- the system of the invention is designed to provide a consumer with simultaneous direct access to all of his financial accounts, the need for transactions involving money, checks, commercial paper and the like will be greatly reduced, thereby reducing the cost of equipment and staff required to collect and account for such transactions.
- the invention is markedly advantageous and superior to existing systems in being highly fraud resistant.
- present computer systems are inherently unreliable because they base determination of a user's identity on the physical presentation of a unique manufactured object along with, in some cases, information that the user knows.
- both the token and information can be transfened to another, through loss, theft or by voluntary action of the authorized user.
- anyone possessing such items will be recognized by existing security systems as the authorized user to whom that token and information is assigned.
- the present invention virtually eliminates the risk of granting access to non-authorized users by determining user identity from an analysis of one or more of a user's unique, biometrics characteristics.
- the system anticipates an emergency account index, whereby the authorized user can alert authorities of the transgression without the knowledge of the coercing party.
- the invention further enhances fraud resistance by maintaining authenticating data and carrying out the identity verification operations at a point in the system that is operationally isolated from the user requesting access, thereby preventing the user from acquiring copies of the authenticating data or from tampering with the verification process.
- authenticating information such as personal codes
- FIG. 1 is a diagram of the system of the present invention
- FIG. 2 is a diagram of the Data Processing Center (DPC) and its internal data bases and execution modules;
- DPC Data Processing Center
- FIG.3 is a diagram of the retail point of sale terminal, the biometrics input apparatus and its components, and the interconnections between them;
- FIG. 4 is a flow chart of the operation of the biometrics input apparatus and the terminal for generating a request packet
- FIG. 5 is a representational diagram of the request packet and the mandatory and optional data it contains;
- FIG. 6 is a representational diagram of the response packet and the mandatory and optional data it contains;
- FIG. 7 is a flow chart depicting the data encryption and sealing process at the biometrics input device;
- FIG. 8 is a flow chart depicting the data decryption and counter party identification process at the DPC
- FIG. 9 is a flow chart depicting the data encryption and sealing process at the DPC.
- FIG. 10 is a flow chart representing the registration of an individual during the registration process
- FIG. 11 is a flow chart representing the process of identification of the individual and returning a private code to the individual;
- FIG. 12 is a flow chart of the skeleton of the processes that occur at the DPC and an execution step
- FIG. 13 is a flow chart of the emergency request and response process at the DPC;
- FIG. 14 is a flow chart of the overall operation of retail transaction authorization execution at the DPC;
- FIG. 15 is a flow chart of the overall operation of remote transaction authorization execution step at the DPC
- FIG. Id is a flow chart of the overall operation of ATM account access execution at the DPC
- FIG. 17 is a flow chart of the overall operation of issuer batch modification execution at the DPC
- FIG. 18 is a flow chart of the overall operation of secure fax submit and electronic document submit execution at the DPC
- FIG. 19 is a flow chart of the overall operation of secure fax data and electronic document data execution at the DPC;
- FIG. 20A is a representational diagram of the electronic signature request packet
- FIG. 20B is a representational diagram of the electronic signature response packet
- FIG. 20C is a representational diagram of the electronic signature verification request packet
- FIG. 20D is a representational diagram of the electronic signature verification request packet
- FIG. 21 is a flow chart of the overall operation of electronic signature execution at the DPC.
- FIG.22 is a flow chart of the overall operation of electronic signature verification execution at the DPC.
- the main objective of this invention is to provide a tokenless, secure, reliable, safe, and consistent, apparatus and method, for identifying individuals for the purpose of performing financial transactions and non-financial transmissions, which can accommodate large numbers of users. It is the essence of this invention that consumers have the ability to conduct these transactions without the use of any tokens, credit cards, badges or identification cards including drivers licenses. In order to be functional it is important that the system operate at speeds required for completing financial transactions such as credit card purchases and ATM services, from multiple banks and credit accounts. The system must be secure, such that individuals records and their biometrics information remain confidential and safe, both within the computer system that identifies the individual and authorizes transactions, or during transfer of data between the computer system and remote sites with which the computer system communicates.
- FIG. 1 Essentially a Data Processing Center (DPC) 1 is connected to various terminals 2 through various type of communication means 3 which can be one of several types.
- DPC Data Processing Center
- the DPC is also connected and communicates with independent computer networks 4.
- the DPC contains several data bases and software execution modules as shown in FIG.2. In a prefened embodiment of the invention, the data bases are backed up or "minored" for safety reasons.
- the Firewall Machine 5 is responsible for prevention of electronic intrusion of the system while the Gateway Machine 6 is responsible for carrying out all requests from the user, including adding , deleting and otherwise modifying all data bases.
- the Gateway Machine is also responsible for decryption and de-packaging of data that has arrived from the terminals using the MACM module 7, MDM module 8, and the SNM module 9.
- the PGL module 10, and the -ML module 11 are used to locate the proper personal identification code and biometrics sample basket.
- FIG.3 depicts an example of a terminal and the biometrics input device 12, which has a biometrics scanner 13, data entry means such as a key pad or PIN pad 1 , and a display panel 15.
- the biometrics scanner can be any one of finger print scanner, voice recognition, palm print scanner, retinal scanner or the like, although the fingerprint scanner will be used as an example.
- the biometrics input device is further equipped with computing modules 16, device drivers, and erasable and non-erasable memory modules.
- the biometrics input device communicates with the terminal through preferably a serial port 17.
- the terminal 2 communicates through a conventional modem 18 with the DPC 1 through request packets 19 and response packets 20 using one of the interconnecting means in FIG.
- FIG. 4 shows a representational diagram of the request packet 19 and its method of generation by the biometrics input device software.
- FIG. 5 and FIG. 6 show a representational diagram of the request packet and response packet with optional and mandatory data segments. Furthermore, it is shown which parts of the packets are encrypted and which ones are sealed.
- FIG. 7 is a block diagram of the overall process for data encryption and sealing showing the use of DUKPT key data 20 for encryption of data before appending additional data before sealing the request packet with a Message Authentication Code Key
- FIG. 8 and FIG. 9 show the decryption and encryption process at the DPC.
- FIG. 12 through 19 and 21 through 22 are block diagrams of selected examples of execution steps carried on at the DPC. Description of the drawings, diagrams, flow charts and the description of the invention, including hardware components, software components, execution modules, data bases, connection means, the data transfened between them, and the method of the invention is described in detail as follows.
- the BIA is a combination of hardware and software whose job is to gather, encode, and encrypt biometric input for use in individual identification. All actions of the BIA are directed by an outside controlling entity called a terminal, which issues commands and receives results over the BIA's serial line.
- BIA hardware comes in four basic versions: standard, wireless, integrated phone/cable television (or "CATV”)/fax, and ATM.
- CATV integrated phone/cable television
- ATM integrated phone/cable television
- Each BIA hardware variant addresses a particular need in the marketplace, and because of the differences in construction, each variant has a different level of security.
- BIA software comes in seven basic versions: personal computer (or "PC"), retail, ATM, registration, internal, issuer, and integrated remote.
- Each software load provides a different, use-specific command set. For instance, the registration software load does not accept requests to form retail transaction messages. Likewise, the retail software command set cannot send individual registration messages. To provide another layer of security, the DPC knows what software package is loaded into each BIA; any attempts by an BIA to send a message that it is normally not able to send is rejected, and treated as a major security violation.
- the ability of the invention to detect and combat merchant-based fraud relies on the fact that the BIA's external interface is strictly limited, that the construction of the BIA makes it extremely difficult to tamper with the contents, that each BIA has its unique encryption codes that are known only to the DPC, and that each BIA is only allowed to perform operations limited to its designated function.
- Each biometric input means has a hardware identification code previously registered with the DPC, which makes the biometric input means uniquely identifiable to the DPC in each subsequent transmission from that biometric input device.
- the BIA is constructed with the assumption that the controlling terminal is a source for fraud and deception. Terminals range from software applications running on personal computers to dedicated hardware/software systems developed for a particular use such as a retail point of sale. Regardless of the particular model, no BIA reveals unencrypted biometric information. BIA models without display means (such as LCD, LED, or quartz screens) must reveal selected information (such as individual private codes) to the terminal for display, and as a result those particular terminal-BIA combinations are considered to be less secure.
- BIA models are either partially or fully integrated with the terminal.
- Partially integrated devices are physically separate from the terminal, and they include wireless and standard retail point of sale BIAs.
- Fully integrated devices are contained within the physical enclosure of the terminal itsel£ for instance, an ATM or a telephone.
- Standard model has computing module (i.e., multichip modules), biometric scanner (i.e., single fingerprint scanner), display means (i.e., LCD screen), communications port (i.e., serial port) , data entry means (i.e., a manual data entry key board or PIC pad) encased in tamper-resistant case, and electronic detertion means (i.e., RF shielding).
- biometric scanner i.e., single fingerprint scanner
- display means i.e., LCD screen
- communications port i.e., serial port
- data entry means i.e., a manual data entry key board or PIC pad
- electronic detertion means i.e., RF shielding
- Standard model but serial line replaced with spread-spectrum wireless communications module using external antenna. Used in restaurant point of sale.
- BIA/Catv Has light-duty scanner, otherwise like ATM. Used in telephones, CATV remotes, and fax machines. Weakest security, both because the LCD and PIC pad are part of the terminal not the BIA, and because of the low-cost nature of the market.
- the Standard BIA hardware is a multichip module combined with a single-print scanner, an LCD screen, a serial port, and a PIC pad encased in a hard tamper-resistant case that makes attempts to penetrate obvious while also providing RF shielding for the contents.
- the following components are amalgamated into a multichip module, called the BIA Multichip Module (a process for encapsulating several processors in one physical shell, well known in the industry), constructed to protect the communications pathways between the devices from easy wiretapping.
- BIA Multichip Module a process for encapsulating several processors in one physical shell, well known in the industry
- Mask ROM is cheaper than other types of read only memory, but it is easily reverse engineered, and is not ele ⁇ ro ⁇ ically erasable. As such we only place the noncritical commonly available code here. (Mask ROM is well known in the industry). MAC calculation library
- Flash ROM is more expensive, but it is much more difficult to reverse engineer, and most importantly, it is electronically erasable. All of the more critical information is stored here. Flash ROM is used in an attempt to increase the difficulty of duplicating an BIA. (Flash ROM is well known in the industry).
- EEPROM Electrically erasable programmable read-only memory
- RAM is temporary in nature, and is lost whenever power is lost.
- Each multichip module contains a "write-once" memory location that is ineversibly set following the initialization of the flash ROM. Whenever an attempt is made to download software to the flash ROM this memory location is checked; if it is already been set, then the BIA refuses to load. This way, critical software and data keys may only be downloaded once into the device, at the time of manufacture.
- registers and keys are explicitly zeroed when a transaction is canceled. Once a transaction is completed, registers are cleared as well. Once a "form message" command is executed, biometric, PIC, and account index code registers are also cleared, along with any encryption keys that aren't required for subsequent use.
- the following associated hardware components comprise the standard BIA hardware module.
- Multichip module • optional thermite charge attached to Multichip module (known in the industry)
- Biometric-PIC Block for fraudulent means is made as difficult as possible.
- the multichip module and the components are, where practical, physically connected to each other without exposed wiring being present.
- the enclosure protecting the electronic components of the BIA is welded shut during manufacture; it cannot be opened under any circumstances without significant damage to the case.
- the BIA Upon detecting any opening (or damage) of the enclosure, the BIA performs an emergency electronic zero of any and all keys residing in flash ROM followed by all of the software libraries. Specific breech detection methods are kept confidential and proprietary.
- the case In addition to protecting the contents, the case also shields the internal operations from RF signal detectors.
- the Wireless version of BIA hardware is identical to the Standard model in construction, except that it exports a spread-spectrum wireless communications module using an external antenna instead of an external serial port.
- This version is designed to be used in restaurants, where transactions are authorized at the customer's convenience.
- items which are added to the standard set are signified by the + chararter, while items that are removed from the standard set are signified by the - character.
- the ATM version of BIA hardware is a multichip module combined with a heavy-duty single-print scanner and a serial port.
- the components are encased in a tamper-resistant case that makes attempts to penetrate obvious while also providing RF shielding for the contents.
- This version is designed to be retrofitted into ATM locations.
- the scanner pad is a heavy-duty sensor pad, and the entire construction makes use of the existing screens and keypads present in the
- the ATM since the ATM has no LCD screen or PIC keypad, it really has no need of those device drivers in the mask ROM.
- the Phone/CATV version of BIA hardware is a multichip module combined with a single-print scanner and a serial port.
- the module is physically attached to the scanner, and the whole is encased in plastic in order to make tampering more difficult.
- Some amount of RF shielding is provided for the components.
- This version is designed to be integrated with telephones, television remote controls, and fax machines. As a result, it makes use of the existing keypads and LCD or television screens to enter or display values. It also uses the communication facilities of the host terminal. For example, the fax machine uses the built-in fax modem and the television remote uses the CATV cable network.
- This hardware model is (in comparison with other models) relatively insecure, as it is intended that these devices cost as little as possible, be lightweight, and integrate easily with existing low-cost devices. Of course, higher-security versions with more complete enclosures are possible and encouraged.
- the external interface to the BIA is much like a standard modem; commands are sent to it from a controlling terminal using the external serial line. When a command completes, a response code is sent from the BIA to the terminal.
- Each BIA software load supports a different set of operations. For instance, a retail load supports only transaction authorizations, while a registration load supports individual identification and biometric registration.
- All BIA data fields are in printable ASCII, with fields separated by field separator (or "fs") control chararter, and records separated by newlines. Encrypted fields are binary converted to 64-bit ASCII using the base-64 conversion library (all known in the industry).
- Some commands are not available in some configurations. For instance, the ATM BIA cannot "Get PIC", since there is no attached PIC pad. Instead, the ATM BIA supports a "Set PIC” command.
- the "cancel” button has been pushed, and the entire operation has been canceled. This has the side effect of clearing all information which was gathered. A message to that effect will be displayed on the LCD screen, if available.
- Each command may have specific other response codes which are valid only for it. These response codes will generally have text accompanying the code, which will be displayed on the LCD screen if it is available.
- This command selects from one of a number of different languages encoded within the BIA for prompting for user input.
- the message "Please place finger on lighted panel" is displayed on the LCD panel and returned to the terminal.
- the scanner pad is illuminated, prompting the individual to enter his biometric.
- a ⁇ time> value of zero means that there is no limit to the time for biometric scan input.
- a fingerprint scan is taken and given a preliminary analysis by the print quality algorithm. If the scan is not good enough, the BIA continues to take new scans until ⁇ time> seconds pass.
- the print's minutiae are then extracted by the print encoding algorithm. Only a subset of the minutiae are selected at random, with care taken to retain enough sufficient for identification. These minutiae are then ordered randomly, and are placed in the Encoded Biometric Register.
- the BIA responds with the success result code.
- This command requests the BIA to fill the PIC Register by reading from the keypad.
- the message "Please enter your PIC, then press ⁇ enter>” is displayed on the LCD display and sent to the terminal, the appropriate keypad lights are turned on, and then keypad scanning begins. Scanning terminates when either ⁇ time> number of seconds runs out, or when the individual hits the "enter" key.
- the message "Now enter your account index code, then press ⁇ enter>” is displayed on the LCD and sent to the terminal. This prompts the individual to enter his account index code. When each key is pressed, that value appears on the LCD panel. The conection button can be pressed to erase one of the values. When the "enter” button is pressed, the Account index code register is set.
- the appropriate keypad keys are lit, and when input is concluded, the keypad lights are turned off. If successful, the command returns OK.
- the message "Please enter your title index code, then press ⁇ enter>” is displayed on the LCD and sent to the terminal. This prompts the individual to enter his title index code. When each key is pressed, that value appears on the LCD panel. The conection button can be pressed to erase one of the values. When the "enter” button is pressed, the Title Index Code register is set.
- the appropriate keypad keys are lit, and when input is concluded, the keypad lights are turned off. If successful, the command returns OK.
- the Validate Amount command sends the message "Amount ⁇ amount> OK?" to the terminal, and displays it on the LCD screen. If the individual confirms the amount by hitting the "yes” (or enter) button, the Amount
- the Register is set to ⁇ amount>.
- the ⁇ amount> value must be a valid number, with no control characters or spaces, etc.
- the yes, no, and cancel buttons are lit. Once prompting is complete, all the lights are turned off.
- the Enter Amount command sends the message "Enter amount” to the terminal, and also displays it on the LCD screen as well. The individual must then enter the dollar amount himself. Each character entered is displayed on the LCD screen. All appropriate buttons are lit. If the enter button is hit, the Amount Register is set to be the value entered on the keyboard. Once entry is complete, all the lights are turned off.
- Validate Document ⁇ name> ⁇ time>
- the Validate Document command sends the message
- ⁇ register> to have the value ⁇ text>. This is used to set information such as the merchant code, the product information, and so on.
- the Get Message Key command causes the BIA to generate a
- the form message command instructs the BIA to output a message containing all the information it has gathered. It also checks to make sure that all the registers appropriate to that specific message ⁇ type> have been set. If all required registers are not set, the BIA returns with an enor. The specific command set software will determine which messages can be formed by that BIA model; all others will be rejected.
- Each message includes a transmission code consisting of the
- the transmission code allows the DPC to identify the sending BIA and to detect resubmission attacks.
- the BIA uses the DUKPT key management system to select the biometric-PIC block encryption 56-bit DES key from the Future Key
- This key is then used to encrypt the Biometric-PIC Block using cipher block chaining (CBC).
- CBC cipher block chaining
- a response DES key is also generated randomly, and is used by the DPC to encrypt the portions of the response that need to be encrypted.
- the Biometric-PIC block consists of the following fields: 300-byte authorization biometric
- the message key is only present if the controlling terminal has requested a message key for this message. It is up to the controlling terminal to encrypt any message body attached to the transaction authorization request using the message key.
- the BIA outputs the body of the appropriate request message (such as a Transaction Authorization Request message), terminated by and protected with the Message Authentication Code (MAC).
- MAC Message Authentication Code
- the MAC field is calculated using the BIA's secret 112- bit DES MAC key, and covers all message fields from first to last.
- the MAC assures the DPC that nothing in the message has changed effectively sealing the message, while still allowing the plaintext fields to be inspected by the controlling terminal.
- the BIA When the Form Message command is done, the BIA sends the message "I'm talking to DPC Central" to the terminal as well as displaying it on the LCD screen, indicating that work is proceeding on the request.
- the command returns OK in addition to returning the entire formed message upon completion of the command.
- Show Response ⁇ encrypted response> ⁇ time>
- the Show Response command instructs the BIA to use its cunent Response Key to decrypt the private code from the system.
- This command is used by a terminal during a secure network communications session to ask the individual to validate a message from an outside source.
- the message comes encrypted and in two parts: the challenge, and the response.
- the BIA Upon receipt of a Validate Private command, the BIA displays the text of the challenge message as in "OK ⁇ challenge>? " on the LCD screen, but does not send this to the terminal.
- the response is encrypted by the BIA using the Private Session Key, and then returned to the terminal along with the OK response code. If the individual does not validate the challenge, then the BIA returns with a "failed” response code, along with the text "transaction canceled at your request," which is also displayed on the LCD screen.
- the Reset command instructs the BIA to clear all temporary registers, the LCD screen, all temporary Key registers, and to turn off all keypad lights that may be on.
- This command assigns the BIA's PIC Register to be ⁇ value>.
- This command assigns the BIA's Account index code Register to be ⁇ value>.
- This command assigns the BIA's Title Index Code Register to be ⁇ value>.
- This command assigns the BIA's Amount Register to be ⁇ value>.
- the Decrypt Response command instructs the BIA to use it's cunent Response Key to decrypt the encrypted portion of the response message. Once decrypted, the response is returned to the controlling device, presumably for display on the ATM terminal's LED screen. Note that providing this decryption ability is a security problem, as once the plaintext leaves the BIA, the terminal has the ability to do with it what it will.
- the BIA software is supported by several different software libraries. Some of them are standard, generally available libraries, but some have special requirements in the context of the BIA.
- the BIA is constantly selecting random DES keys for use in the message body and message response encryption, it is important that the keys selected be unpredirtable keys. If the random number generator is based on time of day, or on some other externally-predictable mechanism, then the encryption keys will be much more easily guessed by an adversary that happens to know the algorithm. In order to assure the security of the encryption techniques used in the BIA, it is assumed that both the random number generator algorithm as well as the encryption algorithms are both publicly known.
- a standard random number algorithm for generating DES keys is defined in ANSI X9.17, appendix C (known in the industry).
- the biometric encoding algorithm is a proprietary algorithm for locating the minutiae that are formed by ridge endings and bifurcations on human fingertips. A complete list of minutiae is stored in the DPC as a reference, while only a partial list is required by the algorithm when performing a comparison between an identification candidate and a registered individual.
- the BIA is a realtime computing environment, and as such requires a realtime embedded operating system to run it.
- the operating system is responsible for taking interrupts from devices and scheduling tasks.
- Each device driver is responsible for the interface between the operating system and the specific hardware, such as the PIC pad device driver, or the CCD Scanner device driver.
- Hardware is the source for events such as "PIC pad key pressed", or "CCD Scanner scan complete”.
- the device driver handles such interrupts, interprets the events, and then takes action on the events.
- DES implementations There are any number of DES implementations publicly available. DES implementations provide a secret key-based encryption from plaintext to ciphertext, and decryption from ciphertext to plaintext, using 56-bit secret keys.
- Public Key encryption support libraries are available from Public Key Partners, holders of the RSA public key patent (known in the industry).
- Public Key cryptosystems are asymmetric encryption systems that allow communication to take place without requiring a costly exchange of secret keys.
- a public key is used to encrypt a DES key, and then the DES key is used to encrypt a message.
- the BIA uses public key cryptosystems to provide for the secure exchange of secret keys.
- the invention uses public key cryptography for communications security and short-lived credential exchange, and not long-term storage of secrets.
- Both the end-user individual and the bank are identified by the DPC to create the network credential.
- the network credential includes the end-user individual's identification as well as the context of the connection (i.e., the TCP/IP source and destination ports).
- the derived unique key per transaction key (DUKPT) management library is used to create future DES keys given an initial key and a message sequence number. Future keys are stored in a Future Key Table. Once used, a given key is cleared from the table. Initial keys are only used to generate the initial future key table. Therefore the initial key is not stored by the BIA
- DUKPT is designed to create a key management mechanism that provided a different DES key for each transaction, without leaving behind the trace of the initial key. The implications of this are that even successful capture and dissection of a given future key table does not reveal messages that were previously sent, a very important goal when the effective lifetime of the information transmitted is decades.
- DUKPT is fully specified in ANSI X9.24 (known in the industry). DUKPT was originally developed to support PIC encryption mechanisms for debit card transactions. In this environment, it was critical to protect all transactions. An assumption is made that a criminal records encrypted transactions for a six month period, and then Captures and successfully extracts the encryption code from the PIC pad. The criminal could then manufacture one new counterfeit debit card for each message that had been transmitted over that six month period.
- the BIA/Retail software interface exports an interface that allows specific retail point of sale terminals to interact with the system.
- the BIA/Retail interface is designed to allow the terminal to perform the following operation:
- the BIA/Retail provides the following command set:
- the BIA/CATV software interface exports a command set that allows terminals integrated with a Phone CATV BIAs to interact with the system. The following operation is supported:
- the BIA/CATV provides the following command set:
- the BIA/Fax software interface exports a command set that allows terminals integrated with a fax BIA to interart with the system.
- the following operations are supported:
- the BIA/Fax provides the following command set:
- the BIA/Reg software interface exports an interface that allows general purpose computers to interart with the system to identify and register individuals. The following operations are supported: 10
- the BIA Reg provides the 15 following command set:
- the BIA/PC software interface exports a command set that allows general purpose computers to send, receive, and sign electronic
- the BIA/PC provides the following command set:
- the BIA/Iss software interface exports an interface that allows general purpose computers to interart with the system to authenticate and submit batch change requests. The following operation is supported:
- the BIA/Iss provides the following command set:
- the BIA/Int exports a command set that allows general purpose computers to interart with the system to identify individuals. The following operation is supported:
- the BIA/Int provides the following command set:
- the BIA/ATM software interface exports a command set that allows ATMs to identify individuals. The following operation is supported: Account Access
- the BIA/ATM provides the following command set:
- the terminal is the device that controls the BIA and connects to the DPC via modem, X.25 connection, or Internet connection — methods well-known to the industry. Terminals come in different shapes and sizes, and require different versions of the BIA to perform their tasks. Any electronic device, which issues commands to and receives results from the biometric input device, can be a terminal. Some terminals are application programs that run on a general purpose microcomputer, while other terminals are combinations of special purpose hardware and software.
- the system While the terminal is critical for the functioning of the system as a whole, the system itself places no trust in the terminal whatsoever. Whenever a terminal provides information to the system, the system always validates it in some manner, either through presentation to the individual for confirmation, or by cross-checking through other previously registered information.
- biometric identification information including the biometric, the PIC, encryption keys, or account index codes.
- Integrated BIA/ATM with ATM software load provides biometric-PIC access to ATM cash dispensers.
- Standard BIA with Registration software load attached to a microcomputer provides banks with the ability to register new individuals with the system along with their financial asset accounts and other personal information.
- Standard BIA with PC software load attached to a microcomputer provides individuals with the ability send, receive, archive, reject, and track certified email messages.
- BIA/catv with CATV software load attached to the CATV broadband provides individuals with biometric-television (or "TV”) remotes with the ability to authorize television shopping purchases.
- Standard BIA with personal computer software load attached to a microcomputer provides individuals with the ability to construct and verify electronic signatures on documents.
- Standard BIA with personal computer software load attached to a microcomputer provides individuals with internet connections the ability to purchase products from a merchant that is connected to the Internet.
- Standard BIA with Issuer software load attached to a microcomputer provides banks with the ability to send batched changes of asset accounts to the DPC.
- ITT Internet Teller Terminal
- Standard BIA with personal computer software load attached to a microcomputer with an internet connection provides individuals with the ability to perform transactions with their favorite Internet Bank.
- BIA/catv with CATV software load integrated with a telephone provides individuals with the ability to authorize transactions over the telephone.
- RPT Retail Point of Sale Terminal
- Standard BIA with Retail software load attached to an X.25 network or using a modem allows an individual to purchase items using transaction authorizations in a store.
- BIA/catv with Fax software load integrated with a fax machine provides individuals with the ability to send, receive, rejert archive, and track secured fax messages.
- Terminal Retail Point of Sale Terminal
- the purpose of the RPT is to allow individuals to purchase items at a store without having to use either cash, check, or a debit or credit card.
- the RPT uses a BIA/Retail to authorize financial transactions from an individual to a merchant.
- the RPT provides standard debit and credit card scanning functions as well.
- RPT will also consist of standard credit and debit magnetic stripe card readers, as well as optional smart card readers too.
- Each RPT is connected to the DPC by a modem, an X.25 network connection, an ISDN connection, or similar mechanism.
- the RPT may also be connected to other devices, such as an electronic cash register, from which it obtains the amount of the transartion and the merchant code.
- the RPT consists of: an BIA/Retail an inexpensive microprocessor 9.6 kb modem/X.25 network interface hardware merchant identification code number in non-volatile RAM a DTC serial port for connecting to the BIA magnetic stripe card reader (known in the industry) ECR (electronic cash register) connection port optional smart card reader (known in the industry) 1.4.2.3. Identification
- the individual is identified by the biometric-PIC, and the merchant is identified by the DPC, which cross-checks the merchant code contained in the BIA's VAD record with the merchant code added to the transartion request by the RPT.
- the merchant enters the value of the transartion into his electronic cash register. Then, the individual enters his biometric-PIC, his account index code, and then validates the amount.
- the RPT then adds the product information and the merchant code to the BIA, instructs the BIA to construct the transaction, and then sends the transaction to the DPC through its network connection (modem, X.25, etc).
- the DPC When the DPC receives this message, it validates the biometric-PIC, obtains the account number using the index code, and cross-checks the merchant code in the message with the registered owner of the BIA. If everything checks out, the DPC forms and sends a credit/debit transaction to execute the exchange. The response from the credit/debit network is added to the private code to form the transaction response message, which the DPC then sends back to the RPT. The RPT examines the response to see whether or not the authorization succeeded, and then forwards the response to the BIA, which then displays the individual's private code, concluding the transaction.
- MAC MAC-based Security
- the MAC allows the RPT to review the unencrypted parts of the message, but the RPT cannot change them. Encryption prevents the encrypted part of the message from being disclosed to the RPT.
- Each retail BIA must be registered to a merchant. This helps to discourage BIA theft.
- the RPT adds the merchant code onto each message, replacing a merchant's BIA with a different BIA is detected by the cross-check performed at the DPC.
- Terminal Internet Point of Sale Terminal
- PT Point of sale Terminal
- the Internet simply represents a general purpose network where a merchant, the DPC, and the IPT can all connect to each other in real time. As a result, this mechanism would work exactly the same on any other general purpose network.
- the IPT consists of:
- the IPT In addition to identifying the individual, the IPT must also identify the remote merchant who is the counterparty to the transaction. The merchant must also identify both the DPC and the IPT.
- the Internet Shopper program stores the hostname (or other form of net name) of the merchant from which the purchase is taking place in order to verify the merchant's identity. Since the merchant registers all of his legitimate internet hosts with the DPC, this allows the DPC to cross-check the merchant code with the merchant code stored under that hostname to verify the merchant's identity. 1.4.3.4. Operation
- the IPT connects to the merchant using the Internet. Once a connection is established, the IPT secures it by generating and then sending a Session Key to the merchant. In order to assure that the session key is protected from disclosure, it is encrypted with the merchant's Public Key using Public Key Encryption. When the merchant receives this encrypted Session Key, he decrypts it using his Private Key. This process is called securing a connection through a Public Key Encrypted secret key exchange.
- the IPT downloads the merchant code, and both price and product information from the merchant. Once the individual is ready to make a purchase, he selects the merchandise he wishes to buy. Then, the individual enters the biometric-PIC using the BIA/PC, the IPT sends the merchant code, the product identification information, and the amount to the BIA, and instructs it to construct a Remote Transaction Authorization request. Then the IPT sends the request to the merchant via the secure channel.
- the merchant is connected to the DPC via the same sort of secure connection that the IPT has with the merchant, namely, using Public Key Encryption to send a secure session key. Unlike the IPT- merchant connection, however, merchant-DPC session keys are good for an entire day, not for just one connection.
- the merchant connects to the DPC, securing the connection using the session key, forwarding the transaction to the DPC for validation.
- the DPC validates the biometric-PIC, cross-checks the merchant code contained in the request with the merchant code stored under the hostname that was sent in the request, and then sends a transartion to the credit/debit network. Once the credit/debit network responds, the DPC constructs a reply message including the credit/debit authorization, an encrypted private code, and the address of the individual, and sends that message back to the merchant.
- the merchant receives the reply, it copies the individual's mailing address out of the reply, makes note of the authorization code, and forwards the reply message to the IPT.
- the IP T hands the reply to the BIA, which decrypts the private code and displays it on the LCD screen, indicating that the DPC recognized the individual.
- the IPT also shows the result of the transaction as well, be it success or failure.
- Terminal Internet Teller Terminal
- the Internet Teller Terminal is used to identify individuals for internet banking sessions.
- the DPC, the bank's computer system, and the individual are all connected to the Internet.
- the second is providing unimpeachable identity credentials to the internet bank. Once both are accomplished, the ITT can provide a secure internet banking session.
- the BIA's challenge-response verification capability is used to provide additional security for all high-value and/or inegular transactions. 1.4.4.2. Construction
- the ITT consists of:
- the ITT accepts biometric identification using an BIA/PC connected to the microcomputer serving as the individual's Internet terminal.
- the network credential includes the individual's identification as well as the context of the connection (i.e., the TCP/IP source and destination ports).
- the DPC identifies the bank by cross-checking the code that the bank sends to the ITT with the bank's hostname that the ITT sends to the DPC.
- the ITT connects to the internet bank, making sure that the bank has the computing resources required to handle a new session for the individual. If the bank has sufficient resources, it sends back the bank identification code to the ITT.
- the ITT instructs the BIA to obtain the biometric-PIC and the account index code from the individual. Then the
- ITT adds both the bank's hostname as well as the bank code. Using all this information, the BIA is then asked to form a network credential request message which the ITT sends to the DPC via the Internet.
- the DPC When the DPC receives this message, it validates the biometric- PIC, obtains the account number using the index code, and makes sure that the bank code from the message matches the bank code stored under the bank's hostname in the Remote Merchant database. The DPC also checks to make sure that the account number returned by the index code belongs to the bank as well. If all checks out, then the DPC creates a network credential using the individual's account identification, the time of day, and the bank code. The DPC signs this credential using Public Key Encryption and the DPC's Private Key. The DPC retrieves the bank's public key, and the individual's private code, and with the credential forms the network credential response message.
- the response message is encrypted using the BIA response key, and is then sent back to the ITT.
- the ITT receives the response, it hands the response message to the BIA.
- the BIA decrypts and then displays the individual's private code on the LCD screen.
- the bank's public key is stored in the Public Key register. Two random session keys are generated by the BIA
- the first key, called the Shared Session Key is revealed in plaintext to the ITT.
- the ITT uses this shared session key to secure the connection with the bank.
- the other session key is not shared with the ITT. It is used for the BIA's challenge-response mechanism, a mechanism that allows the bank to obtain specific validation for non-routine transactions straight from the individual, without involving the (untrustworthy) ITT.
- the ITT After receiving the Shared Session Key, the ITT asks the BIA to form a Secure Connection Request message, which includes both session keys and the network credential, and are all encrypted with the bank's public key. The ITT then sends the Secure Connection Request message to the bank.
- the bank When the bank receives the request message, it decrypts the message using its own Private Key. Then, it decrypts the actual network credential using the DPC's public key. If the network credential is valid and has not expired (a credential times out after a certain number of minutes), the individual is authorized, and the conversation continues, with the session key used to ensure security.
- the bank may wish to ask the individual to validate those transactions for extra security. To do so, the bank sends a challenge-response message encrypted with the Private Session Key to the ITT, which forwards that challenge-response message to the BIA.
- the BIA decrypts the message, displays the challenge (usually of the form "Transfer of $2031.23 to Rick Adams OK?"), and when the individual validates by hitting the OK button, the BIA re-encrypts the response with the Private Session Key and sends that message to the ITT, which forwards it to the bank, validating the transaction.
- the system makes use of public key cryptography to both provide credentials and to secure communications between the ITT and the bank.
- the bank must know the DPC's public key, and the DPC must know the bank's public key. It is critical to the security of the system that both parties keep the respective public keys secure from unauthorized modification. Note that public keys are readable by anyone, they just cannot be modifiable by anyone. Of course, any session or secret keys must be kept secure from observation, and those secret keys must be destroyed after the session has ended. The extra validation step for non-routine transactions is necessary because of the relative difficulty involved in securing personal computer applications on the Internet due to viruses, hackers, and individual ignorance. Banks should probably restrict routine money transfers available to ITT's to include only money transfers to well-known institutions, such as utility companies, major credit card vendors, and so on.
- Terminal Electronic Signature
- the electronic signature terminal (EST) is used by individuals to generate electronic signatures that cannot be forged for electronic documents.
- the EST either allows individuals to sign electronic documents, or verifies electronic signatures already on such documents. 1.4.5.2. Construction
- the EST consists of:
- the EST uses an BIA/PC attached to a microcomputer, with events controlled by an electronic signature software application.
- the document to be signed needs to be uniquely identified, the time of day needs to be recorded, and the individual performing the signature needs to be identified. This links the document, the individual, and the time, creating a unique time stamped electronic signature.
- the document to be signed is processed by a message digest encoding algorithm that generates a message digest code.
- a message digest encoding algorithm that generates a message digest code.
- One such algorithm is the MD5 algorithm by RS A, which is well known in the industry.
- message digest algorithms are specifically designed so that it is almost impossible to come up with another document that generates the same message digest code.
- the individual enters his biometric-PIC using the BIA, the message digest code is handed to the BIA, the name of the document is added, and the resulting Digital Signature request message is sent to the DPC for authorization and storage.
- the DPC When the DPC receives the request, it performs a biometric identity check, and once the individual is verified, it collects the message digest encoding, the individual's biometric account number, the cunent time of day, the name of the document, and the identification of the BIA that gathered the signature, and stores them all in the Electronic Signatures Database (ESD). The DPC then constructs a signature code text string that consists of the ESD record number, the date, the time, and the name of the signer, and sends this signature code along with the individual's private code back to the EST.
- ESD Electronic Signatures Database
- the document is sent through the MD5 algorithm (known in the industry), and the resulting value together with the electronic signature codes are given to the BIA along with the requesting individual's biometric-PIC, and the message is sent to the DPC.
- the DPC checks each signature for validity, and responds as appropriate.
- the BIA doesn't encrypt any of the data relating to electronic signatures, so document titles along with specific MD5 values are sent in plaintext. The same situation holds true for signature validations.
- Terminal Certified Email Terminal
- the purpose of the Certified Email Terminal is to provide individuals a way of delivering electronic messages to other individuals in the system while providing for identification of sender, verification of both receipt and recipient, and assuring confidentiality of message delivery.
- the CET uses a BIA/PC to identify both the sender and the recipient. Security is established by encrypting the message, and then by encrypting the message key using the sender's BIA during the upload, and then decrypting the message key using the recipient's BIA during the download. 1.4.6.2. Construction
- Both the transmitter and the recipient CET consists of: a BIA a microcomputer a modem, an X.25 connection, or an Internet connection the ability to receive email a certified electronic mail application
- a CET is actually a microcomputer with an electronic mail application and a network connection which invokes the BIA to generate biometric-PIC authorizations to send and receive certified electronic mail.
- the sender identifies himself using his biometric-PIC when he uploads the message to the DPC.
- Each recipient the sender wishes to send the document to is identified either by biometric account identification number, or by fax number, and extension.
- a recipient In order for a recipient to download the message, he identifies himself using his biometric-PIC. This procedure resembles a person-to-person telephone call.
- Message delivery starts with an individual uploading a document or message, and identifying himself using his biometric-PIC. The individual then verifies the name of the document, and the email message is encrypted and uploaded.
- the sender receives a message identification code that can be used to request the cunent delivery status of the document to each of the recipients.
- the DPC sends an electronic mail message to each recipient, notifying them when a certified message has arrived. Once the recipient receives the notification, the recipient may at his leisure either choose to accept or refuse that message or a group of messages by submitting his biometric-PIC and having it validated by the DPC.
- a document is removed after a predetermined period, generally 24 hours.
- Individuals wishing to archive the document, along with an indication of all of the individuals to whom the message was sent may submit message archival requests prior to the deletion of the message.
- the document is proterted from disclosure en route.
- the CET accomplishes this using the 56-bit Message Key generated by the BIA. Since the BIA takes responsibility for encrypting the Message Key as part of the biometric-PIC, the encryption key is securely sent to the DPC.
- the message key is sent encrypted along with the private code, to allow the recipient to decrypt the message. Note that it is fine to have all recipients have this message key, as they all receive the same message.
- Terminal Secure Fax Terminal
- the purpose of the secure fax terminal is to provide individuals a way of delivering fax messages to other individuals in the system while providing for identification of sender, verification of both receipt and recipient, and assuring confidentiality of message delivery.
- Each SFT uses an integrated BIA/catv to identify both the sender and the recipient. Communications security is accomplished through encryption.
- Both the transmitter and the recipient SFT consists of:
- a SFT is a fax machine connected to the DPC via a modem.
- the system treats faxes as just another type of certified electronic mail.
- the receiving site is identified by phone number. This phone number is registered with the DPC. For secured- confidential faxes, each recipient is identified with the phone number and the extension.
- Unsecured faxes are equivalent to a standard fax.
- the sender enters the phone number of the recipient site, and sends the fax. In this case, the sender remains unidentified, and the fax is sent to a given phone number in the hopes that it will be delivered to the proper recipient.
- An SFT marks the top line on all such unsecured faxes prominently as being "UNSECURED”. All faxes received from non- SFT fax machines are always marked as being unsecured.
- a sender-secured fax the sender selects the "sender- secured" mode on the fax machine, enters their biometric-PIC followed by their title index code.
- the fax machine then connects to the DPC, and sends the biometric-PIC information.
- the individual then sends the fax by feeding the document into the fax scanner. In this case, the fax is actually sent to the DPC, which stores the fax digitally.
- the DPC commences sending the fax to each destination, labeling each page with the name, title, and company of the sender, along with the banner of "SENDER-SECURED" at the top of each page.
- the sender selects the "secured" mode on the fax machine, enters their biometric-PIC followed by their title index code, and then enters the phone numbers of the recipients. Once the system verifies the sender's identity and each of the recipients phone numbers, the individual then sends the fax by feeding the document into the fax scanner.
- the fax is then sent to the DPC, which stores the fax digitally. Once the entire fax arrives at the DPC, the DPC sends a small cover page to the destination indicating the pending secured fax, the sender's title and identity, as well as the number of pages waiting, along with a tracking code. This tracking code is automatically entered into the memory of the recipient's fax machine.
- any employee of the recipient company can select the "retrieve fax" button on his fax machine, select which pending fax to retrieve by using the tracking code, and then enter biometric-PIC. If the fax is unwanted, the individual may press the "reject fax” button, though he must still identify himself to the system in order to do this. Once validated as a member of the company, the fax is then downloaded to the recipient's fax machine. Each page has "SECURED” on the top of each page, along with the sender's identity and title information.
- the sender selects the "secured-confidential" mode on the fax machine, enters his biometric- PIC followed by his title and index code, and then enters the phone number and system extension of each recipient.
- the DPC verifies the sender's identity and each of the recipients phone numbers and extensions, the individual then sends the fax by feeding the document into the fax scanner.
- the fax is sent to the DPC, which stores the fax digitally. Once the entire fax arrives at the DPC, the DPC sends a small cover page to each destination indicating the pending secured- confidential fax, the sender's title and identity, the recipient's title and identity, as well as the number of pages waiting, along with a tracking code. This tracking code is automatically entered into the memory of the recipient's fax. However, the only individual that can retrieve the fax is the individual whose extension code is indicated.
- This individual selects the "retrieve fax” button, selects the pending fax to retrieve, and then enters his biometric-PIC. Once validated as the recipient, the fax is then downloaded to the recipient's fax machine. Each page has "SECURED-CONFIDENTIAL" on the top of each page, along with the sender's title and identity information.
- This fax is processed identically to the secured- confidential fax in terms of the actual delivery of the fax to the recipients, except that the fax is titled "contract" instead of secured- confidential.
- the DPC automatically archives contract faxes. Any recipient may accept or rejert the contract through the SFT subsequent to receiving the contract fax. Hence with the option, the DPC performs the role of an electronic notary. Any fax that is sent to the system and then forwarded to the recipient may be sent to any number of recipients without tying up the sending fax machine.
- the tracking number of any fax sent is entered into the memory of the fax machine; a status report on any ongoing fax can be generated at the sending machine by selecting the "status" button and then selecting the particular fax pending tracking code.
- the DPC issues a report that is immediately sent to the sending fax machine detailing the state of the sending for each recipient.
- any secured or secured-confidential fax an option exists for either the sender or one of the recipients to archive the fax (along with the specifics as to who sent and received the fax) for future reference. To this end, any secured fax is retained for some time period (i.e., 24 hours) following successful delivery.
- An archival tracking code is returned to the individual whenever an archive is requested. This archival code is used to retrieve faxes and fax status reports archived with the system.
- Archived faxes are placed on read-only secondary storage after some time period (i.e., 24 hours). Retrieving an archived fax requires human intervention, and may take up to 24 hours to perform.
- the SFT system works hard to assure the recipient of the sender's identity, and it works just as hard to assure the sender that the recipient actually acknowledged receipt of the document.
- the fax terminal encrypts the fax using the Message Key facility provided by the BIA. Since the BIA takes responsibility for encrypting the Message Key as part of the biometric-PIC, the encryption key is securely sent to the DPC. When an individual receives a secured fax of any type, the message key is sent encrypted along with the private code, to allow the recipient to decrypt the message. Note that it is fine to have all recipients have this message key, as they all receive the same message. 1.4.7.6. Notes
- Sending secured faxes is very similar to sending electronic mail, and reuses much of the same software.
- fax terminals that do not have integral BIA/fax devices but that have a port suitable for attaching an external BIA/pc and software appropriate for using the BIA.
- the purpose of the Biometric Registration Terminal is to register new individuals including their biometric-PIC, mailing address, private code, electronic mail addresses, a list of titles and title index codes used to send and receive electronic messages and faxes, and a list of financial asset accounts and account index codes that they can access, all using their biometric-PIC.
- the objective of the enrollment process is to obtain personal information from an individual at the location of a responsible institution where that information can be validated. This includes, but is not limited to retail banking outlets, and corporate personnel departments. Each participating responsible institution has one BRT that is used by a group of employees who have been authorized to perform registrations. Each employee is accountable for each individual registered.
- the BRT uses an attached BIA/Reg for biometric entry, and is connerted to the system by a 9.6kb modem or an X.25 network connection (known in the industry).
- Biometric registration terminals are located in places that are physically secure such as retail banking outlets.
- BIA/Reg Three entities need to be identified for the DPC to respond positively to an BIA/Reg registration request: the registering employee, the institution, and the BIA/Reg.
- the employee must have been authorized to register individuals for that institution.
- the institution and the BIA are identified by cross-checking the owner of the BIA with the institution code set by the BRT.
- the employee identifies himself to the system by entering his biometric- PIC upon starting the registration application.
- the institution uses its standard customer identification procedure (signature cards, employee records, personal information, etc) before registering the individual on the system. It is important for the institution to verify individual identity as assiduously as possible, since the registering individual will be empowered to transfer money from those accounts at will, and/or send electronic messages using the name of the company.
- the individual During registration, the individual enters both a primary and secondary biometric. The individual must use both index fingers; if the individual is missing index fingers, the next inner-most finger may be used. Requiring specific fingers to be used allows the prior fraud check to work.
- the individual is encouraged to select a primary and a secondary finger; the primary finger is given preference during the DPC identity check, so the individual should present the most-often used finger as the primary.
- the DPC could choose to alter the designation of primary and secondary biometrics based on operations if it turns out to be important to do so.
- the BIA/R determines if the individual has entered "a good print.” Note that there are some individuals whose jobs result in the accidental removal of their nngerprints, such as individuals who work with abrasives or acids. Unfortunately, these individuals cannot use the system. They are detected at this stage in the process and informed that they cannot participate.
- the individual selects a PIC of from four to twelve digits from a series of PIC options provided by the system's central database.
- the PIC must be validated by the system. This involves two checks: one, that the number of other individuals using the same PIC arent too great (since the PIC is used to reduce the number of individuals checked by the biometric comparison algorithm) , and that the individual being registered isn't too "close", biometrically speaking, with other individuals within the same PIC group. If either happens, the enrollment is rejected, an enor message is returned to the BRT, and the individual is instructed to request a different PIC.
- the system may optionally return with an "identical match" enor condition, which indicates that the individual already has a record in the system under that PIC.
- a PIC of 0 allows the system to assign a PIC to the individual.
- the individual constructs a confidential private code consisting of a word or phrase. If the individual does not wish to construct one, a private code will be constructed randomly by the terminal. The individual may also anange their financial asset code list.
- This list describes which account index code points at which account (i.e. 1 for debit, 2 for credit, 3 for emergency debit, etc). Note that this can only occur if the registering institution is a bank, and only if the accounts are owned by that particular banking institution. Even after registration, an individual is not actually able to perform operations using the system until a prior fraud check is completed. This generally takes a few minutes, but during times of high load, it takes up to several hours. Only if the system finds no instance of prior fraud is the individual's account activated.
- the DPC institutes a database-wide involuntary biometric database search for the criminal. Several of these are performed each night, so individuals who are particularly wanted by the system are winnowed out of the database by using a time consuming process during conditions of light activity.
- the employees performing the registration operation identify themselves using biometric-PIC only when initially activating the registration system. This is a convenience for the employee, but a possible security problem for the system, as unattended or "temporarily bonowed" BRTs could be the source for fraud. As a result, the registration application exits after a predetermined period of no activity.
- CST customer service terminal
- the purpose of the customer service terminal (CST) is to provide internal DPC support personnel access to the various aspects of the system databases. Support people need to answer inquiries by individuals, issuers, institutions, and merchants that are having trouble with the system.
- the CST consists of:
- Each CST is connerted to the system via a high speed local area network connection such as token ring, ethernet, fiber (FDDI), etc.
- Each CST has the capability to query each of the databases, and display the results of these queries.
- the CST only displays fields and records based on the privilege of the individual terminal user. For instance, a standard customer service employee won't be able to see the encryption code for a given BIA's VDB record, though they can see which merchant or individual cunentiy owns that BIA. 1.4.9.3.
- the individual and the BIA must be identified by the system.
- the individual's privilege level must also be determined, so that the database can restrict access appropriately.
- An individual using a CST starts a session by providing identification by entering their biometric-PIC.
- the BIA constructs an Identification Request message, and send it to the DPC for verification. Once the system verifies the individual, the CST application can operate normally, though limited by the individual's previously assigned DPC privilege level.
- the DPC will terminate a connection to the CST appUcation after a predetermined idle time period.
- the CST encrypts all traffic between the CST and the database. To do this, the CST generates a session key that is sent to the server during the login session with the system. This session key is used to encrypt and decrypt all communications with the DPC that occur during the period.
- the DPC makes certain that DPC data fields that are not accessible to the individual operating the CST are not sent to the CST's database application. Likewise, at no time do any CST personnel have access to or permission to modify individual biometric information.
- the DPC and the support center can be co-located, or because of the fairly tight security sunounding the CST itself, the support center can be split off on its own.
- the purpose of the issuer terminal is to allow employees at issuing banks to submit batch asset account modification operations to the
- the IT consists of:
- the Issuer Terminal uses an issuer BIA to authorize mass additions and deletions of financial asset information.
- the bank In this operation, the bank must be identified, a properly- authorized bank employee must be identified, and all of the individuals whose asset accounts are being added or removed must also be identified.
- the bank is responsible for identifying the individuals who wish to add their accounts at that bank to their asset account list. As in biometric registration, this is done by the bank using signature cards and personal information.
- the DPC identifies the bank by cross-checking the issuer code submitted by the IT with the issuer code registered in the VAD record of the BIA/Iss. A biometric-PIC is used to identify the bank employee actually submitting the batch. 1.4.10.4. Operation
- this identification code and account list are forwarded to the IT for subsequent batch submission to the system.
- the IT instructs the IT to upload the batched account additions/deletions to the DPC.
- the authorized individual enters his biometric-PIC
- the IT adds a session key, adds the bank's issuer code, and from that the BIA/Iss constructs an Issuer Batch Request message that the IT then forwards to the DPC.
- the IT encrypts the batch using the
- the system When the system receives the Issuer Batch Request, it validates that the BIA is an BIA Iss, that the BIA/Iss is registered to the bank claimed by the issuer code, and that the individual identified in the biometric-PIC is allowed to submit batch requests to the DPC for that
- the DPC processes all the requests, keeping track of enors as required. Once done, the DPC returns the individual's private code, along with an encrypted batch containing any enors that occuned during processing.
- the bank must ensure that the IT is physically secure, and that only authorized individuals are allowed to access it.
- Requiring an individual to submit the batch provides for a responsible human to be "in the loop" whose job it is to make sure that proper bank security measures have been followed in the construction and submission of the batch.
- biometric ATM The purpose of the biometric ATM is to provide individuals access to cash and other ATM functions without having to use an Interbank card. It does this by submitting a biometric-PIC and an account index code and retrieving a bank account number. For users of the system, this replaces the Interbank card (known in the industry) + PIC mechanism as a method for identifying the account and authorizing the individual. It is assumed that all ATMs still continue to accept Interbank cards.
- the biometric ATM uses an integrated BIA/ATM to identify individuals and allow them access to financial assets using a biometric-PIC and an account index.
- An BIA/ATM is installed into the ATM making use of the ATMs cunent PIC pad for PIC and account index code entry.
- ATM is connerted to the system using X.25 or modem.
- the BIA/ATM is structured in such a way as to make integration with an existing ATM network as simple as possible. This results in a compromise between security and ease of integration.
- the bank is identified by cross-checking the ATMs stored bank code with the BIA/ATMs bank code.
- the BIA/ATM is identified by successfully locating the BIA/ATM in the VAD, and the individual is identified through the standard biometric-PIC.
- an individual To access an ATM an individual enters their biometric- PIC into the BIA along with the account index code.
- the BIA forms an account access request message, which is then sent to the DPC by the
- the DPC validates the biometric-PIC as well as the emergency account index code, and then sends the resulting asset account number along with the private code back to the ATM.
- the ATM asks the BIA to decrypt the response, and then displays the private code on the ATMs display screen.
- the ATM also examines the response to see whether or not the individual is performing a standard account access, or a "duress" account access. If a duress account access is indicated, the ATM may provide false or misleading information as to the amounts available to the individual; the specifics of this behavior will vary from ATM to ATM. However, no ATM will ever provide any indication to the individual that a duress transaction is in progress.
- MAC means that the ATM cannot change the contents of the message without being detected, and encryption prevents the encrypted part of the message from being disclosed. Because the BIA/ATM has no LCD or no PIC pad attached, it requires the ATM to provide all the text prompts and to gather all the input , increment..,.,- 6/36934
- a particular bank may choose to limit access, or alter balance information, or a false screen may be displayed.
- a false screen is a display of data which has been intentionally pre-determined to be inaccurate such that a coercing party will not illegally obtain accurate data about an individual's financial assets. It is beyond the scope of the invention to specify the precise behavior of an ATM under these circumstances.
- Terminal Phone Point of Sale Terminal
- the purpose of the phone point of sale terminal is to authorize credit or debit financial transactions from an individual using a specially-equipped telephone to make a purchase from a merchant.
- the PPT consists of:
- the PPT accepts biometric identification using an BIA/catv connected to and integrated with a cordless, cellular, or standard telephone.
- biometric-PIC identification is used.
- the merchant and all his phone numbers that individuals will call are registered with the DPC.
- an individual submits an authorization, he also submits the phone number he called, which is then cross-checked with the merchant's listed phone numbers.
- the PPT uses a special modem that shares the telephone voice line to exchange digital information with the merchant.
- the PPT keeps track of the phone number that was typed by the user, in case the individual decides to make a purchase.
- a DSP is used to detect dialtone, ring, connection, and so on, in order to tell what the actual phone number entered was, as distinct from extensions, or the navigation of phone message systems, and so on.
- the salesman for the merchant digitally downloads all the relevant information to the PPT including product, price, and the merchant code. Note that when in operation, the modem disconnects the speaker.
- the PPT When the product information is downloaded, the PPT then prompts the individual for the biometric-PIC, the account index code, and then asks the individual to validate the purchase amount. Then the phone number and the merchant code are added, and the message is encrypted. The rapid-connect modem is again engaged to send the authorization information to the merchant.
- the merchant When the merchant receives the authorization information, the merchant verifies that the price and product information are conect, and then forwards the transaction to the DPC using a secured communications channel using either the Internet or some other general purpose network.
- the connection to the DPC is secured using Public Key Encryption and a secret key exchange.
- the DPC Upon receiving and decrypting a phone authorization, the DPC checks the phone number against the merchant code, validates the biometric-PIC, and then sends the transaction to the credit/debit network for authorization. If authorization succeeds, the DPC appends the buyer's address to the response message and sends the response to the merchant.
- the merchant receives the response from the DPC, copies the mailing address, and forwards the message to the individual again via a brief session with the rapid-connect modem.
- a chime sounds, the modem disconnects, and the individual's private code (decrypted by the BIA) is displayed on the LCD screen.
- the merchant's sales rep confirms that the individual's mailing address is valid; if so, the call is terminated and the transaction is complete.
- CATV point of sale terminal (CPT) is to authorize credit or debit financial transactions from an individual in front of his television (or "TV”) set to a merchant who is presenting objerts for sale on television.
- the CPT consists of:
- the CPT accepts biometric identification using an BIA/catv that is integrated with the television's remote control device.
- the remote control communicates with a television top box that itself communicates with the broadband cable television network.
- the terminal consists of the
- the individual is identified by the biometric-PIC.
- the merchant is identified by a merchant credential, created by the CATV broadcaster at the time the product is shown on television. 35
- Each product broadcast has a merchant-product credential consisting of a merchant code, a time, a duration, and a price which is signed using Public Key Encryption and the CATV network broadcaster's private key. This merchant-product credential can only be generated by the network broadcaster.
- the Cable television network also broadcasts simultaneous digital information that describes a short description, price, as well as the merchant-product credential. This digital information is processed and temporarily stored by the CPT, ready to be accessed by the individual when a decision to purchase is made.
- the individual selects the on-screen display function of the special television Remote, which instructs the CPT to display text information on the screen regarding the cunentiy viewed product.
- the individual is first prompted for the number of the items he wishes to buy through the on-screen display. Then he is prompted to enter his Biometric-PIC, and his account index code. Once he verifies that the final purchase price is okay, the product, price, merchant code, merchant-product credential, and channel number along with the Biometric-PIC are used to construct a Remote Transaction Authorization request message.
- the request is sent to the merchant for authorization by way of the Cable-television broadband two-way communications channel. Note that each merchant that desires to sell products in this manner must have the ability to receive order information using the broadband Cable television network.
- the merchant Upon receipt of the authorization request, the merchant submits it to the DPC using a secured Internet connection or an X.25 connection. If the DPC authorizes the transaction, it constructs an authorization response that includes the cunent mailing address of the individual in addition to the authorization code, and the encrypted private code. Once the merchant receives the authorization, he copies the authorization and the mailing address, and then forwards the authorization back to the CPT, who then displays the private code to the individual, terminating the transaction. 1.4.13.5. Security
- the messages may be encrypted using an optional CATV Center's public key, or other "link level" encryption between the CATV set-top box (known in the industry) and the CATV local office.
- CATV Center's public key or other "link level" encryption between the CATV set-top box (known in the industry) and the CATV local office.
- the connection uses a session key changed daily that has been previously exchanged using a public key encryption key exchange system.
- the Data Processing Center handles financial transaction authorizations and individual registration as its main responsibilities.
- the DPC provides storage and retrieval for secure faxes, electronic documents, and electronic signatures.
- Each DPC site is made up of a number of computers and databases connerted together over a LAN (known in the industry) as illustrated in the DPC Overview Figure (number**). Multiple identical DPC sites ensure reliable service in the face of disaster or serious hardware failure at any single DPC site. Furthermore, each DPC site has electrical power backup and multiple redundancy in all of its critical hardware and database systems.
- DPC components fall into three categories: hardware, software, and databases. Below is a short description, by category, of each component. More detailed descriptions appear in the following sections. 1.5.1.1. Hardware
- FW Firewall Machine the entry point of the DPC site.
- GM Gateway Machine the system coordinator and message processor.
- DPCLAN DPC Local Area Network connects the DPC sites
- -BD Individual Biometric Database identifies individuals from their biometric and PIC code.
- PFD Prior Fraud Database lists individuals who have defrauded the system and can check if a biometric matches any of these individuals.
- VAD Valid Apparatus Database stores information required to validate and decrypt BIA messages.
- AOD Apparatus Owner Database stores information about the owners of BIA devices.
- ID Issuer Database identifies issuing banks that participate with the system.
- AID Authorized Individual Database stores the list of individuals allowed to use personal or issuer BIA devices.
- RMD Remote Merchant Database stores information necessary to process transactions with telephone and cable television merchants.
- EDD Electronic Document Database stores electronic documents, such as faxes and electronic mail, for retrieval by authorized individuals.
- ESD Electronic Signature Database stores electronic document signatures for verification by a third party.
- MPM Message Processing Module handles the processing of each message by coordinating with the other software modules and databases required to perform the message's task.
- SNM Sequence Number Module handles DUKPT sequence number processing.
- MACM Message Authentication Code Module handles MAC validation and generation.
- MDM Message Decrypt Module handles encrypting and decrypting of
- PGL PIC Group List handles the lookup of PIC groups by PIC and the configuration of database elements that depend on the list of PIC groups.
- IML IBD Machine List handles the lookup of the main and backup database machines dedicated to holding IBD records for a given PIC group. 1.5.1.4. Terminology
- int ⁇ X> an integral type using ⁇ X> bytes of storage char ⁇ X> a character a ⁇ ay of ⁇ X> bytes text a variable length chararter array
- time a type used for storing time and date biometric a binary data type used for storing the biometric fax a binary data type used for storing fax images
- expected means the expected condition of a fully loaded system.
- Terminals accomplish their tasks by sending request packets to a DPC site.
- the DPC site sends back a reply packet containing the status on the success or failure of the request.
- Communication is via a logical or a physical connection- oriented message delivery mechanism such as X.25 connections, TCP/IP connections, or a telephone call to a modem bank.
- a logical or a physical connection- oriented message delivery mechanism such as X.25 connections, TCP/IP connections, or a telephone call to a modem bank.
- the request packet contains a BIA message part and a terminal message part:
- the BIA message part is constructed by an BIA device. It includes one or two biometrics, a PIC, authorization amounts, and the contents of the general registers which are set by the terminal. Note: the MAC in the BIA message part only applies to the BIA part and not to the terminal part.
- a terminal may place additional data for the request message in the terminal message part.
- the BIA provides a message key to allow the terminal to secure the terminal part data.
- the BIA automatically includes the message key in the packet's encrypted biometric-PIC block when necessary.
- the terminal performs the message key encryption itsel£ however.
- the response packet contains a standard header and two optional free-form message parts: one with a MAC and one without:
- the message part with a MAC is sent to the BIA so that it may validate that this part of the response has not been tampered with and to display the individual's private code.
- the message part without a MAC is used for transmitting large amounts of data, such as fax images, that are not sent to the BIA for MAC validation as the BIA to terminal connection may be of limited bandwidth. 1.5.3. Processing Packets
- a terminal need only send its request to one of the DPC sites, typically the closest, because that site automatically handles updating the others by running distributed transactions as necessary.
- Each GM has a Message Processing Module that handles the coordination between the DPC components required to process the request and sends the response back to the sender.
- All packets the DPC receives contain an BIA hardware identification code (the BIA Identification of the packet), a sequence number, and a Message Authentication Code (MAC).
- the GM asks the MAC Module to validate the packet's MAC and then checks the sequence number with the Sequence Number Module. If both check out, the GM passes the packet to the BIA hardware identification code (the BIA Identification of the packet), a sequence number, and a Message Authentication Code (MAC).
- the GM asks the MAC Module to validate the packet's MAC and then checks the sequence number with the Sequence Number Module. If both check out, the GM passes the packet to the
- the GM logs a warning, terminates processing for the packet, and returns an enor message to the BIA device.
- Each packet the DPC receives may contain an optional response key stored in the encrypted biometric-PIC block of the packet.
- the DPC Before the DPC replies to a request that includes a response key, it encrypts the reply packet with the response key. It also generates a Message Authentication Code and appends it to the packet.
- the only exception to encrypting response packets applies to enor messages. Enors are never encrypted and never include confidential information. However, most response packets include a status or reply code that can indicate whether the request succeeded or not. For example, when the DPC declines a credit authorization, it does not return an enor packet, it returns a normal transaction response packet with a reply code set to "failed".
- the DPC has two procedures commonly used while processing requests.
- the DPC executes the following procedure: using the PIC code, the DPC searches the IBD Machine List for the main and backup IBD machines responsible for handling identifications for the given PIC code. Next, the DPC sends the identification request to either the main or backup machines depending on which is the least loaded. The IBD machine responds with the IBD record for the individual or an "individual not found" enor.
- the IBD machine retrieves all the IBD records for the given PIC. Using a proprietary biometric hardware device, the IBD machine compares each record's primary biometric with the individual's biometric arriving at a comparison score indicating the similarity of the two biometrics. If no biometric has a close enough comparison score, the comparisons are repeated using the secondary biometrics. If none of the secondary biometrics have a close enough comparison score, then the IBD machine returns an "individual not found" enor. Otherwise, the IBD machine returns the full IBD record of the individual, from which such fields such as the private code, account numbers, titles, and so on may be obtained.
- the DPC For requests that include an account index, the DPC handles the case where the individual chooses his or her emergency account index.
- the GM processing the request immediately notifies the DPC customer support staff, logs a warning, and if the response packet has a reply code, sets it to "emergency". It is the responsibility of the owner of the BIA device that submitted the request to watch for an "emergency" reply code and provide further assistance, such as the false screen mechanism described in the ATM terminal section.
- the DPC also increments the emergency use count of the individual's IBD record whenever the emergency account index gets accessed.
- protocol packets are:
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key
- the Individual Identification request includes a biometric-PIC block which the DPC uses with the individual identification procedure to identify the individual. If the individual is identified, then the DPC responds with the individual's name, biometric identification, and private code. Otherwise, the DPC responds with an "unknown individual" enor. 1.5.7.2. Transaction Authorization
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key
- Transaction Authorization Response encrypted(response key) private code text authorization response authorization detail (autho code, transartion identification, etc)
- reply code (fail, ok, emergency) MAC
- the DPC identifies the purchasing individual by the biometric-PIC block of the request. If the individual cannot be identified, the DPC replies with an "unknown individual" enor. Next, the DPC sends an external authorization request
- the DPC (crediting the asset account of the BIA device's owner and debiting the individual's asset account) to one of several existing financial authorization services depending on the type of asset accounts involved (such as VisaTM or American ExpressTM). If the external financial authorization service approves the transaction, the DPC returns the external authorization codes and an "ok" reply code to the BIA device. Otherwise, the DPC returns the reason why the authorization was denied and sets the reply code to "failed". In either case, the DPC includes the individual's private code in the response.
- the chosen account may be the "emergency" account. If this happens, the DPC follows the emergency response procedure. The external authorization still takes place, however.
- Remote authorization are generated by telephone, mail- order, or cable television merchants.
- the DPC handles remote authorizations the same way it does a retail authorization but with the following exceptions: i) Remote authorizations include a remote merchant code which the DPC checks against the Remote Merchant Database to validate whether the packet's merchant Identification matches the one stored in the database. Furthermore, the asset account credited is the remote merchant's account, not the account of the BIA device's owner. ii) Additionally, BIA devices that generate the remote authorizations tend to be personal BIA devices. The DPC checks the biometric Identification of the identified individual against the Authorized Individual Database's list of individuals allowed to use the BIA device. If the individual is not authorized to use the device, then the DPC denies the authorization request. iii) Finally, the authorization packet may contain a "send-address" indicator. This indicator informs the DPC to include the individual's address in the reply packet and is usually used only for mail order purchases.
- Biometric-PIC block 1000-byte primary biometric 1000-byte secondary biometric 4-12 digit PIC 56-bit response key
- the BRT sends the DPC a registration packet containing primary and secondary biometrics and personal identification code, along with ancillary data such as the individual's name, address, a list of financial asset accounts, the private code, and the emergency account.
- the individual may include an electronic mail address, and a title list including titles and the title index code, as well as an Social Security
- the individual may choose his or her own PIC code or allow the system to choose it.
- SSN Serial Number
- the individual may choose his or her own PIC code or allow the system to choose it.
- any previously entered data can be modified or deleted.
- the registration DPC site performs the entire registration check, assigning of IBD records to IBD machines, and the distributed transaction required to update all other DPC sites.
- the registration DPC site selects the PIC code for registration requests that don't specify one, stores the IBD record on the main and backup IBD machines (as specified in the PIC Group List), and checks the PIC and biometric suitabiUty of the registration packet before running the distributed transaction to update the other DPC sites.
- the DPC runs a personal identification code and biometric sample dupUcation check step wherein the biometrics and personal identification code gathered during the registration step is checked against aU previously registered biometrics cunentiy associated with the identical personal identification code.
- the DPC may reject the registration for the following reasons: the PIC code is too popular, or the biometrics are too similar to other biometrics stored under the chosen PIC.
- the DPC generates a short Ust of PIC codes for which the registration will be guaranteed that it reserves for a period of time.
- the BRT then prompts the individual for a new PIC which may be chosen from the good PIC Ust.
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key
- asset account number reply code (fail, ok, emergency)
- the account access request allows BIA-equipped Automated TeUer Machines to provide a safer and more convenient way for individuals to identify themselves to the ATM.
- the GM identifies the individual by the packet's biometric-PIC and uses the specified account index to choose which asset account number to retrieve.
- the chosen account may be the "emergency" account. If this happens, the GM foUows the emergency response procedure.
- Issuer Batch Response encryptedfresponse key private code text repiy code (fail, ok, emergency) MAC encryptedfmessage key) failed list: failed ⁇ command> ⁇ code>
- the Issuer Batch request allows an issuing bank or other authority to perform routine maintenance on the Individual Biometric Database.
- the DPC logs a security violation warning if it receives any Issuer Batch requests from non-issuer BIA devices, and it also refuses to process the request.
- the DPC identifies the individual submitting the batch request by foUowing the individual identification procedure.
- the DPC then checks that the individual is registered in the Authorized Individual Database to use the BIA device embedded in the sending Issuer Terminal.
- the DPC also uses the issuer code in the request to look up the apparatus owner Identification in the Issuer Database and compare it against the apparatus owner Identification stored in the VaUd Apparatus Database to ensure that the issuer code is not forged.
- the DPC then executes the add and delete commands in the message-key encrypted batch Ust.
- the batch Ust is a newiine separated Ust of commands. VaUd commands are:
- the add command adds the asset account to the account Ust at the specified account index.
- the optional emergency flag indicates whether the particular account index is treated as the individual's emergency account. If the asset account cunentiy stored in the account Ust does not belong to the issuer, the command fails. This feature prevents one bank from adding or removing asset accounts from other bank's customers without the individual's knowledge or authorization.
- the remove command clears the individual's asset account stored at the specified account index in the account Ust. If the asset account cunentiy stored in the account Ust does not match the account the issuer is attempting to remove, the command fails.
- the GM logs a security violation warning and appends an entry to the failed Ust of the response.
- the failed entry includes the text for the command and the enor code.
- Terminal Part (not used) Secure Fax Submit Response encrypted(response key): private code text fax tracking number MAC
- the DPC When the DPC receives a Secure Fax Submit request, it identifies the individual from the request's biometric-PIC by foUowing the individual identification procedure. This identification, along with the individual's title described by the title index code, is presented to the recipients so that the sender of the fax is always reUably identified.
- the DPC generates a tracking number for tracking purposes and stores it, the sender's biometric Identification, the security mode, and the message key in a newly created EDD Document record. For each recipient in the recipient Ust, the DPC also creates a Recipient record. The DPC then waits for the sending fax machine to transmit the fax data encrypted under the message key.
- the EDD places a copy of the Document and Recipient records in the archive database. Any subsequent updates to these records are also made to the archived versions.
- the fax data is sent in a separate step so that if the sender makes a mistake entering his biometric and PIC, the system notifies him before he wastes any time feeding the document into the fax machine.
- Terminal Part fax tracking number encrypted(message key): fax image data
- the Secure Fax Data request allows a secure fax machine to send the fax image to the DPC for deUvery to the previously specified recipient(s). This request does not involve any biometric identification and instead reUes upon the secret message key to securely transmit the image.
- the fax image data is encrypted by the message key registered by the Secure Fax Submit request.
- the DPC Once the DPC has received the entire fax, it sends a Secure Fax Arrival Notice message to each of the recipient's fax numbers.
- the DPC retrieves the Ust of recipients by querying the EDD for aU Recipient records containing the fax tracking number.
- the Recipient record contains the destination fax number and optional extension. After sending the
- the DPC updates each Recipient record's deUvery status field to "notified”. Note: if the destination fax number is busy, the DPC marks the deUvery status field to "busy” and retries sending the notice periodicaUy (i.e., every 10 minutes) until successful and at that time, updates the status field to "notified”.
- the Arrival Notice is as follows: Secure Fax Arrival Notice (Fax message) sender name, company, title, and fax number fax tracking number instructions on how to download the fax
- the DPC only sends the sender a Status Notice via fax after aU recipients have either retrieved or rejected the fax.
- the sender may query the DPC using the Secure Fax Tracking request (see below) to get the cunent status of all recipients.
- the Status Notice is as foUows: Secure Fax Status Notice (Fax message) sender name, company, title, and fax number fax tracking number Ust of recipients showing: name, company, title, and fax number deUvery date and status contract/agreement status
- the DPC finds each individual's company and title information in the EDD Organization table.
- the DPC does not send them a Secure Fax Arrival Notice. Instead, the DPC sends them the fax directly. If the fax line is busy, the DPC retries every 10 minutes until it succeeds in deUvering the fax.
- the DPC handles the Secure Fax Tracking request by retrieving aU EDD Recipient records for the fax and generating a fax message to display the records. If the individual making the tracking request is not the sender of the fax document, then the DPC sets the status code to faUed and puts an empty fax in the response.
- the tracking response fax contains information describing the status of the deUvery of the fax to each recipient. This fax contains such status information as line busy, fax arrival notice sent, fax sent, fax rejected, contract accepted, and so on.
- the Tracking Notice is as foUows: Secure Fax Tracking Notice (Fax message) sender name, company, title, and fax number fax tracking number Ust of recipients showing: name, company, title, and fax number deUvery date and status contract status
- Biomet ⁇ c-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key fax tracking number
- the DPC uses the biometric-PIC to identify the individual making the retrieve request by foUowing the individual identification procedure. If no EDD Recipient record exists for the individual and for the specified fax, then the DPC responds with an "invaUd recipient" status.
- the DPC retrieves the encrypted fax image from the EDD Document record with the conert fax tracking number and biometric Identification which it returns to the requester.
- the fax image includes a cover page that displays whether the fax is a contract/agreement and the sender's name, company, title, fax number, and extension.
- the DPC sends a Status Notice via fax (see Secure Fax Data, above) to the fax's sender and then schedules to remove the Document and Recipient records from the EDD within a configurable time period.
- the time period is intended to aUow the recipients sufficient time to decide whether or not to archive the fax.
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key fax tracking number
- the DPC uses the biometric-PIC to identify the individual making the secure fax reject request.
- the DPC finds the EDD Recipient record keyed by the request's fax tracking number and the individual's biometric Identification. If the record cannot be found then the request fails with an "invaUd recipient" status.
- the DPC sends a Status Notice via fax (see Secure Fax Data, above) to the fax's sender and then schedules to remove the Fax and Tracking records from the EDD within a configurable time period.
- the time period is intended to allow the recipients sufficient time to decide whether or not to archive the fax.
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key fax tracking number
- the DPC uses the biometric-PIC to identify the individual making the secure fax archive request.
- the DPC finds the EDD Recipient record keyed by the request's fax tracking number and the individual's .biometric Identification. If the record cannot be found and the individual is not the sender or one of the recipients, then the request faUs with an "invaUd individual" status. Otherwise, the DPC copies the Document and Recipient 5 records into the EDD archive database. Any subsequent changes to these records are also copied to the archived versions.
- Biometric-PIC block 15 300-byte authorization biometric
- the DPC uses the biometric-PIC to identify the individual making the Contract Accept request.
- the DPC finds the EDD Recipient record keyed , 30 by the request's fax tracking number and the individual's biometric
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key fax tracking number MAC Terminal Part: (not used)
- the DPC uses the biometric-PIC to identify the individual making the Contrart Rejert request.
- the DPC finds the EDD Recipient record keyed by the request's fax tracking number and the individual's biometric Identification. If the record cannot be found then the request fails with an "invaUd recipient" status. Otherwise, the DPC updates the Recipient record's contract status field to "rejected" and generates a Status Notice to the fax's sender (see Fax Data, above).
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key 56-bit message key recipient Ust MAC Terminal Part: (not used)
- the DPC When the DPC receives an Electronic Document Submit request, it identifies the individual by foUowing the individual identification procedure. The DPC then creates an EDD Document record and assigns it a unique tracking number. The DPC initializes the record's sender identification code to be the biometric identification code of the identified individual and the message key to be the message key in the request.
- the DPC searches the Individual Biometric Database for each recipient and creates an EDD Recipient record for each one.
- Each record is initialized with the tracking number, the recipient's biometric identification code, and a deUvery status of "incomplete". If any of the recipients cannot be found, the DPC repUes with an "invaUd recipient" status.
- Terminal Part tracking number . command (either abort or data)
- the Electronic Document Data request aUows an individual to send the document text (in one or more parts) to the EDD for deUvery to the recipient s).
- This request does not involve any biometric identification, instead, it reUes upon the secret message key to securely transmit the document text.
- the request text is assumed to be encrypted by the message key stored in the EDD document record and is appended to the document text already stored in the record.
- the EDD When the EDD receives a packet with the "document complete" indicator, it knows that the sender has finished transmitting the document. The EDD now sends an Arrival Notice to aU recipients of the document via Internet electronic mail informing them that they have a document waiting.
- the Arrival Notice is as foUows: Electronic Document Arrival Notice (Internet E-mail message) sender name, company, title, and e-mail address tracking number instructions on how to receive the electronic document
- the EDD also updates the status of the EDD recipient record to "notified".
- the DPC sends a Status Notice via Internet electronic mail to the document originator.
- the Status Notice is as foUows: Electronic Document Status Notice (Internet E-mail message) sender name, company, title, and e-mail address tracking number Ust of recipients showing for each name, company, title, e-ma ⁇ address deUvery date and status
- the DPC finds each individual's company and title information in the EDD Organization table.
- the DPC uses the biometric-PIC to identify the individual making the electronic document retrieve request by foUowing the individual identification procedure.
- the DPC next finds the EDD Recipient record keyed by the tracking number and the individual's biometric Identification. If the record cannot be found, then the request fails with an "invaUd recipient" status. Otherwise, the DPC sends the document's message key and the document (still encrypted by the message key) to the requester.
- the EDD then updates the status of the EDD recipient record to "retrieved".
- the DPC sends a Status Notice via Internet electronic mail to the document originator (see Electronic Document Data, above) and then schedules to remove the Document and Recipient records (see Secure Fax Retrieve, above).
- Terminal Part (not used) Electronic Document Reject Response encrypted(response key): private code status code (ok, invaUd recipient) MAC
- the DPC uses the biometric-PIC to identify the individual making the electronic document rejert request.
- the DPC next finds the EDD Recipient record keyed by the tracking number and the individual's biometric Identification. If the record cannot be found, then the request faUs with an
- the EDD updates the status of the EDD recipient record to "rejerted".
- the DPC then foUows the same notification and deletion procedure as described in Electronic Document Retrieve, above.
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key tracking number MAC Terminal Part: (not used)
- the DPC uses the biometric-PIC to identify the individual making the electronic document archive request.
- the DPC finds the EDD Recipient record keyed by the request's tracking number and the individual's biometric Identification. If the record cannot be found and the individual is not the sender or one of the recipients, then the request fails with an "invaUd individual" status. Otherwise, the DPC copies the Document and Recipient records into the EDD archive database. Any subsequent changes to these records are also copied to the archived versions.
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key optional title index code, sending fax number, and extension tracking number MAC Terminal Part: (not used)
- the DPC can receive an Electronic Document Archive Retrieve request from either a Secure Fax Terminal or a Certified Email Terminal.
- the DPC uses the individual identification procedure to determine the individual submitting the archive retrieve request.
- the individual must be either the sender or one of the recipients or else the DPC denies the request by setting the status code to "invaUd individual".
- the DPC aUows additional individuals whose titles are higher in the corporate hierarchy to retrieve the archived document as weU.
- the EDD maintains an archive database, indexed by the document's original tracking number, stored on off-line media such as CD- ROMs and tape that can take considerable time to search for the archived document.
- the DPC does not return the archived document immediately, but instead informs the requesting individual that the DPC has begun the search.
- the DPC finishes the search it notifies the requester that the archived document is ready to be retrieved through the standard document arrival notification mechanisms — either via fax or email, depending on the format of the original document.
- the DPC creates an EDD archive request record to store information about the requester so that when the search completes, the DPC remembers to whom to send the document.
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC
- the DPC To process the electronic signature request, the DPC first performs a biometric identification using the biometric-PIC. Then, the DPC creates an ESD record, assigns it a unique signature identification code, and sets the record's signature field to the electronic signature in the request. The DPC then returns a signature string that can be submitted for later verification:
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key signature string MAC Terminal Part: (not used)
- the DPC performs a biometric identification, extracts the signature tracking code from the signature string, retrieves the indicated ESD record, and verifies that it matches the signature string.
- the DPC returns the private code and the outcome of the signature comparison.
- Biometric-PIC block 300-byte authorization biometric 4-12 digit PIC 56-bit response key account index bank code bank hostname te ⁇ ninai.port and bank.port (TCP/IP addresses) MAC
- Network Credential Response encrypted(response key) private code signed ⁇ PC's private key
- the DPC identifies the individual using the request's biometric-PIC and retrieves the individual's asset account stored at the specified index. If the account index is the emergency account, then the network credential response status code is set to "failed" and no credential is generated.
- the DPC constructs the credential using the cunent time, the retrieved asset account, and the TCP/IP addresses of the terminal and the bank. The DPC then uses pubUc key encryption to sign the credential with its private key.
- the response also includes the bank's pubUc key, which the DPC retrieves from the Remote Merchant Database.
- the DPC handles additional message types classified as internal messages.
- the DPC generaUy does not accept these messages from non-DPC systems.
- the messages are database vendor specific.
- the internal network uses DES-encrypted packets to provide additional security.
- the Customer Service and System Administration tasks are implemented using the database vendor's query language and appUcation development tools.
- IBD find, activate, deactivate, remove, conect records.
- AID add or remove authorized individuals.
- AOD find, add, remove, conect records.
- VAD find, activate, deactivate, remove, conect records.
- RMD find, add, remove, conect records.
- Firewall Machine Generate a Ust of BIA hardware identification code, MAC encryption key, and DUKPT Base Key triples. Store on an encrypted floppy for the Key Loading Device. 1.5.9. Firewall Machine
- the FW Machines provide a first line of defense against network viruses and computer hackers. AU communication links into or out of the DPC site first pass through a secure FW Machine.
- the FW Machine an internet-localnet router, only handles messages destined for the GM Machines.
- BIA-equipped terminals send packets to a single DPC site via modem, X.25, or other communication medium.
- the DPC reUes on a third party to supply the modem banks required to handle the volume of caUs and feed the data onto the DPC backbone.
- the FW Machines For DPC to DPC communication, primarily for distributed transactions and sequence number updates, the FW Machines send out double-length DES encrypted packets.
- the DPC LAN component handles the encryption and decryption: the FWs do not have the ability to decrypt the packets.
- the FW disaUows any transmissions from the internal network to the rest of the Internet.
- a transaction authorization request requires about 400 bytes and registration packets require about 2 KB.
- the FW Machines are able to process about 400 KB per second (aU known in the industry) .
- Each DPC site requires an aggregate bandwidth of nearly three Tl connections to the third party modem bank and the other DPC sites.
- the GM Machine through the FW Machines, link the outside world (BIA-equipped terminals and other DPCs) to the internal components of the DPC.
- the DPC has multiple GMs, typicaUy two.
- the GM supervises the processing of each BIA request, communicates with the various DPC components as necessary, and sends the encrypted results of the request back to the sender.
- the software performing this task is caUed the Message Processing Module.
- the GM logs aU requests it receives and any warnings from components it communicates with. For example, the GM logs any emergency account accesses, sequence number gaps, and invaUd packets.
- Processing a request may require the GM to inform GMs at aU other DPCs of a change in the DPC databases. When this happens, the GM runs a distributed transartion to update the remote databases.
- Synchronous distributed transactions require the GM to wait for the distributed transaction to commit before continuing to process the packet.
- Asynchronous distributed transactions do not require the GM to wait for the commit, and aUow it to finish processing the request regardless of whether the distributed transaction commits or not.
- Asynchronous distributed transactions are only used to update data for which database consistency is not an absolute requirement: sequence numbers and biometric checksum recordings may be performed asynchronously, whereas creating database records, such as Individual Biometric records, may not.
- the requesting GM When executing a synchronous distributed transaction, the requesting GM only considers the entire transartion successful if aU sites can successfuUy commit the transartion locaUy.
- vaUd DPC sites are normally aU of the sites. In the case of an extreme site failure, however, a system administrator may manuaUy remove that site from the vaUd site Ust. The most likely cause of distributed transaction failures, however, are temporary network failures that are unrelated to any DPC equipment. Requests that require a synchronous distributed transaction cannot be performed until network connectivity is restored or the site is removed from the vaUd site Ust. Before a site can be added back to the vaUd site Ust, the system administrator brings the site's databases up to date with those of a cunentiy active site.
- Each GM runs the foUowing software components locaUy for performance reasons:
- the message bandwidth required by the GMs is simUar to that required by the FW Machines.
- a FDDI network interface provides 100 MBits per second and easily covers any bandwidth requirements.
- the DPC Local Area Network (LAN) links the machines of the DPC sites together using a fiber optic token ring.
- the fiber optic token ring provides both high bandwidth and good physical security.
- the network interfaces used by the machines on the DPC LAN include encryption hardware to make tapping or intercepting packets useless without the encryption key.
- the encryption key is the same for aU machines on the LAN and is stored in the encryption hardware.
- a properly configured network sniffer acts as an intruder detector as backup for the FW. If an anomalous message is detected, the intruding messages are recorded in their entirety, an operator is alerted, and the FW is physicaUy shut down by the sniffer.
- the Message Processing Module handles the processing for a request packet. It communicates with other components of the DPC as necessary to perform its tasks.
- MPM Message Processing Module
- the presence of an MPM on a machine brands it as a GM.
- the MPM maintains a request context for each request it is cunentiy processing.
- the request context includes the information necessary to maintain the network connection to the terminal making the request, the BIA device information, the response key, and the response packet.
- the Message Authentication Code Module's (MACM) tasks are to vaUdate the Message Authentication Code on inbound packets and to add a Message Authentication Code to outbound packets.
- the Message Authentication Code Module's (MACM) tasks are to vaUdate the Message Authentication Code on inbound packets and to add a Message Authentication Code to outbound packets.
- the MACM maintains an in-memory hash table of 112-bit MAC encryption keys keyed by BIA hardware identification code.
- the MACM receives a request from the GM to vaUdate a packet's MAC, it first looks up the packet's hardware identification code in the hash table. If no entry exists, then the MACM repUes to the GM with an "invaUd hardware identification code" enor.
- the MACM performs a MAC check on the BIA message part of the packet using the 112-bit MAC encryption key. If the
- the MACM also checks the merchant code against the owner identification code in the hash table. If the codes don't match, then the MACM repUes with an "invaUd owner" enor.
- the MACM When the MACM receives a request from the GM to generate a MAC for a packet, it looks up the MAC encryption key using the packet's hardware identification code. With the MAC encryption key, the MACM generates a MAC and adds it to the packet. If the MACM cannot find the hardware identification code in its hash table, it repUes with an invaUd hardware identification code enor instead.
- the MACM hash table entry contains:
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP96916498A EP0912959B1 (en) | 1995-05-17 | 1996-05-17 | Tokenless identification system |
CA002221321A CA2221321C (en) | 1995-05-17 | 1996-05-17 | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
BRPI9608580-0A BR9608580B1 (en) | 1995-05-17 | 1996-05-17 | computer record-free voluntary identification system for determining an individual's identity from an examination of at least one biometric sample and an identification code and identification processes without individual record and identification and fast search authentication of at least one previously stored biometric sample. |
DE69630713T DE69630713T2 (en) | 1995-05-17 | 1996-05-17 | IDENTIFICATION SYSTEM WITHOUT IDENTITY MARKER |
AT96916498T ATE254315T1 (en) | 1995-05-17 | 1996-05-17 | IDENTIFICATION SYSTEM WITHOUT IDENTITY MARKERS |
JP8535098A JPH11511882A (en) | 1995-05-17 | 1996-05-17 | Tokenless identification system for authorization of electronic transactions and transmissions |
DK96916498T DK0912959T3 (en) | 1995-05-17 | 1996-05-17 | Identification system without token |
AU59226/96A AU5922696A (en) | 1995-05-17 | 1996-05-17 | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/442,895 US5613012A (en) | 1994-11-28 | 1995-05-17 | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US08/442,895 | 1995-05-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1996036934A1 true WO1996036934A1 (en) | 1996-11-21 |
Family
ID=23758581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1996/007185 WO1996036934A1 (en) | 1995-05-17 | 1996-05-17 | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
Country Status (15)
Country | Link |
---|---|
US (2) | US5613012A (en) |
EP (1) | EP0912959B1 (en) |
JP (7) | JPH11511882A (en) |
CN (2) | CN1320491C (en) |
AT (1) | ATE254315T1 (en) |
AU (1) | AU5922696A (en) |
BR (1) | BR9608580B1 (en) |
CA (1) | CA2221321C (en) |
DE (1) | DE69630713T2 (en) |
DK (1) | DK0912959T3 (en) |
ES (1) | ES2213774T3 (en) |
HK (1) | HK1069655A1 (en) |
PT (1) | PT912959E (en) |
RU (1) | RU2263348C2 (en) |
WO (1) | WO1996036934A1 (en) |
Cited By (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0780813A2 (en) * | 1995-12-20 | 1997-06-25 | Fujitsu Limited | IC card, IC card reading/writing apparatus, host for an IC card reading/writing apparatus, IC card system, and method for allowing use of multiple vendors in an IC card system |
WO2000000882A2 (en) * | 1998-06-27 | 2000-01-06 | Lci/Smartpen, N.V. | Apparatus and method for end-to-end authentication using biometric data |
WO2000004515A1 (en) * | 1998-07-14 | 2000-01-27 | Wintriss Marc V | A method and apparatus for facilitating business transactions between buyers nodes and vendors nodes over a network by providing a verification node |
EP0986209A2 (en) * | 1998-09-11 | 2000-03-15 | Mitsubishi Denki Kabushiki Kaisha | Remote authentication system |
WO2000030051A1 (en) * | 1998-11-18 | 2000-05-25 | Wintriss Marc V | A method and apparatus for facilitating business transactions over a network by providing a reliable verification source |
WO2000042577A1 (en) * | 1999-01-18 | 2000-07-20 | Iridian Technologies, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
JP2000222362A (en) * | 1999-01-26 | 2000-08-11 | Internatl Business Mach Corp <Ibm> | Method and device for realizing multiple security check point |
EP1032905A1 (en) * | 1997-11-28 | 2000-09-06 | Diebold, Incorporated | Financial transaction apparatus and method that identifies an authorized user's appearance and voice |
WO2001027723A1 (en) * | 1999-10-08 | 2001-04-19 | Hewlett-Packard Company | Trusted computing platform with biometric authentication |
WO2001050428A1 (en) * | 2000-01-05 | 2001-07-12 | Colin Mitchell | Method and apparatus for authenticating financial transactions |
JP2001512262A (en) * | 1997-07-31 | 2001-08-21 | スプリング テクノロジーズ,インコーポレイティド | Systems and methods for using biometric identification to control access to events and transportation systems |
JP2002527991A (en) * | 1998-10-14 | 2002-08-27 | ソネラ スマートトラスト オサケユキチュア | Method and system for application of safety marking |
WO2003007570A1 (en) * | 2001-07-10 | 2003-01-23 | Research In Motion Limited | System and method for secure message key caching in a mobile communication device |
JP2003509775A (en) * | 1999-09-16 | 2003-03-11 | インディヴォス コーポレイション | System and method for processing a biometric transmission without using a token using an electronic rule module clearinghouse |
US6678753B1 (en) | 1995-12-20 | 2004-01-13 | Fujitsu Limited | IC card reading/writing apparatus and method for allowing use of multiple vendors |
KR100449776B1 (en) * | 2001-10-11 | 2004-09-22 | 주식회사 루트아이티 | A PKI authentication method using portable memory device |
GB2428846A (en) * | 2005-07-27 | 2007-02-07 | Ingenia Technology Ltd | Prescription authentication utilising networked system |
WO2008020754A1 (en) * | 2006-08-17 | 2008-02-21 | Hieronymus Watse Wiersma | System and method for generating a signature |
US7447772B2 (en) | 2000-11-10 | 2008-11-04 | Ntt Docomo, Inc. | Authentication system, authentication undertaking apparatus, and terminal apparatus |
US7448540B2 (en) | 1999-08-02 | 2008-11-11 | Softbankbb Corporation | Electronic settlement system, settlement apparatus and terminal |
CN100440101C (en) * | 1998-04-07 | 2008-12-03 | 杰拉德·R·布莱克 | Identification confirmation system |
US7523067B1 (en) | 2000-08-02 | 2009-04-21 | Softbankbb Corporation | Electronic settlement system, settlement apparatus, and terminal |
WO2009108779A2 (en) * | 2008-02-26 | 2009-09-03 | Weiss Kenneth P | Universal secure registry |
US7653815B2 (en) | 2001-06-12 | 2010-01-26 | Research In Motion Limited | System and method for processing encoded messages for exchange with a mobile data communication device |
WO2010026261A2 (en) * | 2008-09-08 | 2010-03-11 | Psylock Gmbh | Biometric identification method using feature vectors and analysis in comparison to multiple biometric samples |
US7693279B2 (en) | 2003-04-23 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Security method and apparatus using biometric data |
JP2010205293A (en) * | 1997-08-27 | 2010-09-16 | Data Treasury Corp | Remote data processing system |
US7805372B2 (en) | 2006-02-21 | 2010-09-28 | Weiss Kenneth P | Universal secure registry |
US7840207B2 (en) | 2005-11-30 | 2010-11-23 | Research In Motion Limited | Display of secure messages on a mobile communication device |
US7949355B2 (en) | 2007-09-04 | 2011-05-24 | Research In Motion Limited | System and method for processing attachments to messages sent to a mobile device |
US7953971B2 (en) | 2005-10-27 | 2011-05-31 | Research In Motion Limited | Synchronizing certificates between a device and server |
US8011572B2 (en) | 1997-11-28 | 2011-09-06 | Diebold, Incorporated | Banking transaction machine that operates responsive to data bearing records |
US8191105B2 (en) | 2005-11-18 | 2012-05-29 | Research In Motion Limited | System and method for handling electronic messages |
US8234220B2 (en) | 2007-02-21 | 2012-07-31 | Weiss Kenneth P | Universal secure registry |
US8254582B2 (en) | 2007-09-24 | 2012-08-28 | Research In Motion Limited | System and method for controlling message attachment handling functions on a mobile device |
US8355701B2 (en) | 2005-11-30 | 2013-01-15 | Research In Motion Limited | Display of secure messages on a mobile communication device |
US8447272B2 (en) | 2009-11-25 | 2013-05-21 | Visa International Service Association | Authentication and human recognition transaction using a mobile device with an accelerometer |
US8473561B2 (en) | 2006-06-23 | 2013-06-25 | Research In Motion Limited | System and method for handling electronic mail mismatches |
US8505826B2 (en) | 2007-04-16 | 2013-08-13 | Visa U.S.A. | Anti-interrogation for portable device |
US8539226B2 (en) | 2001-06-12 | 2013-09-17 | Blackberry Limited | Certificate management and transfer system and method |
US8554685B2 (en) | 2010-09-24 | 2013-10-08 | Visa International Service Association | Method and system using universal ID and biometrics |
US8589300B2 (en) | 2007-10-25 | 2013-11-19 | Visa U.S.A. Inc. | Payment transaction using mobile phone as relay |
US8613052B2 (en) | 2010-09-17 | 2013-12-17 | Universal Secure Registry, Llc | Apparatus, system and method employing a wireless user-device |
US8661267B2 (en) | 2001-08-06 | 2014-02-25 | Blackberry Limited | System and method for processing encoded messages |
US8694793B2 (en) | 2007-12-11 | 2014-04-08 | Visa U.S.A. Inc. | Biometric access control transactions |
US8856539B2 (en) | 2001-03-16 | 2014-10-07 | Universal Secure Registry, Llc | Universal secure registry |
US8856043B2 (en) | 2011-02-18 | 2014-10-07 | Visa International Service Association | Method and system for managing data and enabling payment transactions between multiple entities |
US8892556B2 (en) | 2009-11-10 | 2014-11-18 | Ingenia Holdings Limited | Optimisation |
US8896885B2 (en) | 2004-03-12 | 2014-11-25 | Ingenia Holdings Limited | Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure |
US8898473B2 (en) | 2001-06-12 | 2014-11-25 | Blackberry Limited | System and method for compressing secure E-mail for exchange with a mobile data communication device |
US9094429B2 (en) | 2004-08-10 | 2015-07-28 | Blackberry Limited | Server verification of secure electronic messages |
US9202028B2 (en) | 2009-08-05 | 2015-12-01 | Daon Holdings Limited | Methods and systems for authenticating users |
US9262762B2 (en) | 2007-06-04 | 2016-02-16 | Visa U.S.A. Inc. | System and method for processing fees for a card |
US9489674B2 (en) | 2009-05-04 | 2016-11-08 | Visa International Service Association | Frequency-based transaction prediction and processing |
US9978064B2 (en) | 2011-12-30 | 2018-05-22 | Visa International Service Association | Hosted thin-client interface in a payment authorization system |
WO2020145964A1 (en) * | 2019-01-09 | 2020-07-16 | Hewlett-Packard Development Company, L.P. | Secure transactions |
US11227676B2 (en) | 2006-02-21 | 2022-01-18 | Universal Secure Registry, Llc | Universal secure registry |
Families Citing this family (1035)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US7171016B1 (en) | 1993-11-18 | 2007-01-30 | Digimarc Corporation | Method for monitoring internet dissemination of image, video and/or audio files |
US6580819B1 (en) | 1993-11-18 | 2003-06-17 | Digimarc Corporation | Methods of producing security documents having digitally encoded data and documents employing same |
US6122403A (en) | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US6611607B1 (en) | 1993-11-18 | 2003-08-26 | Digimarc Corporation | Integrating digital watermarks in multimedia content |
US5841886A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
US6408082B1 (en) | 1996-04-25 | 2002-06-18 | Digimarc Corporation | Watermark detection using a fourier mellin transform |
US6983051B1 (en) * | 1993-11-18 | 2006-01-03 | Digimarc Corporation | Methods for audio watermarking and decoding |
US6424725B1 (en) | 1996-05-16 | 2002-07-23 | Digimarc Corporation | Determining transformations of media signals with embedded code signals |
US5822436A (en) | 1996-04-25 | 1998-10-13 | Digimarc Corporation | Photographic products and methods employing embedded information |
US6449377B1 (en) * | 1995-05-08 | 2002-09-10 | Digimarc Corporation | Methods and systems for watermark processing of line art images |
US6614914B1 (en) | 1995-05-08 | 2003-09-02 | Digimarc Corporation | Watermark embedder and reader |
US5832119C1 (en) | 1993-11-18 | 2002-03-05 | Digimarc Corp | Methods for controlling systems using control signals embedded in empirical data |
US5748763A (en) | 1993-11-18 | 1998-05-05 | Digimarc Corporation | Image steganography system featuring perceptually adaptive and globally scalable signal embedding |
US5862260A (en) | 1993-11-18 | 1999-01-19 | Digimarc Corporation | Methods for surveying dissemination of proprietary empirical data |
US5768426A (en) | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
US6516079B1 (en) | 2000-02-14 | 2003-02-04 | Digimarc Corporation | Digital watermark screening and detecting strategies |
US6522770B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Management of documents and other objects using optical devices |
US6968057B2 (en) * | 1994-03-17 | 2005-11-22 | Digimarc Corporation | Emulsion products and imagery employing steganography |
US7991347B1 (en) * | 1994-04-07 | 2011-08-02 | Data Innovation Llc | System and method for accessing set of digital data at a remote site |
US6560349B1 (en) | 1994-10-21 | 2003-05-06 | Digimarc Corporation | Audio monitoring using steganographic information |
EP0713197A1 (en) * | 1994-11-15 | 1996-05-22 | Landis & Gyr Technology Innovation AG | Data carrier and corresponding read/write device |
US7882032B1 (en) | 1994-11-28 | 2011-02-01 | Open Invention Network, Llc | System and method for tokenless biometric authorization of electronic communications |
US6397198B1 (en) | 1994-11-28 | 2002-05-28 | Indivos Corporation | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor |
US6192142B1 (en) * | 1994-11-28 | 2001-02-20 | Smarttouch, Inc. | Tokenless biometric electronic stored value transactions |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US6230148B1 (en) | 1994-11-28 | 2001-05-08 | Veristar Corporation | Tokenless biometric electric check transaction |
US6950810B2 (en) * | 1994-11-28 | 2005-09-27 | Indivos Corporation | Tokenless biometric electronic financial transactions via a third party identicator |
US6154879A (en) * | 1994-11-28 | 2000-11-28 | Smarttouch, Inc. | Tokenless biometric ATM access system |
US20040128249A1 (en) | 1994-11-28 | 2004-07-01 | Indivos Corporation, A Delaware Corporation | System and method for tokenless biometric electronic scrip |
US5870723A (en) * | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
US6269348B1 (en) | 1994-11-28 | 2001-07-31 | Veristar Corporation | Tokenless biometric electronic debit and credit transactions |
US5754761A (en) * | 1995-03-06 | 1998-05-19 | Willsey; John A. | Universal sofeware key process |
US5887140A (en) * | 1995-03-27 | 1999-03-23 | Kabushiki Kaisha Toshiba | Computer network system and personal identification system adapted for use in the same |
US5659741A (en) * | 1995-03-29 | 1997-08-19 | Stuart S. Bowie | Computer system and method for storing medical histories using a carrying size card |
US6796492B1 (en) * | 1995-04-13 | 2004-09-28 | James G. Gatto | Electronic fund transfer or transaction system |
US5546523A (en) | 1995-04-13 | 1996-08-13 | Gatto; James G. | Electronic fund transfer system |
US7937312B1 (en) * | 1995-04-26 | 2011-05-03 | Ebay Inc. | Facilitating electronic commerce transactions through binding offers |
US6363164B1 (en) | 1996-05-13 | 2002-03-26 | Cummins-Allison Corp. | Automated document processing system using full image scanning |
US6721440B2 (en) | 1995-05-08 | 2004-04-13 | Digimarc Corporation | Low visibility watermarks using an out-of-phase color |
US5657389A (en) * | 1995-05-08 | 1997-08-12 | Image Data, Llc | Positive identification system and method |
US6760463B2 (en) | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
US6070141A (en) * | 1995-05-08 | 2000-05-30 | Image Data, Llc | System and method of assessing the quality of an identification transaction using an identificaion quality score |
US6728390B2 (en) | 1995-05-08 | 2004-04-27 | Digimarc Corporation | Methods and systems using multiple watermarks |
FR2734937B1 (en) * | 1995-05-30 | 1997-07-25 | Syseca | INTELLIGENT CHIP CARD SYSTEM |
US5884289A (en) * | 1995-06-16 | 1999-03-16 | Card Alert Services, Inc. | Debit card fraud detection and control system |
US5742845A (en) | 1995-06-22 | 1998-04-21 | Datascape, Inc. | System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network |
US5794221A (en) | 1995-07-07 | 1998-08-11 | Egendorf; Andrew | Internet billing method |
US5802497A (en) * | 1995-07-10 | 1998-09-01 | Digital Equipment Corporation | Method and apparatus for conducting computerized commerce |
US6006328A (en) * | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US6788800B1 (en) | 2000-07-25 | 2004-09-07 | Digimarc Corporation | Authenticating objects using embedded data |
US6577746B1 (en) * | 1999-12-28 | 2003-06-10 | Digimarc Corporation | Watermark-based object linking and embedding |
US6829368B2 (en) | 2000-01-26 | 2004-12-07 | Digimarc Corporation | Establishing and interacting with on-line media collections using identifiers in media signals |
US5899998A (en) * | 1995-08-31 | 1999-05-04 | Medcard Systems, Inc. | Method and system for maintaining and updating computerized medical records |
US6016355A (en) * | 1995-12-15 | 2000-01-18 | Veridicom, Inc. | Capacitive fingerprint acquisition sensor |
US6049620A (en) | 1995-12-15 | 2000-04-11 | Veridicom, Inc. | Capacitive fingerprint sensor with adjustable gain |
US6219423B1 (en) | 1995-12-29 | 2001-04-17 | Intel Corporation | System and method for digitally signing a digital agreement between remotely located nodes |
GB9600804D0 (en) * | 1996-01-17 | 1996-03-20 | Robb Garry D | Multiphone |
US5956415A (en) * | 1996-01-26 | 1999-09-21 | Harris Corporation | Enhanced security fingerprint sensor package and related methods |
US6189030B1 (en) * | 1996-02-21 | 2001-02-13 | Infoseek Corporation | Method and apparatus for redirection of server external hyper-link references |
JPH09233066A (en) * | 1996-02-23 | 1997-09-05 | Sony Corp | Encryption/decryption method and its device |
US5801755A (en) * | 1996-04-09 | 1998-09-01 | Echerer; Scott J. | Interactive communciation system for medical treatment of remotely located patients |
JP3140366B2 (en) * | 1996-04-18 | 2001-03-05 | 松下電送システム株式会社 | Email converter for facsimile |
US5881234A (en) * | 1996-04-26 | 1999-03-09 | Schwob; Pierre R. | Method and system to provide internet access to users via non-home service providers |
US5796858A (en) * | 1996-05-10 | 1998-08-18 | Digital Persona, Inc. | Fingerprint sensing system using a sheet prism |
US6945457B1 (en) * | 1996-05-10 | 2005-09-20 | Transaction Holdings Ltd. L.L.C. | Automated transaction machine |
US8950566B2 (en) * | 1996-05-13 | 2015-02-10 | Cummins Allison Corp. | Apparatus, system and method for coin exchange |
US6381341B1 (en) | 1996-05-16 | 2002-04-30 | Digimarc Corporation | Watermark encoding method exploiting biases inherent in original signal |
US5924080A (en) * | 1996-05-28 | 1999-07-13 | Incredicard Llc | Computerized discount redemption system |
JPH09325994A (en) | 1996-06-07 | 1997-12-16 | Sony Corp | System and method for charging |
US5812398A (en) * | 1996-06-10 | 1998-09-22 | Sun Microsystems, Inc. | Method and system for escrowed backup of hotelled world wide web sites |
US6094643A (en) * | 1996-06-14 | 2000-07-25 | Card Alert Services, Inc. | System for detecting counterfeit financial card fraud |
US6324525B1 (en) | 1996-06-17 | 2001-11-27 | Hewlett-Packard Company | Settlement of aggregated electronic transactions over a network |
US5812668A (en) * | 1996-06-17 | 1998-09-22 | Verifone, Inc. | System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture |
US5913921A (en) * | 1996-07-12 | 1999-06-22 | Glenayre Electronics, Inc. | System for communicating information about nodes configuration by generating advertisements having era values for identifying time reference for which the configuration is operative |
US6463416B1 (en) * | 1996-07-15 | 2002-10-08 | Intelli-Check, Inc. | Authentication system for identification documents |
US5933515A (en) * | 1996-07-25 | 1999-08-03 | California Institute Of Technology | User identification through sequential input of fingerprints |
US6035403A (en) * | 1996-09-11 | 2000-03-07 | Hush, Inc. | Biometric based method for software distribution |
US5872834A (en) * | 1996-09-16 | 1999-02-16 | Dew Engineering And Development Limited | Telephone with biometric sensing device |
US5940595A (en) * | 1996-09-23 | 1999-08-17 | Motorola, Inc. | Electronic network navigation device and method for linking to an electronic address therewith |
US5938726A (en) * | 1996-10-04 | 1999-08-17 | Motorola, Inc. | Apparatus for reading an electronic network navigation device and a peripheral for use therewith |
US6138151A (en) * | 1996-09-23 | 2000-10-24 | Motorola, Inc. | Network navigation method for printed articles by using embedded codes for article-associated links |
US6081827A (en) * | 1996-09-23 | 2000-06-27 | Motorola, Inc. | Network navigation methods and systems using an article of mail |
US6181803B1 (en) * | 1996-09-30 | 2001-01-30 | Intel Corporation | Apparatus and method for securely processing biometric information to control access to a node |
US6947580B1 (en) * | 1996-09-30 | 2005-09-20 | Dalton Patrick Enterprises, Inc. | Pointing device with biometric sensor |
US6393270B1 (en) | 1996-10-11 | 2002-05-21 | Bellsouth Intellectual Property Corp. | Network authentication method for over the air activation |
CN1183449C (en) | 1996-10-25 | 2005-01-05 | 施卢默格系统公司 | using a high level programming language with a microcontroller |
US7249344B1 (en) * | 1996-10-31 | 2007-07-24 | Citicorp Development Center, Inc. | Delivery of financial services to remote devices |
US5867153A (en) | 1996-10-30 | 1999-02-02 | Transaction Technology, Inc. | Method and system for automatically harmonizing access to a software application program via different access devices |
US5915001A (en) * | 1996-11-14 | 1999-06-22 | Vois Corporation | System and method for providing and using universally accessible voice and speech data files |
CN1244984A (en) * | 1996-11-22 | 2000-02-16 | T-内提克斯公司 | Voice recognition for information system access and transaction processing |
US6259805B1 (en) * | 1996-12-04 | 2001-07-10 | Dew Engineering And Development Limited | Biometric security encryption system |
US6498861B1 (en) | 1996-12-04 | 2002-12-24 | Activcard Ireland Limited | Biometric security encryption system |
US8225089B2 (en) | 1996-12-04 | 2012-07-17 | Otomaku Properties Ltd., L.L.C. | Electronic transaction systems utilizing a PEAD and a private key |
US8982856B2 (en) | 1996-12-06 | 2015-03-17 | Ipco, Llc | Systems and methods for facilitating wireless network communication, satellite-based wireless network systems, and aircraft-based wireless network systems, and related methods |
US7054271B2 (en) | 1996-12-06 | 2006-05-30 | Ipco, Llc | Wireless network system and method for providing same |
US6023708A (en) * | 1997-05-29 | 2000-02-08 | Visto Corporation | System and method for using a global translator to synchronize workspace elements across a network |
US6131116A (en) * | 1996-12-13 | 2000-10-10 | Visto Corporation | System and method for globally accessing computer services |
US6085192A (en) * | 1997-04-11 | 2000-07-04 | Roampage, Inc. | System and method for securely synchronizing multiple copies of a workspace element in a network |
US6708221B1 (en) * | 1996-12-13 | 2004-03-16 | Visto Corporation | System and method for globally and securely accessing unified information in a computer network |
US7287271B1 (en) | 1997-04-08 | 2007-10-23 | Visto Corporation | System and method for enabling secure access to services in a computer network |
US20060195595A1 (en) * | 2003-12-19 | 2006-08-31 | Mendez Daniel J | System and method for globally and securely accessing unified information in a computer network |
US6430305B1 (en) * | 1996-12-20 | 2002-08-06 | Synaptics, Incorporated | Identity verification methods |
US6149056A (en) | 1997-02-06 | 2000-11-21 | Mr. Payroll Corporation | Automatic check cashing using biometric identification verification |
US6145738A (en) * | 1997-02-06 | 2000-11-14 | Mr. Payroll Corporation | Method and apparatus for automatic check cashing |
US5864830A (en) * | 1997-02-13 | 1999-01-26 | Armetta; David | Data processing method of configuring and monitoring a satellite spending card linked to a host credit card |
US6401080B1 (en) * | 1997-03-21 | 2002-06-04 | International Business Machines Corporation | Intelligent agent with negotiation capability and method of negotiation therewith |
TW504632B (en) | 1997-03-21 | 2002-10-01 | Ibm | Apparatus and method for optimizing the performance of computer tasks using intelligent agent with multiple program modules having varied degrees of domain knowledge |
US6766454B1 (en) | 1997-04-08 | 2004-07-20 | Visto Corporation | System and method for using an authentication applet to identify and authenticate a user in a computer network |
US5961590A (en) * | 1997-04-11 | 1999-10-05 | Roampage, Inc. | System and method for synchronizing electronic mail between a client site and a central site |
US6002946A (en) | 1997-04-14 | 1999-12-14 | Motorola, Inc. | Handheld device having an optical data reader |
US5944787A (en) * | 1997-04-21 | 1999-08-31 | Sift, Inc. | Method for automatically finding postal addresses from e-mail addresses |
US6125192A (en) * | 1997-04-21 | 2000-09-26 | Digital Persona, Inc. | Fingerprint recognition system |
US6105010A (en) * | 1997-05-09 | 2000-08-15 | Gte Service Corporation | Biometric certifying authorities |
US6202151B1 (en) * | 1997-05-09 | 2001-03-13 | Gte Service Corporation | System and method for authenticating electronic transactions using biometric certificates |
US6092055A (en) * | 1997-05-14 | 2000-07-18 | Portal Software, Inc. | Method and apparatus for providing a clean accounting close for a real time billing system |
US6047284A (en) | 1997-05-14 | 2000-04-04 | Portal Software, Inc. | Method and apparatus for object oriented storage and retrieval of data from a relational database |
US6018739A (en) * | 1997-05-15 | 2000-01-25 | Raytheon Company | Biometric personnel identification system |
US7290288B2 (en) | 1997-06-11 | 2007-10-30 | Prism Technologies, L.L.C. | Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network |
BR9806000A (en) * | 1997-06-17 | 2000-01-25 | Purdue Pharma Lp | Self-destructive document and system for sending messages by e-mail. |
US6137654A (en) * | 1997-06-23 | 2000-10-24 | Motorola, Inc. | Device having a diskette-like housing and a wireless transceiver and methods therefor |
US6157966A (en) * | 1997-06-30 | 2000-12-05 | Schlumberger Malco, Inc. | System and method for an ISO7816 complaint smart card to become master over a terminal |
US6523041B1 (en) * | 1997-07-29 | 2003-02-18 | Acxiom Corporation | Data linking system and method using tokens |
US7127420B1 (en) | 1997-08-01 | 2006-10-24 | Financial Systems Technology (Intellectual Property) Pty. Ltd. | Data processing system for complex pricing and transactional analysis |
US6052672A (en) * | 1997-08-01 | 2000-04-18 | Financial Systems Technology Pty Ltd. | Data processing system for complex pricing and transactional analysis |
US7743247B1 (en) * | 1997-08-08 | 2010-06-22 | Synectic Design LLC | Method and apparatus for secure communications |
NO305420B1 (en) * | 1997-09-02 | 1999-05-25 | Ericsson Telefon Ab L M | Device by computer communication system, especially by communication through firewalls |
US7222087B1 (en) * | 1997-09-12 | 2007-05-22 | Amazon.Com, Inc. | Method and system for placing a purchase order via a communications network |
US5960411A (en) | 1997-09-12 | 1999-09-28 | Amazon.Com, Inc. | Method and system for placing a purchase order via a communications network |
WO1999014707A1 (en) * | 1997-09-16 | 1999-03-25 | Invisitech Corporation | Personal identification system using multiple parameters having low cross-correlation |
US6317544B1 (en) * | 1997-09-25 | 2001-11-13 | Raytheon Company | Distributed mobile biometric identification system with a centralized server and mobile workstations |
US6320974B1 (en) | 1997-09-25 | 2001-11-20 | Raytheon Company | Stand-alone biometric identification system |
US7265853B1 (en) * | 1997-10-17 | 2007-09-04 | Stamps.Com, Inc. | Postage server system and method |
EP1025551A2 (en) * | 1997-10-22 | 2000-08-09 | Interx Technologies Inc. | Method and apparatus for certificate management in support of non-repudiation |
US5987155A (en) * | 1997-10-27 | 1999-11-16 | Dew Engineering And Development Limited | Biometric input device with peripheral port |
ES2173652T5 (en) * | 1997-10-28 | 2010-10-13 | First Data Mobile Holdings Limited | PROCEDURE FOR THE DIGITAL SIGNATURE OF A MESSAGE. |
DK0950229T3 (en) * | 1997-11-07 | 2001-04-09 | Swisscom Mobile Ag | Method, system and arrangement for determining the authenticity of persons |
AU2196899A (en) * | 1997-11-14 | 1999-06-07 | Digitalpersona, Inc. | A remotely accessible private space using a fingerprint |
US6122737A (en) * | 1997-11-14 | 2000-09-19 | Digital Persona, Inc. | Method for using fingerprints to distribute information over a network |
US6035398A (en) * | 1997-11-14 | 2000-03-07 | Digitalpersona, Inc. | Cryptographic key generation using biometric data |
GB2331821A (en) * | 1997-11-27 | 1999-06-02 | Northern Telecom Ltd | Electronic sealed envelope |
DE19753933A1 (en) * | 1997-12-05 | 1999-06-10 | Cit Alcatel | Access control for service-on-demand system, e.g. pay television |
AU1930099A (en) * | 1997-12-17 | 1999-07-05 | Smarttouch, Inc. | Tokenless financial access system |
US6151606A (en) * | 1998-01-16 | 2000-11-21 | Visto Corporation | System and method for using a workspace data manager to access, manipulate and synchronize network data |
GB9800854D0 (en) * | 1998-01-16 | 1998-03-11 | Nexus Corp | A material and device for terminal transaction |
US6092192A (en) * | 1998-01-16 | 2000-07-18 | International Business Machines Corporation | Apparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment |
US6804376B2 (en) | 1998-01-20 | 2004-10-12 | Digimarc Corporation | Equipment employing watermark-based authentication function |
WO1999039310A1 (en) | 1998-01-30 | 1999-08-05 | Phelps Barry C | Biometric authentication system and method |
US6856974B1 (en) * | 1998-02-02 | 2005-02-15 | Checkfree Corporation | Electronic bill presentment technique with enhanced biller control |
US6292898B1 (en) | 1998-02-04 | 2001-09-18 | Spyrus, Inc. | Active erasure of electronically stored data upon tamper detection |
US6980670B1 (en) | 1998-02-09 | 2005-12-27 | Indivos Corporation | Biometric tokenless electronic rewards system and method |
US6308270B1 (en) | 1998-02-13 | 2001-10-23 | Schlumberger Technologies, Inc. | Validating and certifying execution of a software program with a smart card |
US6225890B1 (en) | 1998-03-20 | 2001-05-01 | Trimble Navigation Limited | Vehicle use control |
US6112992A (en) * | 1998-06-17 | 2000-09-05 | Motorola, Inc. | Optical code reader and methods and articles therefor |
US6064990A (en) * | 1998-03-31 | 2000-05-16 | International Business Machines Corporation | System for electronic notification of account activity |
US6618806B1 (en) * | 1998-04-01 | 2003-09-09 | Saflink Corporation | System and method for authenticating users in a computer network |
US6529932B1 (en) * | 1998-04-01 | 2003-03-04 | Microsoft Corporation | Method and system for distributed transaction processing with asynchronous message delivery |
US6167517A (en) * | 1998-04-09 | 2000-12-26 | Oracle Corporation | Trusted biometric client authentication |
US7340423B1 (en) | 1998-04-24 | 2008-03-04 | First Data Corporation | Method for defining a relationship between an account and a group |
US20020198806A1 (en) * | 1998-04-24 | 2002-12-26 | First Data Corporation | Systems and methods for accessing and modifying usage parameters associated with a financial transaction account |
US7050996B1 (en) * | 1998-04-24 | 2006-05-23 | First Data Corporation | Method for linking accounts corresponding to different products together to create a group |
US20030171992A1 (en) * | 1999-04-23 | 2003-09-11 | First Data Corporation | System and methods for redeeming rewards associated with accounts |
US7076465B1 (en) * | 1998-04-24 | 2006-07-11 | First Data Corporation | Methods for processing a group of accounts corresponding to different products |
US6348970B1 (en) | 1998-04-29 | 2002-02-19 | Qwest Communications Int'l., Inc. | Apparatus and method for interfacing a computer network to a facsimile machine |
US6044464A (en) * | 1998-05-08 | 2000-03-28 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method of protecting broadcast data by fingerprinting a common decryption function |
US6233341B1 (en) | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
US7039805B1 (en) | 1998-05-20 | 2006-05-02 | Messing John H | Electronic signature method |
US6438585B2 (en) * | 1998-05-29 | 2002-08-20 | Research In Motion Limited | System and method for redirecting message attachments between a host system and a mobile data communication device |
US7209949B2 (en) | 1998-05-29 | 2007-04-24 | Research In Motion Limited | System and method for synchronizing information between a host system and a mobile data communication device |
US6324310B1 (en) | 1998-06-02 | 2001-11-27 | Digital Persona, Inc. | Method and apparatus for scanning a fingerprint using a linear sensor |
US6126075A (en) | 1998-06-04 | 2000-10-03 | Motorola, Inc. | Optical code reader including circuitry for processing the read symbology |
GB2338381A (en) * | 1998-06-10 | 1999-12-15 | Barclays Bank Plc | Cryptographic authentication for internet using two servers |
WO1999065175A1 (en) * | 1998-06-10 | 1999-12-16 | Sandia Corporation | Method for generating, storing, and verifying a binding between an authorized user and a token |
US6260760B1 (en) | 1998-06-17 | 2001-07-17 | Motorola, Inc. | Optical code reader including circuitry for processing the symbology |
US7231068B2 (en) * | 1998-06-19 | 2007-06-12 | Solidus Networks, Inc. | Electronic transaction verification system |
US7349557B2 (en) * | 1998-06-19 | 2008-03-25 | Solidus Networks, Inc. | Electronic transaction verification system |
US6437692B1 (en) | 1998-06-22 | 2002-08-20 | Statsignal Systems, Inc. | System and method for monitoring and controlling remote devices |
US6914893B2 (en) | 1998-06-22 | 2005-07-05 | Statsignal Ipc, Llc | System and method for monitoring and controlling remote devices |
US8410931B2 (en) | 1998-06-22 | 2013-04-02 | Sipco, Llc | Mobile inventory unit monitoring systems and methods |
US6891838B1 (en) | 1998-06-22 | 2005-05-10 | Statsignal Ipc, Llc | System and method for monitoring and controlling residential devices |
US6296071B1 (en) | 1998-06-30 | 2001-10-02 | Harley-Davidson Motor Company Group, Inc. | Motorcycle rocker assembly |
US6928547B2 (en) * | 1998-07-06 | 2005-08-09 | Saflink Corporation | System and method for authenticating users in a computer network |
EP0971327A3 (en) * | 1998-07-07 | 2002-03-06 | Citibank, N.A. | Method and system for providing financial services such as home banking |
US7398119B2 (en) * | 1998-07-13 | 2008-07-08 | Childrens Hospital Los Angeles | Assessing blood brain barrier dynamics or identifying or measuring selected substances, including ethanol or toxins, in a subject by analyzing Raman spectrum signals |
US6606602B1 (en) | 1998-07-20 | 2003-08-12 | Usa Technologies, Inc. | Vending machine control system having access to the internet for the purposes of transacting e-mail, e-commerce, and e-business, and for conducting vending transactions |
US6615183B1 (en) * | 1998-07-20 | 2003-09-02 | Usa Technologies, Inc. | Method of warehousing user data entered at an electronic commerce terminal |
US6601037B1 (en) * | 1998-07-20 | 2003-07-29 | Usa Technologies, Inc. | System and method of processing credit card, e-commerce, and e-business transactions without the merchant incurring transaction processing fees or charges worldwide |
US6604087B1 (en) * | 1998-07-20 | 2003-08-05 | Usa Technologies, Inc. | Vending access to the internet, business application software, e-commerce, and e-business in a hotel room |
US6601038B1 (en) * | 1998-07-20 | 2003-07-29 | Usa Technologies, Inc. | Delivery of goods and services resultant from an electronic commerce transaction by way of a pack and ship type company |
US6807532B1 (en) | 1998-07-20 | 2004-10-19 | Usa Technologies, Inc. | Method of soliciting a user to input survey data at an electronic commerce terminal |
US6763336B1 (en) | 1998-07-20 | 2004-07-13 | Usa Technologies, Inc. | Method of transacting an electronic mail, an electronic commerce, and an electronic business transaction by an electronic commerce terminal using a wirelessly networked plurality of portable digital devices |
US6611810B1 (en) * | 1998-07-20 | 2003-08-26 | Usa Technologies, Inc. | Store display window connected to an electronic commerce terminal |
US6609102B2 (en) | 1998-07-20 | 2003-08-19 | Usa Technologies, Inc. | Universal interactive advertizing and payment system for public access electronic commerce and business related products and services |
US6604085B1 (en) | 1998-07-20 | 2003-08-05 | Usa Technologies, Inc. | Universal interactive advertising and payment system network for public access electronic commerce and business related products and services |
US6604086B1 (en) * | 1998-07-20 | 2003-08-05 | Usa Technologies, Inc. | Electronic commerce terminal connected to a vending machine operable as a telephone |
US6601039B1 (en) | 1998-07-20 | 2003-07-29 | Usa Technologies, Inc. | Gas pump control system having access to the internet for the purposes of transacting e-mail, e-commerce, and e-business, and for conducting vending transactions |
US6188781B1 (en) | 1998-07-28 | 2001-02-13 | Digital Persona, Inc. | Method and apparatus for illuminating a fingerprint through side illumination of a platen |
US6950539B2 (en) * | 1998-09-16 | 2005-09-27 | Digital Persona | Configurable multi-function touchpad device |
EP1116191B1 (en) * | 1998-09-22 | 2002-08-14 | Siemens Aktiengesellschaft | Method and device for verifying the authorization to log onto a system |
US6167383A (en) * | 1998-09-22 | 2000-12-26 | Dell Usa, Lp | Method and apparatus for providing customer configured machines at an internet site |
US6550010B1 (en) | 1998-09-30 | 2003-04-15 | Bellsouth Intellectual Property Corp. | Method and apparatus for a unit locked against use until unlocked and/or activated on a selected network |
WO2000078085A1 (en) | 1999-06-15 | 2000-12-21 | Bellsouth Intellectual Property Corporation | Methods and apparatus for over-the-air programming of a wireless unit |
US7599681B2 (en) * | 1998-09-30 | 2009-10-06 | At&T Intellectual Property I, L.P. | Methods and apparatus of over-the-air programming of a wireless unit |
WO2000019733A2 (en) | 1998-09-30 | 2000-04-06 | Bellsouth Intellectual Property Corporation | Method and apparatus for a unit locked against use until unlocked and/or activated on a selected network |
US7617125B1 (en) * | 1998-10-07 | 2009-11-10 | Paypal, Inc. | System and method for storage and retrieval of information subject to authorization by a data controller |
US6591229B1 (en) | 1998-10-09 | 2003-07-08 | Schlumberger Industries, Sa | Metrology device with programmable smart card |
IL126552A (en) * | 1998-10-13 | 2007-06-03 | Nds Ltd | Remote administration of smart cards for secure access systems |
US7386727B1 (en) | 1998-10-24 | 2008-06-10 | Encorus Holdings Limited | Method for digital signing of a message |
US6871220B1 (en) | 1998-10-28 | 2005-03-22 | Yodlee, Inc. | System and method for distributed storage and retrieval of personal information |
US7765279B1 (en) | 1998-10-28 | 2010-07-27 | Verticalone Corporation | System and method for scheduling harvesting of personal information |
US6519565B1 (en) * | 1998-11-10 | 2003-02-11 | Voice Security Systems, Inc. | Method of comparing utterances for security control |
WO2000031692A1 (en) * | 1998-11-20 | 2000-06-02 | Ptt Post Holdings B.V. | Method and devices for printing a franking mark on a document |
NL1010616C2 (en) * | 1998-11-20 | 2000-05-23 | Ptt Post Holdings Bv | Method and devices for printing a franking mark on a document. |
AUPP752398A0 (en) | 1998-12-04 | 1999-01-07 | Collins, Lyal Sidney | Secure multi-point data transfer system |
AU754026B2 (en) * | 1998-12-04 | 2002-10-31 | Lyal Sidney Collins | Message identification with confidentiality, integrity, and source authentication |
US7085997B1 (en) | 1998-12-08 | 2006-08-01 | Yodlee.Com | Network-based bookmark management and web-summary system |
US6175923B1 (en) | 1998-12-08 | 2001-01-16 | Senetas Corporation Limited | Secure system using images of only part of a body as the key where the part has continuously-changing features |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US7200804B1 (en) * | 1998-12-08 | 2007-04-03 | Yodlee.Com, Inc. | Method and apparatus for providing automation to an internet navigation application |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US7444374B1 (en) * | 1998-12-10 | 2008-10-28 | Michelle Baker | Electronic mail software with modular integrated authoring/reading software components including methods and apparatus for controlling the interactivity between mail authors and recipients |
CA2291920A1 (en) * | 1998-12-11 | 2000-06-11 | Karuna Ganesan | Technique for conducting secure transactions over a network |
JP2000188594A (en) * | 1998-12-21 | 2000-07-04 | Sony Corp | Authentication system, fingerprint collation device and authentication method |
US6567913B1 (en) | 1998-12-24 | 2003-05-20 | Pitney Bowes Inc. | Selective security level certificate meter |
US7209889B1 (en) | 1998-12-24 | 2007-04-24 | Henry Whitfield | Secure system for the issuance, acquisition, and redemption of certificates in a transaction network |
US6044350A (en) * | 1998-12-24 | 2000-03-28 | Pitney Bowes Inc. | Certificate meter with selectable indemnification provisions |
US6763467B1 (en) | 1999-02-03 | 2004-07-13 | Cybersoft, Inc. | Network traffic intercepting method and system |
US6097035A (en) * | 1999-02-22 | 2000-08-01 | Digital Persona, Inc. | Fingerprint detection apparatus with partial fingerprint images |
EP1159799B1 (en) * | 1999-02-26 | 2006-07-26 | Bitwise Designs, Inc. | Digital file management and imaging system and method including secure file marking |
US7305562B1 (en) | 1999-03-09 | 2007-12-04 | Citibank, N.A. | System, method and computer program product for an authentication management infrastructure |
US6256737B1 (en) | 1999-03-09 | 2001-07-03 | Bionetrix Systems Corporation | System, method and computer program product for allowing access to enterprise resources using biometric devices |
US7650425B2 (en) | 1999-03-18 | 2010-01-19 | Sipco, Llc | System and method for controlling communication between a host computer and communication devices associated with remote devices in an automated monitoring system |
US20120131657A1 (en) * | 1999-03-19 | 2012-05-24 | Gold Standard Technology Llc | Apparatus and Method for Authenticated Multi-User Personal Information Database |
US6401239B1 (en) * | 1999-03-22 | 2002-06-04 | B.I.S. Advanced Software Systems Ltd. | System and method for quick downloading of electronic files |
US6804778B1 (en) * | 1999-04-15 | 2004-10-12 | Gilian Technologies, Ltd. | Data quality assurance |
US20020095298A1 (en) * | 1999-04-19 | 2002-07-18 | Frogmagic, Inc. | Blind Gift Method and System |
US7216232B1 (en) * | 1999-04-20 | 2007-05-08 | Nec Corporation | Method and device for inserting and authenticating a digital signature in digital data |
US20070055628A1 (en) * | 1999-04-23 | 2007-03-08 | First Data Corporation | Authorizing transactions associated with accounts |
AU2597200A (en) * | 1999-04-23 | 2000-11-10 | First Data Resources, Inc. | Methods for processing a group of accounts corresponding to different products |
US20030212620A1 (en) * | 1999-04-23 | 2003-11-13 | First Data Corporation | Systems and methods for authorizing transactions |
US6678664B1 (en) | 1999-04-26 | 2004-01-13 | Checkfree Corporation | Cashless transactions without credit cards, debit cards or checks |
EP1049056A3 (en) * | 1999-04-26 | 2001-06-13 | CheckFree Corporation | Electronic bill presentment and/or payment clearinghouse |
NO313949B1 (en) * | 1999-04-29 | 2002-12-30 | Ericsson Telefon Ab L M | Authentication in mobile networks |
DE19919909C2 (en) * | 1999-04-30 | 2001-07-19 | Wincor Nixdorf Gmbh & Co Kg | Signing and signature verification of messages |
US6615191B1 (en) * | 1999-05-11 | 2003-09-02 | E. Addison Seeley | Software licensing and distribution systems and methods employing biometric sample authentication |
US6282304B1 (en) | 1999-05-14 | 2001-08-28 | Biolink Technologies International, Inc. | Biometric system for biometric input, comparison, authentication and access control and method therefor |
US7246244B2 (en) * | 1999-05-14 | 2007-07-17 | Fusionarc, Inc. A Delaware Corporation | Identity verification method using a central biometric authority |
US7752535B2 (en) | 1999-06-01 | 2010-07-06 | Yodlec.com, Inc. | Categorization of summarized information |
US20040078423A1 (en) * | 2002-03-22 | 2004-04-22 | Ramakrishna Satyavolu | Method and apparatus for controlled establishment of a turnkey system providing a centralized data aggregation and summary capability to third party entities |
US6477565B1 (en) * | 1999-06-01 | 2002-11-05 | Yodlee.Com, Inc. | Method and apparatus for restructuring of personalized data for transmission from a data network to connected and portable network appliances |
US7158948B1 (en) * | 1999-06-10 | 2007-01-02 | International Business Machines Corporation | Method and apparatus for encoding transactions for goods and services using an e-receipt |
US6543047B1 (en) | 1999-06-15 | 2003-04-01 | Dell Usa, L.P. | Method and apparatus for testing custom-configured software/hardware integration in a computer build-to-order manufacturing process |
JP4519963B2 (en) * | 1999-06-21 | 2010-08-04 | 富士通株式会社 | Biometric information encryption / decryption method and apparatus, and personal authentication system using biometric information |
US7058817B1 (en) | 1999-07-02 | 2006-06-06 | The Chase Manhattan Bank | System and method for single sign on process for websites with multiple applications and services |
US6418325B1 (en) | 1999-07-12 | 2002-07-09 | Motorola, Inc. | Handheld device having an optical data reader |
US6681034B1 (en) * | 1999-07-15 | 2004-01-20 | Precise Biometrics | Method and system for fingerprint template matching |
US7373517B1 (en) | 1999-08-19 | 2008-05-13 | Visto Corporation | System and method for encrypting and decrypting files |
JP3490350B2 (en) * | 1999-08-30 | 2004-01-26 | 沖電気工業株式会社 | Electronic payment system |
US7505941B2 (en) | 1999-08-31 | 2009-03-17 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions using biometrics |
US7953671B2 (en) | 1999-08-31 | 2011-05-31 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7239226B2 (en) | 2001-07-10 | 2007-07-03 | American Express Travel Related Services Company, Inc. | System and method for payment using radio frequency identification in contact and contactless transactions |
US7889052B2 (en) | 2001-07-10 | 2011-02-15 | Xatra Fund Mx, Llc | Authorizing payment subsequent to RF transactions |
US7010701B1 (en) * | 1999-10-19 | 2006-03-07 | Sbc Properties, L.P. | Network arrangement for smart card applications |
US7039656B1 (en) * | 1999-10-20 | 2006-05-02 | Yodlee.Com, Inc. | Method and apparatus for synchronizing data records between a remote device and a data server over a data-packet-network |
US8036431B1 (en) * | 1999-10-29 | 2011-10-11 | Identix Incorporated | Portable apparatus for identification verification |
GB9927372D0 (en) * | 1999-11-20 | 2000-01-19 | Ncr Int Inc | Self-service terminal |
CA2392229C (en) * | 1999-11-30 | 2016-08-30 | Transforming Technologies, Inc. | Methods, systems, and apparatuses for secure interactions |
US7149509B2 (en) * | 1999-12-06 | 2006-12-12 | Twenty Year Innovations, Inc. | Methods and apparatuses for programming user-defined information into electronic devices |
US8170538B2 (en) * | 1999-12-06 | 2012-05-01 | Solocron Media, Llc | Methods and apparatuses for programming user-defined information into electronic devices |
US6496692B1 (en) | 1999-12-06 | 2002-12-17 | Michael E. Shanahan | Methods and apparatuses for programming user-defined information into electronic devices |
US7107457B2 (en) * | 1999-12-06 | 2006-09-12 | Bsi2000, Inc. | Optical card based system for individualized tracking and record keeping |
WO2001044888A2 (en) * | 1999-12-17 | 2001-06-21 | World Theatre, Inc. | Centralized telephone order and distribution system |
US7424444B1 (en) | 1999-12-20 | 2008-09-09 | Dell Usa, L.P. | Apparatus and method for configuring computers |
US6446045B1 (en) | 2000-01-10 | 2002-09-03 | Lucinda Stone | Method for using computers to facilitate and control the creating of a plurality of functions |
US20040034598A1 (en) * | 2000-01-20 | 2004-02-19 | Timothy Robinson | System and method for biological authorization for financial transactions |
WO2001056213A1 (en) * | 2000-01-26 | 2001-08-02 | Citicorp Development Center, Inc. | System and method for user authentication |
EP1257983A2 (en) * | 2000-02-10 | 2002-11-20 | Jon Shore | Apparatus, systems and methods for wirelessly transacting financial transfers, electronically recordable authorization transfers, and other information transfers |
US6625297B1 (en) | 2000-02-10 | 2003-09-23 | Digimarc Corporation | Self-orienting watermarks |
US8701857B2 (en) | 2000-02-11 | 2014-04-22 | Cummins-Allison Corp. | System and method for processing currency bills and tickets |
GB2359156B (en) * | 2000-02-14 | 2004-10-13 | Reuters Ltd | Methods of computer programs for and apparatus for providing and accessing digital content |
IL134527A (en) * | 2000-02-14 | 2011-08-31 | Bioguard Components And Technology Ltd | Biometrics interface |
US6453301B1 (en) | 2000-02-23 | 2002-09-17 | Sony Corporation | Method of using personal device with internal biometric in conducting transactions over a network |
US7703131B1 (en) * | 2000-03-01 | 2010-04-20 | Microsoft Corporation | Secured distributed impersonation |
EP1275262A4 (en) * | 2000-03-16 | 2006-04-19 | Harex Infotech Inc | Optical payment transceiver and system using the same |
KR20000030808A (en) * | 2000-03-17 | 2000-06-05 | 오세호 | Identify oneself method of a communications network |
US7739334B1 (en) | 2000-03-17 | 2010-06-15 | Visto Corporation | System and method for automatically forwarding email and email events via a computer network to a server computer |
US7441263B1 (en) | 2000-03-23 | 2008-10-21 | Citibank, N.A. | System, method and computer program product for providing unified authentication services for online applications |
US7526560B1 (en) * | 2000-03-30 | 2009-04-28 | Oracle International Corporation | Method and apparatus for sharing a secure connection between a client and multiple server nodes |
CA2408181C (en) * | 2000-04-04 | 2010-06-29 | Bruce D. Sunstein | Apparatus and method for assuring the integrity of a multi-user personal information database |
JP2001290959A (en) * | 2000-04-05 | 2001-10-19 | Nec Corp | Method and system for mail order business using network |
US6804377B2 (en) | 2000-04-19 | 2004-10-12 | Digimarc Corporation | Detecting information hidden out-of-phase in color channels |
US7107245B1 (en) * | 2000-04-20 | 2006-09-12 | Gaming System Technologies, Llc | Biometric gaming access system |
US6813716B1 (en) * | 2000-04-24 | 2004-11-02 | At&T Corp. | Secure calling card and authentication process |
US20080008173A1 (en) * | 2000-04-26 | 2008-01-10 | International Business Machines Corporation | Methods and Apparatus for Transmitting Data in a Packet Network |
US6518560B1 (en) | 2000-04-27 | 2003-02-11 | Veridicom, Inc. | Automatic gain amplifier for biometric sensor device |
US7216106B1 (en) | 2000-04-28 | 2007-05-08 | Netdeposit, Inc. | Method and system for processing financial instrument deposits physically remote from a financial institution |
US7386511B2 (en) * | 2000-04-28 | 2008-06-10 | Netdeposit Inc. | Methods and systems for processing financial instrument deposits |
US7181430B1 (en) | 2000-04-28 | 2007-02-20 | Netdeposit, Inc. | Method and system for processing financial instrument deposits physically remote from a financial institution |
US6968458B1 (en) * | 2000-04-28 | 2005-11-22 | Ian Ruddle | Apparatus and method for providing secure communication on a network |
US7475040B2 (en) * | 2000-04-28 | 2009-01-06 | Netdeposit, Inc. | Return item early notification and return |
US7318050B1 (en) * | 2000-05-08 | 2008-01-08 | Verizon Corporate Services Group Inc. | Biometric certifying authorities |
SE518378C2 (en) * | 2000-05-12 | 2002-10-01 | Macab Ab | Communication network for data network access via cable television networks |
JP4511684B2 (en) * | 2000-05-16 | 2010-07-28 | 日本電気株式会社 | Biometrics identity verification service provision system |
US20020143862A1 (en) * | 2000-05-19 | 2002-10-03 | Atitania Ltd. | Method and apparatus for transferring information between a source and a destination on a network |
US6944773B1 (en) * | 2000-05-19 | 2005-09-13 | Sony Corporation | Method and apparatus for fingerprint authentication during on-line transactions |
US20020049614A1 (en) * | 2000-05-23 | 2002-04-25 | Rice Marion R. | Image signatures with unique watermark ID |
US7295988B1 (en) * | 2000-05-25 | 2007-11-13 | William Reeves | Computer system for optical scanning, storage, organization, authentication and electronic transmitting and receiving of medical records and patient information, and other sensitive legal documents |
US9165323B1 (en) | 2000-05-31 | 2015-10-20 | Open Innovation Network, LLC | Biometric transaction system and method |
WO2001093167A1 (en) * | 2000-05-31 | 2001-12-06 | Indivos Corporation | Biometric financial transaction system and method |
US6895502B1 (en) | 2000-06-08 | 2005-05-17 | Curriculum Corporation | Method and system for securely displaying and confirming request to perform operation on host computer |
US6836554B1 (en) | 2000-06-16 | 2004-12-28 | International Business Machines Corporation | System and method for distorting a biometric for transactions with enhanced security and privacy |
US7120607B2 (en) * | 2000-06-16 | 2006-10-10 | Lenovo (Singapore) Pte. Ltd. | Business system and method using a distorted biometrics |
MY134895A (en) * | 2000-06-29 | 2007-12-31 | Multimedia Glory Sdn Bhd | Biometric verification for electronic transactions over the web |
US7587368B2 (en) * | 2000-07-06 | 2009-09-08 | David Paul Felsher | Information record infrastructure, system and method |
EP1180750A1 (en) * | 2000-08-18 | 2002-02-20 | Siemens Aktiengesellschaft | Method and system for transmitting an amount of electronic money from a credit memory |
EP1180748A1 (en) * | 2000-08-18 | 2002-02-20 | Siemens Aktiengesellschaft | Method and system for transmitting an amount of electronic money from a credit memory by WAP |
US6938019B1 (en) * | 2000-08-29 | 2005-08-30 | Uzo Chijioke Chukwuemeka | Method and apparatus for making secure electronic payments |
US6714264B1 (en) | 2000-08-31 | 2004-03-30 | Matsushita Electric Industrial Co., Ltd. | Digital television channel surfing system |
JP4660900B2 (en) * | 2000-08-31 | 2011-03-30 | ソニー株式会社 | Personal authentication application data processing system, personal authentication application data processing method, information processing apparatus, and program providing medium |
WO2002019282A2 (en) * | 2000-08-31 | 2002-03-07 | Atm Direct, Inc. | System and method for online atm transaction with digital certificate |
WO2002021838A1 (en) * | 2000-09-06 | 2002-03-14 | Robert Agresta | Entertainment server with portable terminal |
WO2002023796A1 (en) * | 2000-09-11 | 2002-03-21 | Sentrycom Ltd. | A biometric-based system and method for enabling authentication of electronic messages sent over a network |
US7225231B2 (en) | 2000-09-20 | 2007-05-29 | Visto Corporation | System and method for transmitting workspace elements across a network |
US7006986B1 (en) | 2000-09-25 | 2006-02-28 | Ecardless Bancorp, Ltd. | Order file processes for purchasing on the internet using verified order information |
US9202206B2 (en) | 2000-09-25 | 2015-12-01 | Ecardless Bancorp, Ltd. | Secure financial transaction processing using location information |
US20020174062A1 (en) * | 2001-05-16 | 2002-11-21 | Sines Randy D. | Purchasing on the internet using verified order information and bank payment assurance |
US7080048B1 (en) | 2000-09-25 | 2006-07-18 | Ecardless Bancorp, Ltd. | Purchasing on the internet using verified order information and bank payment assurance |
US20050038715A1 (en) * | 2000-09-25 | 2005-02-17 | Ecardless Bancorp Ltd. | Customer processing for purchasing on the internet using verified order information |
US7063253B1 (en) * | 2000-09-27 | 2006-06-20 | Diebold SCLF-Service Systems division of Diebold, Incorporated | Cash dispensing automated banking machine software authorization system and method |
AU2001293248A1 (en) | 2000-10-03 | 2002-04-15 | Abraham R. Zingher | Biometric system and method for detecting duress transactions |
US7254619B2 (en) * | 2000-10-13 | 2007-08-07 | Matsushita Electric Industrial Co., Ltd. | Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network |
US6978022B2 (en) * | 2000-10-26 | 2005-12-20 | General Instrument Corporation | System for securing encryption renewal system and for registration and remote activation of encryption device |
US7343299B2 (en) * | 2000-11-06 | 2008-03-11 | Symbol Technologies, Inc. | System and methods for mail security |
US7386456B2 (en) * | 2000-11-06 | 2008-06-10 | Symbol Technologies, Inc. | System and methods for transportation and delivery using bar codes |
US20020066040A1 (en) * | 2000-11-30 | 2002-05-30 | Roman Rozenberg | Secure computerized network access system and method |
US7512806B2 (en) * | 2000-11-30 | 2009-03-31 | Palmsource, Inc. | Security technique for controlling access to a network by a wireless device |
US20040098740A1 (en) * | 2000-12-07 | 2004-05-20 | Maritzen L. Michael | Method and apparatus for using a kiosk and a transaction device in an electronic commerce system |
US20020095580A1 (en) * | 2000-12-08 | 2002-07-18 | Brant Candelore | Secure transactions using cryptographic processes |
US7251633B2 (en) | 2000-12-11 | 2007-07-31 | Sony Corporation | Method or system for executing deferred transactions |
US7765163B2 (en) * | 2000-12-12 | 2010-07-27 | Sony Corporation | System and method for conducting secure transactions over a network |
US20020076819A1 (en) * | 2000-12-14 | 2002-06-20 | Bowman Danny Charles | Paperless chain of custody evidence for lab samples |
WO2002059770A1 (en) * | 2000-12-18 | 2002-08-01 | Cora Alisuag | Computer oriented record administration system |
US20020087468A1 (en) * | 2000-12-28 | 2002-07-04 | Ravi Ganesan | Electronic payment risk processing |
WO2002054341A1 (en) * | 2001-01-08 | 2002-07-11 | Stefaan De Schrijver, Incorporated | Commersign: systems and methods for secure electronic business transactions |
AU2002235353A1 (en) * | 2001-01-08 | 2002-07-16 | Stefaan De Schrijver, Incorporated | Pics: apparatus and methods for personal management of privacy, integrity, credentialing and security in electronic transactions |
US6961599B2 (en) * | 2001-01-09 | 2005-11-01 | Childrens Hospital Los Angeles | Identifying or measuring selected substances or toxins in a subject using resonant raman signals |
US7310734B2 (en) | 2001-02-01 | 2007-12-18 | 3M Innovative Properties Company | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US7606744B1 (en) | 2001-02-16 | 2009-10-20 | Financial Systems Technology (Intellectual Property) Pty. Ltd. | System and method for real-time pricing with volume discounting |
US7117370B2 (en) * | 2001-02-20 | 2006-10-03 | Sal Khan | System for transmitting secure data between a sender and a recipient over a computer network using a virtual envelope and method for using the same |
US20020124190A1 (en) | 2001-03-01 | 2002-09-05 | Brian Siegel | Method and system for restricted biometric access to content of packaged media |
AU2002248604A1 (en) * | 2001-03-09 | 2002-09-24 | Pascal Brandys | System and method of user and data verification |
US20030172027A1 (en) * | 2001-03-23 | 2003-09-11 | Scott Walter G. | Method for conducting a credit transaction using biometric information |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US7805338B2 (en) * | 2001-03-26 | 2010-09-28 | Usa Technologies, Inc. | Method of constructing a digital content play list for transmission and presentation on a public access electronic terminal |
US7028191B2 (en) * | 2001-03-30 | 2006-04-11 | Michener John R | Trusted authorization device |
US20020147588A1 (en) * | 2001-04-05 | 2002-10-10 | Davis Dustin M. | Method and system for interacting with a biometric verification system |
US20020147921A1 (en) * | 2001-04-05 | 2002-10-10 | Bullock Garland R. | Method and system for migrating dynamic master templates in a biometric verification system |
US20030036998A1 (en) * | 2001-04-05 | 2003-02-20 | Alliston R. Michael | Method and system for detecting incorrect merchant code used with payment card transaction |
US6914517B2 (en) * | 2001-04-17 | 2005-07-05 | Dalton Patrick Enterprises, Inc. | Fingerprint sensor with feature authentication |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US7159114B1 (en) | 2001-04-23 | 2007-01-02 | Diebold, Incorporated | System and method of securely installing a terminal master key on an automated banking machine |
US7418592B1 (en) * | 2001-04-23 | 2008-08-26 | Diebold, Incorporated | Automated banking machine system and method |
US7110986B1 (en) | 2001-04-23 | 2006-09-19 | Diebold, Incorporated | Automated banking machine system and method |
WO2002095553A2 (en) * | 2001-05-18 | 2002-11-28 | Imprivata Inc. | Biometric authentication for remote initiation of actions and services |
US20020176611A1 (en) * | 2001-05-23 | 2002-11-28 | Dong Mimi C. | Fingerprint addressing system and method |
US7725427B2 (en) | 2001-05-25 | 2010-05-25 | Fred Bishop | Recurrent billing maintenance with radio frequency payment devices |
US7085932B1 (en) * | 2001-05-25 | 2006-08-01 | Evresearch, Ltd. | Extensible and flexible electronic information tracking systems and methods |
US6970854B2 (en) * | 2001-05-25 | 2005-11-29 | Hewlett-Packard Development Company, L.P. | System for remote signature writing |
US20020184500A1 (en) * | 2001-05-29 | 2002-12-05 | Michael Maritzen | System and method for secure entry and authentication of consumer-centric information |
WO2002099598A2 (en) | 2001-06-07 | 2002-12-12 | First Usa Bank, N.A. | System and method for rapid updating of credit information |
US6601762B2 (en) * | 2001-06-15 | 2003-08-05 | Koninklijke Philips Electronics N.V. | Point-of-sale (POS) voice authentication transaction system |
US7174323B1 (en) * | 2001-06-22 | 2007-02-06 | Mci, Llc | System and method for multi-modal authentication using speaker verification |
AU2002345935A1 (en) * | 2001-06-26 | 2003-03-03 | Enterprises Solutions, Inc. | Transaction verification system and method |
US20030009691A1 (en) * | 2001-07-06 | 2003-01-09 | Lyons Martha L. | Centralized clearinghouse for entitlement information |
FI20011498A0 (en) * | 2001-07-09 | 2001-07-09 | Ericsson Telefon Ab L M | Method and system for verification of electronic signatures |
US7705732B2 (en) | 2001-07-10 | 2010-04-27 | Fred Bishop | Authenticating an RF transaction using a transaction counter |
US9024719B1 (en) | 2001-07-10 | 2015-05-05 | Xatra Fund Mx, Llc | RF transaction system and method for storing user personal data |
US7303120B2 (en) | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US7360689B2 (en) | 2001-07-10 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a FOB |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US8548927B2 (en) | 2001-07-10 | 2013-10-01 | Xatra Fund Mx, Llc | Biometric registration for facilitating an RF transaction |
US7493288B2 (en) | 2001-07-10 | 2009-02-17 | Xatra Fund Mx, Llc | RF payment via a mobile device |
US9031880B2 (en) | 2001-07-10 | 2015-05-12 | Iii Holdings 1, Llc | Systems and methods for non-traditional payment using biometric data |
US8294552B2 (en) | 2001-07-10 | 2012-10-23 | Xatra Fund Mx, Llc | Facial scan biometrics on a payment device |
US20040236699A1 (en) | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for hand geometry recognition biometrics on a fob |
US7668750B2 (en) | 2001-07-10 | 2010-02-23 | David S Bonalle | Securing RF transactions using a transactions counter |
US7735725B1 (en) | 2001-07-10 | 2010-06-15 | Fred Bishop | Processing an RF transaction using a routing number |
US7249112B2 (en) | 2002-07-09 | 2007-07-24 | American Express Travel Related Services Company, Inc. | System and method for assigning a funding source for a radio frequency identification device |
US7266839B2 (en) | 2001-07-12 | 2007-09-04 | J P Morgan Chase Bank | System and method for providing discriminated content to network users |
DE60124893T2 (en) * | 2001-07-16 | 2007-06-21 | Francotyp-Postalia Gmbh | Security module for an account management system |
US20030018522A1 (en) * | 2001-07-20 | 2003-01-23 | Psc Scanning, Inc. | Biometric system and method for identifying a customer upon entering a retail establishment |
US20020010715A1 (en) * | 2001-07-26 | 2002-01-24 | Garry Chinn | System and method for browsing using a limited display device |
US20030037238A1 (en) * | 2001-08-16 | 2003-02-20 | Warner Gregory Rade | Paperless records in aircraft maintenance |
DE10139888A1 (en) * | 2001-08-20 | 2003-03-20 | Bayerische Motoren Werke Ag | Method for the automatic login of a subscriber station, in particular in a motor vehicle, into an external information system |
US20030044050A1 (en) * | 2001-08-28 | 2003-03-06 | International Business Machines Corporation | System and method for biometric identification and response |
US7444676B1 (en) | 2001-08-29 | 2008-10-28 | Nader Asghari-Kamrani | Direct authentication and authorization system and method for trusted network of financial institutions |
US20030046154A1 (en) * | 2001-08-29 | 2003-03-06 | Blaine Larson | Coupon marketing system |
US8281129B1 (en) | 2001-08-29 | 2012-10-02 | Nader Asghari-Kamrani | Direct authentication system and method via trusted authenticators |
WO2003021476A1 (en) * | 2001-08-31 | 2003-03-13 | Trac Medical Solutions, Inc. | System for interactive processing of form documents |
US7243227B1 (en) * | 2001-09-07 | 2007-07-10 | Xilinx, Inc. | Method and apparatus to copy protect software programs |
US20030061480A1 (en) * | 2001-09-14 | 2003-03-27 | Franck Le | Method of authenticating IP paging requests as security mechanism, device and system therefor |
AU2002334067A1 (en) * | 2001-09-18 | 2003-04-01 | Data Treasury Corportion | Private secure information repository with biometric authentication |
US7464059B1 (en) | 2001-09-21 | 2008-12-09 | Yt Acquisition Corporation | System and method for purchase benefits at a point of sale |
US7624073B1 (en) | 2001-09-21 | 2009-11-24 | Yt Acquisition Corporation | System and method for categorizing transactions |
US20030177102A1 (en) * | 2001-09-21 | 2003-09-18 | Timothy Robinson | System and method for biometric authorization for age verification |
US8200980B1 (en) | 2001-09-21 | 2012-06-12 | Open Invention Network, Llc | System and method for enrolling in a biometric system |
US20040153421A1 (en) * | 2001-09-21 | 2004-08-05 | Timothy Robinson | System and method for biometric authorization of age-restricted transactions conducted at an unattended device |
US7765164B1 (en) | 2001-09-21 | 2010-07-27 | Yt Acquisition Corporation | System and method for offering in-lane periodical subscriptions |
US7269737B2 (en) | 2001-09-21 | 2007-09-11 | Pay By Touch Checking Resources, Inc. | System and method for biometric authorization for financial transactions |
US7533809B1 (en) | 2001-09-21 | 2009-05-19 | Yt Acquisition Corporation | System and method for operating a parking facility |
US9189788B1 (en) | 2001-09-21 | 2015-11-17 | Open Invention Network, Llc | System and method for verifying identity |
US7103576B2 (en) * | 2001-09-21 | 2006-09-05 | First Usa Bank, Na | System for providing cardless payment |
US7437330B1 (en) | 2002-09-20 | 2008-10-14 | Yt Acquisition Corp. | System and method for categorizing transactions |
US20040015243A1 (en) * | 2001-09-28 | 2004-01-22 | Dwyane Mercredi | Biometric authentication |
JP2003110544A (en) * | 2001-09-28 | 2003-04-11 | Toshiba Corp | Device and method for enciphering and deciphering |
JP2003173430A (en) * | 2001-09-28 | 2003-06-20 | Sharp Corp | Ic card, scramble releasing device, server device, physical characteristic reader, permitter determining method, permitter registering method, frequency managing method, permitter determining program, permittter registering program, and frequency managing program |
US20030074559A1 (en) * | 2001-10-12 | 2003-04-17 | Lee Riggs | Methods and systems for receiving training through electronic data networks using remote hand held devices |
US8489063B2 (en) | 2001-10-24 | 2013-07-16 | Sipco, Llc | Systems and methods for providing emergency messages to a mobile device |
US7480501B2 (en) | 2001-10-24 | 2009-01-20 | Statsignal Ipc, Llc | System and method for transmitting an emergency message over an integrated wireless network |
US20030083945A1 (en) * | 2001-10-26 | 2003-05-01 | Jimmy Ng Kee Hooi | Transaction authorization method, system and device |
US7424527B2 (en) | 2001-10-30 | 2008-09-09 | Sipco, Llc | System and method for transmitting pollution information over an integrated wireless network |
US20030229811A1 (en) * | 2001-10-31 | 2003-12-11 | Cross Match Technologies, Inc. | Method that provides multi-tiered authorization and identification |
CA2467404A1 (en) * | 2001-11-15 | 2003-05-30 | Visto Corporation | System and methods for asychronous synchronization |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US7243853B1 (en) * | 2001-12-04 | 2007-07-17 | Visa U.S.A. Inc. | Method and system for facilitating memory and application management on a secured token |
US6687390B2 (en) * | 2001-12-04 | 2004-02-03 | Applied Neural Conputing Ltd. | System for and method of web signature recognition system based on object map |
US6901387B2 (en) * | 2001-12-07 | 2005-05-31 | General Electric Capital Financial | Electronic purchasing method and apparatus for performing the same |
US7003669B2 (en) * | 2001-12-17 | 2006-02-21 | Monk Bruce C | Document and bearer verification system |
WO2003053060A1 (en) * | 2001-12-17 | 2003-06-26 | Digeo, Inc. | Remote control using a biometric scanner in an interactive television system |
US7278026B2 (en) * | 2002-01-02 | 2007-10-02 | Mcgowan Tim | Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication |
US7305700B2 (en) | 2002-01-08 | 2007-12-04 | Seven Networks, Inc. | Secure transport for mobile communication network |
US6896118B2 (en) | 2002-01-10 | 2005-05-24 | Cummins-Allison Corp. | Coin redemption system |
US20030144910A1 (en) * | 2002-01-30 | 2003-07-31 | Flaherty Stephen C. | System and method for distributing inventory for point-of-sale activation services |
US20040015702A1 (en) * | 2002-03-01 | 2004-01-22 | Dwayne Mercredi | User login delegation |
US6993510B2 (en) * | 2002-03-05 | 2006-01-31 | First Data Corporation | System and method for managing accounts |
US20030172282A1 (en) * | 2002-03-07 | 2003-09-11 | International Business Machines Corporation | Log-on processing |
JP3753994B2 (en) * | 2002-03-11 | 2006-03-08 | 松下電器産業株式会社 | Manufacturing method of semiconductor device |
US7743902B2 (en) | 2002-03-11 | 2010-06-29 | Cummins-Allison Corp. | Optical coin discrimination sensor and coin processing system using the same |
US8099393B2 (en) | 2002-03-22 | 2012-01-17 | Oracle International Corporation | Transaction in memory object store |
US20030179229A1 (en) * | 2002-03-25 | 2003-09-25 | Julian Van Erlach | Biometrically-determined device interface and content |
US20180165441A1 (en) | 2002-03-25 | 2018-06-14 | Glenn Cobourn Everhart | Systems and methods for multifactor authentication |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US8086867B2 (en) * | 2002-03-26 | 2011-12-27 | Northrop Grumman Systems Corporation | Secure identity and privilege system |
US20050076213A1 (en) * | 2002-04-12 | 2005-04-07 | James Conlow | Self-enrollment and authentication method |
US20030200322A1 (en) * | 2002-04-18 | 2003-10-23 | International Business Machines Corporation | Autonomic system for selective administation isolation of a secure remote management of systems in a computer network |
US20060206725A1 (en) * | 2002-04-23 | 2006-09-14 | Michael Milgramm | System and method for platform-independent biometrically verified secure information transfer and access control |
US20030208361A1 (en) * | 2002-05-02 | 2003-11-06 | Belinne Daryl Jarvis | Configuration of systems with services |
US7520422B1 (en) | 2002-05-10 | 2009-04-21 | Phoenix Check Cashing, Inc. | System and method for depositing negotiable instruments |
US7753268B1 (en) | 2002-05-10 | 2010-07-13 | Phoenix Check Cashing, Inc. | System and method for negotiable instrument cashing transaction assistance procedures |
US7614550B1 (en) | 2002-05-10 | 2009-11-10 | Phoenix Check Cashing, Inc. | System and method for negotiable instrument cashing fee setup by type |
US6957770B1 (en) | 2002-05-10 | 2005-10-25 | Biopay, Llc | System and method for biometric authorization for check cashing |
US7708189B1 (en) | 2002-05-17 | 2010-05-04 | Cipriano Joseph J | Identification verification system and method |
US20030216987A1 (en) * | 2002-05-17 | 2003-11-20 | Cassandra Mollett | Systems and methods for accessing and using phone number validation information |
US20030216989A1 (en) * | 2002-05-17 | 2003-11-20 | Cassandra Mollett | Systems and methods for validation of phone numbers |
US20030216988A1 (en) * | 2002-05-17 | 2003-11-20 | Cassandra Mollett | Systems and methods for using phone number validation in a risk assessment |
US20030217014A1 (en) * | 2002-05-17 | 2003-11-20 | Cassandra Mollett | Systems and methods for storing and using phone number validations |
JP2004054893A (en) * | 2002-05-29 | 2004-02-19 | Canon Inc | Control method for image forming device |
US7174332B2 (en) * | 2002-06-11 | 2007-02-06 | Ip. Com, Inc. | Method and apparatus for safeguarding files |
US9813514B2 (en) | 2002-06-12 | 2017-11-07 | Good Technology Holdings Limited | Information repository system including a wireless device and related method |
US20080046592A1 (en) | 2002-06-26 | 2008-02-21 | Research In Motion Limited | System and Method for Pushing Information Between a Host System and a Mobile Data Communication Device |
US20040003081A1 (en) * | 2002-06-26 | 2004-01-01 | Microsoft Corporation | System and method for providing program credentials |
US8644466B1 (en) | 2002-07-08 | 2014-02-04 | Veridicom, Sa De Cv | Interjurisdictional recording mechanism |
EP3223186B1 (en) * | 2002-07-09 | 2021-03-31 | Smartrac Technology Fletcher, Inc. | System and method for providing secure identification solutions |
CA2901250A1 (en) * | 2002-07-12 | 2004-01-22 | Apple Inc. | Personal authentication software and systems for travel privilege assignation and verification |
AU2003261234A1 (en) * | 2002-07-25 | 2004-02-16 | Bio-Key International, Inc. | Trusted biometric device |
US20040019543A1 (en) * | 2002-07-25 | 2004-01-29 | First Data Corporation | Systems and methods for non-account based liability reporting |
US7590861B2 (en) * | 2002-08-06 | 2009-09-15 | Privaris, Inc. | Methods for secure enrollment and backup of personal identity credentials into electronic devices |
AU2003259893B2 (en) * | 2002-08-09 | 2009-03-12 | Blackberry Limited | System and method for preventing access to data on a compromised remote device |
US20040123106A1 (en) * | 2002-08-27 | 2004-06-24 | Lexent Technologies, Inc. | Apparatus and methods for motion and proximity enhanced remote identity broadcast with biometric authentication |
US7877607B2 (en) * | 2002-08-30 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Tamper-evident data management |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
AU2003296773A1 (en) * | 2002-09-13 | 2004-04-30 | Datatreasury Corporation | Processing of credit card transactions using internet protocol |
US20040059590A1 (en) * | 2002-09-13 | 2004-03-25 | Dwayne Mercredi | Credential promotion |
US20040139021A1 (en) * | 2002-10-07 | 2004-07-15 | Visa International Service Association | Method and system for facilitating data access and management on a secure token |
US20040078603A1 (en) * | 2002-10-18 | 2004-04-22 | Eiji Ogura | System and method of protecting data |
US8073773B2 (en) * | 2002-11-01 | 2011-12-06 | Checkfree Corporation | Technique for identifying probable billers of a consumer |
US7729996B2 (en) * | 2002-11-01 | 2010-06-01 | Checkfree Corporation | Reuse of an EBP account through alternate authentication |
US20040133509A1 (en) * | 2002-11-01 | 2004-07-08 | Mccoy Randal A. | Technique for making payments for a non-subscriber payor |
US20040133513A1 (en) * | 2002-11-01 | 2004-07-08 | Mccoy Randal | Identity protection technique in matching consumers with electronic billers |
US7395243B1 (en) | 2002-11-01 | 2008-07-01 | Checkfree Corporation | Technique for presenting matched billers to a consumer |
US7526448B2 (en) * | 2002-11-01 | 2009-04-28 | Checkfree Corporation | Matching consumers with billers having bills available for electronic presentment |
US20040139011A1 (en) * | 2002-11-01 | 2004-07-15 | Kozee Casey W. | Technique for identifying probable payees of a consumer |
US20040133515A1 (en) * | 2002-11-01 | 2004-07-08 | Mccoy Randal A. | Distributed matching of consumers with billers having bills available for electronic presentment |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
JP2004171416A (en) * | 2002-11-21 | 2004-06-17 | Ntt Docomo Inc | Communication terminal, value substance providing server, application distribution server, electronic purchase support system, electronic purchase support method and electronic purchase support program |
US7404006B1 (en) * | 2002-12-20 | 2008-07-22 | Symantec Operating Corporation | Publishing a network address in a computer network |
US7644433B2 (en) * | 2002-12-23 | 2010-01-05 | Authernative, Inc. | Authentication system and method based upon random partial pattern recognition |
US20040125990A1 (en) * | 2002-12-26 | 2004-07-01 | Motorola, Inc. | Method and apparatus for asperity detection |
US7917468B2 (en) | 2005-08-01 | 2011-03-29 | Seven Networks, Inc. | Linking of personal information management data |
US7853563B2 (en) | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
US8468126B2 (en) | 2005-08-01 | 2013-06-18 | Seven Networks, Inc. | Publishing data in an information community |
US7233690B2 (en) * | 2003-01-14 | 2007-06-19 | Lacy Donald D | Method and system for fraud detection |
US20040148226A1 (en) * | 2003-01-28 | 2004-07-29 | Shanahan Michael E. | Method and apparatus for electronic product information and business transactions |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US7788177B2 (en) * | 2003-02-19 | 2010-08-31 | Bible Jr Robert | Encrypted e-commerce product |
US6834894B2 (en) * | 2003-02-20 | 2004-12-28 | Shree G. Khaitan | Apparatus for tying knot and method thereof |
US8393455B2 (en) | 2003-03-12 | 2013-03-12 | Cummins-Allison Corp. | Coin processing device having a moveable coin receptacle station |
JP2004297792A (en) * | 2003-03-13 | 2004-10-21 | Ricoh Co Ltd | Image forming apparatus and function key assignment method |
DE10311634A1 (en) * | 2003-03-14 | 2004-09-30 | Authentidate International Ag | Electronic transmission of documents |
GB2400193A (en) * | 2003-03-29 | 2004-10-06 | Hewlett Packard Development Co | Method of authenticating a log-on request |
US8571902B1 (en) | 2003-04-18 | 2013-10-29 | Unisys Corporation | Remote biometric verification |
EP1480107A3 (en) * | 2003-05-16 | 2006-05-24 | Berner Fachhochschule Hochschule für Technik und Architektur Biel | Method for authentication of a user with an authorizing device, and a security apparatus for carrying out the method |
CA2527829C (en) | 2003-05-30 | 2016-09-27 | Privaris, Inc. | A man-machine interface for controlling access to electronic devices |
CA2534987A1 (en) * | 2003-07-09 | 2005-01-27 | Cross Match Technologies, Inc. | Systems and methods for facilitating transactions |
US20050119991A1 (en) * | 2003-09-03 | 2005-06-02 | David Delgrosso | Access administration system and method |
US20050049932A1 (en) * | 2003-09-03 | 2005-03-03 | Howell James A. | Process for managing subscription service purchases |
US8489452B1 (en) | 2003-09-10 | 2013-07-16 | Target Brands, Inc. | Systems and methods for providing a user incentive program using smart card technology |
US20050071270A1 (en) * | 2003-09-26 | 2005-03-31 | Ramirez Christopher W. | Process for remote recovery and creation of machine specific authentication keys for systems |
US7949594B2 (en) * | 2003-09-26 | 2011-05-24 | First Data Corporation | Systems and methods for participant controlled communications regarding financial accounts |
US7715059B2 (en) * | 2003-10-22 | 2010-05-11 | International Business Machines Corporation | Facsimile system, method and program product with junk fax disposal |
US7310807B2 (en) * | 2003-10-29 | 2007-12-18 | Sbc Knowledge Ventures, L.P. | System and method for local video distribution |
US7400751B2 (en) * | 2003-11-06 | 2008-07-15 | Ultra-Scan Corporation | Imaging device and method having a pivotable transducer |
US7743980B2 (en) * | 2003-11-12 | 2010-06-29 | De Sylva Robert Francis | System and method for facilitating monetary transactions |
US8015085B2 (en) | 2003-11-14 | 2011-09-06 | First Data Corporation | System for distributing funds |
US7415138B2 (en) * | 2003-11-25 | 2008-08-19 | Ultra-Scan Corporation | Biometric authorization method and system |
US7725732B1 (en) * | 2003-12-16 | 2010-05-25 | Ballard Claudio R | Object authentication system |
US7028893B2 (en) * | 2003-12-17 | 2006-04-18 | Motorola, Inc. | Fingerprint based smartcard |
US20050138421A1 (en) * | 2003-12-23 | 2005-06-23 | Fedronic Dominique L.J. | Server mediated security token access |
US7113981B2 (en) * | 2003-12-29 | 2006-09-26 | Mixxer, Inc. | Cellular telephone download locker |
US20050149988A1 (en) * | 2004-01-06 | 2005-07-07 | Sbc Knowledge Ventures, L.P. | Delivering interactive television components in real time for live broadcast events |
US20050273444A1 (en) * | 2004-02-05 | 2005-12-08 | David Delgrosso | Access administration system and method for a currency compartment |
US7770022B2 (en) * | 2004-02-06 | 2010-08-03 | Sharp Laboratories Of America, Inc. | Systems and methods for securing an imaging job |
FR2867002B1 (en) * | 2004-02-27 | 2006-05-26 | Gemplus Card Int | METHOD, AUTHENTICATION MEDIUM, AND IMPROVED DEVICE FOR SECURING ACCESS TO EQUIPMENT |
US8364957B2 (en) | 2004-03-02 | 2013-01-29 | International Business Machines Corporation | System and method of providing credentials in a network |
US7756086B2 (en) | 2004-03-03 | 2010-07-13 | Sipco, Llc | Method for communicating in dual-modes |
US20050216340A1 (en) * | 2004-03-03 | 2005-09-29 | Schneider John K | Biometric loyalty transaction system and method |
US8031650B2 (en) | 2004-03-03 | 2011-10-04 | Sipco, Llc | System and method for monitoring remote devices with a dual-mode wireless communication protocol |
US7861006B2 (en) | 2004-03-23 | 2010-12-28 | Mcnulty Scott | Apparatus, method and system for a tunneling client access point |
US20140019352A1 (en) | 2011-02-22 | 2014-01-16 | Visa International Service Association | Multi-purpose virtual card transaction apparatuses, methods and systems |
US20050246291A1 (en) * | 2004-04-14 | 2005-11-03 | David Delgrosso | System and method for creating an account using biometric information |
TWI276888B (en) * | 2004-04-22 | 2007-03-21 | Novatek Microelectronics Corp | Data transferring method |
US20050254100A1 (en) * | 2004-05-17 | 2005-11-17 | Venali, Inc. | Ticket exchange for combating fax spam |
US8615601B2 (en) * | 2004-05-21 | 2013-12-24 | Oracle International Corporation | Liquid computing |
US20060136555A1 (en) * | 2004-05-21 | 2006-06-22 | Bea Systems, Inc. | Secure service oriented architecture |
KR100818992B1 (en) * | 2004-05-31 | 2008-04-03 | 삼성전자주식회사 | Apparatus and method for sending and receiving digital right objects in a transfomred format between device and portable storage |
US20050265587A1 (en) * | 2004-06-01 | 2005-12-01 | Schneider John K | Fingerprint image database and method of matching fingerprint sample to fingerprint images |
US20050278426A1 (en) * | 2004-06-15 | 2005-12-15 | First Data Corporation | Systems and methods for merging communications |
US20050289061A1 (en) * | 2004-06-24 | 2005-12-29 | Michael Kulakowski | Secure authentication system for collectable and consumer items |
US20060016869A1 (en) * | 2004-07-01 | 2006-01-26 | American Express Travel Related Services Company, Inc. | Method and system for auditory emissions recognition biometrics on a smartcard |
US7325724B2 (en) | 2004-07-01 | 2008-02-05 | American Express Travel Related Services Company, Inc. | Method for registering a biometric for use with a smartcard |
US7314165B2 (en) | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | Method and system for smellprint recognition biometrics on a smartcard |
US7318550B2 (en) | 2004-07-01 | 2008-01-15 | American Express Travel Related Services Company, Inc. | Biometric safeguard method for use with a smartcard |
US7314164B2 (en) | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | System for biometric security using a smartcard |
US7363504B2 (en) | 2004-07-01 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for keystroke scan recognition biometrics on a smartcard |
US7383231B2 (en) | 2004-07-19 | 2008-06-03 | Amazon Technologies, Inc. | Performing automatically authorized programmatic transactions |
US8904458B2 (en) | 2004-07-29 | 2014-12-02 | At&T Intellectual Property I, L.P. | System and method for pre-caching a first portion of a video file on a set-top box |
US20060026043A1 (en) * | 2004-07-30 | 2006-02-02 | Schneider John K | Medical records system and method |
US8584257B2 (en) * | 2004-08-10 | 2013-11-12 | At&T Intellectual Property I, L.P. | Method and interface for video content acquisition security on a set-top box |
US20060037043A1 (en) * | 2004-08-10 | 2006-02-16 | Sbc Knowledge Ventures, L.P. | Method and interface for managing movies on a set-top box |
US8402040B2 (en) | 2004-08-20 | 2013-03-19 | Morphotrust Usa, Inc. | Method and system to authenticate an object |
US20060048178A1 (en) * | 2004-08-26 | 2006-03-02 | Sbc Knowledge Ventures, L.P. | Interface for controlling service actions at a set top box from a remote control |
US20060064380A1 (en) * | 2004-09-15 | 2006-03-23 | Zev Zukerman | Methods and systems for performing tokenless financial transactions over a transaction network using biometric data |
US8523641B2 (en) | 2004-09-15 | 2013-09-03 | Cummins-Allison Corp. | System, method and apparatus for automatically filling a coin cassette |
US9934640B2 (en) | 2004-09-15 | 2018-04-03 | Cummins-Allison Corp. | System, method and apparatus for repurposing currency |
US20200226680A1 (en) * | 2004-09-21 | 2020-07-16 | Refinitiv Us Organization Llc | Financial market trading system |
JP4373314B2 (en) * | 2004-09-30 | 2009-11-25 | 富士通株式会社 | Authentication system using biometric information |
US8086261B2 (en) * | 2004-10-07 | 2011-12-27 | At&T Intellectual Property I, L.P. | System and method for providing digital network access and digital broadcast services using combined channels on a single physical medium to the customer premises |
US8074082B2 (en) * | 2004-10-08 | 2011-12-06 | Aprolase Development Co., Llc | Anti-tamper module |
US7004387B1 (en) * | 2004-10-15 | 2006-02-28 | Kaimikaua Charles M | System and method for preventing theft at automatic teller machines |
US8010082B2 (en) | 2004-10-20 | 2011-08-30 | Seven Networks, Inc. | Flexible billing architecture |
US7441271B2 (en) | 2004-10-20 | 2008-10-21 | Seven Networks | Method and apparatus for intercepting events in a communication system |
US8001082B1 (en) | 2004-10-28 | 2011-08-16 | Good Technology, Inc. | System and method of data security in synchronizing data with a wireless device |
CN101048898B (en) * | 2004-10-29 | 2012-02-01 | 麦德托尼克公司 | Lithium-ion battery and medical device |
US7860318B2 (en) | 2004-11-09 | 2010-12-28 | Intelli-Check, Inc | System and method for comparing documents |
US20060174279A1 (en) * | 2004-11-19 | 2006-08-03 | Sbc Knowledge Ventures, L.P. | System and method for managing television tuners |
US7643818B2 (en) * | 2004-11-22 | 2010-01-05 | Seven Networks, Inc. | E-mail messaging to/from a mobile terminal |
US7706781B2 (en) | 2004-11-22 | 2010-04-27 | Seven Networks International Oy | Data security in a mobile e-mail service |
US7716714B2 (en) * | 2004-12-01 | 2010-05-11 | At&T Intellectual Property I, L.P. | System and method for recording television content at a set top box |
US8434116B2 (en) | 2004-12-01 | 2013-04-30 | At&T Intellectual Property I, L.P. | Device, system, and method for managing television tuners |
FI117152B (en) | 2004-12-03 | 2006-06-30 | Seven Networks Internat Oy | E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful |
US20060122894A1 (en) * | 2004-12-03 | 2006-06-08 | Mcgary Jon | User configured order status updates |
US7474359B2 (en) * | 2004-12-06 | 2009-01-06 | At&T Intellectual Properties I, L.P. | System and method of displaying a video stream |
WO2006061463A1 (en) * | 2004-12-10 | 2006-06-15 | Seven Networks International Oy | Database synchronization |
US20060136741A1 (en) * | 2004-12-16 | 2006-06-22 | Saflink Corporation | Two factor token identification |
US20060141804A1 (en) * | 2004-12-28 | 2006-06-29 | Goodman Cathryn E | Method and apparatus to facilitate electrostatic discharge resiliency |
FI120165B (en) * | 2004-12-29 | 2009-07-15 | Seven Networks Internat Oy | Synchronization of a database through a mobile network |
US20060156372A1 (en) * | 2005-01-12 | 2006-07-13 | Sbc Knowledge Ventures, L.P. | System, method and interface for managing content at a set top box |
US7436346B2 (en) * | 2005-01-20 | 2008-10-14 | At&T Intellectual Property I, L.P. | System, method and interface for controlling multiple electronic devices of a home entertainment system via a single control device |
JP4449762B2 (en) * | 2005-01-24 | 2010-04-14 | コニカミノルタビジネステクノロジーズ株式会社 | Person verification device, person verification system, and person verification method |
US9439126B2 (en) | 2005-01-25 | 2016-09-06 | Sipco, Llc | Wireless network protocol system and methods |
US20060168610A1 (en) * | 2005-01-26 | 2006-07-27 | Sbc Knowledge Ventures, L.P. | System and method of managing content |
US20060174309A1 (en) * | 2005-01-28 | 2006-08-03 | Sbc Knowledge Ventures, L.P. | System and method of managing set top box memory |
US8768838B1 (en) | 2005-02-02 | 2014-07-01 | Nexus Payments, LLC | Financial transactions using a rule-module nexus and a user account registry |
US7307574B2 (en) * | 2005-02-02 | 2007-12-11 | Sbc Knowledge Ventures, Lp | Remote control, apparatus, system and methods of using the same |
US11288666B1 (en) | 2005-02-02 | 2022-03-29 | Edge Mobile Payments Llc | System and method for real-time processing of on-line financial transactions using a universal financial token and a remotely located rule-module clearinghouse |
US8639629B1 (en) | 2005-02-02 | 2014-01-28 | Nexus Payments, LLC | System and method for accessing an online user account registry via a thin-client unique user code |
US20060179466A1 (en) * | 2005-02-04 | 2006-08-10 | Sbc Knowledge Ventures, L.P. | System and method of providing email service via a set top box |
US8602200B2 (en) | 2005-02-10 | 2013-12-10 | Cummins-Allison Corp. | Method and apparatus for varying coin-processing machine receptacle limits |
US20060184991A1 (en) * | 2005-02-14 | 2006-08-17 | Sbc Knowledge Ventures, Lp | System and method of providing television content |
US8214859B2 (en) * | 2005-02-14 | 2012-07-03 | At&T Intellectual Property I, L.P. | Automatic switching between high definition and standard definition IP television signals |
US20060193462A1 (en) * | 2005-02-28 | 2006-08-31 | Gregg Hansen | System for optimizing configurable information handling systems |
US20060195396A1 (en) * | 2005-02-28 | 2006-08-31 | Checkfree Corporation | Centralized customer care for electronic payments and other transactions via a wide area communications network |
US20060195397A1 (en) * | 2005-02-28 | 2006-08-31 | Checkfree Corporation | Centralized electronic bill presentment |
US20060218590A1 (en) * | 2005-03-10 | 2006-09-28 | Sbc Knowledge Ventures, L.P. | System and method for displaying an electronic program guide |
US7877703B1 (en) | 2005-03-14 | 2011-01-25 | Seven Networks, Inc. | Intelligent rendering of information in a limited display environment |
WO2006102625A2 (en) * | 2005-03-24 | 2006-09-28 | Privaris, Inc. | Biometric identification device with smartcard capabilities |
US20060230421A1 (en) * | 2005-03-30 | 2006-10-12 | Sbc Knowledge Ventures, Lp | Method of using an entertainment system and an apparatus and handset for use with the entertainment system |
US20080298647A1 (en) * | 2005-04-08 | 2008-12-04 | Us Biometrics Corporation | System and Method for Identifying an Enrolled User Utilizing a Biometric Identifier |
US20060253358A1 (en) * | 2005-04-08 | 2006-11-09 | David Delgrosso | System and method for identifying and managing customers in a financial institution |
US20060236343A1 (en) * | 2005-04-14 | 2006-10-19 | Sbc Knowledge Ventures, Lp | System and method of locating and providing video content via an IPTV network |
US8438633B1 (en) | 2005-04-21 | 2013-05-07 | Seven Networks, Inc. | Flexible real-time inbox access |
US7796742B1 (en) | 2005-04-21 | 2010-09-14 | Seven Networks, Inc. | Systems and methods for simplified provisioning |
US8223935B2 (en) | 2005-04-30 | 2012-07-17 | Oracle International Corporation | Revenue management systems and methods |
US8054849B2 (en) * | 2005-05-27 | 2011-11-08 | At&T Intellectual Property I, L.P. | System and method of managing video content streams |
US20060282395A1 (en) * | 2005-05-30 | 2006-12-14 | Joe Leibowitz | Methods for using a mobile communications device in consumer, medical and law enforcement transactions |
US7970386B2 (en) | 2005-06-03 | 2011-06-28 | Good Technology, Inc. | System and method for monitoring and maintaining a wireless device |
US20060291645A1 (en) * | 2005-06-08 | 2006-12-28 | Vasu Mekala | Needs based offer |
US20060282785A1 (en) * | 2005-06-09 | 2006-12-14 | Sbc Knowledge Ventures, L.P. | System and method of displaying content in display windows |
US20060282372A1 (en) * | 2005-06-09 | 2006-12-14 | Endres Timothy G | Method to secure credit card information stored electronically |
WO2006136660A1 (en) * | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Maintaining an ip connection in a mobile network |
WO2006136661A1 (en) * | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Network-initiated data transfer in a mobile network |
US7908627B2 (en) * | 2005-06-22 | 2011-03-15 | At&T Intellectual Property I, L.P. | System and method to provide a unified video signal for diverse receiving platforms |
US8893199B2 (en) * | 2005-06-22 | 2014-11-18 | At&T Intellectual Property I, L.P. | System and method of managing video content delivery |
US20070011133A1 (en) * | 2005-06-22 | 2007-01-11 | Sbc Knowledge Ventures, L.P. | Voice search engine generating sub-topics based on recognitiion confidence |
US8635659B2 (en) * | 2005-06-24 | 2014-01-21 | At&T Intellectual Property I, L.P. | Audio receiver modular card and method thereof |
US8365218B2 (en) | 2005-06-24 | 2013-01-29 | At&T Intellectual Property I, L.P. | Networked television and method thereof |
US8282476B2 (en) | 2005-06-24 | 2012-10-09 | At&T Intellectual Property I, L.P. | Multimedia-based video game distribution |
US20060294568A1 (en) * | 2005-06-24 | 2006-12-28 | Sbc Knowledge Ventures, L.P. | Video game console modular card and method thereof |
JP4664410B2 (en) | 2005-06-28 | 2011-04-06 | オラクル・インターナショナル・コーポレイション | Revenue management system and method |
US8190688B2 (en) * | 2005-07-11 | 2012-05-29 | At&T Intellectual Property I, Lp | System and method of transmitting photographs from a set top box |
US7665146B2 (en) * | 2005-07-14 | 2010-02-16 | Research In Motion Limited | Password methods and systems for use on a mobile device |
US20070065021A1 (en) * | 2005-07-14 | 2007-03-22 | David Delgrosso | System for encoding signatures for compressed storage using a signature encoding algorithm |
US7623684B2 (en) * | 2005-07-19 | 2009-11-24 | Dell Products, L.P. | System and method for information handling system software registration code management |
US7873102B2 (en) * | 2005-07-27 | 2011-01-18 | At&T Intellectual Property I, Lp | Video quality testing by encoding aggregated clips |
EP1938193A4 (en) * | 2005-07-28 | 2010-08-04 | Oracle Int Corp | Revenue management system and method |
US8069166B2 (en) | 2005-08-01 | 2011-11-29 | Seven Networks, Inc. | Managing user-to-user contact with inferred presence information |
US20070038460A1 (en) * | 2005-08-09 | 2007-02-15 | Jari Navratil | Method and system to improve speaker verification accuracy by detecting repeat imposters |
US8731542B2 (en) | 2005-08-11 | 2014-05-20 | Seven Networks International Oy | Dynamic adjustment of keep-alive message intervals in a mobile network |
JP2007052598A (en) * | 2005-08-17 | 2007-03-01 | Oki Electric Ind Co Ltd | Automatic transaction system |
US8762263B2 (en) | 2005-09-06 | 2014-06-24 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
US8775279B2 (en) * | 2007-06-07 | 2014-07-08 | Money Network Financial, Llc | Payroll receipt using a trustee account systems and methods |
US8365987B2 (en) * | 2006-08-23 | 2013-02-05 | Money Network Financial, Llc | Pre-allocated negotiable instrument and presentation instrument purchasing and activation systems and methods |
US8286860B2 (en) * | 2006-11-07 | 2012-10-16 | Money Network Financial, Llc | Negotiable instrument to presentation instrument value porting systems and methods |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
WO2007044570A2 (en) | 2005-10-05 | 2007-04-19 | Cummins-Allison Corp. | Currency processing system with fitness detection |
US8447700B2 (en) | 2005-10-11 | 2013-05-21 | Amazon Technologies, Inc. | Transaction authorization service |
US8352376B2 (en) | 2005-10-11 | 2013-01-08 | Amazon Technologies, Inc. | System and method for authorization of transactions |
US8533485B1 (en) | 2005-10-13 | 2013-09-10 | At&T Intellectual Property Ii, L.P. | Digital communication biometric authentication |
US8260008B2 (en) | 2005-11-11 | 2012-09-04 | Eyelock, Inc. | Methods for performing biometric recognition of a human eye and corroboration of same |
US8223777B2 (en) | 2005-11-15 | 2012-07-17 | Oracle International Corporation | Gateway for achieving low latency and high availability in a real time event processing system |
US8458465B1 (en) * | 2005-11-16 | 2013-06-04 | AT&T Intellectual Property II, L. P. | Biometric authentication |
US7225093B1 (en) * | 2005-11-21 | 2007-05-29 | Agilent Technologies, Inc. | System and method for generating triggers based on predetermined trigger waveform and a measurement signal |
US8234494B1 (en) * | 2005-12-21 | 2012-07-31 | At&T Intellectual Property Ii, L.P. | Speaker-verification digital signatures |
US7792522B1 (en) | 2006-01-13 | 2010-09-07 | Positive Access Corporation | Software key control for mobile devices |
US20070256615A1 (en) * | 2006-01-17 | 2007-11-08 | David Delgrosso | System and method for unattended access to safe deposit boxes |
US20070189587A1 (en) * | 2006-02-14 | 2007-08-16 | Garcia Carl N | Method and apparatus corresponding to an asperity detection sensor surface |
US20070198338A1 (en) * | 2006-02-21 | 2007-08-23 | First Data Corporation | Customer selected coalition systems and methods |
US7620392B1 (en) | 2006-02-27 | 2009-11-17 | Good Technology, Inc. | Method and system for distributing and updating software in wireless devices |
US7769395B2 (en) | 2006-06-20 | 2010-08-03 | Seven Networks, Inc. | Location-based operations and messaging |
US8364646B2 (en) | 2006-03-03 | 2013-01-29 | Eyelock, Inc. | Scalable searching of biometric databases using dynamic selection of data subsets |
US7980378B2 (en) | 2006-03-23 | 2011-07-19 | Cummins-Allison Corporation | Systems, apparatus, and methods for currency processing control and redemption |
US7818264B2 (en) * | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US9065643B2 (en) | 2006-04-05 | 2015-06-23 | Visa U.S.A. Inc. | System and method for account identifier obfuscation |
WO2007124095A2 (en) * | 2006-04-21 | 2007-11-01 | Us Biometrics Corporation | System and method for remote management and facilitating installation and registration of software |
US7782900B2 (en) * | 2006-05-01 | 2010-08-24 | Alcatel-Lucent Usa Inc. | Method for increasing spectrum efficiency in an OFDM based multi-bandwidth wireless system |
GB0609328D0 (en) * | 2006-05-11 | 2006-06-21 | Ogden Jonathan N | Guaranteed electronic payments using authenticated voice biometric technology |
US8589238B2 (en) * | 2006-05-31 | 2013-11-19 | Open Invention Network, Llc | System and architecture for merchant integration of a biometric payment system |
EP2035915A4 (en) | 2006-06-13 | 2012-04-25 | Microsoft Corp | Search engine dash-board |
US8604901B2 (en) * | 2006-06-27 | 2013-12-10 | Eyelock, Inc. | Ensuring the provenance of passengers at a transportation facility |
WO2008011758A1 (en) * | 2006-07-20 | 2008-01-31 | Kamfu Wong | Method and system for online payment and identity confirmation with self-setting authentication formula |
US7783564B2 (en) * | 2006-07-25 | 2010-08-24 | Visa U.S.A. Inc. | Compliance control in a card based program |
WO2008019345A2 (en) * | 2006-08-04 | 2008-02-14 | Money Network Financial, Llc | Payer-based account porting to portable value distribution systems and methods |
KR100708233B1 (en) | 2006-08-11 | 2007-04-16 | (주)제이브이엠 | Certification affaratus of auto wrapping pill and method thereof |
US7849436B2 (en) * | 2006-08-11 | 2010-12-07 | Dongbu Hitek Co., Ltd. | Method of forming dummy pattern |
WO2008024468A2 (en) * | 2006-08-24 | 2008-02-28 | Eklin Medical Systems, Inc. | Computerized medical information system |
US20080052115A1 (en) * | 2006-08-24 | 2008-02-28 | Eklin Medical Systems, Inc. | Computerized medical information system |
US20080052527A1 (en) * | 2006-08-28 | 2008-02-28 | National Biometric Security Project | method and system for authenticating and validating identities based on multi-modal biometric templates and special codes in a substantially anonymous process |
US7606752B2 (en) | 2006-09-07 | 2009-10-20 | Yodlee Inc. | Host exchange in bill paying services |
US7886156B2 (en) * | 2006-09-18 | 2011-02-08 | John Franco Franchi | Secure universal transaction system |
US8965063B2 (en) | 2006-09-22 | 2015-02-24 | Eyelock, Inc. | Compact biometric acquisition system and method |
WO2008042503A2 (en) * | 2006-09-28 | 2008-04-10 | First Data Corporation | Pin-less atm processing system |
EP2100253A4 (en) | 2006-10-02 | 2011-01-12 | Global Rainmakers Inc | Fraud resistant biometric financial transaction system and method |
BRPI0718897A2 (en) * | 2006-11-16 | 2013-12-10 | Net 1 Ueps Technologies Inc | ELECTRONIC FINANCIAL TRANSACTION SYSTEM AND METHOD OF CONTROLING AN ELECTRONIC FINANCIAL TRANSACTION |
AP3361A (en) * | 2006-11-16 | 2015-07-31 | Net1 Ueps Technologies Inc | Secure financial transactions |
DE112007002763T5 (en) * | 2006-11-16 | 2009-09-24 | Net1 Ueps Technologies, Inc. | Identification verification of the buyer |
US8606670B2 (en) * | 2007-01-02 | 2013-12-10 | First Data Corporation | Integrated communication solution |
US7933835B2 (en) | 2007-01-17 | 2011-04-26 | The Western Union Company | Secure money transfer systems and methods using biometric keys associated therewith |
US8818904B2 (en) | 2007-01-17 | 2014-08-26 | The Western Union Company | Generation systems and methods for transaction identifiers having biometric keys associated therewith |
US10210512B2 (en) * | 2007-02-13 | 2019-02-19 | Mastercard International Incorporated | Transaction count synchronization in payment system |
US7327859B1 (en) * | 2007-02-14 | 2008-02-05 | Lam Ko Chau | Methods and systems for automated fingerprint recognition |
US20090077627A1 (en) * | 2007-03-16 | 2009-03-19 | Novell, Inc. | Information card federation point tracking and management |
US20090077118A1 (en) * | 2007-03-16 | 2009-03-19 | Novell, Inc. | Information card federation point tracking and management |
US20090228885A1 (en) * | 2008-03-07 | 2009-09-10 | Novell, Inc. | System and method for using workflows with information cards |
US20090204622A1 (en) * | 2008-02-11 | 2009-08-13 | Novell, Inc. | Visual and non-visual cues for conveying state of information cards, electronic wallets, and keyrings |
US20090178112A1 (en) * | 2007-03-16 | 2009-07-09 | Novell, Inc. | Level of service descriptors |
US8151324B2 (en) | 2007-03-16 | 2012-04-03 | Lloyd Leon Burch | Remotable information cards |
US20090077655A1 (en) * | 2007-09-19 | 2009-03-19 | Novell, Inc. | Processing html extensions to enable support of information cards by a relying party |
US20090249430A1 (en) * | 2008-03-25 | 2009-10-01 | Novell, Inc. | Claim category handling |
US8073783B2 (en) * | 2007-03-16 | 2011-12-06 | Felsted Patrick R | Performing a business transaction without disclosing sensitive identity information to a relying party |
US8504473B2 (en) | 2007-03-28 | 2013-08-06 | The Western Union Company | Money transfer system and messaging system |
US8953849B2 (en) | 2007-04-19 | 2015-02-10 | Eyelock, Inc. | Method and system for biometric recognition |
WO2008131201A1 (en) | 2007-04-19 | 2008-10-30 | Global Rainmakers, Inc. | Method and system for biometric recognition |
US8571996B2 (en) * | 2007-04-20 | 2013-10-29 | N.P. Johnson Family Limited Partnership | Apparatus and method for secured commercial transactions |
US20120239458A9 (en) * | 2007-05-18 | 2012-09-20 | Global Rainmakers, Inc. | Measuring Effectiveness of Advertisements and Linking Certain Consumer Activities Including Purchases to Other Activities of the Consumer |
US8693494B2 (en) | 2007-06-01 | 2014-04-08 | Seven Networks, Inc. | Polling |
US8805425B2 (en) | 2007-06-01 | 2014-08-12 | Seven Networks, Inc. | Integrated messaging |
US8112358B2 (en) | 2007-06-04 | 2012-02-07 | Qualcomm Atheros, Inc. | Authorizing customer premise equipment on a sub-network |
US7940673B2 (en) | 2007-06-06 | 2011-05-10 | Veedims, Llc | System for integrating a plurality of modules using a power/data backbone network |
US8303337B2 (en) | 2007-06-06 | 2012-11-06 | Veedims, Llc | Hybrid cable for conveying data and power |
US8121942B2 (en) | 2007-06-25 | 2012-02-21 | Visa U.S.A. Inc. | Systems and methods for secure and transparent cardless transactions |
US7739169B2 (en) | 2007-06-25 | 2010-06-15 | Visa U.S.A. Inc. | Restricting access to compromised account information |
US7660539B2 (en) * | 2007-07-11 | 2010-02-09 | Dell Products, L.P. | Printer consumable ordering direct from printer |
DE102007036589A1 (en) | 2007-08-02 | 2009-02-05 | Continental Automotive Gmbh | Method of operating a tachograph and tachograph |
TW200907827A (en) * | 2007-08-08 | 2009-02-16 | Acer Inc | System and method for performing objects with bio-characteristics recognition |
US9002073B2 (en) | 2007-09-01 | 2015-04-07 | Eyelock, Inc. | Mobile identity platform |
WO2009029757A1 (en) | 2007-09-01 | 2009-03-05 | Global Rainmakers, Inc. | System and method for iris data acquisition for biometric identification |
US9036871B2 (en) | 2007-09-01 | 2015-05-19 | Eyelock, Inc. | Mobility identity platform |
US9117119B2 (en) | 2007-09-01 | 2015-08-25 | Eyelock, Inc. | Mobile identity platform |
US8212870B2 (en) | 2007-09-01 | 2012-07-03 | Hanna Keith J | Mirror system and method for acquiring biometric data |
US7937324B2 (en) | 2007-09-13 | 2011-05-03 | Visa U.S.A. Inc. | Account permanence |
US8239326B1 (en) | 2007-09-19 | 2012-08-07 | Amazon Technologies, Inc. | Method and apparatus for authorizing transactions using transaction phrases in a transaction authorization service |
US7729989B1 (en) | 2007-09-19 | 2010-06-01 | Amazon Technologies, Inc. | Method and apparatus for message correction in a transaction authorization service |
CN101809581B (en) | 2007-09-24 | 2014-12-10 | 苹果公司 | Embedded authentication systems in an electronic device |
US8302187B1 (en) | 2007-09-27 | 2012-10-30 | Amazon Technologies, Inc. | System and method for preventing large-scale account lockout |
US8364181B2 (en) | 2007-12-10 | 2013-01-29 | Seven Networks, Inc. | Electronic-mail filtering for mobile devices |
US20090145972A1 (en) * | 2007-12-11 | 2009-06-11 | James Douglas Evans | Biometric authorization transaction |
US9002828B2 (en) | 2007-12-13 | 2015-04-07 | Seven Networks, Inc. | Predictive content delivery |
US8793305B2 (en) | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
US8107921B2 (en) | 2008-01-11 | 2012-01-31 | Seven Networks, Inc. | Mobile virtual network operator |
US8862657B2 (en) | 2008-01-25 | 2014-10-14 | Seven Networks, Inc. | Policy based content service |
US8424079B2 (en) * | 2008-01-25 | 2013-04-16 | Research In Motion Limited | Method, system and mobile device employing enhanced user authentication |
US20090193338A1 (en) | 2008-01-28 | 2009-07-30 | Trevor Fiatal | Reducing network and battery consumption during content delivery and playback |
US20090199284A1 (en) * | 2008-02-06 | 2009-08-06 | Novell, Inc. | Methods for setting and changing the user credential in information cards |
US20090205035A1 (en) * | 2008-02-11 | 2009-08-13 | Novell, Inc. | Info card selector reception of identity provider based data pertaining to info cards |
US20090204542A1 (en) * | 2008-02-11 | 2009-08-13 | Novell, Inc. | Privately sharing relying party reputation with information card selectors |
US20090217368A1 (en) * | 2008-02-27 | 2009-08-27 | Novell, Inc. | System and method for secure account reset utilizing information cards |
US20090223318A1 (en) * | 2008-03-06 | 2009-09-10 | Ballard Claudio R | Gear shift assembly |
US7856158B2 (en) * | 2008-03-07 | 2010-12-21 | Ballard Claudio R | Virtual electronic switch system |
US8111145B2 (en) * | 2008-03-07 | 2012-02-07 | Veedims, Llc | Starter control and indicator system |
US20090223437A1 (en) * | 2008-03-07 | 2009-09-10 | Ballard Claudio R | Gauge having synthetic sapphire lens |
USD638033S1 (en) | 2008-03-07 | 2011-05-17 | Ballard Claudio R | Air intake assembly |
US8079069B2 (en) * | 2008-03-24 | 2011-12-13 | Oracle International Corporation | Cardspace history validator |
US8204827B1 (en) | 2008-03-27 | 2012-06-19 | Amazon Technologies, Inc. | System and method for personalized commands |
US8620826B2 (en) | 2008-03-27 | 2013-12-31 | Amazon Technologies, Inc. | System and method for receiving requests for tasks from unregistered devices |
US8244592B2 (en) | 2008-03-27 | 2012-08-14 | Amazon Technologies, Inc. | System and method for message-based purchasing |
US8261334B2 (en) | 2008-04-25 | 2012-09-04 | Yodlee Inc. | System for performing web authentication of a user by proxy |
US20090272797A1 (en) * | 2008-04-30 | 2009-11-05 | Novell, Inc. A Delaware Corporation | Dynamic information card rendering |
CN102077254A (en) * | 2008-05-12 | 2011-05-25 | 克劳迪奥·R·巴拉德 | Electrically propelled vehicle having electric sound-producing blower/cooler |
US20090313129A1 (en) * | 2008-06-11 | 2009-12-17 | Lmr Inventions, Llc | System and method for verifying user identity information in financial transactions |
US8787947B2 (en) | 2008-06-18 | 2014-07-22 | Seven Networks, Inc. | Application discovery on mobile devices |
WO2009158662A2 (en) | 2008-06-26 | 2009-12-30 | Global Rainmakers, Inc. | Method of reducing visibility of illimination while acquiring high quality imagery |
US8078158B2 (en) | 2008-06-26 | 2011-12-13 | Seven Networks, Inc. | Provisioning applications for a mobile device |
US20100011409A1 (en) * | 2008-07-09 | 2010-01-14 | Novell, Inc. | Non-interactive information card token generation |
US8219489B2 (en) | 2008-07-29 | 2012-07-10 | Visa U.S.A. Inc. | Transaction processing using a global unique identifier |
US20100031328A1 (en) * | 2008-07-31 | 2010-02-04 | Novell, Inc. | Site-specific credential generation using information cards |
US8384250B2 (en) * | 2008-08-01 | 2013-02-26 | Verizon Patent And Licensing Inc. | Computer-controlled connector-panel system |
US8561172B2 (en) | 2008-08-29 | 2013-10-15 | Novell Intellectual Property Holdings, Inc. | System and method for virtual information cards |
EP2344360A1 (en) * | 2008-09-30 | 2011-07-20 | Veedims, LLC | Distributed car charging management system and method |
US20100095372A1 (en) * | 2008-10-09 | 2010-04-15 | Novell, Inc. | Trusted relying party proxy for information card tokens |
US8909759B2 (en) | 2008-10-10 | 2014-12-09 | Seven Networks, Inc. | Bandwidth measurement |
BRPI0921124A2 (en) | 2008-11-06 | 2016-09-13 | Visa Int Service Ass | system for authenticating a consumer, computer implemented method, computer readable medium, and server computer. |
US20100125522A1 (en) * | 2008-11-18 | 2010-05-20 | Johanny Thomas | Interactive Web-Portal Interface Method and System |
US8083135B2 (en) | 2009-01-12 | 2011-12-27 | Novell, Inc. | Information card overlay |
US8632003B2 (en) * | 2009-01-27 | 2014-01-21 | Novell, Inc. | Multiple persona information cards |
US8555359B2 (en) * | 2009-02-26 | 2013-10-08 | Yodlee, Inc. | System and methods for automatically accessing a web site on behalf of a client |
CN101621519A (en) * | 2009-03-17 | 2010-01-06 | 腾讯数码(天津)有限公司 | Method and device for video authentication of user |
US20100251353A1 (en) * | 2009-03-25 | 2010-09-30 | Novell, Inc. | User-authorized information card delegation |
US8195044B2 (en) | 2009-03-30 | 2012-06-05 | Eyelock Inc. | Biometric camera mount system |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US7891560B2 (en) * | 2009-05-15 | 2011-02-22 | Visa International Service Assocation | Verification of portable consumer devices |
US8534564B2 (en) | 2009-05-15 | 2013-09-17 | Ayman Hammad | Integration of verification tokens with mobile communication devices |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US8893967B2 (en) | 2009-05-15 | 2014-11-25 | Visa International Service Association | Secure Communication of payment information to merchants using a verification token |
US9105027B2 (en) | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
US9038886B2 (en) * | 2009-05-15 | 2015-05-26 | Visa International Service Association | Verification of portable consumer devices |
US8602293B2 (en) | 2009-05-15 | 2013-12-10 | Visa International Service Association | Integration of verification tokens with portable computing devices |
US10140598B2 (en) | 2009-05-20 | 2018-11-27 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
US9396603B2 (en) * | 2009-05-22 | 2016-07-19 | Nokia Technologies Oy | Method and apparatus for managing services using reusable bearer tags |
US8485442B2 (en) | 2009-07-02 | 2013-07-16 | Biometric Payment Solutions | Electronic transaction verification system with biometric authentication |
US7865937B1 (en) | 2009-08-05 | 2011-01-04 | Daon Holdings Limited | Methods and systems for authenticating users |
US8505813B2 (en) * | 2009-09-04 | 2013-08-13 | Bank Of America Corporation | Customer benefit offer program enrollment |
US20110060636A1 (en) * | 2009-09-04 | 2011-03-10 | Bank Of America | Targeted customer benefit offers |
US20110060631A1 (en) * | 2009-09-04 | 2011-03-10 | Bank Of America | Redemption of customer benefit offers based on goods identification |
US20110087611A1 (en) * | 2009-10-14 | 2011-04-14 | Shyam Chetal | Biometric identification and authentication system for financial accounts |
US20110119141A1 (en) * | 2009-11-16 | 2011-05-19 | Hoyos Corporation | Siccolla Identity Verification Architecture and Tool |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
AU2011205391B2 (en) | 2010-01-12 | 2014-11-20 | Visa International Service Association | Anytime validation for verification tokens |
US10255601B2 (en) | 2010-02-25 | 2019-04-09 | Visa International Service Association | Multifactor authentication using a directory server |
US9245267B2 (en) | 2010-03-03 | 2016-01-26 | Visa International Service Association | Portable account number for consumer payment account |
US8826030B2 (en) * | 2010-03-22 | 2014-09-02 | Daon Holdings Limited | Methods and systems for authenticating users |
US9043731B2 (en) | 2010-03-30 | 2015-05-26 | Seven Networks, Inc. | 3D mobile user interface with configurable workspace management |
JP4858626B2 (en) * | 2010-04-16 | 2012-01-18 | カシオ計算機株式会社 | Information display device and program |
RU2459264C2 (en) * | 2010-04-16 | 2012-08-20 | Эй-Би-Эс-Эй Бенк Лтд | Withdrawal of money transferred electronically without using card |
USD662869S1 (en) | 2010-06-01 | 2012-07-03 | Ballard Claudio R | Automotive wheel center nut |
GB201010546D0 (en) * | 2010-06-23 | 2010-08-11 | Applied Neural Technologies Ltd | Method of indentity verification |
US8595075B2 (en) * | 2010-07-23 | 2013-11-26 | Robert F. de Sylva | Biotransaction systems and methods |
US9043433B2 (en) | 2010-07-26 | 2015-05-26 | Seven Networks, Inc. | Mobile network traffic coordination across multiple applications |
JP5676762B2 (en) | 2010-07-26 | 2015-02-25 | セブン ネットワークス インコーポレイテッド | Mobile application traffic optimization |
US9077630B2 (en) | 2010-07-26 | 2015-07-07 | Seven Networks, Inc. | Distributed implementation of dynamic wireless traffic policy |
US8838783B2 (en) | 2010-07-26 | 2014-09-16 | Seven Networks, Inc. | Distributed caching for resource and mobile network traffic management |
US9342832B2 (en) | 2010-08-12 | 2016-05-17 | Visa International Service Association | Securing external systems with account token substitution |
WO2012061430A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed management of keep-alive message signaling for mobile network resource conservation and optimization |
US9060032B2 (en) | 2010-11-01 | 2015-06-16 | Seven Networks, Inc. | Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic |
US8166164B1 (en) | 2010-11-01 | 2012-04-24 | Seven Networks, Inc. | Application and network-based long poll request detection and cacheability assessment therefor |
US8204953B2 (en) | 2010-11-01 | 2012-06-19 | Seven Networks, Inc. | Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
US9330196B2 (en) | 2010-11-01 | 2016-05-03 | Seven Networks, Llc | Wireless traffic management system cache optimization using http headers |
US8484314B2 (en) | 2010-11-01 | 2013-07-09 | Seven Networks, Inc. | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
US8843153B2 (en) | 2010-11-01 | 2014-09-23 | Seven Networks, Inc. | Mobile traffic categorization and policy for network use optimization while preserving user experience |
WO2012060996A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Caching adapted for mobile application behavior and network conditions |
WO2012060995A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
CN103404193B (en) | 2010-11-22 | 2018-06-05 | 七网络有限责任公司 | The connection that adjustment data transmission is established with the transmission being optimized for through wireless network |
EP2636268B1 (en) | 2010-11-22 | 2019-02-27 | Seven Networks, LLC | Optimization of resource polling intervals to satisfy mobile device requests |
US9984157B2 (en) * | 2010-12-01 | 2018-05-29 | Aware Inc. | Relationship detection within biometric match results candidates |
US8545295B2 (en) | 2010-12-17 | 2013-10-01 | Cummins-Allison Corp. | Coin processing systems, methods and devices |
EP2661697B1 (en) | 2011-01-07 | 2018-11-21 | Seven Networks, LLC | System and method for reduction of mobile network traffic used for domain name system (dns) queries |
US10043229B2 (en) | 2011-01-26 | 2018-08-07 | Eyelock Llc | Method for confirming the identity of an individual while shielding that individual's personal data |
SG193481A1 (en) | 2011-02-16 | 2013-10-30 | Visa Int Service Ass | Snap mobile payment apparatuses, methods and systems |
US10586227B2 (en) | 2011-02-16 | 2020-03-10 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
WO2012112788A2 (en) | 2011-02-17 | 2012-08-23 | Eyelock Inc. | Efficient method and system for the acquisition of scene imagery and iris imagery using a single sensor |
WO2012116125A1 (en) | 2011-02-22 | 2012-08-30 | Visa International Service Association | Universal electronic payment apparatuses, methods and systems |
KR101895243B1 (en) | 2011-03-04 | 2018-10-24 | 비자 인터네셔널 서비스 어소시에이션 | Integration of payment capability into secure elements of computers |
WO2012142045A2 (en) | 2011-04-11 | 2012-10-18 | Visa International Service Association | Multiple tokenization for authentication |
US9084105B2 (en) | 2011-04-19 | 2015-07-14 | Seven Networks, Inc. | Device resources sharing for network resource conservation |
US20120268241A1 (en) | 2011-04-19 | 2012-10-25 | Eyelock Inc. | Biometric chain of provenance |
EP2621144B1 (en) | 2011-04-27 | 2014-06-25 | Seven Networks, Inc. | System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief |
EP2702500B1 (en) | 2011-04-27 | 2017-07-19 | Seven Networks, LLC | Detecting and preserving state for satisfying application requests in a distributed proxy and cache system |
US9892419B1 (en) | 2011-05-09 | 2018-02-13 | Bank Of America Corporation | Coupon deposit account fraud protection system |
US8751298B1 (en) | 2011-05-09 | 2014-06-10 | Bank Of America Corporation | Event-driven coupon processor alert |
JP2012238141A (en) * | 2011-05-11 | 2012-12-06 | Sony Corp | Communication device, communication method, and program |
US8850200B1 (en) | 2011-06-21 | 2014-09-30 | Synectic Design, LLC | Method and apparatus for secure communications through a trusted intermediary server |
US9582598B2 (en) | 2011-07-05 | 2017-02-28 | Visa International Service Association | Hybrid applications utilizing distributed models and views apparatuses, methods and systems |
US9355393B2 (en) | 2011-08-18 | 2016-05-31 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US10121129B2 (en) | 2011-07-05 | 2018-11-06 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US9239800B2 (en) | 2011-07-27 | 2016-01-19 | Seven Networks, Llc | Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network |
WO2013019567A2 (en) | 2011-07-29 | 2013-02-07 | Visa International Service Association | Passing payment tokens through an hop/sop |
US9710807B2 (en) | 2011-08-18 | 2017-07-18 | Visa International Service Association | Third-party value added wallet features and interfaces apparatuses, methods and systems |
US10242358B2 (en) | 2011-08-18 | 2019-03-26 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US10825001B2 (en) | 2011-08-18 | 2020-11-03 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US8965064B2 (en) | 2011-08-22 | 2015-02-24 | Eyelock, Inc. | Systems and methods for capturing artifact free images |
WO2013029014A2 (en) | 2011-08-24 | 2013-02-28 | Visa International Service Association | Method for using barcodes and mobile devices to conduct payment transactions |
US8976541B2 (en) | 2011-08-31 | 2015-03-10 | Potens Ip Holdings Llc | Electrical power and data distribution apparatus |
US20130061290A1 (en) * | 2011-09-06 | 2013-03-07 | Jacob Mendel | System for securely performing a transaction |
US10223730B2 (en) | 2011-09-23 | 2019-03-05 | Visa International Service Association | E-wallet store injection search apparatuses, methods and systems |
US9378514B2 (en) | 2011-11-23 | 2016-06-28 | Richard Tabor | Secure tokenless transaction system and method |
WO2013086214A1 (en) | 2011-12-06 | 2013-06-13 | Seven Networks, Inc. | A system of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation |
US8918503B2 (en) | 2011-12-06 | 2014-12-23 | Seven Networks, Inc. | Optimization of mobile traffic directed to private networks and operator configurability thereof |
EP2788889A4 (en) | 2011-12-07 | 2015-08-12 | Seven Networks Inc | Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation |
WO2013086447A1 (en) | 2011-12-07 | 2013-06-13 | Seven Networks, Inc. | Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol |
WO2013090834A1 (en) | 2011-12-14 | 2013-06-20 | Seven Networks, Inc. | Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic |
US8861354B2 (en) | 2011-12-14 | 2014-10-14 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
WO2013090212A1 (en) | 2011-12-14 | 2013-06-20 | Seven Networks, Inc. | Mobile network reporting and usage analytics system and method using aggregation of data in a distributed traffic optimization system |
RU2017131424A (en) | 2012-01-05 | 2019-02-06 | Виза Интернэшнл Сервис Ассосиэйшн | TRANSFER DATA PROTECTION |
US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
EP2801236A4 (en) | 2012-01-05 | 2015-10-21 | Seven Networks Inc | Detection and management of user interactions with foreground applications on a mobile device in distributed caching |
US9830595B2 (en) | 2012-01-26 | 2017-11-28 | Visa International Service Association | System and method of providing tokenization as a service |
AU2013214801B2 (en) | 2012-02-02 | 2018-06-21 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems |
US9203864B2 (en) | 2012-02-02 | 2015-12-01 | Seven Networks, Llc | Dynamic categorization of applications for network access in a mobile network |
WO2013116852A1 (en) | 2012-02-03 | 2013-08-08 | Seven Networks, Inc. | User as an end point for profiling and optimizing the delivery of content and data in a wireless network |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
US8812695B2 (en) | 2012-04-09 | 2014-08-19 | Seven Networks, Inc. | Method and system for management of a virtual network connection without heartbeat messages |
WO2013155208A1 (en) | 2012-04-10 | 2013-10-17 | Seven Networks, Inc. | Intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network |
WO2013155627A1 (en) * | 2012-04-16 | 2013-10-24 | Salt Technology Inc. | Systems and methods for facilitating a transaction using a virtual card on a mobile device |
TWI566564B (en) * | 2012-04-25 | 2017-01-11 | Samton International Development Technology Co Ltd | Virtual reality authentication circuit, system and electronic consumption method |
WO2013166501A1 (en) | 2012-05-04 | 2013-11-07 | Visa International Service Association | System and method for local data conversion |
US9047546B2 (en) * | 2012-05-08 | 2015-06-02 | Kuo-Ching Chiang | Method of money transfer via a mobile phone having security code generator |
US9400983B1 (en) | 2012-05-10 | 2016-07-26 | Jpmorgan Chase Bank, N.A. | Method and system for implementing behavior isolating prediction model |
JP6023879B2 (en) | 2012-05-18 | 2016-11-09 | アップル インコーポレイテッド | Apparatus, method and graphical user interface for operating a user interface based on fingerprint sensor input |
US9524501B2 (en) | 2012-06-06 | 2016-12-20 | Visa International Service Association | Method and system for correlating diverse transaction data |
US9547769B2 (en) | 2012-07-03 | 2017-01-17 | Visa International Service Association | Data protection hub |
WO2014011216A1 (en) | 2012-07-13 | 2014-01-16 | Seven Networks, Inc. | Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications |
US9846861B2 (en) | 2012-07-25 | 2017-12-19 | Visa International Service Association | Upstream and downstream data conversion |
US9256871B2 (en) | 2012-07-26 | 2016-02-09 | Visa U.S.A. Inc. | Configurable payment tokens |
WO2014022412A1 (en) * | 2012-07-31 | 2014-02-06 | New York University | Anti-counterfeiting technique via attributes |
CN102880955B (en) * | 2012-08-03 | 2016-01-20 | 毛德操 | A kind of high safety with fingerprint method of payment |
US9665722B2 (en) | 2012-08-10 | 2017-05-30 | Visa International Service Association | Privacy firewall |
US9092924B1 (en) | 2012-08-31 | 2015-07-28 | Cummins-Allison Corp. | Disk-type coin processing unit with angled sorting head |
AU2013315510B2 (en) | 2012-09-11 | 2019-08-22 | Visa International Service Association | Cloud-based Virtual Wallet NFC Apparatuses, methods and systems |
US10176478B2 (en) | 2012-10-23 | 2019-01-08 | Visa International Service Association | Transaction initiation determination system utilizing transaction data elements |
US9161258B2 (en) | 2012-10-24 | 2015-10-13 | Seven Networks, Llc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
RU2523743C2 (en) * | 2012-11-14 | 2014-07-20 | Виталий Львович Исраелян | Method of authenticating bank account holder during remote banking service |
DE102012221016B4 (en) * | 2012-11-16 | 2017-06-22 | Micro-Sensys Gmbh | Locking unit, locking device and method for unlocking and / or locking a lock |
US9911118B2 (en) | 2012-11-21 | 2018-03-06 | Visa International Service Association | Device pairing via trusted intermediary |
WO2014087381A1 (en) | 2012-12-07 | 2014-06-12 | Visa International Service Association | A token generating component |
US9307493B2 (en) | 2012-12-20 | 2016-04-05 | Seven Networks, Llc | Systems and methods for application management of mobile device radio state promotion and demotion |
CN103295129B (en) * | 2012-12-28 | 2017-06-13 | 毛德操 | The method that circumstantial evidence formula fingerprint pays is realized on mobile phone |
US10740731B2 (en) | 2013-01-02 | 2020-08-11 | Visa International Service Association | Third party settlement |
US9741051B2 (en) | 2013-01-02 | 2017-08-22 | Visa International Service Association | Tokenization and third-party interaction |
US9241314B2 (en) | 2013-01-23 | 2016-01-19 | Seven Networks, Llc | Mobile device with application or context aware fast dormancy |
US8874761B2 (en) | 2013-01-25 | 2014-10-28 | Seven Networks, Inc. | Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
US9143506B2 (en) | 2013-02-13 | 2015-09-22 | Daniel Duncan | Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information |
US8914645B2 (en) | 2013-02-13 | 2014-12-16 | Daniel Duncan | Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information |
US8572398B1 (en) | 2013-02-13 | 2013-10-29 | Daniel Duncan | Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information |
CN104036780B (en) * | 2013-03-05 | 2017-05-24 | 阿里巴巴集团控股有限公司 | Man-machine identification method and system |
US9326185B2 (en) | 2013-03-11 | 2016-04-26 | Seven Networks, Llc | Mobile network congestion recognition for optimization of mobile traffic |
US9495526B2 (en) | 2013-03-15 | 2016-11-15 | Eyelock Llc | Efficient prevention of fraud |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
RU2589847C2 (en) * | 2013-04-08 | 2016-07-10 | Михаил Анатольевич Камышев | Method of paying for goods and services using biometric parameters of customer and device therefore |
US11055710B2 (en) | 2013-05-02 | 2021-07-06 | Visa International Service Association | Systems and methods for verifying and processing transactions using virtual currency |
SG10201709411RA (en) | 2013-05-15 | 2018-01-30 | Visa Int Service Ass | Mobile tokenization hub |
US10878422B2 (en) | 2013-06-17 | 2020-12-29 | Visa International Service Association | System and method using merchant token |
US10460314B2 (en) * | 2013-07-10 | 2019-10-29 | Ca, Inc. | Pre-generation of session keys for electronic transactions and devices that pre-generate session keys for electronic transactions |
US9231959B2 (en) * | 2013-07-12 | 2016-01-05 | Sap Se | Multiple transaction interface framework |
US9065765B2 (en) | 2013-07-22 | 2015-06-23 | Seven Networks, Inc. | Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network |
RU2681366C2 (en) | 2013-07-24 | 2019-03-06 | Виза Интернэшнл Сервис Ассосиэйшн | Systems and methods for communicating risk using token assurance data |
CN105518733A (en) | 2013-07-26 | 2016-04-20 | 维萨国际服务协会 | Provisioning payment credentials to a consumer |
SG11201600909QA (en) | 2013-08-08 | 2016-03-30 | Visa Int Service Ass | Methods and systems for provisioning mobile devices with payment credentials |
US10496986B2 (en) | 2013-08-08 | 2019-12-03 | Visa International Service Association | Multi-network tokenization processing |
JP6386567B2 (en) | 2013-10-11 | 2018-09-05 | ビザ インターナショナル サービス アソシエーション | Network token system |
US9978094B2 (en) | 2013-10-11 | 2018-05-22 | Visa International Service Association | Tokenization revocation list |
US10515358B2 (en) | 2013-10-18 | 2019-12-24 | Visa International Service Association | Contextual transaction token methods and systems |
US10489779B2 (en) | 2013-10-21 | 2019-11-26 | Visa International Service Association | Multi-network token bin routing with defined verification parameters |
US10366387B2 (en) | 2013-10-29 | 2019-07-30 | Visa International Service Association | Digital wallet system and method |
US9058626B1 (en) | 2013-11-13 | 2015-06-16 | Jpmorgan Chase Bank, N.A. | System and method for financial services device usage |
SG10201900029SA (en) | 2013-11-19 | 2019-02-27 | Visa Int Service Ass | Automated account provisioning |
BR112016012359A2 (en) * | 2013-12-02 | 2017-08-08 | Mastercard International Inc | METHOD AND SYSTEM FOR SECURE TRANSMISSION OF REMOTE NOTIFICATION SERVICE MESSAGES TO MOBILE DEVICES WITHOUT SECURE ELEMENTS |
CA2931093A1 (en) | 2013-12-19 | 2015-06-25 | Visa International Service Association | Cloud-based transactions methods and systems |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
CN105934764A (en) | 2013-12-23 | 2016-09-07 | 眼锁有限责任公司 | Methods and apparatus for power-efficient iris recognition |
BR112016015664A8 (en) | 2014-01-06 | 2020-06-09 | Eyelock Llc | device for repeatedly generating images of an iris and iris image recognition device for repetitive use |
US10433128B2 (en) | 2014-01-07 | 2019-10-01 | Visa International Service Association | Methods and systems for provisioning multiple devices |
US9846878B2 (en) | 2014-01-14 | 2017-12-19 | Visa International Service Association | Payment account identifier system |
US10026087B2 (en) | 2014-04-08 | 2018-07-17 | Visa International Service Association | Data passed in an interaction |
FR3019957B1 (en) * | 2014-04-09 | 2016-05-27 | Actility | METHODS FOR ENCODING AND DECODING FRAMES IN A TELECOMMUNICATION NETWORK |
US9942043B2 (en) | 2014-04-23 | 2018-04-10 | Visa International Service Association | Token security on a communication device |
AU2015253182B2 (en) | 2014-05-01 | 2019-02-14 | Visa International Service Association | Data verification using access device |
CA2945193A1 (en) | 2014-05-05 | 2015-11-12 | Visa International Service Association | System and method for token domain control |
US10846694B2 (en) | 2014-05-21 | 2020-11-24 | Visa International Service Association | Offline authentication |
US11023890B2 (en) | 2014-06-05 | 2021-06-01 | Visa International Service Association | Identification and verification for provisioning mobile application |
EP3540622B1 (en) * | 2014-06-09 | 2021-04-28 | Aware, Inc. | System and method for performing biometric operations in parallel |
US9501885B1 (en) | 2014-07-09 | 2016-11-22 | Cummins-Allison Corp. | Systems, methods and devices for processing coins utilizing near-normal and high-angle of incidence lighting |
US9508208B1 (en) | 2014-07-25 | 2016-11-29 | Cummins Allison Corp. | Systems, methods and devices for processing coins with linear array of coin imaging sensors |
US9916713B1 (en) | 2014-07-09 | 2018-03-13 | Cummins-Allison Corp. | Systems, methods and devices for processing coins utilizing normal or near-normal and/or high-angle of incidence lighting |
US10685523B1 (en) | 2014-07-09 | 2020-06-16 | Cummins-Allison Corp. | Systems, methods and devices for processing batches of coins utilizing coin imaging sensor assemblies |
US9780953B2 (en) | 2014-07-23 | 2017-10-03 | Visa International Service Association | Systems and methods for secure detokenization |
US10484345B2 (en) | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
US9430893B1 (en) | 2014-08-06 | 2016-08-30 | Cummins-Allison Corp. | Systems, methods and devices for managing rejected coins during coin processing |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
BR112017004593A2 (en) | 2014-09-12 | 2017-12-05 | Eyelock Llc | methods and apparatus for directing a user's gaze on an iris recognition system |
US10140615B2 (en) | 2014-09-22 | 2018-11-27 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
WO2016049636A2 (en) | 2014-09-26 | 2016-03-31 | Visa International Service Association | Remote server encrypted data provisioning system and methods |
US11257074B2 (en) | 2014-09-29 | 2022-02-22 | Visa International Service Association | Transaction risk based token |
US10395199B1 (en) | 2014-10-17 | 2019-08-27 | Jpmorgan Chase Bank, N.A. | Method and system for ATM cash servicing and optimization |
US10015147B2 (en) | 2014-10-22 | 2018-07-03 | Visa International Service Association | Token enrollment system and method |
GB201419016D0 (en) | 2014-10-24 | 2014-12-10 | Visa Europe Ltd | Transaction Messaging |
US10373409B2 (en) | 2014-10-31 | 2019-08-06 | Intellicheck, Inc. | Identification scan in compliance with jurisdictional or other rules |
WO2016073781A1 (en) * | 2014-11-05 | 2016-05-12 | Real Agent Guard-IP, LLC | Personal monitoring using a remote timer |
US10089812B1 (en) | 2014-11-11 | 2018-10-02 | Cummins-Allison Corp. | Systems, methods and devices for processing coins utilizing a multi-material coin sorting disk |
BR112017009982A2 (en) * | 2014-11-19 | 2018-01-02 | Eyelock Llc | model-based prediction of an optimal convenience metric for authorization transactions |
US10325261B2 (en) | 2014-11-25 | 2019-06-18 | Visa International Service Association | Systems communications with non-sensitive identifiers |
CA2964791A1 (en) | 2014-11-26 | 2016-06-02 | Visa International Service Association | Tokenization request via access device |
US20170329948A1 (en) * | 2014-12-05 | 2017-11-16 | Giuseppe Farina | Digital signature with custom fingerprint |
US10257185B2 (en) | 2014-12-12 | 2019-04-09 | Visa International Service Association | Automated access data provisioning |
EP3231157B1 (en) | 2014-12-12 | 2020-05-20 | Visa International Service Association | Provisioning platform for machine-to-machine devices |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
CN105825371A (en) * | 2015-01-07 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Method and device for processing service |
US10074011B2 (en) | 2015-01-20 | 2018-09-11 | Eyelock Llc | Lens system for high quality visible image acquisition and infra-red iris image acquisition |
US10096009B2 (en) | 2015-01-20 | 2018-10-09 | Visa International Service Association | Secure payment processing using authorization request |
US11250391B2 (en) | 2015-01-30 | 2022-02-15 | Visa International Service Association | Token check offline |
WO2016126729A1 (en) | 2015-02-03 | 2016-08-11 | Visa International Service Association | Validation identity tokens for transactions |
US10977657B2 (en) | 2015-02-09 | 2021-04-13 | Visa International Service Association | Token processing utilizing multiple authorizations |
US10164996B2 (en) | 2015-03-12 | 2018-12-25 | Visa International Service Association | Methods and systems for providing a low value token buffer |
US9509690B2 (en) | 2015-03-12 | 2016-11-29 | Eyelock Llc | Methods and systems for managing network activity using biometrics |
SG11201706576TA (en) | 2015-04-10 | 2017-09-28 | Visa Int Service Ass | Browser integration with cryptogram |
US9998978B2 (en) | 2015-04-16 | 2018-06-12 | Visa International Service Association | Systems and methods for processing dormant virtual access devices |
US10552834B2 (en) | 2015-04-30 | 2020-02-04 | Visa International Service Association | Tokenization capable authentication framework |
US11140171B1 (en) | 2015-06-05 | 2021-10-05 | Apple Inc. | Establishing and verifying identity using action sequences while protecting user privacy |
US10868672B1 (en) | 2015-06-05 | 2020-12-15 | Apple Inc. | Establishing and verifying identity using biometrics while protecting user privacy |
US9875593B1 (en) | 2015-08-07 | 2018-01-23 | Cummins-Allison Corp. | Systems, methods and devices for coin processing and coin recycling |
CN105187448A (en) * | 2015-09-30 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | Service processing method and service equipment |
US11068889B2 (en) | 2015-10-15 | 2021-07-20 | Visa International Service Association | Instant token issuance |
US10528939B2 (en) * | 2015-10-16 | 2020-01-07 | Bank Of American Corporation | Telephone-based payments using tokens |
CA3003917A1 (en) | 2015-12-04 | 2017-06-08 | Visa International Service Association | Unique code for token verification |
US10311299B2 (en) | 2015-12-21 | 2019-06-04 | Eyelock Llc | Reflected optic camera module for iris recognition in a computing device |
CA3009659C (en) | 2016-01-07 | 2022-12-13 | Visa International Service Association | Systems and methods for device push provisioning |
US11080696B2 (en) | 2016-02-01 | 2021-08-03 | Visa International Service Association | Systems and methods for code display and use |
US11501288B2 (en) | 2016-02-09 | 2022-11-15 | Visa International Service Association | Resource provider account token provisioning and processing |
US20170228737A1 (en) * | 2016-02-09 | 2017-08-10 | American Express Travel Related Services Company, Inc. | Systems and Methods for Payment using Biometric Information |
CN105787399B (en) * | 2016-02-19 | 2019-02-01 | 金华市秸和环保技术咨询有限公司 | A kind of computer cabinet |
US10313321B2 (en) | 2016-04-07 | 2019-06-04 | Visa International Service Association | Tokenization of co-network accounts |
US9560015B1 (en) * | 2016-04-12 | 2017-01-31 | Cryptzone North America, Inc. | Systems and methods for protecting network devices by a firewall |
AU2016403734B2 (en) | 2016-04-19 | 2022-11-17 | Visa International Service Association | Systems and methods for performing push transactions |
WO2017201147A2 (en) | 2016-05-18 | 2017-11-23 | Eyelock, Llc | Iris recognition methods and systems based on an iris stochastic texture model |
US11250424B2 (en) | 2016-05-19 | 2022-02-15 | Visa International Service Association | Systems and methods for creating subtokens using primary tokens |
KR20230038810A (en) | 2016-06-03 | 2023-03-21 | 비자 인터네셔널 서비스 어소시에이션 | Subtoken management system for connected devices |
US11068899B2 (en) | 2016-06-17 | 2021-07-20 | Visa International Service Association | Token aggregation for multi-party transactions |
JP7025135B2 (en) * | 2016-06-24 | 2022-02-24 | エヌエイチエヌ コーポレーション | Simple payment method and simple payment system |
CN109328445B (en) | 2016-06-24 | 2022-07-05 | 维萨国际服务协会 | Unique token authentication verification value |
CN116471105A (en) | 2016-07-11 | 2023-07-21 | 维萨国际服务协会 | Encryption key exchange procedure using access means |
CA3026224A1 (en) | 2016-07-19 | 2018-01-25 | Visa International Service Association | Method of distributing tokens and managing token relationships |
US10509779B2 (en) | 2016-09-14 | 2019-12-17 | Visa International Service Association | Self-cleaning token vault |
US10679449B2 (en) | 2016-10-18 | 2020-06-09 | Cummins-Allison Corp. | Coin sorting head and coin processing system using the same |
US10181234B2 (en) | 2016-10-18 | 2019-01-15 | Cummins-Allison Corp. | Coin sorting head and coin processing system using the same |
CN110036386B (en) | 2016-11-28 | 2023-08-22 | 维萨国际服务协会 | Access identifier supplied to application program |
RU2667978C2 (en) * | 2017-01-09 | 2018-09-25 | федеральное государственное казенное военное образовательное учреждение высшего образования "Краснодарское высшее военное училище имени генерала армии С.М. Штеменко" Министерства обороны Российской Федерации | System for electronic signature formation, sustainable to destructive impact |
US10366392B2 (en) | 2017-01-12 | 2019-07-30 | Bank Of America Corporation | Marker code generation for resource distribution authority flagging |
CN107025559B (en) | 2017-01-26 | 2020-09-18 | 创新先进技术有限公司 | Service processing method and device |
WO2018156726A1 (en) | 2017-02-24 | 2018-08-30 | Eyelock, Llc | Systems and methods for providing illumination for iris biometric acquisition |
US10984420B2 (en) | 2017-03-15 | 2021-04-20 | Sujay Abhay Phadke | Transaction device |
US10915899B2 (en) | 2017-03-17 | 2021-02-09 | Visa International Service Association | Replacing token on a multi-token user device |
US10902418B2 (en) | 2017-05-02 | 2021-01-26 | Visa International Service Association | System and method using interaction token |
US11494765B2 (en) | 2017-05-11 | 2022-11-08 | Visa International Service Association | Secure remote transaction system using mobile devices |
US11847651B2 (en) | 2017-05-23 | 2023-12-19 | Kenneth A Kopf | Systems and methods for facilitating biometric tokenless authentication for services |
US10210685B2 (en) | 2017-05-23 | 2019-02-19 | Mastercard International Incorporated | Voice biometric analysis systems and methods for verbal transactions conducted over a communications network |
US20190139051A1 (en) * | 2017-05-23 | 2019-05-09 | Kenneth A. Kopf | Biometric secure transaction system |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10491389B2 (en) | 2017-07-14 | 2019-11-26 | Visa International Service Association | Token provisioning utilizing a secure authentication system |
CN107330307A (en) * | 2017-07-16 | 2017-11-07 | 成都牵牛草信息技术有限公司 | A kind of form data operating right authorization method |
CA3015802C (en) | 2017-08-31 | 2021-06-22 | Eyelock, Llc | Systems and methods of biometric acquistion using positive optical distortion |
RU2706898C2 (en) * | 2017-09-06 | 2019-11-21 | Общество С Ограниченной Ответственностью "Яндекс" | Method (embodiments) of processing transaction data to obtain impersonal information on purchases made using electronic payment means, and a method (embodiments) for establishing correspondence between pos-terminals and apparatuses of cash register equipment for it |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
RU2673982C1 (en) * | 2017-12-04 | 2018-12-03 | Публичное Акционерное Общество "Сбербанк России" (Пао Сбербанк) | Method and system of execution of transactions for delivery of money resources in case of failures in communication channel of self-service machine |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
WO2019136736A1 (en) * | 2018-01-15 | 2019-07-18 | 福建联迪商用设备有限公司 | Software encryption terminal, payment terminal, and software package encryption and decryption method and system |
US11489866B2 (en) | 2018-03-07 | 2022-11-01 | Private Identity Llc | Systems and methods for private authentication with helper networks |
US10938852B1 (en) | 2020-08-14 | 2021-03-02 | Private Identity Llc | Systems and methods for private authentication with helper networks |
US11210375B2 (en) | 2018-03-07 | 2021-12-28 | Private Identity Llc | Systems and methods for biometric processing with liveness |
US11138333B2 (en) | 2018-03-07 | 2021-10-05 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US10721070B2 (en) | 2018-03-07 | 2020-07-21 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US11392802B2 (en) | 2018-03-07 | 2022-07-19 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US11789699B2 (en) | 2018-03-07 | 2023-10-17 | Private Identity Llc | Systems and methods for private authentication with helper networks |
US11394552B2 (en) | 2018-03-07 | 2022-07-19 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US11265168B2 (en) | 2018-03-07 | 2022-03-01 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US11502841B2 (en) | 2018-03-07 | 2022-11-15 | Private Identity Llc | Systems and methods for privacy-enabled biometric processing |
US11170084B2 (en) * | 2018-06-28 | 2021-11-09 | Private Identity Llc | Biometric authentication |
CN111819555A (en) | 2018-03-07 | 2020-10-23 | 维萨国际服务协会 | Secure remote token issuance with online authentication |
US10740499B2 (en) | 2018-03-12 | 2020-08-11 | Nuvoton Technology Corporation | Active shield portion serving as serial keypad |
US11256789B2 (en) | 2018-06-18 | 2022-02-22 | Visa International Service Association | Recurring token transactions |
US11847650B2 (en) | 2018-08-03 | 2023-12-19 | International Business Machines Corporation | Methods and systems for managing personal device security |
CN109194624B (en) * | 2018-08-09 | 2021-03-26 | 顾宏超 | Method for authenticating use of engineering machinery equipment, equipment and storage medium thereof |
CN112740207A (en) | 2018-08-22 | 2021-04-30 | 维萨国际服务协会 | Method and system for token provisioning and processing |
EP3881258A4 (en) | 2018-11-14 | 2022-01-12 | Visa International Service Association | Cloud token provisioning of multiple tokens |
USD885568S1 (en) | 2018-11-20 | 2020-05-26 | Star Luminal LLC | Intravenous tubing indicator for an antihypertensive medication |
GB2582055B (en) | 2019-01-04 | 2022-10-12 | Cummins Allison Corp | Coin pad for coin processing system |
CN109784811A (en) * | 2019-01-15 | 2019-05-21 | 长春市震撼科技有限公司 | A kind of commodity sale system for e-commerce |
AU2019203859B2 (en) * | 2019-03-14 | 2021-01-07 | Advanced New Technologies Co., Ltd. | Methods and devices for acquiring and recording tracking information on blockchain |
CN113872952B (en) * | 2019-04-10 | 2023-11-28 | 创新先进技术有限公司 | Method, device, equipment and system architecture for pushing identity verification product |
US11849042B2 (en) | 2019-05-17 | 2023-12-19 | Visa International Service Association | Virtual access credential interaction system and method |
RU2723448C1 (en) * | 2019-05-24 | 2020-06-11 | Публичное Акционерное Общество "Сбербанк России" (Пао Сбербанк) | Method of calculating client credit rating |
US11157626B1 (en) | 2019-05-29 | 2021-10-26 | Northrop Grumman Systems Corporation | Bi-directional chain of trust network |
EP3786820B1 (en) * | 2019-06-28 | 2022-08-31 | Rakuten Group, Inc. | Authentication system, authentication device, authentication method, and program |
US20210342846A1 (en) * | 2020-04-29 | 2021-11-04 | Fidelity Information Services, Llc | Systems and methods for processing financial transactions using compromised accounts |
US11886559B2 (en) | 2020-08-31 | 2024-01-30 | Harlock Creative Llc | Biometric identification and control systems and methods for providing customizable security through authentication of biosignal representations of one or more user-specific and user-selected gesture-intentions |
US20220217136A1 (en) * | 2021-01-04 | 2022-07-07 | Bank Of America Corporation | Identity verification through multisystem cooperation |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5191611A (en) * | 1989-04-03 | 1993-03-02 | Lang Gerald S | Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients |
US5229764A (en) * | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
Family Cites Families (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS57212851A (en) * | 1981-06-25 | 1982-12-27 | Nec Corp | User admitting system |
JPS5936860A (en) * | 1982-08-26 | 1984-02-29 | Nitsuko Ltd | Method for discriminating reluctant data input |
US4926480A (en) * | 1983-08-22 | 1990-05-15 | David Chaum | Card-computer moderated systems |
US4998279A (en) * | 1984-11-30 | 1991-03-05 | Weiss Kenneth P | Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics |
US5168520A (en) * | 1984-11-30 | 1992-12-01 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
JPH0644284B2 (en) * | 1985-02-14 | 1994-06-08 | 三菱電機株式会社 | Fingerprint identification device |
US5144680A (en) * | 1985-03-01 | 1992-09-01 | Mitsubishi Denki Kabushiki Kaisha | Individual identification recognition system |
DE3679819D1 (en) * | 1986-05-06 | 1991-07-18 | Siemens Ag | ARRANGEMENT AND METHOD FOR DETERMINING THE AUTHORIZATION OF PERSONS BY CHECKING YOUR FINGERPRINTS. |
JPS633369A (en) * | 1986-06-23 | 1988-01-08 | Hitachi Ltd | Emergency contact system |
US4821118A (en) * | 1986-10-09 | 1989-04-11 | Advanced Identification Systems, Inc. | Video image system for personal identification |
US4837422A (en) * | 1987-09-08 | 1989-06-06 | Juergen Dethloff | Multi-user card system |
US4961142A (en) * | 1988-06-29 | 1990-10-02 | Mastercard International, Inc. | Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer |
CA2004457A1 (en) * | 1988-12-06 | 1990-06-06 | Seigo Igaki | Minutia data extraction in fingerprint identification |
JP2557510B2 (en) * | 1988-12-29 | 1996-11-27 | 株式会社東芝 | Personal authentication device |
US5095194A (en) * | 1989-10-12 | 1992-03-10 | Joseph Barbanell | Holographic credit card with automatical authentication and verification |
US5210797A (en) * | 1989-10-30 | 1993-05-11 | Kokusan Kinzoku Kogyo Kabushiki Kaisha | Adaptive dictionary for a fingerprint recognizer |
KR930005570B1 (en) * | 1989-11-13 | 1993-06-23 | 주식회사 금성사 | Fingerprinter recognition system using hologram |
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
JPH03189756A (en) * | 1989-12-19 | 1991-08-19 | Nippondenso Co Ltd | User confirming device for computer equipment |
US5265162A (en) * | 1990-01-16 | 1993-11-23 | George Bush | Portable pin card |
US5146102A (en) * | 1990-02-22 | 1992-09-08 | Kabushiki Kaisha Toshiba | Fingerprint image input apparatus including a cylindrical lens |
JPH03266186A (en) * | 1990-03-16 | 1991-11-27 | Fujitsu Ltd | Fingerprint collator |
US5321242A (en) * | 1991-12-09 | 1994-06-14 | Brinks, Incorporated | Apparatus and method for controlled access to a secured location |
US5036461A (en) * | 1990-05-16 | 1991-07-30 | Elliott John C | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device |
GB2244164A (en) * | 1990-05-18 | 1991-11-20 | Philips Electronic Associated | Fingerprint sensing |
JPH0424889A (en) * | 1990-05-21 | 1992-01-28 | Toshiba Corp | Ic card provided with personal identification function |
US5230025A (en) * | 1990-08-31 | 1993-07-20 | Digital Biometrics, Inc. | Method and apparatus for capturing skin print images |
JPH04147385A (en) * | 1990-10-11 | 1992-05-20 | Matsushita Electric Ind Co Ltd | Individual identifying apparatus |
KR930001001Y1 (en) * | 1990-11-17 | 1993-03-02 | 주식회사 금성사 | Fingerprint recognition apparatus |
JP2717887B2 (en) * | 1991-03-04 | 1998-02-25 | オーテック電子株式会社 | Access control system |
US5239583A (en) * | 1991-04-10 | 1993-08-24 | Parrillo Larry A | Method and apparatus for improved security using access codes |
JPH0562057A (en) * | 1991-09-03 | 1993-03-12 | Oki Electric Ind Co Ltd | Automatic transaction device |
US5222152A (en) * | 1991-11-19 | 1993-06-22 | Digital Biometrics, Inc. | Portable fingerprint scanning apparatus for identification verification |
US5335288A (en) * | 1992-02-10 | 1994-08-02 | Faulkner Keith W | Apparatus and method for biometric identification |
US5276314A (en) * | 1992-04-03 | 1994-01-04 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US5251259A (en) * | 1992-08-20 | 1993-10-05 | Mosley Ernest D | Personal identification system |
WO1994010659A1 (en) * | 1992-10-27 | 1994-05-11 | Jasper Consulting, Inc. | Credit card fraud elimination system |
US5351303A (en) * | 1993-02-25 | 1994-09-27 | Willmore Michael R | Infra-red imaging and pattern recognition system |
US5343529A (en) * | 1993-09-28 | 1994-08-30 | Milton Goldfine | Transaction authentication using a centrally generated transaction identifier |
GB2283349A (en) * | 1993-10-29 | 1995-05-03 | Ibm | Transaction processing system |
GB9323489D0 (en) * | 1993-11-08 | 1994-01-05 | Ncr Int Inc | Self-service business system |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
-
1995
- 1995-05-17 US US08/442,895 patent/US5613012A/en not_active Expired - Lifetime
-
1996
- 1996-05-17 EP EP96916498A patent/EP0912959B1/en not_active Expired - Lifetime
- 1996-05-17 DK DK96916498T patent/DK0912959T3/en active
- 1996-05-17 AT AT96916498T patent/ATE254315T1/en not_active IP Right Cessation
- 1996-05-17 JP JP8535098A patent/JPH11511882A/en not_active Withdrawn
- 1996-05-17 RU RU97120714/09A patent/RU2263348C2/en not_active IP Right Cessation
- 1996-05-17 ES ES96916498T patent/ES2213774T3/en not_active Expired - Lifetime
- 1996-05-17 DE DE69630713T patent/DE69630713T2/en not_active Expired - Lifetime
- 1996-05-17 PT PT96916498T patent/PT912959E/en unknown
- 1996-05-17 CN CNB2004100325921A patent/CN1320491C/en not_active Expired - Lifetime
- 1996-05-17 CA CA002221321A patent/CA2221321C/en not_active Expired - Lifetime
- 1996-05-17 WO PCT/US1996/007185 patent/WO1996036934A1/en active IP Right Grant
- 1996-05-17 CN CNB961956410A patent/CN1152505C/en not_active Expired - Lifetime
- 1996-05-17 BR BRPI9608580-0A patent/BR9608580B1/en not_active IP Right Cessation
- 1996-05-17 AU AU59226/96A patent/AU5922696A/en not_active Abandoned
- 1996-07-25 US US08/687,251 patent/US5838812A/en not_active Expired - Lifetime
-
2005
- 2005-03-11 HK HK05102125A patent/HK1069655A1/en not_active IP Right Cessation
- 2005-12-05 JP JP2005351374A patent/JP2006146945A/en not_active Withdrawn
- 2005-12-05 JP JP2005351373A patent/JP4097040B2/en not_active Expired - Lifetime
-
2007
- 2007-05-21 JP JP2007134820A patent/JP2007293878A/en not_active Withdrawn
-
2009
- 2009-01-16 JP JP2009008238A patent/JP2009087379A/en not_active Withdrawn
- 2009-12-25 JP JP2009296344A patent/JP2010086552A/en not_active Withdrawn
- 2009-12-25 JP JP2009296345A patent/JP2010097620A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5191611A (en) * | 1989-04-03 | 1993-03-02 | Lang Gerald S | Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients |
US5229764A (en) * | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
Cited By (120)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6678753B1 (en) | 1995-12-20 | 2004-01-13 | Fujitsu Limited | IC card reading/writing apparatus and method for allowing use of multiple vendors |
EP0780813A3 (en) * | 1995-12-20 | 2002-05-15 | Fujitsu Limited | IC card, IC card reading/writing apparatus, host for an IC card reading/writing apparatus, IC card system, and method for allowing use of multiple vendors in an IC card system |
EP0780813A2 (en) * | 1995-12-20 | 1997-06-25 | Fujitsu Limited | IC card, IC card reading/writing apparatus, host for an IC card reading/writing apparatus, IC card system, and method for allowing use of multiple vendors in an IC card system |
JP2001512262A (en) * | 1997-07-31 | 2001-08-21 | スプリング テクノロジーズ,インコーポレイティド | Systems and methods for using biometric identification to control access to events and transportation systems |
JP2010205293A (en) * | 1997-08-27 | 2010-09-16 | Data Treasury Corp | Remote data processing system |
EP1032905A4 (en) * | 1997-11-28 | 2005-04-27 | Diebold Inc | Financial transaction apparatus and method that identifies an authorized user's appearance and voice |
EP1032905A1 (en) * | 1997-11-28 | 2000-09-06 | Diebold, Incorporated | Financial transaction apparatus and method that identifies an authorized user's appearance and voice |
US8011572B2 (en) | 1997-11-28 | 2011-09-06 | Diebold, Incorporated | Banking transaction machine that operates responsive to data bearing records |
CN100440101C (en) * | 1998-04-07 | 2008-12-03 | 杰拉德·R·布莱克 | Identification confirmation system |
WO2000000882A3 (en) * | 1998-06-27 | 2000-04-13 | Lci Smartpen Nv | Apparatus and method for end-to-end authentication using biometric data |
WO2000000882A2 (en) * | 1998-06-27 | 2000-01-06 | Lci/Smartpen, N.V. | Apparatus and method for end-to-end authentication using biometric data |
WO2000004515A1 (en) * | 1998-07-14 | 2000-01-27 | Wintriss Marc V | A method and apparatus for facilitating business transactions between buyers nodes and vendors nodes over a network by providing a verification node |
EP0986209A3 (en) * | 1998-09-11 | 2003-04-02 | Mitsubishi Denki Kabushiki Kaisha | Remote authentication system |
EP0986209A2 (en) * | 1998-09-11 | 2000-03-15 | Mitsubishi Denki Kabushiki Kaisha | Remote authentication system |
JP2002527991A (en) * | 1998-10-14 | 2002-08-27 | ソネラ スマートトラスト オサケユキチュア | Method and system for application of safety marking |
WO2000030051A1 (en) * | 1998-11-18 | 2000-05-25 | Wintriss Marc V | A method and apparatus for facilitating business transactions over a network by providing a reliable verification source |
JP4741081B2 (en) * | 1999-01-18 | 2011-08-03 | イリディアン テクノロジーズ インコーポレイテッド | Method and apparatus for securely sending and authenticating biometric data over a network |
JP2002535761A (en) * | 1999-01-18 | 2002-10-22 | イリディアン テクノロジーズ インコーポレイテッド | Method and apparatus for securely sending and authenticating biometric data over a network |
US6332193B1 (en) | 1999-01-18 | 2001-12-18 | Sensar, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
WO2000042577A1 (en) * | 1999-01-18 | 2000-07-20 | Iridian Technologies, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
US7571461B2 (en) | 1999-01-26 | 2009-08-04 | International Business Machines Corporation | Personal website for electronic commerce on a smart Java card with multiple security check points |
JP2000222362A (en) * | 1999-01-26 | 2000-08-11 | Internatl Business Mach Corp <Ibm> | Method and device for realizing multiple security check point |
US6829711B1 (en) | 1999-01-26 | 2004-12-07 | International Business Machines Corporation | Personal website for electronic commerce on a smart java card with multiple security check points |
US7571117B1 (en) | 1999-08-02 | 2009-08-04 | Softbankbb Corporation | Electronic authentication system, authentication apparatus, and terminal |
US7865401B2 (en) | 1999-08-02 | 2011-01-04 | Softbank Bb Corporation | Electronic settlement system, settlement apparatus, and terminal |
US7657490B1 (en) | 1999-08-02 | 2010-02-02 | Softbankbb Corporation | Electronic settlement system, settlement device, and terminal |
US7457782B2 (en) | 1999-08-02 | 2008-11-25 | Softbankbb Corporation | Electronic settlement system, settlement apparatus and terminal |
US7448540B2 (en) | 1999-08-02 | 2008-11-11 | Softbankbb Corporation | Electronic settlement system, settlement apparatus and terminal |
JP2003509775A (en) * | 1999-09-16 | 2003-03-11 | インディヴォス コーポレイション | System and method for processing a biometric transmission without using a token using an electronic rule module clearinghouse |
JP2012190483A (en) * | 1999-09-16 | 2012-10-04 | Indivos Corp | System and method for processing tokenless biometric electronic transmission using electronic rule module clearinghouse |
JP2003511784A (en) * | 1999-10-08 | 2003-03-25 | ヒューレット・パッカード・カンパニー | User authentication |
WO2001027723A1 (en) * | 1999-10-08 | 2001-04-19 | Hewlett-Packard Company | Trusted computing platform with biometric authentication |
GB2375873A (en) * | 2000-01-05 | 2002-11-27 | Colin Mitchell | Method and apparatus for authenticating financial transactions |
AU782832C (en) * | 2000-01-05 | 2006-04-27 | Electronic Finger Print Technologies Limited | Method and apparatus for authenticating financial transactions |
AU782832B2 (en) * | 2000-01-05 | 2005-09-01 | Electronic Finger Print Technologies Limited | Method and apparatus for authenticating financial transactions |
US8090657B2 (en) | 2000-01-05 | 2012-01-03 | Electronic Finger Print Technologies Limited | Method and apparatus for authenticating financial transactions |
WO2001050428A1 (en) * | 2000-01-05 | 2001-07-12 | Colin Mitchell | Method and apparatus for authenticating financial transactions |
GB2375873B (en) * | 2000-01-05 | 2003-12-03 | Colin Mitchell | Method and apparatus for authenticating financial transactions |
US7523067B1 (en) | 2000-08-02 | 2009-04-21 | Softbankbb Corporation | Electronic settlement system, settlement apparatus, and terminal |
US7447772B2 (en) | 2000-11-10 | 2008-11-04 | Ntt Docomo, Inc. | Authentication system, authentication undertaking apparatus, and terminal apparatus |
US10885504B2 (en) | 2001-03-16 | 2021-01-05 | Universal Secure Registry, Llc | Universal secure registry |
US10636022B2 (en) | 2001-03-16 | 2020-04-28 | Universal Secure Registry, Llc | Universal secure registry |
US9947000B2 (en) | 2001-03-16 | 2018-04-17 | Universal Secure Registry, Llc | Universal secure registry |
US10636023B2 (en) | 2001-03-16 | 2020-04-28 | Universal Secure Registry, Llc | Universal secure registry |
US9928495B2 (en) | 2001-03-16 | 2018-03-27 | Universal Secure Registry, Llc | Universal secure registry |
US8856539B2 (en) | 2001-03-16 | 2014-10-07 | Universal Secure Registry, Llc | Universal secure registry |
US9754250B2 (en) | 2001-03-16 | 2017-09-05 | Universal Secure Registry, Llc | Universal secure registry |
US7827406B2 (en) | 2001-06-12 | 2010-11-02 | Research In Motion Limited | System and method for processing encoded messages for exchange with a mobile data communication device |
US8539226B2 (en) | 2001-06-12 | 2013-09-17 | Blackberry Limited | Certificate management and transfer system and method |
USRE45087E1 (en) | 2001-06-12 | 2014-08-19 | Blackberry Limited | Certificate management and transfer system and method |
US9172540B2 (en) | 2001-06-12 | 2015-10-27 | Blackberry Limited | System and method for processing encoded messages for exchange with a mobile data communication device |
US7653815B2 (en) | 2001-06-12 | 2010-01-26 | Research In Motion Limited | System and method for processing encoded messages for exchange with a mobile data communication device |
US8898473B2 (en) | 2001-06-12 | 2014-11-25 | Blackberry Limited | System and method for compressing secure E-mail for exchange with a mobile data communication device |
CN1554176B (en) * | 2001-07-10 | 2012-12-05 | 捷讯研究有限公司 | Method for processing encrypted message in wireless mobile communication device and device for processing multiple access for encrypted contents |
US9628269B2 (en) | 2001-07-10 | 2017-04-18 | Blackberry Limited | System and method for secure message key caching in a mobile communication device |
WO2003007570A1 (en) * | 2001-07-10 | 2003-01-23 | Research In Motion Limited | System and method for secure message key caching in a mobile communication device |
US8661267B2 (en) | 2001-08-06 | 2014-02-25 | Blackberry Limited | System and method for processing encoded messages |
KR100449776B1 (en) * | 2001-10-11 | 2004-09-22 | 주식회사 루트아이티 | A PKI authentication method using portable memory device |
US7693279B2 (en) | 2003-04-23 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Security method and apparatus using biometric data |
US8896885B2 (en) | 2004-03-12 | 2014-11-25 | Ingenia Holdings Limited | Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure |
US9019567B2 (en) | 2004-03-12 | 2015-04-28 | Ingenia Holdings Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
US9094429B2 (en) | 2004-08-10 | 2015-07-28 | Blackberry Limited | Server verification of secure electronic messages |
US9398023B2 (en) | 2004-08-10 | 2016-07-19 | Blackberry Limited | Server verification of secure electronic messages |
GB2428846B (en) * | 2005-07-27 | 2008-08-13 | Ingenia Technology Ltd | Prescription Authentication |
GB2428846A (en) * | 2005-07-27 | 2007-02-07 | Ingenia Technology Ltd | Prescription authentication utilising networked system |
US8099595B2 (en) | 2005-10-27 | 2012-01-17 | Research In Motion Limited | Synchronizing certificates between a device and server |
US7953971B2 (en) | 2005-10-27 | 2011-05-31 | Research In Motion Limited | Synchronizing certificates between a device and server |
US8645684B2 (en) | 2005-10-27 | 2014-02-04 | Blackberry Limited | Synchronizing certificates between a device and server |
US8191105B2 (en) | 2005-11-18 | 2012-05-29 | Research In Motion Limited | System and method for handling electronic messages |
US8611936B2 (en) | 2005-11-30 | 2013-12-17 | Blackberry Limited | Display of secure messages on a mobile communication device |
US8355701B2 (en) | 2005-11-30 | 2013-01-15 | Research In Motion Limited | Display of secure messages on a mobile communication device |
US7840207B2 (en) | 2005-11-30 | 2010-11-23 | Research In Motion Limited | Display of secure messages on a mobile communication device |
US9100826B2 (en) | 2006-02-21 | 2015-08-04 | Universal Secure Registry, Llc | Method and apparatus for secure access payment and identification |
US10163103B2 (en) | 2006-02-21 | 2018-12-25 | Universal Secure Registry, Llc | Method and apparatus for secure access payment and identification |
US11227676B2 (en) | 2006-02-21 | 2022-01-18 | Universal Secure Registry, Llc | Universal secure registry |
US8577813B2 (en) | 2006-02-21 | 2013-11-05 | Universal Secure Registry, Llc | Universal secure registry |
US7805372B2 (en) | 2006-02-21 | 2010-09-28 | Weiss Kenneth P | Universal secure registry |
US8538881B2 (en) | 2006-02-21 | 2013-09-17 | Universal Secure Registry, Llc | Method and apparatus for secure access payment and identification |
US10832245B2 (en) | 2006-02-21 | 2020-11-10 | Univsersal Secure Registry, Llc | Universal secure registry |
US7809651B2 (en) | 2006-02-21 | 2010-10-05 | Weiss Kenneth P | Universal secure registry |
US9530137B2 (en) | 2006-02-21 | 2016-12-27 | Universal Secure Registry, Llc | Method and apparatus for secure access payment and identification |
US8001055B2 (en) | 2006-02-21 | 2011-08-16 | Weiss Kenneth P | Method, system and apparatus for secure access, payment and identification |
US10733607B2 (en) | 2006-02-21 | 2020-08-04 | Universal Secure Registry, Llc | Universal secure registry |
US8271397B2 (en) | 2006-02-21 | 2012-09-18 | Universal Secure Registry, Llc | Method and apparatus for secure access, payment and identification |
US8943156B2 (en) | 2006-06-23 | 2015-01-27 | Blackberry Limited | System and method for handling electronic mail mismatches |
US8473561B2 (en) | 2006-06-23 | 2013-06-25 | Research In Motion Limited | System and method for handling electronic mail mismatches |
US8359471B2 (en) | 2006-08-17 | 2013-01-22 | Hieronymus Watse Wiersma | System and method for generating a signature |
WO2008020754A1 (en) * | 2006-08-17 | 2008-02-21 | Hieronymus Watse Wiersma | System and method for generating a signature |
US8234220B2 (en) | 2007-02-21 | 2012-07-31 | Weiss Kenneth P | Universal secure registry |
US8505826B2 (en) | 2007-04-16 | 2013-08-13 | Visa U.S.A. | Anti-interrogation for portable device |
US9262762B2 (en) | 2007-06-04 | 2016-02-16 | Visa U.S.A. Inc. | System and method for processing fees for a card |
US7949355B2 (en) | 2007-09-04 | 2011-05-24 | Research In Motion Limited | System and method for processing attachments to messages sent to a mobile device |
US8254582B2 (en) | 2007-09-24 | 2012-08-28 | Research In Motion Limited | System and method for controlling message attachment handling functions on a mobile device |
US8589300B2 (en) | 2007-10-25 | 2013-11-19 | Visa U.S.A. Inc. | Payment transaction using mobile phone as relay |
US8694793B2 (en) | 2007-12-11 | 2014-04-08 | Visa U.S.A. Inc. | Biometric access control transactions |
WO2009108779A2 (en) * | 2008-02-26 | 2009-09-03 | Weiss Kenneth P | Universal secure registry |
WO2009108779A3 (en) * | 2008-02-26 | 2009-11-19 | Weiss Kenneth P | Universal secure registry |
WO2010026261A3 (en) * | 2008-09-08 | 2010-08-19 | Psylock Gmbh | Biometric identification method using feature vectors and analysis in comparison to multiple biometric samples |
WO2010026261A2 (en) * | 2008-09-08 | 2010-03-11 | Psylock Gmbh | Biometric identification method using feature vectors and analysis in comparison to multiple biometric samples |
US9727868B2 (en) | 2009-05-04 | 2017-08-08 | Visa International Service Association | Determining targeted incentives based on consumer transaction history |
US9489674B2 (en) | 2009-05-04 | 2016-11-08 | Visa International Service Association | Frequency-based transaction prediction and processing |
US9773246B2 (en) | 2009-05-04 | 2017-09-26 | Visa International Service Association | Pre-authorization of a transaction using predictive modeling |
US9984379B2 (en) | 2009-05-04 | 2018-05-29 | Visa International Service Association | Determining targeted incentives based on consumer transaction history |
US10320782B2 (en) | 2009-08-05 | 2019-06-11 | Daon Holdings Limited | Methods and systems for authenticating users |
US9781107B2 (en) | 2009-08-05 | 2017-10-03 | Daon Holdings Limited | Methods and systems for authenticating users |
US9485251B2 (en) | 2009-08-05 | 2016-11-01 | Daon Holdings Limited | Methods and systems for authenticating users |
US9202032B2 (en) | 2009-08-05 | 2015-12-01 | Daon Holdings Limited | Methods and systems for authenticating users |
US9202028B2 (en) | 2009-08-05 | 2015-12-01 | Daon Holdings Limited | Methods and systems for authenticating users |
US8892556B2 (en) | 2009-11-10 | 2014-11-18 | Ingenia Holdings Limited | Optimisation |
US8447272B2 (en) | 2009-11-25 | 2013-05-21 | Visa International Service Association | Authentication and human recognition transaction using a mobile device with an accelerometer |
US10616198B2 (en) | 2010-09-17 | 2020-04-07 | Universal Secure Registry, Llc | Apparatus, system and method employing a wireless user-device |
US9531696B2 (en) | 2010-09-17 | 2016-12-27 | Universal Secure Registry, Llc | Apparatus, system and method for secure payment |
US8613052B2 (en) | 2010-09-17 | 2013-12-17 | Universal Secure Registry, Llc | Apparatus, system and method employing a wireless user-device |
US8682798B2 (en) | 2010-09-24 | 2014-03-25 | Visa International Service Association | Method and system using universal ID and biometrics |
US8554685B2 (en) | 2010-09-24 | 2013-10-08 | Visa International Service Association | Method and system using universal ID and biometrics |
US8856043B2 (en) | 2011-02-18 | 2014-10-07 | Visa International Service Association | Method and system for managing data and enabling payment transactions between multiple entities |
US9978064B2 (en) | 2011-12-30 | 2018-05-22 | Visa International Service Association | Hosted thin-client interface in a payment authorization system |
US11132683B2 (en) | 2011-12-30 | 2021-09-28 | Visa International Service Association | Hosted thin-client interface in a payment authorization system |
US11144925B2 (en) | 2011-12-30 | 2021-10-12 | Visa International Service Association | Hosted thin-client interface in a payment authorization system |
WO2020145964A1 (en) * | 2019-01-09 | 2020-07-16 | Hewlett-Packard Development Company, L.P. | Secure transactions |
Also Published As
Publication number | Publication date |
---|---|
JP2010097620A (en) | 2010-04-30 |
ATE254315T1 (en) | 2003-11-15 |
US5613012A (en) | 1997-03-18 |
DK0912959T3 (en) | 2004-03-15 |
CN1542680A (en) | 2004-11-03 |
JP2009087379A (en) | 2009-04-23 |
BR9608580B1 (en) | 2009-01-13 |
JP2007293878A (en) | 2007-11-08 |
DE69630713D1 (en) | 2003-12-18 |
EP0912959B1 (en) | 2003-11-12 |
EP0912959A1 (en) | 1999-05-06 |
RU2263348C2 (en) | 2005-10-27 |
CN1191027A (en) | 1998-08-19 |
CN1320491C (en) | 2007-06-06 |
CA2221321A1 (en) | 1996-11-21 |
JP4097040B2 (en) | 2008-06-04 |
JP2006155628A (en) | 2006-06-15 |
PT912959E (en) | 2004-05-31 |
AU5922696A (en) | 1996-11-29 |
CN1152505C (en) | 2004-06-02 |
US5838812A (en) | 1998-11-17 |
BR9608580A (en) | 1999-01-05 |
DE69630713T2 (en) | 2004-12-02 |
MX9708871A (en) | 1998-10-31 |
ES2213774T3 (en) | 2004-09-01 |
JP2010086552A (en) | 2010-04-15 |
EP0912959A4 (en) | 1999-05-06 |
CA2221321C (en) | 2009-12-01 |
JP2006146945A (en) | 2006-06-08 |
HK1069655A1 (en) | 2005-05-27 |
JPH11511882A (en) | 1999-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2221321C (en) | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |
US5805719A (en) | Tokenless identification of individuals | |
US7152045B2 (en) | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |
US7631193B1 (en) | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |
US5870723A (en) | Tokenless biometric transaction authorization method and system | |
US5764789A (en) | Tokenless biometric ATM access system | |
US6594376B2 (en) | Tokenless electronic transaction system | |
US7248719B2 (en) | Tokenless electronic transaction system | |
US7319987B1 (en) | Tokenless financial access system | |
US6154879A (en) | Tokenless biometric ATM access system | |
WO1998009227A9 (en) | Tokenless biometric transaction authorization method and system | |
US5802199A (en) | Use sensitive identification system | |
WO1999031621A1 (en) | Tokenless financial access system | |
WO1998004996A1 (en) | Tokenless biometric transaction authorization system | |
AU750174B2 (en) | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |
MXPA97008871A (en) | Identification system without identity card or similar objects for the authorization of electronic transactions and transmissions electroni |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 96195641.0 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AM AT AU BB BG BR BY CA CH CN CZ DE DK ES FI GB GE HU JP KE KG KP KR KZ LK LT LU LV MD MG MN MW MX NO NZ PL PT RO RU SD SE SI SK TJ TT UA UZ VN |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2221321 Country of ref document: CA Ref document number: 2221321 Country of ref document: CA Kind code of ref document: A Ref document number: 1996 535098 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/1997/008871 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1996916498 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1996916498 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1996916498 Country of ref document: EP |