WO2008113110A1 - Method and apparatus for performing a transaction using a verification station - Google Patents

Method and apparatus for performing a transaction using a verification station Download PDF

Info

Publication number
WO2008113110A1
WO2008113110A1 PCT/AU2008/000366 AU2008000366W WO2008113110A1 WO 2008113110 A1 WO2008113110 A1 WO 2008113110A1 AU 2008000366 W AU2008000366 W AU 2008000366W WO 2008113110 A1 WO2008113110 A1 WO 2008113110A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
stored
memory
biometric
verification station
Prior art date
Application number
PCT/AU2008/000366
Other languages
French (fr)
Other versions
WO2008113110A8 (en
Inventor
Christopher John Burke
Original Assignee
Microlatch Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2007901361A external-priority patent/AU2007901361A0/en
Application filed by Microlatch Pty Ltd filed Critical Microlatch Pty Ltd
Publication of WO2008113110A1 publication Critical patent/WO2008113110A1/en
Publication of WO2008113110A8 publication Critical patent/WO2008113110A8/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system

Definitions

  • the present invention relates generally to security issues and, in particular, to security issues associated with use of card devices such as credit cards, smart cards, and wireless card-equivalents such as wireless transmitting fobs.
  • card device and their associated “reader devices” (respectively referred to merely as cards and readers).
  • the card devices all contain card information that is accessed by “coupling" the card device to an associated reader device.
  • the card information is used for various purposes including drawing cash from an Automatic Teller Machine (ATM), making a purchase on credit, updating a loyalty point account, gaining access to a restricted area or controlled device and so on.
  • ATM Automatic Teller Machine
  • the card information is typically accessed from the card by a corresponding card reader which then sends the card information to a "back-end" system that completes the appropriate transaction or process.
  • standard credit card refers to a traditional plastic card 701 as depicted in Fig. 1.
  • the standard credit card is typically "swiped" through a slot in a standard credit card reader in order to access card information 702 on the card 701.
  • the card information 702 can alternately be encoded using an optical code such as a bar code, in which case the reader is suitably adapted.
  • the standard credit card 701 also typically has the signature 703 of the card-owner written onto a paper strip on the card 701. This is used for verification of the identity of the person submitting the card when conducting a transaction using the card 701.
  • Another type of card device is the smart card (not shown) that typically has an on-board processor and a memory. The smart card typically has electrical contacts that mate with corresponding contacts on a smart card reader (not shown) when accessing data in the memory of the smart card.
  • Still another type of card device is a proximity card (not shown) that typically has an on-board microchip.
  • a proximity card reader sends out a low-level radio frequency (RF) signal, which energizes the microchip embedded in the card when the card is placed in close proximity to the reader.
  • RF radio frequency
  • Still another type of card device is the wireless "key-fob" which is a small radio transmitter that emits an RF signal when a button on the fob is pressed.
  • the RF signal can be encoded using the Wiegand protocol, or any other suitable protocol, such as rolling code or BluetoothTM and can include encryption if desired.
  • the key-fob typically has a processor and memory storing data that is sent via the transmitted signal to a corresponding receiver, which is the "reader device” for this type of card device.
  • the description also refers to "card user” and "card owner”.
  • the card user is the person who submits the card for a particular transaction.
  • the card user can thus be the (authorised) card owner or an (unauthorised) person who has found or stolen the card.
  • a card may be used without the consent of the card owner to gain access to a bank account. Further, data stored on a card may be copied and used to gain access to a building or the like.
  • Biometric verification can also be incorporated into current card systems to enhance security.
  • the card user swipes the standard card 701 through an associated card reader (not shown) that accesses the card information 702 on the card 701.
  • the card user also provides a biometric signature 801, for example by pressing their thumb against a biometric (e.g., fingerprint) reader 802.
  • the card information 702 that is read by the card reader (not shown), together with the biometric signature that is read by the biometric (fingerprint) reader 802 are sent, as depicted by a dashed arrow 803, a computer network 804, and a further dashed arrow 805, to a back-end system including a database 806 and associated processor (not shown).
  • the card owner needs to have previously registered their biometric signature 801 and the card information 702 for pre-loading onto the back-end database 806. Having done so, the back-end processor (not shown) compares the preloaded information on the database 806 with the information received at 805, in order to check that the card holder of the card 701 is the (authorised) card owner and that the card itself is valid, in which case the transaction in question can proceed.
  • the back-end processor (not shown) compares the preloaded information on the database 806 with the information received at 805, in order to check that the card holder of the card 701 is the (authorised) card owner and that the card itself is valid, in which case the transaction in question can proceed.
  • Clearly this arrangement requires a central repository (806) of card information 702 and biometric signatures 801. This is cumbersome and potentially compromises the privacy and security of the holder of the card 701. This arrangement also requires complex back-end database management and the communications network 804.
  • the front-end biometric signature reader 802 requires storage and/or processing capabilities for the biometric signatures. This results in a complex and expensive solution. Privacy concerns have also been raised against the arrangement of Fig. 2 which involves centralised storage and processing of personal information including biometric information. These concerns have slowed widespread use of biometrics to enhance user verification. Another disadvantage of the arrangement of Fig. 2 is that even once the card owner's biometric signature 801 and card information 702 has be pre-loaded onto the back-end database 806, the card owner is still required to carry the card and to validate the card for each transaction. This is inconvenient as the card is often lost or damaged.
  • a card user's biometric signature in a local memory in a verification station comprising a card reader, a biometric signature reader, the local biometric signature memory (preferably in a mechanically and electronically tamper-proof form), an alphanumeric keypad (optional), and a communication module for communicating with back-end system that may be remotely accessible over a network.
  • biometric template As described herein, when the description refers to "the storing of a biometric signature" in a memory, a person skilled in the art would understand that rather than the actual biometric signature it is a representation of the biometric signature that is actually stored in the memory. This representation may be referred to as a "biometric template" or
  • the card user's biometric signature is automatically stored the first time the card user uses the verification station in question (this being referred to as the enrolment phase).
  • the biometric signature is stored at a memory address together with a copy of the card information on the user's card as read by the card reader of the verification station.
  • the memory address may be defined by the ("unique") card information on the user's card.
  • unique means unique in the context of a permitted set of cards associated with the verification station. This is described in more detail in regard to Fig. 8.
  • An authorised user will be automatically verified by the arrangement in the verification station, and the corresponding transaction, be it an ATM cash withdrawal, a credit purchase, a loyalty point update, allowing entry to a restricted area etc. will simply proceed as normal.
  • the biometric signature of an unauthorised user will be captured in the verification station, and can be used by the authorities to track the unauthorised user.
  • the described arrangements require virtually no modification at all of the back- end systems or the (front-end) card.
  • the described arrangements also potentially have a reduced impact on privacy of card users.
  • the biometric signatures stored in the local database of the verification station can be made off limits to anyone, or limited to law enforcement agencies, depending on the administrative environment in which the arrangements are implemented. Users of current card systems can learn to use the described arrangements without much effort, needing only to provide a biometric signature.
  • a method of performing a transaction process using a verification station comprising the steps of: comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
  • a verification station for performing a transaction process, the verification station comprising: means for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and means for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
  • a computer program product including a computer readable medium having recorded thereon a computer program for directing a processor to execute a method for performing a transaction process using a verification station, said program comprising: code for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and code for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
  • a method of performing a transaction process using a verification station comprising the steps of: comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
  • PIN personal identification number
  • a verification station for performing a transaction process, the verification station comprising: means for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and means for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
  • PIN personal identification number
  • a computer program product including a computer readable medium having recorded thereon a computer program for directing a processor to execute a method for performing a transaction process using a verification station, said program comprising: code for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and code for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
  • PIN personal identification number
  • FIG. 1 depicts a standard credit card
  • Fig. 2 shows the card of Fig. 1 being used together with biometric verification
  • Fig. 3 is a functional block diagram of a special-purpose computer system upon which described methods for the described arrangements can be practiced;
  • Fig. 4 illustrates the use of a standard card in the described arrangements
  • Fig. 5 is a flow chart of a process for using the verification station of Fig. 3
  • Fig. 6 shows the verification process of Fig. 5 in more detail
  • Fig. 7 shows the enrolment process of Fig. 5 in more detail
  • Fig. 8 shows the card information process of Fig. 5 in more detail
  • Fig. 9 shows an alternate use for the described arrangements
  • Fig.lO is a flow chart of a process for using the verification station of Fig. 3
  • Fig. 11 is another flow chart of a process for using the verification station of Fig. 3.
  • Fig. 3 is a functional block diagram of a system 100 in which the described arrangements can be practiced.
  • the methods described herein particularly lend themselves to implementation on the special-purpose computer system 100 such as that shown in Fig. 3 wherein the processes of Figs. 5-8, 9 and 10 may be implemented as software, such as an application program executing within the computer system 100.
  • the steps of the described methods are effected by instructions in the software that are carried out by a verification station 127.
  • the verification station 127 is typically constructed in a tamper-proof manner, both physically and electronically, to prevent unauthorised access to the inner mechanism of the verification station 127.
  • the instructions may be formed as one or more code modules, each for performing one or more particular tasks.
  • the software may also be divided into two separate parts, in which a first part performs the described methods and a second part manages a user interface between the first part and the user.
  • the software may be stored in a computer readable medium, including the storage devices described below, for example.
  • the software is loaded into the verification station 127 from the computer readable medium, and is then executed by the verification station 127.
  • a computer readable medium having such software or computer program recorded on it is a computer program product.
  • the use of the computer program product in the computer preferably effects an advantageous apparatus for effecting the described arrangements.
  • the computer system 100 consists of a computer module 101, input devices such as a biometric reader 102, a card reader 112, and a keypad 103, output devices including an LCD (Liquid Crystal Display) display device 126 and a loudspeaker 117.
  • the computer module 101 uses a Modulator-Demodulator (Modem) transceiver device 116 for communicating to and from a communications network 120, for example connectable via a telephone line 121 or other functional medium.
  • the modem 116 can be used to obtain access to a back end system including a processor 122 and back-end database 123 over the Internet, and other network systems, such as a Local Area Network (LAN) or a Wide Area Network (WAN).
  • LAN Local Area Network
  • WAN Wide Area Network
  • the computer module 101 typically includes at least one processor unit 105, and a memory unit 106, for example formed from semiconductor random access memory (RAM) and read only memory (ROM).
  • the module 101 also includes a number of input/output (I/O) interfaces including an audio-video interface 107 that couples to the LCD display 126 and loudspeaker 117, an I/O interface 113 for the keypad 103, biometric reader 102 and card reader 112, and an interface 108 for the modem 116.
  • the modem 116 may be incorporated within the computer module 101, for example within the interface 108.
  • a storage device 109 is provided and typically includes a hard disk drive 110 and a flash memory 111.
  • the components 105 to 111 and 113 of the computer module 101 typically communicate via an interconnected bus 104 and in a manner that results in a conventional mode of operation of the computer system 100 known to those in the relevant art.
  • the application program is resident on the hard disk drive 110 and read and controlled in its execution by the processor 105. Intermediate storage of the program and any data fetched from the network 120 may be accomplished using the semiconductor memory 106, possibly in concert with the hard disk drive 110. In some instances, the application program may be supplied to the user encoded on the flash memory device 111, or alternatively may be read by the computer module 101 from the network 120 via the modem device 116.
  • computer readable medium refers to any storage or transmission medium that participates in providing instructions and/or data to the computer system 100 for execution and/or processing.
  • storage media include floppy disks, magnetic tape, CD-ROM, a hard disk drive, a ROM or integrated circuit, a magneto-optical disk, or a computer readable card such as a PCMCIA card and the like, whether or not such devices are internal or external of the computer module 101.
  • transmission media include radio or infra-red transmission channels as well as a network connection to another computer or networked device, and the Internet or Intranets including e-mail transmissions and information recorded on Websites and the like.
  • a standard card 601 has card information 605 typically comprising three fields, namely 602 which is the card type, 603 which is the card range, and 604 which comprises card data specific to the particular card 601.
  • the card data 604 may act as the memory reference which points, as depicted by an arrow 608, to a particular memory address 607 in a local database 124 in the verification station 127 of Fig. 3.
  • a personal identification number PIN may also act as the memory reference which points to the particular memory address 607 in the local database 124 in the verification system 127.
  • the fields 602 and 603, which together form a header 606, can be used by the described system to determine if the card 601 is to be processed according to the described methods or not. This is described in more detail in regard to Fig. 8.
  • the card user couples their card 601 (or key-fob or other card device) to the card reader 112.
  • the card information 605 is read by the card reader 112 and is initially buffered in the memory 106 (e.g., within RAM).
  • the card user is then required to input a biometric signature, such as fingerprint, face, iris, or other unique signature, into the biometric reader 102.
  • the card data 604 defines the location 607 in the local database 124 where their unique biometric signature is to be stored.
  • the card information 605 buffered in memory 106 is then also stored at the location 607 in the local database 124.
  • the card information 605 may be appended to the biometric signature stored at the location 607 within the local database 124.
  • the card user is merely required to present their unique biometric to the biometric reader 102 in order to perform a transaction.
  • the biometric signature provided by the user is compared to each of the signatures stored in the local database 124. Once verification is confirmed, through a match of the provided biometric signature to one of the stored signatures, the card information 605 is transferred from the local database 124 within the verification station 127 to the back-end processor 122 for completion of the transaction.
  • the back-end processor 122 does not see the difference between receiving the card information 605 from the verification station 127, and receiving it from a conventional card reader in the absence of the verification station implementing the described arrangements. This means that back-end processes (depicted by the back-end processor 122 and the back-end database 123) need no modification when incorporating the described arrangements into current card systems.
  • the verification station 127 see Fig. 3 compared to the normal card reader, however this is a relatively simple and inexpensive upgrade compared to the centralised arrangement depicted in Fig. 2.
  • the user may choose to also couple their card 601 to the card reader 112.
  • the card user after coupling their card 601 to the card reader 112, the card user is required to again present their unique biometric to the biometric reader 102.
  • the biometric signature provided by the card user is only compared to the biometric signature stored at the memory location 607 defined by the card data 604 read from their card 601 by the card reader 112.
  • the card information 605 is transferred from the local database 124 of the verification station 127 to the back-end processor 122 for completion of the transaction.
  • Fig. 5 shows a process 200 for using the verification station 127.
  • the user couples their card 601 to the card reader 112 to perform a transaction.
  • the user may merely present their unique biometric signature to the biometric reader 102 in order to perform a transaction.
  • a first step 201 the processor 105 determines if the card 601 has been read by the card reader 112. If this is not the case, then the process 200 follows a NO arrow back to the step 201. If, on the other hand, the card 601 has been read by the card reader 112, then the process 200 follows a YES arrow to a step 202 (see Fig. 8 for more details).
  • the processor 105 buffers the card information 605 that is read from the card 601 by the card reader 112 and processes the card information 605.
  • a request is presented to the card holder to provide a biometric signature to the biometric reader 102.
  • This request can be provided in an audio fashion by means of the audio interface 107 and the speaker 117, this being driven by suitable software running on the processor 105.
  • a suitable message can be displayed on the LCD display 126 by suitable software running on the processor 105.
  • the holder of the card 601 provides a biometric signature to the biometric reader 102.
  • the process 200 is directed to a step 204 that reads the contents of the local database 124 at an address defined by the card data 604. If the contents of this memory address match, to a sufficiently high degree of correspondence, the biometric signature received in the step 203 via the biometric reader 102, then the process follows a YES arrow to a step 205 (see Fig. 6 for more detail). It is noted that if the step 204 returns a YES value, then the biometric signature at the noted memory address was written into the local database 124 in an earlier enrolment phase.
  • the step 204 reads the biometric signature stored at a single memory address defined by the card data 604 and checks the stored biometric signature against the biometric signature received in the step 203. In the process 200, there is no need to search the database 124 to see if there is a match. Thus, the process 200 provides a particularly simple and fast biometric verification check. Once the step 205 has completed the verification process, the process 200 is directed according to an arrow 209 back to the step 201.
  • the process 200 follows NO arrow to a step 206.
  • the processor 105 determines if the biometric signature of the memory location defined by the card data 604 is empty. If this is the case, then the process 200 follows a YES arrow to a step 207 that performs an enrolment process for the card 601 (see Fig. 7 for more detail). The process 200 then follows the arrow 209 back to the step 201.
  • the process 200 follows a NO arrow to a step 208 that performs an alert process.
  • the process 200 then follows the arrow 209 back to the step 201.
  • the alert process 208 can include sending an alert message from the verification station 127 to the back end processor 122 for later action, for example by the police.
  • the alert process can also store the (unauthorised) signature for later use by the law enforcement authorities.
  • the verification station 127 is constructed in a tamper proof fashion to ensure that the process 200 of Fig. 5, particularly the steps 204- 207, are not accessible to unauthorised tampering.
  • Fig. 6 shows the verification process 205 from Fig. 5 in more detail.
  • the process 205 is entered from the step 204 in Fig. 5, after which a step 301 authorises the transaction.
  • This authorisation step 301 indicates that the biometric signature received by the biometric reader 102 in the step 203 matches the biometric signature previously stored in the local database 124 by a previous enrolment process 207 applied to the card in question.
  • a step 302 performs the transaction process, whatever that may be.
  • the step 302 comprises the user specifying the required amount of cash and the relevant account information via the keypad 103 (see Fig. 3), and the provision of a receipt and cash by the ATM (not shown).
  • the process 205 is directed back to the step 201 in Fig. 5.
  • Fig. 7 shows the enrolment process step 207 from Fig. 5 in more detail.
  • the process 207 is entered from the step 206 in Fig. 5, after which a step 401 stores the biometric signature received by the step 203 in the memory 124 at a memory address defined by the card data 604 received in the step 202 of Fig. 5.
  • the process 207 also retrieves the card information 605 that was previously buffered in the memory 106 at step 202, and stores the card information in the local database 124 at the memory address defined by the card data 604.
  • the aforementioned step 401 can store the biometric signature and card information 605 in encrypted form to reduce the probability that the signature can be acquired for unauthorised use, thus helping ensure the privacy of the card owner.
  • the biometric signature is stored as a biometric template representing the biometric signature provided by the user.
  • the following steps 402 and 403 have the same respective functions as the corresponding steps 301 and 302 in Fig. 6. After completion of the step 403, the process 207 is directed back to the step 201 in Fig. 5.
  • Fig. 8 shows the step 202 in Fig. 5 that is concerned with the processing of the card information 605 from the card 601 when the card 601 is read by the card reader 112 in the step 202 of Fig. 5.
  • the process 202 is entered from the step 201 in Fig. 5, after which a step 501 reads the card information 605 from the card 601 using the card reader 112 and buffers the card information 605 in the memory 106.
  • the processor 105 retrieves predefined "permitted card set" parameters to determine the "permitted card set" for the verification station 127 in question.
  • the permitted card set parameters may be retrieved from the local database 124 or from the hard disk drive 110, for example, and be also stored in the memory 106.
  • a separate, or overlapping, permitted card set may be defined for each verification station 127. This ensures that a limited population of cards such as 601 undergo the described processes at any given verification station 127. This has the advantage of ensuring that the local database 124 does not overflow, and it also provides control over which users make use of which verification stations. However, the permitted card set for any given verification station 127 is only limited by the size of the local database 124. Card information 605 from any number of cards 601 may be stored in the local database 124 of a particular verification station 127 if the amount of memory is sufficient.
  • the processor 105 may periodically run a clean-up process where all card information 605 and biometric signatures related to cards that have not been used for a predetermined period of time (e.g., twelve months) may be deleted from the local database 124.
  • a predetermined period of time e.g., twelve months
  • the processor 105 compares the header 606 against the predefined permitted card set parameters to determine if the card 601 belongs to the permitted card set for the verification station 127 in question. If this is the case, then the process 202 is directed by a YES arrow to the step 203 in Fig. 5. If, on the other hand, the card header 606 does not belong to the permitted card set for the particular verification station 127, then the step 202 follows a NO arrow from the step 503 to a step 504.
  • the processor 105 rejects the card that has been entered into the card reader 112. This rejection can take the form of a message displayed on the LCD display 126 and/or a corresponding audio message via the speaker 117. Thereafter, the process 202 is directed back to the step 201 in Fig. 5. It is noted that even if the verification station does not reject the card not belonging to the permitted card set for the verification station 127 in question, the back-end processor 122 can do so.
  • the predefined permitted card set details can be amended and/or the signatures stored in the database 124 can be deleted by a system administrator.
  • the system administrator may also periodically perform the clean-up process described above to delete card information 605 and biometric signatures related to cards that have not been used for a predetermined period of time (e.g., twelve months), so that the local database 124 does not overflow.
  • Audit trail information is also stored in the verification station 127 and can be downloaded for audit purposes.
  • the audit information typically includes information of which cards have been submitted to the verification station and the time stamps of the card submissions.
  • Biometric signatures are typically not part of the downloadable audit information, and require a greater level of authorisation (such as that associated with law enforcement agencies) for access.
  • Fig. 10 shows a process 1000 for performing a transaction using the described arrangement.
  • the process 1000 may be performed by the owner of the card 601, for example, in later verification phases once the owner has previously performed the initial enrolment phase, so that their biometric signature and a copy of the card information 605 has been stored in the local database 124. Accordingly, the stored copy of the card information 605 was read from the card 601 and stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127.
  • the user may merely present their unique biometric signature to the biometric reader 102 in order to perform a transaction.
  • a biometric signature as provided by the owner of the card 601 to the biometric reader 102.
  • the biometric signature may be temporarily buffered in the memory 106.
  • the process 1000 is directed to a step 1004 that reads the contents of the local database 124 at a first address and compares a biometric signature stored at that first address to the biometric signature received at step 1001.
  • the first address may be selected randomly.
  • the first address may be selected in an ordered fashion. For example, the first address may be selected as the first address in a particular block of memory.
  • the process 1000 compares the received biometric signature, inputted to the biometric reader 102 and buffered in memory 106, to a biometric signature stored at a first address in the local database 124 (or memory) incorporated into the verification station 127. As will be described, if the received biometric signature stored at the first memory address does not match the biometric signature stored at the first address, then the process 1000 compares the received biometric signature to one or more further biometric signatures stored in the local database 124 (or memory) incorporated into the verification station 127.
  • step 1005 if the biometric signature stored at the first memory address matches, to a sufficiently high degree of correspondence, the inputted biometric signature received in the step 1001, then the process 1000 follows a YES arrow to a step 1006. It is noted that if the step 1005 returns a YES value, then the biometric signature at the first memory address was written into the memory 124 in an earlier enrolment phase together with the card information 605.
  • the process 1000 indicates that the biometric signature received by the biometric reader 102 in the step 203 matches one of the biometric signatures previously stored in the local database 124 by a previous enrolment process 207 applied for the card 601 in question.
  • a next step 1008 performs the transaction process, whatever that may be, using the copy of the card information 605 stored in the local database 124.
  • the transaction process will require the card information 605 to be transferred from the verification station 127 to the back-end processor 122 for completion of the transaction.
  • a transaction process if the process 1000 of Fig.
  • the step 1008 comprises the card owner specifying the required amount of cash and the relevant account information via the keypad 103 (see Fig. 3), and the provision of a receipt and cash by the ATM (not shown). Accordingly, the stored copy of the card information 605 used in the performed transaction process was read from the card 601 and stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127.
  • ATM Automatic Teller Machine
  • step 1008 After completion of the step 1008, the process 1000 is directed back to step 1001 or to the step 201 in Fig. 5.
  • step 1005 the biometric signature stored at the first memory address does not match the biometric signature received in the step 1001, then the process 1000 follows a NO arrow to a step 1007.
  • step 1007 if the processor 105 determines that there are no further biometric signatures stored in the local database 124 to compare with the received biometric signature, then the process 1000 returns to step 1001 or to the step 201 in Fig. 5. If the processor 105 determines at step 1007 that there are further biometric signatures stored in the local database 124 to compare with the received biometric signature, then the process 1000 returns to step 1004.
  • the processor 105 reads the contents of the local database 124 at a further address and compares a biometric signature stored at that further address to the biometric signature received at step 1001.
  • Fig. 9 shows another application 900 to which the described arrangements can be applied.
  • a person purchases or hires a verification station implemented in a portable form.
  • a step 901 is performed at a registered supplier premises.
  • the enrolment process is performed in controlled circumstances at the supplier premises.
  • the "controlled conditions" referred to mean that the enrolment process is performed under conditions where the identity of the holder of the card 601 is verified, using a driving licence, passport or equivalent identification document, this ensuring that the enrolment process enrols the true owner of the card in an authorised manner.
  • the verification station together with the card 601 can be used for third party transactions.
  • the holder of the card 601 can take the portable verification station and connect it to his or her personal computer (PC) in order to participate in an on-line casino.
  • PC personal computer
  • This type of application may require that the portable verification station be loaded with a station identification number (which can be the serial number of the portable verification station) at the registered supplier premises.
  • This station identification number is then transmitted to the on-line casino back-end processes together with the card information 605.
  • This type of application does require some modification of the back-end processes.
  • a card user is required to enrol at each individual verification station 127.
  • a user may be able to enrol at one verification station 127 and the user's biometric signature and card information 605 may be broadcast over the communications network 120 to one or more other verification stations connected to the communications network 120.
  • the broadcast biometric signature and card information 605 may then be stored in the local databases of each of those verifications stations to which the biometric signatures and card information 605 have been broadcast.
  • Such an arrangement may be referred to as a 'minimum enrolment' arrangement.
  • the minimum enrolment arrangement is particularly advantageous for Electronic Funds Transfer Point of Sale (EFTPOS) transactions, ATM transactions and the like.
  • EFTPOS Electronic Funds Transfer Point of Sale
  • the verification station 127 described above may be added to an EFTPOS terminal or ATM.
  • the broadcasting of the biometric signature and card information 605 increases the security of the transactions made with the verification stations.
  • the card user couples their card 601 to the card reader 112 of the verification station 127 in a similar manner to that described above.
  • the card information 605 is read by the card reader 112 and is initially buffered in the memory 106 (e.g., within RAM) of the verification station 127.
  • the card user is then required to input a biometric signature, such as fingerprint, face, iris, or other unique signature, into the biometric reader 102.
  • the buffered card data 604 defines the location 607 in the local database 124 where the card user's unique biometric signature is to be stored.
  • the card information 605 buffered in memory 106 may then also stored at the location 607 in the local database 124. As described above, the card information 605 may be appended to the biometric signature stored at the location 607 within the local database 124. In the minimum enrolment arrangement, following the storing of the user's biometric signature in the local database 124, a copy of the user's biometric signature, together with a copy of the card information 605 read from the user's card, is broadcast over the communications network 120 to one or more of the other verification stations connected to the network.
  • the card user's unique biometric signature together with the card information 605 corresponding to the biometric signature is then stored in the local database (e.g., 124) of each verification station to which the biometric signature and card information 605 has been broadcast.
  • the biometric signature and card information 605 is stored at a particular memory address, as defined by the card data 604, in each of the local databases. The storing of the card information 605 in the each of the local databases of the verification stations allows biometric only transactions as described above to be performed.
  • updates to the contents of a local database within a particular verification station 127 or indeed the entire contents of the local database may be broadcast periodically (e.g., overnight).
  • the card user is only required to enrol on one verification station 127 connected to the communication network 127 and each of the other verifications stations connected to the communications network 120 will receive a copy of the card user's enrolled biometric signature and possibly the card information 605 corresponding to that biometric signature.
  • the user may make biometric only transactions, as described above with reference to Fig, 10, at each of the verification stations connected to the communications network 120 after enrolling on one of the verification stations 127.
  • the user may also choose to couple their card to the card reader (e.g., 112) of one of the verifications stations and present their unique biometric signature in order to perform a transaction, as described above.
  • the card information 605 buffered in memory 106 is then also stored at the location 607 in the local database 124 and may be used to point to the location 607 in the local database 124.
  • the card user may also enter a PIN using the keypad 103.
  • the PIN is required to be entered within a predetermined time period.
  • the PIN may be any number and/or letter sequence including names and easy to remember patterns.
  • the PIN is then also stored at the location 607 in the local database 124. Again, the PIN may be appended to the biometric signature stored at the location 607. Therefore, the local database 124 contains the biometric signature, the card information 605 (or key-fob information) and the PIN of a card user.
  • the PIN may be used to define a pointer to the memory location 607 in the local database which is the same location 607 pointed to by the card data 604. Thereafter, in later verification phases, the card user is required to present their unique biometric to the biometric reader 102 and then enter their PIN using the keypad 103, in order to perform a transaction.
  • the PBSf may be required to be entered within a predetermined period of time.
  • the biometric signature provided by the card user is only compared to the biometric signature stored at the memory location 607 defined by the user's PIN entered by the user into the keypad 103.
  • the card information 605 is transferred from the local database 124 within the verification station 127 to the back-end processor 122 for completion of the transaction.
  • a request is presented to the card holder to provide a PIN to the keypad 103.
  • This request can be provided in an audio fashion by means of the audio interface 107 and the speaker 117, this being driven by suitable software running on the processor 105.
  • a suitable message can be displayed on the LCD display 126 by suitable software running on the processor 105.
  • the PIN entered into the keypad 103 is stored in the local database 124 at the memory address defined by the card data 604.
  • the biometric signature, PIN and card information 605 may stored in encrypted form to reduce the probability that the signature can be acquired for unauthorised use.
  • Fig. 11 shows another process 1100 for performing a transaction using the described arrangement.
  • the process 1000 may be performed by the owner of the card 601, for example, in later verification phases once the owner has previously performed the initial enrolment phase, so that their biometric signature, a copy of the card information 605 and a PIN has been stored in the local database 124. Accordingly, the stored copy of the card information 605 was read from the card 601 and together with the PIN entered by the user was stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127.
  • the user may present their unique biometric signature to the biometric reader 102 together with their PIN in order to perform a transaction.
  • the processor 105 receives a biometric signature as provided by the owner of the card 601 to the biometric reader 102.
  • the biometric signature may be temporarily buffered in the memory 106.
  • the process 1000 is directed to a step 1003.
  • the processor 105 receives a PIN as provided by the owner of the card 601 to the keypad 103.
  • the keypad 103 may be similar to a telephone where letters are also displayed on the keys together with the numbers.
  • the keypad 103 may be in addition to another keypad (e.g., an existing keypad on an Automatic Teller Machine in which the verification station 127 has been installed.
  • the processor 105 reads the contents of the local database 124 at an address defined by the entered PIN and compares a biometric signature stored at that address to the biometric signature received at step 1101.
  • step 1105 if the biometric signature stored at the memory address defined by the PIN matches, to a sufficiently high degree of correspondence, the inputted biometric signature received in the step 1101, then the process 1000 follows a YES arrow to a step 1106. It is noted that if the step 1105 returns a YES value, then the biometric signature at the memory address and the PIN was written into the memory 124 in an earlier enrolment phase together with the card information 605.
  • the process 1100 indicates that the biometric signature received by the biometric reader 102 in the step 203 matches the biometric signature previously stored in the local database 124 by a previous enrolment process 207 applied for the card 601 in question.
  • a next step 1108 performs the transaction process, whatever that may be, using the copy of the card information 605 stored in the local database 124.
  • the transaction process will require the card information 605 to be transferred from the verification station 127 to the back-end processor 122 for completion of the transaction.
  • a transaction process if the process 1100 of Fig.
  • the step 1108 comprises the card owner specifying the required amount of cash and the relevant account information via the keypad 103 (see Fig. 3), and the provision of a receipt and cash by the ATM (not shown). Accordingly, the stored copy of the card information 605 used in the performed transaction process was read from the card 601 and stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127.
  • ATM Automatic Teller Machine
  • step 1108 After completion of the step 1108, the process 1100 is directed back to step 1101, to step 1001 in Fig. 10 or to the step 201 in Fig. 5.
  • step 1105 the biometric signature stored at the memory address defined by the PIN does not match the biometric signature received in the step 1001
  • the process 1000 follows a NO arrow to a to step 1101, to step 1001 in Fig. 10 or to the step 201 in Fig. 5.
  • the PIN may be any number and/or letter sequence including names and easy to remember patterns. This allows the card user to select a PIN which may be memorised by recalling letters, which are associated with the numbers similar to a telephone number.
  • a copy of the user's biometric signature and PIN, together with a copy of the card information 605 read from the user's card is broadcast over the communications network 120 to one or more of the other verification stations connected to the network.
  • the card user's unique biometric signature and PIN, together with the card information 605 corresponding to the biometric signature is then stored in the local database (e.g., 124) of each verification station to which the biometric signature, PIN and card information 605 has been broadcast.
  • the biometric signature, PIN and card information 605 is stored at a particular memory address, as defined by the card data 604 and PIN, in each of the local databases.
  • the storing of the card information 605 in the each of the local databases of the verification stations allows biometric and PIN only transactions as described above to be performed.
  • the PIN arrangement and the other arrangements described above can be easily integrated to a security or financial platform system, as an additional component to verify the card user at entry/excess access points.
  • the arrangements may be performed ONLINE or OFFLINE.
  • the PIN arrangement does not require extensive database searching in order to locate a matching biometric and is therefore the verification is able to be performed in an efficient manner. Further, an incorrectly entered PIN may be used to generate an warning alarm or door chime
  • the card user may merely enter their biometric signature possibly together with a PIN.
  • the entire card information 605 of the user's Medicare card is stored in the local database 124 of the verification station 127 located at the medical centre.
  • the described arrangements can be added to ATM machines, wherein the card user is required to enter their biometric signature for verification prior to entering their normal ATM PIN and withdrawing funds, thereby increasing the security of the ATM arrangement with minimal changes to the underlying platform.
  • the ATM PIN may be used to point to the stored biometric signature.
  • the card user may merely enter their biometric signature, possibly together with their PIN, to withdraw funds.
  • the described arrangements can be used for secure access to a hotel room or any other room, building, cabinet, or apparatus to which secure access is required.
  • the hotel may have a verification station 127 mounted on each door of the hotel.
  • the hotel issues the guest with a card containing a number defining a particular room number and planned departure date.
  • the number on the card is preferably one of an increasing sequence of numbers.
  • the number preferably increases over a period of time and is also encrypted.
  • a verification station 127 positioned at the door of the room corresponding to the room number may be configured so that the verification station 127 will only allow enrolments and verifications if the number stored on a presented card correctly identifies the room and is in the correct sequence.
  • the verification station 127 may also include a real time clock to match actual time against the planned date of departure. After the guest enrols their biometric signature at the verification station 127 using the aforementioned card in the manner described above, the arrangement will give them secure access to their room for the duration of their stay.
  • the above hotel guest may use their card and a biometric signature (e.g., a fingerprint) to enter the room.
  • a biometric signature e.g., a fingerprint
  • the guest may merely present their biometric signature, possibly together with a PIN, to enter the room as described above negating the requirement for the guests to carry the room card, plus increasing security and convenience.
  • the verification station 127 may also be configured so that the guest may choose not to enrol their biometric signature if they do not wish to have a record of their biometric signature stored within the local database of the verification station 127.
  • the verification station 127 located at the door of a particular hotel room or other secure access entry as described above may also allocate memory for storage of any number of biometric signatures (e.g., fingerprints) to be associated with the new card.
  • the hotel guest and all associated guests e.g., the hotel guest's family
  • the enrolment may simply be achieved, for example, by inserting the card and placing a finger on the biometric reader 102, for each guest.
  • the card or the biometric signature can be used to gain access to the room, again, negating the requirement for each of the guests to carry the room card, plus increasing security and convenience.
  • the benefit of having the card locate the biometric signature (e.g., fingerprints) memory address is that the time and date of departure can also be added to the same memory location. Therefore, the hotel application also allows other related data to be added to the memory location, enhancing the capability of the described arrangement.
  • the ability to associate a memory location with a card number and expiry date can be related to many diverse applications, but utilises the same principle as storage of the fingerprint data.
  • the arrangements can be installed at passport control and customs in various countries, and a person can enrol their biometric, after using their existing passport or ID card to pass through customs.
  • the biometric signature is stored in a memory location related to the individual's passport or ID number, and retrieved for comparison as described in relation to Figs. 5 and 10.
  • the verification stations 127 may be configured to provide the card user with the option of performing transactions with the card 601 only.
  • the card user may not wish to provide their biometric signature.
  • the card user may use their card only to perform a transaction with the verification stations in a conventional manner.

Abstract

A method of performing a transaction process using a verification station (127) is disclosed. The method compares a first biometric signature, inputted to a biometric reader (102) incorporated into the verification station (127), to one or more further biometric signatures stored in a memory (124) incorporated into the verification station (127). The method performs the transaction process using card information stored in the memory (124), if the inputted biometric signature matches one of the stored biometric signatures, otherwise, the transaction is not performed. The stored card information was read from a card device (112) and stored in the memory (124) during a previous transaction process using a card device reader (112) incorporated into the verification station (127).

Description

METHOD AND APPARATUS FOR PERFORMING A TRANSACTION USING A
VERIFICATION STATION Field of the Invention
The present invention relates generally to security issues and, in particular, to security issues associated with use of card devices such as credit cards, smart cards, and wireless card-equivalents such as wireless transmitting fobs.
Background
This description makes reference to various types of "card device" and their associated "reader devices" (respectively referred to merely as cards and readers). The card devices all contain card information that is accessed by "coupling" the card device to an associated reader device. The card information is used for various purposes including drawing cash from an Automatic Teller Machine (ATM), making a purchase on credit, updating a loyalty point account, gaining access to a restricted area or controlled device and so on. The card information is typically accessed from the card by a corresponding card reader which then sends the card information to a "back-end" system that completes the appropriate transaction or process.
One type of card device is the "standard credit card" which in this description refers to a traditional plastic card 701 as depicted in Fig. 1. The standard credit card is typically "swiped" through a slot in a standard credit card reader in order to access card information 702 on the card 701. The card information 702 can alternately be encoded using an optical code such as a bar code, in which case the reader is suitably adapted.
The standard credit card 701 also typically has the signature 703 of the card-owner written onto a paper strip on the card 701. This is used for verification of the identity of the person submitting the card when conducting a transaction using the card 701. Another type of card device is the smart card (not shown) that typically has an on-board processor and a memory. The smart card typically has electrical contacts that mate with corresponding contacts on a smart card reader (not shown) when accessing data in the memory of the smart card.
Still another type of card device is a proximity card (not shown) that typically has an on-board microchip. A proximity card reader sends out a low-level radio frequency (RF) signal, which energizes the microchip embedded in the card when the card is placed in close proximity to the reader. The proximity card then transmits data in the form of a unique code to the reader.
Still another type of card device is the wireless "key-fob" which is a small radio transmitter that emits an RF signal when a button on the fob is pressed. The RF signal can be encoded using the Wiegand protocol, or any other suitable protocol, such as rolling code or Bluetooth™ and can include encryption if desired. The key-fob typically has a processor and memory storing data that is sent via the transmitted signal to a corresponding receiver, which is the "reader device" for this type of card device.
The description also refers to "card user" and "card owner". The card user is the person who submits the card for a particular transaction. The card user can thus be the (authorised) card owner or an (unauthorised) person who has found or stolen the card.
Currently, the above described cards are heavily relied on both for financial transactions, as described above, and also for secure access. However, the cards are often used fraudulently. For example, a card may be used without the consent of the card owner to gain access to a bank account. Further, data stored on a card may be copied and used to gain access to a building or the like.
Clearly the signature 703 on the standard credit card 701 in Fig. 1 can be forged.
Thus, if the standard card 701 is stolen or lost, an unauthorised user can use the card provided that they can supply a sufficiently accurate version of the signature 703. The only recourse available to the card owner is to notify the card issuing company to
"cancel" the card. Current card devices such as the standard credit card, the smart card and the key- fob can have their security enhanced by requiring the card user to provide PIN (Personal Identification Number) information through a keypad to verify their identity prior to completing a transaction. However, PIN information can also be "stolen" by surveillance of the card owner's hands as the card owner operates the keypad.
Biometric verification can also be incorporated into current card systems to enhance security. In Fig. 2 the card user swipes the standard card 701 through an associated card reader (not shown) that accesses the card information 702 on the card 701. The card user also provides a biometric signature 801, for example by pressing their thumb against a biometric (e.g., fingerprint) reader 802. The card information 702 that is read by the card reader (not shown), together with the biometric signature that is read by the biometric (fingerprint) reader 802, are sent, as depicted by a dashed arrow 803, a computer network 804, and a further dashed arrow 805, to a back-end system including a database 806 and associated processor (not shown). In this arrangement, the card owner needs to have previously registered their biometric signature 801 and the card information 702 for pre-loading onto the back-end database 806. Having done so, the back-end processor (not shown) compares the preloaded information on the database 806 with the information received at 805, in order to check that the card holder of the card 701 is the (authorised) card owner and that the card itself is valid, in which case the transaction in question can proceed. Clearly this arrangement requires a central repository (806) of card information 702 and biometric signatures 801. This is cumbersome and potentially compromises the privacy and security of the holder of the card 701. This arrangement also requires complex back-end database management and the communications network 804. Furthermore, the front-end biometric signature reader 802 requires storage and/or processing capabilities for the biometric signatures. This results in a complex and expensive solution. Privacy concerns have also been raised against the arrangement of Fig. 2 which involves centralised storage and processing of personal information including biometric information. These concerns have slowed widespread use of biometrics to enhance user verification. Another disadvantage of the arrangement of Fig. 2 is that even once the card owner's biometric signature 801 and card information 702 has be pre-loaded onto the back-end database 806, the card owner is still required to carry the card and to validate the card for each transaction. This is inconvenient as the card is often lost or damaged.
Summary
It is an object of the present invention to substantially overcome, or at least ameliorate, one or more disadvantages of existing arrangements.
Disclosed are arrangements which seek to address the above problems by automatically storing a card user's biometric signature in a local memory in a verification station comprising a card reader, a biometric signature reader, the local biometric signature memory (preferably in a mechanically and electronically tamper-proof form), an alphanumeric keypad (optional), and a communication module for communicating with back-end system that may be remotely accessible over a network.
As described herein, when the description refers to "the storing of a biometric signature" in a memory, a person skilled in the art would understand that rather than the actual biometric signature it is a representation of the biometric signature that is actually stored in the memory. This representation may be referred to as a "biometric template" or
"template".
The card user's biometric signature is automatically stored the first time the card user uses the verification station in question (this being referred to as the enrolment phase). The biometric signature is stored at a memory address together with a copy of the card information on the user's card as read by the card reader of the verification station. The memory address may be defined by the ("unique") card information on the user's card. The term "unique" means unique in the context of a permitted set of cards associated with the verification station. This is described in more detail in regard to Fig. 8.
All future uses (referred to as uses in the verification phase) of the particular verification station by the user of the aforementioned card requires the user to merely submit a biometric signature (e.g., thumb print or retinal scan etc.), which is compared to the signatures stored in the memory associated with the verification station. Once the submitted biometric signature has been matched to one of the biometric signatures stored in the memory, the card information stored with the stored biometric signature is sent to the back-end system.
An authorised user will be automatically verified by the arrangement in the verification station, and the corresponding transaction, be it an ATM cash withdrawal, a credit purchase, a loyalty point update, allowing entry to a restricted area etc. will simply proceed as normal. The biometric signature of an unauthorised user will be captured in the verification station, and can be used by the authorities to track the unauthorised user.
The described arrangements require virtually no modification at all of the back- end systems or the (front-end) card. The additional administrative overheads associated with the described arrangements, above those already required for systems using (standard) cards and back-end systems, are minimal. The described arrangements also potentially have a reduced impact on privacy of card users. The biometric signatures stored in the local database of the verification station can be made off limits to anyone, or limited to law enforcement agencies, depending on the administrative environment in which the arrangements are implemented. Users of current card systems can learn to use the described arrangements without much effort, needing only to provide a biometric signature.
According to one aspect of the present invention there is provided a method of performing a transaction process using a verification station, the method comprising the steps of: comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
According to another aspect of the present invention there is provided a verification station for performing a transaction process, the verification station comprising: means for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and means for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station. According to still another aspect of the present invention a computer program product including a computer readable medium having recorded thereon a computer program for directing a processor to execute a method for performing a transaction process using a verification station, said program comprising: code for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and code for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
According to still another aspect of the present invention there is provided a method of performing a transaction process using a verification station, the method comprising the steps of: comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station. According to still another aspect of the present invention there is provided a verification station for performing a transaction process, the verification station comprising: means for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and means for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
According to still another aspect of the present invention there is provided a computer program product including a computer readable medium having recorded thereon a computer program for directing a processor to execute a method for performing a transaction process using a verification station, said program comprising: code for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and code for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
Other aspects of the invention are also disclosed.
Brief Description of the Drawings Some aspects of the prior art and one or more embodiments of the present invention will now be described with reference to the drawings, in which: Fig. 1 depicts a standard credit card;
Fig. 2 shows the card of Fig. 1 being used together with biometric verification; Fig. 3 is a functional block diagram of a special-purpose computer system upon which described methods for the described arrangements can be practiced;
Fig. 4 illustrates the use of a standard card in the described arrangements; Fig. 5 is a flow chart of a process for using the verification station of Fig. 3; Fig. 6 shows the verification process of Fig. 5 in more detail; Fig. 7 shows the enrolment process of Fig. 5 in more detail; Fig. 8 shows the card information process of Fig. 5 in more detail;
Fig. 9 shows an alternate use for the described arrangements; Fig.lO is a flow chart of a process for using the verification station of Fig. 3; and Fig. 11 is another flow chart of a process for using the verification station of Fig. 3. Detailed Description including Best Mode
Where reference is made in any one or more of the accompanying drawings to steps and/or features, which have the same reference numerals, those steps and/or features have for the purposes of this description the same function(s) or operation(s), unless the contrary intention appears. Fig. 3 is a functional block diagram of a system 100 in which the described arrangements can be practiced. The methods described herein particularly lend themselves to implementation on the special-purpose computer system 100 such as that shown in Fig. 3 wherein the processes of Figs. 5-8, 9 and 10 may be implemented as software, such as an application program executing within the computer system 100. In particular, the steps of the described methods are effected by instructions in the software that are carried out by a verification station 127. The verification station 127 is typically constructed in a tamper-proof manner, both physically and electronically, to prevent unauthorised access to the inner mechanism of the verification station 127. The instructions may be formed as one or more code modules, each for performing one or more particular tasks. The software may also be divided into two separate parts, in which a first part performs the described methods and a second part manages a user interface between the first part and the user.
The software may be stored in a computer readable medium, including the storage devices described below, for example. The software is loaded into the verification station 127 from the computer readable medium, and is then executed by the verification station 127. A computer readable medium having such software or computer program recorded on it is a computer program product. The use of the computer program product in the computer preferably effects an advantageous apparatus for effecting the described arrangements.
The computer system 100 consists of a computer module 101, input devices such as a biometric reader 102, a card reader 112, and a keypad 103, output devices including an LCD (Liquid Crystal Display) display device 126 and a loudspeaker 117. The computer module 101 uses a Modulator-Demodulator (Modem) transceiver device 116 for communicating to and from a communications network 120, for example connectable via a telephone line 121 or other functional medium. The modem 116 can be used to obtain access to a back end system including a processor 122 and back-end database 123 over the Internet, and other network systems, such as a Local Area Network (LAN) or a Wide Area Network (WAN).
The computer module 101 typically includes at least one processor unit 105, and a memory unit 106, for example formed from semiconductor random access memory (RAM) and read only memory (ROM). The module 101 also includes a number of input/output (I/O) interfaces including an audio-video interface 107 that couples to the LCD display 126 and loudspeaker 117, an I/O interface 113 for the keypad 103, biometric reader 102 and card reader 112, and an interface 108 for the modem 116. In some implementations, the modem 116 may be incorporated within the computer module 101, for example within the interface 108.
A storage device 109 is provided and typically includes a hard disk drive 110 and a flash memory 111. The components 105 to 111 and 113 of the computer module 101, typically communicate via an interconnected bus 104 and in a manner that results in a conventional mode of operation of the computer system 100 known to those in the relevant art.
Typically, the application program is resident on the hard disk drive 110 and read and controlled in its execution by the processor 105. Intermediate storage of the program and any data fetched from the network 120 may be accomplished using the semiconductor memory 106, possibly in concert with the hard disk drive 110. In some instances, the application program may be supplied to the user encoded on the flash memory device 111, or alternatively may be read by the computer module 101 from the network 120 via the modem device 116.
Still further, the software can also be loaded into the computer system 100 from other computer readable media. The term "computer readable medium" as used herein refers to any storage or transmission medium that participates in providing instructions and/or data to the computer system 100 for execution and/or processing. Examples of storage media include floppy disks, magnetic tape, CD-ROM, a hard disk drive, a ROM or integrated circuit, a magneto-optical disk, or a computer readable card such as a PCMCIA card and the like, whether or not such devices are internal or external of the computer module 101. Examples of transmission media include radio or infra-red transmission channels as well as a network connection to another computer or networked device, and the Internet or Intranets including e-mail transmissions and information recorded on Websites and the like.
As illustrated in Fig. 4, a standard card 601 has card information 605 typically comprising three fields, namely 602 which is the card type, 603 which is the card range, and 604 which comprises card data specific to the particular card 601. In the described arrangements, the card data 604 may act as the memory reference which points, as depicted by an arrow 608, to a particular memory address 607 in a local database 124 in the verification station 127 of Fig. 3. In another arrangement, a personal identification number (PIN) may also act as the memory reference which points to the particular memory address 607 in the local database 124 in the verification system 127.
The fields 602 and 603, which together form a header 606, can be used by the described system to determine if the card 601 is to be processed according to the described methods or not. This is described in more detail in regard to Fig. 8.
In an initial enrolment phase, the card user couples their card 601 (or key-fob or other card device) to the card reader 112. The card information 605 is read by the card reader 112 and is initially buffered in the memory 106 (e.g., within RAM). The card user is then required to input a biometric signature, such as fingerprint, face, iris, or other unique signature, into the biometric reader 102. The card data 604 defines the location 607 in the local database 124 where their unique biometric signature is to be stored. In the described arrangements, once the biometric signature has been stored in the local database 124 at the location 607, the card information 605 buffered in memory 106 is then also stored at the location 607 in the local database 124. For example, the card information 605 may be appended to the biometric signature stored at the location 607 within the local database 124.
Thereafter, in later verification phases, the card user is merely required to present their unique biometric to the biometric reader 102 in order to perform a transaction. In this instance, the biometric signature provided by the user is compared to each of the signatures stored in the local database 124. Once verification is confirmed, through a match of the provided biometric signature to one of the stored signatures, the card information 605 is transferred from the local database 124 within the verification station 127 to the back-end processor 122 for completion of the transaction.
Importantly, the back-end processor 122 does not see the difference between receiving the card information 605 from the verification station 127, and receiving it from a conventional card reader in the absence of the verification station implementing the described arrangements. This means that back-end processes (depicted by the back-end processor 122 and the back-end database 123) need no modification when incorporating the described arrangements into current card systems. There are additional elements in the verification station 127 (see Fig. 3) compared to the normal card reader, however this is a relatively simple and inexpensive upgrade compared to the centralised arrangement depicted in Fig. 2. Alternatively, rather than only providing their biometric signature in later verification phases, the user may choose to also couple their card 601 to the card reader 112. In this instance, after coupling their card 601 to the card reader 112, the card user is required to again present their unique biometric to the biometric reader 102. In this instance, rather than the biometric signature provided by the user being compared to all of the signatures stored in the local database 124 to determine a match, the biometric signature provided by the card user is only compared to the biometric signature stored at the memory location 607 defined by the card data 604 read from their card 601 by the card reader 112. Again, once verification is confirmed, the card information 605 is transferred from the local database 124 of the verification station 127 to the back-end processor 122 for completion of the transaction. Fig. 5 shows a process 200 for using the verification station 127. In the described process 200, rather than only providing their biometric signature in verification phases following the initial enrolment phase, the user couples their card 601 to the card reader 112 to perform a transaction. As described below, in another process 1000, in later verification phases following the initial enrolment phase, the user may merely present their unique biometric signature to the biometric reader 102 in order to perform a transaction.
In a first step 201, the processor 105 determines if the card 601 has been read by the card reader 112. If this is not the case, then the process 200 follows a NO arrow back to the step 201. If, on the other hand, the card 601 has been read by the card reader 112, then the process 200 follows a YES arrow to a step 202 (see Fig. 8 for more details). In the step 202, the processor 105 buffers the card information 605 that is read from the card 601 by the card reader 112 and processes the card information 605. In a following step 203 a request is presented to the card holder to provide a biometric signature to the biometric reader 102. This request can be provided in an audio fashion by means of the audio interface 107 and the speaker 117, this being driven by suitable software running on the processor 105. Alternatively or in addition, a suitable message can be displayed on the LCD display 126 by suitable software running on the processor 105.
In response to the aforementioned request, the holder of the card 601 provides a biometric signature to the biometric reader 102. After the signature has been received by the step 203, the process 200 is directed to a step 204 that reads the contents of the local database 124 at an address defined by the card data 604. If the contents of this memory address match, to a sufficiently high degree of correspondence, the biometric signature received in the step 203 via the biometric reader 102, then the process follows a YES arrow to a step 205 (see Fig. 6 for more detail). It is noted that if the step 204 returns a YES value, then the biometric signature at the noted memory address was written into the local database 124 in an earlier enrolment phase. It is also noted that the step 204 reads the biometric signature stored at a single memory address defined by the card data 604 and checks the stored biometric signature against the biometric signature received in the step 203. In the process 200, there is no need to search the database 124 to see if there is a match. Thus, the process 200 provides a particularly simple and fast biometric verification check. Once the step 205 has completed the verification process, the process 200 is directed according to an arrow 209 back to the step 201.
Returning to the step 204, if the biometric signature of the local database 124 at the memory address defined by the card data 604 does not match the signature received by the biometric reader 102, then the process 200 follows NO arrow to a step 206. In the step 206, the processor 105 determines if the biometric signature of the memory location defined by the card data 604 is empty. If this is the case, then the process 200 follows a YES arrow to a step 207 that performs an enrolment process for the card 601 (see Fig. 7 for more detail). The process 200 then follows the arrow 209 back to the step 201.
Returning to the step 206, if the biometric signature of the aforementioned memory location is not empty, then this means that (i) the card 601 and the associated biometric signature of the card holder have previously been used for the enrolment process 207, and (ii) the biometric signature now received in the step 203 does not match the signature stored in the local database 124. In this event, the process 200 follows a NO arrow to a step 208 that performs an alert process. The process 200 then follows the arrow 209 back to the step 201. The alert process 208 can include sending an alert message from the verification station 127 to the back end processor 122 for later action, for example by the police. The alert process can also store the (unauthorised) signature for later use by the law enforcement authorities.
As noted in regard to Fig. 3, the verification station 127 is constructed in a tamper proof fashion to ensure that the process 200 of Fig. 5, particularly the steps 204- 207, are not accessible to unauthorised tampering.
Fig. 6 shows the verification process 205 from Fig. 5 in more detail. The process 205 is entered from the step 204 in Fig. 5, after which a step 301 authorises the transaction. This authorisation step 301 indicates that the biometric signature received by the biometric reader 102 in the step 203 matches the biometric signature previously stored in the local database 124 by a previous enrolment process 207 applied to the card in question.
After the step 301, a step 302 performs the transaction process, whatever that may be. Thus, for example, if the process 200 of Fig. 5 relates to withdrawal of cash from an Automatic Teller Machine (ATM), then the step 302 comprises the user specifying the required amount of cash and the relevant account information via the keypad 103 (see Fig. 3), and the provision of a receipt and cash by the ATM (not shown). After completion of the transaction process by the step 302, the process 205 is directed back to the step 201 in Fig. 5.
Fig. 7 shows the enrolment process step 207 from Fig. 5 in more detail. The process 207 is entered from the step 206 in Fig. 5, after which a step 401 stores the biometric signature received by the step 203 in the memory 124 at a memory address defined by the card data 604 received in the step 202 of Fig. 5. At step 401, the process 207 also retrieves the card information 605 that was previously buffered in the memory 106 at step 202, and stores the card information in the local database 124 at the memory address defined by the card data 604. The aforementioned step 401 can store the biometric signature and card information 605 in encrypted form to reduce the probability that the signature can be acquired for unauthorised use, thus helping ensure the privacy of the card owner. As described above, the biometric signature is stored as a biometric template representing the biometric signature provided by the user. The following steps 402 and 403 have the same respective functions as the corresponding steps 301 and 302 in Fig. 6. After completion of the step 403, the process 207 is directed back to the step 201 in Fig. 5.
Fig. 8 shows the step 202 in Fig. 5 that is concerned with the processing of the card information 605 from the card 601 when the card 601 is read by the card reader 112 in the step 202 of Fig. 5. The process 202 is entered from the step 201 in Fig. 5, after which a step 501 reads the card information 605 from the card 601 using the card reader 112 and buffers the card information 605 in the memory 106. In a following step 502, the processor 105 retrieves predefined "permitted card set" parameters to determine the "permitted card set" for the verification station 127 in question. The permitted card set parameters may be retrieved from the local database 124 or from the hard disk drive 110, for example, and be also stored in the memory 106. A separate, or overlapping, permitted card set may be defined for each verification station 127. This ensures that a limited population of cards such as 601 undergo the described processes at any given verification station 127. This has the advantage of ensuring that the local database 124 does not overflow, and it also provides control over which users make use of which verification stations. However, the permitted card set for any given verification station 127 is only limited by the size of the local database 124. Card information 605 from any number of cards 601 may be stored in the local database 124 of a particular verification station 127 if the amount of memory is sufficient. In one embodiment, the processor 105 may periodically run a clean-up process where all card information 605 and biometric signatures related to cards that have not been used for a predetermined period of time (e.g., twelve months) may be deleted from the local database 124. In a following step 503 the processor 105 compares the header 606 against the predefined permitted card set parameters to determine if the card 601 belongs to the permitted card set for the verification station 127 in question. If this is the case, then the process 202 is directed by a YES arrow to the step 203 in Fig. 5. If, on the other hand, the card header 606 does not belong to the permitted card set for the particular verification station 127, then the step 202 follows a NO arrow from the step 503 to a step 504. In the step 504, the processor 105 rejects the card that has been entered into the card reader 112. This rejection can take the form of a message displayed on the LCD display 126 and/or a corresponding audio message via the speaker 117. Thereafter, the process 202 is directed back to the step 201 in Fig. 5. It is noted that even if the verification station does not reject the card not belonging to the permitted card set for the verification station 127 in question, the back-end processor 122 can do so.
In addition to the predefined permitted card set, other administrative functions can be provided by the described arrangements. Thus, the predefined permitted card set details can be amended and/or the signatures stored in the database 124 can be deleted by a system administrator. The system administrator may also periodically perform the clean-up process described above to delete card information 605 and biometric signatures related to cards that have not been used for a predetermined period of time (e.g., twelve months), so that the local database 124 does not overflow. Audit trail information is also stored in the verification station 127 and can be downloaded for audit purposes. The audit information typically includes information of which cards have been submitted to the verification station and the time stamps of the card submissions. Biometric signatures are typically not part of the downloadable audit information, and require a greater level of authorisation (such as that associated with law enforcement agencies) for access. Fig. 10 shows a process 1000 for performing a transaction using the described arrangement. The process 1000 may be performed by the owner of the card 601, for example, in later verification phases once the owner has previously performed the initial enrolment phase, so that their biometric signature and a copy of the card information 605 has been stored in the local database 124. Accordingly, the stored copy of the card information 605 was read from the card 601 and stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127. In the described process 1000, in such a later verification phase, the user may merely present their unique biometric signature to the biometric reader 102 in order to perform a transaction.
In a first step 1001, the processor 105 receives a biometric signature as provided by the owner of the card 601 to the biometric reader 102. The biometric signature may be temporarily buffered in the memory 106. After the signature has been received at the step 1001, the process 1000 is directed to a step 1004 that reads the contents of the local database 124 at a first address and compares a biometric signature stored at that first address to the biometric signature received at step 1001. In this instance, the first address may be selected randomly. Alternatively, the first address may be selected in an ordered fashion. For example, the first address may be selected as the first address in a particular block of memory.
Accordingly, at step 1004, the process 1000 compares the received biometric signature, inputted to the biometric reader 102 and buffered in memory 106, to a biometric signature stored at a first address in the local database 124 (or memory) incorporated into the verification station 127. As will be described, if the received biometric signature stored at the first memory address does not match the biometric signature stored at the first address, then the process 1000 compares the received biometric signature to one or more further biometric signatures stored in the local database 124 (or memory) incorporated into the verification station 127. At the next step 1005, if the biometric signature stored at the first memory address matches, to a sufficiently high degree of correspondence, the inputted biometric signature received in the step 1001, then the process 1000 follows a YES arrow to a step 1006. It is noted that if the step 1005 returns a YES value, then the biometric signature at the first memory address was written into the memory 124 in an earlier enrolment phase together with the card information 605.
At step 1006, the process 1000 indicates that the biometric signature received by the biometric reader 102 in the step 203 matches one of the biometric signatures previously stored in the local database 124 by a previous enrolment process 207 applied for the card 601 in question. After the step 1006, a next step 1008 performs the transaction process, whatever that may be, using the copy of the card information 605 stored in the local database 124. Typically, the transaction process will require the card information 605 to be transferred from the verification station 127 to the back-end processor 122 for completion of the transaction. As an example of a transaction process, if the process 1000 of Fig. 10 relates to the withdrawal of cash from an Automatic Teller Machine (ATM), then the step 1008 comprises the card owner specifying the required amount of cash and the relevant account information via the keypad 103 (see Fig. 3), and the provision of a receipt and cash by the ATM (not shown). Accordingly, the stored copy of the card information 605 used in the performed transaction process was read from the card 601 and stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127.
After completion of the step 1008, the process 1000 is directed back to step 1001 or to the step 201 in Fig. 5.
If, at step 1005, the biometric signature stored at the first memory address does not match the biometric signature received in the step 1001, then the process 1000 follows a NO arrow to a step 1007. At step 1007, if the processor 105 determines that there are no further biometric signatures stored in the local database 124 to compare with the received biometric signature, then the process 1000 returns to step 1001 or to the step 201 in Fig. 5. If the processor 105 determines at step 1007 that there are further biometric signatures stored in the local database 124 to compare with the received biometric signature, then the process 1000 returns to step 1004. At the next execution of step 1004, the processor 105 reads the contents of the local database 124 at a further address and compares a biometric signature stored at that further address to the biometric signature received at step 1001.
Fig. 9 shows another application 900 to which the described arrangements can be applied. In a first step 901 a person purchases or hires a verification station implemented in a portable form. A step 901 is performed at a registered supplier premises. Accordingly in a following step 902, the enrolment process is performed in controlled circumstances at the supplier premises. The "controlled conditions" referred to mean that the enrolment process is performed under conditions where the identity of the holder of the card 601 is verified, using a driving licence, passport or equivalent identification document, this ensuring that the enrolment process enrols the true owner of the card in an authorised manner.
In a following step 903, the verification station together with the card 601 can be used for third party transactions. Thus, in one example, the holder of the card 601 can take the portable verification station and connect it to his or her personal computer (PC) in order to participate in an on-line casino. This type of application may require that the portable verification station be loaded with a station identification number (which can be the serial number of the portable verification station) at the registered supplier premises. This station identification number is then transmitted to the on-line casino back-end processes together with the card information 605. This type of application does require some modification of the back-end processes. In the arrangements described above, a card user is required to enrol at each individual verification station 127. However, in another arrangement, a user may be able to enrol at one verification station 127 and the user's biometric signature and card information 605 may be broadcast over the communications network 120 to one or more other verification stations connected to the communications network 120. The broadcast biometric signature and card information 605 may then be stored in the local databases of each of those verifications stations to which the biometric signatures and card information 605 have been broadcast. Such an arrangement may be referred to as a 'minimum enrolment' arrangement. The minimum enrolment arrangement is particularly advantageous for Electronic Funds Transfer Point of Sale (EFTPOS) transactions, ATM transactions and the like. For example, the verification station 127 described above may be added to an EFTPOS terminal or ATM. The broadcasting of the biometric signature and card information 605 increases the security of the transactions made with the verification stations. In an initial enrolment phase of the minimum enrolment arrangement, the card user couples their card 601 to the card reader 112 of the verification station 127 in a similar manner to that described above. The card information 605 is read by the card reader 112 and is initially buffered in the memory 106 (e.g., within RAM) of the verification station 127. The card user is then required to input a biometric signature, such as fingerprint, face, iris, or other unique signature, into the biometric reader 102. The buffered card data 604 defines the location 607 in the local database 124 where the card user's unique biometric signature is to be stored. Once the biometric signature has been stored in the local database 124 at the location 607, the card information 605 buffered in memory 106 may then also stored at the location 607 in the local database 124. As described above, the card information 605 may be appended to the biometric signature stored at the location 607 within the local database 124. In the minimum enrolment arrangement, following the storing of the user's biometric signature in the local database 124, a copy of the user's biometric signature, together with a copy of the card information 605 read from the user's card, is broadcast over the communications network 120 to one or more of the other verification stations connected to the network. The card user's unique biometric signature together with the card information 605 corresponding to the biometric signature is then stored in the local database (e.g., 124) of each verification station to which the biometric signature and card information 605 has been broadcast. The biometric signature and card information 605 is stored at a particular memory address, as defined by the card data 604, in each of the local databases. The storing of the card information 605 in the each of the local databases of the verification stations allows biometric only transactions as described above to be performed.
In another alternative of the minimum enrolment arrangement, rather than broadcasting the individual biometric signatures and card information to each of the other verification stations connected to the network 120 upon an enrolment taking place, updates to the contents of a local database within a particular verification station 127 or indeed the entire contents of the local database may be broadcast periodically (e.g., overnight).
Accordingly, in the minimum enrolment arrangement described above, the card user is only required to enrol on one verification station 127 connected to the communication network 127 and each of the other verifications stations connected to the communications network 120 will receive a copy of the card user's enrolled biometric signature and possibly the card information 605 corresponding to that biometric signature. Thereafter, in later verification phases, the user may make biometric only transactions, as described above with reference to Fig, 10, at each of the verification stations connected to the communications network 120 after enrolling on one of the verification stations 127. Alternatively, the user may also choose to couple their card to the card reader (e.g., 112) of one of the verifications stations and present their unique biometric signature in order to perform a transaction, as described above.
In the arrangements described above, once the biometric signature has been stored in the local database 124 at the location 607, the card information 605 buffered in memory 106 is then also stored at the location 607 in the local database 124 and may be used to point to the location 607 in the local database 124.
In another arrangement, once the biometric signature and biometric has been stored in the local database 607, the card user may also enter a PIN using the keypad 103. Preferably, the PIN is required to be entered within a predetermined time period. The PIN may be any number and/or letter sequence including names and easy to remember patterns. In this instance, the PIN is then also stored at the location 607 in the local database 124. Again, the PIN may be appended to the biometric signature stored at the location 607. Therefore, the local database 124 contains the biometric signature, the card information 605 (or key-fob information) and the PIN of a card user. The PIN may be used to define a pointer to the memory location 607 in the local database which is the same location 607 pointed to by the card data 604. Thereafter, in later verification phases, the card user is required to present their unique biometric to the biometric reader 102 and then enter their PIN using the keypad 103, in order to perform a transaction. The PBSf may be required to be entered within a predetermined period of time.
Once the biometric and PIN has been provided by the user, rather than the biometric signature being compared to all of the signatures stored in the local database 124 to determine a match, the biometric signature provided by the card user is only compared to the biometric signature stored at the memory location 607 defined by the user's PIN entered by the user into the keypad 103. Again, once verification is confirmed, through a match of the provided biometric signature to the biometric signature stored at the memory location 607 defined by the PIN, the card information 605 is transferred from the local database 124 within the verification station 127 to the back-end processor 122 for completion of the transaction. In the PIN arrangement, at step 401 of the enrolment process 207, a request is presented to the card holder to provide a PIN to the keypad 103. This request can be provided in an audio fashion by means of the audio interface 107 and the speaker 117, this being driven by suitable software running on the processor 105. Alternatively or in addition, a suitable message can be displayed on the LCD display 126 by suitable software running on the processor 105. The PIN entered into the keypad 103 is stored in the local database 124 at the memory address defined by the card data 604. Again, the biometric signature, PIN and card information 605 may stored in encrypted form to reduce the probability that the signature can be acquired for unauthorised use.
Fig. 11 shows another process 1100 for performing a transaction using the described arrangement. The process 1000 may be performed by the owner of the card 601, for example, in later verification phases once the owner has previously performed the initial enrolment phase, so that their biometric signature, a copy of the card information 605 and a PIN has been stored in the local database 124. Accordingly, the stored copy of the card information 605 was read from the card 601 and together with the PIN entered by the user was stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127. In the described process 1100, in such a later verification phase, the user may present their unique biometric signature to the biometric reader 102 together with their PIN in order to perform a transaction. In a first step 1101, the processor 105 receives a biometric signature as provided by the owner of the card 601 to the biometric reader 102. The biometric signature may be temporarily buffered in the memory 106. After the signature has been received at the step 1001, the process 1000 is directed to a step 1003. At step 1003, the processor 105 receives a PIN as provided by the owner of the card 601 to the keypad 103. The keypad 103 may be similar to a telephone where letters are also displayed on the keys together with the numbers. The keypad 103 may be in addition to another keypad (e.g., an existing keypad on an Automatic Teller Machine in which the verification station 127 has been installed.
At a step 1104 the processor 105 reads the contents of the local database 124 at an address defined by the entered PIN and compares a biometric signature stored at that address to the biometric signature received at step 1101.
At the next step 1105, if the biometric signature stored at the memory address defined by the PIN matches, to a sufficiently high degree of correspondence, the inputted biometric signature received in the step 1101, then the process 1000 follows a YES arrow to a step 1106. It is noted that if the step 1105 returns a YES value, then the biometric signature at the memory address and the PIN was written into the memory 124 in an earlier enrolment phase together with the card information 605.
At step 1106, the process 1100 indicates that the biometric signature received by the biometric reader 102 in the step 203 matches the biometric signature previously stored in the local database 124 by a previous enrolment process 207 applied for the card 601 in question. After the step 1106, a next step 1108 performs the transaction process, whatever that may be, using the copy of the card information 605 stored in the local database 124. Typically, the transaction process will require the card information 605 to be transferred from the verification station 127 to the back-end processor 122 for completion of the transaction. As an example of a transaction process, if the process 1100 of Fig. 11 relates to the withdrawal of cash from an Automatic Teller Machine (ATM), then the step 1108 comprises the card owner specifying the required amount of cash and the relevant account information via the keypad 103 (see Fig. 3), and the provision of a receipt and cash by the ATM (not shown). Accordingly, the stored copy of the card information 605 used in the performed transaction process was read from the card 601 and stored in the local database 124 during a previous transaction using the card reader 112 incorporated into the verification station 127.
After completion of the step 1108, the process 1100 is directed back to step 1101, to step 1001 in Fig. 10 or to the step 201 in Fig. 5.
If, at step 1105, the biometric signature stored at the memory address defined by the PIN does not match the biometric signature received in the step 1001, then the process 1000 follows a NO arrow to a to step 1101, to step 1001 in Fig. 10 or to the step 201 in Fig. 5.
As described above, the PIN may be any number and/or letter sequence including names and easy to remember patterns. This allows the card user to select a PIN which may be memorised by recalling letters, which are associated with the numbers similar to a telephone number.
In another minimum enrolment arrangement, following the storing of the user's biometric signature and PIN in the local database 124, a copy of the user's biometric signature and PIN, together with a copy of the card information 605 read from the user's card, is broadcast over the communications network 120 to one or more of the other verification stations connected to the network. The card user's unique biometric signature and PIN, together with the card information 605 corresponding to the biometric signature is then stored in the local database (e.g., 124) of each verification station to which the biometric signature, PIN and card information 605 has been broadcast. The biometric signature, PIN and card information 605 is stored at a particular memory address, as defined by the card data 604 and PIN, in each of the local databases. The storing of the card information 605 in the each of the local databases of the verification stations allows biometric and PIN only transactions as described above to be performed.
Again, in still another alternative of the minimum enrolment arrangements described above, rather than broadcasting the individual biometric signatures, PIN and card information to each of the other verification stations connected to the network 120 upon an enrolment taking place, updates to the contents of a local database within a particular verification station 127 or indeed the entire contents of the local database may be broadcast periodically (e.g., overnight).
The PIN arrangement and the other arrangements described above can be easily integrated to a security or financial platform system, as an additional component to verify the card user at entry/excess access points. The arrangements may be performed ONLINE or OFFLINE.
In the PIN arrangement, if a unscrupulous user oversees the PIN number of the legitimate card user, the user still requires the biometric of the legitimate card user to perform a transaction. The described arrangements are secure and inexpensive to implement.
The PIN arrangement does not require extensive database searching in order to locate a matching biometric and is therefore the verification is able to be performed in an efficient manner. Further, an incorrectly entered PIN may be used to generate an warning alarm or door chime
Industrial Applicability
It is apparent from the above that the arrangements described are applicable to the computer and data processing industries.
Furthermore, the described arrangements can be used in regard to credit cards, loyalty cards, access cards, ATM and bank or financial cards, government issued card
(e.g., the Australian Medicare card) and others. The arrangements can, in general be used in addition to standard cards for purposes of entry, identification, accessing details pertinent to the user, (i.e. authorisation to be in a specific location based on user data), payment purposes or associated loyalty, club membership applications, motor vehicle or specialist vehicle machinery operations and more. Alternatively, following an initial enrolment phase, the card user may merely enter their biometric signature possibly together with a PIN. For example, in the case of the Australian Medicare card, following enrolment at a verification station 127 located at a particular medical centre, the entire card information 605 of the user's Medicare card is stored in the local database 124 of the verification station 127 located at the medical centre. As another example, the described arrangements can be added to ATM machines, wherein the card user is required to enter their biometric signature for verification prior to entering their normal ATM PIN and withdrawing funds, thereby increasing the security of the ATM arrangement with minimal changes to the underlying platform. In this instance, the ATM PIN may be used to point to the stored biometric signature. Alternatively, following an initial enrolment phase, the card user may merely enter their biometric signature, possibly together with their PIN, to withdraw funds.
Furthermore, the described arrangements can be used for secure access to a hotel room or any other room, building, cabinet, or apparatus to which secure access is required. In the hotel room example, the hotel may have a verification station 127 mounted on each door of the hotel. When a guest registers with the hotel, the hotel issues the guest with a card containing a number defining a particular room number and planned departure date. The number on the card is preferably one of an increasing sequence of numbers. The number preferably increases over a period of time and is also encrypted. A verification station 127 positioned at the door of the room corresponding to the room number may be configured so that the verification station 127 will only allow enrolments and verifications if the number stored on a presented card correctly identifies the room and is in the correct sequence. The verification station 127 may also include a real time clock to match actual time against the planned date of departure. After the guest enrols their biometric signature at the verification station 127 using the aforementioned card in the manner described above, the arrangement will give them secure access to their room for the duration of their stay.
Following enrolment, the above hotel guest may use their card and a biometric signature (e.g., a fingerprint) to enter the room. Alternatively, the guest may merely present their biometric signature, possibly together with a PIN, to enter the room as described above negating the requirement for the guests to carry the room card, plus increasing security and convenience. The verification station 127 may also be configured so that the guest may choose not to enrol their biometric signature if they do not wish to have a record of their biometric signature stored within the local database of the verification station 127. The verification station 127 located at the door of a particular hotel room or other secure access entry as described above may also allocate memory for storage of any number of biometric signatures (e.g., fingerprints) to be associated with the new card. This allows the hotel guest and all associated guests (e.g., the hotel guest's family) to enrol their individual biometrics at the verification station 127. The enrolment may simply be achieved, for example, by inserting the card and placing a finger on the biometric reader 102, for each guest. Following this enrolment stage, the card or the biometric signature can be used to gain access to the room, again, negating the requirement for each of the guests to carry the room card, plus increasing security and convenience. The benefit of having the card locate the biometric signature (e.g., fingerprints) memory address is that the time and date of departure can also be added to the same memory location. Therefore, the hotel application also allows other related data to be added to the memory location, enhancing the capability of the described arrangement. The ability to associate a memory location with a card number and expiry date can be related to many diverse applications, but utilises the same principle as storage of the fingerprint data.
Another application for the described arrangements is in regard to passport control and customs. The arrangements can be installed at passport control and customs in various countries, and a person can enrol their biometric, after using their existing passport or ID card to pass through customs. The biometric signature is stored in a memory location related to the individual's passport or ID number, and retrieved for comparison as described in relation to Figs. 5 and 10.
Finally, in each of the arrangements described above, the verification stations 127 may be configured to provide the card user with the option of performing transactions with the card 601 only. For example, the card user may not wish to provide their biometric signature. In this instance, the card user may use their card only to perform a transaction with the verification stations in a conventional manner.
The foregoing describes only some embodiments of the present invention, and modifications and/or changes can be made thereto without departing from the scope and spirit of the invention, the embodiments being illustrative and not restrictive. Thus, for example, although the description has been couched in terms of fingerprint biometric signatures, other biometrics such as facial shape, iris pattern can equally be used.
In the context of this specification, the word "comprising" means "including principally but not necessarily solely" or "having" or "including", and not "consisting only of. Variations of the word "comprising", such as "comprise" and "comprises" have correspondingly varied meanings.

Claims

The claims defining the invention are as follows:
1. A method of performing a transaction process using a verification station, the method comprising the steps of: comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
2. The method according to claim 1, wherein the card information is stored in said memory with the matching one of said previously stored biometric signatures.
3. A method according to claim 1, wherein the card device is one of: a card device in which the card information is encoded in a magnetic strip; a card device in which the card information is encoded in a bar code; a smart card device in which the card information is stored in a solid state memory on the smart card; and a key fob adapted to provide the card information by transmitting a wireless signal to the verification station.
4. A method according to claim 1, further comprising the step of outputting information indicating that the user of the card device is not authorised.
5. A method according to claim 4 wherein the information outputted is communicated to one of: a service provider for providing a service dependent upon receipt of the outputted information; and an apparatus for providing access to a service dependent upon receipt of the outputted information.
6. A method according to claim 1, wherein the stored card information and said one stored biometric signature was broadcast over a communications network to which said verification station is connected, to one or more further verification stations, following said previous transaction.
7. A verification station for performing a transaction process, the verification station comprising: means for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and means for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
8. A computer program product including a computer readable medium having recorded thereon a computer program for directing a processor to execute a method for performing a transaction process using a verification station, said program comprising: code for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to one or more further biometric signatures stored in a memory incorporated into the verification station; and code for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches one of said stored biometric signatures, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory during a previous transaction process using a card device reader incorporated into the verification station.
9. A method of performing a transaction process using a verification station, the method comprising the steps of: comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
10. The method according to claim 9, wherein the card information is stored in said memory with said previously stored biometric signature.
11. A method according to claim 9, wherein the card device is one of: a card device in which the card information is encoded in a magnetic strip; a card device in which the card information is encoded in a bar code; a smart card device in which the card information is stored in a solid state memory on the smart card; and a key fob adapted to provide the card information by transmitting a wireless signal to the verification station.
12. A method according to claim 9, further comprising the step of outputting information indicating that the user of the card device is not authorised.
13. A method according to claim 12 wherein the information outputted is communicated to one of: a service provider for providing a service dependent upon receipt of the outputted information; and an apparatus for providing access to a service dependent upon receipt of the outputted information.
14. A method according to claim 9, wherein the stored card information and said stored biometric signature was broadcast over a communications network to which said verification station is connected, to one or more further verification stations, following said previous transaction.
15. A verification station for performing a transaction process, the verification station comprising: means for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and means for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
16. A computer program product including a computer readable medium having recorded thereon a computer program for directing a processor to execute a method for performing a transaction process using a verification station, said program comprising: code for comparing a first biometric signature, inputted to a biometric reader incorporated into the verification station, to a biometric signature stored at a memory location in a memory incorporated into the verification station, said memory location being defined by a personal identification number (PIN) inputted into a keypad; and code for performing the transaction process using card information stored in said memory, if the inputted biometric signature matches the biometric signature stored at the memory location, otherwise, not performing the transaction, wherein the stored card information was read from a card device and stored in said memory together with said PIN during a previous transaction process using a card device reader incorporated into the verification station.
PCT/AU2008/000366 2007-03-16 2008-03-14 Method and apparatus for performing a transaction using a verification station WO2008113110A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
AU2007901361A AU2007901361A0 (en) 2007-03-16 Method and apparatus for performing a transaction using a verification station
AU2007901361 2007-03-16
AU2007901683 2007-03-29
AU2007901683A AU2007901683A0 (en) 2007-03-29 Method and apparatus for performing a transaction using a verification station

Publications (2)

Publication Number Publication Date
WO2008113110A1 true WO2008113110A1 (en) 2008-09-25
WO2008113110A8 WO2008113110A8 (en) 2008-12-04

Family

ID=39765279

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2008/000366 WO2008113110A1 (en) 2007-03-16 2008-03-14 Method and apparatus for performing a transaction using a verification station

Country Status (1)

Country Link
WO (1) WO2008113110A1 (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001008055A1 (en) * 1999-07-23 2001-02-01 Grosvenor Leisure Incorporated Secure transaction and terminal therefor
CA2412403A1 (en) * 2001-11-20 2003-05-20 Wayne Taylor System for identity verification
US20050036663A1 (en) * 2003-08-15 2005-02-17 Rami Caspi System and method for secure bio-print storage and access methods
US20050039027A1 (en) * 2003-07-25 2005-02-17 Shapiro Michael F. Universal, biometric, self-authenticating identity computer having multiple communication ports
US6920561B1 (en) * 2000-03-31 2005-07-19 International Business Machines Corporation Method and system for enabling free seating using biometrics through a centralized authentication
US20060104224A1 (en) * 2004-10-13 2006-05-18 Gurminder Singh Wireless access point with fingerprint authentication
WO2006058039A2 (en) * 2004-11-22 2006-06-01 Solidus Networks, Inc. (D/B/A Pay By Touch) Electronic transaction verification system
WO2007019605A1 (en) * 2005-08-12 2007-02-22 Securicom (Nsw) Pty Ltd Improving card device security using biometrics

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001008055A1 (en) * 1999-07-23 2001-02-01 Grosvenor Leisure Incorporated Secure transaction and terminal therefor
US6920561B1 (en) * 2000-03-31 2005-07-19 International Business Machines Corporation Method and system for enabling free seating using biometrics through a centralized authentication
CA2412403A1 (en) * 2001-11-20 2003-05-20 Wayne Taylor System for identity verification
US20050039027A1 (en) * 2003-07-25 2005-02-17 Shapiro Michael F. Universal, biometric, self-authenticating identity computer having multiple communication ports
US20050036663A1 (en) * 2003-08-15 2005-02-17 Rami Caspi System and method for secure bio-print storage and access methods
US20060104224A1 (en) * 2004-10-13 2006-05-18 Gurminder Singh Wireless access point with fingerprint authentication
WO2006058039A2 (en) * 2004-11-22 2006-06-01 Solidus Networks, Inc. (D/B/A Pay By Touch) Electronic transaction verification system
WO2007019605A1 (en) * 2005-08-12 2007-02-22 Securicom (Nsw) Pty Ltd Improving card device security using biometrics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
http://www.scmmicro.com/pdf/Smart_Card_Biometric_paper.pdf.May_2002 Whole document (pages 1-21) particularly page 9 *

Also Published As

Publication number Publication date
WO2008113110A8 (en) 2008-12-04

Similar Documents

Publication Publication Date Title
US20230099358A1 (en) Transmitter for transmitting a secure access signal
US8620039B2 (en) Card device security using biometrics
US7984849B2 (en) Portable magnetic stripe reader for criminality security applications
US20080028230A1 (en) Biometric authentication proximity card
US7377430B2 (en) System for secure and accurate electronic voting
US20070291995A1 (en) System, Method, and Apparatus for Preventing Identity Fraud Associated With Payment and Identity Cards
US20080172733A1 (en) Identification and verification method and system for use in a secure workstation
US20140330727A1 (en) ID Authentication
CN101884188A (en) Identity authentication and secured access systems, components, and methods
KR20090051147A (en) Internet settlement system
US20160019548A1 (en) Secure Electronic Identification Device
US20180308101A1 (en) A system for proximate and/or remote electronic transaction authorization based on user authentication and/or biometric identification
US9111082B2 (en) Secure electronic identification device
JP6898536B1 (en) Identity verification system, identity verification method, information processing terminal, and program
AU2006281965B2 (en) Improving card device security using biometrics
US11295098B1 (en) Smart driver card device and driver data and traffic management system
WO2008113110A1 (en) Method and apparatus for performing a transaction using a verification station
JP2006053808A (en) Operator authentication management system
JP2003044443A (en) Online individual authentication system, individual authentication data registration center, portable terminal, and online individual authenticating method
US8387869B2 (en) Protecting electronic cards
Pulipaka et al. Electronic voting machine using IOT and RFID
AU2014240323B2 (en) A transmitter for transmitting a secure access signal
JP2002203225A (en) Authentication auxiliary equipment, device and system for individual authentication and id medium issuing/ individual authentication network system
JP2006099313A (en) Transaction system
JP2003228705A (en) Personal authentication device and personal authentication method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08714413

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08714413

Country of ref document: EP

Kind code of ref document: A1