WO2002091291A1 - Complete personal identification system - Google Patents
Complete personal identification system Download PDFInfo
- Publication number
- WO2002091291A1 WO2002091291A1 PCT/IB2002/002470 IB0202470W WO02091291A1 WO 2002091291 A1 WO2002091291 A1 WO 2002091291A1 IB 0202470 W IB0202470 W IB 0202470W WO 02091291 A1 WO02091291 A1 WO 02091291A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identification
- chip
- individual
- intelligent electronic
- electronic chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
Definitions
- the highest degree of security for issuing identifications is to use elements that are difficult to imitate to prevent counterfeiting but impersonation is not eliminated.
- SUBSTITUTE SHEET (RULE 26) magnetic stripe or any other memory element, which by giving the correct code along with the card, the desired transaction or access is allowed.
- This system has the disadvantage that the identified element itself is the card, not the person, and impersonation and falsification of the document can occur.
- the invention provides technology as a novelty, the ability to identify someone at any time with full certainty, without having to go to data banks or peripheral files.
- EXAMPLE I When a person is going to cash a check at the bank window, they are required to present the citizenship card and it is "verified" that on the back of the check it is signed by the collector with his identification number . In this event several things happen very frequently: The check can be stolen or forcibly drawn, so to collect it the fraudster must: a) Carry a false identity document, with a similar photograph and with this they pay the check. This raises counterfeiting and / or impersonation and the crime goes unpunished because the debt collector is unidentifiable. b) Carry the identity document of the original beneficiary and with this they pay the check. This poses impersonation and the crime goes unpunished. c) Carry an authentic document of another person and make a double endorsement and with this they pay the check. This poses impersonation and the crime goes unpunished. And another innocent person is accused.
- the identifying device can only open and read the smart electronic chip if it is intact.
- the invention presented here provides security elements that will reduce the fraud that is present in commercial transactions, hidden in impersonation and falsification of documents, which allow the anonymity of the criminal and the consequent expediity.
- EXAMPLE 2 In the execution of a confidential process in a system, for example authorization of transfer of funds or authorization of delivery of goods or services, magnetic stripe cards are used with verification by means of a key. In this case, the executor passes the card and digits the key, and the operation is authorized, but it is not certain that: whoever digitized the key is the authorized person, because it can happen, and it happens a lot, that they falsify the cards or they take "borrowed” and just by typing the password they impersonate the authorized one.
- EXAMPLE 3 In prison visits it may happen that the prisoner is changed by the visitor.
- EXAMPLE 4 In an airport people must go through immigration or emigration and impersonation with false or authentic passports is frequent because despite the security elements, impersonation is very possible. With the invention there is a true link between the passport and the person who shows it, because if the passport has integrated the smart electronic chip, the identity is verified with the bearer's footprint, or the identity is also authenticated with an independent card, which authenticate the matching data between the passport and an individual already verified.
- EXAMPLE 5 In commercial and stock exchange transactions, whether traditional or electronic, it is necessary to certify a proposal or order, as well as the payment by means of verbal debit note. On many occasions, there are failed transactions because the computer is an impostor, or it does not have the ability to perform this transaction.
- the identifying device if the identifying device is properly conditioned to certify an identity, or to authenticate the identity of an actor, only an authorized person can make the transaction.
- EXAMPLE 6 Double voting or impersonation is presented in electoral processes.
- the general objective of the present invention is to provide an identification system or method that fully guarantees that the identified individual does correspond to the identity of the person whose description is described or contained in a portable identity document. And that the acts that that individual is carrying out and the consequences thereof, correspond to the real will of that individual and this circumstance can be verified or certified later.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
SISTEMA DE IDENTIFICACIÓN PLENA PERSONAL PERSONAL FULL IDENTIFICATION SYSTEM
DESCRIPCIÓNDESCRIPTION
SECTOR TÉCNICOTECHNICAL SECTOR
En todos los actos de las personas son conocidas las necesidades de establecer con certeza la identidad de los actores que con sus actos afectan la vida, bienes y condiciones propias de las personas, los Estados y las Empresas o Corporaciones; y a la vez dejar una constancia de tiempo y lugar de dicha verificación o certeza de la identificación.In all the acts of the people the needs to establish with certainty the identity of the actors that with their acts affect the life, goods and conditions of the people, the States and the Companies or Corporations are known; and at the same time leave a record of time and place of said verification or identification certainty.
ESTADO DE LA TÉCNICASTATE OF THE TECHNIQUE
ESTADO DE LA TÉCNICA ISTATE OF THE TECHNIQUE I
En el deseo de cubrir estas necesidades se han desarrollado instrumentos y elementos de identificación que funcionan con los sentidos del hombre (tacto, vista, oído) y se han fabricado documentos de identificación que operan por comparación haciendo uso de estos mismos sentidos, Estos instrumentos son susceptibles de falsificación y permiten la suplantación del individuo identificado porque NO TI EN EN VÍNCULO REAL con el portador.In the desire to cover these needs, instruments and identification elements have been developed that work with the senses of man (touch, sight, hearing) and identification documents that operate by comparison have been made using these same senses. These instruments are susceptible to falsification and allow the impersonation of the identified individual because YOU DON'T IN REAL LINK with the carrier.
Es así como universalmente se ha usado la fotografía, como elemento de identificación. En este caso la verificación de la identidad consiste en una comparación que está sujeta al juicio de! observador.This is how photography has been universally used as an element of identification. In this case the identity verification consists of a comparison that is subject to the judgment of! observer.
El más alto grado de seguridad para emitir identificaciones es usar elementos de difícil imitación para evitar falsificaciones pero no se elimina la suplantación.The highest degree of security for issuing identifications is to use elements that are difficult to imitate to prevent counterfeiting but impersonation is not eliminated.
ESTADO DE LA TÉCNICA 2STATE OF THE TECHNIQUE 2
También se han desarrollado sistemas electrónicos de comparación de ¡as características biométricas (l) que cotejan contra una base de datos, en donde la característica individualizada de la persona a identificar, está registrada en la base de datos, y cuando coincide con la del individuo, depositada en la base de datos, esta persona queda identificada, Este sistema se utiliza principalmente para autorización de acceso a sistemas o a sitios de circulación restringida. Pero tiene la limitación de ser selectivo y estacionario para las personas y los sitios donde está instalado.Electronic systems for comparing the biometric characteristics (1) that collate against a database have also been developed, where the individualized characteristic of the person to be identified is registered in the database, and when it coincides with that of the individual , deposited in the database, this person is identified, This system is mainly used for authorization of access to systems or restricted circulation sites. But it has the limitation of being selective and stationary for the people and places where it is installed.
!)tales como la lectura de huellas digitales o plantares, lectura de los iris de los ojos, morfología de la cara o manos como un mapa topográfico, definición del mapa del dorso de la mano. !) such as the reading of fingerprints or plantar, reading of the iris of the eyes, morphology of the face or hands as a topographic map, definition of the map of the back of the hand.
ESTADO DE LA TÉCNICA 3STATE OF THE TECHNIQUE 3
Existen otros desarrollos en donde se utilizan códigos numéricos o alfanuméπcos para que coincidan con una tarjeta o documento que tiene un código de barras o unaThere are other developments where numerical or alphanumeric codes are used to match a card or document that has a barcode or a
HOJA DE SUSTITUCIÓN (REGLA 26) banda magnética o cualquier otro elemento de memoria, que al dar el código acertado junto con la tarjeta, se permite la transacción o el acceso deseados. Este sistema tiene el inconveniente que el elemento identificado en sí es la tarjeta, no la persona, y se puede presentar suplantación y falsificación del documento.SUBSTITUTE SHEET (RULE 26) magnetic stripe or any other memory element, which by giving the correct code along with the card, the desired transaction or access is allowed. This system has the disadvantage that the identified element itself is the card, not the person, and impersonation and falsification of the document can occur.
ESTADO DE LA TÉCNICA 4STATE OF THE TECHNIQUE 4
El problema de la verificación de la identificación personal en cualquier momento o lugar sin necesidad de estar previamente incluido en una base de datos, que sirva como punto de referencia, como es el caso de la tecnología explicada en el ESTADO DE LA TÉCNICA 2, está en que ha sido imposible crear una verdadera ligazón o relación real directa entre el individuo a identificar y el documento que porta como identificación, pues se presenta la posibilidad de la suplantación o la falsificación del documento, por lo tanto persiste el problema para proporcionar un medio general y ágil de identificación con certeza.The problem of the verification of personal identification at any time or place without having to be previously included in a database, which serves as a reference point, as is the case of the technology explained in the STATE OF THE TECHNIQUE 2, is in which it has been impossible to create a true link or direct real relationship between the individual to be identified and the document that it carries as identification, since the possibility of impersonation or falsification of the document is presented, therefore the problem persists to provide a means General and agile identification with certainty.
APORTES DE LA INVENCIÓN A LA TECNOLOGÍACONTRIBUTIONS OF THE INVENTION TO TECHNOLOGY
La invención aporta como novedad a la tecnología, la facultad de identificar a alguien en cualquier momento con plena certeza, sin tener que acudir a bancos de datos o a archivos periféricos.The invention provides technology as a novelty, the ability to identify someone at any time with full certainty, without having to go to data banks or peripheral files.
EJEMPLO I : Cuando una persona va a cobrar un cheque en la ventanilla del banco, se le exige la presentación de la cédula de ciudadanía y se "verifica" que en la parte del reverso del cheque esté firmado por el cobrador con su número de identificación. En este evento pasan con mucha frecuencia varias cosas: El cheque puede ser robado o girado a la fuerza, entonces para cobrarlo el defraudador debe: a) Portar un documento de identidad falso, con una fotografía parecida y con esto le pagan el cheque. Esto plantea falsificación y/o suplantación y el delito queda impune pues el cobrador es inídentificable. b) Portar el documento de identidad del original beneficiario y con esto le pagan el cheque. Esto plantea suplantación y el delito queda impune. c) Portar un documento auténtico de otra persona y hacer un doble endoso y con esto le pagan el cheque. Esto plantea suplantación y el delito queda impune. Y queda inculpada otra persona inocente.EXAMPLE I: When a person is going to cash a check at the bank window, they are required to present the citizenship card and it is "verified" that on the back of the check it is signed by the collector with his identification number . In this event several things happen very frequently: The check can be stolen or forcibly drawn, so to collect it the fraudster must: a) Carry a false identity document, with a similar photograph and with this they pay the check. This raises counterfeiting and / or impersonation and the crime goes unpunished because the debt collector is unidentifiable. b) Carry the identity document of the original beneficiary and with this they pay the check. This poses impersonation and the crime goes unpunished. c) Carry an authentic document of another person and make a double endorsement and with this they pay the check. This poses impersonation and the crime goes unpunished. And another innocent person is accused.
En estos tres casos, que son muy frecuentes y crean innumerables y graves problemas a los afectados, la circunstancia que permite que se cometan estos delitos es la imposibilidad total de certificar la identidad del cobrador, porque no hay una ligazón real entre el individuo y el documento de identidad. Con la invención: Si El Banco tiene el artefacto de doble uso con el que el cobrador del cheque aludido, suministra el documento de identidad que permita la asociación y comparación real instantánea con la huella dactilar del portador, establece en forma inequívoca la autenticidad de la identificación del individuo.In these three cases, which are very frequent and create innumerable and serious problems for those affected, the circumstance that allows these crimes to be committed is the total impossibility of certifying the identity of the debt collector, because there is no real link between the individual and the identification document. With the invention: If the Bank has the dual-use device with which the collector of the aforementioned check, provides the identity document that allows the association and instant real comparison with the carrier's fingerprint, unequivocally establishes the authenticity of the identification of the individual.
Cuál es la secuencia de la identificación:What is the identification sequence:
1. I .El artefacto identificador solamente puede abrir y leer el chíp electrónico inteligente si está intacto.1. I. The identifying device can only open and read the smart electronic chip if it is intact.
2. Una vez que ha leído el chip, ha leído la huella digital2. Once you have read the chip, you have read the fingerprint
3. Al mismo tiempo el artefacto lee la huella digital del cobrador,3. At the same time the device reads the collector's fingerprint,
4. Si las dos huellas son iguales le autoriza el pago del cheque, con lo cual queda registrado que este individuo con esa huella digital cobró el cheque en determinada oficina y a determinada hora.4. If the two fingerprints are the same, you are authorized to pay the check, which means that this individual with that fingerprint cashed the check at a certain office and at a certain time.
5. Sí el cobrador era fraudulento, (puede serlo solamente si se robó un cheque y le hizo doble endoso pero cobró con su identificación real) con lo cual pasan solamente dos cosas: O queda plenamente identificado y es fácil detenerlo, O simplemente se abstiene de cometer el ilícito.5. If the collector was fraudulent, (it can be only if a check was stolen and double endorsed but charged with his real identification) with which only two things happen: Or it is fully identified and it is easy to stop it, or it simply abstains of committing the illicit.
6. Este método reduce el tiempo de las transacciones y toma muy pocos segundos para hacer identificación plena6. This method reduces transaction time and takes very few seconds to make full identification
Con estas condiciones, la invención aquí presentada aporta elementos de seguridad que reducirán a niveles ínfimos los fraudes que hoy se presentan en transacciones comerciales, escudados en la suplantación y en la falsificación de documentos, que permiten el anonimato del criminal y la consecuente impunidad.Under these conditions, the invention presented here provides security elements that will reduce the fraud that is present in commercial transactions, hidden in impersonation and falsification of documents, which allow the anonymity of the criminal and the consequent impunity.
EJEMPLO 2: En la ejecución de un proceso confidencial en un sistema, por ejemplo autorización de traslado de fondos o autorización de entrega de bienes o servicios, se utilizan tarjetas de banda magnética con verificación por medio de una clave. En este caso el ejecutor pasa la tarjeta y dígita la clave, y se autoriza la operación, pero no se tiene certeza de: que quien digitó la clave es la persona autorizada, pues puede pasar, y pasa mucho, que falsifican las tarjetas o las toman "prestadas" y con solo digitar la clave suplantan al autorizado.EXAMPLE 2: In the execution of a confidential process in a system, for example authorization of transfer of funds or authorization of delivery of goods or services, magnetic stripe cards are used with verification by means of a key. In this case, the executor passes the card and digits the key, and the operation is authorized, but it is not certain that: whoever digitized the key is the authorized person, because it can happen, and it happens a lot, that they falsify the cards or they take "borrowed" and just by typing the password they impersonate the authorized one.
Con la invención: solamente si coinciden la huella del operador con la almacenada en la tarjeta, se realiza la operación. En este caso es inobjetable que el ejecutor fue el que aparece como tal. Y se elimina totalmente el riesgo de suplantación.With the invention: only if the operator's footprint coincides with that stored on the card, the operation is performed. In this case it is undeniable that the executor was the one who appears as such. And the risk of impersonation is completely eliminated.
EJEMPLO 3: En visitas carcelarias puede suceder que se cambie el preso por el visitante.EXAMPLE 3: In prison visits it may happen that the prisoner is changed by the visitor.
Con la invención es imposible que esto pase.With the invention it is impossible for this to happen.
EJEMPLO 4: En un aeropuerto las personas deben pasar por inmigración o emigración y la suplantación con pasaportes falsos o auténticos es frecuente pues a pesar de los elementos de seguridad, la suplantación es muy posible. Con la invención existe una verdadera ligazón entre el pasaporte y la persona que lo muestra, pues si el pasaporte tiene integrado el chip electrónico inteligente, se verifica la identidad con la huella del portador, o también se autentica la identidad con una tarjeta independiente, que autentique los datos coincidentes entre el pasaporte y un individuo ya verificado.EXAMPLE 4: In an airport people must go through immigration or emigration and impersonation with false or authentic passports is frequent because despite the security elements, impersonation is very possible. With the invention there is a true link between the passport and the person who shows it, because if the passport has integrated the smart electronic chip, the identity is verified with the bearer's footprint, or the identity is also authenticated with an independent card, which authenticate the matching data between the passport and an individual already verified.
EJEMPLO 5: En transacciones comerciales y bursátiles, ya sean tradicionales o electrónicas es necesario certificar una propuesta o pedido, al igual que el pago por medio de nota débito verbal. En muchas ocasiones, existen transacciones fallidas porque el ordenador es un impostor, o no tiene la capacidad de realizar esta transacción.EXAMPLE 5: In commercial and stock exchange transactions, whether traditional or electronic, it is necessary to certify a proposal or order, as well as the payment by means of verbal debit note. On many occasions, there are failed transactions because the computer is an impostor, or it does not have the ability to perform this transaction.
Con la invención: si el artefacto identificador está apropiadamente acondicionado para certificar una identidad, o para autenticar la identidad de un actor, solamente un autorizado puede hacer la transacción.With the invention: if the identifying device is properly conditioned to certify an identity, or to authenticate the identity of an actor, only an authorized person can make the transaction.
EJEMPLO 6: En procesos electorales se presenta la doble votación o la suplantación.EXAMPLE 6: Double voting or impersonation is presented in electoral processes.
Con la invención se elimina totalmente esta posibilidad.With the invention this possibility is totally eliminated.
Como puede verse el aporte a la tecnología es muy importante, y de magnitudes inconmensurables, pues el aporte en seguridad total, certeza y agilidad son incomparables con los métodos actuales.As you can see the contribution to technology is very important, and of immeasurable magnitudes, because the contribution in total security, certainty and agility are incomparable with current methods.
Lo anterior es debido a que las operaciones de comparación de huellas digitales (o de otras características físicas o biométricas) se hacen contra bancos de datos estáticos, institucionales preestablecidos, a los cuales es difícil acceder ágilmente, y es otra orientación de la identificación, aunque utilice conceptos y desarrollos similares.This is due to the fact that fingerprint comparison operations (or other physical or biometric characteristics) are done against static, institutional, pre-established databases, which are difficult to access quickly, and is another identification orientation, although Use similar concepts and developments.
OBIET1VO DE LA INVENCIÓNOBJECT OF THE INVENTION
El objetivo general de la presente invención consiste en proporcionar un sistema o método de identificación que garantice plenamente que el individuo identificado sí corresponde a la identidad de la persona cuya descripción está descrita o contenida en un documento portátil de identidad. Y que los actos que está efectuando ese individuo y las consecuencias del mismo, corresponden a la voluntad real de ese individuo y se pueda verificar o certificar posteriormente esta circunstancia. UTILIDAD GENERAL DEL MÉTODO DE IDENTIFICACIÓN PLENA PERSONALThe general objective of the present invention is to provide an identification system or method that fully guarantees that the identified individual does correspond to the identity of the person whose description is described or contained in a portable identity document. And that the acts that that individual is carrying out and the consequences thereof, correspond to the real will of that individual and this circumstance can be verified or certified later. GENERAL UTILITY OF THE PERSONAL FULL IDENTIFICATION METHOD
Método o sistema para realizar la identificación plena de una persona para hacer control anterior, simultáneo o posterior de cualquier actividad en la que se quiera tener certeza de que el actor está plenamente identificado y así evitar suplantaciones y/o falsificaciones.Method or system to perform the full identification of a person to make prior, simultaneous or subsequent control of any activity in which you want to be sure that the actor is fully identified and thus avoid impersonations and / or falsifications.
Permite:It allows:
1. Dejar constancia de tiempo y fugar de los actos de las personas,1. Record time and escape people's actions,
2. Facilitar el encuentro de personas buscadas por cualquier motivo,2. Facilitate the meeting of wanted people for any reason,
3. Dar una identificación total y verificable en cualquier momento por los organismos oficiales de los Estados o Naciones, de las empresas, conglomerados, asociaciones, corporaciones y entidades del sector público o privado.3. Give a total and verifiable identification at any time by the official organisms of the States or Nations, of the companies, conglomerates, associations, corporations and entities of the public or private sector.
4. Hacer verificaciones de total certeza respecto a la identidad e identificación en transacciones bancarias, de inmigración o emigración,4. Make verifications of total certainty regarding the identity and identification in banking, immigration or emigration transactions,
5. Hacer controles de acceso y salida de sistemas, edificaciones o vehículos, trámites notariales para efectos de registro civil y transacciones comerciales, constancias de permanencia en sitios o territorios, otorgamiento, manejo y control de visados en los países, manejo y control de infracciones de tránsito o infracciones a la ley civil o penal, manejos electorales, registro civil de nacimientos y defunciones, procedimientos médicos o de salud, búsqueda de personas extraviadas, búsqueda de prófugos de la justicia, identificación de cadáveres.5. Make access and exit controls of systems, buildings or vehicles, notarial procedures for civil registration and commercial transactions, proof of permanence in sites or territories, granting, handling and control of visas in countries, handling and control of infringements of traffic or violations of civil or criminal law, electoral management, civil registration of births and deaths, medical or health procedures, search for lost persons, search for fugitives from justice, identification of bodies.
6. Al complementar este sistema con sistemas de memoria y archivo, dejar constancia de identificación plena de procesos de exámenes estudiantiles, exámenes de laboratorio, rayos X en laboratorios o aeropuertos, transacciones comerciales, fechas y lugares de inmigración o emigración.6. When complementing this system with memory and archiving systems, record full identification of student exam processes, laboratory tests, X-rays in laboratories or airports, commercial transactions, dates and places of immigration or emigration.
7. Hacer control de acceso y salida con identificación plena y real de zonas de acceso restringido como bóvedas bancarias, áreas de seguridad como cárceles o centros militares o de reclusión.7. Control access and exit with full and real identification of restricted access areas such as bank vaults, security areas such as prisons or military or detention centers.
8. En las transacciones de comercio electrónico para certificar la identidad del actor, al igual que en la solicitud de cierta información clasificada para mayores de edad en páginas electrónicas o llamadas telefónicas para adultos. EXPLICACIÓN DE LAS FIGURAS DE LOS DOS COMPONENTES DEL StSTEMA8. In electronic commerce transactions to certify the identity of the actor, as in the request for certain information classified for adults on electronic pages or telephone calls for adults. EXPLANATION OF THE FIGURES OF THE TWO COMPONENTS OF THE STSTEMA
EXPLICACIÓN DE LA FIGURA N°EXPLANATION OF FIGURE N °
EXPLICACIÓN DE LA FIGURA N° 2EXPLANATION OF FIGURE N ° 2
PANTALLA DE LECTURA DE LA INFORMACIÓN DEL CHIP DE LA TARJETA INTELIGENTESMART CARD CHIP INFORMATION READING SCREEN
RANURA DE LECTURA DEL CHIP DE LA TARJETA INTELIGENTESMART CARD CHIP READING SLOT
TECLAS ALFANUMÉRICAS Y DE COMANDO PARA EL MANEJO DEL EQUIPOALPHANUMERIC AND COMMAND KEYS FOR EQUIPMENT MANAGEMENT
DISPOSITIVO LECTOR DE HUELLAS DACTILARESREADING FOOTPRINTS READING DEVICE
CONEXIÓN PARA MODEMS DE COMUNICACIÓN O ARCHIVO CONNECTION FOR COMMUNICATION OR FILE MODEMS
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CO01035179A CO5070684A1 (en) | 2001-05-04 | 2001-05-04 | PERSONAL FULL IDENTIFICATION METHOD |
| CO01035179 | 2001-05-04 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2002091291A1 true WO2002091291A1 (en) | 2002-11-14 |
Family
ID=5331324
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2002/002470 Ceased WO2002091291A1 (en) | 2001-05-04 | 2002-04-25 | Complete personal identification system |
Country Status (2)
| Country | Link |
|---|---|
| CO (1) | CO5070684A1 (en) |
| WO (1) | WO2002091291A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2391988A (en) * | 2002-08-14 | 2004-02-18 | Scient Generics Ltd | An identity verification system |
| CN110175573A (en) * | 2019-05-28 | 2019-08-27 | 吉林无罔生物识别科技有限公司 | The coding of face and iris and verification method, system and computer readable storage medium |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1996005576A1 (en) * | 1994-08-10 | 1996-02-22 | Prima Officina Carte Valori Turati Lombardi & C.S.P.A. | Credit document connected to a document or customised card, independent customised credit card and associated issuance and validation equipment |
| WO2001008055A1 (en) * | 1999-07-23 | 2001-02-01 | Grosvenor Leisure Incorporated | Secure transaction and terminal therefor |
| US6219439B1 (en) * | 1998-07-09 | 2001-04-17 | Paul M. Burger | Biometric authentication system |
-
2001
- 2001-05-04 CO CO01035179A patent/CO5070684A1/en unknown
-
2002
- 2002-04-25 WO PCT/IB2002/002470 patent/WO2002091291A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1996005576A1 (en) * | 1994-08-10 | 1996-02-22 | Prima Officina Carte Valori Turati Lombardi & C.S.P.A. | Credit document connected to a document or customised card, independent customised credit card and associated issuance and validation equipment |
| US6219439B1 (en) * | 1998-07-09 | 2001-04-17 | Paul M. Burger | Biometric authentication system |
| WO2001008055A1 (en) * | 1999-07-23 | 2001-02-01 | Grosvenor Leisure Incorporated | Secure transaction and terminal therefor |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2391988A (en) * | 2002-08-14 | 2004-02-18 | Scient Generics Ltd | An identity verification system |
| CN110175573A (en) * | 2019-05-28 | 2019-08-27 | 吉林无罔生物识别科技有限公司 | The coding of face and iris and verification method, system and computer readable storage medium |
| CN110175573B (en) * | 2019-05-28 | 2023-05-23 | 吉林无罔生物识别科技有限公司 | Face and iris coding and verification method, system and computer storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CO5070684A1 (en) | 2001-08-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20220222329A1 (en) | Systems and methods for securely processing a payment | |
| ES2303375T3 (en) | AUTHENTICATION CARD SYSTEM WITH CERTIFICATION AUTHORITY IN AWAY POSITION. | |
| US5815252A (en) | Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives | |
| ES2554686T3 (en) | Device, system and method for registering and authenticating handwritten signatures and archiving handwritten information | |
| US7039223B2 (en) | Authentication method utilizing a sequence of linear partial fingerprint signatures selected by a personal code | |
| AU2003285786B2 (en) | System and method for automatic verification of the holder of an authorisation document | |
| ES2234203T3 (en) | BIOMETRIC AUTHENTICATION SYSTEM AND METHOD OF AN INTELLIGENT CARD USER. | |
| US7950577B1 (en) | Apparatus, system and method for verifying authorized using an immigration customs visa card | |
| US7044368B1 (en) | Multi-functional data card | |
| ES2318859T3 (en) | ID CARD, IMMFORMATION CARRIER AND CONTAINER DESIGNED FOR APPLICATION. | |
| US20060206724A1 (en) | Biometric-based systems and methods for identity verification | |
| US20020163421A1 (en) | Personal fingerprint authentication method of bank card and credit card | |
| US20040123114A1 (en) | Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication | |
| CN1610911A (en) | Transaction card system with security against unauthorized use | |
| EA008879B1 (en) | System and method for network security and electronic signature verification | |
| WO2011046556A1 (en) | Biometric identification system | |
| US20170032231A1 (en) | Multiface document | |
| JP3635284B2 (en) | Personal authentication system | |
| KR20070045896A (en) | Authentication card with security function that can check personal authentication card visually and its manufacturing method | |
| WO2002091291A1 (en) | Complete personal identification system | |
| Alliance | Smart Cards and Biometrics | |
| JPH10162144A (en) | Person identification system by patterns of fingerprints of plural fingers | |
| Alliance | Smart Cards and Biometrics in Privacy-Sensitiv Secure Personal Identification System | |
| WO2019144164A2 (en) | A card and identity verification system | |
| KR20000012471A (en) | 1:1 pocket book for cogniting a finger mark by electronic system, method for cogniting the same and instrument for supplying cash using the same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| 122 | Ep: pct application non-entry in european phase | ||
| NENP | Non-entry into the national phase |
Ref country code: JP |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |