Method for identity verification

ABSTRACT

The method for identity verification employs biometric technology. Positioned at the center of the system is a stylus with any of a number of biometric properties or their combination or with one or more metric sensors, while the customer uses the stylus to sign his/her name, or even for writing anything. The identity verification system is used at point-of-sale terminals, in various closed environments, to access a computer network, in applications involving pen-based computers and smart-pens, and for e-commerce. When fingerprint sensors are used, the sensors are positioned in the stylus grip, one sensor for the index finger, and a second sensor for the thumb. In one variation, one-to-one biometric matching is used. Each participant carries on his/her person a device that includes an encrypted biometric for reference purposes to gain access Into the system. Processing is simplified since the system need only make a “MATCH” or “NO MATCH” decision. In a second variation that is particularly useful in closed environments, one-to-many biometric matching is used. During each event access request, the community of reference prints is searched for a match with the applicant. Each member of the community need carry nothing on his/her person to participate in the system. In either variation, the stylus is either attached to each site or is portable, one such stylus being carried by each participant.

This Application is related to and claims priority to U.S. patentapplication Ser. No. 09/535,411 file 24 Mar. 2000 which claims priorityto U.S. Ser. No. 09/490,687 entitled “Writing Implement for IdentityVerification System” Filed 20 Jan. 2000; U.S. Provisional ApplicationNo. 60/177,390 entitled “Writing Implement for Identity VerificationSystem” filed 20 Jan. 2000, U.S. Provisional Application No. 60/163,433,entitled “Writing Implement for Identity Verification System” filed 11Nov. 1999, U.S. Provisional Application No. 60/154,590 entitled “WritingImplement for Identification Verification System” filed 17 Sep. 1999,U.S. Provisional Application No. 60/144,028 entitled “Biometric Pen andEncryption Device” filed 16 Jul. 1999, PCT Application No.PCT/US99/07900 entitled “Biometric Hotel and Casino Play” filed 07 Apr.1999, U.S. Provisional Application No. 60/119,408 entitledIdentification Confirmation System” filed 10 Feb. 1999, U.S. ProvisionalApplication No. 60/116,212 entitled “Identification Confirmation System”filed 19 Jan. 1999, U.S. Provisional Application No. 60/114,632 entitled“Identification Confirmation System” filed 04 Jan. 1999, U.S.Provisional Application No. 60/109,511 entitled “Biometric WritingImplement” filed 23 Nov. 1998, U.S. Provisional Application No.60/088,498 entitled “Biometric Hotel and Casino Play” filed 08 Jun.1998, and U.S. Provisional Application No. 60/080,962 entitled“Biometric Hotel and Casino Play” filed 07 Apr. 1998.”

FIELD OF THE INVENTION

The invention relates generally to a method for authenticating theidentification of a person using biometric means, and more particularly,for use at point-of-sale terminals, for use in various closedenvironments, for accessing a computer network, for applicationsinvolving pen-based computers and smart-pens, and for e-commerce.

BACKGROUND OF THE INVENTION

Wireless (e.g., radio, infrared, microwave) communication links nowenable computer systems comprised of very small portable computers thathave the capability of being networked at all times and in alllocations. Production of small, portable computers is the strongesttrend in the computer industry, and wireless communication is one of thestrongest trends in the telecommunication industry.

The visible difference of pen-based computers from other technologies isin the use of a stylus (e.g.—a pen or pencil) as the primary means ofinteraction between a user and a machine, picking up the familiar penand paper interface metaphor. With pen computing, a pen-like stylus isused on a digital surface to write and annotate information. Within thespecial computer is contained a digitizer which captures and interpretsthe text that is entered.

The global workforce is increasingly mobile and pen-based computing ison the rise. Smart handheld devices are emerging from the realm ofindividual purchases to enterprise deployment as they become key toolsfor connectivity to the corporate environment. Development of handheldapplications and wireless technology tailored for the enterpriserepresent are serving the increasing the remote and mobile workerpopulation.

Credit cards were originally introduced to for use at POS terminals toreplace charge-a-plates. Plastic charge cards, debit cards, ATM cards,stored value cards are fair game for thieves. It is not uncommon forpeople to carry more than eight cards in their wallets. The cards mustbe replaced every few years, and the cards may become damaged withfrequent usage. In addition, consumer fraud and card counterfeiting areon the rise. The cards can be easily lost or stolen, signatures can beeasily forged and PIN's can be readily determined by others. Hence,while plastic cards are easier to carry than money, they are almost asnegotiable as money to sophisticated criminals.

Also, a devastating pattern of security lapses is laid out in a 1999congressional report on China's acquisition of America's most vitalnuclear and missile secrets. Beijing remains far from nuclear paritywith the United States. The federal government is right to concernitself with protecting America's computer networks against cyber attacksby terrorists or foreign governments. Computer network security is areal and growing problem. The Federal Government needs to protect notjust sensitive defense secrets, but also the computers that manage airtraffic control, Social Security, Medicare and a host of other civilianprograms. Also, while E-commerce and smart pen technology find increasedacceptance, the future growth of these technologies will continue to behampered by security concerns.

The use of physical attributes—fingerprints, a voiceprint, or any ofseveral other characteristics—to verify identity has great potential.Passwords and personal-identification numbers (PIN's) are fraught withproblems. Biometrics offers solutions. Applications that are preparingto accept biometric data include computer networks, ATMs, cars, cellularphones, and dozens of other types of embedded systems.

Widespread acceptance of biometrics means use in areas that daily affectthe lives of millions of people. By replacing PIN's, biometrictechniques prevent the unauthorized access to or fraudulent use ofATM's, cellular phones, smart cards, desktop PC's, workstations, andcomputer networks. For financial transactions conducted via telephoneand wire, biometrics can replace PIN's and passwords. In buildings andwork areas, biometric techniques replace keys, badges, and readers. Byreplacing PIN's for transfers of funds to the cards, biometrics enhancethe security of credit/debit-card (plastic-money) systems and prepaidtelephone calling cards. Biometric techniques also provide security notpreviously envisioned for “cash” balances stored in such cards. For POSterminals, biometric techniques can replace a clerk's verification of acustomer's signature.

Biometric techniques can also potentially replace driver's licenses orpassports for authenticating the identity of airline passengers. Similartechniques can replace or supplement passports and visas forestablishing the identity of people seeking to cross national borders atcustoms and immigration checkpoints.

In hospitals, biometric techniques can replace ID bracelets to establishpatients' identities—for example, before blood administration.Biometrics could help confirm the identity of people seeking publicassistance, Medicare, and other government and insurance benefits. Inthese applications, biometrics would replace or supplement a variety ofsystems, of which photo ID's are probably the most popular. Biometricscan also authenticate e-mail and other documents transmitted viacomputer networks.

An example of a rapidly growing biometric technology, fingerprints offeran infallible means of personal identification and are rich ininformation content. The use of fingerprints for identification datesback many decades, but gained wide acceptance about 100 years ago.Fingerprints are the biometric that form the basis of all worldwideidentification. Fingerprints don't change with time while other physicalcharacteristics do. Fingerprint minutiae uniquely identify fingerprints.It has been proven that minutiae, were unchanging and repeatablefeatures of each fingerprint, and were individually unique. Each fingerhas a unique arrangement of ridge detail. There are two major types ofinformation in a fingerprint. First is the ridge flow information, andsecond is the specific features or minutiae (minutia) of thefingerprint. As used herein, the term “minutia” is used to denote boththe singular and plural. Fingerprints uniquely identify an individualbased on their information content. Information is represented in afingerprint by the minutia and their relative topological relationships.The number of minutia in a fingerprint varies from one finger toanother, but, on average, there are about eighty (80) to one hundred andfifty (150) minutia per fingerprint. In the fingerprint context, a largestore of fingerprints exists in law enforcement offices around thecountry. Since fingerprints never change, a person need only befingerprinted once to be in the system.

U.S. Pat. No. 5,680,470 (Moussa et al.) discloses a method of signatureverification involving a set of template signatures that are examinedfor test features which are normalized and irrelevant features areremoved. Similarly, U.S. Pat. No. 5,559,895 (Lee et al.) discloses asystem for real time signature verification where the signatures aredigitized for statistical analysis and various personal features areselected.

Current stylus-type verification systems use metric-typesensors—accelerometers and pressure sensors to measure stylus pressureand stroke sweep in the users' signature. U.S. Pat. No. 5,774,571(Marshall) discloses a stylus with multiple sensors for biometricverification including grip pressure sensors and gyroscopes. U.S. Pat.No. 4,513,437 (Chainer et al.) discloses another data input stylus forsignature verification which includes accelerometers and pressuresensors. U.S. Pat. No. 5,247,137 (Epperson) discloses a stylus thatenables biometric identification by means of comparison of graphics dataand textural data from a remote location. The stylus also capturesstrokes and gestures which can also be used for confirmingidentification. U.S. Pat. No. 5,103,486 (Grippi) discloses a system forusing a combination of biometrics at POS terminals. Prisms are used tocapture the fingerprint of the index finger while the individual signshis/her name. The fingerprint image and the signature are processed toform a composite representative for comparison with information shown ona credit card for processing of commercial transactions.

What is needed is a pen-based verification process that enables an eventto occur only when identity has been confirmed, the process employingstate-of-the-art sensors (a) that can be used for signature verificationat point-of-sale terminals that captures biometric data in anonobtrusive manner, while serving as a system that can eventuallyreplace card-based transaction systems; (b) that can authenticateidentity continually in pen-based computing systems to ensure that theperson seeking access to information has pre-approved authorization forsuch access; and (c) that is compatible with smart pens ensuring the useof the pen and access to data through the pen has been pre-approved.

What is needed is a process that is compatible in smaller closedenvironments where the size of the community is limited for confirmationof event access without the need for encryption techniques onceidentification has been verified by biometric means; a process thatenables the use of biometric sensors in a broad range of applicationswhile eliminating the need for separate biometric sensors and units withwiring that would otherwise need to be integrated into the existingsystems; that is user friendly, nonobtrusive to use, virtuallyimpregnable to criminals, that enables authorized access to certainevents while barring unauthorized access, that can be readily adapted toinclude any number of pen-based applications

What is needed is a pen-based verification process that is compatiblewith encryption technology so that event access is confirmed locally (a)eliminating most privacy concerns (b) simplifying system logic whileimproving system speed, and (c) reducing the complexity and cost of thebiometric sensors.

What is needed is a pen-based verification process that will providecustomers with the privacy that they may want while ensuring theintegrity of their accounts and their name; a process that requires nohardware at the point-of-sale terminal other than a stylus (many similartype styli being already in place); a process that will significantlyreduce transaction time; a process that is convenient to use andunobtrusive to customers; a process that provides improved processingspeed and accuracy; a process that is secure and safe from illegalentry; and a process for confirming personal identification that isreliable, a process that will actually discourage thieves.

SUMMARY OF THE INVENTION

The method for verifying identity of the present invention addressesthese needs and revolutionizes the nature of pen-based event access.Positioned at the center of the process is a stylus with any of a numberof biometric properties or their combination or with one or more metricsensors, while the user signs his/her name, or even for writinganything. The identity verification process of the present invention canbe used at POS terminals, in various controlled environments, to accessa computer network, in applications involving pen-based computers andsmart-pens, for e-commerce, conventional writing implements, andmulti-purpose writing implements.

The biometric properties that can be captured include, but are notlimited to, fingerprints (fingerprint sensors), voice recognition(e.g.—microphone), facial imaging (e.g.—camera), and DNA and otherbiotech properties (e.g.—cell capture/analysis sensors). Metricproperties include, but are not limited to, grip and point pressure(e.g.—pressure sensors), position of the index finger relative to thepoint, position of the thumb relative to the index finger (e.g.—thermalsensors), angle of the stylus during usage (e.g.—a gyroscope), speed ofsigning (e.g.—a timer), increases and decreases of speed during signing(e.g.—an accelerometer). The stylus is either tethered (attached) toeach site or is portable, one such stylus being carried by each user.

In a first preferred embodiment of the identity verification process ofthe present invention, one-to-many biometric matching is used. Thisembodiment is particularly useful in controlled environments such ashotels, hospitals, and military bases, where the size of the communityis limited. One or more biometrics (and metrics) are captured forreference purposes during registration. During each event accessrequest, the community of reference prints is searched for a match withthe user. Each member of the community need carry nothing on his/heruser to participate in the system.

In a second preferred embodiment of the identity verification process ofthe present invention, one-to-one biometric matching is used. Thisembodiment requires each user to carry on his/her user a device thatincludes an encrypted reference biometric for reference purposes to gainaccess into the system. The encryption device can be the stylus, a card,a stylus insert (as herein described), or a device carried on akey-chain. Processing speeds for this embodiment considerably fasterthan the first preferred embodiment, since the system need only make a“MATCH” or “NO MATCH” decision. While the processing can occur at acentral computer, it is preferred that the matching logic be at theaccess site, inside a smart card, or inside a smart pen to minimizeprivacy concerns.

One preferred application for the identity verification process of thepresent invention involves pen-based computing systems. Pen-basedcomputer systems are ideal for applications which require: (1) highlyportable devices—that are no longer constrained by a keyboard; (2)intuitive features—that resemble an environment familiar to the users;(3) improved efficiency,—that enables accurate data collection andmanipulation.; and (4) flexibility—that enables a wide variety of typesof data entry. Several applications of the identity verification systemof the present invention include:

-   -   Nurses and doctors can track and record patient histories as        they make their rounds, using clipboard-like computers and pens        to access and enter patient information over a wireless network        from servers throughout the hospital.    -   Insurance claims adjusters can assess automobile damages on        site, looking up relevant cost information with the pen, then        printing the estimate and writing a check to the repair shop at        the end of the visit.    -   Sales representatives can track inventory and the effect of        promotional campaigns in retail stores, using a pen computer. At        the end of the day, the information is transmitted through a        phone line back to headquarters.

Another premier application of the identity verification process of thepresent invention involves POS terminals with either one or twofingerprint sensors disposed within the stylus. The stylus enablessignature verification at POS terminals, either with credit-type cards,or in lieu of such cards. The user signs his/her name using thebiometric stylus. The prints are again captured and compared to theprints of all registrants in search of a match. Once the financialinstitution confirms that there are sufficient funds in the account, theamount is debited from the account, and the transaction is approved.

The stylus enables the conversion at POS terminals when used to verifysignatures. A cardholder can transfer funds into a new account at a POSterminal by use of a credit card at a POS terminal by using the stylusof the present invention. The cardholder swipes his/her card through thecardreader and signs and prints his/her name using the stylus of thepresent invention. The prints are captured and the cardholder advisesthe credit card financial institution of the amount to be transferred.Account information is exchanged and the card is not needed next time.

Registration using the identity verification process of the presentinvention is similar to opening a new bank account. Initially, the userregisters by using the stylus. The applicant provides the financialinstitution with basic information; name, address, phone number, andsignature. The only difference is that the stylus of the presentinvention enables the capture of biometric data while the applicantsigns his/her name. Another way to register at POS terminals, is toreplace styluses currently used for signature verification with thebiometric pens of the present invention. Once the prints are initiallycaptured, the card isn't needed. The next time the Styli with metricsensors and signature verification systems are already beginning toappear at some POS terminals. These stylus do not capture fingerprints,but rather are used only for purposes of signature verification.Initially, the system of the present invention will verify signaturesreplacing these styluses. Next, the use of credit and debit cards willbecome optional.

For a more complete understanding of the identification verificationmethod of the present invention, reference is made to the followingdetailed description and accompanying drawings in which the presentlypreferred embodiments of the invention are shown by way of example. Asthe invention may be embodied in many forms without departing fromspirit of essential characteristics thereof, it is expressly understoodthat the drawings are for purposes of illustration and description only,and are not intended as a definition of the limits of the invention.Throughout the description, like reference numbers refer to the samecomponent throughout the several views.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A discloses the preferred embodiment of the multi-purpose stylusof the present invention;

FIG. 1B discloses a preferred embodiment of a functional block diagramof the identity verification system of the present invention;

FIG. 2A discloses a writing stylus with fingerprint sensors for use inthe system of the present invention with a built-in grip;

FIG. 2B discloses a section of the writing stylus shown in FIG. 2A takenalong 2A-2A;

FIG. 3A discloses a preferred embodiment of the writing stylus with gripfor use in the system of the present invention with a built-in grip;

FIG. 3B discloses the print images obtained from the print imagingsensors in in the system of the present invention with a built-in grip;

FIG. 3B discloses the print images obtained from the print imagingsensors in the writing stylus of FIG. 3A;

FIGS. 3C and 3D disclose additional embodiments of the stylus, thefingerprint sensor being disposed within an insert positioned on theclick-button on the top distal end of stylus having a retractable point;

FIG. 4A discloses an assembly view of one preferred embodiment of thestylus of the present invention with the fingerprint sensorconfiguration in the top of the stylus;

FIGS. 4B, 4C, and 4D disclose various grip configurations which providealignment of the print sensors with the index finger and thumb;

FIGS. 5A, 5B, 5C, 5D, and 5E disclose various grip configurations thatare compatible with conventional styluses and pencils, the gripincluding a cord connection to the writing surface, and sensors beingincorporated into the grip;

FIG. 6 discloses a simplified logic diagram of one embodiment of theidentity verification system of the present invention, demonstrating howa user registers for participation in the system;

FIGS. 7A and 7B disclose a simplified logic diagram of one embodiment ofthe identity verification system of the present invention demonstratinghow the user accesses an event in the system;

FIG. 8 discloses a simplified logic diagram for use with the identityverification system of the present invention, enabling a user to convertfrom a card-based transaction system to a pen-based transaction systemwithout the need for any cards in subsequent transactions;

FIG. 9 discloses a payment selector used by a user to select whichaccount the transaction is to be paid from in another variation of theidentity verification system of the present invention;

FIG. 10 discloses a keypad for use with a digitizing surface to enabledata entry such as a primary identifier for use with the identityverification system of the present invention;

FIG. 11 discloses another preferred embodiment of a simplified processflow path for identity verification using the biometric identificationsystem of the present invention;

FIG. 12A and 12B disclose a first preferred embodiment of the stylusinsert of the present invention;

FIG. 13A and 13B disclose a second preferred embodiment of the stylusinsert of the present invention;

FIG. 14A, 14B and 14C disclose a third preferred embodiment of thestylus insert of the present invention;

FIG. 15A and 15B disclose a fourth preferred embodiment of the stylusinsert of the present invention;

FIG. 16 shows the identity verification system of the present inventionas incorporated into a smart pen;

FIG. 17A, 17B, and 17C show the stylus system of the present inventionas used various configurations of pen-based computers, including (a) alap-top computer, (b) a palm-type computer; and (c) a hand-heldcomputer, respectively;

FIG. 18 shows the identity verification system of the present inventionin an e-commerce application being used when the user signs his/hername;

FIG. 19 shows the identity verification system of the present inventionas used in a multi-purpose application, including a conventional pen, aconventional pencil, and a stylus for use with a pen based computer;

FIG. 20A discloses still yet another preferred embodiment of theidentity verification system of the present invention, the stylus beingfoldable into a card, the card having an IC chip with an encryptedbiometric print and biometric print sensors embedded in the card, thecard-pen being compatible with conventional card readers, the card-penbeing unfoldable lengthwise for transformation into a pen; and FIG. 20Bshows the card of FIG. 20A after folding for use as a stylus.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring now to the drawings, in the broadest terms the preferredembodiment of the identity verification system used with the process ofthe present invention, as shown in FIG. 1 comprises a stylus 15 withbiometric sensors 20 disposed in a grip 30, and a computer processingunit 40.

As used herein unless the context indicates otherwise, a “stylus” is anydevice that is compatible with either the hand or finger of the user forpurposes of making a marking on an essentially flat surface. While thedrawings depict a conventional shape of a stylus, other shapes anddesigns are also included within the scope of the present invention suchas any attachment to a finger or any implement that can be held with ahand for such purpose. Also, as used herein unless the context suggestsotherwise, the term “fingerprint” refers to either the print of theindex finger or the thumb. In addition, as used herein unless thecontext suggests otherwise, the term “biometric” that are unique to theactual physical features of the user including, but are not limited to,fingerprints (fingerprint sensors), voice recognition (e.g.—microphone),facial imaging (e.g.—camera), and DNA and other biotech properties(e.g.—cell capture/analysis sensors). The signature of the user isgenerally not considered to be a biometric, unless otherwise indicatedin the context of which it is used. Biometrics are to be distinguishedfrom the term “metrics” which include, but are not limited to, grip andpoint pressure (e.g.—pressure sensors), position of the index fingerrelative to the point, position of the thumb relative to the indexfinger (e.g.—thermal sensors), angle of the stylus 15 during usage(e.g.—a gyroscope), speed of signing (e.g.—a timer), increases anddecreases of speed during signing (e.g.—an accelerometer).

The stylus 15 of the present invention has numerous uses, and primarilyfor purposes of illustration, include signature verification at POSterminals, pen-based computers user identification, and to provideimproved convenience to guests within various controlled environments.

Positioned at the center of the system is a stylus 15 with any of anumber of biometric properties or their combination or with one or moremetric sensors, while the user signs his/her name, or even for writinganything. The identity verification system of the present invention 10can be used at POS terminals, in various controlled environments, toaccess a computer network, in applications involving pen-based computersand smart-pens, and for e-commerce, conventional writing implements, andmulti-purpose writing implements. The stylus 15 is either tethered(attached) to each site or is portable, one such stylus 15 being carriedby each user.

In a first preferred embodiment of the identity verification system ofthe present invention 10, one-to-many biometric matching is used. Thisembodiment is particularly useful in controlled environments such ashotels, hospitals, and military bases, where the size of the communityis limited. One or more biometrics (and metrics) are captured forreference purposes during registration. During each event accessrequest, the community of reference prints is searched for a match withthe user. Each member of the community need carry nothing on his/heruser to participate in the system. This embodiment can also be used inopen environments in combination with the user supplying additionalinformation during each request for event access (i.e.—printed name,phone number, social security number). See for example U.S. Pat. No.5,805,719 (Pare, Jr., et. al.).

In a second preferred embodiment of the identity verification system ofthe present invention 10, one-to-one biometric matching is used. Whilethis system can also be used in controlled environments, it is preferredin open environment situations where the size of the community iscontinually expanding through registration without limitation. Thisembodiment requires each user to carry on his/her user a device thatincludes an encrypted reference biometric for reference purposes to gainaccess into the system. The encryption device can be the stylus 15, acard (e.g.—credit, debit, ATM, check, driver's license, identificationcard), a stylus cap, a stylus grip a stylus insert 50 (as hereindescribed), a device carried on a key-chain, as a piece of jewelry, asan implant device, or by some other means. The encryption device iscompatible with the system described in copending PCT ApplicationPCT/US99/07900. Processing speeds for this embodiment considerablyfaster than the first preferred embodiment, since the system need onlymake a “MATCH” or “NO MATCH” decision. Since the matching is preferablyone-to-one as opposed to one-to-many, the quality of the sensor need notbe forensic quality although one is preferred and, only one sensor isneeded. While the processing can occur at a central computer, it ispreferred that the matching logic be at the access site or a regionalsite to minimize privacy concerns.

Preferably, the processing occurs within the pen, an identificationcard, a smart card, or within a processor at the site of thetransaction. In another preferred embodiment of the present invention10, the processing occurs at the POS terminal. In yet another preferredembodiment of the present invention 10, the processing takes place at aregional computer. Localized processing is preferred for purposes ofsimplicity, speed, and to ensure individual privacy. As the processingmoves up the chain, it becomes more complex.

Of all the areas of biometrics, fingerprint sensing has captured theimagination of the largest number of companies. Four integrated circuitmanufacturers embody unusual fingerprint-sensing technologies in newchips. ST Microelectronics and Veridicom provide integrated circuitapproaches—are dc-capacitive sensors. Harris Semiconductor Corp.provides an ac-capacitive sensor. Thomson-CSF's FingerChip uses thermalsensing. Each integrated circuit sensor produces a high-resolution(several-hundred-pixels by several-hundred-pixels by 8 or 16 bits) imageof a finger tip. These images are comparable with those obtained bypressing inked finger tips onto absorbent paper. Automaticfingerprint-identification systems can process images obtained frombiometric sensors just as easily as from images obtained from inkedfingers.

In uncompressed form, the images occupy several hundred kilobytes. Manyfingerprint-based authentication systems store the images in acompressed form, in which they occupy approximately 10 kbytes. Althoughthe image compression employ lossy algorithms, the algorithms are tunedfor fingerprint recognition. Generally, there is little or no differencebetween the original and the decompressed images. An even more compactway to store the important features of fingerprints is to extractminutiae. Minutiae are the points at which fingerprint patterns branchand end. A minutiae file can occupy as much as 1200 bytes. Either way,minutiae files significantly compress the original image.

The dc-capacitive fingerprint sensors from ST Microelectronics andVeridicom comprise of rectangular arrays of capacitors on a siliconchip. One plate of the capacitor is the finger to be sensed; the otherplate is a small area of a pixel disposed upon the surface of the chip.The finger is positioned against the surface of the chip—actually,against an insulated coating on the surface of the chip. The ridges ofthe fingerprint are close to the nearby pixels and have highcapacitance. The valleys are more distant from the pixels nearest themand have lower capacitance. The sensor then draws a fixed charge fromeach pixel in turn—that is, it scans the pixels. A high voltage appearson pixels to which the finger has low capacitance, and a low voltageappears on pixels to which the finger has a high capacitance.

Veridicom, Inc. uses a CMOS chip. These plates are covered with a thinlayer of dielectric. When a finger is placed on top of the chip, eachsensor acts as the bottom plate of a capacitor, with the surface of thefinger acting as the top plate. The Veridicom chip is as small as apostage stamp—can be easily embedded into laptop computers andkeyboards. Accompanying circuitry measures the capacitance of each ofthese sensors. Fingertip “valleys” are further from the chip, and showas a lower capacitance. Fingertip “ridges” yield a higher capacitance.The chip's dielectric technology enables people to touch the sensitive,silicon chip without destroying it. The dielectric is chemically andmechanically strong enough to allow repeated contact with people'sfingers, yet electronically sensitive enough to capture the prints.Other suppliers of CMOS fingerprint sensors are Siemens, and Harris.

Identicator Technology Inc. uses Identicator's DFR-200 reader technologyand its software algorithm technologies. A matchbox-sized fingerprintreader enables full feature extraction and match in less than onesecond. Instead of entering an ID and password to get into a corporatenetwork, users simply put their finger atop the glass lens of a tinyreader affixed to the personal computer. The device photocopies theprint and compares it to a database of thousands of other prints in wellunder a second. The Identicator print sensor enables secure userauthentication on PC's.

TouchSafe Personal from Identrix is a state-of-the-art fingerprintverification reader. The design works with portables, desktops orservers, and assists with finger placement. TouchSafe Personal uses aninternal 32-bit RISC processor, compact optics and encrypted serialcommunications. The optional smart card reader can store the fingerprinttemplate and other confidential data. The Identix TouchPrint 600Live-Scan Workstation is a fingerprint system that producesforensic-quality tenprint records by electronically scanning andcapturing rolled fingerprints.

ST Microelectonics Model #STFP2015-50, a fingerprint sensor, TouchChip,clusters 100,000 sensors onto a 20-by-15-millimeter surface. Thesensors, which individually measure 50-by-50 micrometers, incorporate anactive pixel and two capacitive plates per sensor element. All told, thearray consists of more than 98,000 pixels, enabling it to achieveresolutions of 508 dpi. Two metal plates are placed in the cell area,separated by a passivation oxide. The skin surface acts as a thirdplate, separated by a dielectric layer with variable thickness. Thesensors convert the distance between the finger and the surface of thedevice to an electrical signal, and because fingerprint valleys arefarther from the sensor surface than ridges, they produce a differentoutput. Since the chip is sensitive to 3-D contours, it can't be fooledby photographic images. The chip includes an 8-bit parallel datainterface and an 12C interface. Power consumption is less than 200megavolts at 5 volts. An on-board AID converter eliminates the need formuch of the external circuitry. It's basically a stand-alone sensor, andthe sensor is so small that you can incorporate it onto a keyboard, PC,or cell phone.

The stylus 15 includes one or more sensors 20 that capture biometricproperties of the user. The computer (chip) 40 processes the capturedinformation to determine whether to enable access to anaccount/network/entry, or other entry or privilege once identificationhas been confirmed. In one preferred embodiment, the system includesmeans to enable the user to enter a primary identifier, the identifierbeing a series of letters, digits, a spoken word converted to text(speech recognition), or the like. The primary identifier is preferablythe user's printed name, the user's birthday (and year), zip code,mother's maiden name, or PIN or password.

The biometric stylus 15 of the identity verification system of thepresent invention 10 has print imaging sensors 20 in the grip 30 tosense the index fingerprint and thumb print, in addition to otherbiometric sensors 20 including but not limited to the following:pressure sensors (point and grip); accelerometers; gyroscopes; positionof index finger relative to point; position of thumb relative indexfinger. FIG. 11 discloses a simplified logic diagram where multiplebiometric sensors 20 are used to determine account confirmation.

The biometric stylus 15 of the identity verification system of thepresent invention has print sensors 20 positioned within the unique grip30 (see FIGS. 2A and 2B). Electronic images of the index finger andthumb are extracted during use. Thereafter, the user utilizes a similarstylus 15 to submit a set of prints for comparison with the set ofprints of the authorized user—the prints either match or don't match.The use of two prints makes a mistake highly unlikely. The stylus 15thwarts forgers since even if the signature is the same the prints arenot (the content of the writing is unimportant). The stylus 15 isprovided by financial institutions, POS terminals, and governmentagencies worldwide. The principles of the biometric stylus 15 arecombined with other biometrics housed within the stylus 15 to providenear perfect confirmation. Digital systems evaluate the fingerprint bycomparing the similarity, number, and unit relationship of the points ofdistinction.

There are several basic embodiments of a fingerprint stylus 15;

(1) a stylus 15 is attached or tethered to a system;

(2) a device compatible with the tethered stylus 15 is completelyportable; and

(3) a stylus 15 for a pocket or hand-held computer that is personal tothe individual.

FIG. 12A and 12B disclose a first preferred embodiment of the stylusinsert 50 of the present invention; FIG. 13A and 13B disclose a secondpreferred embodiment of the stylus insert 50 of the present invention;FIG. 14A, 14B and 14C disclose a third preferred embodiment of thestylus insert 50 of the present invention; and FIG. 15A and 15B disclosea fourth preferred embodiment of the stylus insert 50 of the presentinvention.

In another preferred embodiment, the insert 50 fits onto the cap of thestylus 15. The term “insert” as used herein is a device that includes anencrypted reference identifier. The insert 50 contains the encryptedprint and the name of the user owning the card. The insert is alsolinked to one or more accounts. The grips 30 are for use with a narrowstylus 15 about the size of a pencil or a conventional BIC® pen. Thisenables a deeper grip 30. The grip 30 almost completely surrounds theindex finger enabling the use of a sensor the size of a postage stamp.Almost any sensor the size of a postage stamp which is the size of mostfingerprint sensors. Also, single sensor may be used in sites wheresmaller transactions are involved. The stylus insert 50 of the presentinvention is preferably stored in wallet or on key-chain for readyavailability. The insert 50 is compatible with the system described incopending PCT Application PCT/US99/07900.

There are numerous advantages to having a stylus 15 or an encryptedprint for each user: (a) the biometric sensing is far less complex sincethe sensors 20 need only confirm a one-to-one match and generally onlyone sensor is needed (eliminating the need for identifiers). (b) thereis no need for a master databank of biometric prints—each print can beencrypted into the stylus 15 (much like a smart-card). (c) no sensorsare needed at POS terminals, as the sensor in the stylus 15 is used tomatch the encrypted registered biometric print. (d) the privacy issue issignificantly overcome since the only matching is needed is in thepen-based computer.

The registered biometric print can also be encrypted in a smart card 60within a conventional credit, debit, or check card. This embodiment isfully compatible with current encryption technology where one or moreprints are already being preserved in the smart card 60 for use at POSterminals with a sensor unit positioned at each terminal—these sensorunits can be replaced by the stylus 15 of the present invention.However, the encrypted print can also be within a smart driver's licenseor a social security card.

In a first series of preferred embodiments of the identity verificationsystem of the present invention 10, the system need only perform aone-to-one match to confirm user identification. This is accomplished by(1) the user who owns and carries his/her own pen; (2) the user carryingan insert 50 on his/her user that includes an encrypted print, theinsert 50 being compatible with the stylus 15 tethered to one of theterminals; (3) the user carries on his/her user a pen-based computerthat is compatible with the computer network of the system; (4) the usercarries on his/her user a credit/debit-type card that includes anencrypted print in either the magnetic stripe or an IC element of asmart card; and (5) the user carries on his/her user a card that becomesa pen (for example, see FIGS. 20A and 20B), the card-pen including anencrypted print in either the magnetic stripe or an element of a smartcard.

The user need only employ the stylus 15 of the present invention forsigning purposes. Once a print is captured, it is compared with theencrypted print in the smart card 60. If there is a match the event isallowed to proceed. If there is no match, the event is blocked.

The insert 50 is compatible with the stylus 15 or the stylus grip 30 orthe stylus top (retractable point) and enables access with one-to-onematching for a wide variety of computer security applications—forcontrolling access to network services, or anywhere a password, cookie,token, digital certificate or smartcard is used. The insert 50 can beplugged into any standard USB port. Like smartcards and othercryptographic tokens, the insert 50 provides an alternative to asmartcard and smartcard reader.

The insert 50 provides users and remote clients with strongauthentication for ensuring secure access to virtual private networksand secure computer network equipment. Through user identification datacontained in each key, a secure network is able to grant or deny accessaccording to the authorization level of each user. The insert 50 issmall enough to carry on a key ring or the like for use as an accesstoken for virtual private networks. Users need not memorize multiplepasswords or jump through numerous security screens. USB is a newconnect technology featured as standard equipment on desktop systems,servers, and portable computer devices currently being marketed.

Each insert 50 contains one or more encrypted references, which areunique to each user. Using this secret value, the insert 50 can computea cryptographic response to challenges sent from the network. Thismethod has significant security benefits over passwords. Specifically,the insert 50 computes a “one-way hash function” using the challenge andits encrypted reference as input. The insert 50 is secure and proves tothe server that it knows the secret value, without ever revealing it.Even if malicious software is running in the client's workstation at thetime of authentication, it cannot duplicate the insert's functionalityat a later time. This proven cryptographic technique is now specified aspart of the Internet Key Exchange standard protocol.

Either the prints of the thumb and index finger and the thumb can becaptured and encrypted, or reliance can be placed on only the print ofeither. The index finger is preferred if a single print is used a largerprint segment will generally result because of the grip 30 generallyapplied to a stylus 15.

FIG. 3C discloses yet another embodiment of the stylus 15 of the presentinvention, the fingerprint sensor being placed in the top distal end ofthe stylus and tethered to the counter top. In order to release thestylus point from the stylus body, it becomes necessary to press theclick button, where the stylus point is retractable and compatible witha digital surface. Since this clicking force is generally applied by thethumb, the captured print is compared with a reference thumb print. Thestylus point withdraws automatically after a predetermined period oftime after each use.

The identity verification system of the present invention 10 isparticularly useful in controlled environments. As used herein, unlessthe context suggests otherwise, a controlled environment is a communityof people that: (1) requires registration to become a part of thecommunity; and (2) where the purchase of goods or services occurs. Someexamples of controlled environments include: hotels-resorts, luxurycruise liners, airports, banks, racetracks, bowling alleys, theme parks,hospitals, college campuses and public/private schools, military bases,hotel-casinos, sports complexes, shopping malls, and prisons. Onceenrolled into the cardless transaction system of the present invention,any guest upon registration with the hotel complex has full and completeaccess to any amenity within the complex, at anytime, without carryingon his/her user anything other than biometric identification that isinherent in his/her being. As used herein a “controlled environment”does not require a single physical structure, but rather includes anetwork of related activities administered by a centralized driver. Someexamples of these type controlled environments include a bank and itscustomers, a regional of drugstores, health club facilities,restaurants, or beauty salons and their customers..

Encryption registration systems are known in the art. U.S. Pat. No.5,903,225 (Schmitt et al.) describes one method of encrypting afingerprint into a card, and U.S. Pat. No. 5,623,552 (Lane) describes aself-authentication system enabling identity verification. The stylus 15can be used for one-to-one matching without a master databank ofbiometrics or for one-to-many matching

-   -   1) a wireless stylus 15 is used at the terminal;    -   2) match is confirmed internally between the user's print and        the encrypted print;    -   3) the stylus 15 is confirmed not to be a counterfeit;    -   4) the encrypted reference print is checked to ensure that there        has been no tampering; and    -   5) event access is enabled.

FIGS. 6A and 6B disclose a simplified logic diagram for registrationwith the identity verification system of the present invention 10. Theuser initially registers with a financial institution or POS terminal bysigning his/her name with a special identical stylus 15 and exchanginglegal tender to open the account. The account can be a debit account, asavings account, a checking account, or even a credit account. Laterwhen the user wants to access the account to pay for goods or services,he signs his/her name with an identical stylus 15. Whenever the userwants to access the credit account at a POS transaction, an identicalstylus grip 30 is preferably used, the user signs his/her name, and thecomputer searches through the appropriate files for purposes ofcomparison (see FIGS. 7A and 7B). When the biometric property is afingerprint sensor, the size of the stylus 15 mandates that a smallersensor be used, resulting in the capture of only a partial print.Accordingly, it becomes necessary that the stylus 15 includes guidemeans to ensure that the finger is positioned at the same site on thegrip 30 to ensure that the same portion of the print is captured in eachsubsequent use. However, if a cell capture sensing method id used suchas DNA, finger position on the stylus 15 is not critical so long as cellcapture occurs and compared against a reference cell for matching.

In still another preferred embodiment of the identity verificationsystem of the present invention 10 additional biometric sensors 20 areperiodically added to the stylus 15 to provide the financial institutionwith all information that is necessary. So long as the additionalsensors 20 do not affect the weight or balance of the stylus 15 so thatfingerprint and signature biometrics are altered, no harm is done.

When registration occurs at someplace other than a financialinstitution, such as a POS terminal, the user pays legal tender to themerchant (a pre-paid or stored value type of account) who in exchangeopens an account for the user. The financial institution is affiliatedwith the merchant, thereby enabling the user to open an account withoutever having any bank affiliation. Such an account can be one where theuser opts not to use fingerprints and selects a pseudonym for purposesof privacy as hereinafter described.

In one preferred embodiment of the identity verification system of thepresent invention 10, the sensors 20 capture the fingerprints of theindex finger and thumb. The stylus 15 preferable has a special sensinggrip 30 to fit the hand and enable a good reading of the thumb and indexfinger. The grip 30 is transparent. The stylus 15 is preferably portableand includes a sensor an optical or print imaging sensor. Once read, theimages of the prints are captured for further processing. In onepreferred embodiment, the biometric stylus 15 includes temperaturesensors for purposes of activation. The sensors are well known in theart and are similar to the heat sensors found in elevators, the heatfrom the hand engaging the system.

In another embodiment, the point of the stylus is a conventionalfountain stylus 15 that ensures that the orientation of the stylus 15 isaligned with the print sensors 20 disposed within the stylus 15.Preferably, a print sensor is disposed on the top surface of the stylus15 and two additional sensors are disposed on the adjacent side surfacesof the stylus 15. This ensures repeatability of print images sensed.

For a right-handed user, the index finger is aligned with the point andthe thumb is positioned on the stylus surface abutting the left-side ofthe stylus top surface. For a left handed user, the index finger isaligned with the point and the thumb is positioned on the stylus surfaceabutting the right-side of the stylus top surface. By capturing andcomparing the index finger and thumb print of the applicant with thereference finger and thumb print, the likelihood of an error becomeshighly unlikely. In the event that a biometric stylus 15 or grip 30 isnot available, manual backup enables conventional identity confirmation.Accordingly, sensors 20 are positioned within the stylus 15 to read eachof these prints.

The stylus 15 has a special sensing grip 30 to fit the hand and enable agood reading of the prints of the index finger and the thumb. Thecross-section of the stylus 15 is generally rectangular with roundedcorners, and the print surfaces for the thumb and index finger areslightly recessed and concave. FIGS. 5A, 5B, 5C, 5D, and 5E disclosevarious preferred embodiments of grip 30 configurations that arecompatible with conventional styluses and pencils, the grip 30 includinga cord connection to the writing surface, and sensors 20 beingincorporated into the grip 30. FIG. 5E shows a teardrop configurationwith the seam pointing upward. The applicant points the seam upward andplaces his/her index finger on one side of the seam and his/her thumb onthe other side of the seam. This embodiment assures that only twosensors 20 are needed whether the applicant is right or left handed.Also, the combination concave-convex shape enables a larger portion ofthe two prints to be sensed by the print imaging sensors 20. FIGS. 3Aand 3B disclose a U-shaped grip 30 and the images captured therefromwith the sensors 20.

In one variation, the biometric stylus 15 is tethered (attached) to asurface or counter by means of a plastic coated hollow tube, containingfiber optic cable therewithin. It is through the fiber optic cable thatthe print images are transmitted to the processor disposed within thesurface or counter. The sensors 20 are disposed within the stylus 15. Inanother variation, the biometric stylus 15 is portable. While thesensors 20 are also disposed within the stylus 15, the signals of theprints are transmitted to the processor for conversion and storage. Theprints of the thumb and index finger are preserved in the systemsprocessor for as references for subsequent comparisons. The goods andservice providers have a similar stylus 15 which is used by the guest toconfirm identification and access the credit account.

In another embodiment a grip 30 is provided that is compatible withconventional styluses and pencils, the print imaging sensors 20 beingpositioned within the grip 30. The grip 30 is symmetrical and preferablyhas a cubical shape with concave sidewalls. A power cord is affixed tothe grip 30 to provide power to the sensors 20 and also to preventtheft. If the stylus 15 wears out or breaks down, it can be readilyreplaced with another conventional stylus 15, at a modest cost. Also, byhaving standard grip sizes, any problem with using biometric styluses ofdiffering sizes which might change some of the properties of thebiometrics are eliminated. The grip 30 configurations are designed toprovide as good a reading as possible of as much of the index finger andthumb print as possible. Certain preferred embodiments include concavecubes (see FIG. 4C), an enlarged cylindrical chamber section (seeattached drawing). The grip 30 is preferably transparent and is designedto be self-aligning, that is, the user must grasp the grip 30 where thesensors 20 are located to use the stylus 15. FIG. 4B is self-aligningusing a lip that eliminates the need for a third sensor to accommodateboth left and right-handed people. FIG. 4D discloses a fountain pen typestylus which is self-aligning because of the orientation of the stylustip.

Also, the power unit of the stylus 15 can be incorporated into the bodyof the stylus 15, making the stylus 15 portable and self-contained. Inthe other primary embodiment, the stylus 15 is affixed to the tabletcounter to prevent theft. The stylus 15 includes a print imaging sensorconfiguration, as the signals of the prints are transmitted forprocessing. The fiber optic cable transmits print images to a processor.The processor is positioned within the surface/counter. The stylus 15includes a sensor configuration for capturing one or metrics and/orbiometrics.

For transactions involving a larger pools of potential users, processingstrategies are needed so that the system need not continually processmillions of files to confirm or deny access. One main purpose of acredit-type card is to provide a primary identifier for file searchingpurposes. When the identity verification system of the present invention10 has widespread global acceptance, it will become necessary todistinguish the user from hundreds of millions of other people. It isnot practical to have the driver search such numbers of records for eachtransaction.

The primary identifier in a conventional credit card transaction is anyone of the following: the imprinted name; the imprinted PAN; or theinformation stored in the magnetic stripe (smart card).

To replace a card, the replacement system also preferably includes atleast one primary identifier. Examples of primary identifiers comprisebirthday (6 digit code), zip code, PIN, or printed name. There is apreference for numerical data because of language and translationproblems, since Arabic numbering is essentially the global standard.

Certain basic strategies are needed. Since the fingerprints enabledetermination of whether the user is right or left handed, records ofpeople that don't match the hand of the user are discarded immediatelyduring processing. In one preferred embodiment, the signature is thefirst biometric processed (when fingerprints are not used). The print ofthe index finger and thumb are the next biometrics used. If either orboth cannot be read, the user is so advised and the transaction isrejected. If the prints are of good quality, each is checked as againstthe remaining records in the pool of registered records. The prints ofeach transaction are preserved and used to develop an improved compositeof the user's prints for subsequent transactions.

In one preferred embodiment, a numerical is used (see FIG. 10) tostreamline the confirmation process. The user enters a zip code orperhaps a PIN which is checked prior to the signature. The zip code ispreferred in instances where the clientele is national or international,whereas a PIN is preferred for instances where the transaction isregional.

There are two basic type of card transaction that the principles of theidentification system of the present invention 10 are of particularapplicability to:

-   -   Credit transactions where the user needs to identify        himself/herself so that the institution can determine credit        status for purposes of advancing credit. It is critical that        exact identity be made at time of registration so that credit        histories can be properly accessed and analyzed; and    -   Prepaid or stored value type of transactions where the user has        deposited an amount of money for subsequent use.

In one preferred embodiment of the present invention, the exact identityof the user can be withheld in prepaid or stored-value transactions. Inone preferred embodiment of the present invention, the stylus 15includes an on-off switch. In the off position, the fingerprint sensors20 are not used, so that the confirmation is done without sensing thefingerprints. In this embodiment, the signature becomes the primarybiometric. If the user signs a pseudonym rather than his/her regularname, withholding his/her actual name, the system processes thetransactions without knowing the user's actual name or his/her prints.As long as the pseudonym is used to access the account, anonymity isassured while using the identification system of the present invention.

The same result can be achieved by having two separate styluses, (1) astylus 15 which includes print sensors 20 for transactions where privacyis not the primary concern; and (2) a stylus 15 without print sensors 20for stored value or prepaid accounts. In yet another preferredembodiment, the print sensors 20 are incorporated in the grip 30, andthe grip 30 is removed when the fingerprints are not to be used. Theonly thing that is necessary is that the individual be able to accesshis/her account, so that the system provides near perfect repeatability.Of course the user will need to remember the alias used to access theaccount. This is particularly attractive feature to those people withconcerns about individual privacy, since they may participate in blindtransactions while using the stylus 15. The users can obtain print-outsof monthly statements by going to a special terminal and verifyinghis/her identification with a biometric stylus 15 and thereafterrequesting such information.

The identity verification system of the present invention 10 comprisesbiometric registration upon entry into the complex, biometric access toa guest room, biometric play of slot machines, biometric play at gamingtables, and biometric purchases on-site within the complex such asrestaurants, lounges, boutique shops, and the like.

A guest to register upon registration with the hotel complex confirmshis/her identity upon arrival and check-in, selects an amount to beentered into an account, enters biometric identifiers that are to beused on-site during his/her stay. Thereafter whenever the guest seeksaccess to his/her room or access to the account, identification isconfirmed by matching the biometric identifiers and the guest canparticipate in amenities offered within the complex. The biometricidentifiers are preferably prints of the index finger and thumb. Thestylus 15 is preferable a stylus which has a special sensing grip 30 tofit the hand and enable a good reading of the thumb and index finger.The stylus 15 is preferably portable and includes a sensor an optical orimaging print sensor. Once read, the signals of the prints aretransmitted for processing. The guest can add value to his/her accountat terminals throughout the casino.

The system enables a guest to make any on-site purchase, at arestaurant, lounge, boutique shop, or the like and access the balancefor use in the complex. The guest grasps a biometric stylus 15 similarto the implement used at registration to enter the print of the indexfinger and thumb. A fingerprint sensor reads the thumb and index-fingerprint from the implement and seeks a match with all registered prints inthe system. Once identification has been confirmed, and the availablecredit balance in the guest's account is sufficient to cover thepurchase, the purchase is made and the account balance is decreased bythe amount of the purchase.

Transactions where the pool of potential users is under 50,000 peopleinclude controlled environments like resorts, hotels, colleges,dormitories, theme parks, prisons, cruise liners, and the like. For thisvolume of registrants, the primary identifier is not needed, but ifused, does improve transaction time and system efficiency somewhat.

The identity verification system of the present invention 10 enables acredit card holder to convert the account to use with the biometricstylus 15 (see FIGS. 8 which discloses a simplified logic diagram). Theconversion process enables the cardholder to conduct either card-basedtransaction, pen-based transactions, or their combination. Upon signingwith the stylus 15, the system driver accesses the user record for thecardholder and creates a duplicate record in the identity verificationsystem of the present invention 10. Thereafter, the cardholder transferslegal tender from his/her card credit balance to the new account. FIGS.9 discloses a payment selector enabling a user to select which accountthe transaction is to be paid from in another variation of the identityverification system of the present invention 10.

A credit cardholder can also set up a new account at a POS terminal byuse of his/her card. The cardholder swipes his/her card through acardreader and signs and prints his/her name using the biometric stylus15. The biometrics are captured and the cardholder advises the creditcard financial institution of the amount to be transferred to the newaccount. Account information is exchanged and the card is no longerneeded.

A variety of digitizing inscription pads are known in the art. U.S. Pat.No. 5,652,412 (Lazzouni) discloses an apparatus for reading and storingcoordinate information representative of the instantaneous position of astylus on a writing surface. The system provides a writing paper havinga prerecorded pattern of pixels, each pixel containing encoded locationinformation which identifies an absolute and unique coordinate locationon the paper. The system enables the simultaneously recording of writteninformation on encoded paper and for recording the written informationin a memory. Also, U.S. Pat. No. 5,263,742 (Koch) discloses afingerprinting system where the print is developed by making a copy on asensitized surface by back reflecting radiant energy through an adhesivewhere the print is imaged. Similarly, U.S. Pat. No. 5,709,746 (Ballard)discloses a self-contained fingerprint kit.

While the biometric stylus, signature, and other biometrics that can becaptured by the combination stylus 15 and digitizing inscription pad aresufficient to distinguish the user from hundreds of millions of others,an efficient search strategy is needed.

While there has been considerable development of technology of improvedsensing systems for signatures, the signature will never be thebiometric of choice in the identity verification system of the presentinvention 10 since handwriting and signatures change with time and witheach writing such that a match with perfect confidence is not possible.However, the signature is needed for legal purposes, so that it willalways be needed to include some sort of signature verification into anyidentification system.

The biometrics needed are all provided by the stylus 15. The primarybiometric is the print of the index finger, and the thumb print beingthe other primary biometric. Some examples of metrics include styluspoint pressure, stylus grip pressure, accelerometers, gyroscopes,position of index finger, position of thumb relative to index finger.Also, a timer is extremely useful in measuring biometrics associatedwith signature. The timer is useful in determining acceleration anddeceleration, the time needed to sign the name, the time spacing thatthe stylus 15 is lifted from the digital surface, and first name time,middle initial time, and last name time.

Alphanumeric data for the primary identifier can be provided by (1) adigitizing inscription pad, (2) a mouse and CRT, (3) a touch sensitiveCRT, (4) voice and speech recognition, (5) a keypad embedded in thewriting surface, and (6) the stylus. In applications involving largerpopulations, one preferred embodiment includes multiple identifiers tospeed up the system processing time.

Financial institutions benefit in that credit card fraud is eliminated.The Identity verification system of the present invention 10 isvirtually impregnable to criminals. The financial institution controlsthe entire transaction, since they capture and process as manybiometrics as necessary before deciding whether or not to approve.Merchants and users also benefit since consumer fraud costs are oftenpassed onto them. Fingerprints are recognized all over the world aspositive proof of identity and are the key to the system. Each fingercontains up to 100 different points of distinction which never changewith time. Merchants benefit in that the transaction time is minimized.The identity verification system of the present invention 10 systemminimizes the time between when the user signs his/her name and when thetransaction is approved. The system automatically captures thefingerprint data when the user signs his/her name and processing beginsimmediately. Any transaction that does not involve cash requires a usersignature anyway—his/her obligation to pay. Users also benefit fromimproved transaction efficiency by not having to wait in slow-movinglines. Users benefit in that all cards are eliminated. Cards are easilylost or stolen, signatures are easily forged and PIN's are readilydetermined by criminals. While cards are easier to carry than money,they are almost as negotiable as money to sophisticated criminals. Theidentity verification system of the present invention 10 system providesmaximum security and safety for the user by eliminating the need tocarry all credit cards, debit cards, ATM cards, stored value cards, andpre-paid cards in a wallet or purse.

As shown in FIG. 2A, the identity verification system of the presentinvention 10 uses a biometric stylus 15 that has print imaging sensors20 positioned within the unique grip 30. Electronic images of the indexfinger and thumb are extracted during user registration. Thereafter, anapplicant uses a similar stylus 15 to submit a set of prints forcomparison with the set of prints of the authorized user—the printseither match or don't match. The use of two prints makes a mistakehighly unlikely. The stylus 15 will thwart forgers since the content ofthe writing is unimportant. The stylus 15 is provided by financialinstitutions, POS terminals, and government agencies worldwide.

In one preferred embodiment, the principles of the biometric stylus 15can be combined with signature verification technology to identify theapplicant and the writing content. Also, since prints of the indexfinger and thumb of the writing hand are the most common biometrics,once captured the prints can be used for comparing other types of touchcontact (e.g.—a keypad). In another preferred embodiment, a digitizinginscription pad is used, and the position of the stylus 15 relative tothe surface enables determination of the written text. An optical sensorin the writing surface captures the signature or the writing to be usedin combination with the prints. Alternatively, the system includes akeypad in the writing surface for the user to enter a PIN instead of theoptical sensor or in addition to the optical sensor.

Registration in the identity verification system of the presentinvention 10 is similar to opening a new bank account. An applicationprovides the financial institution with basic information—name, address,phone number, and signature. The only difference is that a specialstylus 15 is used that enables the financial institution to capturecertain data while the applicant signs his/her name. These biometricsinclude prints of the index finger and thumb, and point and grippressure.

The account can be accessed at any POS terminal. The user signs andprints his/her name using a biometric stylus 15 that's identical to thestylus 15 used during registration. The biometrics are again capturedand compared to the biometrics of all registrants in search of a match.The financial institution then confirms that there are sufficient fundsin the account, deducts the amount from the account, and approves thetransaction.

A credit cardholder can also set up a new account at a POS terminal byuse of his/her card. The cardholder swipes his/her card through acardreader and signs and prints his/her name using the biometric stylus15. The biometrics are captured and the cardholder advises the creditcard financial institution of the amount to be transferred to the newaccount. Account information is exchanged and the card is no longerneeded.

Automated systems evaluate the fingerprint features by showing thecoincidence of the minutiae features, taking into consideration thesimilarity, number, and unit relationship of the characteristics to eachother. Searching and matching of fingerprints is accomplished byassigning each minutiae point a position on an x/y coordinate, adirection of flow, and relationship to other minutiae. If a user has touse a stylus 15 anyway to verify a commercial transaction, why not usesensors 20 in the stylus 15 and writing surface to confirmidentification (forget about the plastic cards).

In still another preferred embodiment of the identity verificationsystem of the present invention 10, other sensors are added to thestylus 15, as necessary, to tighten security and reduce fraud—includinga pressure sensor to measure point pressure; another pressure sensor tomeasure grip pressure; an accelerometer to the stylus point to measurestroke speed; a gyroscope positioned at the top end of the stylus 15 tomeasure the angle of the stylus 15; a heat sensor in the stylus grip 30to measure position of the index finger relative to the point; and aposition sensor in the stylus grip 30 to measure the position of thethumb relative to the index finger. Additional sensors include measuringthe speed of the signature, the user's finger temperature, and so on.While all of these biometric identifiers are subject to minorvariations, the financial institution checks as many as needed until itis satisfied that the user seeking entry is authorized to access theaccount.

In a perfect system, the user who is entitled to entry will always beenabled entry, and all others will always be blocked. Hence, in additionto primary identifiers and biometrics (primary and secondary) otherdemographic information is analyzed when the decision of identity is indoubt to assure that the system of the present invention 10 operates ina near-perfect manner. Such demographic information includes thelocation of the transaction request relative to the primary residence ofthe registrant, the frequency (if ever) that the registrant has everengaged is such transactions, and whether or not the registrant has madeother transaction during the past 24-hour period and where suchtransactions are located.

In yet another embodiment a grip 30 is provided that is compatible withconventional styluses and pencils, the print imaging sensors 20 beingpositioned within the grip 30. The grip 30 is symmetrical and preferablyhas a cubical shape with concave sidewalls. A power cord is affixed tothe grip 30 to provide power to the sensors 20 and also to preventtheft. If the stylus 15 wears out or breaks down, it can be readilyreplaced with another conventional stylus, at a modest cost. Also, byhaving standard grip sizes, any problem with using biometric styluses ofdiffering sizes which might change some of the properties of thebiometrics are eliminated.

Some primary applications for the identity verification system of thepresent invention 10 include identification for (1) Drivers' licenseregistration and verification; (2) Voter registration and confirmation;(3) Law enforcement; (4) Credit card verification; (5) All bankingtransactions; and (6) College and high school students for applying forfinancial aid and to confirm test-taker identification.

In still another embodiment of the identity verification system of thepresent invention 10, the biometric stylus 15 is combined with one ormore primary identifiers to authenticate identification to replacecredit, debit cards and the like. The primary identifiers include phonenumber, name, area code or zip code. The system performs the initialsearch based upon the primary identifier(s) to reduce the size of theuniverse. Then identity is either confirmed or denied based upon theprints. In another preferred embodiment, additional biometric sensorsare used in addition to the fingerprints.

One example of the use of the identity verification system of thepresent invention 10 is in a hotel casino complex. The system of thepresent invention comprises biometric registration upon entry into thehotel-casino, biometric access to a guest room, biometric purchaseson-site within the complex such as restaurants, lounges, boutique shops,and the like, and biometric play of slot machines, biometric play atgaming tables.

The biometric identifiers are preferably prints of the index finger andthumb and are sensed by means of a stylus 15. The stylus 15 ispreferable a stylus 15 which has a special sensing grip 30 to fit thehand and enable a good reading of the thumb and index finger. The stylus15 is preferably portable and includes an optical or print imagingsensor. Once read, the signals of the prints are transmitted forprocessing. The guest can add value to his/her account at terminalsthroughout the casino complex.

When one uses a stylus 15, it is generally grasped by the index fingerand thumb for purposes of writing on a flat surface. The stylus 15includes two adjacent flat surfaces which are specifically configured tooptimize the completeness of the prints taken. If the guest isright-handed, the surface used to read the index finger is to the rightof the second surface. If the guest is left handed, the surface for theindex finger is to the left of the second surface. In both instances thesecond surface is used to read the guest's thumbprint. Accordingly,sensors 20 are embedded within the stylus 15 to read each of theseprints.

A distinction is made between applications involving the matching ofprints of the guest requesting access as against a limited number ofauthorized entrants (guest room access) and those applications where theprints of the guest requesting access are compared against a largenumber of guests in the system (slot and table play in a casino). Whileboth instances require a comparison with known authorized entrants, theformer comprises a much smaller pool and processing is greatlysimplified. In the latter, the central processor needs to process aconsiderably more data, and search strategies are used to streamline thesearch.

For example, in applications involving slot machine access, the searchcompares the prints of the player seeking entry with all registeredguests. Initially, the prints of the guest seeking entry are comparedwith the player who last played this slot machine. Absent a match, theprints are compared with other players playing adjacent machines. Absenta match, the prints are compared with all players in the general areawithin the last few minutes. Eventually, the pool is expanded until allregistered guests have been screened for a match. To improve efficiency,the prints can be sorted by types and styles that are well known in theart. The pool is gradually expanded in logical incremental steps. Witheach gradual expansion, previously checked prints can be dropped so thatthey are not rechecked. This area is continually expanded until a matchis found or the search has been completed.

The identity verification system of the present invention 10 is readilyadaptable to off-site purchases and other applications involving thetelephone or the keyboard of a computer (not shown). It often becomesnecessary to confirm positively the identity of the user on the otherend of the telephone. For off-site purchases by phone, it is importantto confirm the identify of the user making the purchase. Also, manyphones now have caller ID where the user receiving the incoming call canread the caller's phone number before answering the call. If the calleruses the engagement member of the present invention, the user receivingthe call can also identify the caller.

For the handle or handset of a telephone, the primary prints are thethumb, the index finger, and the middle finger. In another embodiment,the optical sensors can also be positioned relative to any of thedigital keys on the phone and confirm identification. This approach isuseful in applications involving a smaller pool of possible users sinceonly one print is read.

The identity verification system of the present invention 10 when usedin applications involving keypads and computer keyboards includes amodified keyboard with the sensors positioned either relative to anexisting key or a special biometric push button having a recess toenable a three-dimensional print (see FIG. 10). When one or more keysare pressed, the prints of the user are read to confirm that entry isauthorized.

The optical sensors can also be positioned relative to any of thedigital keys on the keyboard and confirm identification. A smaller poolof users is needed since only one print is read. However, keyboardsensors can be useful in instances where the caller's phone number isread and there are only a limited number of people authorized from thatnumber as with a modem. Also, keyboard sensors can be used incombination with PIN's to provide increased security.

Preferably, multiple biometric prints are used to confirmidentification. Secondary biometrics include not only fingerprints,thumbprints, and palm prints, but also speech and voice recognition, andfacial readings (retinal scans, infrared facial readings, featurespacings, and the like). For example, to enter a guest room, a parallelsystem may include a recorded message asking “Who's there?” The responseis recorded through a speaker and voice recognition is used to identifythe speaker. Speech recognition can also be used to monitor the contentof the response. Also, facial imaging scanners are disposed within thedoors to guest rooms and in overhead cameras with mirrors in the casinosfor use as secondary biometrics. All unauthorized biometric prints canbe preserved for law enforcement purposes to assist in identifying andconvicting burglars and thieves.

The system is also applicable to resort hotel complexes that do notinclude slot machines, tables gaming, and other type of gamblingactivity. Similarly, the principles of the present invention are alsoapplicable to standalone casinos that do not have guest rooms.Registration can occur for a standalone casino either off-site withpre-authorized third parties or with the casino.

A debit variation of the system of the present invention providesimproved user convenience for debit, pre-paid, and stored-value typetransactions. No credit is extended to the user, who pays for his/heraccount in advance. This variation opens the financial system toeveryone, regardless of credit rating, class, or legal standing. Theuser does not need bank affiliation, since the account is assigned to asystem financial institution if none is designated.

The debit variation is initiated at any POS terminal, ATM, or financialinstitution by transferring cash, checks, money order, or credit cardsinto the account. Since credit is not being extended to the user, lessinformation is needed. Registration occurs directly with a financialinstitution, or with the stylus 15 of the present invention during adebit transaction at a POS terminal (similar to the system of thepresent invention). The debit variation also provides anonymity incertain types of transactions. When the size of the participating groupis limited, such as in a controlled environment (hotel, amusement park,etc.), a stylus 15 can be used without the fingerprint sensors 20. Ifthe user selects a pseudonym, authentication is confirmed by thesignature and the other biometric sensors 20 in the stylus 15. Absoluteidentity is protected without the prints and without disclosing a trueidentity.

Many retail outlets no longer accept checks because of fear offorgeries. A check confirmation- variation of the system of the presentinvention 10 provides the perfect way to authenticate identification ata POS terminal. The user registers with the stylus 15 of the presentinvention when opening his/her checking account. When writing a check,the financial institution is identified and approves the transaction.The system also ensures against overdrafts. Signature verification forchecks is an added benefit for POS terminals that provide the system ofthe present invention 10. This check authentication program can alsoreplace conventional checks. The identity verification system of thepresent invention 10 provides user authentication, access control, andpersonal accountability to provide—as an example—use by thepharmaceutical industry.

Calm technology is the name that has been assigned to the third wave incomputing, which is just now beginning. Mainframes, where each computeris shared by many users is the first wave. We are currently in thesecond wave of the personal computing era, where user and machine stareuneasily at each other across the desktop. In calm technology, thetechnology recedes into the background of our lives. These computingdevices are unobtrusive and provide seamless access to a wide variety ofdata and allow the user to perform tasks as needed, where needed. Calmtechnology moves interaction with computers out of a user's centralfocus and into the user's peripheral attention where they can be usedsubconsciously.

People are becoming more and more mobile and are requiring access to theInternet, various other systems, data, and software. Systems havealready evolved that require users to be “connected” wherever they goall the time. Individuals want to take the same tools and data they haveat their desks wherever they may go. In addition, they want to access avariety of information from wherever they or the data is located. Accessto such data must be secure.

Reliability and security are also important and necessary for mobilecomputing to be useful. Accordingly, the mobile user must have reliableaccess from anywhere at any time. While connected to systems andretrieving or transmitting data, security is at times extremelyimportant. Secure connections may not be necessary when browsing thenews on MSNBC, for example, but are highly desirable when connected tocorporate databases or when electronic commerce is undertaken.

The mobility of the user requires options other than a mouse and keypadfor data entry and network access. The size of the screen makes itimpractical to use touch-screen technology. A stylus is currently beingemployed in many of these applications. The stylus is particularlyuseful for accessing screens and menus. FIG. 17A, 17B, and 17C showvarious types of mobile computing devices using pen-based technology,including (a) a lap-top computer, (b) a palm-type computer; and (c) ahand-held computer, respectively. The identity verification system ofthe present invention 10 enables the network to confirm user identityprior to access to each menu or screen. This is a major improvement overa fingerprint sensor in the keypad to confirm identity during log-on.

When one is “mobile” and using a computer to perform various tasks andaccess data, connecting to remote sites is simple and as transparent aspossible. Using notebooks and PDAs (with Windows CE), the user remainsconnected to any number of systems while in remote locations.

Current mobile hosts such as notebooks, PDAs and cellular phones provideconnectivity but lack interconnectivity. With these devices a userconnects to another system on a point to point basis. Using calmtechnology become aware of each other and know how to exchangeinformation among themselves. In addition, they become able to controleach other as needed.

Security is no longer an optional network component. Today organizationsof all sizes are discovering the need to protect their networks fromboth external and internal unauthorized users. In the days before remoteaccess, organizations had controlled, hard-wired networks, whichprovided physical security. Network access was limited to usersphysically located in the building. Requiring users to type in a nameand password added another layer of security to the network. Providingremote network access has added an entirely new dimension to theproblem.

The integrity of any system is compromised when any of the followingoccur: (1) confidential information is available to unauthorizedparties; (2) the user's identity is not continually authenticated; (3)information content is corrupted when the information is not received asoriginated; (4) the user can deny the communication; (5) access controlto resources is not controlled by authorized parties; and (6) dataresources are not available to authorized users when needed.

The identity verification of the present invention 10 provides networkaccess security by; (1) controlling unauthorized access to the network;(2) controlling improper access by network users; and (3) monitoring ofuser access to network resources. The pen-based computing networkinitially identifies the user, and continually controls and monitorsuser activity while the user is plugged in.

Two additional applications of the identity verification system of thepresent invention 10 involve (a) smart-pens; and (b) electroniccommerce. The principles of the present invention are completelycompatible with smart-pen technology. The miniature technology, whichintegrated sensors, mouse, digital signal processor, radio transceiverand encryption software in an actual stylus 15. Smart-pen technologycaptures the written text generated by the stylus 15 for subsequent use.The device looks and works like a big stylus 15 but is actually aminiature computer system. Hence, the stylus 15 of the present inventionconfirms user identity during normal usage of the stylus 15 and thesmart-pen technology captures the content of the written text onto anysurface. The smart-pen technology is particularly useful for studentstaking notes in class, writers, and management staff—the paper need notbe preserved.

The smart-pen is a wireless stylus 15 that writes on regular paper butis connected to the computer. The smart-pen measures speed, andacceleration forces in three dimensions, and calculating the data. Thesmart-pen feels and looks just like a real pen. Assuming the writingsurface to be a fixed plane, as the smart-pen writes, the stylus tipwill travel through three-dimensional space near the paper. The tip ofthe stylus 15, as calculated, is a three-dimensional curve lying aroundthe writing surface. The curve is projected on that plane representingthe stylus tip's path along the paper, this path is the written text,incorporating unique characteristics of the writer. Therefore signatureverification with the smart-pen does not depend on the graphic image ofthe signature but on the dynamics of the act of signing. The dynamicsare strictly personal and thus allow the authentication of the signer.

The identity verification system of the present invention 10 alsoprovides a safe and attractive alternative to electronic commerce,particularly over the Internet. By authenticating the author of atransaction, the act becomes undeniable. The advanced micro mechanicsand micro electronics built into the stylus 15 enable the usage of aregular pen as biometric input device. The stylus 15 can be used to makeInternet transactions or bank transfers secure, because it unequivocallyauthenticates a user. In order to increase its user friendliness, simplepen functions are incorporated within this miniature computer.

The ease and the low cost of transactions over any network, make thestylus 15 of the present invention an ideal payment device and anexcellent device for buyers: sales channels, Internet channels andvirtual shopping.

By authenticating the author of a transaction, the act becomesundeniable. The advanced micro-technology of the smart-pen, enables theusage of a conventional stylus 15 as a biometric input device. Thestylus 15 provides identity verification for numerous electroniccommercial transactions including:

-   -   a) Privacy protection for medical records and tele-medicine;    -   b) Trace-ability of drugs;    -   c) Remote writing (White-boarding) on PC or TV    -   d) Image conversion of handwriting

Another biometric that is recommended in the identity verificationsystem of the present invention 10 involves cell capture while the penis being used. The advantage of this biometric over fingerprints is thataccuracy is not dependent upon the size of the sensor or print that iscaptured.

GeneTrace Systems is currently marketing technology involving a newhigh-resolution mass spectrometry-based method for chemical analysis oflarge single-stranded DNA oligomers. The mass spectra are obtained inseconds instead of the usual hours needed for gel electrophoresiscurrently used, and no radioactive or fluorescent materials are needed.The technique has high mass capabilities and opens new avenues of studyas in chemical modifications of DNA, DNA-peptide/protein interactionssuch as antisense drug development. DNA sequencing and quality controlfor synthetic DNA and related products are also potential applications.The basic technology can be applied also to peptides and proteins andused for protein structure determination, phosphorylation,glycosylation, and other studies. Previously it had not been possible toapply mass spectrometry successfully to anything larger than about a4-mer and thereby obtain the advantages the mass spectrometry techniquecan offer in precise and accurate molecular weight determination. Thenew physico-chemical sample preparation opens this capability tosingle-stranded DNA molecules above 50,000 Dalton, with a mass accuracyof 0.01% in the 10,000 Dalton range. This is much higher accuracy andresolution than is obtainable with state-of-the-art electrophoresistechniques.

Another approach is to use surface-confined arrays of highly selectivesensing elements. Chemical and biological sensors are required toperform multi-analyte measurements rapidly, accurately, and atincreasingly lower cost. Arrays of immobilized single-stranded DNA(ssDNA) probes, so-called DNA chips, are being used for genetic analysisfor disease detection, toxicology, forensics, industrial processing, andenvironmental monitoring.

The identity verification system of the present invention 10 is a nextgeneration pen based tool. It enables the most widely used MicrosoftWindows based word processing application to be used as a workflowautomation system by empowering documents with an electronicsignature—attaching signatures to Microsoft Word documents with any pendevice

The identity verification system of the present invention 10 enables auser to bind an electronic signature to a Word document. The identityverification system of the present invention 10 is compatible withWindows based word processing application to be used as a workflowautomation system by empowering documents with an electronic signature.The increasing use of electronic data transmission makes the identityverification system of the present invention 10 a necessary product.Individuals frequently need to print documents to have them signed andthen are required to fax them, scan them for storage or keep extensivehard copy archives.

The identity verification system of the present invention 10 is for usewith standard business forms such as purchase orders, timecards, expensereports, and personel evaluations. The identity verification system ofthe present invention 10 enables the author of a form to insert multiplesignature blocks and specify who is to sign each signature block and whythey are signing. The name of each designated signee is inserted intothe appropriate signature block.

The principles of the present invention are also applicable to (1)multi-purpose pens; and (2) classic pens with ink cartridges. As pen andpencil applications grow, many will want to carry one stylus-implementthat can be a pen and/or a pencil, that is compatible with pen-basedcomputers, and can be used at POS terminals and other similar siteswhere financial transactions occur. By including a fingerprint sensorand an encrypted print within the conventional pen, the pen becomes theexclusive property of the one or more individuals who have their printsencrypted within the pen.

Throughout this application, various U.S. Patents, Applications, PCTApplications, and Provisional Applications are referenced by patentapplication number or title and inventor. The disclosures of thesePatents/Applications in their entireties are hereby incorporated byreference into this specification in order to more fully describe thestate of the art to which this technology pertains.

It is evident that many alternatives, modifications, and variations ofthe identity verification method of the present invention will beapparent to those skilled in the art in light of the disclosure herein.It is intended that the metes and bounds of the present invention bedetermined by the appended claims rather than by the language of theabove specification, and that all such alternatives, modifications, andvariations which form a conjointly cooperative equivalent are intendedto be included within the spirit and scope of these claims.

21-51. (canceled)
 52. A method for processing a payment, the methodcomprising: a. submitting a payment for goods or services, confirmationof the payment requiring a user signature image, the user signatureimage being generated by use of a stylus, a first fingerprint sensorbeing disposed in the stylus; b. capturing the user signature image thatis generated; c. capturing a user fingerprint image, the userfingerprint image being captured by touching the fingerprint sensor inthe stylus, the stylus used to generate the user signature image beingused to capture the user fingerprint image; d. comparing the userfingerprint image to a first reference fingerprint image, the firstreference fingerprint image being captured during a registration; and e.comparing the user signature image to a first reference signature image,the first reference signature image being captured during theregistration; whereby the comparison of the user fingerprint image tothe first reference fingerprint image, and the comparison of the usersignature image to the first reference signature image are used toverify user identity; and whereby processing of the payment proceedsonce the user identity is verified.
 53. The method of claim 52, furthercomprising comparing the user fingerprint image to a second referencefingerprint image, the second reference fingerprint image being capturedduring another registration, whereby the comparison of the userfingerprint image to the second reference fingerprint image is used toverify user identity.
 54. The method of claim 52, further comprisingcomparing another user biometric image to a another reference biometricimage, the another reference biometric image being captured during aregistration, whereby the comparison of the another user biometric imageto the another reference biometric image is used to verify useridentity.
 55. The method of claim 52, wherein the biometric image isselected from the group consisting of a second fingerprint, athumbprint, a palm print, voice recognition, a retinal scan, an imagecaptured by a camera, a facial image, an infrared facial reading, DNAand cell capture.
 56. The method of claim 52, wherein payment processingis denied abent a match between the user fingerprint image to the firstreference fingerprint image.
 57. The method of claim 52, wherein paymentprocessing is denied abent a match between the user signature image andthe first reference signature image.
 58. A method for processing arequest, the method comprising: a. submitting the request, confirmationof the request requiring a user signature image, the user signatureimage being generated by use of a stylus, a first fingerprint sensorbeing disposed in the stylus; b. capturing the user signature image thatis generated; c. capturing a user fingerprint image, the userfingerprint image being captured by touching the fingerprint sensor inthe stylus, the stylus used to generate the user signature image beingused to capture the user fingerprint image; d. comparing the userfingerprint image to a first reference fingerprint image, the firstreference fingerprint image being captured during a registration; and e.comparing the user signature image to a first reference signature image,the first reference signature image being captured during theregistration; whereby the comparison of the user fingerprint image tothe first reference fingerprint image, and the comparison of the usersignature image to the first reference signature image are used toverify user identity; and whereby processing of the request proceedsonce the user identity has been verified.
 59. The method of claim 58,further comprising comparing the user fingerprint image to a secondreference fingerprint image, the second reference fingerprint imagebeing captured during another registration, whereby the comparison ofthe user fingerprint image to the second reference fingerprint image isused to verify user identity.
 60. The method of claim 58, furthercomprising comparing another user biometric image to a another referencebiometric image, the another reference biometric image being capturedduring a registration, whereby the comparison of the another userbiometric image to the another reference biometric image is used toverify user identity.
 61. The method of claim 58, wherein the biometricimage is selected from the group consisting of a palm print, voicerecognition, retinal scan, an image captured by a camera, facialimaging, infrared facial reading, spacing between facial features, DNA,cell capture.
 62. The method of claim 58, wherein payment processing isdenied abent a match between the user fingerprint image to the firstreference fingerprint image.
 63. The method of claim 58, whereinprocessing of the request is denied absent a match between the usersignature image and the first reference signature image.
 64. A methodfor processing a request, the method comprising: a. submitting therequest, confirmation of the request requiring a user signature image,the user signature image being generated by use of a stylus, a firstfingerprint sensor being disposed in the stylus; b. capturing a userfingerprint image, the user fingerprint image being captured by touchingthe fingerprint sensor in the stylus; c. capturing a first user metric,the first user metric being captured while the user signature image isbeing generated, the stylus being used to generate the user signatureimage being used to capture the user fingerprint image; d. comparing theuser fingerprint image to a first reference fingerprint image, the firstreference fingerprint image being captured during a registration; and e.comparing the first user metric to a first reference metric, the firstreference metric being captured during the registration; whereby thecomparison of the user fingerprint image to the first referencefingerprint image, and the comparison of the first user metric to thefirst reference metric are used to verify user identity; and wherebyprocessing of the request proceeds once the user identity has beenverified.
 65. The method of claim 64, further comprising comparing theuser fingerprint image to a second reference fingerprint image, thesecond reference fingerprint image being captured during anotherregistration, whereby the comparison of the user fingerprint image tothe second reference fingerprint image is used to verify user identity.66. The method of claim 64, further comprising comparing the first usermetric to a second reference metric, the second reference metric beingcaptured during another registration, whereby the comparison of thefirst user metric to the second reference metric is used to verify useridentity.
 67. The method of claim 64, wherein the first user metric isstroke speed, time duration, acceleration, deceleration, or pointpressure.
 68. The method of claim 64, further comprising capturing asecond user metric while the user signature image is being generated,comparing the second user metric to a second reference metric, thesecond reference metric being captured during the registration, thecomparison of the second user metric to the second reference metricbeing used to verify user identity.
 69. The method of claim 64, whereinthe request is for payment of goods or services.
 70. A method forprocessing a request, the method comprising: a. submitting the request,confirmation of the request requiring a user signature image, the usersignature image being generated by use of a stylus, a first fingerprintsensor being disposed in the stylus; b. capturing a user fingerprintimage, the user fingerprint image being captured by touching thefingerprint sensor in the stylus, the stylus used to generate the usersignature image being used to capture the user fingerprint image; c.capturing a first user biometric image, the first user biometric imagebeing different from the user fingerprint image, the first userbiometric image being captured while the request is being submitted; d.comparing the user fingerprint image to a first reference fingerprintimage, the first reference fingerprint image being captured during aregistration; and e. comparing the first user biometric to a firstreference biometric image, the first reference biometric image beingcaptured during the registration; whereby the comparison of the userfingerprint image to the first reference fingerprint image, and thecomparison of the first user biometric image to the first referencebiometric image are used to verify user identity; and whereby processingof the request proceeds once the user identity has been verified. 71.The method of claim 70, further comprising comparing the userfingerprint image to a second reference fingerprint image, the secondreference fingerprint image being captured during a registration,whereby the comparison of the user fingerprint image to the secondreference fingerprint image is used to verify user identity.
 72. Themethod of claim 70, further comprising comparing the first userbiometric image to a second reference biometric image, the secondreference signature image being captured during a registration, wherebythe comparison of the user signature image to the second referencesignature image is used to verify user identity.
 73. The method of claim70, wherein the request is for payment of goods or services.
 74. Themethod of claim 70, wherein the biometric image is selected from thegroup consisting of a second fingerprint, a thumbprint, a palm print,voice recognition, a retinal scan, an image captured by a camera, afacial image, an infrared facial reading, DNA and cell capture.
 75. Amethod for processing a request, the method comprising: a. submittingthe request, confirmation of the request requiring a user signatureimage and a first user PIN or password, the user signature image beinggenerated by use of a stylus, a first fingerprint sensor being disposedin the stylus; b. capturing a user fingerprint image, the userfingerprint image being captured by touching the fingerprint sensor inthe stylus, the stylus used to generate the user signature image beingused to capture the user fingerprint image; c. capturing the first userPIN or password; d. comparing the user fingerprint image to a firstreference fingerprint image, the first reference fingerprint image beingcaptured during a registration; and e. comparing the first user PIN orpassword to a first reference PIN or password, the first reference PINor password being captured during the registration; whereby thecomparison of the user fingerprint image to the first referencefingerprint image, and the comparison of the first user PIN or passwordto the first reference PIN or password are used to verify user identity;and whereby processing of the request proceeds once the user identityhas been verified.
 76. The method of claim 74, further comprisingcomparing the user fingerprint image to a second reference fingerprintimage, the second reference fingerprint image being captured during asecond registration, whereby the comparison of the user fingerprintimage to the second reference fingerprint image is used to verify useridentity.
 77. The method of claim 74, further comprising comparing thefirst user PIN or password to a second reference PIN or password, thesecond reference PIN or password being captured during a registrationprocess.
 78. The method of claim 74, wherein the request is for paymentof goods or services.
 79. A method for processing a request, the methodcomprising: a. submitting the request, confirmation of the requestrequiring a user signature image and a first user primary identifier,the user signature image being generated by use of a stylus, a firstfingerprint sensor being disposed in the stylus; b. capturing a userfingerprint image, the user fingerprint image being captured by touchingthe fingerprint sensor in the stylus, the stylus used to generate theuser signature image being used to capture the user fingerprint image;c. capturing the first user primary identifier; d. comparing the userfingerprint image and a first reference fingerprint image, the firstreference fingerprint image being captured during a registration; and e.comparing the first user primary identifier with a first referenceprimary identifier, the first reference primary identifier beingcaptured during the registration; whereby the comparison of the userfingerprint image and the first reference fingerprint image, and thecomparison of the first user primary identifier with the first referenceprimary identifier are used to verify user identity; and wherebyprocessing of the request proceeds once the user identity has beenverified.
 80. The method of claim 79, further comprising comparing theuser fingerprint image to a second reference fingerprint image, thesecond reference fingerprint image being captured during a secondregistration, whereby the comparison of the user fingerprint image tothe second reference fingerprint image is used to verify user identity.81. The method of claim 79, further comprising comparing the first userprimary identifier to a second reference primary identifier, the secondreference primary identifier being captured during a registrationprocess.
 82. The method of claim 79, the primary identifier is animprinted name on a card, an imprinted PAN on a card, information storedin a magnetic stripe of a card, or information stored in a smart card.