MXPA97008602A - System and posit identification method - Google Patents
System and posit identification methodInfo
- Publication number
- MXPA97008602A MXPA97008602A MXPA/A/1997/008602A MX9708602A MXPA97008602A MX PA97008602 A MXPA97008602 A MX PA97008602A MX 9708602 A MX9708602 A MX 9708602A MX PA97008602 A MXPA97008602 A MX PA97008602A
- Authority
- MX
- Mexico
- Prior art keywords
- database
- credit card
- information
- terminal
- digital photographic
- Prior art date
Links
Abstract
The present invention relates to a positive identity verification system comprising: a terminal verification point having means to accept information presented by a person to be positively identified at a verification point and means to present a digital photographic image of the persons, at least one remote database headquarters having a database stored comprising a plurality of digital photographic images of persons to be identified, a means of communication between the identification terminal point and the database remote to exchange information data between the two, a means to verify that the terminal verification point is authorized to access the remote database headquarters, and a means to verify that an identifying person at the terminal point of the verification has compared the digital photographic images presented in the middle of prese the physical appearance of the person identified at the terminal verification point and that exists between at least one digital photographic image and the physical appearance of the person to be identified a similarity or coincidence
Description
SYSTEM AND POSITIVE IDENTIFICATION METHOD DESCRIPTION OF THE INVENTION The present invention relates to the field of identity verification. Specifically, the invention is directed to a device and method for obtaining and presenting a digital image of a person associated with a particular event. More particularly, the method can be used to verify that the user of a credit card is in fact the owner of the card, although the device and method will be described in relation to such identification scenario based on a credit card, it should be understood that The invention is applicable to any situation, where positive identification is required, including banking transactions, distributions of goods, elections, arms sales and other situations required by law, health care, airline tickets, including the redemption of flights frequent and nationalization and immigration purposes. Positive identity verification is critical in many types of security transactions and procedures. For example, signatures, fingerprints, or face images are compared to establish identity, the creation of fraudulent identities or the misrepresentation in an individual identity, can result in fraudulent transactions and the breakdown of security systems . Currently such positive identification means as driver's licenses, picture identification cards, handwritten signatures, personal identification numbers, fingerprints, retinal fingerprints, voice impressions and other ways to unambiguously identify the characteristics are used. However, these methods of identity verification have one or more of the following characteristics: 1) they do not offer sufficient confidence for most positive personal identification applications; 2) the technology required for such a test is expensive for a total adoption by the industries; 3) do not offer ease of use, which is critical for most personal identification applications; 4) the technology required to do so on a broad scale is not yet mature enough to guarantee sufficient confidence; 5) the recurrent cost to use the technology is too high for most applications and personal identification; 6) the data used for identity identification is not maintained in a secure manner and is almost universal by the person who presents it as a form of verification, allowing the fraudulent alteration of the verification data; 7) the processes to build exact verification databases for wide use are not practical; 8) The verification process does not include sufficient steps to ensure that the person responsible for identity verification is trusted to ensure that identity verification is performed in an appropriate manner.
A system that is based on the positive verification of identity for transactions, is the credit and debt system and the credit card system. Cards are an increasingly popular means for consumers to make transactions; However, part of the costs incurred in the convenience of using credit cards is the gigantic growth of credit card fraud. Because there are millions of millions of dollars of credit card transactions every year, which depends on the fact that the person presenting the form of payment is really the person who has the legal right to use the credit, even a small one percentage of fraudulent transactions, results in trillions of dollars as a loss. The cost of fraud is paid indirectly by consumers in the form of higher payments and interest for the credit card, and also in part by merchants who accept such credit cards in the form of higher commissions for the transaction.
To combat fraud have been the use of holographic images on the cards, the need for a request for revalidation to obtain a transaction approval, the decoding of information on magnetic strips on the back of the card, as well as a signature verification . Several patents have been issued about methods and identification devices. Of particular note is the US patent granted to Ray and asoc. on June 14, 1994. Other references of the prior art are U.S. Patent Nos. 5,337,358 to Axelrod on August 9, 1994; No. 5,095,196 to Miyata on March 10, 1992; 5,259,025 to Monroe on November 2, 1993; 4,995,081 to Leighton on February 19, 1991; 4,991,205 to Le elson on February 5, 1991; 5,053,608 to Senanayake on October 1, 1991; 5,131,038 to Puhl on July 14, 1992; and 4,993,068 to Piosenka on February 12, 1991. As noted above, one of the shortcomings of all of these prior identification systems is that they are based in some way on information encoded in the credit card presented. Although some of the references include code algorithms, the fact remains that by giving access to the information to the users of the cards, this potentially has an investment engineering that overcomes even the most sophisticated means of enciphering. Lately, Citibank introduced a credit card with digital equality of the authorized user provided on the same card. As Ray's patent presents the photographic image on the Citibank card, it resulted in an initial drop in fraud in the New York market by 67%, however, as Ray explains, the Citibank photo card system , as other forms of identity verification that are distributed to the public will eventually be bounced by sophisticated counter action. An additional difficulty with most prior art verification methods is that they all require the use of a special credit card that incorporates some form of identification means. Thus, for its use to acquire a general acceptance, the replacement of the credit cards and the manufacturing equipment of the existing credit cards must be carried out. The present invention offers a number of advantages over prior art identity verification methods and systems, which overcome many of the limitations encountered in such prior art systems. The first and perhaps the most important advantage of the presented invention is that the positive identity verification system stores the verification data in a remote location, and therefore, does not give access to the criminals to the means of identity verification. . This is important because at any time a potential counterfeiter has access to the verification means, and then there is a possibility that the medium is corrupted, regardless of the level of sophistication incorporated in the system. A second advantage and also important in the presented invention is that the system is completely independent of the letters of credit whose users must positively identify the system. Thus, the presented invention does not require the modification or replacement of the existing credit cards, which would be an almost workable task. In addition, the segregation of the means of verification of the identity of the credit cards allows the system presented here to be used together with any credit card number. In addition, inexpensive disposable cameras and access to the driver license database maintained in all states, make the system and method implementation on a broad scale convenient and effective as regards cost. Finally, having an interface with the credit authorization agencies, resident in a remote database place, reduces the mechanical implementation needed at the verification point, as well as at the remote database sites, reducing the costs of the general verification service. Therefore, it is an object of the present invention to provide a system and method of positive identity verification to be used in conjunction with transactions that ensure the identity of persons, such as credit cards, but separating the means of identification. of the user of the credit card. Another object of the present invention is to provide a system and method for identity verification that is difficult to counterfeit. A further object is to provide a system and method for identity verification that includes a secure and accurate database of photographic images of individuals and other pertinent data such as digitized graphic representations of signatures that can be accessed for multiple uses of positive identification. Another object of the invention is to provide a system and method for identity verification that removes the form of identification from the credit card or the like, so that existing credit cards do not need to be replaced with an object. to apply the device and the method. Another object of the invention is to provide a system and method of positive verification that removes the requirement of personal signatures from credit cards or the like, so that the imitation of the signature is virtually impossible, when a credit card It is stolen and fraudulently used. Another object of the invention is to provide a system and method of identification that requires the effective activity by the person who verifies the physical characteristics of the person to be identified, by coupling the image of the person who is stored in the database. data of system images. Another object of the invention is to provide a method and system that is virtually unfaithful for positive verification of identity. These and other objects of the invention will be made apparent by the following description.
The present invention is a method and system for positively identifying individuals. The system comprises a terminal point of identity verification having a means for entering data presented by a particular individual, at least one database storage and a reference site having a plurality of unique digital image data stored. with respect to the persons to be identified and means to exchange data between the point of the verification terminal and the place or headquarters of the database. The headquarters of the database includes means to valorize that a point of a verification terminal seeks to exchange data with the authorized headquarters to do so. At the database headquarters, the system receives the information presented at the point of the verification terminal and searches the database to find the unique image data corresponding to the unique data. Then the system transmits the image data to the point of the verification terminal, where it is presented in a presentation medium. Finally, the system incorporates a means to verify that an identifier present at the verification point has adequately verified that the digital image presented in the presentation medium coincides with the physical information provided by the person to be identified at the point of the terminal. check. Fig. 1 is a block diagram of the point of the identity verification terminal showing the different components contained therein. Fig. 2 is a perspective view of the preferred embodiment of the point of the identity terminal that would be available for use in a place of sale or something similar. Fig. 3 is a block diagram of the components of the identity verification system and the communication flow path established between the verification point and remote storage of the database and reference center where there is a base of data of the photographic images of the persons that have to be identified, and to which one has access to transmit them to the verification point. Fig. 4 is an architectural drawing of the upper level system showing a number of storage and reference centers cross-linked through a global high-speed network. The present invention is a method and system for developing, maintaining and using an authentic and secure database of digital photographic images, signatures or other unique data of individuals for purposes of identity verification. The system includes a means to access the database, in a safe and cost-effective way, a means to allow verification of positive identity, and a database system up to date and that is a reference system that allows low cost of operation, ease of use, stability, and solidity for a large number of verification requests that originate from places distributed in the world. The present invention also includes a means for monitoring the user part of the system, which ensures that the system is used to its full potential. The system will be presented in particular reference to a point of sale system, where a credit card is presented by a consumer in order to make a purchase. Thus the system will make particular references to the credit card account numbers and the like. However, it is understood that identity verification by the system is adaptable to any application where the identification of a person is required. Such alternative applications include bank transactions and checks, arms sales, donation of food stamps and many other applications related to the well-being, elections, law enforcement, health care, airlines and fields of immigration and naturalization. Referring now to Figs., A positive identification system according to the present invention is presented. A terminal verification point 1, is located in a place where the identity of a person is required to be verified. The terminal verification point comprises a standard magnetic tape reader 4, an optional barcode reader 4 ', a confrontation scanner 4", all of which are known in the art, an input keyboard 5, a presentation medium or screen 6, which is preferably a miniature flat screen, a controller 7, and an internal communication modem or other communication medium 8. Although the data exchange rate may vary depending on the availability of quality telephone lines or other Data transmission means, such as a wide area network or a satellite communication link, the system can transmit data at a rate of at least 9,600 bauds per second (bps). However, data transmission quality means would allow exchange rates of 14,400 bps 28,800 bps even higher in bps. In a credit card transaction situation, the point of verification would be the point of sale, which typically incorporates a cash register and a credit card verification system of the prior art. Upon presentation of a standard credit card 2, the employee or other person responsible for the positive identification would place the credit card number at the terminal identification point 1. The preferred method of putting the credit card information would be to pass the card through the magnetic tape reader, which would be able to read the information on the credit card, which is usually coded on the magnetic strip on the back side of virtually all credit cards. In the alternative, if the data is corrupted, or routinely occurs due to wear or contact with a powerful magnetic field, the identifier will simply read the account number of the card, which is typically provided in embossed characters and would display the number of the card. credit in the terminal when the key 5. Another alternate means of putting the credit card information would be to use a code medium such as a bar code. In this embodiment the magnetic tape reader 4, would be replaced by a normal bar code reader to transfer its data to the code reader 4 'and to the controller 7. Another embodiment of the invention would include the confrontation scanner 4", which it would be used to explore the information of a standard personnel's account number, which would increase the system of an identity verification in a credit transaction; Debt to also verify transactions. In addition to the account information, the identifier could manually put other information needed to assist the identification process by means of the key 5. Such additional information could be either the person is male or female, in which case the key would incorporate a specific key to correspond to the man / woman selection 5 'or if the person is a dependent of the owner of the credit card, in which case the key would incorporate a specific key 5"to correspond to the dependent selection. the account number has entered terminal 3, the terminal will initiate communication through its internal communication means, which can be a modem or a wide area network (WAN) to one of several remote data storage sites 9 -11 using public telephone lines 12. Alternative forms of communication links are also considered, and include satellite communication, or means of communication. Dedicated network The current headquarters to which there is access would be a function of availability and charging on telephone lines, the availability of the network, reference capacity of the headquarters or other criteria of the availability of the system while the terminal initiates communication with a remote base data base. The communications will then be established with an entry / exit controller 13 at the remote site through a modem bank 14 at headquarters, controller 13 would then initiate an interrogation at terminal 3 to verify that the terminal has the appropriate authority to have Access to remote data headquarters and is a valid device. A simple and effective method of doing this interrogation is to use a commonly available call ID technology to ensure that the data request originated from an authorized telephone line. Additionally, a software key can be incorporated at each point of the identification terminal that will respond in a predetermined manner when interrogated by a remote base data storage location.
Once the controller 13 verifies that the identification terminal request point 3 is a valid device and has appropriate access privilege, the terminal may transmit a request for information which is also received by the input controller 6 OUTPUT 14, A THROUGH A HIGH-SPEED NETWORK 15. THIS NETWORK CAN BE AN ASYNCHRONOUS TRANSFER MODE (ATM) or any other effective high-speed network of adequate cost, the request for information is then taken to one of a number of data servers base 16-18 where the data contained in the credit card is processed. The selected server then has access to a series of high-confidence, high-speed disk arrays 19-23 and obtains the digital photograph or other image or other unique personal data associated with the data received by the base data server.
In addition to recovering the digital image or other personal data stored in the remote site, this remote site will be configured to allow the input and output controller 13 to initiate additional requests for information from the external information databases. Such scenario presented in the example of credit card processing, would be for the database headquarters to ask any of a number of credit authorization agencies (CAA), to verify that the credit card that is processed is valid, and is within the approved credit limit. An alternative modality would be to have the remote database storage and recovery headquarters located in one or more of the CAA locations. The identifier that would be the sales employee in a retail store, would only need to put the credit card information in a device and would receive both the verification of the credit approval and the identity from a single source. In this scenario, the input / output controller 13 would initiate a credit authorization request to a CAA 23, external via a modem bank 14, through public telephone lines 12, or through a WAN connection 14 ', or Similary. If the transaction amount is approved by CAA 23, the database site would receive the approval code from the CAA, and would retransmit the code to the verification terminal point along with the digital image information or other unique data to through your established communication link. The credit approval code would be presented either in the middle 6 of the terminal verification point or alternatively on a second presentation medium 6 '. The terminal identification point would then receive the information by the WAM 8 modem or connection, and send it to the controller 7, which would process the received information and present the digital image received on the presentation means 6. In one embodiment of the invention , the digital information would be stored in the remote database storage location, in a compressed state and would be transmitted to the terminal identification point in that compressed state, to minimize the time associated with a particular transaction. In this mode, the controller 7 would first decentralize the digital photographic information and present the information on the presentation means 6. Another embodiment of the invention that would be used for situations where the highest information security is required, the digital image information would be encrypted in addition to being compressed when transmitted to a terminal verification point. In this mode, the terminal controller 7 would require deciphering as well as deconcentrating the photographic information to allow it to be presented on the presentation means. The store clerk or other person responsible for the identity verification would visually compare the image presented in the presentation medium with the physical appearance or signature of the person presenting the credit card at the verification point. If there is a match, then the employee will apply a sequence of keys specified in the key 5 or keyboard 5, to indicate that the employee has really verified that the identity exists. The keyboard sequence would be unique to an individual employee, very similar to a personal identification number (PIN). The individual PIN would then be transmitted by the terminal verification point via the communication link to the remote storage of the database, and to the recovery location or site, where the PIN would be associated with the particular transaction that is made and stored for Recover at a later date, in case a dispute arises about itself or otherwise, a special credit card transaction was properly authorized, thus the use of a PIN type system, associated with each employee will give security resulting in a higher level of scrutiny, than a system that does not incorporate any characteristics to ensure personal responsibility. Other features that could be added to the basic system include the addition of the signature verification capability. Since the signatures as well as the photographs can be typed and transmitted on a standard communication medium, the verification of the signature would be a natural extension of the basic system. In this mode, a digital graphic representation of a signature would be transmitted to the point of terminal verification from the remote database headquarters, at the same time that the photographic data is transmitted. In this mode, the identifier could present, either the photographic image or the digital signature of the person on the presentation medium 6, in order to verify either one or both forms of digital information. In an alternative embodiment, the second display means 6 'would be used to present an authorized digitized form at the same time that a photographic image of an authorized user is presented in the presentation medium 6. This additional feature would allow the participants of the system to keep credit cards without signature. So if a criminal obtained a credit card, the card would not have a signature that the criminal could study and apprehend to imitate. This would be a level of security to the system, not found in the basic system. In another embodiment of the basic invention, a retrofit terminal is used to add to the positive identity verification, an existing point of authorization of the credit card in the devices and systems. The retrofit terminal will be designed to work in conjunction with the existing point of sale devices without the need to replace existing hardware systems in retail establishments. The retrofit terminal is added to the existing point of sale and consists of a modified driver, a presentation medium and a communication interface. Preferably, the presentation means is a miniature presentation of a flat panel similar to the type used in the terminal verification point described above. The presenter can be located in a space available in the box, or if the space is in a limited place, it can be mounted on a pedestal, the user terminal would be connected to a standard power source, and the authorization hardware is already existing credit card, through its internal communications interface in parallel or in series. The retrofit terminal will require the use of a modified driver, instead of accepting the credit card information from a magnetic strip reader, a barcode reader or a manual input as is the case with the standard point of purchase. the terminal verification, the feedback terminal would accept the information of the credit card from the existing authorization hardware, through its communication interface. Then, the retrofit terminal would initiate communications to a remote database headquarters in the same way previously, in order to recover and present identification data, such as photographs or signatures typed by authorized users of the credit card. However, unlike the standard point of the verification terminal, the identifier capacity would have to be provided using inputs provided by the identifier on the existing hardware to authorize the credit card, which would be to communicate the retrofit device via the communication interface . The retrofit terminal would then move the identifier-specific information to the remote site for storage. The retrofit terminal could also include an optional check scanner or an optional barcode reader to allow flexibility of use with other forms of payment, such as personal or company checks or the like.
Thus, the retrofit terminal would greatly reduce the cost per verification site, simplifying the installation of hardware at each verification site, and increase the viability and acceptability of a new positive identity verification system. Multiple remote data base and recovery storage centers would be linked through a global high-speed network 24-29. Data from any of the base data centers can be sent to any of the other centers through the network, in order to update the databases, preventing redundancy of data by performing an emergency backup monitor load and balance transactional Since the presented invention can be used without any substantial alteration of the present credit card system, as seen from the perspective of a credit card user, novel methods will be used to develop the digital database of the photographic image. One such means of compiling the database would be through the use of disposable cameras that will be sent to credit card users, indicating a desire to participate in the positive identity verification system. The means by which this type of photographic image would be obtained driven by itself to a high level of security and would take to a minimum the amount of fraud associated with the system. First, an individual who would like to participate in the system would send a request to the database provider.
As an alternative, a credit card provider could include an application in your shipment of the monthly invoice to all customers of the credit card. The request to participate would be in the form of a request that would include the participant's personal information, including name, address and existing credit card accounts, which the participant would like to use in conjunction with the positive identity verification system, the provider of the The database would indicate a unique code to each request and would send a disposable camera to the address placed on the request. The code would preferably have the form of a bar code that would be more easily read by machine in the database, in order to obtain a high degree of automation in the development of the database. Once the participant receives the camera from the database provider, he would follow the included directions and with the help of a friend or relative he would take a photograph with the camera. The camera would preferably have enough film to ensure that at least one photograph is acceptable to the participant and that it will be sent to the database provider.
However, to bring the cost associated with the provision of the cameras to a minimum, they would not necessarily include a film with 12 exposures, once the photograph is taken, the participant would send the camera to the database provider, the provider I would reveal the film and type in at least one of the participant's photographic images. The database provider would then relate the digital image to the participant data using the bar code or other identification means associated with the particular camera. In this way, it would be virtually impossible for a forger to defeat the system. Thus, by separating the fact of providing the information by the applicant from the fact of providing the photographic image of the applicant, the fraud would be reduced. However, even if a forger intercepted a camera, he would have to send his portrait to the data company, in order to defeat the system. This would not be an acceptable scenario, since the provider of the database would have an accurate image of the possible criminal, which could be provided to the appropriate authorities in case the fraud was perpetrated. An alternative form of the development of the database has been contemplated by the inventorIce
, and consists in the acquisition of digital photographic data already maintained by other identities. An alternative source of photographic data is by the motor vehicle departments (DMV), of the different states of the United States, at present all states give drivers lses to residents that not only include certain biographical data of the drivers, such such as name, address, date of birth, social security number, and the like but also include a photograph of the individual to whom the lse is issued. The DMV, retain for use all the biographical data of the lses including a duplicate of the photograph that appears on the lse of the driver. These photographs maintained by the different DMV can be typed using a digital explorer of known technology in a format compatible with the positive identity identification system. Verifying the accuracy of these DMV photographs would require a slightly different procedure than that previously described to obtain digital photographic data using a disposable or rather returnable camera technology. In the DMV scenario, the database provider would obtain and store the entire photographic database of a particular state in a separate, state-specific database. The database provider or any card company could send participation requests to individuals residing in a state whose DMV database would have been included in the provider's master database. Upon receipt of a request for participation, the database provider would send a digital photograph of the requesting individual to verify that the requesting party with a return form to indicate that the photograph is an accurate representation of the appearance of the requesting party. Once the database provider had received confirmation of the accuracy of the photograph, it would transfer the specific photo from the state-specific source database to the general database. The same scenario would work with digital representations of signatures. Several changes come within the spirit of the invention that suggest themselves to the technicians, therefore, the present embodiment is only an example of embodiment, since there are multiple changes and modifications without departing from the spirit and scope of the present invention.
Claims (17)
- R E I V I N D I C A C I O N S 1.- A positive identity verification system comprising: a terminal verification point that has means to accept information presented by a person to be positively identified in a verification point and means to present a digital photographic image of the persons; at least one remote database site having a database that comprises a plurality of digital photographic images of persons to be identified; a means of communication between the point of the identification terminal and the remote database to exchange information data between the two; a means to verify that the terminal verification point is authorized to have access to the remote database headquarters; and a means to verify that an identifying person at the terminal point of the verification has compared the digital photographic images presented in the presentation medium with the physical appearance of the person identified at the terminal verification point and that exists between when less a digital photographic image and the physical appearance of the person to be identified as a similarity or coincidence.
- 2. - Positive identity verification system according to claim 1, wherein the means to verify that the identifier present at the terminal verification point has compared and verified that the identifying information matches the physical appearance of the person to be identified and that it is a unique personal identification number for that identifier that is put into the terminal verification point using an introduction means.
- 3. Positive identity verification system, according to claim 2, characterized in that the input means is a multi-functional key pad.
- 4. Positive identity verification system according to claim 1, wherein the verification means is a standard call identification means.
- 5. System according to claim 1, wherein the means of verification is a software key communicated by the terminal verification point to the database headquarters, to unlock the database headquarters and have access.
- 6. System according to claim 1, wherein the communication means comprises a modem checkpoint that communicates with a modem located in one of the database sites through a data flow path.
- 7. The system according to claim 6, wherein the data flow path comprises telephone lines of public access.
- 8. System according to claim 6, wherein the data flow path is a network dedicated to a wide area.
- 9. System according to claim 6, wherein the data flow path is a link in a communication satellite.
- 10. A positive identity verification system, to be used when verifying that a person presenting a credit card is the owner of that card, comprising: a terminal verification point that includes a means to accept information presented by the person information associated with a credit card account; a remote database storage and recovery headquarters, to store, retrieve, process and transmit digital photographic images, those images are stored in that remote database headquarters, and each of the images stored in the base headquarters Remote data is associated with at least one credit card account and will correspond to at least one authorized user of the credit card; a means of communication between the terminal verification point and the remote database site; a means to verify that the terminal verification point is authorized to access the information stored in the remote database headquarters; a means to transmit the information pointed to the remote database headquarters; a means to recover one or more of the digital photographic images associated with the credit card account; a means for presenting at least one digital photographic image at the terminal verification point; and a means for entering information at the terminal verification point to indicate that an identifier at the terminal verification point has visually verified that at least one of the digital photographic images presented in the presentation medium is adapted to the physical appearance of the person who presents the credit card.
- 11. The system according to claim 10, wherein the means for accepting the information of the credit card, is a magnetic strip reader for reading a standard magnetic strip associated with a credit card, containing the strip information of the credit card account.
- 12. The system according to claim 10, wherein the means for accepting the credit card information is a bar code reader for reading a barcode associated with a credit card, containing the credit code. bars the information of the credit card.
- 13. - The system according to claim 10, wherein the means for accepting the information of the credit card is a multifunctional key pad.
- 14. A positive identity verification system to ensure that a person presenting a credit card is authorized to use the credit card comprising: half credit card reader to be used by a sales employee to accept the information of the credit card. credit card, being located the reader of the credit card in a point of sale and verification of identity; a remote database means for storing digital photographic images of individuals, each of the digital photographic images being associated with specific information of the credit card account; means for communication between the credit card reader and the remote database means for transmitting the credit card information from the card reader to the database medium and for transmitting the digital photographic images associated with the card. means of storage of the database with the information transmitted to the card reader; a means to verify that the credit card reader is authorized to have access to the remote database headquarters; means for presenting the digital photographic images received at the verification point for visual observation by the sales employee, by comparison with the physical appearance of the person present at the identity verification point; and a means of the user to accept an entry from the sales employee indicating that at least one of the digital photographic images presented in the presenter is compared and is in accordance with the physical appearance of the person presenting the credit card.
- 15. A positive identity verification system comprising: a data base storage and recovery location remote from an identity verification point, the database stores digital photographic images corresponding to a plurality of persons who have to positively identify each one of the digital photographic images corresponds to a person who has to be identified and also corresponds to at least one unit of information presented by the person to be identified; a means to establish communication between the headquarters of the database and the verification point, the communication means being able to accept and transmit the information unit presented to the database headquarters; a search means to search the database by finding each one of the digital photographic images corresponding to the information unit presented and received by the database; a means for transmitting each of the digital photographic images to the verification point; a means at the verification point to present each of the digital photographic images transmitted to the verification point from the database headquarters; a means to verify that an identifier present at the terminal verification point has compared the digital photographic images presented in the presentation medium with the physical appearance of the person who is being identified at the terminal verification point, and that there is a coincidence between both; a means to verify that the medium at the verification point to present each of the digital photographic images is authorized to have access to the remote database headquarters.
- 16. A positive identity verification method comprising the steps of: introducing a first unit of information presented by a person to be positively identified at a terminal verification point; establishing communication between the terminal verification point and a remote database headquarters, which has a database that comprises a plurality of digital photographic images, and at least one of the digital photographic images corresponding to the first unit of data stored therein. information entered at the terminal verification point; verify that the terminal verification point is authorized to access the remote database headquarters; transmitting the first information unit to the remote database headquarters through a means of communication; recover at least one of the digital photographic images corresponding to the first information unit transmitted to the base data base; transmitting at least one of the digital photographic images through the communication medium to the terminal verification point; presenting at least one of the digital photographic images received from the database eede on the presentation medium located at an identity verification point; compare the presented digital photographic image with the physical appearance of the person present at the verification point; enter specific data of the identifier at the terminal verification point to indicate that the identifier has compared the digital images presented with the physical appearance of the person present and that the physical appearance of the person coincides with when one of the presented digital photographic images is displayed; and transmit and store the identifier-specific data in a remote database site for reminder in case a positive identification transaction is challenged at a later date.
- 17. Method of verification of positive identity according to claim 16, wherein the first information unit is a credit card account number. RES UME N The system comprises a personal verification terminal point that has a means to enter data (4, 4 ', 4") presented by a particular individual, at least one data base storage and recovery site that has stored a plurality of unique digital image data for persons to be identified, and means for exchanging data between the terminal verification point and the database headquarters.The database headquarters comprises means to verify that a checkpoint The terminal is authorized to change data with the headquarters, the system then transmits the image data to the terminal verification point where it is presented on a presentation medium 16. The system incorporates a means to verify (5) that an identifier present at the terminal verification point has properly verified that the digital image presented in the presentation medium matches the physical information provided by the person to be identified at the terminal verification point.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US08436146 | 1995-05-08 | ||
| US08/436,146 US5657389A (en) | 1995-05-08 | 1995-05-08 | Positive identification system and method |
| PCT/US1996/006425 WO1996036148A1 (en) | 1995-05-08 | 1996-05-08 | Positive identification system and method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| MX9708602A MX9708602A (en) | 1998-07-31 |
| MXPA97008602A true MXPA97008602A (en) | 1998-11-09 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5657389A (en) | Positive identification system and method | |
| US6040783A (en) | System and method for remote, wireless positive identity verification | |
| US6070141A (en) | System and method of assessing the quality of an identification transaction using an identificaion quality score | |
| US6202055B1 (en) | Positive identification display device and scanner for low cost collection and display of graphic and text data in a secure manner | |
| US20020138351A1 (en) | Positive identification system and method | |
| US5673320A (en) | Method and apparatus for image-based validations of printed documents | |
| US5457747A (en) | Anti-fraud verification system using a data card | |
| US6424249B1 (en) | Positive identity verification system and method including biometric user authentication | |
| US5983207A (en) | Electronic cash eliminating payment risk | |
| US5436970A (en) | Method and apparatus for transaction card verification | |
| US6016480A (en) | Merchandise return fraud prevention system and method | |
| EP0032193B1 (en) | Communication apparatus | |
| JP2889486B2 (en) | Credit card verification system | |
| US5341428A (en) | Multiple cross-check document verification system | |
| US6669086B2 (en) | Self service check cashing system and method | |
| US20110196753A1 (en) | System and method for immediate issuance of an activated prepaid card with improved security measures | |
| US20020147600A1 (en) | System and method for implementing financial transactions using biometric keyed data | |
| US6220515B1 (en) | Identification system and method | |
| MX2013002228A (en) | Authorization of cash delivery. | |
| WO2009055178A1 (en) | Systems and methods for verifying identities | |
| US20030004842A1 (en) | Cardless globility database | |
| JP2003099691A (en) | User matching settlement method and system, matching server and settlement device | |
| US20080040779A1 (en) | System and method for identification verification | |
| MXPA97008602A (en) | System and posit identification method | |
| GB2329271A (en) | Means for preventing fraud |