( 1 of 12 ) |
United States Patent | 9,064,257 |
Beigi | June 23, 2015 |
The following is a system in which a person may use a Cellular (Mobile) Telephone, a PDA or any other handheld computer to make a purchase. This is an example only. The process may entail any type of transaction which requires authentication, such as any financial transaction, any access control (to account information, etc.), and any physical access scenario such as doubling for a passport or an access key to a restricted area (office, vault, etc.). It may also be used to conduct remote transactions such as those conducted on the Internet (E-Commerce, account access, etc.). In the process, a multi-factor authentication is used.
Inventors: | Beigi; Homayoon (Yorktown Heights, NY) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Applicant: |
| ||||||||||
Family ID: | 45997984 | ||||||||||
Appl. No.: | 13/287,994 | ||||||||||
Filed: | November 2, 2011 |
Document Identifier | Publication Date | |
---|---|---|
US 20120110341 A1 | May 3, 2012 | |
Application Number | Filing Date | Patent Number | Issue Date | ||
---|---|---|---|---|---|
61409151 | Nov 2, 2010 | ||||
Current U.S. Class: | 1/1 |
Current CPC Class: | G06Q 20/3223 (20130101); G06Q 20/3827 (20130101); G06Q 20/409 (20130101) |
Current International Class: | G06F 21/00 (20130101); G06Q 20/40 (20120101); G06Q 20/32 (20120101); G06Q 20/38 (20120101) |
6553494 | April 2003 | Glass |
7200749 | April 2007 | Wheeler et al. |
7474770 | January 2009 | Beigi |
7522751 | April 2009 | White et al. |
7702918 | April 2010 | Tattan et al. |
7711152 | May 2010 | Davida et al. |
8384515 | February 2013 | Rachlin |
8595804 | November 2013 | Pratt et al. |
2001/0000535 | April 2001 | Lapsley et al. |
2002/0095587 | July 2002 | Doyle et al. |
2004/0139332 | July 2004 | Lim |
2004/0151353 | August 2004 | Topping |
WO98/34203 | Aug 1998 | WO | |||
WO0031699 | Jun 2000 | WO | |||
WO02/41271 | May 2002 | WO | |||
"A k-nearest Neighbor Approach for User Authentication Through Biometric Keystroke Dynamics," Hu et al., Communications, 2008, ICC '08 IEEE International Conference, pp. 1556-1560. cited by applicant . "A New Approach for Hand-Palm Recognition", Saeed et al., Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, Lecture Notes in Computer Science, pp. 185-194, Springer London ISBN: 1-4020-7776-9. cited by applicant . "A Novel Approach for Ear Recognition Based on ICA and RBF Network", Zhang et al., 2005, Machine Learning and Cybernetics, Proceedings of 2005 International Conference, vol. 7, pp. 4511-4515. cited by applicant . "Access Control System with Hand Geometry Verification and Smart Cards" Sanchez-Reillo et al., IEEE AES Systems Magazine, Feb. 2000. cited by applicant . "Acoustic Ear Recognition for Person Identification," Akkermans et al., Automatic Identification Advanced Technologies, 2005, Fourth IEEE Workshop, pp. 219-223. cited by applicant . "An Approach to Feature Selection for Keystroke Dynamics Systems Based on Pso and Feature Weighting," Azevedo et al, Evolutionary Computation, CEC 2007, IEEE Congress, pp. 3577-3584. cited by applicant . "An Introduction to Near-Field Communication and the Contactless Communication API," C. Enrique Ortiz, sun, Jun. 2008, available at http://java.sun.com/developer/technicalArticles/javame/nfc/. cited by applicant . "Appearance-Based Facial Recognition Using Visible and Thermal Imagery: A Comparative Study", Selinger et al., 2003. cited by applicant . "Computer-Access Security Systems Using Keystroke Dynamics," Bleha et al., IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12, No. 12, pp. 1217-1222, Dec. 1990. cited by applicant . "Ear Recognition by Means of a Rotation Invariant Descriptor," Fabate et al., Pattern Recognition, 2006, ICPR 2006, 18th International Conference, vol. 4, pp. 437-440. cited by applicant . "Evaluating the Reliability of Credential Hardening Through Keystroke Dynamics," Bartlow and Cukik, Software Reliability Engineering, 2006, ISSRE '06. 17th International Symposium, pp. 117-126. cited by applicant . "Face Recognition: Features Versus Templates," Brunelli and Poggio, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, No. 10, pp. 1042-1052, Oct. 1993. cited by applicant . "Human Ear Recognition in 3d," Chen and Bhanu, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, No. 4, pp. 718-737, Apr. 2007. cited by applicant . "Human Identification Based on 3d Ear Models," Cadavid and Abdel-Mottaleb, Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007, First IEEE International Conference, pp. 1-6. cited by applicant . Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 5280 (Proposed Standard,) Cooper et al., 2008. cited by applicant . "Multimodal Recognition Based on Face and Ear", Yuan et al., Wavelet Analysis and Pattern Recognition, 2007 ICWAPR '07, International Conference, vol. 3, pp. 1203-1207. cited by applicant . "Multi-View Ear Shape Feature Extraction and Reconstruction," Liu and Yan, Signal-Image Technologies and Internet-Based System, 2007, SITIS '07 Third International IEEE Conference, pp. 652-658. cited by applicant . "Personal Identification Based on Iris Texture Analysis" Ma et al., IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, No. 12, pp. 1519-1533, Dec. 2003. cited by applicant . Practice Note: Examples of Financial Services Using Mobile Phones, World Wide Web http://www.ictregulationtoolkit.org/en/PracticeNote.3096.html. cited by applicant . "Rapid Heterogeneous Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA", Ryan Woodings et al., Proc. of the Third Annual IEEE Wireless Communications and Networking Conference (WCNC) 2002, vol. 1, Orlando, Florida, Mar. 2002, pp. 342-349. cited by applicant . "The Transformational Potential of M-Transactions", Vodaphone Group PLc, 2007. cited by applicant . "User Authentication Through Typing Biometrics Features," Araujo et al., IEEE Transactions on Signal Processing, vol. 53, No. 2, pp. 851-855, Feb. 2005. cited by applicant . "Using 2d Wavelet and Principal Component Analysis for Personal identification Based on 2d Ear Structure," Nosrati et al. 2007, Intelligent and Advanced Systems, ICIAS 2007, International Conference, pp. 616-620. cited by applicant . "Visible-Spectrum Biometric Retina Recognition," Borgen et al., 2008, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2008) pp. 1056-1062. cited by applicant . Wizzit Has Done Its Homework, Says Mphahlele World Wid Web, Crotty, 2005, http://www.nextbillion.net/archive/files/Wizzit%20Business%20Report.pdf. cited by applicant. |