CA2102464A1 - Method for visual authentication by images transmitted over a telecommunication system - Google Patents

Method for visual authentication by images transmitted over a telecommunication system

Info

Publication number
CA2102464A1
CA2102464A1 CA002102464A CA2102464A CA2102464A1 CA 2102464 A1 CA2102464 A1 CA 2102464A1 CA 002102464 A CA002102464 A CA 002102464A CA 2102464 A CA2102464 A CA 2102464A CA 2102464 A1 CA2102464 A1 CA 2102464A1
Authority
CA
Canada
Prior art keywords
transmitting
visual
inquirer
identification data
data word
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002102464A
Other languages
French (fr)
Inventor
Charles Arthur Witschorik
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Corp
Original Assignee
American Telephone and Telegraph Co Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by American Telephone and Telegraph Co Inc filed Critical American Telephone and Telegraph Co Inc
Publication of CA2102464A1 publication Critical patent/CA2102464A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • G06Q20/4037Remote solvency checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/253Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords

Abstract

METHOD FOR VISUAL AUTHENTICATION BY IMAGES
TRANSMITTED OVER A TELECOMMUNICATION SYSTEM
Abstract A merchant transmits over a channel in a telecommunications system the credit card number of a person seeking to making a credit card purchase. Therequest is received by a database and utilized to locate a record corresponding to the credit card number. A visual image stored in the database which corresponds to the credit card number is transmitted to a visual display terminal at the merchant location to assist the merchant in authentication of the authority of the personpresenting the credit card.

Description

2102~

METEIOD FOR VISUAL AUTHENTICATION BY IMAGES
TRANSMlTTED OVER A TELECOMMUNICATION SYSTEM

Back~round of the ~vention This invention is generally directed to the process of verifying a 5 person's identity or authority for a particular purpose. This invention is particularly, but not exclusively, suited for use in permitting a merchant to visually authenticate if a person requesdng to charge a purchase to a credit card is authorized to utilize the corresponding credit card account.
Various types of encrypdon keys and secret passwords have been 10 udlized to authenticate the authority of a person to obtain access to restricted information or locations. Encrypted messages may be transmitted over the public switched telephone network to a receiving party having a decrypting key allowingthe receiving party to recover a corresponding plain text message. The use of encryption keys for authendcadon purposes require reladvely sophistdcated 15 communicadon devices and system control in order to rernain effecdve.
Authendcadon that a person is authorized to enter into a financial transacdon in a business setdng normally relies upon convendonal pracdces. For example, a merchant desiring to authendcate a person's authority to make a credit card purchase may compare a signature on the back of a credit card to the signature 20 of the person requesdng such a purchase. Personal idendficatdon can be made by comparing a photograph disposed on a credit card or other idendficadon such as adriver's license to the person seeking to make a credit card purchase. It is also known to udlize a personal identificadon number (PIN) as a password which may berequired to be entered or given for a requested transacdon to be processed, such as 25 when udlizing an automadc teller machine.
The use of photographs for authendcadon is desirable for normal business use. However, enclosing photographs in a credit card is reladvely expensive for the company issuing the credit card. The proUem becomes even more difficult when a prirnary credit card applicant desires to have other persons 30 authorized to utilize the same card. It is possible for a person seeking to defraud a merchant to tamper with a credit card or other idendficatdon so as to replace anexisting photograph with ths photograph of the person seeking to commit the fraud.
Thus, there exists a need for an improved method by which visual authendcadon can be made of persons seeking to gain access to restricted rights or accounts.

21~'~46~

Summary of the Inventioo It is an object of the present invention to provide an improved authentication method wherein an inquirer is automatically provided a visual image of the authorized user(s) associated with an identificadon data word such as a credit 5 card number.
In accordance with an embodiment of the present invention, a merchant utilizes a point-of-sale terrninal to transmit a credit card number via a cornmunication channel to an authorization database. The database contains the validation status of each credit card number or account and a corresponding field(s) 10 of pictures of authorized users of each credit card number. Upon processing arequest for credit card validation and determining the credit card number to be valid, the database transmits the digitally stored picture(s) to a visual display terminal of the merchant preferably in combinadon with a confirmation number indicating authorization to charge the account, thereby enabling the merchant to make a visual 15 comparison to authenticate the authority of the person presenting the credit card.
Brief Description of the Drawin~
FIG. 1 illustrates a pictorial representation of a telecommunicadons system, which in accordance with the present invendon, can be utilized to provide visual authentication.
20 Detailed Description FIG. 1 illustrates a system which incorporates an embodiment of the present invendon. In the exemplary embodiment, a merchant or inquirer at locatdon 10 has access to a credit card reader 12, a point-of-sale tenninal 14 and a visual display terminal 16 which may comprise an AT~T VideoPhone. The 25 magnedc card reader 12 reads the account number typically embedded on a magnetic strip on the card as credit card 18 is passed through the reader. The account number is transmitted by reader 12 over data channel 20 to point-of-sale terminal 14. The video display terminal 16 is coupled by comrnunicadon channel 22 with communicadon link 24 indirectly through point-of-sale terminal 14.
Communicadon channel 24 couples the point-of-sale terminal 14 and video display terminal 16 to a telephone central office 26. The central of fice 26 which may comprise an AT&T 5ESSt9 switch, is coMected to a switched network 28 by communication channel 30. The switch network 28 may comprise part of the public switched telephone network or a private communications network.
35 A service circuit node 32 such as available from AT&T is coupled to switch network 28 by communicadon channel 34. The service circuit node 32 comprises a :,:-: ~. . .
" ~: ' ' ' : . . : , ~ : : . , 2ln~4~

computer controlled peripheral to a switching network and is utilized to provideauxiliary services. A database 36 is coupled to the service circuit node 32 by communication channel 38. The database 36 in accordance with the preferred embodiment of the present invention comprises an independent computer controlled5 database in which data is stored in a nonvolatile storage memory such a computer disk drive.
In the illustrative embodiment, database 36 stores data in a format as shown in table 40 in which data is stored in different fields for each credit card number or account. The table consists of a matrix in which different credit card10 numbers are stored in colurnn 42. Each row of the table contains information related to the corresponding credit card number. Column 44 is a validation field udlized to determine if the corresponding credit card number is valid. Column 46 contains the remaining credit reserve of the credit card account. Columns 44, 50, and 52 contain visual data VDl, VD2, and VD(N), respectively, which represent visual information 15 for each credit card number. The visual data comprises digitized images such as pictures of authorized users which may be stored in a compressed data format in the table in order to conserve storage space. In the preferred embodiment of the present invention, it is contemplated that a picture of each authorized user will be stored in the visual data fields. However, other visual information such as images of the 20 signature of authorized users or fingerprints of authorized users could be utilized. As used herein, visual information means a pictorial representation of a feature orattribute of a person which can aid in identifying the person. It will be apparent that the information contained in table 40 must be collected for each credit card number in database 36 in order to be utilized for validation purposes discussed below. It will 25 also be apparent that table 40 will need to be updated in order to maintain current and accurate data relating to each credit card number or account.
In accordance with an exemplary method of the present invention, visual information is provided by the telecommunications system to help a merchant or inquirer validate that the person requesting to make a credit card purchase is 30 authorized. Although this example focuses on credit card usage and authentication of persons authorized, it will be apparent that the method in accordance with the present invendon can be udlized to validate or authendcate persons requiring access to various benefits or locations in additdon to the illustrative example.
Upon a customer's request for a credit card purchase, the merchant ', 35 transmits an ;dendficadon data word such as the credit card number via a telecommunicadons system to a database having credit card validadon capability.

210~

Typically, the merchant may utilize the credit card reader 12 to automatically read the credit card number from credit card 18 by passing the credit card through the reader. The credit card number is transmitted to a point-of-sale terminal 14 located at the merchant location 10. The point-of-sale terrninal utilizing conventional 5 modem technology transmits the request for validadon including credit card number by channel 24 to a destination having validation capabilities. In the illustrative example the request is processed and passes through central of fice 26, switchednetwork 28, and service circuit node 32 before reaching validadon database 36.
Upon receiving the request for validation, database 36 initiates a search 10 of column 42 of the data contained in table 40 to idendfy if a corresponding card number exists. If such a number is located, the validation data field 44 for thecorresponding card is checked to determine if the card is valid. As an additional step the database may check the credit reserve data in column 46 to deterrnine if sufficient credit remains for the requested purchase where the amount of the 15 purchase has been transrnitted along with the credit card number. The database 36 also identifies corresponding visual data consisdng of digidzed pictures of authorized users which may be utilized to authenticate the authority of the credit card presenter.
Assurning that a corresponding card number was located by database 36 20 and determined to be valid, database 36 ~ansmits a confimladon number authorizing the purchase through the same return path upon which the request was received. The point-of-sale terrninal 14 accepts the received confirmation number as account authorizadon. Database 36 preferably also utilizes the same path to transmit corresponding visual data related to the credit card number as stored in table 40 to 25 video display terrninal 16. The video display terminal receives the visual data and displays the corresponding image or images upon its visual display screen at themerchant location 10. Preferably, the image is frozen on the screen either by the video display terrninal or by the database repeddvely sending the same visual data.
The merchant can then make a visual comparison to determine if the person 30 requesting the credit card purchase is an authorized user by comparing the presented picture of authorized person(s) to the person requesdng credit card authorizadon. If the merchant determines that the credit card user matches a displayed picture, the merchant would then accept the requested credit card purchase with substandal assurance that the person udlizing the credit card is an authorized user.

". :.,: .. . . .

. , , 210246~

Database 36 rnay either comprise part of the telecommunications system or may be maintained as a private database utilized by different issuers of credit cards. If a plurality of databases are udlized for different credit card issuers, the above example would proceed the same with the only difference being that the S request would be routed to the appropriate database by the telecommunications system. In the illustrative embodiment the same database was utilized to perform the traditional credit card account/number validation utilizing columns 44 and 46, and to store the related visual data. However, a database that stores traditional account validation data may contain identificadon of individual authorized users such as by 10 social security number or personal idendficadon number which can be utilized as addresses for a separate database containing visual data corresponding to each user.
It will be apparent to those skilled in ~he art that the funcdons performed by the equipment udlized at the merchant location 10 may be performed by a single piece of equipment based on a personal computer in which comrnunications over 15 channel 24 are provided by a convendonal modem and the visual data received from the database converted into pixel information displayed upon a connected monitor.
In accordance with the present invention a merchant or other inquirer having responsibility to validate a person's requested access to certain benefits or locations is provided with an improved means for making the authorizadon 20 judgement. Visual images such as pictures provide a substandally higher degree of reliability for making the authorizadon determination than other means based upon indicia present upon the card presented by the requesdng person. It is known that cards can be modified to change the intended validadon indicia such as by subsdtuting a different signature or inserdng a different photograph than was 25 originally present on the card. In accordance with the present invendon the received image is outside of the control of a person who wrongfully acquires and attempts to utilize a credit card. Thus, the present invendon provides a substantially improved authendcation technique which should deter the stealing and attempted use of stolen credit cards because of the higher risk associated with wr~ngful attempted use.
Although an embodiment of the present invendon has been illustrated and descIibed herein, the scope of the invention is defined by the claims which ~ol~ow.

1, .

Claims (20)

1. A method for providing visual information via a telecommunication system to help an inquirer validate that a person requesting access to certain benefits is authorized for such access, the method comprising the steps of:
receiving from an inquirer having access to a visual display terminal an identification data word over a channel in said telecommunication system;
accessing a database coupled to said system to locate a record having a corresponding identification data word;
transmitting to said visual display terminal a visual image stored in said database corresponding to said identification data word via said system, said visual image comprising a personal attribute of a person associated with said identification data word, thereby allowing the inquirer to authenticate if the access requesting person associated with said identification data word is authorized by comparing the personal attribute displayed on the visual display terminal with the corresponding attribute of the person requesting access.
2. The method according to claim 1 wherein said identification data word comprises a credit card number.
3. The method according to claim 2 further comprising the steps of determining if said credit card number is valid by checking its status in a database, and transmitting the result of such determination to the inquirer.
4. The method according to claim 3 wherein said steps of transmitting said visual image and transmitting said result arc automatically taken upon receipt of the credit card number.
5. The method according to claim 3 wherein said steps of transmitting said visual image and transmitting said result utilize the same communication channel that links the inquirer with said telecommunication system.
6. The method according to claim 1 further comprising the steps of determining if said identification data word is valid by checking its status in a database, and transmitting the result of such determination to the inquirer.
7. The method according to claim 6 wherein said steps of transmitting said visual image and transmitting said result are automatically taken upon receipt of the identification data word.
8. The method according to claim 6 wherein said steps of transmitting said visual image and transmitting said result utilize the same communication channel that links the inquirer with said telecommunication system.
9. The method according to claim 1 wherein said visual information comprises a picture of at least one person authorized to access said benefits.
10. The method according to claim 1 wherein said visual information comprises a picture of each person authorized to access said benefits.
11. A method for accessing visual authentication information so that an inquirer can make a determination of whether a person requesting access to certain benefits is authorized for such access based on visual information presented to the inquirer via a telecommunication system, the method comprising the steps of:
said inquirer obtaining an identification data word associated with said person's request for access to said certain benefits;
transmitting said identification data word over a channel in said telecommunication system;
accessing a database coupled to said system to locate a record having a corresponding identification data word;
transmitting to a visual display terminal at said inquirer's location visual data stored in said database corresponding to said identification data word via said telecommunication system, said visual data comprising a personal attribute of a person associated with said identification data word;
displaying a visual image based on said visual data on said visual display terminal so that the inquirer can authenticate if the access requesting person associated with said identification data word is authorized by comparing the personal attribute displayed on the visual display terminal with the corresponding attribute of the person requesting access.
12. The method according to claim 11 wherein said identification data word comprises a credit card number.
13. The method according to claim 12 further comprising the steps of determining if said credit card number is valid by checking its status in a database.

and transmitting the result of such determination to the inquirer.
14. The method according to claim 13 wherein said steps of transmitting said visual data and transmitting said result are automatically taken upon receipt of the credit card number.
15. The method according to claim 13 wherein said steps of transmitting said visual data and transmitting said result utilize the same communication channel that links the inquirer with said telecommunication system.
16. The method according to claim 11 further comprising the steps of determining if said identification data word is valid by checking its status in a database, and transmitting the result of such determination to the inquirer.
17. The method according to claim 16 wherein said steps of transmitting said visual data and transmitting said result are automatically taken upon receipt of the identification data word.
18. The method according to claim 16 wherein said steps of transmitting said visual data and transmitting said result utilize the same communication channel that links the inquirer with said telecommunication system.
19. The method according to claim 11 wherein said visual information comprises a picture of at least one person authorized to access said benefits.
20. The method according to claim 11 wherein said visual information comprises a picture of each person authorized to access said benefits.
CA002102464A 1992-12-16 1993-11-04 Method for visual authentication by images transmitted over a telecommunication system Abandoned CA2102464A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US99227892A 1992-12-16 1992-12-16
US992,278 1992-12-16

Publications (1)

Publication Number Publication Date
CA2102464A1 true CA2102464A1 (en) 1994-06-17

Family

ID=25538130

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002102464A Abandoned CA2102464A1 (en) 1992-12-16 1993-11-04 Method for visual authentication by images transmitted over a telecommunication system

Country Status (2)

Country Link
CA (1) CA2102464A1 (en)
GB (1) GB2273629A (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6070141A (en) * 1995-05-08 2000-05-30 Image Data, Llc System and method of assessing the quality of an identification transaction using an identificaion quality score
US5657389A (en) * 1995-05-08 1997-08-12 Image Data, Llc Positive identification system and method
DE19521901A1 (en) * 1995-06-16 1996-12-19 Sel Alcatel Ag Communication system with speech controlled activation of services
AU2158597A (en) * 1996-05-23 1997-12-09 Ulrich Seng Cashless payment method
AU1514799A (en) * 1997-11-19 1999-06-07 Igor Viktorovich Maslov Visual authorisation system for plastic payment cards
MY133933A (en) 2000-05-24 2007-11-30 Ericsson Telefon Ab L M Method and apparatus for buyer identification
EP1172776A3 (en) * 2000-07-15 2002-10-16 ED Vision (Holdings) Limited Interactive authentication process
DE10043554C2 (en) * 2000-09-01 2002-10-24 Otfried Rumberg Data network based identification procedure
DE10043499A1 (en) * 2000-09-01 2002-03-14 Bosch Gmbh Robert Data transmission method
WO2002021469A2 (en) * 2000-09-05 2002-03-14 Ed Vision (Holdings) Limited Interactive authentication process
EP1195732A3 (en) * 2000-10-02 2004-03-10 Werner Brauweiler Method and apparatus for customer oriented use of identification systems
AU2002210797A1 (en) * 2000-10-26 2002-05-06 Midsouth Distributors (Proprietary) Limited Verification system
US20050226509A1 (en) * 2004-03-30 2005-10-13 Thomas Maurer Efficient classification of three dimensional face models for human identification and other applications
WO2008153503A1 (en) * 2007-06-12 2008-12-18 Tiang Fo Gerard Tan A system for marking items, and a system to identify the marked items
WO2010122497A1 (en) * 2009-04-20 2010-10-28 Capicol (Pty) Limited A payment transaction processing and authorization system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0224576A4 (en) * 1985-06-11 1988-11-22 Media Net Ltd Method and apparatus for preparing a check, money order or credit card.
CA2059078C (en) * 1991-02-27 1995-10-03 Alexander G. Fraser Mediation of transactions by a communications system

Also Published As

Publication number Publication date
GB2273629A (en) 1994-06-22
GB9324898D0 (en) 1994-01-19

Similar Documents

Publication Publication Date Title
CA2140803C (en) Method of authenticating a terminal in a transaction execution system
US6163771A (en) Method and device for generating a single-use financial account number
US7844550B2 (en) Method and device for generating a single-use financial account number
US7118027B2 (en) Method and system to issue an electronic visa of a foreign visitor at a country's foreign consular premises
AU2001252615B2 (en) Method for attaching authentication bar code, authentication method, apparatus for attaching authentication bar code, authentication apparatus and portable terminal
DE69630713T2 (en) IDENTIFICATION SYSTEM WITHOUT IDENTITY MARKER
US6556680B1 (en) Method for authorization check
US7558407B2 (en) Tokenless electronic transaction system
US5162638A (en) Process for protection against fraudulent use of smart cards, and device for use of the process
US7428987B2 (en) Cashless vending system
US20030105725A1 (en) Tokenless identification system for authorization of electronic transactions and electronic transmissions
US20020174067A1 (en) Tokenless electronic transaction system
US9196111B1 (en) Automated teller machine (“ATM”) dynamic keypad
CA2102464A1 (en) Method for visual authentication by images transmitted over a telecommunication system
EA001050B1 (en) Positive identification system and method
GB2416058A (en) Secure data communication between a client terminal and remote server
JP2008537210A (en) Secured data communication method
WO1998009227A1 (en) Tokenless biometric transaction authorization method and system
MXPA03002050A (en) Embedded synchronous random disposable code identification method and system.
JP2006048390A (en) Method and system for authenticating two-dimensional code user
JP2005063077A (en) Method and device for personal authentication and connector
EP0886248B1 (en) Method and apparatus for registration of information with plural institutions and recording medium with registration program stored thereon
US7140535B2 (en) Method and system to validate periodically the visa of a foreign visitor during the visitor's in-country stay
US9214051B1 (en) Dynamic touch screen for automated teller machines (“ATMs”)
KR100379659B1 (en) A method of identification using mobile communication terminal

Legal Events

Date Code Title Description
EEER Examination request
FZDE Dead