GB2273629A - Method for visual authentication by images transmitted over a telecommunication system - Google Patents
Method for visual authentication by images transmitted over a telecommunication system Download PDFInfo
- Publication number
- GB2273629A GB2273629A GB9324898A GB9324898A GB2273629A GB 2273629 A GB2273629 A GB 2273629A GB 9324898 A GB9324898 A GB 9324898A GB 9324898 A GB9324898 A GB 9324898A GB 2273629 A GB2273629 A GB 2273629A
- Authority
- GB
- United Kingdom
- Prior art keywords
- credit card
- merchant
- card number
- computer controlled
- visual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
- G06Q20/4037—Remote solvency checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/253—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
Abstract
A merchant transmits over a channel in a telecommunications system the credit card number of a person seeking to making a credit card purchase. The request is received by a database and utilized to locate a record corresponding to the credit card number. A visual image stored in the database which corresponds to the credit card number is transmitted to a visual display terminal at the merchant location to assist the merchant in authentication of the authority of the person presenting the credit card. <IMAGE>
Description
METHOD FOR VISUAL AUTHENTICATION BY IMAGES
TRANSMITTED OVER A TELECOMMUNICATION SYSTEM
Background of the Invention
This invention is generally directed to the process of verifying a person's identity or authority for a particular purpose. This invention is particularly, but not exclusively, suited for use in permitting a merchant to visually authenticate if a person requesting to charge a purchase to a credit card is authorized to utilize the corresponding credit card account.
Various types of encryption keys and secret passwords have been utilized to authenticate the authority of a person to obtain access to restricted information or locations. Encrypted messages may be transmitted over the public switched telephone network to a receiving party having a decrypting key allowing the receiving party to recover a corresponding plain text message. The use of encryption keys for authentication purposes require relatively sophisticated communication devices and system control in order to remain effective.
Authentication that a person is authorized to enter into a financial transaction in a business setting normally relies upon conventional practices. For example, a merchant desiring to authenticate a person's authority to make a credit card purchase may compare a signature on the back of a credit card to the signature of the person requesting such a purchase. Personal identification can be made by comparing a photograph disposed on a credit card or other identification such as a driver's license to the person seeking to make a credit card purchase. It is also known to utilize a personal identification number (PIN) as a password which may be required to be entered or given for a requested transaction to be processed, such as when utilizing an automatic teller machine.
The use of photographs for authentication is desirable for normal business use. However, enclosing photographs in a credit card is relatively expensive for the company issuing the credit card. The problem becomes even more difficult when a primary credit card applicant desires to have other persons authorized to utilize the same card. It is possible for a person seeking to defraud a merchant to tamper with a credit card or other identification so as to replace an existing photograph with the photograph of the person seeking to commit the fraud.
Thus, there exists a need for an improved method by which visual authentication can be made of persons seeking to gain access to restricted rights or accounts.
Summary of the Invention
It is an object of the present invention to provide an improved authentication method wherein an inquirer is automatically provided a visual image of the authorized user(s) associated with an identification data word such as a credit card number.
In accordance with an embodiment of the present invention, a merchant utilizes a point-of-sale terminal to transmit a credit card number via a communication channel to an authorization database. The database contains the validation status of each credit card number or account and a corresponding field(s) of pictures of authorized users of each credit card number. Upon processing a request for credit card validation and determining the credit card number to be valid, the database transmits the digitally stored picture(s) to a visual display terminal of the merchant preferably in combination with a confirmation number indicating
authorization to charge the account, thereby enabling the merchant to make a visual comparison to authenticate the authority of the person presenting the credit card.
Brief Description of the Drawing
FIG. 1 illustrates a pictorial representation of a telecommunications system, which in accordance with the present invention, can be utilized to provide visual authentication.
Detailed Description
FIG. 1 illustrates a system which incorporates an embodiment of the present invention. In the exemplary embodiment, a merchant or inquirer at location 10 has access to a credit card reader 12, a point-of-sale terminal 14 and a visual display terminal 16 which may comprise an AT & VideoPhone. The magnetic card reader 12 reads the account number typically embedded on a magnetic strip on the card as credit card 18 is passed through the reader. The account number is transmitted by reader 12 over data channel 20 to point-of-sale terminal 14. The video display terminal 16 is coupled by communication channel 22 with communication link 24 indirectly through point-of-sale terminal 14.
Communication channel 24 couples the point-of-sale terminal 14 and video display terminal 16 to a telephone central office 26. The central office 26 which may comprise an AT & 5MESS) switch, is connected to a switched network 28 by communication channel 30. The switch network 28 may comprise part of the public switched telephone network or a private communications network.
A service circuit node 32 such as available from AT & is coupled to switch network 28 by communication channel 34. The service circuit node 32 comprises a computer controlled peripheral to a switching network and is utilized to provide auxiliary services. A database 36 is coupled to the service circuit node 32 by communication channel 38. The database 36 in accordance with the preferred embodiment of the present invention comprises an independent computer controlled database in which data is stored in a nonvolatile storage memory such a computer disk drive.
In the illustrative embodiment, database 36 stores data in a format as shown in table 40 in which data is stored in different fields for each credit card number or account. The table consists of a matrix in which different credit card numbers are stored in column 42. Each row of the table contains information related to the corresponding credit card number. Column 44 is a validation field utilized to determine if the corresponding credit card number is valid. Column 46 contains the remaining credit reserve of the credit card account. Columns 44, 50, and 52 contain visual data VD1, VD2, and VD(N), respectively, which represent visual information for each credit card number. The visual data comprises digitized images such as pictures of authorized users which may be stored in a compressed data format in the table in order to conserve storage space.In the preferred embodiment of the present invention, it is contemplated that a picture of each authorized user will be stored in the visual data fields. However, other visual information such as images of the
signature of authorized users or fingerprints of authorized users could be utilized. As used herein, visual information means a pictorial representation of a feature or attribute of a person which can aid in identifying the person. It will be apparent that the information contained in table 40 must be collected for each credit card number in database 36 in order to be utilized for validation purposes discussed below. It will also be apparent that table 40 will need to be updated in order to maintain current and accurate data relating to each credit card number or account.
In accordance with an exemplary method of the present invention, visual information is provided by the telecommunications system to help a merchant or inquirer validate that the person requesting to make a credit card purchase is authorized. Although this example focuses on credit card usage and authentication of persons authorized, it will be apparent that the method in accordance with the present invention can be utilized to validate or authenticate persons requiring access to various benefits or locations in addition to the illustrative example.
Upon a customer's request for a credit card purchase, the merchant transmits an identification data word such as the credit card number via a telecommunications system to a database having credit card validation capability.
Typically, the merchant may utilize the credit card reader 12 to automatically read the credit card number from credit card 18 by passing the credit card through the reader. The credit card number is transmitted to a point-of-sale terminal 14 located at the merchant location 10. The point-of-sale terminal utilizing conventional modem technology transmits the request for validation including credit card number by channel 24 to a destination having validation capabilities. In the illustrative example the request is processed and passes through central office 26, switched network 28, and service circuit node 32 before reaching validation database 36.
Upon receiving the request for validation, database 36 initiates a search of column 42 of the data contained in table 40 to identify if a corresponding card number exists. If such a number is located, the validation data field 44 for the corresponding card is checked to determine if the card is valid. As an additional step the database may check the credit reserve data in column 46 to determine if
sufficient credit remains for the requested purchase where the amount of the purchase has been transmitted along with the credit card number. The database 36 also identifies corresponding visual data consisting of digitized pictures of authorized users which may be utilized to authenticate the authority of the credit card presenter.
Assuming that a corresponding card number was located by database 36 and determined to be valid, database 36 transmits a confirmation number authorizing the purchase through the same return path upon which the request was received. The point-of-sale terminal 14 accepts the received confirmation number as account authorization. Database 36 preferably also utilizes the same path to transmit corresponding visual data related to the credit card number as stored in table 40 to video display terminal 16. The video display terminal receives the visual data and displays the corresponding image or images upon its visual display screen at the merchant location 10.Preferably, the image is frozen on the screen either by the video display terminal or by the database repetitively sending the same visual data
The merchant can then make a visual comparison to determine if the person requesting the credit card purchase is an authorized user by comparing the presented picture of authorized person(s) to the person requesting credit card authorization. If the merchant determines that the credit card user matches a displayed picture, the merchant would then accept the requested credit card purchase with substantial assurance that the person utilizing the credit card is an authorized user.
Database 36 may either comprise part of the telecommunications system or may be maintained as a private database utilized by different issuers of credit cards. If a plurality of databases are utilized for different credit card issuers, the above example would proceed the same with the only difference being that the request would be routed to the appropriate database by the telecommunications system. In the illustrative embodiment the same database was utilized to perform the traditional credit card account/number validation utilizing columns 44 and 46, and to store the related visual data.However, a database that stores traditional account validation data may contain identification of individual authorized users such as by social security number or personal identification number which can be utilized as addresses for a separate database containing visual data corresponding to each user.
It will be apparent to those skilled in the art that the functions performed by the equipment utilized at the merchant location 10 may be performed by a single piece of equipment based on a personal computer in which communications over channel 24 are provided by a conventional modem and the visual data received from the database converted into pixel information displayed upon a connected monitor.
In accordance with the present invention a merchant or other inquirer having responsibility to validate a person's requested access to certain benefits or locations is provided with an improved means for making the authorization judgement. Visual images such as pictures provide a substantially higher degree of reliability for making the authorization determination than other means based upon indicia present upon the card presented by the requesting person. It is known that cards can be modified to change the intended validation indicia such as by substituting a different signature or inserting a different photograph than was originally present on the card. In accordance with the present invention the received image is outside of the control of a person who wrongfully acquires and attempts to utilize a credit card. Thus, the present invention provides a substantially improved authentication technique which should deter the stealing and attempted use of stolen credit cards because of the higher risk associated with wrongful attempted use.
Although an embodiment of the present invention has been illustrated and described herein, the scope of the invention is defined by the claims which follow.
Claims (7)
1. In a public switched telecommunications network (PSIN) having a computer controlled peripheral that facilitates auxiliary telecommunication services, the PSTN coupled to a plurality of point of sale merchants that process credit card transactions with customers, the merchants having means for transmitting a customer's credit card number and visual display equipment coupled to the PSTN, a method for providing authentication to a merchant of a customer's identity prior to acceptance by the merchant of a credit card transaction, the method comprising the steps of::
receiving at said computer controlled peripheral a customer's credit card number sent by a requesting merchant using said transmitting means;
said computer controlled peripheral using the received credit card number to locate a corresponding record in a database associated with the peripheral, said record including a stored visual image associated with the corresponding customer;
said computer controlled peripheral transmitting said visual image to the visual display equipment of the requesting merchant, whereby the merchant is given visual identification information to use in authentication of the customer.
2. The method according to claim 1 further comprising the step of determining if said credit card number is valid by checking validation data stored in a corresponding record stored in the database associated with said computer controlled peripheral.
3. The method according to claim 2 wherein said validation determining step comprises the step of using a validation field in the same record in which said visual image is stored for the same credit card number.
4. The method according to claim 2 further comprising the step of sending data from said computer controlled peripheral to the requesting merchant indicative of whether said credit card number is valid, said validity indicative data being sent automatically when said visual image is sent.
5. The method according to claim 1 further comprising the step of routing a transmission of a customer's credit card number from a requesting merchant to said computer controlled peripheral which is part of said PSTN so that processing is handled solely within said PSTN.
6. The method according to claim 1 wherein said visual image comprises a picture of one person authorized to use the associated credit card.
7. The method according to claim 6 wherein said visual image comprises a picture of each person authorized to use the associated credit card.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US99227892A | 1992-12-16 | 1992-12-16 |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9324898D0 GB9324898D0 (en) | 1994-01-19 |
GB2273629A true GB2273629A (en) | 1994-06-22 |
Family
ID=25538130
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9324898A Withdrawn GB2273629A (en) | 1992-12-16 | 1993-12-03 | Method for visual authentication by images transmitted over a telecommunication system |
Country Status (2)
Country | Link |
---|---|
CA (1) | CA2102464A1 (en) |
GB (1) | GB2273629A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19521901A1 (en) * | 1995-06-16 | 1996-12-19 | Sel Alcatel Ag | Communication system with speech controlled activation of services |
WO1997044761A1 (en) * | 1996-05-23 | 1997-11-27 | Ulrich Seng | Cashless payment method |
EP0824815A1 (en) * | 1995-05-08 | 1998-02-25 | Image Data, L.L.C. | Positive identification system and method |
WO1999026202A1 (en) * | 1997-11-19 | 1999-05-27 | Igor Viktorovich Maslov | Visual authorisation system for plastic payment cards |
WO2000007152A1 (en) * | 1998-07-28 | 2000-02-10 | Image Data, Llc | System and method of assessing the quality of an identification transaction using an identification quality score |
WO2001091060A1 (en) * | 2000-05-24 | 2001-11-29 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for buyer identification |
EP1172776A2 (en) * | 2000-07-15 | 2002-01-16 | ED Vision (Holdings) Limited | Interactive authentication process |
DE10043499A1 (en) * | 2000-09-01 | 2002-03-14 | Bosch Gmbh Robert | Data transmission method |
DE10043554A1 (en) * | 2000-09-01 | 2002-03-14 | Otfried Rumberg | Data network based identification procedure |
WO2002021469A2 (en) * | 2000-09-05 | 2002-03-14 | Ed Vision (Holdings) Limited | Interactive authentication process |
WO2002035410A2 (en) * | 2000-10-26 | 2002-05-02 | Midsouth Distributors (Proprietary) Limited | Verification system |
EP1195732A3 (en) * | 2000-10-02 | 2004-03-10 | Werner Brauweiler | Method and apparatus for customer oriented use of identification systems |
WO2006078265A2 (en) * | 2004-03-30 | 2006-07-27 | Geometrix | Efficient classification of three dimensional face models for human identification and other applications |
WO2008153503A1 (en) * | 2007-06-12 | 2008-12-18 | Tiang Fo Gerard Tan | A system for marking items, and a system to identify the marked items |
WO2010122497A1 (en) * | 2009-04-20 | 2010-10-28 | Capicol (Pty) Limited | A payment transaction processing and authorization system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1986007480A1 (en) * | 1985-06-11 | 1986-12-18 | Media Net Ltd. | Method and apparatus for preparing a check, money order or credit card |
EP0501697A2 (en) * | 1991-02-27 | 1992-09-02 | AT&T Corp. | Mediation of transactions by a communications system |
-
1993
- 1993-11-04 CA CA002102464A patent/CA2102464A1/en not_active Abandoned
- 1993-12-03 GB GB9324898A patent/GB2273629A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1986007480A1 (en) * | 1985-06-11 | 1986-12-18 | Media Net Ltd. | Method and apparatus for preparing a check, money order or credit card |
EP0501697A2 (en) * | 1991-02-27 | 1992-09-02 | AT&T Corp. | Mediation of transactions by a communications system |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0824815A1 (en) * | 1995-05-08 | 1998-02-25 | Image Data, L.L.C. | Positive identification system and method |
EP0824815A4 (en) * | 1995-05-08 | 1999-11-17 | Image Data L L C | Positive identification system and method |
DE19521901A1 (en) * | 1995-06-16 | 1996-12-19 | Sel Alcatel Ag | Communication system with speech controlled activation of services |
WO1997044761A1 (en) * | 1996-05-23 | 1997-11-27 | Ulrich Seng | Cashless payment method |
WO1999026202A1 (en) * | 1997-11-19 | 1999-05-27 | Igor Viktorovich Maslov | Visual authorisation system for plastic payment cards |
WO2000007152A1 (en) * | 1998-07-28 | 2000-02-10 | Image Data, Llc | System and method of assessing the quality of an identification transaction using an identification quality score |
WO2001091060A1 (en) * | 2000-05-24 | 2001-11-29 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for buyer identification |
US7644045B2 (en) | 2000-05-24 | 2010-01-05 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for buyer identification |
EP1172776A2 (en) * | 2000-07-15 | 2002-01-16 | ED Vision (Holdings) Limited | Interactive authentication process |
EP1172776A3 (en) * | 2000-07-15 | 2002-10-16 | ED Vision (Holdings) Limited | Interactive authentication process |
DE10043499A1 (en) * | 2000-09-01 | 2002-03-14 | Bosch Gmbh Robert | Data transmission method |
DE10043554A1 (en) * | 2000-09-01 | 2002-03-14 | Otfried Rumberg | Data network based identification procedure |
DE10043554C2 (en) * | 2000-09-01 | 2002-10-24 | Otfried Rumberg | Data network based identification procedure |
US7712139B2 (en) | 2000-09-01 | 2010-05-04 | Robert Bosch Gmbh | Data transmission method |
WO2002021469A2 (en) * | 2000-09-05 | 2002-03-14 | Ed Vision (Holdings) Limited | Interactive authentication process |
WO2002021469A3 (en) * | 2000-09-05 | 2002-11-28 | Ed Vision Holdings Ltd | Interactive authentication process |
EP1195732A3 (en) * | 2000-10-02 | 2004-03-10 | Werner Brauweiler | Method and apparatus for customer oriented use of identification systems |
WO2002035410A3 (en) * | 2000-10-26 | 2002-07-11 | Midsouth Distributors Propriet | Verification system |
WO2002035410A2 (en) * | 2000-10-26 | 2002-05-02 | Midsouth Distributors (Proprietary) Limited | Verification system |
WO2006078265A2 (en) * | 2004-03-30 | 2006-07-27 | Geometrix | Efficient classification of three dimensional face models for human identification and other applications |
WO2006078265A3 (en) * | 2004-03-30 | 2007-05-03 | Geometrix | Efficient classification of three dimensional face models for human identification and other applications |
WO2008153503A1 (en) * | 2007-06-12 | 2008-12-18 | Tiang Fo Gerard Tan | A system for marking items, and a system to identify the marked items |
WO2010122497A1 (en) * | 2009-04-20 | 2010-10-28 | Capicol (Pty) Limited | A payment transaction processing and authorization system and method |
Also Published As
Publication number | Publication date |
---|---|
GB9324898D0 (en) | 1994-01-19 |
CA2102464A1 (en) | 1994-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5615277A (en) | Tokenless security system for authorizing access to a secured computer system | |
CA2140803C (en) | Method of authenticating a terminal in a transaction execution system | |
US6282523B1 (en) | Method and apparatus for processing checks to reserve funds | |
US7269737B2 (en) | System and method for biometric authorization for financial transactions | |
US5341428A (en) | Multiple cross-check document verification system | |
KR100304774B1 (en) | Personal identification authenticating with fingerprint identification | |
AU2001252615B2 (en) | Method for attaching authentication bar code, authentication method, apparatus for attaching authentication bar code, authentication apparatus and portable terminal | |
US6036344A (en) | Secure check processing system and method | |
US6070141A (en) | System and method of assessing the quality of an identification transaction using an identificaion quality score | |
US7844550B2 (en) | Method and device for generating a single-use financial account number | |
US6760841B1 (en) | Methods and apparatus for securely conducting and authenticating transactions over unsecured communication channels | |
US7558407B2 (en) | Tokenless electronic transaction system | |
US6052675A (en) | Method and apparatus for preauthorizing credit card type transactions | |
US6985608B2 (en) | Tokenless electronic transaction system | |
US6556680B1 (en) | Method for authorization check | |
US7428987B2 (en) | Cashless vending system | |
US20100299259A1 (en) | Method and device for generating a single-use financial account number | |
US20030105725A1 (en) | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |
US20020147600A1 (en) | System and method for implementing financial transactions using biometric keyed data | |
KR19990008405A (en) | Active identification system and method | |
GB2273629A (en) | Method for visual authentication by images transmitted over a telecommunication system | |
EP0798657B1 (en) | Virtual shop computer network system which displays member shops and member shop certification method | |
US6912312B1 (en) | Credit card verification system and method | |
JP2005063077A (en) | Method and device for personal authentication and connector | |
US7690563B2 (en) | Transaction security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |