CN1208737C - Secure biometric identification - Google Patents

Secure biometric identification Download PDF

Info

Publication number
CN1208737C
CN1208737C CNB018113540A CN01811354A CN1208737C CN 1208737 C CN1208737 C CN 1208737C CN B018113540 A CNB018113540 A CN B018113540A CN 01811354 A CN01811354 A CN 01811354A CN 1208737 C CN1208737 C CN 1208737C
Authority
CN
China
Prior art keywords
biometric data
terminal
data
individual
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB018113540A
Other languages
Chinese (zh)
Other versions
CN1441932A (en
Inventor
巴利·约汉·泰勒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Grosvenor Leisure Inc
Original Assignee
Grosvenor Leisure Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Grosvenor Leisure Inc filed Critical Grosvenor Leisure Inc
Publication of CN1441932A publication Critical patent/CN1441932A/en
Application granted granted Critical
Publication of CN1208737C publication Critical patent/CN1208737C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A method and device/terminal are disclosed for the positive identification ofan individual which finds particular use for the secure purchasing of goods orservices over a visual medium such as television, the Internet and EFTPOSsystems. The terminal is a point-of-sale terminal (6) which includes akeyboard (7), a screen (8), a fingerprint reader (9), a smart card readerassembly (10) and a printhead assembly incorporated within the card readerassembly (10). The operating software of the terminal (6) includes code todecrypt encrypted information read from the smart card (4). An individualwishing to undertake a secure financial transaction first obtains a smart card(4) which incorporates encrypted biometric data and financial data of thatindividual. At the point of intended purchase, the card (4) is placed in thereader assembly (10) of the terminal (6). The account details and encryptedbiometric data are read by the terminal (6). The appropriate fingerprint of theindividual is then taken at the fingerprint reader (9) of the terminal (6) fromwhich the encryption key is determined. The encrypted fingerprint data readfrom the card (4) is then decrypted using the encryption key just determinedand the thus-decoded fingerprint data from the card (4) is compared with thefingerprint data obtained at the terminal (6). If the thus-read fingerprint data isidentical with that decoded from the card (4), identification is deemed positiveand the financial transaction proceeds.

Description

Safe biology statistics recognition methods and equipment
Technical field
The present invention relates to a kind of safety method, be used for identification that individuality is be sure of, especially (but not only) is as shopping on telecommunication media or service or extract the affirmation means of cash.The present invention's special (but not only) is as the security means of shopping on visual media or service, and this visual media is the part of TV or other visual display medium or internet or EFTPOS (electronic funds transfer during sale) system for example.But the present invention should not be considered as only limiting to this purposes.
Background technology
By medium such as TV and internet for example commodity and service being advertised now is unusual general phenomenon.Television advertising has been arranged, and people can utilize credit card to buy the commodity or the service of blurb by phone usually.Now the internet is a kind of electronic medium known of people and powerful communication tool, it is a kind of seamless system (World Wide Web) that is linked at the information on the various computing machine, the public can be easy to access internet because of various purposes, comprise various consumer lines of online ordering and/or service.Usually pay these commodity and/or service by credit card then.And it also is very general utilizing credit or debit card (EFTPOS) payment for merchandise when selling in the market now.
A distinct disadvantage of teleshopping is: the identification that can not be sure of individuality, and this is to preventing that the people's unauthorized access bank account or the credit card details of attempting by swindle shopping or service from being important.
The commonsense method of the identification that can be sure of before checking and approving sale by telecommunication media is the specific coding of adopting concrete account.These codings are normally digital, but can be letter or alphanumeric, and for example PIN number (identification number) is used for combining with concrete account number.But because PIN and account number guarantee that through any cross check they are that true owner by this PIN number and associated credit card or bank account uses on telecommunication media, therefore will get around such Secure Transaction can be too difficult.
Specifically, in the system of existing employing magnetic strip credit cards or debit card, user's account identity and PIN number exist on the card.Although these data are encoded, also duplicate this card easily, can swindle according to following at least dual mode then:
1. if Jia Mao user holds this card, just can finish transaction and do not need signature or PIN number, can be by being included in several methods such as using card number, card name and valid period on phone and the internet.
2., so just can on ATM, EFTPOS terminal etc., use and substitute card if fake user is known the PIN number.
These fraudulent transactions bring debt can for hair fastener authorities (may be bank or other financial institutions) and card possessor, will cause a dispute between both sides then.
The identification individual identity of be sure oing is for preventing to enter without approval or also being very important through some specific places or facility, and these places or facility comprise for example international destination (International destination), bank vault and comprise other restricted area of secure buildings, prison, airport terminal etc.
But when official attempts by for example manually inquiry, carries out the comparison of visual signature or name and the list that is prohibited from entering or leaves the limited personage of particular country are compared when confirming individual identity with photo on the passport, the correct identification of this individuality may be incured loss through delay the travelling of crossing over the border.
For these particular problems, a kind of solution that proposes in the prior art is to adopt the method that depends on individual physical trait.This method is referred to as the biometrics technology usually, comprises fingerprint analysis, thermal image figure and DNA analysis.It is generally acknowledged that these methods are not easy to produce wrong identification.
A kind of such method comprises that the biometric data database of biometric data and the permission individuality that generates in advance on the card that individuality is provided compares.But the people who has obtained the biometrics card from correct everyone still can defeat this system.Perhaps, the personation user of this card can partly duplicate this card, keeps any credit card information, but replaces the correct proprietary biometric data of card with his biometric data.In addition, the data that will obtain from individuality and the huge remote data base of this information compare usually, and this database is difficult to and/or locate very slowly and visit.
The method that can overcome above-mentioned defective at present can be summarized as: have passport, know password, have limited goods for example by key and the biometrics technology that compares of the remote data base of personal data that will block and this information.
But these safety methods are broken through easily, and gratifying correct and person identification method easily can not be provided.
Summary of the invention
Therefore overall purpose of the present invention is to overcome or is to improve above-mentioned one or multinomial problem and/or shortcoming at least.
According to a first aspect of the invention, provide a kind of method that is used for correctly discerning individual identity, this method comprises:
For described individuality provides exclusive sign (a unique description), this exclusive sign comprises the biometric data of described individuality;
Utilize encryption key (an encryption key) to encrypt for described exclusive sign, described encryption key is determined by described biometric data;
Be provided for the identity recognition device that described individuality carries, this identity recognition device comprises described exclusive sign;
Deriving means is provided, obtains the verification biometric data with the described identity recognition device of submitting to from the individual;
Determine encryption key from described verification biometric data;
Utilization is deciphered the described biometric data that comprises the described exclusive sign from the described encryption key that described verification biometric data obtains;
The biometric data of described verification biometric data and described deciphering is compared;
Wherein when when consistent, thinking that described individual's identity is correct from the biometric data of the described individuality that comprises in described individual's described verification biometric data and the described exclusive sign.
Preferably, described encryption key is only to determine from the described biometric data of part.
Preferably, described biometric data is the fingerprint analysis.
Preferably, described identity recognition device is a card, and its type is for preserving the information of machine readable form.
Optional is, described deriving means has obtained described verification biometric data and has discerned this people's identity tentatively assuredly from described individual after, with described verification biometric data be sent to remote data base further with described database in the biometric data preserved compare.
In one embodiment of the invention, described individuality for example goes to issuing of bank etc. a little to obtain described identity recognition device, and before issuing described identity recognition device, bank or credit card mechanism must carry out regular identification program.
According to a second aspect of the invention, provide a kind of and correctly discerning the equipment that uses in the method for individual identity as mentioned above, this equipment comprises:
Obtain the facility of described verification biometric data from the individual that described identity recognition device is provided;
Be used to read the reading device of described identity recognition device;
Be used for obtaining the decoding device of biometric data from described identity recognition device; And
Be used for comparison means that described biometric data and described verification biometric data are compared.
Preferably, described facility is the fingerprint reading machine.
Preferably, described reading device is the combination of smart card reading machine.
Preferably, described reading device is computing machine, mobile phone, EFTPOS terminal, ATM or similar terminal, and perhaps the part as them is loaded into.
When described reading device was contained in the mobile phone, described identity recognition device was contained in the SIM card of mobile phone.
Optional is, described equipment will allow and carry out three continuous trials at most, obtaining described verification biometric data, and the described biometric data that comprises in itself and the described identity recognition device is compared.If the identification that can not be sure of in these three times are attempted thinks that then this identity is wrong.
According to the 3rd aspect of the present invention, a kind of method that is used for safe transfer data on telecommunication media is provided, this method comprises:
A kind of conveyer is provided, is used for the individual that described data are concluded the business from hope is sent to and needs the described data of verification before can carrying out described transaction, to confirm a side of described data; And
A kind of confirmation device is provided, has the right to carry out described transaction to guarantee this people;
Wherein after having determined described people's correct identity, allow to carry out described transaction by above-mentioned correct personal identification method.
Preferably, described data are financial datas of described individual.
Preferably, described conveyer comprises the terminal away from a described side, and described thus individual can provide described data to a described side, and this device comprises cellular phone or wireless data transmission lines.
Therefore, according to a fourth aspect of the present invention, provide a kind of terminal of using in the method for above-mentioned safe transfer data, described terminal comprises:
Conveyer is sent to described side with described individual's identity particulars; And
Being used for described individual utilizes the identity particulars that the facility of this people's verification biometric data is provided.
Preferably, described conveyer also comprises credit or debit card bowl assembly (slotassembly).
Preferably, described facility comprises:
Deriving means is used for obtaining described verification biometric data from the individuality that described identity recognition device is provided;
Reading device is used to read described identity recognition device;
Decoding device is used for obtaining biometric data from described identity recognition device;
Comparison means is used for described biometric data and described verification biometric data are compared; And
Authenticate device (authentication means) is used to authenticate the transfer of described data.
Preferably, described deriving means is the fingerprint reading machine.
Preferably, described reading device is the smart card bowl assembly, and wherein said smart card comprises described biometric data.
More preferably, described facility further comprises print-out device, is used to write down the hard copy that described data shift particulars with generation.
In this embodiment on the one hand of the present invention, described print-out device is a printer, and it and described facility become one or be separated.
In this another embodiment on the one hand of the present invention, described print-out device is arranged in the bowl assembly of described smart card.Print head assembly can be machinery, heat, laser or ink-jet type, after finishing the data transfer and discharge smart card from bowl assembly, prints receipt at receipt when bowl assembly enters (or taking-up).Can use up or existence that the sensor of magnetic type detects the blank receipt that is inserted whether, and activate print routine.
Preferably, described receipt be " scraps of paper of can tearing " form one, bigeminy or three receipts.
More preferably, described receipt is the many parts of copy receipts that size can be compared with credit or debit card.
More preferably, described receipt is three.
Description of drawings
Referring now to accompanying drawing the preferred embodiments of the invention are described, wherein:
Fig. 1 one embodies the schematic reduced representation of terminal of the present invention, is used for hope is carried out the identification that the individual of financial transaction be sure of by this terminal.
Fig. 2 a is the top plan view that schematically illustrates terminal of the present invention.
Fig. 2 b is the side view of overlooking that schematically illustrates Fig. 2 a terminal.
Embodiment
Referring to Fig. 1, a CPU (central processing unit) (1) links to each other with a cellular telecommunication network (2).Fingerprint reader (3) links to each other with smart card (4) issue terminal (5), and this smart card issue terminal (5) can interrelate with network (2).Those skilled in the art will appreciate that these all devices all are known, and they can be undertaken by the known any method of prior art interconnected.Place the transaction terminal (6) of trade commercial location also to interrelate with network (2).Shown in Fig. 2 a and 2b, terminal (6) comprising: one is used to import the keyboard (7) of transaction details; One is used to show the display screen (8) of the particulars of input thus; One fingerprint reader (9); One smart card reading machine combination (10); And print head assembly (not shown) that is contained in the card reading machine combination (10).The function software of terminal (6) comprises the coding that the enciphered message that reads from smart card (4) is decrypted.All devices that those skilled in the art will appreciate that terminal (6) all are known, and can adopt known method to come to carry out interconnected to various devices.
When an individual hope utilized machine readable to stick into the safe financial transaction of row, he at first needed to obtain one and has he individual's the encryption biometric data and the card of financial data.The mechanism that he or she can remove to issue machine-readable " intelligence " card for example bank obtains this card.When at this mechanism application credit or debit card, before issuing card, this individuality must at first provide the correct identity that satisfies these mechanism's needs usually.In case issued smart card, this mechanism just utilizes the known any suitable fingerprint reader of prior art to extract this individual biometric data (especially fingerprint data).Can be from two fingerprint extraction data, to reduce the refusal of contingent any mistake when the use of trade commercial location is of the present invention, though this is not necessary.The fingerprint shadow table of scanning is shown the mathematical expression of ridge pattern, and it is compressed and utilizes the known any suitable cryptographic algorithm in financial transaction field to encrypt, and can only decipher at first that these data just can read or relatively to guarantee it.The biometric data of this encryption of this individuality and financial particulars are stored in the storer of smart card.
In order to utilize this card (4) to carry out safe shopping in the place of wanting to do shopping, will block (4) and be placed in the reading machine combination (10) of terminal (6), utilize keyboard (7) to import trading value by the businessman.Go up the demonstration buying value at visual display screen (8).Also read the biometric data of account's particulars and encryption by terminal (6).Read the suitable fingerprint of this individuality then in the fingerprint reader (9) of terminal (6), determine its encryption key thus.Utilize the encryption key of determining just now that the encryption finger print data that reads from card (4) is decrypted then, and will block the decoded like this finger print data of (4) and compare with finger print data in the terminal acquisition; When the finger print data that reads like this during, think that identity is correct, and carry out financial transaction with the data consistent of from card (4), decoding.When comparative result is when negating, the consumer inserts finger again, perhaps changes finger (if having stored two fingerprints in card (4)), carries out scanning second time, repeats above-mentioned comparison procedure.Although can repeat this process several times, in fact, hope is set at this terminal (6) can only allow three continuous trials at most, obtain the verification biometric data and with smart card (4) in the storage biometric data compare.When in these three times are attempted, not taking place to confirm, think that this identity is wrong.
After correct transaction, in reading machine/printing trough (10), insert receipt, on receipt, write down transaction details.The particulars of this transaction also are sent to Central Processing Facility (1), carry out record.
Though have no particular limits, the present embodiment is applicable to the selling spot of doing shopping or serving in all markets.This terminal can be the standalone unit of controlling oneself, and use perhaps combines with hand held, on knee or desktop computer or other any unit of comprising visual display unit.In addition, this terminal can be utilized any suitable communication network, can be any combination of honeycomb, satellite, microwave or hard wire phone or other communication networks, though this terminal is preferably utilized portable cellular function and wireless telecommunications system easily.
Safe transfer feature of the present invention can be connected to existing ATM machine (ATM (Automatic Teller Machine)), has improved the safety of withdrawing money from ATM like this.
By utilizing the present invention, can obtain multiple advantages, comprising:
Because can visit remote data base the people that identity recognition device is provided is carried out identity validation, therefore can carry out this affirmation fast, compare, obviously reduce the 20-30 time of second with the existing device that must visit central database.
Can avoid falsely using of credit or debit card.Although can carry out duplicating of part to intelligent card data, to keep credit data and to replace the true proprietary biometric data of card with the person's of falsely using biometric data, but also be not enough to produce an effectively card because encryption key with obtain according to the primeval life statistics different.
Therefore the present invention has adopted the encryption key that Original submission biometric data obtains when issuing credit or debit card or other machine-readable identity recognition devices according to the individual, fraud or other wrong identifications of card have been prevented, has high security, easy to use and application.
Be appreciated that above-mentioned embodiment is the example of various aspects of the present invention, can carry out various improvement and replacing to it, and can not break away from the scope of the present invention that following claims limit.

Claims (26)

1. method that is used for correctly discerning individual identity, this method comprises:
For described individuality provides exclusive sign, this exclusive sign comprises the biometric data of described individuality;
Utilizing encryption key is that described exclusive sign is encrypted, and described encryption key is determined by described biometric data;
Be provided for the identity recognition device that described individuality carries, this identity recognition device comprises described exclusive sign;
Deriving means is provided, obtains the verification biometric data with the described identity recognition device of submitting to from the individual;
Determine encryption key from described verification biometric data;
Utilization is deciphered the described biometric data that comprises the described exclusive sign from the described encryption key that described verification biometric data obtains;
The biometric data of described verification biometric data and above-mentioned deciphering is compared;
Wherein when when consistent, thinking that described individual's identity is correct from the biometric data of the described individuality that comprises in described individual's described verification biometric data and the described exclusive sign.
2. method as claimed in claim 1, wherein said encryption key are only to determine from the described biometric data of part.
3. as the method for claim 1 or 2, wherein said biometric data is the fingerprint analysis.
4. method as claimed in claim 1, wherein said identity recognition device are cards, and its type is for preserving the information of machine readable form.
5. method as claimed in claim 1, wherein described deriving means has obtained described verification biometric data and has discerned this people's identity tentatively assuredly from described individual after, with described verification biometric data be sent to remote data base further with described database in the biometric data preserved compare.
6. the used equipment of the method for a correct identification individual identity as claimed in claim 1, this equipment comprises:
Obtain the facility of described verification biometric data from the individual that described identity recognition device is provided;
Be used to read the reading device of described identity recognition device;
Be used for obtaining the decoding device of biometric data from described identity recognition device; And
Be used for comparison means that described biometric data and described verification biometric data are compared.
7. equipment as claimed in claim 6, wherein said facility are the fingerprint reading machines.
8. equipment as claimed in claim 6, wherein said reading device are smart card reading machine assemblies.
9. equipment as claimed in claim 6, wherein said reading device merge in computing machine, phone, EFTPOS terminal or the ATM terminal.
10. equipment as claimed in claim 9, wherein said reading device merges in the mobile phone.
11. as the equipment of claim 10, wherein said identity recognition device is contained in the SIM card of described mobile phone.
12. a method that is used for safe transfer data on telecommunication media, this method comprises:
A kind of conveyer is provided, is used for the individual that described data are concluded the business from hope is sent to and needs the described data of verification before can carrying out described transaction, to confirm a side of described data; And
A kind of confirmation device is provided, has the right to carry out described transaction to guarantee this people;
Wherein after having determined described people's correct identification, allow to carry out described transaction by the method that comprises the steps:
For described individuality provides exclusive sign, this exclusive sign comprises the biometric data of described individuality;
Utilizing encryption key is that described exclusive sign is encrypted, and described encryption key is determined by described biometric data;
Be provided for the identity recognition device that described individuality carries, this identity recognition device comprises described exclusive sign;
Reading device is provided, obtains the verification biometric data with the described identity recognition device of submitting to from the individual;
Determine encryption key from described verification biometric data;
Utilization is deciphered the described biometric data that comprises the described exclusive sign from the described encryption key that described verification biometric data obtains;
The biometric data of described verification biometric data and above-mentioned deciphering is compared;
Wherein when when consistent, thinking that described individual's identity is correct from the biometric data of the described individuality that comprises in described individual's described verification biometric data and the described exclusive sign.
13. as the method for claim 12, wherein said data are financial datas of this people.
14. as the method for claim 12 or 13, wherein said conveyer comprises the terminal away from a described side, described thus individual can provide described data to a described side, and this device comprises cellular phone or wireless data transmission lines.
15. a terminal of using in the method for the safe transfer data of claim 12, described terminal comprises:
Conveyer is sent to a described side with described individual's identity particulars; And
Being used for described individual utilizes the identity particulars that the facility of described individual's verification biometric data is provided.
16. as the terminal of claim 15, wherein said conveyer also comprises credit card or signs account draw-in groove assembly.
17. as the terminal of claim 15, wherein said facility comprises:
Deriving means is used for obtaining described verification biometric data from the individuality that described identity recognition device is provided;
Reading device is used to read described identity recognition device;
Decoding device is used for obtaining biometric data from described identity recognition device;
Comparison means is used for described biometric data and described verification biometric data are compared; And
Authenticate device is used to authenticate the transfer of described data.
18. as the terminal of claim 17, wherein said deriving means is the fingerprint reading machine.
19. as the terminal of claim 17, wherein said reading device is the draw-in groove assembly that is used for smart card, wherein said smart card comprises described biometric data.
20. as the terminal of claim 19, wherein said facility also comprises print-out device, is used to write down the hard copy that described data shift particulars with generation.
21. as the terminal of claim 20, wherein said print-out device is a printer, it and described facility become one or are separated.
22. as the terminal of claim 20, wherein said print-out device is arranged in the described draw-in groove assembly that is used for described smart card.
23. as the terminal of claim 22, wherein after finishing that data shift and take out described smart card from described draw-in groove assembly, when receipt entered described draw-in groove assembly, described print-out device was printed receipt.
24. as the terminal of claim 22, wherein after finishing that data shift and take out described smart card from described draw-in groove assembly, when described draw-in groove assembly takes out receipt, print head assembly is printed receipt.
25. as the terminal of claim 23 or 24, wherein said receipt be " scraps of paper of can tearing " form one, bigeminy or three receipts.
26. as the terminal of claim 23, the size of the size of wherein said receipt and credit card or label account card is suitable.
CNB018113540A 2000-04-20 2001-04-19 Secure biometric identification Expired - Fee Related CN1208737C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPQ7029A AUPQ702900A0 (en) 2000-04-20 2000-04-20 Secure biometric loop
AUPQ7029 2000-04-20

Publications (2)

Publication Number Publication Date
CN1441932A CN1441932A (en) 2003-09-10
CN1208737C true CN1208737C (en) 2005-06-29

Family

ID=3821121

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB018113540A Expired - Fee Related CN1208737C (en) 2000-04-20 2001-04-19 Secure biometric identification

Country Status (6)

Country Link
EP (1) EP1305749A4 (en)
CN (1) CN1208737C (en)
AU (1) AUPQ702900A0 (en)
HK (1) HK1058979A1 (en)
NZ (1) NZ522686A (en)
WO (1) WO2001090962A1 (en)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7239226B2 (en) 2001-07-10 2007-07-03 American Express Travel Related Services Company, Inc. System and method for payment using radio frequency identification in contact and contactless transactions
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US8429041B2 (en) 2003-05-09 2013-04-23 American Express Travel Related Services Company, Inc. Systems and methods for managing account information lifecycles
US8543423B2 (en) 2002-07-16 2013-09-24 American Express Travel Related Services Company, Inc. Method and apparatus for enrolling with multiple transaction environments
US7172112B2 (en) 2000-01-21 2007-02-06 American Express Travel Related Services Company, Inc. Public/private dual card system and method
AU2001243473A1 (en) 2000-03-07 2001-09-17 American Express Travel Related Services Company, Inc. System for facilitating a transaction
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US8635131B1 (en) 2001-07-10 2014-01-21 American Express Travel Related Services Company, Inc. System and method for managing a transaction protocol
US7925535B2 (en) 2001-07-10 2011-04-12 American Express Travel Related Services Company, Inc. System and method for securing RF transactions using a radio frequency identification device including a random number generator
US8538863B1 (en) 2001-07-10 2013-09-17 American Express Travel Related Services Company, Inc. System and method for facilitating a transaction using a revolving use account associated with a primary account
US7746215B1 (en) 2001-07-10 2010-06-29 Fred Bishop RF transactions using a wireless reader grid
US7762457B2 (en) 2001-07-10 2010-07-27 American Express Travel Related Services Company, Inc. System and method for dynamic fob synchronization and personalization
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US7827106B2 (en) 2001-07-10 2010-11-02 American Express Travel Related Services Company, Inc. System and method for manufacturing a punch-out RFID transaction device
US7996324B2 (en) 2001-07-10 2011-08-09 American Express Travel Related Services Company, Inc. Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia
US8960535B2 (en) 2001-07-10 2015-02-24 Iii Holdings 1, Llc Method and system for resource management and evaluation
US7493288B2 (en) 2001-07-10 2009-02-17 Xatra Fund Mx, Llc RF payment via a mobile device
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US7360689B2 (en) 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7119659B2 (en) 2001-07-10 2006-10-10 American Express Travel Related Services Company, Inc. Systems and methods for providing a RF transaction device for use in a private label transaction
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
EP1385117B1 (en) * 2002-05-30 2009-12-16 Activcard Ireland Limited Method and apparatus for transforming biometric data
US7274807B2 (en) 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for supporting a biometric registration performed on a card
US7400749B2 (en) 2002-07-08 2008-07-15 Activcard Ireland Limited Method and apparatus for supporting a biometric registration performed on an authentication server
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
CN1272519C (en) * 2004-09-22 2006-08-30 王锐勋 Instant clearing electronic lock system after key cipher use and realizing method
CN100511292C (en) * 2006-07-03 2009-07-08 上海交通大学 Electronic bank identification method, system and intelligent card adopting the method
JP2008107934A (en) * 2006-10-24 2008-05-08 Hitachi Omron Terminal Solutions Corp Bioinformation registration technology using automatic transaction device
CN101616416B (en) * 2009-07-24 2012-08-29 中兴通讯股份有限公司 Method and equipment for authenticating smart card of communication terminal
CN102289896A (en) * 2011-08-02 2011-12-21 彭琛 Method and system for automatically changing credit card
CN109325826A (en) * 2018-09-07 2019-02-12 山东中磁视讯股份有限公司 Shopping dispatching settlement method and system under a kind of constrained environment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5712912A (en) * 1995-07-28 1998-01-27 Mytec Technologies Inc. Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
US5995630A (en) * 1996-03-07 1999-11-30 Dew Engineering And Development Limited Biometric input with encryption
AUPO084896A0 (en) * 1996-07-05 1996-07-25 Dynamic Data Systems Pty Ltd Identification storage medium and system and method for providing access to authorised users
DE69736235D1 (en) * 1996-09-11 2006-08-10 Yang Li METHOD FOR APPLYING FINGERPRINTS FOR CERTIFYING WIRELESS COMMUNICATIONS
CA2285093C (en) * 1997-11-07 2007-05-15 Swisscom Ag Method, system and devices for authenticating persons
US6038666A (en) * 1997-12-22 2000-03-14 Trw Inc. Remote identity verification technique using a personal identification device
DE69815272T3 (en) * 1997-12-22 2007-12-27 Northrop Grumman Corp. (N.D.Ges.D.Staates Delaware), Los Angeles Fingerprint comparison controlled access to doors and machines

Also Published As

Publication number Publication date
WO2001090962A1 (en) 2001-11-29
AUPQ702900A0 (en) 2000-05-18
EP1305749A4 (en) 2006-04-19
CN1441932A (en) 2003-09-10
HK1058979A1 (en) 2004-06-11
NZ522686A (en) 2003-07-25
EP1305749A1 (en) 2003-05-02

Similar Documents

Publication Publication Date Title
CN1208737C (en) Secure biometric identification
US7789302B2 (en) Transfer of verification data
US9396506B2 (en) System providing an improved skimming resistance for an electronic identity document
CN101069187B (en) Secure cards and methods
US20060174134A1 (en) Secure steganographic biometric identification
US20070078780A1 (en) Bio-conversion system for banking and merchant markets
CN101095144A (en) Presentation instrument security arrangement and methods
CN1388946A (en) System and method for cardless secure credit transaction processing
WO2001008055A9 (en) Secure transaction and terminal therefor
CA2378662C (en) Document verification system
CN1152968A (en) Authentication technique
CN101059887A (en) A bank card number and the second magnetic track main account number creation method and reading method
CN101847186A (en) Anti-counterfeit and counterfeit distinguishing method of trace
CN1633665A (en) Method of sending and validating documents
AU2001255978B2 (en) Secure biometric identification
Paci Digital signature implementation on ID-1 cards as a personalization security feature
KR100558555B1 (en) Apparatus and method for issuing ic card
CN104599178A (en) Banking business credit authentication and anti-counterfeiting identification system based on graphic encoding
AU2001255978A1 (en) Secure biometric identification
ZA200200115B (en) Document verification system.
JP2005128797A (en) Imprint card issuing device, imprint card collation device and imprint card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1058979

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20050629