System and method of electronic signature verification

ABSTRACT

A universal lightweight, easily carried memory identification card records information and controls access to this information. The memory card includes a file system of electronic files on the card, which are automatically detected and recognized by selected authorized readers. The file system is organized so that stored electronic files appear in separate and distinct encrypted compartments in the card, so that only authorized preselected readers have access to particular compartments. Biometric identifying information is imprinted in the card, so that no data can be transferred unless there is a biometric match between a reader and a person assigned to the card and who possesses the card. The separate compartments of the memory card may include a compartment containing medical, administrative or financial information relating to the assigned user of the card, wherein the information is accessed only by a preselected memory card reader having the unique pin code assigned to the compartment having the medical information. The memory identification card can also have a single chip Global Positioning System (GPS) to identify where the card is being used.

FIELD OF THE INVENTION

[0001] The present invention relates generally to information and moreparticularly to methods of information processing, which will makeidentity theft obsolete.

BACKGROUND OF THE INVENTION

[0002] Signatures have been utilized for centuries as the primary methodof authentication. For many years, the process has involved a visualinspection between a newly signed document and a prior signature. Thisprocess, however, has significant limitations, as it typically dependson subjective decisions made by individuals having little skill, if any,in making signature comparisons. In recent years, computers have beenincreasingly utilized to assist in the authentication process, however,there are still significant drawbacks. Much of the problems have been aresult of the increased globalization of business and society. Forexample, differences in language, culture and geographic location haveadded many new variables that have needed to be considered and dealtwith appropriately.

[0003] Another complicating factor is that we live, it is said, in the‘information age’. What is meant by that phrase is that we live in atime when information is very important and easily accessible. To get areal appreciation, however, as to the impact the information age has hadon society, it is necessary to reflect on the meaning of term“information” itself. “Information” is a term that has broadimplications in today's environment and covers any type of “data” or“facts” and in any format, such as, for example, text, graphics, audioor video, to name a few.

[0004] Technological innovation has made it progressively easier inrecent years to disseminate information from place to place, forexample, by telephone, portable devices, such as recorders or PDA's, andvia computer networks, such as the internet. The ease by whichinformation can be readily obtained and disseminated have raised manyconcerns, such as privacy issues as well as issues of fraud and securityconcerns. Laws have been enacted in attempt to deter piracy of sensitivepublic or private information, but that has done little to address thesource of the problem.

[0005] Moreover, as technology advances and links goods and servicesthroughout the world, the economy and stability of civilized societiesbecome more vulnerable to sophisticated means of attack anddestabilization. Government and businesses are linked world wide viatelephone, cable, and wireless technologies. This technologicalcommunications revolution has left our society open to a new worldwidethreat. Interference with our current technologies by a third partywishing to cause chaos in the free world is a constant and real threatto all people.

[0006] The computer linked worldwide communications systems arevulnerable based on the current system. The present system allowsacceptance of devastating electronic programs such as so called “worms”and “viruses”. The present system also allows the very worrisomeintrusion by “hackers”, who can gain control of vital governmentfunctions and an individual's personal records.

[0007] Apart from prevention of attacks upon the information that islinked to government and private institutions, a method to track andhelp apprehend the criminals and terrorists that wish to harm the freeworld is also needed. Presently, there is no system in place to link theactual person responsible for the attack to the crime.

[0008] In view of the forgoing, there is seen a need for improving themanner by which information integrity can be maintained anddissemination regulated.

SUMMARY OF THE INVENTION

[0009] The present invention discloses a system and method of electronicsignature verification.

[0010] In accordance with one embodiment, a method comprises the stepsof storing information in a memory device and regulating access to theinformation stored in the memory device based upon a security measure.In an exemplary embodiment, the security measure may comprise one ormore biometric characteristics. The method may further comprise one orboth of the steps of providing a reader to regulate access to theinformation stored in the memory device and providing an interface tocommunicate with the reader or memory device upon permission to accessthe information. The method may also comprise the step of identifyingthe location of the memory device at desired times.

BRIEF DESCRIPTION OF THE DRAWING

[0011] The present invention can best be understood in connection withthe accompanying drawing, in which:

[0012]FIG. 1 is a block diagram illustrating an exemplary embodiment ofthe present invention.

DETAILED DESCRIPTION OF THE INVENTION

[0013] The following embodiments of the present invention may beimplemented using hardware or software or any combination of the twowhere desired. Various embodiments may also be implemented usingcommercially available technology.

[0014] In one embodiment, a method for processing information comprisesthe steps of storing information and regulating access to theinformation based upon a security measure. In an exemplary embodiment,the security measure may comprise one or more biometric characteristics,which is described in further detail below, although it should beunderstood that any desired security measure may be utilized wheredesired.

[0015] In order to illustrate the foregoing method, the followingexample is provided comprising a storage device 12, such as anidentification memory card, a processing device 14, such as anidentification card reader, and an interface 16, such as a host device,as is illustrated in FIG. 1.

[0016] The term “storage device” as used herein should be broadlyconstrued to comprise any device that includes the capability of storinginformation, such as via any suitable electronic or magnetic storagemedium adapted for storing information in digital and/or analog form.The term “identification memory card” should also be broadly construedto comprise any storage device suitably sized and configured so as to beportable. For purposes of illustration, the following examples aredescribed in relation to one embodiment of an identification memory cardcomprising a smart card type of device, such as a Digital ID™ (“DID™”)card, which is preferably sized and configured corresponding to aconventional credit card and includes memory and processing capabilitiesto store and process information in digital form. It should beunderstood, however, that the identification memory card may compriseother sizes and configurations where desired as well as store andprocess information in other formats, such as analog and/or magnetic, toname a few.

[0017] The term “processing device” as used herein should be broadlyconstrued to comprise any device having the capability for communicatingwith the storage device and interface described herein and forprocessing information relative to these devices where desired. The term“identification memory card reader” as used herein should also bebroadly construed to comprise any suitable type of processing devicecapable for communicating with the identification memory card and hostdevice in accordance with embodiments of the present invention, such asis illustrated in FIG. 1 and described in detail below.

[0018] The terms “interface” and “host device” as used herein should bebroadly construed to comprise any suitable device adapted forcommunicating with the processing device/identification memory cardreader and/or the storage device/identification memory card, wheredesired. For example, the host device may comprise a separate device,such as a computer or telephone or any other suitable device, capable ofinterfacing with the identification card reader. This interface may beaccomplished by any suitable, means, such as via standard Serial, USB,or IEEE-1394 “firewire” computer interfaces. In other embodiments, thehost device and identification card reader may comprise a single device.Application software may run on the host computer for any number ofgiven services, such as commercial transactions, medical records, traveldocuments, entertainment transactions, government administrativedocuments and the like. Each service may have distinct applicationsoftware as well as a unique identification reader/sender associatedwith it for reading and transacting the transactions of theidentification memory card. The host computer gains access to theidentification card data through interface with the identification cardreader, which in one embodiment includes a user-specific biometrickeying device on it. The identification card reader sends the biometricdata to the host computer for later processing and comparison. Thereader may be unique for other applications. Different applications mayaccess different encrypted areas of the identification card's securememory where desired.

[0019] The term “computer” as used herein, includes any device capableof receiving, transmitting, and/or using information, including, withoutlimitation, a processor; a microprocessor; a personal computer, such asa laptop, palm PC, desktop or workstation; a network server; amainframe; an electronic wired or wireless device, such as for example,a telephone; an interactive television or electronic box attached to atelevision, such as for example, a television adapted to be connected tothe Internet; a cellular telephone; a personal digital assistant; anelectronic pager; and a digital watch.

[0020] As will be described in more detail below, in accordance withvarious embodiments of the present invention, information may betransferred between the storage device/memory card 12 and one or morelocations external to the storage device/memory card 12. The term “oneor more locations” should be broadly construed to comprise anydesignated location that is desired to interact with the storagedevice/memory card 12, such as an institution as an example, as isdescussed below. The one or more external locations may include one ormore databases or similar types of storage devices capable ofinteracting with the storage device/memory card 12 by uploading anddownloading of the information.

[0021] Information may be transferred between the storage device/memorycard 12 and the various external locations via the processingdevice/identification memory card reader 14 and/or interface/host device16, for example, over any network, such as, for example, any wired orwireless network, such as a telephone or cellular telephone network, theInternet, an intranet, or an extranct.

[0022] In one embodiment, for example, although others are applicable aswell, the reader may have a configurable contact arrangement thatprovides for each reader being unique for a given application. In thisway, different readers may be needed for access to different areas ofthe identification card memory. The identification card reader maycontain an AC or DC power source and a controller interfacing with theidentification card. Furthermore, location tracking may also beincorporated into the overall system where desired. For example, thereader may be equipped with required front end RF and conversion neededto support a single chip receiver and a global positioning system(GPS)processor in the identification card.

[0023] In another embodiment, the identification card may contain aconfigurable contact arrangement that is decoded for access to thesecure memory of the identification card. In this way, application datacontained in the memory for one purpose preferably will not be accessedby another unrelated application intended for another purpose. Forexample, a provider of medical records cannot have access to commercialbanking records, and vice versa. In this manner, access to the data isrestricted and tailored for one use or another. Identification cardmemory may be segmented by each application area. Each area may also beassigned a designated capacity space for storage. These informationareas may include, but are not necessarily limited to, one or more ofthe following examples: encrypted data of an identification cardcarrier, photographs, medical history, credit card information, dentalrecords, driver information, credit card records, immigration documents,travel and passport records and general personalized data, etc.Furthermore, the identification card may be equipped with a globalpositioning system capable device that may be powered from theidentification card reader where necessary. An RF feed may be utilizedwhen the device contained on the card, such as an onboard processor,cannot receive energy from an onboard antenna.

[0024] An exemplary embodiment may be used as a digital identificationdevice. The digital identification device may comprise a card or liketype of device that may be utilized as a secure personal informationmedium. In this embodiment, non-removable, non-volatile solid statememory, such as flash memory, may be used to store encrypted digitaldata in the record unit, although other storage mechanisms may also beutilized where desired. The memory may be partitioned and adapted tostore specific data types in specific locations in the memory. In thisway, memory blocks may be assigned to information areas such as, forexample, personal name, encoded digital individual identifyingphotograph, medical history data, driver's data, etc. The card may alsohave a connector, such as along its bottom surface, which interfaceswith a separate reader, such as a playback/send reader unit, when thecard is inserted into a recessed port, such as in the reader's topsurface. The playback/send unit may also have a unique pin code, whichallows access to the specific data encoded on the digital identificationmemory card. In this manner, only specific users can gain access tospecific data, making the card unalterable by others. For example, itcan be regulated so that the individual who is issued the card, i.e.,the owner of the card, can not access the data to tamper with or changeany information, police can access the Picture ID and driver's data butnot the medical or other personal data, likewise a doctor can access themedical history but not bank records, etc.

[0025] As indicated earlier, a location tracking mechanism, such as asingle chip GPS engine or any other suitable device, can also beincluded as a part of the overall system and method. In one embodiment,when connected to the playback/send unit, an electrical path is createdthat connects the Antenna on the playback/send card reader unit to thesingle chip GPS solution. Power is then applied via the playback/sendunit. Upon power-up and a time delay needed for the GPS signal to beprocessed, time and location information is available. This location andtime information may also be used to time stamp designated or everytransaction in the digital identification card. Furthermore, theplayback/send unit may also contain a biometric fingerprint reader thatallows correlation from user to stored biometric information on thecard. Only a correct match will allow access to data on the card.

[0026] Another embodiment comprises a digital identification memory cardwith Wireless connectivity. In this embodiment, the digitalidentification memory card may be mated with wireless transmissioncapability. In this embodiment, the digital identification memory cardmay be enhanced with microprocessor, RF receive, RF transmit and a powersource, such as a battery. This capability allows for connectivity towireless LAN as well as the Internet via wireless Internet connection.Reception and decoding of the (GPS) enables the card to locate itself.In this way the location of the card can be broadcast, received andshown on a map using a standard Internet browser. Also short messagingservice (SMS) or enhanced messaging service (EMS) or other text messagescan be sent to a wireless mobile handset upon request of authorizeduser. In this embodiment, the playback/send unit may also operate as abattery charger.

[0027] In another embodiment, a location device can be provided on thememory card and may communicate by wireless means with a reader in theform of a scanner, when the card is brought into proximity with thescanner. For example, the location device can be adapted to transmitdesignated information, such as an ID, to the scanner eitherautomatically or upon request of the scanner. The location device may bepowered by either a source external the card, such as by the scanner,when the card is brought into proximity with the scanner, or by a powersource located on the card itself. In this embodiment, the locationdevice may be adapted to communicate with the scanner from variousdistances, such as directly next to one another, i.e., 0-1 foot or fromlarger distances, such as the size of a room or building or a complex,etc. The scanner may further process the information received from thecard in any desired manner. For example, the scanner may be utilized asa counter, such as to count the number of passerby's, such as for use atstores, conventions, trade shows, etc. In addition, the scanner maycompare the ID against designated information, for example, anallow/deny list, most wanted list, etc. The designated information maybe stored local at the scanner or provided from an external storagesource, such as via a network connection. The scanners may be located atvarious preselected locations, such as at border check points or othersecured areas, and in radar or other law enforcement equipment, etc.

[0028] Still another embodiment is utilized as a personal digital voicerecorder for persons, including but not limited to medical patients andchildren. In this embodiment, the recorder stores real time voice data,such as non-volatile memory. Recording may start at any desired times,such as by a parent, utilizing the playback/send unit. The recorder maythen be attached to a user, such as a child or patient, and allproximity sound to the child or patient is recorded until either a lowpower condition or a memory full condition is reached. The memory may bescalable according to the amount of recording time and fidelity desiredby the parent or authorized custodial person.

[0029] Another embodiment may be utilized as an automatic voicenotebook, such as for health care professionals on rounds as an example.Similar uses, such as by building inspectors, maintenance or securityand Military personnel, as an example, are also anticipated. In thisembodiment, memory, such as non-removable, non-volatile memory, such asflash memory, may be used to store encrypted digital data in the recordunit. A small cell may be used in this unit to keep size and weight to aminimum. A real-time clock may be embedded in the record unit to be usedfor time stamping the recorded voice segments. The record unit may havea connector, such as along its bottom surface, which interfaces with aseparate playback unit, such as when the record unit is inserted into arecessed opening in its top surface. The playback unit may includeconventional features, such as speaker, play button, volume control and“forward/reverse” switch for navigating within the data. Both the recordunit and the playback unit may further have identifying features, suchas matching bar codes on their housings, which can be used to identifythe individual units in case of loss or to confirm identity.

[0030] A further embodiment pertains to a method and system ofauthentication and tracking of the personal originator of electronicfiles. This method enhances security and provides accountability forfiles such as electronic mail and electronic commercial documents toname a few. The unique personal identifier such as one or more biometricparameters are used in place of a traditional signature or written mark.This method utilizes new technology that makes use of a compact portableelectronic storage device, unique identifying personal markers, such asbiometrics and other personal characteristics, special tracking circuitswith global positioning satellite technology, software, and anyinternetworking or linking of communication devices such as computers,PDA's cell phones, etc. This method further utilizes a designated uniquereader to interpret the digitized data and authenticate the data byusing one or more biometric sensors. This method also provides for aunique identifying mark visible “on the outside” of the file thatverifies the identity of the sender of the file before the file isopened and potentially downloaded onto the recipients hard drive. Themethod thus allows for personal authentication and accountability aswell as the exact place and time of file origination. Some exemplaryadvantages and embodiments of this method are listed below.

[0031] Security—the originator of the file is identified. Forgery andfraud utilizing electronic documents can be eliminated. This applies toall aspects of business including commercial and government.

[0032] Safety—the authenticated signature is visible without opening theelectronic file. This method allows individuals, businesses, andgovernment to automatically reject all files without an externalauthentication mark. This will make passing and spreading of harmfulelectronic programs such a “worms” and “Viruses” much more difficult.

[0033] Location—this system allows for location tracking either in realtime or by specific event. This is done using GPS technology andsoftware. Not only can the location be generally discovered but theexact place, time, and person can be discovered and brought to justice.Specific areas and people can be watched by authorities more closely andapprehended.

[0034] Privacy—this method allows the individual to chose what files aresent to his or her computer or device. This will effectively regulate“spam” and the invasion of an individual's privacy.

EXAMPLE A Home Use

[0035] User I - - - DID™ Card placed in reader “HOME USE” - - -fingerprint and/or retinal scan confirmation confirms identity - - -electronic file is written and sent from “HOME” computer - - - Recipientcomputer receives electronic file into IN BOX - - - User 2 openscomputer and views IN BOX - - - User 2 identifies an “AUTHENTICATIONMARK” verifying the identity of the sender - - - User 2 opens the fileand reads content safely and securely.

[0036] The procedure may be utilized over any computer network, such asthe Internet. In addition, the procedure may be utilized in a similarmanner for any person to person or multiple party communication in realtime, such as instant messaging or chat room communication.

[0037] Alternatively, User 2 may pre-program his computer to only allow“Authenticated” signed files. This will automatically block most “spam”before it reaches the IN BOX. This protects the individual's privacy.

EXAMPLE B Illegal Activity

[0038] User I - - - logs onto internet without secureauthentication - - - sends file with a new virus to GOVERNMENT or BANKcomputer - - - Recipient computer software checks for AuthenticationSeal - - - No biometric seal is indicated - - - file automaticallydeleted - - - return message to computer originator stating no personalauthorization so file was deleted without being read.

[0039] This example demonstrates a security level to help protectbusiness and government files from attack by viruses, worms and hackerstrying to hide their identity. The integrity of the organizationscomputer network will be safer.

EXAMPLE C Identifying and Tracking Wrongdoers

[0040] User I - - - DID™ Card placed in reader - - - biometric sensorverifies ownership using fingerprint and or retinal scan forexample - - - time and place stamped via GPS chip - - - electronic filewith NEW VIRUS is created and sent to bank - - - bank computer opensfile and becomes infected - - - User 1 is identified as John Doeresiding at 123 Smith Lane Hollywood Calif. 99201. The file originatedat (exact location and time and date) - - - the bank blocks all furtheremail authenticated from User 1 biometric signature - - - theauthorities quickly find and arrest the wrongdoer - - - his DID™ Carddocumented the transaction and is used as evidence in his trial.Similarly, the system can be utilized to prevent child pornography.

[0041] In an alternative version, the DID™ Card can be real time trackedvia GPS and the criminal located faster.

[0042] In a further embodiment, the memory card may be utilized as ameans to conduct various financial transaction, such as cash withdrawalsor transfers as well as check or credit card transactions, to name afew. For example, in a cash transaction, the memory card may be utilizedto reach a designated banking institution, such as over a network, forinstance, the Internet, to electronically transfer funds from aspecified account so as to be downloaded and stored on the memory card.In this embodiment, the memory card becomes, in essence, a securewallet. Funds may also be transferred from other institutions orindividuals to a particular memory card.

[0043] In a similar manner, funds may be transferred in the oppositedirection from a memory card to a designated financial institution, suchas for deposit, or to some non-financial institution or an individual,such as for a purchase or payment.

[0044] Also, in a check transaction, the same process can follow in thata check may be stored on the card, and when connection is made to adesignated institution, the checking information may be uploaded fromthe card and download at the institution, such as for deposit or to makea purchase or payment by check, or the transaction may be for checkcashing, in which the further step may occur of funds in electronic formbeing transferred from the institution and downloaded onto the card.

[0045] In the present embodiment, since funds are transmitted andreceived coded according to a biometric, individuals, government andbusinesses may freely distribute funds over the Internet, such asemployee payroll. In addition, should an owner ever lose or misplace hisor her card, any funds that may have been be stored on that originalcard are not lost. A person finding the lost card can not access thefunds, since there will not be a biometric match. The same funds canthen be provided on a new card by the bank, institution or party thatissued the funds originally. The original funds that were issued mayalso be voided where desired.

[0046] Another embodiment in accordance with the present inventionpertains to signature verification. As is illustrated in FIG. 1, anexemplary embodiment comprises a storage device in the form of a memorycard 10, a processing device in the form of a reader 12 and a hostdevice in the form of a computer 14. As indicated above, in otherembodiments, the reader and computer may be combined together in asingle device where desired. Other processing devices may utilized aswell, such as fax machines, etc. In this embodiment, the memory card 10and an associated security measure, for example, biometric informationstored on memory card 10, may be utilized to verify identity. The memorycard 10 may be used in combination with one or more biometriccharacteristics taken from the user for the purpose of signatureverification. The following illustrate some examples in accordance withthe present embodiment.

[0047] In one example, the memory card 10 and biometric match may berequired of a user in order to gain access to a designated device, suchas to log onto a given computer. The memory card 10 and biometric matchwould in essence serve as a password in this embodiment to verify theidentity of a user. Access may be denied where a user's identity is notverified. In other embodiments, access to any given computer may berestricted to designated individuals, so that the memory card andassociated biometric information would also serve to limit access toonly permitted users.

[0048] In addition, in accordance with this and other examples, thememory card 110 and biometric match may be required of a user in orderto communicate with a recipient, such as electronically over a network,for example, by email, a digital sender, fax or other document inelectronic form. As indicated above, where the memory card 10/biometricmatch is required to log onto a computer, then identity has already beenverified and further security measures in order to communicate with arecipient electronically may be optional where desired. Alternatively,if there are no log in security measures or for added security, anelectronic communication may further require an authentication mark, toverify the identity of the sender, which may be packaged with acommunication sent to a recipient.

[0049] The authentication mark in accordance with the variousembodiments may be utilized so that it is either visible to therecipient or not, as may be desired. A visible authentication mark, asindicated above, may serve as a signal to a recipient that it is safe toopen a document. The presence of the authentication mark, however,irrespective of it being visible or not, may serve as a mechanism forsignature verification, as discussed below. The system can be set up,for example, so that a communication will not be sent from a particularcomputer and/or will be refused receipt by a recipient computer unlessan authentication mark is present. Alternatively, it can be arranged sothat the sender and/or recipient computers are able to detect thepresence of an authentication mark, and then notify the recipientwhether or not one exists. Other examples are also possible.

[0050] An authentication mark may include a variety of designatedinformation regarding the sender, such as name and location. Locationinformation may be provided via the computer 14, such as a particularinternet protocol(“IP”) address. In other embodiments, locationinformation may be provided by other means, such as via memory card 10,for example, GPS tracking information may be uploaded from the card 10to the computer 14 via reader 12. Biometric and/or Name information maybe provided from the memory card 10. Other information may also beprovided as well where desired, such as time and date stamp from eitherthe memory card 10 or computer 14 or both.

[0051] In a transaction, the authentication mark serves to verify theidentity of a sender of an electronic communication, and accordingly,may also serve to authenticate the content of a particular electroniccommunication. For this reason, the authentication mark may function asa form of signature verification or as a substitute for a physicalsignature, such as in situations requiring a signature to be binding,for example, legal documents, such as contracts, financial transactions,business transactions, etc.

[0052] In still another embodiment, a memory card can be used to verifyidentity of an individual in situations where merchandise or servicesowed to that individual is desired to be received, such as will calltransactions.

[0053] Some examples of the various advantages of certain embodiments ofthe present invention include:

[0054] 1. Configuration—a storage device, despite its complexity ofmicrochips and printed circuit board interconnections, is configuredinto a lightweight device, such as a card that can be easily stored in awallet.

[0055] 2. a storage device does not require a battery for its operation.

[0056] 3. Security—data entered via contacts or pins is encrypted andstored. Outgoing data is then decrypted. This can only be done if thecontact reader is classified as a reader for that specific data.

[0057] 4. All data is partitioned or compartmentalized so only certainreaders (also referred to as playback/send units) can have access tocertain data. For example, if this device were used as a driver'slicense, a police reader would have access to the digital photo, drivingrecord, arrest or conviction record of the driver.

[0058] 5. No data can be transferred unless there is a biometric matchbetween the reader (playback/send unit) and the person who possesses thecard—such as fingerprint or fingerprints, palm or hand print, retinalmatch, face print, or DNA screen, as examples.

[0059] 6. A digitally encrypted picture of the owner of the card.

[0060] 7. Data from the card is automatically stored in the hard driveof the card-issuing establishment and can therefore be easily replacedby uploading using special software.

[0061] 8. Ruggedized for protection of internal circuits and microchips.

[0062] 9. Integration of location tracking technology, such as GPStechnology with unique circuitry allowing for exact placement of thecard in time and space when it is utilized. This feature can havewidespread implication, such as in preventing crime or fraud in multipleindustries.

[0063] 10. Interactive nature—a storage device can be edited as well asunedited. The advantage of this feature is reflected in this example: Aperson visits a doctor. The person presents his card. He or she isbiometrically linked to the card so ownership is verified. His or herinsurance information and medical information from his or her lastencounter with any physician is recorded, as is the time and place he orshe was seen. The doctor examines the patient, updates the card throughthe physicians send/play back unit and writes the patient a newprescription (special software can further assure that the prescriptiondoes not interact adversely with other medications the patient ispresently taking, can also inform whether the drug is covered by his orher insurance company, and can clearly print the name of the mediationand instructions). The patient then goes to the pharmacy. He or she isagain identified via biometrics, his or her card is placed in thepharmacy reader. The pharmacy reader cannot read other information aboutthe patient except items permitted to access. This will primarily beinsurance information and the prescription information. This is oneexample of the interactive nature of the card, although as should beunderstood, other examples may also be provided.

[0064] The interactive nature of the identification card in accordancewith embodiments of the present invention may provide any number of thefollowing advantages:

[0065] Identification protection through encryption and/or biometrics.

[0066] Confidentiality by the partitioned memory and contact system ofthe play/send functions to allow only information needed for eachtransaction.

[0067] Unique ability to edit based on access to certain portions of thesystem by certain readers.

[0068] Security—no one reader can read all portions of the system

[0069] Reduction in medical error—the information on the patient's examis accessible to all medical specialists in different locations all overthe world. The time and place stamp helps with the accuracy anddecreases the doctor's need to rely completely on patient recall, whichleads to better care and markedly reduced costs to the medical industry(less duplication of test, etc.). Further, prescription error will beeliminated saving lives and money.

[0070] Insurance Fraud—people cannot use other people's cards, havingenormous implications in Medicaid fraud and health insurance fraud ingeneral.

[0071] Prescriptions can be linked to what the insurance formulary willcover—this allows both pharmaceutical and health insurance companies tosame money.

[0072] 11. An identification card may be uniquely treated so that it isresistant to elements and routine mechanical stress. An example of thisis flame resistance, water resistance and bend resistance.

[0073] 12. Contact as well as adaptation to contactless operationbetween the card, reader and host device.

[0074] Some further examples of advantages of still other embodiments ofthe present invention include:

[0075] 1. Power source included in the card, such as alkaline, nickel,lithium battery or solar cell, as examples.

[0076] 2. Location tracking added.

[0077] 3. Mechanism for emergency contact, such as an E911 feature—thismay be a contact feature or a voice recognized feature, as example,responding to words such as “help”.

[0078] 4. Integration capability of Wi-Fi technology to adapt theproduct through circuit integration to a local area network in a definedregion, some examples include blue tooth and 802.11.

[0079] 5. Integration of digital images through lens and voice transferthrough microphone/speaker adaptability.

[0080] In accordance with the various embodiments of the presentinvention, the following is a partial listing of some exemplaryapplication areas:

[0081] Police and Law enforcement.

[0082] Insurance Industry, including healthcare. pharmaceuticalformularies, Medicaid, Medicare, etc.

[0083] Medical—Dental records.

[0084] Financial such as credit cards, debit cards, bank cards, etc.

[0085] Hospitality—such as travel and loyalty points.

[0086] Immigration such as student visas.

[0087] Government—social security card, homeland security card.

[0088] Corporate.

[0089] Individual and Privacy Identity Protection.

[0090] Entertainment.

[0091] Personal use.

[0092] In addition, embodiments of the present invention may furtherinclude a memory device, such as a stick/chip, which may only record andnot have an audio or playback feature directly incorporated into theunit. The separate and detachable memory stick may be programmed torecord and document any disruption or removal from the system includinglogged in and logged out times and dates. Also, the memory stick canhave a code that does not allow any changes to be made to the recordedvoice without using a unique code, such as, for example, a 12 digit codeaccompanying the original unit. This will prevent tampering and allowproper documentation of originally recorded voice data. In otherembodiments, the memory device may be incorporated within theidentification card itself.

[0093] The following illustrates in more detail some of the exemplaryapplication areas in accordance with the various embodiments of thepresent invention.

[0094] 1. Homeland Security:

[0095] The following describes one exemplary embodiment in relation tohomeland security. In this embodiment, a foreign national enters theUnited States (or similarly, some other country) and is issued anidentification memory card. The card may be encrypted with a digitalphotograph and other unique identifying biometric data, such as afingerprint. The entry is permanently time, date and place stamped byindisputable GPS chip in the card. This card can be tracked in real timeor traced with each use. Uses in cards for student visas, visitor visas,passports, etc., can be utilized with this technology. The legal recordfor this individual can be entered into the card, such as the purposehere in the U.S. and who the immediate family members are, etc. Thisinformation may be seen only by the proper legal authorities, such asthe police, INS, etc. No one else can use the individual's card becauseof the biometric utilization features. Without the fingerprint, forexample, the card is useless and cannot be read. An individual is linkedto a particular card. The card may also be tracked where desired. Ifsomeone is being sought for illegal activity, as an example, the cardwill locate them via GPS. If they have discarded the card and areapprehended with someone else's card, the biometrics will not match. Ifthey do not have any card, or a proper card, then their biometric datawill reveal their true identity. Law enforcement will have biometricreaders that are part of the system to help in this process.

[0096] Furthermore, in other embodiments, cards may be utilized as asocial security/homeland security card. These cards can provide accurateinformation that preferably cannot be altered with the exception ofauthorized government agencies that issue the data. The biometric linkto each card verifies the individual of the card as owner and can placethe owner at a specific location, date and time. This system provides anunprecedented level of personal identity security and protects societyfrom imposters and criminals wishing to cause harm by using deceitfulpractices. The social security number for each person can be digitallyencrypted and protected by multiple levels of biometric security. Thiswill virtually “identity theft proof” the card. Individuals may alsochoose if they want the card to be trackable in real time to help themlocate it if lost. The universal applications will encourage people towant to have a single memory card as opposed to a wallet full ofseparate conventional cards.

[0097] 2. Law Enforcement:

[0098] The identification card can also be utilized as a driver'slicense. The added features can include information such as outstandingtickets, prior arrests, etc. Biometrics assures the identity ofindividuals to authorities. The owner of the card benefits by the securenature and unalterability of the card. The owner also benefits from theuniversal applications, one of which will include the insuranceinformation and car registration stored on the card. This will also helpin eliminating the possibility that individuals will be issued citationsfor not having these cards available.

[0099] 3. Healthcare

[0100] One feature of the memory card, besides the safe transfer ofmedical records and dental records, including x-rays, is fraudprevention. A medical provider may not be able to commit fraud bystating a patient was treated that was not treated since the biometricsand time/place stamping offered by GPS clearly shows the patient was inthat location at that time. Further, a health insurance card such asMedicaid or Medicare card cannot be used by anyone but the owner of thecard. This will help to prevent unauthorized persons such asunregistered illegal aliens from illegally gaining access to theMedicaid or Medicare system. It will also prevent the illicit receipt ofprescription medications. It will ultimately prevent anyone but theauthorized owner of the card to derive any health or medical benefitsfrom the card.

[0101] 4. Financial Transactions

[0102] The memory card can be utilized for electronic transactions,including, for example, credit card, debit card and ATM features.Examples would be similar to how these stand-alone cards are used todaywith a major exception. Personal biometric data is presented at the timethe card is used, which will eliminate credit card fraud and theft. Forexample, no transaction can take place with the card, such as at adepartment store check-out register, unless the biometric indicators arematched, such as fingerprint. Further, as discussed above, the manner inwhich the card is designed in certain embodiments will not allow othercompartments to be viewed. The reader will only be able to access/verifyneeded information for the transaction. This might include a catalog ofcredit card numbers to be chosen from, a photo ID and fingerprintverification, as example. For illustration purposes, pins 1 and 3 areattached to the reader and interfaced with the card, allowing display ofthe data onto a computer screen, register screen, or handheld readerwith LCD. The transaction is permanently time/location stamped by thecard itself.

[0103] 5. Privacy

[0104] One of the features of the memory card in accordance withembodiments of the present invention is privacy. No one place orestablishment has access to all the identifying information. A merchantor other third party will only have access to designated information.The remainder of the information is protected. The information may alsobe date/time stamped for added protection as well as tracked wheredesired.

[0105] Depending on use, a memory card may be tracked by an individualand not necessarily any organization. This may be done via acellular/satellite network and corresponding Internet website. An aspecthere is the ability to compartmentalize the data and its use. Thisallows one card to be used for all features and privacy to bemaintained.

[0106] The following is another exemplary embodiment of the presentinvention. In this example, Baby Jane Doe was born on Jun. 2, 2003 at2:00 AM EST. at Winthrop Hospital in Mineola N.Y. Her physician signedher birth certificate, which was forwarded to New York State forprocessing. The nurse in the hospital used special ink to mark her handprints and footprints for the proud parents. A copy was also forwardedto the Social Security Administration. The Social SecurityAdministration issued Jane Doe a card called the DID™ Card. It is aspecialized memory card that will be with Jane Doe for the rest of herlife. It will store her biographical and biometric information. It willprotect her from being the victim of fraud and identity theft. It willhelp keep her information private as she grows into an adult and throughthe many facets of the life ahead of her. This new card will helpprotect her health. It will help prevent medical errors. The card willenable doctors to treat Jane Doe with greater accuracy. It will alsohelp Jane Doe save tens of thousands of dollars over the course of herlife. The following illustrates the possible uses of the DID™ card overJane Does' lifetime.

[0107] Jane Doe receives her DID™ card two weeks after she arrives homefrom the hospital. The DID™ card is preloaded by the Social SecurityAdministration(SSA) with the following information. Name, address, dateof birth, SS#, digitally encrypted picture, Digitally encrypted handprint(all of this information can not be edited, erased, rewritten,tampered with or reproduced except by the SSA), digitally encryptedphoto of both parents as well as parents fingerprints and retinal print.The remainder of her card is empty storage which will be filledthroughout her lifetime. Since Jane Doe needs to see the pediatrician inthe first days and weeks of life, it will be necessary to provide healthinsurance information for her. Jane Doe's DID™ card will already startto be used. The DID™ card is brought to the Insurance Company or to thehome computer to link to the insurance company website by Jane Doe'smother. The card is placed in a reader with special contacts between thecard and the reader which are only available for “INSURANCE-HEALTH” use.A digitally encrypted picture of Jane Doe, her mother and her fatherappears on the linked computer screen or LCD monitor at the insurancecompany. Jane Doe's mother places her thumb into the biometric sensorattached to the reader. The biometric print confirms that this is JaneDoe's mother and Jane Doe is the owner of the DID™ card. Jane Doe'sinformation needed for insurance processing is then downloaded onto thedatabase of the insurance company. The insurance company then downloadsall needed insurance information for Jane Doe. The transaction ends.Jane Doe's first stop with her DID™ card is at the doctors office. Sheenters the office and presents the DID™ card to the office receptionistwho places it in a reader. Jane Doe's photo, as well as her mothers andfathers appears on the LCD screen. Jane Does mothers fingerprint isentered via the attached biometric sensor(and retinal biometric aswell). The receptionist verifies this is Jane Doe and her mother. Theinsurance information is then entered via USB port into the database ofthe doctors office. The exact time and place of the visit are stamped onJane Doe's DID™ card via unique GPS technology. The “MEDICAL” portion ofthe card is accessed. The doctor records his findings. The uniquelyplaced pins only allows certain portions of Jane Doe's DID™ card to beread by the doctors office. The doctor then records his information fromtoday's visit and downloads it onto the card. A typical entry may be asfollows: Jane Doe, age 2 weeks. Brought in by mother for well babyinitial visit. Infant is healthy. Return in 2 weeks. May 6, 2003, 1248hours, 394 Old Country Rd. Garden City N.E. 11530 and Jane Doe biometricdownloaded to the doctor's record or medical database.

[0108] Jane Doe's subsequent visits can be recorded in a similarfashion. A detailed record of her allergies can be recorded. Herimmunizations can be recorded. All her medications can be recorded. Ifshe moves to another state, her DID™ card with all of her informationcan go with her. If the doctor prescribes medication for her, theprescription can be accurately read from her DID™ card in the pharmacy'sreader. Drug interactions can be found before Jane Doe is harmed.Potential allergic reactions can be thwarted. Software which links themedication with the Insurance company formulary can save both Jane Doeand her insurance company money.

[0109] As Jane Doe grows her biometric information is updated on ayearly basis. Her medical history is documented. All of herimmunizations are kept. Any trip to the emergency room is recorded forall of her doctors to see. Complete with date and time enteredpermanently into the record. Any visit Jane Doe had to the dentistoffice is also documented. Her dental x rays are added to her DID™ cardfor storage under the compartment labeled “DENTAL”.

[0110] At the age of 12, Jane Doe is going to go on a family vacation toEurope. She must now get a passport to travel. This is perfect for herDID™ card. Jane Doe presents her DID™ card to the passport authoritiesin the U.S. Her digital photo appears on the screen after the card isplaced in its reader. The reader cannot see any sections labeled“MEDICAL” or “DENTAL” to help secure Jane Doe's privacy. Nor can thereader see “INSURANCE HEALTH”. Special contacts on the reader will allowcertain transactions for this agency. A special section called “TRAVEL”appears on the screen. This only occurs after Jane Doe's fingerprint andretinal scan document that this is Jane Doe's DID™ card. Passportinformation is downloaded onto the card. The information is stored inthe databank of the agency for future use if needed. Jane Doe is nowready for her travel to Europe. Her parents have already purchased thetickets over the internet and downloaded them onto her DID™ card. Ofcourse her biometric authorization was needed to download the ticketfrom her home computer with attached home reader with special contacts.She now only has to present her DID™ card at the airport with herbiometric confirmations to board the plane and enter the European Unioncountries.

[0111] Jane Doe brings her DID™ card to the local DMV. Her identity isverified through the process she has been using her entire life to thispoint. Her photo is updated. She is given her drivers license which isdownloaded directly onto her card. The DMV also adds her carregistration and auto insurance information. These are in uniqueportions of her card known as “AUTOMOBILE-LICENSE”,“INSURANCE-AUTOMOBILE”, and “AUTOMOBILE-REGISTRATION” These portions canbe read in the future by the DMV and local authorities. Any legalconvictions or license restrictions will be seen here. Organ donorinformation can also be obtained. (This information may include themedical data needed for a national matching program to help hospitalscommunicate faster and find organ matches faster in the event of suddendeath—this can be done through interfacing the card with the hospitalscomputer and national databanks. The card can have things like bloodtype and HLA matching etc.) All of this information is stored in thedatabanks of the DMV, which can be linked to hospitals.

[0112] One day, Jane Doe loses her DID™ card. She is not worried. Sheknows that no one can use her card due to the biometric encryption andthe sensors needed for the card to work. She then logs onto her computerat home and via the Internet uploads all of her information onto a newDID™ card, including information from DMV, doctor or dentist, etc. Sheis identified by her biometric data utilizing both a retinal scan,fingerprints, and stored photo. She may wish to keep two DID™ cards incase one is lost in the future. The process of replacing the informationis simple and straight forward. Jane Doe is able to replace eachcompartment as it is needed. The fact that no one place holds all of herinformation protects her privacy.

[0113] Jane Doe became ill one day. She visited her new doctor. Thedoctor downloaded all of Jane Doe's history onto his database. Heexamined Jane Doe and decided she needed several medications. Jane Doewas not feeling well enough to go to the pharmacy to fill herprescription. Now she realized how elderly people that cannot get aroundmuch must feel. The doctor downloaded the prescriptions to the DID™card. The time and place stamp was entered automatically by the DID™card system. When Jane Doe returned home, she went to her Desktopcomputer. She placed her DID™ card in it's HOME USE ONLY reader which isconnected to her computer. She placed her fingerprint on the biometricsensor and the computer confirmed she was the owner of the DID™ card.She downloaded the prescription which was sent electronically to herpharmacy. She added special instructions that said “please deliver”. Thepharmacist also received Jane Doe's insurance information, allergies,and medical condition. He also received “other medications” notificationto compare. The medication the doctor prescribed was not covered by theformulary of Jane Doe's insurance. An alternative was suggested by thepreprogrammed software and confirmed with the doctor. Both Jane Doe andher insurance company saved money, and Jane Doe was conveniently restingat home when her medications arrived.

[0114] There are numerous other possible uses as well, such as:

[0115] Jane Doe gets working papers;

[0116] Jane Doe opens a bank account;

[0117] Jane Doe gets her first credit card;

[0118] Jane Doe uses her DID™ card to cast her first electronic voteonline;

[0119] Jane Doe goes to college and needs an ID card to get into theclubs and bars;

[0120] Jane Doe gets a job and her company uses DID™ cards for security;

[0121] Jane Doe juggles all of life's events using—her DID™ card forbusiness, Personal, travel, security, medical, and dental.

[0122] After a full and happy life. At the end of 99 years, Jane Doedies. Her DID™ card is sent to the Social Security Administration afterthe Death Certificate has been downloaded. The SSA records Jane Doe'sdeath and discontinues benefits.

[0123] In accordance with various aspects of the embodiments of thepresent invention, an example encompasses a lightweight, easily carriedmemory identification card for recording information and controllingaccess to this information. The memory card includes a file system ofelectronic files on the card, which are automatically detected andrecognized by selected authorized readers. The file system is organizedso that stored electronic files appear in separate and distinctcompartments in the card, so that only authorized preselected readershave access to particular compartments.

[0124] Biometric identifying information is imprinted in the card, sothat no data can be transferred unless there is a biometric matchbetween a reader and a person assigned to the card and who possesses thecard. Biometric identifying information can be a thumbprint,fingerprint, digital face image, retinal image, voice recognition or anyothers known to those skilled in the art of biometrics, such as DNAsampling. One exemplary device suitable for fingerprint authenticationperforms both a fingerprint match and pulse detection on the fingeritself

[0125] The memory identification card where desired can also have eachcompartment requiring a different unique pin code for access thereto.The separate compartments of the memory card may include a compartmentcontaining, for example, medical information relating to the assigneduser of the card, wherein the medical information is accessed only by apreselected memory card reader having the unique pin code assigned tothe compartment having the medical information. In this manner, themedical information cannot be accessed by other providing institutions,such as banks or government agencies.

[0126] The memory identification card can also have a single chip GlobalPositioning System (GPS) engine, to identify where the card is beingused. In certain embodiments, the GPS engine is activated and powered bythe memory card reader. In one embodiment the memory card does not needa separate power source, as the GPS information is revealed from flashmemory when the card is inserted within the reader.

[0127] In another embodiment, the memory identification card has a powersource, such as a battery. In one example, the battery may comprise alithium cell adapted to be recharged by a preselected card reader. Sucha battery-powered memory identification card can therefore be enhanced,such as with a microprocessor, RF receiver, and RF transmitter, forreceiving and transmitting wireless telecommunications.

[0128] The memory identification card may also display a photo image ofthe person assigned to the card. In connection therewith, in oneembodiment the memory identification card contains in a compartment adigitized photo image of the person assigned to the card, so that theexterior of the card will always bear the internally digitized image. Aforger of the image on the exterior of the card will not be able to usethe card. In addition, for fraud prevention, one of the compartments maycontain biometric identifying information about the assigned user of thecard.

[0129] The memory identification card also may have a button forinitiating a call, such as to 911, and sending a prerecorded messagewith a request for emergency medical or other assistance. Such anembodiment can also provide the location of the memory identificationcard.

[0130] The memory card may also have the capability to be integratedwith an apparatus for taking, storing and transmitting digital images,such as a digital camera.

[0131] Moreover, the memory identification card may have a an integratedor detachable memory stick/chip adapted to be programmed to record anddocument any disruption or removal of the card from an authorized usersystem.

[0132] As an alternate feature, the memory card may have a recorderintegrated or attached to the card for storing real time voice data intothe memory. In addition, security can be included to restrict access tothe stored information, for example, wherein the recorded voice data canonly be played back by access to a preselected reader.

[0133] In addition, the memory card can include an automatic voicenotebook, wherein the card is embedded with a real-time clock for timestamping recorded voice segments.

[0134] Further, when the card has the recording capabilities, therecorder can have a connector to interface with a preselected reader,having the capability to playback the data signals stored on the memoryidentification card.

[0135] In certain embodiments, the memory identification card is part ofa system for storing information unique to a particular person and usingthis information, for example, for identification, medical, security,insurance, entertainment, hospitality, financial and law enforcementpurposes. Such embodiments may include one or more of the followingfeatures:

[0136] a) a central establishment for collecting and storing theinformation;

[0137] b) lightweight, memory card to be carried by the person forrecording information downloaded from the actual establishment, whereinthe card includes:

[0138] i) a file system of electronic files on the card which areautomatically detected and recognized by selected readers, and the filesystem is organized so that stored electronic files appear in separateand distinct encrypted compartments; and

[0139] ii) biometric identifying information on the card so that no datacan be transferred unless there is a biometric match between a readerand a person assigned to the card who possesses the card; and

[0140] c) preselected card readers programmed to extract informationfrom the memory card from specific compartments, wherein eachpreselected reader has a unique pin code associated with a particularcompartment on the memory identification card, so that a preselectedreader can only extract information from a compartment for which thepreselected reader has the proper pin code associated with thatcompartment.

[0141] Embodiments of the present invention also include a method ofverifying the identity of, and extracting information about a person. Inan exemplary embodiment, the person carries a memory card in which isstored identifying biometric information about the person, wherein thisinformation is preferably stored in a compartment separate from othercompartments on the card. The person submits the memory card to bescanned by a reader for identifying purposes, and the card reader has aunique pin code, which allows access to the encrypted compartment on thecard.

[0142] Thereafter, an operator of the card reader compares the accessedbiometric information with biometric information taken directly from theperson having the memory identification card.

[0143] In addition, the memory identification card may contain otherencrypted compartments, each of which includes a different bundle ofinformation, such as medical, security, insurance, entertainment,hospitality, financial, travel, general business and law enforcementpurposes, to name a few, and each compartment may further have adifferent unique pin code for access thereto.

[0144] It is further noted that other modifications may be made to theinvention, within the scope of the approved claims. Accordingly, it isintended that the invention not be limited to the specific illustrativeembodiments, but be interpreted within the full spirit and scope of theappended claims and their equivalents.

I claim:
 1. A system for processing of information comprising: a storagedevice containing identifying information; a processing device forreading the identifying information contained on the storage device; asecurity device for measuring identifying information; wherein theidentifying information measured by the security device is compared tothe stored identifying information read by the processing device; and aninterface for transmitting information based upon the comparison ofmeasured identifying information against stored identifying information.2. The system of claim 1, wherein the interface transmits informationwhere there is a match between the measured identifying information andstored identifying information.
 3. The system of claim 2, wherein theinterface transmits an authentication mark when transmitting saidinformation.
 4. The system of claim 3, wherein the identifyinginformation comprises biometric information.
 5. The system of claim 4,wherein the authentication mark is based on the biometric information.6. The system of claim 5, wherein the storage device comprises a card,the processing device comprises a reader and the interface comprise acomputer, with the computer transmitting information over a network. 7.The system of claim 6, wherein the network comprises the internet. 8.The system of claim 6, wherein the authentication mark further compriselocation information of the computer.
 9. The system of claim 8, whereinthe location information comprises an IP address.
 10. The system ofclaim 8, further comprising a GPS tracking device on at least one ofsaid card, reader or computer for providing the location information.11. The system of claim 10, wherein the card comprises a plurality ofcompartments, in which each compartment contains different informationand requires a different unique pin code for access thereto.
 12. Thesystem of claim 11 in which said card displays a photo image of theperson assigned to said card.
 13. The system of claim 12 in which saidcard contains in a compartment a digitized photo image of the personassigned to said card.
 14. The system of claim 13 in which one of saidcompartments contains biometric identifying information about theassigned user of said card.
 15. The system of claim 6, wherein thesecurity device comprises a biometric device.
 16. The system of claim15, wherein the biometric device measures characteristics selected fromthe group consisting of facial characteristics, finger prints, DNA, andretina characteristics.
 17. Software for use in a system for informationprocessing, the system comprising: a storage device containingidentifying information; a processing device for reading the identifyinginformation contained on the storage device; a security device formeasuring identifying information; and an interface; the softwarecomprising: an element for enabling the interface to transmitinformation based upon a comparison of measured identifying informationagainst stored identifying information.
 18. The software of claim 17,further comprising an element for enabling the interface to transmitinformation where there is a match between the measured identifyinginformation and stored identifying information.
 19. The software ofclaim 18, further comprising an element for enabling the interface totransmit an authentication mark when transmitting said information. 20.The software of claim 19, wherein the identifying information comprisesbiometric information.
 21. The software of claim 20, further comprisingan element for basing the authentication mark on the biometricinformation.
 22. The software of claim 21, wherein the storage devicecomprises a card, the processing device comprises a reader and theinterface comprise a computer, with the computer transmittinginformation over a network.
 23. The software of claim 22, wherein thenetwork comprises the internet.
 24. The software of claim 22, furthercomprising an element for basing the authentication mark on locationinformation of the computer.
 25. The software of claim 24, wherein thelocation information comprises an IP address.
 26. The software of claim24, further comprising a GPS tracking device on at least one of saidcard, reader or computer for providing the location information.
 27. Thesoftware of claim 24, wherein the card comprises a plurality ofcompartments, in which each compartment contains different informationand requires a different unique pin code for access thereto.
 28. Thesoftware of claim 27 in which said card displays a photo image of theperson assigned to said card.
 29. The software of claim 28 in which saidcard contains in a compartment a digitized photo image of the personassigned to said card.
 30. The software of claim 29 in which one of saidcompartments contains biometric identifying information about theassigned user of said card.
 31. The software of claim 22, wherein thesecurity device comprises a biometric device.
 32. The software of claim31, wherein the biometric device measures characteristics selected fromthe group consisting of facial characteristics, finger prints, DNA, andretina characteristics.
 33. The software of claim 22, further comprisingan element for enabling the reader to extract information from said cardfrom specific compartments, with the reader having a unique pin codeassociated with a particular compartment on said card so that apreselected reader can only extract information from a compartment forwhich said preselected reader has the proper pin code associated withthat compartment.
 34. A method of information processing comprising:Storing identifying information; reading the stored identifyinginformation; measuring actual identifying information; and transmittinginformation based upon a comparison of the measured actual identifyinginformation against the stored identifying information.
 35. The methodof claim 34, wherein transmitting information further comprisestransmitting information where there is a match between the measuredactual identifying information and stored identifying information. 36.The method of claim 35, further comprising establishing anauthentication mark to transmit when information is transmitted.
 37. Themethod of claim 36, wherein the identifying information comprisesbiometric information.
 38. The method of claim 37, further comprisingbasing the authentication mark on the biometric information.
 39. Themethod of claim 38 further comprising providing a card for storing theidentifying information, a reader for reading the stored identifyinginformation and a computer for transmitting the information.
 40. Themethod of claim 39, further comprising transmitting information over anetwork.
 41. The method of claim 39, further comprising basing theauthentication mark on location information of the computer.
 42. Themethod of claim 41, wherein the location information comprises an IPaddress.
 43. The method of claim 41, further comprising providing a GPStracking device on at least one of said card, reader or computer forproviding the location information.
 44. The method of claim 41, whereinthe card comprises a plurality of compartments, in which eachcompartment contains different information and requires a differentunique pin code for access thereto.
 45. The method of claim 44 in whichsaid card displays a photo image of a person assigned to said card. 46.The method of claim 45 in which said card contains in a compartment adigitized photo image of the person assigned to said card.
 47. Themethod of claim 46 in which one of said compartments contains biometricidentifying information about the assigned user of said card.
 48. Themethod of claim 39, further comprising providing a biometric device formeasuring the actual biometric information.
 49. The method of claim 48,wherein the biometric device measures characteristics selected from thegroup consisting of facial characteristics, finger prints, DNA, andretina characteristics.
 50. The method of claim 48 further comprisingproviding said card with multiple compartments, each of which includes adifferent bundle of information, with said biometric information beingstored in one compartment, and other compartments containing informationof the type including one or more of medical, security, insurance,entertainment, hospitality, financial, travel, general business and lawenforcement information, each compartment having a different unique pincode for access thereto.
 51. The method of claim 50 further comprisingtransferring of the authentication mark and information transmitted fromthe computer to one or more target computers external to the computer.52. The method of claim 51 further comprising regulating access to theone or more target computers based on the authentication mark.
 53. Amethod of information processing comprising: Storing identifyinginformation on a card; reading the stored identifying information fromsaid card; creating an authentication mark based on the storedidentifying information; and transmitting information along with theauthentication mark to one or more locations to verify theauthentication of the information.
 54. A method of claim 53, furthercomprising measuring actual identifying information, comparing themeasured actual identifying information against the stored identifyinginformation and transmitting the information and authentication markwhere there is a match between the measured actual identifyinginformation and stored identifying information.
 55. The method of claim54, wherein the identifying information comprises biometric information.56. The method of claim 55, further comprising basing the authenticationmark on the biometric information.
 57. The method of claim 56 furthercomprising providing a reader for reading the stored identifyinginformation, a biometric device for measuring the actual biometricinformation and a computer for transmitting the information andauthentication mark over a network.
 58. The method of claim 57, furthercomprising basing the authentication mark on location information of thecomputer.
 59. The method of claim 58, wherein the location informationcomprises at least one of an IP address of the computer or a GPStracking device on at least one of said card, reader or computer forproviding the location information.
 60. The method of claim 59 furthercomprising transferring of the authentication mark and informationtransmitted from the computer to one or more target computers externalto the computer.
 61. The method of claim 60 further comprisingregulating access to the one or more target computers based on theauthentication mark.