System for verifying use of a credit/identification card including recording of physical attributes of unauthorized users

ABSTRACT

The present invention is directed to a method and apparatus for verifying an authorized user of a credit/identification card. The method includes the steps of scanning the card with an apparatus having a plurality of scanning devices for scanning a bar code, scanning the card for evidence of tampering, scanning at least one fingerprint on the card, and any other detectable information, and comparing the scanned information on the card to information of the owner stored on at least one accessible database in communication with the apparatus. Data transmissions between the apparatus and databases are protected by an encryption system. If the information on the card does not match the information germane to the owner of the card which is stored in the database, the card is withheld from the user. Otherwise, the user of the card is free to use it for a desired purpose.

BACKGROUND AND SUMMARY OF THE INVENTION

This invention relates generally to methods and apparatuses forverifying an authorized user of a credit and/or identification card, andmore particularly to a method and apparatus which utilizes a pluralityof scanning stations for verifying the authorized user of the card.

Recently, attempts have been made to develop systems for preventing theunauthorized use of credit cards. These systems typically utilizevarious devices for authenticating the identity of the user of suchcards. One such system has been to provide on the face of the card afingerprint of the owner of the card wherein the user's fingerprint mustmatch the fingerprint on the card. The concept of utilizing fingerprintidentification as verification for the authenticity of acredit/identification card is well-known. U.S. Pat. No. 4,582,985(Lofberg) and U.S. Pat. No. 5,180,901 (Hiramatsu) each disclose atypical identifying system. However, fingerprint identificationrequiring the user's fingerprint to be compared to a fingerprint of theowner on the card suffers from the disadvantage that the credit card mayeasily be tampered with, e.g., the owner's fingerprint is replaced bythe fingerprint of the unauthorized user.

Other methods of identifying authorized users of cards also suffer fromthe same disadvantage. For example, U.S. Pat. No. 4,995,086 (Lilley etal.) discloses a verification system whereby a bar code havinginformation about the owner of the card is provided on the card andcompared to information kept on a database which communicates with thesystem. Like fingerprint identification, the bar code which is appliedon the surface of the card can be tampered with.

Presently, there is a need for a method and apparatus for verifying anauthorized user of a credit/identification card which can detect whetherthe card has been altered so that an unauthorized user is prevented fromusing the card.

Among the several objects of the present invention are the provision ofan improved method for verifying an authorized user of acredit/identification card which is capable of detecting whether thecard has been tampered with or changed; the provision of such animproved method having several cross-checking steps which substantiallyensure authorized use of the card; the provision of such a methodcapable of verifying whether a fingerprint of the user of a card matchesa fingerprint of the owner of the card; the provision of such a methodcapable of verifying whether a voice print of the user of the cardmatches a voice print of the owner of the card; the provision of such amethod capable of verifying whether a retinal print of the user of thecard matches a retinal print of the owner of the card; the provision ofsuch a method which withholds the card from an unauthorized user; andthe provision of such a method which is capable of recording afingerprint of an unauthorized user.

Also among the several objects of the present invention are theprovision of an improved apparatus for verifying an authorized user of acredit/identification card; the provision of such an apparatus which iscapable of detecting whether the card has been tampered; the provisionof such an apparatus having several scanning devices for substantiallyensuring authorized use of the card; the provision of such an apparatushaving a fingerprint scanning device and associated means for verifyingwhether a fingerprint of the user of the card matches a fingerprint ofthe owner of the card; the provision of such an apparatus having amicrophone and associated means for verifying whether a voice print ofthe user of the card matches a voice print of the owner of the card; theprovision of such an apparatus having a retinal scanning device andassociated means for verifying whether a retinal print of the user ofthe card matches a retinal print of the owner of the card; the provisionof such an apparatus which withholds the card from an unauthorized user;the provision of such an apparatus which is capable of recording afingerprint of an unauthorized user; and the provision of such anapparatus which encrypts data transmission when communicating with acentral database.

In general, a method for verifying an authorized user of acredit/identification card comprises the steps of:

(a) inserting the card into an apparatus having a plurality ofscanning:stations, the card including a surface having a strip thereonwhich has information germane to the owner of the card, such as anidentification number and other personal data, and at least onefingerprint thereon of the owner of the card;

(b) scanning the strip of the card at an information strip scanningstation of the apparatus for verifying the information of the cardincluding the identification number;

(c) comparing the information stored on the strip of the card toinformation of the owner stored on at least one accessible database incommunication with the apparatus, the apparatus withholding the cardfrom the user if the information on the card does not match theinformation germane to the owner of the card which is stored in thedatabase;

(d) scanning the surface of the card at a graphic scanning station ofthe apparatus which digitizes the surface of the card by imaging everyline thereof;

(e) converting the image of the surface of the card to a digital numericsequence;

(f) comparing the surface of the card as scanned by the graphic scanningdevice and converted to a digital numeric sequence to a digital numericsequence stored in the database for determining whether the card hasbeen tampered with, the apparatus withholding the card from the user ifthe surface of the card does not match the surface of the card stored bythe database;

(g) obtaining a fingerprint of the user;

(h) scanning the fingerprint of the user at a fingerprint scanningstation; and

(i) comparing the fingerprint of the user to the fingerprint on the cardand to a fingerprint of the owner of the card in the database to ensureauthorized use of the card, the apparatus withholding the card from theuser if the fingerprint scanned by the fingerprint scanning device doesnot match the fingerprints on the card and in the database, whereby,upon matching the user's fingerprint to the fingerprints on the card andin the database for ensuring the user of the card is the owner of thecard, the apparatus allowing the user to use the card for a desiredpurpose.

An apparatus for carrying out the method of the present inventioncomprises an information strip scanning device for scanning theinformation strip of the card and means for comparing the informationcontained in the strip to information of the owner stored on at leastone accessible database in communication with the apparatus. Theapparatus withholds the card from the user if the information on thecard does not match the information germane to the owner of the cardwhich is stored in the database. The apparatus and database includeencryption means for encrypting data transmissions between the apparatusand the database. A graphic scanning device scans the surface of thecard in which the graphic scanning device digitizes the surface of thecard by imaging every line thereof. Suitable means converts the image ofthe surface of the card to a digital numeric sequence and means comparesthe surface of the card as scanned by the graphic scanning device andconverted to a digital numeric sequence by the converting means to adigital numeric sequence stored in the database for determining whetherthe card has been altered. The apparatus withholds the card from theuser if the surface of the card does not match the surface of the cardstored by the database. A fingerprint scanning device having a pad uponwhich the user of the card presses with a finger for obtaining afingerprint of the user scans the fingerprint of the user, and suitablemeans compares the fingerprint of the user to the fingerprint on thecard and to a fingerprint of the owner of the card in the database toensure authorized use of the card. The apparatus withholds the card fromthe user if the fingerprint scanned by the fingerprint scanning devicedoes not match the fingerprints on the card and in the database. Thus,upon matching the user's fingerprint to the fingerprints on the card andin the database for ensuring the user of the card is the owner of thecard, the apparatus allows the user to use the card for a desiredpurpose.

Other objects, features and advantages of the invention shall becomeapparent as the description thereof proceeds when considered inconnection with the accompanying illustrative drawings.

BRIEF DESCRIPTION OF THE DRAWINGS:

In the drawings which illustrate the best mode presently contemplatedfor carrying out the present invention:

FIG. 1 is a flow chart illustrating a method for verifying an authorizeduser of a credit and/or identification card of the present invention;

FIG. 2 is a block diagram of an apparatus for carrying out the method ofthe present invention;

FIG. 3 is a credit card of the present invention; and

FIG. 4 illustrates the reverse side of the credit card shown in FIG. 3.

Corresponding reference numerals designate corresponding partsthroughout the several views of the drawings.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT:

Referring now to the drawings, there is generally indicated at 10 amethod (illustrated in FIG. 1) for verifying the authorized user of acredit and/or identification card (illustrated in FIG. 3), generallyindicated at 12. Preferably, the card 12 should include a surface 14having at least one fingerprint 18 imprinted thereon of the owner of thecard 12. The card preferably has a reverse side.15 (FIG. 4) which has aninformation strip 16 such as a bar code or magnetic strip, imprintedthereon which has information germane to the owner of the card, such asan identification number and other personal data. The information strip16.and fingerprint 18 may be imprinted directly onto the card 12 andprotected by any suitable laminate as is well-known in the art. Asillustrated in FIG. 3, the card 12 has two fingerprints 18 of the ownerof the card imprinted on surface 14. The card 12 may also include otherinformation, such as a photograph 20 of it's owner and the name andaddress of the owner. It should be understood that the method 10 of thepresent invention is applicable to any situation where it is desired toverify or authenticate that the user of the card 12 is the owner of thecard. The method of the present invention is especially suited toverifying users of credit cards. The method 10 may also be used toverify the identity of authorized persons desiring access to arestricted area (e.g., hospitals, corporate research facilities, etc.).FIG. 2 illustrates an apparatus generally indicated at 22, for carryingout the method of the present invention, the apparatus 22 beingdescribed in detail after the description of the method 10 of thepresent invention.

Referring now to FIG. 1, method 10 initially comprises the step ofinserting the card 12 into an apparatus, such as apparatus 22, having aplurality of scanning stations, namely an information strip scanningstation 30, a graphic scanning station 32, a fingerprint scanningstation 34, a voice print recording station 36, a retinal scanningstation 38, and a photograph scanning station 40. As will be describedin greater detail below, the apparatus 22 may embody any number ofdesigns, so long as it is capable of performing the respectiveverification steps of the method 10.

After being inserted into the apparatus 22, the card 12 enters aninformation strip scanning station 30 for scanning the strip 16 of thecard 12 to verify the information of the card 12 including theidentification number. This information is sent to a microprocessor 42(FIG. 2) which compares the information stored on the information strip16, to include the card owner's identification number, to information ofthe owner stored on at least one accessible database 44 (FIG. 2) incommunication with the microprocessor 42 of the apparatus 22. In orderto insure complete security of data transmissions between the apparatusand the database, both the apparatus and database preferably includeencryption devices for encrypting and decrypting data transmission. Ifthe information on the strip 16 of the card 12 matches the informationstored in the database 44 for that particular card, the card 12 isexamined by the next station (i.e., the graphic scanning station 32).However, the apparatus 22 withholds the card 12 from the user if theinformation on the card does not match the information germane to theowner of the card which is stored in the database 44. The card 12, ifconfiscated, may be stored in any suitable compartment of the apparatus22 until the apparatus is serviced in which the cards 12 presented byunauthorized users and confiscated by the apparatus 22 may be properlyaddressed.

Next, the card 12 is examined by a graphic scanning 32 station in whichthe surface 14 of the card 12 is digitized by imaging every linethereof. The purpose of examining the surface 14 of the card 12 is todetermine whether it has been altered. The image of the surface 14 ofthe card 12 is converted to a digital numeric sequence which is sent tothe microprocessor 42 which compares the digital numeric sequence ofrepresenting the surface of the card to information directed to a priorscan of the card which is stored on the aforementioned database 44 oranother accessible database in communication with the microprocessor 42of the apparatus 22. If the digital numeric sequence of the card 12matches the digital numeric sequence stored in the database for thatparticular card, the card 12 is examined by the next station. However,the apparatus 22 withholds the card 12 from the user if the digitalnumeric sequence of the card does not match the digital numeric sequencewhich is stored in the database 44. As with the information scanningstation 30, the card 12 may be stored in any suitable compartment of theapparatus 22 until the apparatus is serviced in which the cardspresented by unauthorized users and confiscated by the apparatus may beproperly addressed.

As illustrated in FIG. 1, the card 12 is next examined by a fingerprintscanning station 34. This step of the method 10 of the present inventionrequires the user of the card 12 to provide a fingerprint 18 which iscompared to the fingerprint 18 on the card 12 and to a fingerprint ofthe owner of the card in the aforementioned database 44, or a separateaccessible database in communication with the microprocessor 42 of theapparatus 22, to ensure authorized use of the card 12. As with theinformation strip and graphic scanning stations 30, 32, the apparatus 22withholds the card 12 from the user if the fingerprint scanned by thefingerprint scanning station does not match the fingerprints on the cardand in the database 44. If the fingerprint of the user matches thefingerprints on the card 12 and in the database 44, the apparatus 22 mayallow the user to use the card 12 for a desired purpose, or, asillustrated in FIG. 1, the card 12 may be examined by subsequentstations if a more exacting level of verification is required.

In the event that the user does not match the fingerprint 18 on the card12 or the fingerprint of the owner of the card as stored in the database44, the method of the present invention further includes the step ofrecording the fingerprint of the user. The purpose of this additionalstep is to obtain evidence which could possibly be used to identify theunauthorized user of the card. The recorded fingerprint of theunauthorized user could be compared to fingerprints stored in otherdatabases, such as criminal file databases, employee databases, etc.

As mentioned above, if additional verification is necessary, the card 12may be examined by the voice print recording station 36, the retinalscanning station 38 and the photograph scanning station 40. It should beunderstood that any of these additional scanning steps may be performedseparately, or in any combination, and still fall within the scope ofthe present invention.

Referring still to FIG. 1, the method 10 of the present invention mayrequire the user of the card 12 to speak into a voice print recordingstation 36 of the apparatus 22 for obtaining a voice print of the user.This voice print is digitized and sent to the microprocessor 42 where itis compared to a voice print of the owner of the card 12 which is storedin the database 44, or a separate accessible database in communicationwith the microprocessor 42. As with the other stations, if the voiceprint of the user does not match the voice print of the owner stored inthe database 44, the apparatus 22 withholds the card 12 until it isproperly disposed of, otherwise, the apparatus 22 may allow the user touse the card 12 for a desired purpose, or the card 12 may be examined bysubsequent stations if a more exacting level of verification isrequired.

Accordingly, method 10 also may require the user of the card 12 to lookinto a retinal scanning station 38 of the apparatus 22 for obtaining aretinal print of the user. This retinal print is then sent to themicroprocessor 42 where it is compared to a retinal print of the ownerof the card which is stored in the database 44, or a separate accessibledatabase in communication with the microprocessor 42. As with the otherstations, if the retinal print of the user does not match the retinalprint of the owner stored in the database 44, the apparatus 22confiscates the card. If the retinal print of the user matches theretinal print of the owner stored in the database 44, the apparatus 22may allow the user to use the card 12 for a desired purpose, or the card12 may be examined by subsequent photograph scanning station 40.

At the photograph scanning station 40, the photograph 20 on the card 12is scanned and compared to a photograph of the owner of the card whichis stored in the database 44 for additionally ensuring that the card 12has not been tampered with. This scanning station 40 is preferably moresensitive than the graphic scanning station 32, since the latter isdesigned to locate the various components of the card 12 rather than thedetails of the photograph of the owner. Thus, if the photograph 20 ofthe owner of the card 12 has been replaced by a photograph of the user,and the card passes through the graphic scanning station 32 withoutbeing confiscated, the microprocessor 42 will recognize that thephotographs do not match whereby the apparatus 22 confiscates the card12 from the user. If the photographs do match, the apparatus will allowthe user to use the card for a desired purpose and the verificationprocess is complete.

Turning now to FIG. 2, there is illustrated the apparatus 22 of thepresent invention which comprises an information scanning device 50, agraphic scanning device 52, a fingerprint scanning device 54, amicrophone 56 and means 58 for digitizing a person's voice, a retinalscanning device 60 and a photograph scanning device 62. Themicroprocessor 42 obtains the information gathered by these devices andcompares it to information stored on the database 44, or, as mentionedabove, a plurality of separate databases in communication with themicroprocessor 42. The apparatus 22 and databases 44 preferably includeencryption devices 63 for encrypting and decrypting data transmissionstherebetween. The encryption devices 63 effectively prevent someone fromtapping into the telephone lines to illegally steal or copy the digitaltransmissions during the verification process. Encryption devices 63 ofthe type contemplated are manufactured by Datotek, Inc. of Dallas, Tex.The apparatus 22 may embody different forms, however, it is envisionedthat it would be constructed similarly to an automatic teller machine("ATM") or the like which is designed to receive and process cards.

More specifically, the information strip scanning device 50 is providedfor scanning a bar code or magnetic strips of the card 12. Asillustrated, the microprocessor 42 includes means 64 for comparing theinformation contained in the strip 16 of the card 12 (to include thecard owner's identification number) to information of the owner storedon the database 44. If the information on the card 12 does not match theinformation of the database 44, the apparatus 22 confiscates the card12. The information strip scanning device 50 may be any of thecommercially available scanners for scanning bar codes, such as ascanner sold by Symbol Technologies, Inc., Bohemia, N.Y. under the modelno. PDF 417.

The graphic scanning device 52 scans surface 14 of the card 12 fordetermining whether the card 12 has been physically altered. A converter66 (broadly "converting means") is provided for converting the image ofthe surface 14 of the card 12 to a digital numeric sequence. Thisdigital numeric sequence is sent to the microprocessor 42 which furtherincludes means 68 for comparing the surface 14 of the card 12 as scannedby the graphic scanning device 52 and converted to a digital numericsequence by the converter 66 to a digital numeric sequence stored in thedatabase 44 (or in another database in communication with themicroprocessor 42) for determining whether the card 12 has been tamperedwith. If the digital numeric sequence which represents the surface 14 ofthe card 12 does not match the digital numeric sequence of the of thedatabase 44, the apparatus 22 withholds the card 12. The graphicscanning device 52 and converter 66 may be any of the commerciallyavailable graphic scanners and converters, such as a scannermanufactured by Hewlett-Packard Corporation of California.

The fingerprint scanning device 54 has a pad (not shown) upon which theuser of the card 12 presses with a finger for obtaining a fingerprint ofthe user. The fingerprint scanning device 54 scans the fingerprint ofthe user as obtained by the pad and sends it to the microprocessor 42which includes means 70 for comparing the fingerprint of the user to thefingerprint 18 on the card 12 and to a fingerprint of the owner of thecard in the database 44. If the fingerprint 18 of the user of the carddoes not match the fingerprint 18 on the card 12 or the fingerprint inthe database 44, the apparatus 22 withholds the card.

The fingerprint scanning device 54 may also include a recording feature(not shown) in which the fingerprint of the unauthorized user isrecorded for later use, such as comparing it to fingerprints in otherdatabases. This recording feature would assist in the apprehension ofthe unauthorized user.

The fingerprint scanning device 54 may be any of the commerciallyavailable fingerprint scanning systems, such as a fingerprint scannersold by Electronic Data Systems Corp., Dallas, Tex. or the fingerprintscanners disclosed in the Lofberg and Hiramatsu patents.

The apparatus 22 described thus far is capable of achieving the method10 of the present invention, i.e., capable of comparing the informationon the strip 16 of the card 12 to information about the owner on thedatabase 44, determining whether the card 12 has been altered, andcomparing the fingerprint of the user with the fingerprint 18 on thecard 12 and the fingerprint in the database 44. The apparatus 22 mayfurther include the aforementioned microphone 56 and associated means 58for recording the user's voice, the retinal scanning device 60 and thephotograph scanning device 62 for increasing the level of verification.It should be understood that the apparatus 22 may include each of theseadditional devices or any combination thereof, depending upon thedesired level of verification.

The microphone 56 is for receiving the user's voice when the user speakstherein. A recorder 58 (broadly "means for recording") records theuser's voice after the user has spoken into the microphone 56 andconverts the analog signals to digital signals for obtaining a voiceprint of the user. The voice print is sent to the microprocessor 42which includes means 72 for comparing the voice print of the user to avoice print of the owner of the card which is stored in the database 44,or in another accessible database. If the voice print of the user of thecard 12 does not match the voice print in the database 44, the apparatus22 confiscates the card 12 from the user. The microphone 56, recorder58, and voice recognition software may comprise any of the commerciallyavailable voice recognition systems, such as a voice recognition systemsold by Texas Instruments of Dallas, Tex.

The retinal scanning device 60 is for obtaining a retinal print of theuser after the user looks into the retinal scanning device 60. Theretinal print is sent to the microprocessor 42 which includes means 74for comparing the retinal print of the user to a retinal print of theowner of the card 12 which is stored in the database 44, or in anotheraccessible database. If the retinal print of the user of the card 12does not match the retinal print in the database 44, the apparatus 22withholds the card 12 from the user. The retinal scanning device 60 maybe purchased from Ophthalmic Imaging Systems, Inc. of Sacramento, Calif.

Lastly, apparatus 22 includes the photograph scanning device 62 which isfor scanning the photograph 20 on the card 12. This scanning device 62is preferably more sensitive than the graphic scanning device 54, sincethe latter is designed to locate the main components of the card ratherthan details of the photograph of the card's owner. This information issent to the microprocessor 42 which includes means 76 for comparing thephotograph 20 as scanned by the scanning device 62 to a photograph ofthe owner of the card 12 which is stored on the database 44, or onanother accessible database, for ensuring that the card 12 has not beentampered with, namely, that the photograph 20 has not been replaced bythe photograph of the user. If the photograph 20 on the card 12 does notmatch the photograph in the database 44, the apparatus 22 withholds thecard from the user. The photograph scanning device 62 may also bepurchased from Hewlett-Packard Corporation.

The microprocessor 42 of the apparatus 22 may be chosen from any of thecommercially available microprocessors wherein the software may comprisea menuing system such as a system designed by Galacticomm, Inc. of Ft.Lauderdale, Fla. It is envisioned that this menuing system, whenauthorized use of the card is verified, enables the card's user tochoose from many options such as credit, banking, money transfer,hospital or health care authorization etc. In this connection, thesoftware may also be designed for a single-purpose use. For example, ahospital may require health care authorization before admission ortreatment. The system software could be specifically designed to accessand store appropriate data for billing, such as date, type of treatment,location of the facility etc. Other single-purpose applications, such asbank ATM's would access and store different information germane to thepurpose. It is also contemplated that a machine code number and locationcould be coded in a bar code format and affixed inside the apparatus,wherein a separate bar code reader (not shown) would read the bar codeand store that information with other information germane to each cardtransaction.

It should be observed that the method 10 and apparatus 22 of the presentinvention are capable of verifying the authorized user of acredit/identification card, and of determining whether the card has beenaltered.

While there is shown and described herein certain specific structureembodying the invention, it will be manifest to those skilled in the artthat various modifications and rearrangements of the parts may be madewithout departing from the spirit and scope of the underlying inventiveconcept and that the same is not limited to the particular forms hereinshown and described except insofar as indicated by the scope of theappended claims.

What is claimed is:
 1. A method for verifying an authorized user of acredit/identification card comprising the steps of:inserting the cardinto an apparatus having a plurality of scanning stations, the cardincluding a surface having a strip thereon which has information germaneto the owner of the card, such as an identification number and otherpersonal data, and at least one fingerprint thereon of the owner of thecard; scanning the strip of the card at an information strip scanningstation of said apparatus for verifying the information of the cardincluding the identification number; comparing the information stored onthe strip of the card to information of the owner stored on at least oneaccessible database in communication with said apparatus, the apparatuswithholding the card from the user if the information on the card doesnot match the information germane to the owner of the card which isstored in the database; scanning the surface of the card at a graphicscanning station of said apparatus which digitizes the surface of thecard by imaging every line thereof; converting the image of the surfaceof the card to a digital numeric sequence; comparing the surface of thecard as scanned by said graphic scanning device and converted to adigital numeric sequence to a digital numeric sequence stored in saiddatabase for determining whether the card has been tampered with, theapparatus withholding the card from the user if the surface of the carddoes not match the surface of the card stored by the database; obtaininga fingerprint of the user; scanning the fingerprint of the user at afingerprint scanning station; and comparing the fingerprint of the userto said fingerprint on the card and to a fingerprint of the owner of thecard in the database to ensure authorized use of the card, the apparatuswithholding the card from the user if the fingerprint scanned by thefingerprint scanning device does not match the fingerprints on the cardand in the database; whereby, upon matching the user's fingerprint tothe fingerprints on the card and in the database for ensuring the userof the card is the owner of the card, said apparatus allowing the userto use the card for a desired purpose, said method further comprisingthe step of recording the fingerprint of the user of the card in theevent the fingerprint of the user does not match the fingerprint on thecard or the fingerprint of the owner of the card.
 2. The method as setforth in claim 1 further comprising the steps of:requiring the user ofthe card to speak into a microphone of the apparatus for obtaining avoice print of the user; and comparing the user's voice print to a voiceprint of the owner of the card which is stored in the database, theapparatus withholding the card from the user if the user's voice doesnot match the voice print of the owner stored in the database.
 3. Themethod as set forth in claim 2 further comprising the steps of:obtaininga retinal print of the user at a retinal scanning station; and comparingthe user's retinal print to a retinal print of the owner of the cardwhich is stored in the database, the apparatus withholding the card fromthe user if the user's retinal print does not match the retinal print ofthe owner stored in the database.
 4. The method as set forth in claim 3further comprising the steps of:scanning a photograph of the user on thecard at a photograph scanning station; comparing the photograph asscanned by the photograph scanning station to a photograph of the ownerof the card which is stored on the database for ensuring that the cardhas not been tampered with, the apparatus withholding the card from theuser if the photograph on the card does not match the photograph storedin the database.
 5. The method as set forth in claim 1 furthercomprising the steps of:obtaining a retinal print of the user at aretinal scanning station; and comparing the user's retinal print to aretinal print of the owner of the card which is stored in the database,the apparatus withholding the card from the user if the user's retinalprint does not match the retinal print of the owner stored in thedatabase.
 6. The method as set forth in claim 1 further comprising thesteps of:scanning a photograph of the user on the card at a photographscanning station; and comparing the photograph as scanned by thephotograph scanning station to a photograph of the owner of the cardwhich is stored on the database for ensuring that the card has not beentampered with, the apparatus withholding the card from the user if thephotograph on the card does not match the photograph stored in thedatabase.
 7. An apparatus for verifying an authorized user of acredit/identification card including a surface having a strip thereonwhich has information germane to the owner of the card, such as anidentification number and other personal data, and at least onefingerprint thereon of the owner of the card, said apparatus acomprising:an information strip scanning device for scanning theinformation strip of the card; means for comparing the informationcontained in the strip to information of the owner stored on at leastone accessible database in communication with said apparatus, theapparatus withholding the card from the user if the information on thecard does not match the information germane to the owner of the cardwhich is stored in the database; a graphic scanning device for scanningthe surface of the card, said graphic scanning device digitizing thesurface of the card by imaging every line thereof; means for convertingthe image of the surface of the card to a digital numeric sequence;means for comparing the surface of the card as scanned by said graphicscanning device and converted to a digital numeric sequence by saidconverting means to a digital numeric sequence stored in said databasefor determining whether the card has been tampered with, the apparatuswithholding the card from the user if the surface of the card does notmatch the surface of the card stored by the database; a fingerprintscanning device having a pad upon which the user of the card presseswith a finger for obtaining a fingerprint of the user, said fingerprintscanning device scanning the fingerprint of the user; and means forcomparing the fingerprint of the user to said fingerprint on the cardand to a fingerprint of the owner of the card in the database to ensureauthorized use of the card, the apparatus withholding the card from theuser if the fingerprint scanned by the fingerprint scanning device doesnot match the fingerprints on the card and in the database, whereby,upon matching the user's fingerprint to the fingerprints on the card andin the database for ensuring the user of the card is the owner of thecard, said apparatus allowing the user to use the card for a desiredpurpose, said apparatus further comprising means for recording thefingerprint of the user of the card in the event the fingerprint of theuser does not match the fingerprint on the card or the fingerprint ofthe owner of the card.
 8. The apparatus as set forth in claim 7 furthercomprising:a microphone; means for recording the user of the card'svoice after the user has spoken into the microphone for obtaining avoice print of the user; and means for comparing the user's voice printto a voice print of the owner of the card which is stored in thedatabase, the apparatus withholding the card from the user if the user'svoice does not match the voice print of the owner stored in thedatabase.
 9. The apparatus as set forth in claim 8 further comprising:aretinal scanning device for obtaining a retinal print of the user afterthe user looks into the retinal scanning device; and means for comparingthe user's retinal print to a retinal print of the owner of the cardwhich is stored in the database, the apparatus withholding the card fromthe user if the user's retinal print does not match the retinal print ofthe owner stored in the database.
 10. The apparatus as set forth inclaim 9 further comprising:a scanning device for scanning a photographof the user on the card; and means for comparing the photograph asscanned by the scanning device to a photograph of the owner of the cardwhich is stored on the database for ensuring that the card has not beentampered with, the apparatus withholding the card from the user if thephotograph on the card does not match the photograph stored in thedatabase.
 11. The apparatus as set forth in claim 9 further comprising:ascanning device for scanning a photograph of the user on the card; andmeans for comparing the photograph as scanned by the scanning device toa photograph of the owner of the card which is stored on the databasefor ensuring that the card has not been tampered with, the apparatuswithholding the card from the user if the photograph on the card doesnot match the photograph stored in the database, said voice print,retinal print and photograph comparing means comprising amicroprocessor.
 12. The apparatus as set forth in claim 7 furthercomprising:a retinal scanning device for obtaining a retinal print ofthe user after the user looks into the retinal scanning device; andmeans for comparing the user's retinal print to a retinal print of theowner of the card which is stored in the database, the apparatuswithholding the card from the user if the user's retinal print does notmatch the retinal print of the owner stored in the database.
 13. Theapparatus as set forth in claim 7 further comprising:a scanning devicefor scanning a photograph of the user on the card; and means forcomparing the photograph as scanned by the scanning device to aphotograph of the owner of the card which is stored on the database forensuring that the card has not been tampered with, the apparatuswithholding the card from the user if the photograph on the card doesnot match the photograph stored in the database.
 14. The apparatus asset forth in claim 7 further comprising an encryption device forencrypting and decrypting data transmissions between said apparatus andsaid database, said database including a corresponding encryptiondevice.
 15. A method of verifying an authorized user of acredit/identification card comprising the steps of:reading aninformation strip on the card, said information strip having informationgermane to the owner of the card; comparing said information to acorresponding set of information stored in a remote database, wherebysaid card is withheld if said information does not match saidcorresponding set of information stored in the remote database;obtaining a digitized image of a surface of said card; comparing saidobtained digitized image of said card to a corresponding digitized imageof said card stored in said remote database, whereby said card iswithheld if said obtained digitized image does not match saidcorresponding digitized image stored in said remote database; obtainingan image of a physical attribute of the user of the card; comparing saidobtained image of said physical attribute of said user to acorresponding image of said physical attribute of said owner stored insaid remote database, whereby said card is withheld if said obtainedimage of said physical attribute does not match said stored image ofsaid physical attribute, and further whereby said obtained image of saidphysical attribute is recorded if said obtained image of said physicalattribute does not match said stored image of said physical attribute,said user being allowed to conduct a desired electronic transaction ifsaid obtained image of said physical attribute of said user matches saidstored image of said physical attribute of said owner.
 16. The method ofclaim 15 wherein said physical attribute comprises a fingerprint. 17.The method of claim 16 further comprising the step of obtaining an imageof a second physical attribute of said user, and comparing said obtainedimage of said second physical attribute of said user to a correspondingimage of a second physical attribute of said owner stored in said remotedatabase, whereby said card is withheld if said obtained image of saidsecond physical attribute does not match said corresponding stored imageof said second physical attribute, and further whereby said obtainedimage of said second physical attribute is recorded if said obtainedimage of said second physical attribute does not match saidcorresponding stored image of said second physical attribute, said userbeing allowed to conduct a desired electronic transaction if saidobtained image of said second physical attribute of said user matchessaid stored image of said second physical attribute of said owner. 18.The method of claim 17 wherein said second physical attribute comprisesa voice print.
 19. The method of claim 17 wherein said second physicalattribute comprises a retinal print.
 20. The method of claim 15 furthercomprising the step of encrypting transmissions of said information toand from said remote database.
 21. The method of claim 15 wherein saidphysical attribute comprises a voice print.
 22. The method of claim 15wherein said physical attribute comprises a retinal print.
 23. Apparatusfor verifying an authorized user of a credit/identification cardcomprising:means for reading an information strip on said card, saidinformation strip having information germane to the owner of the card;means for communicating with a remote database having corresponding setof information germane to said owner of said card; means for comparingsaid information to said corresponding set of information stored in saidremote database, said card being withheld by said apparatus if saidinformation does not match said corresponding set of information storedin the remote database; means for obtaining a digitized image of asurface of said card; means for comparing said obtained digitized imageof said card to a corresponding digitized image of said card stored insaid remote database, said card being withheld by said apparatus if saidobtained digitized image does not match said corresponding digitizedimage stored in said remote database; means for obtaining an image of aphysical attribute of the user of the card; means for comparing saidobtained image of said physical attribute of said user to acorresponding image of said physical attribute of said owner stored insaid remote database, said card being withheld by said apparatus if saidobtained image of said physical attribute does not match said storedimage of said physical attribute; and means for recording said obtainedimage of said physical attribute if said obtained image of said physicalattribute does not match said stored image of said physical attribute,said user being allowed to conduct a desired electronic transaction ifsaid obtained image of said physical attribute of said user matches saidstored image of said physical attribute of said owner.
 24. The apparatusof claim 23 wherein said physical attribute of said user comprises afingerprint.
 25. The apparatus of claim 24 further comprising means forobtaining an image of a second physical attribute of said user, andmeans for comparing said obtained image of said second physicalattribute of said user to a corresponding image of a second physicalattribute of said owner stored in said remote database, said card beingwithheld if said obtained image of said second physical attribute doesnot match said corresponding stored image of said second physicalattribute, said apparatus still further comprising means for recordingsaid obtained image of said second physical attribute if said obtainedimage of said second physical attribute does not match saidcorresponding stored image of said second physical attribute,said userbeing allowed to conduct a desired electronic transaction if saidobtained image of said second physical attribute of said user matchessaid stored image of said second physical attribute of said owner. 26.The apparatus of claim 25 wherein said second physical attributecomprises a voice print.
 27. The apparatus of claim 25 wherein saidsecond physical attribute comprises a retinal print.
 28. The apparatusof claim 23 further comprising means for encrypting data transmissionsbetween said apparatus and said remote database.
 29. The apparatus ofclaim 23 wherein said physical attribute of said user comprises a voiceprint.
 30. The apparatus of claim 23 wherein said physical attribute ofsaid user comprises a retinal print.
 31. A method for conducting asecure electronic transaction using a credit/identification cardcomprising the steps of:reading an information strip on the card, saidinformation strip having information germane to the owner of the card;comparing said information to a corresponding set of information storedin a remote database, whereby said card is withheld if said informationdoes not match said corresponding set of information stored in theremote database; obtaining an image of a physical attribute of the userof the card; comparing said obtained image of said physical attribute ofsaid user to a corresponding image of said physical attribute of saidowner stored in said remote database, whereby said card is withheld ifsaid obtained image of said physical attribute does not match saidstored image of said physical attribute, and further whereby saidobtained image of said physical attribute is recorded if said obtainedimage of said physical attribute does not match said stored image ofsaid physical attribute; and selecting a desired electronic transactionfrom a predetermined menu system, said user being allowed to conduct adesired electronic transaction if said obtained image of said physicalattribute of said user matches said stored image of said physicalattribute of said owner.
 32. The method of claim 31 wherein saidphysical attribute comprises a fingerprint.
 33. The method of claim 32further comprising the step of obtaining an image of a second physicalattribute of said user, and comparing said obtained image of said secondphysical attribute of said user to a corresponding image of a secondphysical attribute of said owner stored in said remote database, wherebysaid card is withheld if said obtained image of said second physicalattribute does not match said corresponding stored image of said secondphysical attribute, and further whereby said obtained image of saidsecond physical attribute is recorded if said obtained image of saidsecond physical attribute does not match said corresponding stored imageof said second physical attribute, said user being allowed to conduct adesired electronic transaction if said obtained image of said secondphysical attribute of said user matches said stored image of said secondphysical attribute of said owner.
 34. The method of claim 33 whereinsaid second physical attribute comprises a voice print.
 35. The methodof claim 33 wherein said second physical attribute comprises a retinalprint.
 36. The method of claim 31 further comprising the step ofencrypting transmissions of said information to and from said remotedatabase.
 37. The method of claim 31 wherein said physical attributecomprises a voice print.
 38. The method of claim 31 wherein saidphysical attribute comprises a retinal print.
 39. Apparatus forconducting a secure electronic transaction using a credit/identificationcard comprising:means for reading an information strip on said card,said information strip having information germane to the owner of thecard; means for communicating with a remote database havingcorresponding set of information germane to said owner of said card;means for comparing said information to said corresponding set ofinformation stored in said remote database, said card being withheld bysaid apparatus if said information does not match said corresponding setof information stored in the remote database; means for obtaining animage of a physical attribute of the user of the card; means forcomparing said obtained image of said physical attribute of said user toa corresponding image of said physical attribute of said owner stored insaid remote database, said card being withheld by said apparatus if saidobtained image of said physical attribute does not match said storedimage of said physical attribute; and means for recording said obtainedimage of said physical attribute if said obtained image of said physicalattribute does not match said stored image of said physical attribute,said user being allowed to conduct a desired electronic transaction ifsaid obtained image of said physical attribute of said user matches saidstored image of said physical attribute of said owner.
 40. The apparatusof claim 39 wherein said physical attribute of said user comprises afingerprint.
 41. The apparatus of claim 40 further comprising means forobtaining an image of a second physical attribute of said user, andmeans for comparing said obtained image of said second physicalattribute of said user to a corresponding image of a second physicalattribute of said owner stored in said remote database, said card beingwithheld if said obtained image of said second physical attribute doesnot match said corresponding stored image of said second physicalattribute, said apparatus still further comprising means for recordingsaid obtained image of said second physical attribute if said obtainedimage of said second physical attribute does not match saidcorresponding stored image of said second physical attribute,said userbeing allowed to conduct a desired electronic transaction if saidobtained image of said second physical attribute of said user matchessaid stored image of said second physical attribute of said owner. 42.The apparatus of claim 41 wherein said second physical attributecomprises a voice print.
 43. The apparatus of claim 41 wherein saidsecond physical attribute comprises a retinal print.
 44. The apparatusof claim 39 further comprising means for encrypting data transmissionsbetween said apparatus and said remote database.
 45. The apparatus ofclaim 39 wherein said physical attribute of said user comprises a voiceprint.
 46. The apparatus of claim 39 wherein said physical attribute ofsaid user comprises a retinal print.