[go: up one dir, main page]

HK1010961A - Positive identification system and method - Google Patents

Positive identification system and method Download PDF

Info

Publication number
HK1010961A
HK1010961A HK98112048.0A HK98112048A HK1010961A HK 1010961 A HK1010961 A HK 1010961A HK 98112048 A HK98112048 A HK 98112048A HK 1010961 A HK1010961 A HK 1010961A
Authority
HK
Hong Kong
Prior art keywords
information
credit card
authentication
verification
database
Prior art date
Application number
HK98112048.0A
Other languages
Chinese (zh)
Inventor
罗伯特‧C‧乌韦纳
Original Assignee
图象数据公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 图象数据公司 filed Critical 图象数据公司
Publication of HK1010961A publication Critical patent/HK1010961A/en

Links

Description

Reliable identification system and method
The present invention relates to the field of identity verification. In particular, the present invention is directed to an apparatus and method for capturing and displaying digital images of individuals associated with a particular event. More particularly, the apparatus and method can be used to verify that the user of the credit card is in fact the card owner. Although the apparatus and method will be described herein in relation to such a credit card identification based scenario, it is to be understood that the present invention is applicable to any situation requiring reliable authentication, including banking, welfare distribution, election, weapon sale and other legal related situations, health care, airline tickets containing frequent flight reimbursements, and immigration and national change transactions.
Reliable identity verification is critical in many types of transactions and security procedures. For example, signatures, fingerprints, or facial images are compared to prove identity. Making false representations of fraudulent identities or personal identities can lead to fraudulent transactions and breaches of security systems. Such reliable identification devices are used today as driver licenses, photo identification cards, handwritten signatures, personal identification numbers, fingerprints, retinal scans, voice sonographers and other methods for specifically identifying personal traits. These prior art authentication techniques exhibit one or more of the following characteristics: 1) they do not provide sufficient reliability for most reliable personal identification applications; 2) the processes required to achieve them, such as large-scale adoption for the entire industry, can be too expensive; 3) they are not easy to apply, which is crucial for most applications of personal authentication: 4) the techniques required to achieve them on a large scale are not yet mature enough to guarantee sufficient reliability; 5) the repetition cost of using this process technology is too high for most personal verification applications; 6) the data used for authentication cannot be kept in a secure and reliable manner but is almost universally held by the person who provides it as a form of identification, thus providing the possibility of fraudulently altering this authentication data; 7) it is impractical to establish a correct validation database for large-scale applications; and 8) the authentication process does not contain sufficient steps to ensure that the individual responsible for the authentication can ensure that the identification can be performed correctly.
One system that relies on reliable authentication of transactions is the credit/payment (credit/debit) and debit card system. Credit cards are used as an increasingly popular means for users to complete transactions. But part of the cost caused by the convenience of applying credit cards is the high rate of credit card fraud. Because credit card transactions are conducted annually in the billions of dollars, even a small percentage of fraudulent transactions result in millions of dollars of losses, depending on the fact that the person making the payment is actually the one who has the legitimate right to use the primary account number. The cost of such fraud is paid indirectly by the consumer at higher credit card rates and commission rates and in part by merchants receiving such credits at higher transaction commissions.
The method for combating fraud is to use a hologram on the card, confirm that the requestor needs to obtain proof of transaction, encode cardholder information on a magnetic strip on the back of the card, and verify the signature. A number of patents have been issued relating to identification devices and methods. Of particular note is U.S. patent No.5321751 issued to Ray et al on day 6, month 14, 1994. Other prior art to which reference is made is US patent No.533735 to Axelrod et al at 9.8.1994, US patent No.5095196 to Miyata at 10.3.1992, US patent No.5259025 to Monroe et al at 2.11.2.1993, US patent No.4995081 to Leighton et al at 2.19.1991, US patent No.4991205 to Lemelson at 5.2.1991, US patent No.5053608 to Senayake at 10.1.1991, US patent No.5131038 to Puhl et al at 14.7.14.1992, and US patent No.4993068 to Piosenka et al at 12.2.12.1991. As noted above, one of the fundamental drawbacks of all of these identification technology identification systems is that they all rely in some way on the encoded information on the submitted usage card. Despite the inclusion of sophisticated encryption algorithms in some of the above referenced technologies, the reality is that the reverse design and overcoming of even the most sophisticated encryption measures is given the potential only to give the card user access to the information.
Recently, Citibank introduced a credit card with a digital photograph of the legitimate user placed on the card itself. Photographic images on Citibank cards, as disclosed in the Ray patent, resulted in fraud in the new york trial market being initially reduced by as much as 67%. However, also as Ray states, the Citibank photo card system, like other authentication means assigned to the public, will eventually defeat sophisticated counterfeiting.
Yet another difficulty with most prior art authentication methods is that they all require the use of special credit cards incorporating some form of authentication means. Thus, existing credit cards and credit card manufacturing equipment must be replaced in order to gain widespread acceptance of their use
The disclosed invention provides many advances over prior art authentication systems and methods, overcoming many of the limitations found in these prior systems. First, perhaps the most important advantage of the disclosed invention is that the reliable authentication system stores authentication data remotely, thus not exposing criminals to the authentication media. The significance of this is that whenever a potential counterfeiter is given the opportunity to come into contact with the verification media, there is a chance that the media will be tampered with, regardless of the level of security measures incorporated into the system. Secondly, it is also an important advantage of the disclosed invention that the system is completely independent of the credit card of the user for which the system is designed to reliably identify. The disclosed invention thus eliminates the need to modify or replace existing credit cards, which originally were a task that was not surmountable by several hands. Moreover, the separation of the identity card medium from the credit card itself enables the system disclosed herein to be used in conjunction with any number of credit cards.
In addition, the low cost, disposable cameras and access to the database of driver licenses maintained by all states make wide scale implementation of the system and method convenient and cost effective. Finally, having an interface to a credit authority located at a remote database site reduces the hardware required at the point of validation as well as at the remote database site, thereby reducing the cost of the overall validation service.
It is therefore an object of the present invention to provide a system and method for reliable authentication that separates the identification medium from the credit card user for use in connection with transactions where ensuring the identity of an individual is important, such as credit card transactions.
It is another object of the present invention to provide a reliable authentication system and method that is difficult to counterfeit.
It is a further object of the present invention to provide a system and method for reliable identity verification that includes a secure and accurate database of photographic images of individuals and other related data, such as digitized image representations of signatures, that can be accessed for multiple reliable identification applications.
It is a further object of the present invention to provide a reliable authentication system and method that eliminates forms of identification from credit cards and the like so that existing credit cards do not need to be replaced in order to implement such an apparatus and method.
It is a further object of the present invention to provide a reliable identity verification system and method that removes personal signatures from credit cards and the like so that it is virtually impossible to forge the signature when the credit card is stolen and used fraudulently.
It is another object of the present invention to provide a system and method for providing a reliable authentication that requires verification that the individual's actual identity to the person to be identified is in charge of the identity of the individual stored in the image database of the system.
It is a further object of this invention to provide a reliable authentication system and method that is virtually impossible to counterfeit.
These and other objects of the disclosed invention will become apparent from the following description.
The present invention is a system and method for reliably verifying the identity of an individual. The system includes an authentication terminal having means for inputting data given by a particular person, at least one database storage and retrieval location in which a plurality of digital image data unique to the person to be authenticated is stored, and means for exchanging data between the authentication terminal and the database location. The database location includes means for verifying that the authentication end point seeks to exchange data with the location is authorized. At the database site, the system receives information given at the verification terminal point and searches the database for unique image data corresponding to the unique data. The system then transmits the image data to the verification terminal where it is displayed on a display device. Finally, the system is provided with a means for verifying that the authenticator at the verification site has properly verified that the digital photograph displayed on the display device corresponds to the actual information provided by the individual to be identified at the verification terminal site.
Fig. 1 is a block diagram illustrating an authentication terminal point of the various components contained therein.
Fig. 2 is a perspective projection view of a preferred embodiment of an identification terminal point that may be used for point of sale or the like.
Fig. 3 is a block diagram of the components of the positive authentication system and the communication channel established between the authentication point and a remote database storage and retrieval center, which is a comprehensive database of photographic images of persons to be identified maintained and accessed for transmission to the authentication point.
FIG. 4 is a high level system diagram showing a plurality of data storage and retrieval centers networked over a global high speed network.
The present invention is a system and method for developing, maintaining and applying a secure and authentic database of digital photographic images, signatures or other data unique to an individual for the purpose of reliable identity verification. The system comprises: the system includes means for accessing the database in a secure and cost-effective manner, means for performing reliable authentication, and a distributed database update and retrieval system that enables cost-effective, easy-to-use, robust, and robust execution of a large number of authentication requests from locations around the world. The invention also comprises means for being responsible for the user part of the system and thereby ensuring that the system can be used to its maximum potential.
The present system will be described herein with particular reference to a point of sale system at a location where a consumer or provider provides a credit card for a purchase. The system will thus be specifically concerned with credit card account numbers and the like. It should be understood that the reliable authentication system disclosed herein may be applicable to any application requiring reliable authentication of an individual. Such other possible applications include checks and banking, weapons sales, food marking reimbursements and many other applications relating to benefits, elections, law enforcement, health care, aviation, immigration and national areas.
Reference is now made to the authenticity verification system in accordance with the present invention as illustrated in the figures. The authentication terminal 1 is located at a place where the identity of a person needs to be authenticated at present. This authentication end point includes: a standard magnetic stripe reader 4, any barcode reader 4', a check scanner 4 ", as are well known in the art, an input keyboard 5, a display device 6, preferably a miniature flat panel display, a controller 7, and an internal communication modem or other communication device 8. Although the data exchange rate may vary with the available advanced telephone lines or other data transfer devices, such as a private wide area network or satellite communication link, the system will transfer data at a rate of at least 9600 bps. But a good quality data transfer medium will enable data exchange at rates of 14400bps, 28800bps or even higher.
In the case of credit card transactions, the point of authentication will typically be the point of sale, which typically incorporates a cash register and a prior art credit card authentication system. After presenting the standard credit card 2, a store employee or other person responsible for reliable verification enters a credit card account number into the identification terminal point 1. The preferred method of entering credit card information is by scanning the credit card through a standard magnetic stripe reader 4, which is capable of reading credit card account information that is currently encoded on the magnetic stripe on the back side of virtually all cards used. In the method that may be used, if the magnetic strip containing the account data is contaminated, which often occurs due to wear or exposure to a strong magnetic field, the verifier will simply read the credit card account number, which is typically provided in embossed characters, and enter the credit card account number into the verification terminal using the keyboard 5. An alternative means of entering credit card account information into the verification terminal is to use encoded media such as bar codes. In this embodiment, the magnetic stripe reader 4 is replaced with a standard bar code reader to transmit its data to the code reader 4' and to the controller 7. Another embodiment of the present invention comprises a check scanner 4 "that is used to scan the checking account information of standard personal or business checks, which extends the functionality of the system from credit/payment card transaction authentication to checking related transactions.
In addition to the credit card account information, the authenticator may manually enter any other information necessary for assistance during the authentication process via the keypad 5. Such additional information may be whether the presenter is male or female, in which case the keypad may incorporate a special key to correspond to the male/female selection 5'; or whether the bearer is a home-based choice of credit card owner, in which case the keypad will incorporate a special key 5 "to correspond to the home-based choice.
Once the account number is entered into the authentication terminal point 3, the terminal will commence communication via its internal communication means, which may be a modem or Wide Area Network (WAN) device using the public telephone line 12 to one of the plurality of remote database storage locations 9-11. Other possible forms of communication connections are also contemplated, including satellite communications or dedicated network devices. The actual visited site will vary with the availability and loading of the public access telephone line, network availability, retrieved site availability or other system availability criteria at the time the terminal initiates communication with a remote database site. Communication with the input/output controller 13 of a remote database storage site is then established via the modem bank 14 of the database storage site, and the controller 13 initiates an inquiry to the verification terminal 3 to verify that the terminal has the proper authorization to access the remote database site and is a valid device. A simple and cost effective way to perform such a query is to use commonly available caller ID technology to ensure that the request for data has been made from an authorized telephone line. In addition, a software key may be incorporated into each authentication endpoint that will respond in a predetermined manner when queried by a remote database storage location.
Once the controller 13 has verified that the requesting identified the terminal 3 as a valid device and has the appropriate access permission, the terminal will be allowed to send a request for information to the database storage location. This information request is also received by the input/output controller 14 over the high-speed network 15. The high speed network may be a Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM), or any other suitable cost-effective high speed network. The request for information is then transmitted to one of a plurality of database servers 16-18 that process credit card account data. The selected server then accesses a set of high speed, high reliability disk arrays 19-23 and retrieves digital photographs or other images or other unique personal data associated with the account data received by the database server.
In addition to retrieving digital images or other unique personal data stored at a remote database location, the database location will be configured to enable the input/output controller 13 to initiate additional information requests from an external information database. One such scenario contemplated in this example of credit card processing is where the database location queries one of a plurality of existing credit authorities (CAAs) to verify that the credit card account being processed is valid and within its pre-approved credit limits. Another possible embodiment is to co-locate remote database storage and retrieval sites at one or more CAA sites.
An appraiser, typically a salesperson in a retail establishment, need only enter credit card information into one device and receive credit approval and identity verification from a single source. In this case, the input/output controller 13 initiates a credit authorization request to the external CAA23 through the modem bank 14 on the public access telephone line 12 or through the WAN connection 14', etc. If the transaction amount is approved for CAA23, the database site will receive the credit approval code from the CAA and resend this code to the verification end point through its established communication link, along with the digital image information or other unique data. This credit approval code will be displayed on the display means 6 of the verification terminal point or, alternatively, on any second display means 6.
The authentication terminal point then receives the information via the modem or WAN connection 8 and transmits it to the controller 7, the processor 7 processing the received information and displaying the received digital image on any of the display devices 6. In one embodiment of the invention, digital information is stored in a compressed state at a remote database storage location and transmitted in a compressed state to an authentication endpoint so that the time associated with a particular transaction is minimized. In this embodiment, the controller 7 first decompresses the digital photographic information and then displays this information on the display device 6.
Another embodiment of the present invention is used in situations where the highest security of information is required, the digital image information being sent to the authentication endpoint while being encrypted in addition to being compressed. In this embodiment, the terminal controller 7 is required to decompress the photographic information while decrypting it, in order to enable the information to be displayed on the display device.
The salesperson or other person responsible for the authentication visually compares the image displayed on the display device with the actual image or signature of the person presenting the credit card at the point of authentication. If so, the salesperson enters a designated key sequence on the input keyboard indicating that the salesperson has actually verified identity. This keying sequence is unique to a salesperson as a plurality of Personal Identification Numbers (PINs). The individual PIN is then transmitted by the verification terminal to a remote database storage and retrieval location via a communications link. Where the PIN is associated with the particular transaction being completed and stored for later retrieval when doubt is raised as to whether a particular credit card transaction has been properly approved. Thus, the use of a PIN-type system associated with each store employee will provide accountability and a higher level of detailed review than systems that do not employ any features to ensure personal accountability.
Other features that may be added to this basic system include the addition of signature verification capabilities. Signature verification is a natural extension of this basic system, since like photographs, signatures can also be digitized and transmitted over standard communication media. In this embodiment, the digital graphical representation of the signature is sent from the remote database location to the verification endpoint at the same time that the photograph data is transferred. In this embodiment, the authenticating person can display a photographic image of the person presenting the credit card or a digital signature thereof on the display device 6 to verify one or both forms of digital information. In another possible embodiment the second display means 6 is used to display a legal digital signature at the same time as a photo image of an authorised user is displayed on the display means 6. This additional feature allows participants of the system to retain unsigned credit cards. Thus, if a criminal gets a credit card, the card will not have a signature for the criminal to learn and possibly imitate. This adds a further layer of security to the system than does the basic system.
In another embodiment of this basic invention, a retrofit terminal is employed to add positive authentication to existing point of sale credit card authorization devices and systems. The retrofit terminal is designed to work in conjunction with existing point of sale devices without replacing the currently existing retail enterprise hardware systems.
The retrofit terminal is added to an existing point of sale and consists of a modified controller, display device, and communication interface. Preferably, the display device is a miniature flat panel display, similar to the type used in the authentication endpoint described above. The display may be positioned in the space of the available calculator or it may be mounted on a stand or the like if the space is at a premium. The retrofit terminal is connected to a standard power supply and to existing credit card approval hardware via its internal serial or parallel communication interface.
This retrofit terminal requires the use of a modified controller. Instead of receiving credit card account information from a magnetic stripe reader, bar code reader, or manual input as is the case with standard authentication terminal points, this retrofit terminal receives credit card account information from existing credit card approval hardware through its communication interface. This retrofit terminal then initiates communication to a remote database location in the same manner as previously described to retrieve and display identification data, such as a digitized photograph or signature of an authorized credit card user. Unlike standard authentication terminals, however, the authenticator's accountability must be provided using input by the authenticator on existing credit card approval hardware, which is connected to the retrofit terminal through a communications interface. The retrofit terminal then sends the person-specific information to the remote database location for storage. The retrofit terminal may also include an optional check scanner or optional bar code reader to provide flexibility in the use of other forms of payment such as personal or corporate checks and the like
In this way, this retrofit terminal will greatly reduce the cost of each authentication site, simplify the installation of hardware at each authentication site, and increase the durability and acceptability of the novel reliable identity verification system.
A plurality of remote database storage and inspection centers are interconnected by a global high speed network 24-29. Data from any one database center may be directed through the network to any other center to update the databases, provide redundancy of data, emergency back-up, load monitoring, and transaction balancing.
Because the application of the disclosed invention does not require any substantial changes to existing credit card systems, as is known from current credit card users' opinion, novel methods will be used to develop digital photo image databases. One measure of codifying the database would be through the use of a disposable camera that would be sent to a credit card user who indicated a desire to participate in a reliable authentication system. The provision of such a type of photographic image to be captured would facilitate a higher level of security and would minimize the amount of fraud involved in the system.
First, an individual wishing to participate in the system makes a request to a database provider. Alternatively, the credit card provider may include an application request in its monthly accounting statement to all its credit card customers. The participation request will take the form of an application form requiring personal information of the participant including name, address and existing credit card account that the participant wishes to apply in conjunction with the positive authentication system. The database provider then assigns a unique code to each application and sends a disposable camera to the address listed on the application form. This code is preferably in the form of a bar code which will be readily machine readable by the database provided to increase the degree of automation in the development of the database.
Once the participant receives the camera from the data provider, they will follow the accompanying guidelines for the friend or family member to take at least one photograph of the participant with the camera. The camera preferably has sufficient film to ensure that at least one acceptable photograph of the participant is taken and sent to the database provider. However, to reduce the costs associated with providing cameras, they do not require a standard 12-film. Once the picture is taken, the participant mails the camera to the database provider. The provider develops the film and digitizes at least one photographic image of the participant. The database provider then correlates the digital image with the proprietary participant data using a bar code or other identification means associated with that particular camera.
Thus, a counterfeiter is virtually impossible to defeat the system. Further, fraud can also be reduced by disassociating the provision of applicant information from the provision of applicant's photographic images. Moreover, even if a counterfeiter intercepts a camera, they must send their picture to the database company to defeat the system. This is not possible because the database provider thus has an accurate picture of what was originally a criminal who can be provided to the authorities of the fraudulent criminal incident.
Another possible way of database development that the inventors have considered is by obtaining digital photo data of individuals that have been held by other entities. One such alternative source of photograph data is through the department of Motor Vehicles (DMV, Motor vehicle Bureau) of the respective states. Currently, all states issue drivers ' licenses to residents that contain not only some of the driver's identification data, such as name, address, date of birth, social security number, etc., but also a picture of the driver's license recipient. The DMV retains the identity data of all licensees for their use, including copies of the photographs on the driver's license. The photographs taken by each DMV may be digitized using a standard-technology digital scanner and stored in a format compatible with the authentic identity verification system.
Verifying the accuracy of these DMV photographs requires a slightly different procedure than the aforementioned process of taking digital photograph data using easy-to-use camera technology. In the case based on this DMV, the database provider would obtain and store the entire database of photos from a particular state in separate state-specific source databases. The database provider or any credit card company may send participation requests to individuals residing within a state whose DMV database has been included in the provider's main database. Upon receiving a request to participate, the database provider uses the digital photograph of the person who sent the request to authenticate the requesting party in return form or the like to indicate how accurately this photograph represents the requesting party. Once the database provider receives confirmation of the accuracy of the photograph, it transfers the particular photograph from the state specific source database to the overall database. The same may be used for digital representations using signatures.
Those skilled in the art will envision variations that come within the spirit of the invention and therefore the invention is not limited to the specific embodiments shown or described, which are for illustrative purposes only. It should be understood that numerous modifications and embodiments can be devised by those skilled in the art which fall within the scope and spirit of the principles of this invention.

Claims (28)

1. A reliable identity verification system comprising:
an authentication terminal having means for receiving information presented by a person to be reliably identified at an authentication site and means for displaying a second identification information element;
at least one remote database location having stored therein a database comprising a plurality of said units of identification information, wherein at least one of said units of identification information corresponds to said information received at the verification end point; and
means for communicating between said authentication endpoint and said remote database to exchange information data therebetween.
2. A positive identity verification system as claimed in claim 1, further comprising means for verifying that the authenticating person at the point of verification termination has compared and matched the identity information unit displayed by the display means with the actual information shown by the person to be positively identified.
3. A positive identity verification system as claimed in claim 2, wherein the means for verifying that the authenticator at the verification terminal has compared and verified that the unit of identification information matches the actual information presented by the person to be identified is a personal identification number unique to said authenticator which is entered into the verification terminal using an input means.
4. A positive identity verification system as claimed in claim 3, wherein said input means is a multi-function keyboard.
5. A positive identity verification system as claimed in claim 2, wherein said identification information element is a digital photographic image of said person to be identified.
6. A positive identity verification system as claimed in claim 2, wherein said identification information element is a digitized graphical image of a signature of said person to be identified.
7. A positive identity verification system as claimed in claim 2, further comprising means for verifying that said verification end-point is authorised to access said remote database location.
8. A positive identity verification system as claimed in claim 7, wherein said verification means is a standard caller identification means.
9. A positive identity verification system as claimed in claim 7, wherein said verification means is a software key transmitted to said database location by said verification terminal point to open the database location for access.
10. A positive identity verification system as claimed in claim 1, wherein said communication means comprises a verification modem point communicating with a modem located at one of said database sites via a data flow path.
11. The positive authentication system as claimed in claim 10, wherein said data flow path comprises a public access telephone line.
12. The positive authentication system as claimed in claim 10, wherein said data flow path is a dedicated wide area network.
13. A positive authentication system as claimed in claim 10, wherein said data flow path is a satellite communication link.
14. A positive identity verification system for verifying that a credit card presenter is the credit card owner, comprising:
a verification terminal point comprising means for receiving account information presented by said presenter, said information being associated with a credit card account;
a remote database storage and retrieval location for storing, retrieving, processing and transmitting digital images, said images being stored at said remote database location, each of said images stored at said remote database location being associated with at least one credit card account;
means for communicating between the authentication endpoint and the remote database means;
means for verifying that said verification endpoint is authorized to access said information stored at said remote database location;
means for sending said account information to said remote database location;
means for retrieving said digital image associated with said credit card account;
means for displaying said digital image at said authentication endpoint; and
means for entering information at the authentication terminal to indicate that the digital image displayed on the authentication display means by the authenticating person matches the physical appearance of the person presenting the credit card for the application.
15. The positive identity verification system as claimed in claim 14, wherein said digital image is a digital photograph of a person authorized to use said credit card.
16. A positive identity verification system as claimed in claim 14, wherein said digital image is a digital signature of a person authorised to use said credit card.
17. The positive identity verification system as claimed in claim 14, wherein said means for receiving said credit card account information is a magnetic stripe reader for reading a standard credit card associated magnetic stripe, said magnetic stripe containing said credit card account information.
18. The positive identification verification system as claimed in claim 14 wherein said means for receiving said credit card account information is a bar code reader for reading a bar code associated with a credit card, said bar code containing said credit card account information.
19. The positive authentication system as claimed in claim 14, wherein said means for receiving said credit card account information is a multi-function keypad.
20. A system for reliable authentication to ensure that a credit card presenter is authorized to use the credit card, comprising:
a credit card reader device for use by store clerks to receive credit card account information, said credit card reader being located at a point of sale and authentication;
a remote database means for storing digital image data unique to an individual, each of said digital images being associated with designated credit card account information;
means for communicating between said credit card reader and said remote database means for transferring said credit card account information from said card reader to said database means and for transferring digital image data associated with said transferred account information at said database storage means to said card reader;
means for displaying said received digital image data at a verification site for visual observation by said salesperson for comparison with actual information presented by said presenter at an authentication site; and
a user device for receiving input from said salesperson indicating that the digital image data displayed on said display device has been compared and matched with the actual data presented by said card-using presenter.
21. The positive identification verification system as claimed in claim 20 wherein said unique digital image data associated with said designated credit card account information is at least one digital photographic image of at least one authorized user of said credit card and the physical data presented by the presenter of the credit card is the physical appearance of said presenter.
22. The positive identity verification system as claimed in claim 20 wherein said unique digital image data associated with said designated credit card account information is at least one digitized graphic image of at least one signature of at least one authorized user of said credit card and the actual data presented by said presenter is a handwritten signature.
23. A reliable identity verification system comprising:
a database storage and retrieval location remote from an authentication site, said database location storing digital image data corresponding to a plurality of persons to be reliably identified, each element of said image data corresponding to at least one form of actual data unique to a person to be identified and also corresponding to at least one information element presented by said person to be identified;
means for establishing communication between said database site and said verification site, said communication means being capable of receiving and transmitting said presented information units to said database site;
a searching means for searching said database to find said digital image data corresponding to said presented information unit received by said database.
A means for transmitting said digital image data to a verification point; and
a means at said verification site for displaying said digital image data transmitted from said database site to the verification site.
24. The positive identity verification system as claimed in claim 20, further comprising means for verifying that said digital image data displayed by the display means has been compared by an authenticating person at the point of verification terminal with and in agreement with said actual information unique to the person to be positively identified.
25. A method of reliable identity verification, comprising the steps of:
inputting into the authentication terminal point a first information unit presented by a presenter to be reliably identified;
establishing communication between the verification endpoint and a remote database location having stored therein a database comprising a plurality of units of identification information, at least one of which corresponds to the first unit of information entered at the verification endpoint;
verifying that the verification endpoint is authorized to access a remote database location;
transmitting said first information unit from said terminal to said remote database location via a communication means;
retrieving at least one of the identifying information units corresponding to the first information unit transmitted to the database site;
transmitting the identification information unit to the authentication terminal point through a communication means;
displaying the identification information received from the database location on a display device located at the authentication point;
comparing the displayed identification information with actual information presented by a presenter at a verification point;
inputting authenticator-specific data into the verification terminal indicating that the authenticator has compared the displayed identification information with the actual information presented by the presenter and that the presented actual information corresponds to the displayed information;
the authenticated person specific data is transmitted and stored at the remote database location for later recall in reliably identifying that the transaction is in question.
26. A method of reliable identity verification as claimed in claim 25, wherein said first unit of information is a credit card account number.
27. A method of positive identity verification as claimed in claim 25, wherein said identifying information element is a digital photographic image of the presenter having an actual appearance, and wherein said actual information presented is the actual appearance of the presenter.
28. A method of reliable authentication as claimed in claim 25, wherein said identification information element is a digitized graphical image of a signature of the presenter and wherein said actual information presented is a handwritten signature given by the presenter at the point of authentication.
HK98112048.0A 1995-05-08 1996-05-08 Positive identification system and method HK1010961A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/436,146 1995-05-08

Publications (1)

Publication Number Publication Date
HK1010961A true HK1010961A (en) 1999-07-02

Family

ID=

Similar Documents

Publication Publication Date Title
US5790674A (en) System and method of providing system integrity and positive audit capabilities to a positive identification system
US6040783A (en) System and method for remote, wireless positive identity verification
US20020138351A1 (en) Positive identification system and method
US6070141A (en) System and method of assessing the quality of an identification transaction using an identificaion quality score
US6202055B1 (en) Positive identification display device and scanner for low cost collection and display of graphic and text data in a secure manner
US6424249B1 (en) Positive identity verification system and method including biometric user authentication
US9792608B2 (en) System and method for customer video authentication to prevent identity theft
JP2889486B2 (en) Credit card verification system
US20060016107A1 (en) Photo ID cards and methods of production
US7865439B2 (en) Systems and methods for verifying identities
US5412727A (en) Anti-fraud voter registration and voting system using a data card
JPH07192063A (en) Method and apparatus for inspection of transaction card
JP2003525478A (en) Biometric electronic check trading without tokens
US20110145147A1 (en) System and method for authorizing transactions
JP2005063077A (en) Method and device for personal authentication and connector
JP4890774B2 (en) Financial transaction system
US20080040779A1 (en) System and method for identification verification
US11756147B1 (en) Systems and methods for verifying the authenticity of documents
HK1010961A (en) Positive identification system and method
US20070095899A1 (en) Global identification authentication system
MXPA97008602A (en) System and posit identification method
WO2006112816A1 (en) System and method for identification vertification
HK1100854A (en) Verification method for personal credit purchases