System and method for user enrollment in a secure biometric verification system

ABSTRACT

A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user regarding the user&#39;s identity, which is then electronically authenticated. Upon authentication, personal information regarding the verified identity of the user is retrieved from a source database which is used to verify the identity of the user, via user interaction. Upon successful verification and authentication, biometric data regarding the user is electronically collected.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a Continuation of U.S. patent application Ser. No.15/634,691 filed on Jun. 27, 2017, which is a Continuation of U.S.patent application Ser. No. 14/127,103 filed on May 16, 2014, whichclaims priority to PCT Patent Application No. PCT/US2012/037983 filed onMay 15, 2012, which claims priority to U.S. Patent Application No.61/502,453 filed on Jun. 29, 2011, all of which are incorporated hereinby reference in their entirety.

FIELD OF THE INVENTION

The invention relates generally to a biometric verification system, andmore specifically to a method and system for authenticating a user'sidentity.

BACKGROUND OF THE INVENTION

The present invention generally pertains to identity verificationsystems. More specifically, the present invention pertains to biometricsecurity systems that provide an enhanced defense against fraudulent useof an individual's identity to complete a transaction.

Within a typical biometric security system, there are at least twooperations, enrollment and verification. The operation of enrollmentencompasses the original sampling of a person's biographic and biometricinformation, confirmation of the identity and its owner, and thecreation and storage of a biometric template associated with theidentity (a.k.a., an enrollment template) that is a data representationof the original sampling. The operation of verification includes aninvocation of a biometric sample for the identification of a system userthrough comparison of a data representation of the biometric sample withone or more stored enrollment templates.

Biometric information is, by nature, reasonably public knowledge. Aperson's biometric data is often casually left behind or is easily seenand captured. This is true for all forms of biometric data including,but not limited to, fingerprints, iris features, facial features, andvoice information. As an example, consider two friends meeting. The onefriend recognizes the other by their face and other visible keycharacteristics. That information is public knowledge. However, a photoof that same person ‘is’ not that person. This issue similarly applies,electronically, to computer-based biometric authentication wherein acopy of authorized biometric information is susceptible to beingsubmitted as a representation of the corresponding original information.In the context of biometric security applications, what is important,what enables a secure verification is a unique and trusted invocation ofan authorized biometrics.

SUMMARY OF THE INVENTION

The purpose and advantages of the invention will be set forth in andapparent from the description that follows. Additional advantages of theinvention will be realized and attained by the devices, systems andmethods particularly pointed out in the written description and claimshereof, as well as from the appended drawings.

To achieve these and other advantages and in accordance with the purposeof the invention, as embodied, the invention includes in one aspect acomputer-implemented method for verifying the identity of a user in anidentity authentication and biometric verification system. The methodincludes collecting information from the user regarding the user'sidentity (such as a passport), which is then electronicallyauthenticated. Upon authentication, personal information regarding theverified identity of the user is retrieved from a source database, whichis used to verify the user, via user interaction. Upon successfulverification and authentication, biometric data regarding the user iselectronically collected and matched to the personal informationretrieved from the source database. Another aspect of the invention mayinclude the functionality to perform scoring or qualification screeningas well as providing a user with a token on a smart card device or via acardless system.

In a further illustrated aspect of the invention, provided is anauthentication and biometric verification system adapted toelectronically couple to at least one electronic source database forauthenticating the identity of a user. The system preferably includes acentral processing system configured to receive information regardingthe identity of a user and verifying the identity of the user based uponthe received information. Upon successful verification, the centralprocessing system is further configured to retrieve from at least oneelectronic source database information relating to the user verifiedidentity to authenticate a user's identity via interaction with the userapplicant. Further provided is a biometric collection deviceelectronically coupled to the central processing system adapted andconfigured to collect biometric data from a user applicant uponsuccessful authentication of the user applicant. A payload processorcomponent is further preferably provided and electronically coupled tothe central processing system adapted and configured to convert thecollected user applicant biometric information into an electronicpayload.

BRIEF DESCRIPTION OF THE DRAWINGS

The objects and features of the invention can be understood withreference to the following detailed description of an illustrativeembodiment of the present invention taken together in conjunction withthe accompanying drawings in which:

FIG. 1 is a system level diagram of a computering environment used bythe present invention;

FIG. 2 is a system level diagram of components of the present inventionin accordance with an illustrated embodiment; and

FIGS. 3 and 4 are flow charts depicting operation of the presentinvention in accordance with the illustrated embodiment of FIG. 2.

EMBODIMENTS OF THE INVENTION

The present invention is now described more fully with reference to theaccompanying drawings, in which an illustrated embodiment of the presentinvention is shown. The present invention is not limited in any way tothe illustrated embodiment as the illustrated embodiment described belowis merely exemplary of the invention, which can be embodied in variousforms, as appreciated by one skilled in the art. Therefore, it is to beunderstood that any structural and functional details disclosed hereinare not to be interpreted as limiting, but merely as a basis for theclaims and as a representative for teaching one skilled in the art tovariously employ the present invention. Furthermore, the terms andphrases used herein are not intended to be limiting but rather toprovide an understandable description of the invention.

It is to be appreciated that the embodiments of this invention asdiscussed below preferably include software algorithms, programs, and/orcode residing on computer useable medium having control logic forenabling execution on a machine having a computer processor. The machinetypically includes memory storage configured to provide output fromexecution of the computer algorithm or program. Where a range of valuesis provided, it is understood that each intervening value, to the tenthof the unit of the lower limit unless the context clearly dictatesotherwise, between the upper and lower limit of that range and any otherstated or intervening value in that stated range is encompassed withinthe invention. The upper and lower limits of these smaller ranges isalso encompassed within the invention, subject to any specificallyexcluded limit in the stated range. Where the stated range includes oneor both of the limits, ranges excluding either or both of those includedlimits are also included in the invention.

Unless defined otherwise, all technical and scientific terms used hereinhave the same meaning as commonly understood by one of ordinary skill inthe art to which this invention belongs. Although any methods andmaterials similar or equivalent to those described herein can also beused in the practice or testing of the present invention, exemplarymethods and materials are now described. All publications mentionedherein are incorporated herein by reference to disclose and describe themethods and/or materials in connection with which the publications arecited.

It must be, noted that as used herein and in the appended claims, thesingular forms “a”, “an,” and “the” include plural referents unless thecontext clearly dictates otherwise. Thus, for example, reference to “astimulus” includes a plurality of such stimuli and reference to “thesignal” includes reference to one or more signals and equivalentsthereof known to those skilled in the art, and so forth,

Turning now descriptively to the drawings, in which similar referencecharacters denote similar elements throughout the several views, FIG. 1depicts an exemplary general-purpose computing system in whichillustrated embodiments of the present invention may be implemented.

A generalized computing embodiment in which the present invention can berealized is depicted in FIG. 1, illustrating a processing system 100which generally comprises at least one processor 102, or processing unitor plurality of processors, memory 104, at least one input device 106,and at least one output device 108, coupled together via a bus or agroup of buses 110. In certain embodiments, input device 106 and outputdevice 108 could be the same device. An interface 112 can also beprovided for coupling the processing system 100 to one or moreperipheral devices, for example, interface 112 could be a PCI card or PCcard. At least one storage device 114, which houses at least onedatabase 116, can also be provided. The memory 104 can be any form ofmemory device, for example, volatile or non-volatile memory, solid statestorage devices, and magnetic devices. The processor 102 could comprisemore than one distinct processing device, for example, to handledifferent functions within the processing system 100. Input device 106receives input data 118 and can comprise, for example, a keyboard, apointer device such as a pen-like device or a mouse, an audio receivingdevice for voice controlled activation such as a microphone, datareceiver, or antenna such as a modem or wireless data adaptor, and adata acquisition card. Input data 118 could come from different sources,for example, keyboard instructions in conjunction with data received viaa network. Output device 108 produces or generates output data 120 andcan comprise, for example, a display device or monitor, where outputdata 120 is visual, a printer, where output data 120 is printed, and aport, for example, a USB port, a peripheral component adaptor, a datatransmitter or antenna such as a modem or wireless network adaptor.Output data 120 could be distinct and derived from different outputdevices, for example, a visual display on a monitor in conjunction withdata transmitted to a network. A user could view data output, or aninterpretation of the data output, on, for example, a monitor or using aprinter. The storage device 114 can be any form of data or informationstorage means, for example, volatile or non-volatile memory, solid statestorage devices, and magnetic devices.

In use, the processing system 100 is adapted to allow data orinformation to be stored in and/or retrieved from, via wired or wirelesscommunication means, at least one database 116. The interface 112 mayallow wired and/or wireless communication between the processing unit102 and peripheral components that may serve a specialized purpose.Preferably, the processor 102 receives instructions as input data 118via input device 106 and can display processed results or other outputto a user by utilizing output device 108. More than one input device 106and/or output device 108 can be provided. It should be appreciated thatthe processing system 100 may he any fonts of terminal, server,specialized hardware, or the like.

It is to be appreciated that the processing system 100 may be a part ofa networked communications system. Processing system 100 could connectto a network, for example the Internet or a WAN. Input data 118 andoutput data 120 could be communicated to other devices via the network.The transfer of information and/or data over the network can be achievedusing wired communications means or wireless communications means. Aserver can facilitate the transfer of data between the network and oneor more databases. A server and one or more databases provide an exampleof an information source.

Thus, the processing system 100 illustrated in FIG. 1 may operate in anetworked environment using logical connections to one or more remotecomputers. The remote computer may be a personal computer, a server, arouter, a network PC, a peer device, or other common network nodes, andtypically includes many or all of the elements described herein.

It is to be further appreciated that the logical connections depicted inFIG. 1 include a local area network (LAN) and a wide area network (WAN),but may also include other networks such as a personal area network(PAN). Such networking environments are commonplace in offices,enterprise-wide computer networks, intranets, and the Internet. Forinstance, when used in a LAN networking environment, the processingsystem 100 is connected to the LAN through a network interface oradapter. When used in a WAN networking environment, the processingsystem 100 typically includes a modem or other means for establishingcommunications over the WAN, such as the Internet. The modem, which maybe internal or external, may be connected to a system bus via a userinput interface, or via another appropriate mechanism. In a networkedenvironment, program modules depicted relative to the processing system100, or portions thereof, may be stored in a remote memory storagedevice. It is to be appreciated that the illustrated network connectionsof FIG. 1 are exemplary and other means of establishing a communicationslink between multiple computers may be used.

FIG. 1 is intended to provide a brief, general description of anillustrative and/or suitable exemplary environment in which embodimentsof the below described present invention may be implemented. FIG. 1 isan example of a suitable environment and is not intended to suggest anylimitation as to the structure, scope of use, or functionality of anembodiment of the present invention. A particular environment should notbe interpreted as having any dependency or requirement relating to anyone or combination of components illustrated in an exemplary operatingenvironment. For example, in certain instances, one or more elements ofan environment may be deemed not necessary and omitted. In otherinstances, one or inure other elements may be deemed necessary andadded.

In the description that follows, certain embodiments may be describedwith reference to acts and symbolic representations of operations thatare performed by one or more computing devices, such as the processingsystem 100 of FIG. 1. As such, it will be understood that such acts andoperations, which are at times referred to as being computer-executed,include the manipulation by the process of the computer of electricalsignals representing data in a structured form. This manipulationtransforms the data or maintains them at locations in the memory systemof the computer, which reconfigures or otherwise alters the operation ofthe computer in a manner understood by those skilled in the art. Thedata structures in which data is maintained are physical locations ofthe memory that have particular, properties defined by the format of thedata. However, while an embodiment is being described in the foregoingcontext, it is not meant to be limiting as those of skill in the artwill appreciate that the acts and operations described herein may alsobe implemented in hardware.

Embodiments may be implemented with numerous other general-purpose orspecial-purpose computing devices and computing system environments orconfigurations. Examples of well-known computing systems, environments,and configurations that may be suitable for use with an embodimentinclude, but are not limited to, personal computers, handheld or laptopdevices, tablet devices, personal digital assistants, multiprocessorsystems, microprocessor-based systems, set. top boxes, programmableconsumer electronics, network, minicomputers, server computers, gameserver computers, web server computers, mainframe computers, anddistributed computing environments that include any of the above systemsor devices.

Embodiments may be described in a general context of computer-executableinstructions, such as program modules, being executed by a computer,Generally, program modules include routines, programs, objects,components, data structures, etc., that perform particular tasks orimplement particular abstract data types. An embodiment may also bepracticed in a distributed computing environment where tasks areperformed by remote processing devices that are linked through acommunications network, in a distributed computing environment, programmodules may be located in both local and remote computer storage. mediaincluding memory storage devices.

With the exemplary processing system 100 of FIG. 1 being generally shownand discussed above, reference is now made to FIG. 2, which depicts anillustrated embodiment of the system of the present invention,designated generally by reference numeral 200. System 200 is to beunderstood to consist of two primary data processing environments: (i) abackend environment, which is generally a processing system and adatabase of records, and (ii) a customer service environment, whichpreferably contains only a subset of data required to service users 290and applicant users on a day-to-day basis. As depicted in theillustrated embodiment of FIG. 2, all connections and interactionsbetween the systems are understood to be handled through encryptedmethods such as secure internet connections (“S&L”), virtual privatenetworks (VPN) and any other similar known or unknown methods.Additionally, firewalls may be used for added security protection. It isto be understood, in accordance with the illustrated embodiments, datain transit is preferably encrypted at all times.

In accordance with the illustrated embodiment of FIG. 2, system 200preferably includes a central processing system 210 (preferablyencompassing components of processing system 100) operative andconfigured to manage and protect the biographic and biometricinformation used to provide the services of the system 200 to users 290and “Benefit Providers.” It is to be understood and appreciated the term“Benefit Providers,” for purposes of the present invention, is to beunderstood to mean organizations that leverage the verification processdescribed herein to confirm user identity in order to provide a productor service to a user 290. For example, CLEAR® is a service providerapproved by the Transportation Security Administration (TSA) thatperforms biometric verification in order to provide the benefit ofbypassing the traditional TSA Travel Document Checker (TDC). Asdiscussed further below, central processing system 210 is preferablyadapted and configured to communicate with third party data sourceshaving information relevant, and preferably personal, to a user 290 soas to authenticate the user 290. An example of such a third party datasource includes, but is not limited to, LEXISNEXIS®, and other similardata sources.

Central processing system 210 is electronically coupled to a payloadprocessor system 220, a card production system 230, and membermanagement system 240, each preferably encompassing components ofprocessing system 100. Briefly, payload processor system 220 isoperative and configured to convert user 290 biographic and biometricinformation into an electronic payload that can be loaded onto a smartcard or other identity confirmation token for use in verificationprocesses. Card production system 230 is operative and configured tocreate smart cards or other tokens containing the user 290 payload. Andmember management system 240 is operative and configured to manage user290 information and transactions such as biographic data updates (changeof address, phone number, email, etc.) as well as billing informationand transactions. The member management system 240 may also provideinformation regarding usage and benefits.

It is to be appreciated and understood by one skilled in the art, thecentral processing system 210 is configured and operative to transmitdata with each of the payload processor system 220, the card productionsystem 230, and member management system 240 through any known suitablemeans. In the illustrated embodiment of FIG. 2, an encryptedtransmission method such as Secure File Transfer Protocol (SFTP) orSecure Socket Layer (SSL) (242, 244, 246) is employed to transmit databetween the central processing system 210, the payload processing system220, the card production system 230, and the member management system240. While the illustrated embodiment of the invention depicts acryptographic Secure Sockets Layer (SSL) 246 to transmit data betweenthe central processing system and the member management system 240, theSSL 246 is to be understood to be only an exemplary method fortransmitting data as any suitable method may be utilized).

In accordance with the illustrated embodiment of FIG. 2, system 200further includes a plurality of kiosk devices 250 disposed in differinggeographic locations (such as airports, but not limited thereto) forenabling enrollment and identity verification, as discussed furtherbelow. For the purposes of the present invention, each kiosk device 250is to be understood to be an electronic kiosk (or computer kiosk orinteractive kiosk) housing a computer terminal preferably employingsoftware configured to enable the required user 290 enrollment andverification functionality while preventing users 290 from accessingsystem functions. It is to be appreciated and understood eachcomputerized kiosk 250 communicates with the central processing system210. Each kiosk 250 may be configured and operational to includebiometric capture devices (such as fingerprint and/or iris capturedevices, camera(s), card readers(s), trackballs, computer keyboards,pushbuttons, and other typical input devices associated with interactivecomputer kiosks).

It is to be appreciated and understood by one skilled in the art, eachkiosk 250 electronically communicates with the central processing system210 using any known and suitable secure electronic method. In theillustrated embodiment of FIG. 2, a Virtual Private Network (VPN) link248 is established between each kiosk 250 and the central processingsystem 210, preferably through a firewall 246. Input devices thatcommunicate with the kiosk 250 can be physically attached to the kiosk250 or remotely communicate with the kiosk 250 to provide theinformation needed to perform enrollment or verification functions.

To aid the enrollment process, system 200 is further configured andoperative to couple to third-party computering devices 260 accessible bya user 290 for enrollment purposes, as further explained below. It is tobe appreciated and understood by one skilled in the art, each thirdparty computering device 260 (e.g., a desktop or laptop computer, tabletdevice, smart phone, etc.) electronically communicates with the membermanagement system 240 using any known and suitable secure electronicmethod. In the illustrated embodiment of FIG. 2, each third partycomputering device 260 electronically communicates with the membermanagement system 240 via an internet Secure Sockets Layer (SSL)connection 262, preferably through a firewall 264.

It is to be appreciated and understood system 200 is preferablyoperative and configured to maintain remote monitoring capability of itsfield located kiosks 250 whereby monitoring and measuring of systemperformance and metrics will provide the information necessary forsystem 200 to continually evaluate the performance and effectiveness ofall components of system 200. It is to be further appreciated andunderstood, data relating to an applicant, member, and/or potentialmember 290 is not to be stored locally at a kiosk 250. That is, nopersonally identifiable information is stored in kiosks 250 or any otherfield storage devices associated with system 200 (e.g., laptops).Additionally, it is to be understood and appreciated, system 200utilizes the aforesaid encryption such as SFTP, SSL, and VPNconnections, along with protection by Firewalls, to ensure the securityof data in system 200.

With the system 200 in accordance with the illustrated embodiments ofFIGS. 1 and 2 being described above, its method and process of operationwill now be described in accordance with the illustrated diagrams ofFIGS. 3 and 4 (with continuing reference to FIGS. 1 and 2). First, withreference to FIG. 3 an exemplary enrollment process for an applicantuser 290 with system 200 will be described.

Starting at step 310, a user first preferably provides the appropriateenrollment payment information and user background/demographicinformation to system 200. This information is preferably input to themember management system 240. It is to be appreciated this informationmay be input to the member management system 240 from a user, via a usercomputering device 260 or a system kiosk 250 as illustrated in FIG. 2.In particular, the user computering device 260 preferably couples to themember management system 240 using an internet address coupling (e.g.,www.clearme.com), which coupling is preferably an SSL internet 262coupled connection, through firewall(s) 264, providing a secure andencrypted coupling.

Next, at step 320 the member management system 240 is configured andoperative to store the aforesaid user payment and billing informationalong with the user's background and demographic information necessaryfor membership information and verification purposes. The remainingportion of the user 290 input information from step 310 is preferablytransmitted to the central processing system 210. it is also to beappreciated that if a kiosk 250 is used for user enrollment purposes,the user's 290 input enrollment information is preferably transmitted tothe central processing system 210, which in turns sends userbilling/payment information and other appropriate membership informationto the member management system 240 for storage therein.

Next, to complete the enrollment process, a user 290 is preferablypresent at a kiosk 250 (or user computering device 260) whereby thecentral processing system 210 is configured and operative to send userdemographic information to the kiosk 250 the user 290 is present at,preferably in real-time, so as to be authenticated by a user 290preferably in the presence of a system attendant for user authentication(step 330). That is, this is the process whereby the user's identity isauthenticated via data collected from external sources such as apassport, driver's license (and the like) and the successful completionof answers to questions which are specific to the user 290, as set forthabove. Upon such user authentication, the kiosk 250 is preferablyconfigured and operative to scan and authorize certain userdocumentation to authenticate the user 290 (step 330). For instance,each kiosk 250 may be configured and operative to only accept thoseforms of identification that Benefit Providers such as the TSA hasdeemed acceptable and that can be authenticated. As an additionalmeasure of security for verifying the identity of an enrolling user 290,system 200 is configured and operative to perform an authentication usertest (step 330). As mentioned above, once the identity of the userapplicant is authenticated (step 330), the central processing system 210is preferably adapted and configured to communicate with a remote thirdparty data source (e.g., LEXISNEXIS®) to retrieve data relevant andpersonal to the verified identity of the user applicant 290. This data(e.g., the amount of a mortgage or automobile payment), is used bycentral processing system 210 to authenticate the user 290 so as tomitigate any instance of identity theft, as now discussed below.

In a preferred embodiment, the aforesaid retrieved authenticating datais utilized by system 200 to formulate a quiz/test using the aforesaidretrieved authenticating data (e.g., the amount of a mortgage payment).It is to be appreciated and understood the functionality of theaforesaid authentication user test (step 330) is to strengthen theindividual authentication and enrollment requirements and furtherdecrease an imposter's ability to enroll under an alias. For instance, aquestion presented may be the amount of the user's monthly mortgagepayment and/or identify the most recent user employers. Thus, withregards to the aforementioned authentication user test (step 330),system 200 has incorporated an additional step in the secure memberenrollment process. That is, system 200 has made the successful“in-person” completion of an identity authentication test, (i.e., apersonalized questionnaire populated by commercially available data) asan additional eligibility requirement. In one embodiment, the identityauthentication test consists of posing applicants randomized questionsplus an auxiliary question. To successfully complete the quiz, anapplicant user 290 preferably answers a predetermined number ofquestions correctly during a limited time period while being observed byan enrollment specialist. If an applicant/user 290 does not properlyrespond to the randomized questions and successfully complete the quiz,the applicant/user 290 is preferably not permitted to complete theenrollment process.

Upon the successful authentication of the applicant user's 290 identitydocuments and the passing of the aforesaid identity authentication test(step 330), each kiosk 250 is additionally preferably configured andoperative to collect user biometric information (e.g., fingerprints,retain/iris scan, facial image, voice and the like) (step 340).

The collected applicant/user 290 biometric information (step 340) isprovided to the payload processor system 220 (step 360). Which payloadprocessor system 220 formats a user 290 biometric template based uponthe user's collected biometric information (step 340) which is then sentto the central processing system 210 (step 350). The user 290 biometrictemplate is then preferably sent from the central processing system 210to the card production system 230 which produces a user identificationtoken such as a smartcard having embedded or links to user biometric andbiographic information using any known means (smart chip, magneticallyor optically encoded information and the like) (step 360). The useridentification token may then be issued to a user 290 for use thereof(step 370). It is to be understood and appreciated the invention is notto be understood to be limited to the use of such a user issued tokenresiding on a smart card or like device but rather encompass matching auser's retrieved biometric inhumation with that previously stored insystem 200.

With reference now to FIG. 4, the process for the user's 290 use of theaforesaid user identification token will now be briefly discussed.Starting at step 410, an enrolled user 290 presents the useridentification token to a kiosk 250 associated with a third partyrequiring identity verification of the user 290 (e.g., airport security,admittance to an event requiring heightened security, or to a merchantdesiring to verify a client using a credit card or other ACH type ofpayment). Next, the kiosk 250 is configured and operative to confirm abiometric match between biometric data stored for the user 290 on theuser identification token or in the central processing system 210 andthe matching biometric features of the user 290 collected at the time ofverification (step 420). If there is a match, the user's identity isverified and authenticated (step 430).

As used herein, the term “software” is meant to be synonymous with anycode or program that can be in a processor of a host computer,regardless of whether the implementation is in hardware, firmware or asa software computer product available on a disc, a memory storagedevice, or for download from a remote machine. The embodiments describedherein include such software to implement the equations, relationshipsand algorithms described above. One skilled in the art will appreciatefurther features and advantages of the invention based on theabove-described embodiments. Accordingly, the invention is not to belimited by what has been particularly shown and described, except asindicated by the appended claims. All publications and references citedherein are expressly incorporated herein by reference in their entirety.

Optional embodiments of the present invention may also be said tobroadly consist in the parts, elements and features referred to orindicated herein, individually or collectively, in any or allcombinations of two or more of the parts, elements or features, andwherein specific integers are mentioned herein which have knownequivalents in the art to which the invention relates, such knownequivalents are deemed to be incorporated herein as if individually setforth. For instance, while the above illustrated embodiments makereference to a user token dedicated for use of a user's identificationin an airport environment, other embodiments encompass using a tokendedicated for another purpose such as a credit or debit card whichincorporates the biometric authentication features mentioned above,along with the aforesaid secure enrollment process (FIG. 3).

The above presents a description of a best mode contemplated forcarrying out the present invention identity authentication and biometricverification system and method, and of the manner and process of makingand using the identity authentication and biometric verification systemand method, in such full, clear, concise, and exact terms as to enableany person skilled in the art to which it pertains to make and use thesedevices and methods. The present invention identity authentication andbiometric verification system and method is, however, susceptible tomodifications and alternative method steps from those discussed abovethat are fully equivalent. Consequently, the present invention identityauthentication and biometric verification system and method is notlimited to the particular embodiments disclosed. On the contrary, thepresent invention identity authentication and biometric verificationsystem and method encompasses all modifications and alternativeconstructions and methods coming within the spirit and scope of thepresent invention.

The descriptions above and the accompanying drawings should beinterpreted in the illustrative and not the limited sense. While theinvention has been disclosed in connection with the preferred embodimentor embodiments thereof, it should be understood that there may be otherembodiments which fall within the. scope of the invention as defined bythe following claims. Where a claim, if any, is expressed as a means orstep for performing a specified function, it is intended that such claimbe construed to cover the corresponding structure, material, or actsdescribed in the specification and equivalents thereof, including bothstructural equivalents and equivalent structures, material-basedequivalents and equivalent materials, and act-based equivalents andequivalent acts.

What is claimed:
 1. A system for authenticating an identity of a person, the system comprising: a non-transitory storage medium that stores instructions; and a processor that, during a registration process, executes the instructions to: extract biographic information for the person from an external source; receive a digital representation of a biometric for the person; determine that the person was monitored during submission of the digital representation of the biometric; obtain authentication data from a network search by using at least one of the biographic information or the digital representation of the biometric, the authentication data comprising personal information associated with an asserted identity of the person; generate a number of questions using the personal information; perform identity checks by: obtaining a number of answers in response to the number of questions, the number of answers comprising identifying information from the person; and evaluating the number of answers by comparing the identifying information with the personal information; cease evaluating the number of answers after obtaining a first threshold number of correct answers or a second threshold of incorrect answers; and determine whether to authenticate the identity of the person based on an aggregation of the identity checks.
 2. The system of claim 1, wherein the processor uses the digital representation of the biometric to enroll the person in an identification system when the processor determines that the identifying information is sufficiently similar to the personal information.
 3. The system of claim 1, wherein at least one of the identity checks comprises authenticating the identity of the person based on an answer of the number of answers that the person provides in response to a question of the number of questions.
 4. The system of claim 3, wherein authenticating the identity of the person based on the answer includes determining whether the answer was received within a predetermined time period.
 5. The system of claim 1, wherein the digital representation of the biometric comprises at least one of a fingerprint image, a retina image, an iris image, or a voice recording.
 6. A system for authenticating an identity of a person, the system comprising: a non-transitory storage medium that stores instructions; and a processor that, during a registration process, executes the instructions to: extract biographic information for the person from an external source; receive a digital representation of a biometric for the person; determine that the person was monitored during submission of the digital representation of the biometric; obtain authentication data from a network search by using at least one of the biographic information or the digital representation of the biometric, the authentication data comprising personal information associated with an asserted identity of the person; generate a number of questions using the personal information; compare the biographic information to the personal information by evaluating a number of answers provided by the person in response to the number of questions; cease evaluating the number of answers after at least one of a first threshold number of incorrect answers or a second threshold number of correct answers are provided in response to the number of questions; and based on the comparison, determine whether the person is associated with the asserted identity of the person.
 7. The system of claim 6, wherein the biographic information and the digital representation of the biometric are received from different input components of an electronic device.
 8. The system of claim 6, wherein the processor uses the digital representation of the biometric to enroll the person in an identification system when the processor determines that the person is associated with the asserted identity of the person.
 9. A system for authenticating an identity of a person, the system comprising: a non-transitory storage medium that stores instructions; and a processor that, during a registration process, executes the instructions to: receive a digital representation of a biometric for the person; extract biographic information for the person from an external source; when it is determined that the person was monitored during submission of the digital representation of the biometric and the biographic information, obtain authentication data from a network search by using at least one of the digital representation of the biometric or the biographic information, the authentication data comprising personal information associated with the person; generate a number of questions using the personal information; perform identity checks by: obtaining a number of answers in response to the number of questions, the number of answers comprising identifying information from the person; and evaluating the number of answers by comparing the identifying information with the personal information; and cease evaluating the number of answers after obtaining at least one of a first threshold number of incorrect answers or a second threshold number of correct answers.
 10. The system of claim 9, wherein at least one of the identity checks comprises determining whether an answer of the number of answers was provided within a predetermined period of time.
 11. The system of claim 9, wherein the processor determines the person was monitored during the submission of the digital representation of the biometric and the biographic information by determining that a live agent monitored the submission.
 12. The system of claim 9, wherein the processor uses the digital representation of the biometric to enroll the person in an identification system upon authenticating the identity of the person.
 13. The system of claim 9, wherein the biographic information is extracted from an image of an identification document associated with the person.
 14. The system of claim 1, wherein the external source is a form of physical identification associated with the person.
 15. The system of claim 9, wherein: the processor determines the external source is of a type that is approved under a security protocol; and the external source is at least one of: a driver's license; a passport; or an identification card.
 16. The system of claim 1, wherein, when obtaining the first threshold of correct answers, the identity of the person is authenticated.
 17. The system of claim 1, wherein, when obtaining the second threshold of incorrect answers, the identity of the person is not authenticated.
 18. The system of claim 17, wherein, when the identity of the person is not authentication, the registration process ends without registering the person in an identification system.
 19. The system of claim 6, wherein, when obtaining the first threshold of incorrect answers, the identity of the person is not authenticated.
 20. The system of claim 6, wherein, when obtaining the second threshold of correct answers, the identity of the person is authenticated. 