Biometric identification device and methods of use

ABSTRACT

A removable card-enabled BPID Security Device integrates a removable card reader with a biometric authentication component to provide secured access to electronic systems. The device allows for an individual to insert a removable card into an aperture in the physical enclosure of the BPID Security Device, allowing the removable card and the BPID Security Device to electronically communicate with each other. The BPID Security Device is based on a custom application specific integrated circuit that incorporates removable card terminals, such that the BPID Security Device can communicate directly with an inserted removable card. In an alternative embodiment of the invention, the BPID Security Device is based on a commercial off-the-shelf microprocessor, and may communicate with a commercial off-the-shelf microprocessor removable card receiver using a serial, USB, or other type of communication protocol. The device allows for enrolling a user&#39;s credentials onto the BPID Security Device and for authenticating an individual using the BPID Security Device.

RELATED U.S. APPLICATION DATA

This application claims priority to and is a continuation of U.S. patentapplication Ser. No. 17/061,099, filed Oct. 1, 2020 entitled “BiometricIdentification Device And Methods Of Use”, which is a continuation ofU.S. patent application Ser. No. 16/416,924, filed May 20, 2019,entitled “Biometric Identification Device With Removable CardCapabilities,” which is a continuation of U.S. patent application Ser.No. 15/676,232, (now U.S. Pat. No. 10,296,735), filed Aug. 14, 2017,entitled “Biometric Identification Device with Removable CardCapabilities,” which is a continuation of U.S. patent application Ser.No. 15/162,063, (now U.S. Pat. No. 9,734,317), filed May 23, 2016,entitled “Biometric Identification Device with Removable CardCapabilities,” which is a continuation of U.S. patent application Ser.No. 14/263,349, (now U.S. Pat. No. 9,349,232), filed Apr. 28, 2014,entitled “Biometric Identification Device with Smartcard Capabilities,”which is a continuation of U.S. patent application Ser. No. 13/482,206,(now U.S. Pat. No. 8,708,230), filed May 29, 2012, entitled “BiometricIdentification Device with Smartcard Capabilities,” which is acontinuation of U.S. patent application Ser. No. 12/251,131 (now U.S.Pat. No. 8,186,580), filed Oct. 14, 2008, entitled “BiometricIdentification Device with Smartcard Capabilities,” which is acontinuation of U.S. patent application Ser. No. 11/389,387 (now U.S.Pat. No. 7,481,364), filed Mar. 24, 2006, entitled “BiometricIdentification Device with Smartcard Capabilities,” which claimspriority to U.S. Patent Provisional Application No. 60/665,043 filedMar. 24, 2005, entitled, “Biometric Identification Device with SmartcardCapabilities,” each of which is hereby incorporated by reference in itsentirety.

BACKGROUND 1. Field of the Invention

This invention relates to the field of portable, electronic personalidentification and authentication devices. This invention relates morespecifically to electronic devices using biometric and/or smartcardauthentication technologies.

2. Related Art

U.S. Pat. No. 6,991,174 to Zuili discloses a method and apparatus forauthenticating a shipping transaction. The disclosed apparatus, which isnot covered by the claims of the patent, is a portable smartcard readerincorporating a number of different authentication mechanisms, includinga personal identification number (PIN), asymmetric cryptographic keys,and/or biometrics. The apparatus may be used autonomously or inconjunction with other electronic devices, such as a personal digitalassistant (PDA), cellular telephone, or remote control. The apparatus isdesigned for use in a variety of applications, including computernetworks, televisions and cable access, and payment transactions. Thepatented invention is a method of specifically authenticating a shippingtransaction by using a smartcard and a smartcard reader, acquiringbiometric information and shipping information from a customer,encrypting the shipping information using the biometric information,storing the encrypted shipping information on the smartcard and in adatabase, permitting the customer to access the database in order tochange the shipping information, and requiring the customer to resubmitbiometric information in order to authenticate the shipping transaction.

U.S. Pat. No. 6,016,476 to Maes, et al., discloses a portable PDA withbiometric authentication capability. The PDA is further capable ofreading and writing information to smartcards, magnetic stripe cards,optical cards and/or electronically alterable read-only memory (EAROM)cards. The PDA is intended for use in payment transactions, and cancommunicate with other electronic devices, such as a point of saleterminal, through either wired or wireless transceivers.

Research In Motion, Ltd. (RIM) produces and sells a device called “TheBlackBerry® Smart Card Reader,” which is a portable smartcard readerthat provides two-factor authentication, symmetric cryptographic keysand the smartcard, for users attempting to access or use BlackBerrydevices. Once the smartcard and the cryptographic key has been processedon the device, the device communicates via Bluetooth wireless technologywith the BlackBerry device, enabling users to transmit secure e-mail.The device does not include biometric authentication.

Key Ovation produces the “Goldtouch ErgoSecure Smart Card and BiometricKeyboard SF2.4.” This device is a standard ergonomic computer keyboard,which incorporates both a smartcard reader and an Authentec fingerprintsensor. It is not portable, nor does it appear to possess wirelesstechnology.

NECESSITY OF THE INVENTION

Companies, governments, and other organizations possess a variety ofphysical and digital resources, which are often valuable and must beprotected. Some of these resources are physical, such as particularbuildings, offices, or grounds, while others are more intangible, suchas databases, computer files, or other digital data. As a naturalconsequence of wishing to protect the resource, organizations eitherimplicitly or explicitly develop an associated security policy orstructure that specifies rules for access to the resource. When anindividual wants access to a protected resource, the organization'ssecurity policy will—again implicitly or explicitly—require theindividual to identify himself in an acceptable manner, and will thenauthenticate the identified individual against the security policy. Ifthe identified and authenticated individual has privileges to theresource he is permitted access.

Both government agencies and private industry have developed a number ofdifferent technologies to implement these security policies. One suchtechnology is the “proximity card,” commonly used to secure physicalaccess to commercial buildings and offices. The proximity card istypically the size of a credit card, and contains electronics sufficientto both store and wirelessly transmit a unique identifier to a receiverlocated at the access point. The proximity card gains its name from itscharacteristic type of wireless transmission, allowing the user tosimply hold the card close (typically within a few inches) to the accesspoint, without inserting the card into a reader. When a proximity cardis issued to an individual, a centralized database associates the uniqueidentifier on the card with that individual; when the individualprovides the proximity card to gain access to the resource, theidentifier is transmitted to the access point, and the association isverified. Once the unique identifier has been programmed onto theproximity card, it cannot be altered, nor can additional data be addedto the card.

Developers have been equally prolific in generating authenticatingtechnologies for access to computers, networks, and other digitalresources. The simplest examples are passphrases or personalidentification numbers (PINS) that the individual must supply beforebeing granted access to the resource. Virtually all e-mail systems areprotected this way; another common example is the Windows® log-inprocess, which prompts the user to enter a username and password. Inmore advanced systems, individuals may be provided cryptographic keys,such as one half of a public key/private key pair, or a digitalcertificate. These technologies similarly rest on an individual'sprevious association with the particular credential, such as thepassphrase or cryptographic key.

One technology frequently used to accomplish one or both objectives ofphysical and digital access is the “smartcard.” Similar to the proximitycard, the smartcard is in the form-factor of a credit card. Thesmartcard, however, generally contains a small integrated circuit withsufficient processing power to perform a number of different tasks,including cryptography and two-way transmission. The smartcard can storeunique identifiers, such as cryptographic keys, passphrases, and otheruser data, as well as be transported and used to obtain access tophysical resources. One smartcard can provide storage and authenticationfor a number of different resources, each of which may have a differentidentifier. Rather than wirelessly transmitting credentials, such as theproximity card, the smartcard uses contact-based transmission, andrequires the user to insert the smartcard into a reader at the accesspoint. Smartcard readers may be attached to electronic resources, suchas a computer or network terminal, or physical resources, such as doors,gates, etc. Because of the two-way transmission capability, the datastored on a smartcard may be altered or updated through the smartcardreader. Smartcards are extremely popular; for example, the Department ofDefense (DoD) currently uses the smartcard-based Common Access Card(CAC) to grant access to its organizations and resources. The CACretains all of the functions and features of the traditional smartcard,and incorporates a photograph of the bearer on the outside of the card,to allow for both visual and electronic identification andauthentication.

Each of these security technologies, while very useful, is susceptibleto use by an impostor. If an individual loses his proximity card orsmartcard, anyone who picks it up may use it to access the resource.Biometric technology, which authenticates an individual by use ofphysical characteristics such as fingerprints, can largely eliminatethis risk. In the case of fingerprint recognition, an individual'sfingerprint is electronically scanned and stored as a numeric template.When the individual wishes to access the resource, the finger isrescanned and digitally compared to the stored fingerprint to determinea match. Biometrics offer a clear advantage over previoustechnology—while a smartcard may be easily stolen and used by anunauthorized individual, an electronic forgery of a fingerprint is muchmore difficult to achieve.

The Privaris® BPID™ Security Device is one type of authentication devicebased on biometric technology, and is much younger technology than thesmartcard. The BPID Security Device is a handheld, portable electronicdevice, containing a fingerprint scanner, two-way wirelesscommunications, memory, and sufficient processing power to performcryptographic functions and on-device fingerprint authenticationalgorithms. Much like the smartcard, the BPID Security Device can storeunique identifiers, including cryptographic keys and passphrases, andcan be used to authenticate an individual to a number of differentresources. The BPID Security Device, however, possesses significantlymore processing power and memory than the traditional smartcard, in partbecause of the fingerprint template storage and comparisons doneon-board the device. Furthermore, the BPID Security Device is based onwireless technology, so it can use the same protocols as used inproximity cards, newer standards like the Bluetooth® protocol, or both.Data on the BPID Security Device can be transmitted or received withoutinserting the device into a reader, which, for example, allowsindividuals to authenticate faster at a physical access point than theycould using a smartcard.

Since the advent of the smartcard, a number of organizations haveattempted to create an identification system common to multipleorganizations that utilized common information contained on thesmartcard, while at the same time increasing the security of thisinformation, and insuring positive identification of the individualusing the smartcard, prior to granting access to approved resources.Shortage of memory, limited range for contactless applications, the needfor multiple cards to accommodate existing building access systems, theneed for reliable biometric authentication, and the difficultiesassociated with updating the data on the card all became issues. Whilethe BPID Security Device can largely address these concerns, it does notpossess the form-factor of the smartcard, and therefore does not lenditself to the visual identification component of the CAC. Nor does theBPID Security Device contain a contact-based transmission mechanismallowing it to interact with systems currently using smartcard readers.What is needed is an apparatus and methods that combines the visualidentification aspect of the smartcard with the biometric and wirelesscomponents of the BPID Security Device, which can allow reversion to acontact-based smartcard system when necessary.

SUMMARY OF THE INVENTION

The present invention discloses apparatuses and methods for integratingsmartcard and BPID Security Device technology. The primary apparatus ofthe invention, hereinafter termed a “smartcard-enabled BPID SecurityDevice,” integrates a smartcard reader with the BPID Security Devicesuch that an individual may insert the smartcard into an aperture in thephysical enclosure of the BPID Security Device, allowing the smartcardand the BPID Security Device to electronically communicate with eachother. In one primary embodiment of the invention, the smartcard-enabledBPID Security Device is based on a custom application specificintegrated circuit (ASIC) that incorporates smartcard terminals, suchthat the BPID Security Device can communicate directly with an insertedsmartcard. In an alternative embodiment of the invention, thesmartcard-enabled BPID Security Device is based on a commercialoff-the-shelf (COTS) microprocessor, and may communicate with a COTSsmartcard receiver using a serial, USB, or other type of communicationprotocol. The first method of the invention is a process for enrolling auser's credentials onto the smartcard-enabled BPID Security Device. Thesecond method of the invention is a process for authenticating anindividual using the smartcard-enabled BPID Security Device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts the smartcard-enabled BPID Security Device

100—BPID Smartcard Security Device

101—physical enclosure

102—aperture for receiving a smartcard

110—strap

310—fingerprint sensor of the BPID Security Device

FIG. 2 depicts a smartcard being inserted into the smartcard-enabledBPID Security Device

100—BPID Smartcard Security Device

101—physical enclosure

102—aperture for receiving a smartcard

200—smartcard

FIG. 3 depicts a smartcard inserted into the smartcard-enabled BPIDSecurity Device

100—BPID Smartcard Security Device

101—physical enclosure

102—aperture for receiving a smartcard

200—smartcard

FIG. 4 is a schematic representation of the smartcard-enabled BPIDSecurity Device

100—BPID Smartcard Security Device

210—smartcard reader

211—smartcard terminal

212—external device terminal

300—biometric authentication component

DETAILED DESCRIPTION OF THE INVENTION

The following detailed description is of the best presently contemplatedmode of carrying out the invention. This description is not to be takenin a limiting sense, but is made merely for the purpose of illustratinggeneral principles of embodiments of the invention.

In one embodiment, a device (not shown) uses fingerprint biometrics andfingerprint recognition algorithms to authenticate the identity of theowner of the device prior to granting access to an approved resource.The device can store personal identity credentials such as licenses,passports or identification cards, building or facility access codes,credit card or wireless payment information, or user names or passwords.These credentials are wirelessly transmitted from the device uponsuccessful verification of the enrolled user's fingerprint(s) by thedevice.

The device performs all fingerprint processing, including capture,template generation, storage and matching, on the device. No centralizeddatabase of biometric information is needed, which allows the device toprovide user authentication to a stand alone computer or handheld deviceshould the infrastructure or network be disabled. Furthermore, thedevice transmits only the required credential, not the fingerprint ortemplate. The user's biometric information never leaves the device.Thus, users need not be concerned about their fingerprint beingcompromised or shared in any manner. The device releases private orconfidential information only after the user of that device successfullybiometrically authenticates him/her self.

In another embodiment, the device can directly interact with asmartcard. The device will be packaged as a holder for the smartcard.All of the features of the device will be maintained, but the physicalpackaging will be changed. In addition, the device will include anelectrical and mechanical interface to a smartcard. The smartcard willslide into the device and make contact with the device. The device willrequire authentication of its owner prior to the device being able tocommunicate with the smartcard. Also, the smartcard and the device mustauthenticate each other before they are capable of communicating witheach other. Once the device and the smartcard have authenticated eachother they will be able to communicate. Once authenticated, the combineddevice and smartcard provide all of the capabilities of each technologyin a single unit. The combined unit provides for secure storage ofcredentials, remote reading of a smartcard, wireless transmission ofcredentials from the smartcard, support of multiple applications(physical access, logical access, identity documents and financialtransactions), and coexistence of legacy (smartcard) and emerging(wireless self-contained biometric device) technologies. Users can reapthe benefits of both technologies without replacing existinginfrastructure.

The primary apparatus of the invention is called a “smartcard-enabledBPID Security Device.” As seen in FIG. 1 , the BPID Smartcard SecurityDevice 100 may be attachable to a strap 110, so that it may be wornaround an individual's neck or used in some other convenient carryingmethod. The BPID Smartcard Security Device 100 comprises a physicalenclosure 101 with an aperture 102 for receiving a smartcard, abiometric authentication component 300 (see FIG. 4 ), and a smartcardreader 210 (see FIG. 4 ). The fingerprint sensor 310 of the BPIDSecurity Device is made externally available through the physicalenclosure 101. As seen in FIGS. 2 and 3 , the aperture 102 may beoriented in the physical enclosure 101 such that a picture or photographon the outside of a smartcard 200, such as the CAC, is easily visible toall approaching the individual.

FIG. 4 is a schematic representation of the smartcard-enabled BPIDSecurity Device, without the physical enclosure and aperture. Thesmartcard reader 210 may be any existing technology that incorporatescontact-based terminals 211 for receiving and transmitting electronicdata smartcards (hereinafter “smartcard terminal”), and at least oneadditional terminal 212 for transmitting and receiving data to anexternal device (hereinafter “external device terminal”). The biometricauthentication component 300 and the smartcard reader 210 are locatedwithin the physical enclosure 101, such that a smartcard 200 insertedinto the aperture 102 will physically contact the smartcard terminal 211and may use existing smartcard protocols to transmit information to andfrom the smartcard reader 210. The smartcard reader 210 is physicallycoupled to the biometric authentication component 300, such that theexternal device terminal 212 allows the smartcard reader 210 tocommunicate with the biometric authentication component 300.

In the first embodiment of the apparatus, the biometric authenticationcomponent 300 may communicate with the external device terminal 212 overa standard communications protocol, such as, but not limited to, RS232(now known as EIA232) or Universal Serial Bus (USB). In an alternativeembodiment of the apparatus, the biometric authentication component 300and the smartcard reader 210 will coexist on a secure microprocessor(hereinafter “BPID Security Device/reader”), such that communicationsbetween the external device terminal 212 and the biometricauthentication component 300 will be physically and electronicallylocated on the same ASIC. In this embodiment of the invention, the BPIDSecurity Device/reader will be located within the physical enclosure 101such that a smartcard 200 inserted into the aperture 102 of the physicalenclosure 101 will directly contact the smartcard terminal 211 of theBPID Security Device/reader. This creates enhanced security for the BPIDSmartcard Security Device 100, as the ASIC may be physically andelectronically secured.

The first method of invention permits an individual with a smartcard toenroll himself into the BPID Smartcard Security Device 100. First, theindividual places a smartcard 200 into the aperture 102 of the physicalenclosure 101 such that the smartcard 200 contacts the smartcardterminal 211 of the reader 210. The individual then activates power tothe smartcard-enabled BPID Security Device 101 and the smartcard reader210 reads the smartcard's serial number. The smartcard reader 210transmits the serial number to the biometric authentication component300 using the external device terminals 212. The biometricauthentication component 300 verifies that it has not previously beenenrolled with the specific smartcard 200. The biometric authenticationcomponent 300 then connects to a BPID Security Device enrollment stationand enrolls the individual pursuant to its regular procedure. During theenrollment procedure, the biometric authentication component 300 storesthe individual's biometric data and a PIN, which are then associated inthe memory of the biometric authentication component 300 with thesmartcard's 200 serial number. The biometric authentication component300 also transmits the individual's biometric data and the PIN to thesmartcard reader 210 via the external device terminals 212, and thesmartcard reader 210 writes the biometric data and the PIN to thesmartcard 200 via the smartcard terminal 211. The BPID SmartcardSecurity Device 100 is now enrolled and the user may remove thesmartcard from the aperture 102 of the physical enclosure 101.

The second method of the invention permits an individual to authenticatehimself to a BPID Smartcard Security Device 100 he has previouslyenrolled in. First, the individual places a smartcard 200 into theaperture 102 of the physical enclosure 101 such that the smartcard 200contacts the smartcard terminal 211 of the reader 210. The individualthen activates power to the smartcard-enabled BPID Security Device 101and the smartcard reader 210 reads the smartcard's serial number. Thesmartcard reader 210 transmits the serial number to the biometricauthentication component 300 using the external device terminals 212.The biometric authentication component 300 verifies that it haspreviously been enrolled with the specific smartcard 200 and requeststhe individual to authenticate himself to the biometric authenticationcomponent 300 according to its standard procedure. If the biometricauthentication component 300 successfully authenticates the individual,the biometric authentication component 300 locates the PIN associatedwith the smartcard's 200 serial number and transmits the PIN via theexternal device 212 to the smartcard reader 210. The smartcard reader210 then transmits the PIN to the smartcard 200 via the smartcardterminal 211.

If the smartcard 200 possesses “match-on-card” capabilities, i.e. thesmartcard is capable of matching fingerprint templates to those storedon the card, the biometric authentication component 300 locates thefingerprint template associated with the smartcard's 200 serial numberand transmits the template via the external device 212 to the smartcardreader 210. The smartcard reader 210 then transmits the template to thesmartcard 200 via the smartcard terminal 211. If the smartcard 200matches both the transmitted PIN and fingerprint template to its storedPIN and template, it 200 transmits its stored electronic data to thesmartcard reader 210 via the smartcard terminal 211, which subsequentlytransmits the stored electronic data to the biometric authenticationcomponent 300 via the external device terminal 212. The biometricauthentication component 300 may now use the electronic data stored onthe smartcard 200 as necessary.

If the smartcard 200 does not possess “match-on-card” capabilities, thesmartcard 200 will only match the transmitted PIN to its stored PIN. It200 will then transmit the stored fingerprint template to the smartcardreader 210 via the smartcard terminal 211, which in turn transmits thefingerprint template to the biometric authentication component 300 viathe external device terminal 212. The biometric authentication component300 locates the fingerprint template associated with the smartcard's 200serial number and compares the stored template to the templatetransmitted from the smartcard 200. If the two match, the biometricauthentication component 300 prompts the smartcard reader 210 totransmit its stored electronic data to the smartcard reader 210 via thesmartcard terminal 211. The smartcard reader 210 then transmits thestored electronic data to the biometric authentication component 300 viathe external device terminal 212. As above, the biometric authenticationcomponent 300 may now use the electronic data stored on the smartcard200 as necessary.

Those having ordinary skill in the art will recognize that the precisesequence of steps may be altered such that they result in the samefunctional outcome. Many improvements, modifications, and additions willbe apparent to the skilled artisan without departing from the spirit andscope of the present invention as described herein and defined in thefollowing claims.

What is claimed is:
 1. A method, comprising: reading, via a personalidentification device, an identifier associated with a removable card atleast partially disposed in a housing of the personal identificationdevice, the identifier being stored on an integrated circuit of theremovable card; determining, at the personal identification device,whether a stored identifier matches the identifier associated with theremovable card; determining, at either the personal identificationdevice or the removable card, whether a biometric input provided by theuser via a biometric sensor of the personal identification devicematches a stored biometric template associated with the user, after thestored identifier is determined to match the identifier associated withthe removable card; and sending, via the personal identification device,a signal indicating that the biometric input matches the storedbiometric template.
 2. The method of claim 1, further comprising:initiating a request via a processor of the personal identificationdevice for the user to provide the biometric input via the biometricsensor of the personal identification device.
 3. The method of claim 2,wherein the request is only initiated after (1) the personalidentification device determines that the stored identifier matches theidentifier associated with the removable card, and (2) the personalidentification device determines that the stored identifier waspreviously electronically associated with the stored biometric template.4. The method of claim 1, wherein the stored identifier is stored in amemory of the personal identification device before the reading, thememory being at least partially disposed in the housing.
 5. The methodof claim 1, wherein the stored biometric template is stored in at leastone of the personal identification device or the removable card.
 6. Themethod of claim 1, further comprising: permitting the user to access atleast one identity credential of the user stored in a memory of thepersonal identification device only after a processor of the personalidentification device determines that the biometric input matches thestored biometric template.
 7. The method of claim 1, further comprising:wirelessly transmitting, via a transceiver of the personalidentification device and to a device separate and remote from thepersonal identification device, at least one identity credential of theuser, the wirelessly transmitting being inhibited until the processordetermines that the biometric input matches the stored biometrictemplate.
 8. The method of claim 1, wherein the biometric input is afirst biometric input, the method further comprising: authenticating,before the reading and via a processor of the personal identificationdevice, the user to the personal identification device based on at leastone of a second biometric input received via the biometric sensor or apersonal identification number received via the personal identificationdevice.
 9. The method of claim 1, further comprising: determining, atthe personal identification device, whether the stored identifier waspreviously electronically associated with the stored biometric templateof the user.
 10. A non-transitory processor-readable medium storing coderepresenting instructions to be executed by a processor disposed withina housing of a portable personal identification device, the codecomprising code to cause the processor to: read an identifier stored onan integrated circuit of a removable card at least partially disposed inthe housing of the personal identification device; determine whether theidentifier associated with the removable card matches a storedidentifier; determine whether a biometric input matches a storedbiometric template associated with the user, after the stored identifieris determined to match the identifier associated with the removablecard; and send, via the personal identification device, a signalresponsive to a determination that the biometric input matches thestored biometric template.
 11. The non-transitory processor-readablemedium of claim 10, the code further comprising to cause the processorto: determine, after the identifier associated with the removable cardis determined to match the stored identifier and before the processordetermines whether the biometric input matches the stored biometrictemplate, whether the stored biometric template is associated with atleast one of the identifier associated with the removable card or thestored identifier.
 12. The non-transitory processor-readable medium ofclaim 10, the code further comprising to cause the processor to: inhibitcommunication between the personal identification device and theremovable card when the identifier associated with the removable carddoes not match the stored identifier.
 13. The non-transitoryprocessor-readable medium of claim 10, the code further comprising tocause the processor to: output electronic data associated with the userand from at least one of the personal identification device or theremovable card, only after the processor determines that the biometricinput matches the stored biometric template.
 14. The non-transitoryprocessor-readable medium of claim 10, the code further comprising tocause the processor to: send, after the identifier associated with theremovable card is determined to match the stored identifier, a signal tothe user indicative of a request for the user to provide a biometricinput via a biometric sensor of the personal identification device. 15.The non-transitory processor-readable medium of claim 10, the codefurther comprising to cause the processor to: permit access by the userto at least one identity credential of the user stored in a memory ofthe personal identification device after the processor has determinedthat the biometric input matches the stored biometric template.
 16. Thenon-transitory processor-readable medium of claim 10, the code furthercomprising to cause the processor to: send, after the processor hasdetermined that the biometric input matches the stored biometrictemplate, a signal to a transceiver of the personal identificationdevice to cause the transceiver to wirelessly transmit to a deviceexternal and remote from the personal identification device electronicdata including at least one identity credential of the user.
 17. Amethod, comprising: determining, via a processor of a personalidentification device, whether a biometric input of a user matches astored biometric template associated with the user, the stored biometrictemplate having previously been associated with an identificationcredential of a removable card, the removable card being at leastpartially disposed within a housing of the personal identificationdevice during the determining, the removable card having an integratedcircuit including the identification credential; wirelesslytransmitting, via a transceiver coupled to the housing, theidentification credential to at least one external device after thebiometric input is determined to match the stored biometric template;and permitting the user to access previously stored electronic data onlyafter the biometric input is determined to match the stored biometrictemplate, the previously stored electronic data being associated withthe user.
 18. The method of claim 17, wherein the previously storedelectronic data is associated with at least one of a license, apassport, an identification card or document, a building or facilityaccess code, a logical access code, credit card, payment information, auser name, or a password.
 19. The method of claim 17, furthercomprising: wirelessly transmitting, from the personal identificationdevice and after the biometric input is determined to match the storedbiometric template, at least a portion of the previously storedelectronic data including financial information associated with the usersuch that a financial transaction is initiated.
 20. The method of claim17, wherein the processor of the personal identification device performsthe determining without transmitting the biometric input or the storedbiometric template externally from the personal identification device.