Advanced personal identification systems and techniques

Communications: electrical – Selective – Intelligence comparison for controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C340S005700, C340S573100, C340S010410, C340S010600, C340S005610, C340S005810, C342S357490, C342S042000, C342S044000, C342S051000, C713S182000

Reexamination Certificate

active

06580356

ABSTRACT:

BACKGROUND OF THE INVENTION
The present invention relates generally to systems and techniques for accurately and reliably identifying a specific individual to enable a secure transaction to be conducted by or with the individual. More particularly, the invention relates to improved systems and techniques for uniquely identifying an individual for secure access to the individual's personal information or to the sensitive information of an organization or thing with which a transaction is to be conducted by or with the individual.
Rapid advancement of computer technology has led to smaller devices, capable of storing and manipulating increasingly greater amounts of data, at faster speeds. Computer and computer network advances likewise have led to their increased usage in conducting transactions between individuals and organizations or institutions, from banking to credit and debit purchasing to personal data transfer and so forth. Transactions may be conducted by an individual directly with a specific organization by dial-in to the particular organization's computer network phone number where available, or by use of a more general computer network such as the Internet, where huge numbers of worldwide web (www) pages are available to enable individual call-up and communications, including transactions, to take place via computer modem and Internet access provider facilities. Other transactions may be conducted on a more personal basis, such as by insertion of an identification card (e.g., a so-called “smart card” containing one or more integrated circuit chips) to make purchases or to gain access and entry to a facility, or by entering a preselected personal identification number (PIN), or by simply pressing a button. To provide and maintain appropriate security in completing the transaction, it may be essential for the system to assess and verify the identity of the individual seeking entry or access, which may necessitate the use of sophisticated fingerprint or ophthalmic (e.g., iris) identification techniques.
Clearly, in some instances neither the individual nor the organization or other entity or thing involved in a transaction is concerned about matters of security of information sought or obtained in the course of the transaction. For example, airlines desire to make information regarding flight schedules, airport terminals and air fares between cities readily available to actual and potential customers over the Internet through a specific web site, and the individual customer is generally fully prepared to furnish name, address and telephone/facsimile (fax) number information through that medium to enable receipt of communications from the airline. As another example, each driver of a vehicle may be able to pre-program his or her seat adjustment preferences so that by simply pushing a button an automatic readjustment is made to one's personal preferences after the car has been driven by another driver, and neither any driver nor the vehicle itself “cares” that anyone can select any of the pre-programmed settings. In many instances, however, it is desirable to be considerably more discreet, and indeed, to practice great security in supplying or allowing access to sensitive information in pursuit of or in the course of a transaction.
The term “transaction” is generally used throughout this patent application in the broad sense of a communicative action or activity involving two parties or things, or a party and a thing, that reciprocally affect or influence each other, or that unilaterally affects or influences the other. Thus, a transaction may be a prelude for an individual to gain entry (i.e., be permitted access) to a secure area, such as that within a company or a governmental agency, or an airport security gate, for example, or the carrying out of a transfer of money such as the withdrawal of cash from an automated teller machine (ATM) or the payment of a bill by debiting one's bank account, or the delivery of sensitive information such as personal information of the user or confidential business information of an organization, or the reliable identification of a particular patient in a hospital without resort to the wearing of an identification bracelet, to cite a few examples without limitation.
Beyond merely limiting access to computer data and networks, security control is a major issue in all aspects of an organization's research and development and know-how information, and in the sensitive personal property of individuals. While security checks that involve the use of identification cards that carry embedded integrated circuit chips or magnetically coded information are quite common, higher levels of security require more sophisticated personal identification techniques which are highly personal to the individual, such as the aforementioned fingerprint or handprint or iris comparison and matching techniques, to identify authorized users. And as noted above, personal identification may also be used to transmit or automate certain personal preferences or settings in the everyday use of appliances or machinery such as television and stereo channel or band or related selections, computer and software settings and selections, telephone settings, automobile settings such as remote entry and seat adjustments, remote garage door opening commands, and so forth.
In some instances, the need to provide the information required for access or entry, whether by placing a finger on a sensing mechanism, or by entering a PIN number or a card number, or by inserting a smart card into a slot, is viewed by the user as an annoyance or an imposition despite a recognition that security may be important if not essential. If the user has forgotten a PIN number among a multitude of PIN numbers used for various institutions, access will be denied. On the other hand, use of a single PIN number for a multitude of potential transactions, or keeping a record of PIN number(s) in one's wallet or purse, can allow penetration and carrying out of otherwise secure transactions by an unauthorized person who has obtained access to that information by theft, including computer hacking.
It would clearly be desirable to provide advanced systems and techniques for personal identification which are installed and operated reliably, quickly, efficiently, inexpensively, safely, and with relative simplicity, and which are less intrusive or physically interactive, in comparison to presently used and heretofore proposed personal identification systems and techniques. Certainly, the capability of a security system to distinguish one individual from another and to recognize or identify a specific individual without the need for complex hardware and/or software is a worthy goal.
It is a principal aim of the present invention to provide such advanced systems and techniques for personal identification in situations where virtually any level of security may be required or desired, but where the highest levels of security may require an additional system or method of verifying the identity of the individual seeking entry into or access to a transaction.
SUMMARY OF THE INVENTION
The present invention is directed toward a personal identification system which utilizes electrical characteristics or properties of the human body to enable transmission of encoded electrical or electronic signals to identify and recognize the individual or a code selected by the individual, for security purposes. The body transmission system is sometimes referred to herein as the “body link.”
In broad terms, the present invention resides in a personal identifier for a security system, in which the identifier includes a coded signal generating device adapted to be carried on the body of a person identified thereby, and which utilizes the body of the person carrying the device as a transmission link for the coded signal generated thereby, to interact with an identity recognition system. The body utilization is achieved by coupling the coded signal to the electrical conductivity (or impedance) circuit of the user&

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Advanced personal identification systems and techniques does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Advanced personal identification systems and techniques, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Advanced personal identification systems and techniques will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3137862

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.