Adjustment of a security level of a transaction system based on a biometric characteristic of a customer

ABSTRACT

Methods and systems for adjusting a security level of a transaction system based on biometric characteristics of a customer are disclosed. According to an aspect, a method includes interacting with a customer at a transaction terminal. The method also includes determining a biometric characteristic of the customer based on the interaction with the customer. Further, the method may include adjusting a security level of a transaction system based on the biometric characteristic.

CROSS REFERENCE TO RELATED APPLICATION

This application claims the benefit of and priority to U.S. patentapplication Ser. No. 13/074,814, filed Mar. 29, 2011 and titledADJUSTMENT OF A SECURITY LEVEL OF A TRANSACTION SYSTEM BASED ON ABIOMETRIC CHARACTERISTIC OF A CUSTOMER; the content of which isincorporated by reference in its entirety.

BACKGROUND Field of the Invention

The present invention relates to electronic transactions, and morespecifically, to adjustment of a security level of a transaction system.

Description of Related Art

Self-checkout systems have become common in retail stores for providingcustomers with the ability to pay for purchases from a retailer withoutdirect input to the checkout process by retailer personnel. Such systemsare an alternative to traditional cashier-staffed checkout systems. Inself-checkout systems, customers are permitted to scan barcodes on theiritems or products for identifying items to be purchased. Items such asfruits and vegetables may be weighed with a scale and manuallyidentified with a user interface device, such as a touchscreen display.Customers may bag items in a bagging area, and a weight observed in thebagging area may be verified against previously stored information toensure that the correct item is bagged, allowing the customer to proceedonly if the observed and expected weights match. Some self-checkoutsystems also include devices for verifying that the dimensions of anitem match an entered identification of the item.

Self-checkout systems are usually unsupervised or supervised by acustomer assistant that is responsible for the oversight of multipleself-checkout systems. Accordingly, the interaction between the customerassistant and the customer is limited, if at all. This represents adownfall associated with self-checkout systems as the customer assistantmay not be able to examine the customer for any signs of dishonesty thatmay indicate that the customer is shoplifting or likely to beshoplifting, whereas a cashier at a conventional checkout system wouldbe able to interface with the customer and may be able to determine thata customer is likely dishonest and more prone to shoplifting.

For at least the aforementioned reasons, it is desired to providesystems and methods for aiding customer assistants in monitoringself-checkout environments.

BRIEF SUMMARY

One or more embodiments of the present invention provide methods andsystems for adjusting a security level of a transaction system based ona biometric characteristic of a customer. According to an aspect, amethod includes interacting with a customer at a transaction terminal.For example, a customer may interact with a user interface of aself-checkout terminal for conducting a purchase transaction. The methodalso includes determining a biometric characteristic of the customerbased on the interaction with the customer. For example, during theinteraction, one or more of the customer's speech pattern, eye movement,facial movement, heart rate, blood pressure, body temperature, and/orperspiration may be detected by the user interface for determining abiometric characteristic of the customer. Further, the method mayinclude adjusting a security level of a transaction system based on thebiometric characteristic.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a block diagram of a transaction system according toembodiments of the present invention;

FIG. 2 is a flowchart of a method for adjusting a security level of atransaction system in accordance with embodiments of the presentinvention; and

FIG. 3 is a flowchart of another method for adjusting a security levelof a transaction system in accordance with embodiments of the presentinvention.

DETAILED DESCRIPTION

Exemplary systems and methods for adjusting security levels oftransaction systems based on a biometric characteristic of a customer inaccordance with embodiments of the present invention are disclosedherein. Particularly, described herein are systems and methods fordetermining a biometric characteristic of a customer in response todetermining an honesty level of a customer. For example, a system maydetermine an honesty level by presenting one or more questions to thecustomer and determining a biometric characteristic of the customerbased on a response provided by the customer. The biometriccharacteristic may be determined by one or more of a customer's speechpattern, eye movement, facial movement, heart rate, blood pressure, bodytemperature, and perspiration production, the like, and/or anotherphysiological or psychological response by the customer. The system mayadjust a security level of the transaction system based on the biometriccharacteristic of the customer. For example, the system may set thesecurity level of the transaction system to one of several securitylevels, and may implement a predetermined action associated with thesecurity level. Example actions that may be implemented include, but arenot limited to, adjusting product checkout criteria of the transactionsystem.

FIG. 1 illustrates a block diagram of a transaction system 100 accordingto embodiments of the present invention. The transaction system 100 maybe implemented in any transactional environment, such as, for example, aself-checkout environment. The transaction system 100 may include acustomer terminal 102. The customer terminal 102 may include a displayscreen for interfacing with customers. Particularly, the display screenmay provide customers with purchase transaction information, such asitemized purchases and prices, a total cost associated with a purchase,and related purchase transaction information. In one example, thecustomer terminal 102 may be a self-checkout system in which thecustomer is responsible for scanning articles of merchandise.

The customer terminal 102 may include a point-of-sale (POS) application104, and may be in communication with a scanner 106, a user interface108, and an article detection device 110. The POS application 104 mayexecute on a processor 112 of the customer terminal 102. The customerterminal 102 may include any suitable hardware, software, and/orfirmware for implementing functions and processes in accordance withembodiments of the present invention.

The scanner 106 may be capable of reading data from an article ofmerchandise 114. The scanner 106 may be a handheld device that can bepassed over the universal product code (UPC) on articles of merchandiseor may be built into a counter or platform whereby articles ormerchandise 114 are passed over the scanner 106. Further, the scanner106 may read data from articles of merchandise 114 and transmit the datato the customer terminal 102 via, for example, a wireless or wirelineconnection.

The article detection device 110 may include a scale, sensor, or otherinstrument that captures information relating to purchase items. In anexample, the article detection device 110 may detect the presence of apurchase item at a bagging area. Further, for example, the articledetection device 110 may capture weight, dimension, color, and/or othermeasurements of purchase items. The article detection device 110 may becommunicatively coupled to the customer terminal 102 via wireless orwireline elements (e.g., serial cable, 802.11 technologies, and thelike).

The user interface 108 may include a keyboard device that enables acustomer to enter account and payment information for processing by thecustomer terminal 102. For example, the user interface 108 may include ascanning device for reading a customer's credit or debit card includingaccount number. The keypad device may enable a customer to enter apersonal identification number (PIN) if using a debit card. The userinterface 108 may include a display for displaying purchase andtransaction information to the customer. For example, the user interface108 may be a touchscreen display for displaying text and graphics andfor receiving user input. The user interface 108 may be communicativelycoupled to the customer terminal 102 via wireless or wireline elements.

The POS application 104 may be in communication with a security module116. The security module 116 may be configured to determine a biometriccharacteristic of a customer and adjust a security level of thetransaction system 110 based on the biometric characteristic. Thesecurity module 116 may be embodied on any appropriately configuredhardware or device. The sensors may be implemented as part of the userinterface 108 or may be stand-alone sensors that are in communicationwith the customer terminal 102.

The user interface 108 may include one or more biometric sensors 118that are configured for detecting one or more biometric measurements ofa customer. For example, the biometric sensors 118 may be configured fordetecting sounds, touch, movement, appearance, the like, andcombinations thereof of the customer. For example, a biometric sensormay include a microphone configured to detect a speech or other soundsproduced by the customer. In another example, a biometric sensor may bea camera (e.g., a digital video camera or still camera) configured tocapture one or more images of the customer. In another example, a touchscreen display of the user interface 108 may function as a biometricsensor by detecting a touch of the customer. An electrical signalrepresentative of the detected sound, touch, movement, appearance, thelike, or combinations thereof may be communicated to the security module116. Detection of the biometric measures may occur during and/or basedon the interaction with the customer.

The security module 116 may interpret the detected measures as havingbeen produced by the customer, and may determine a biometriccharacteristic of the customer based on the detected characteristics ofthe customer. Example biometric characteristic include, but are notlimited to, a speech pattern, eye movement, facial movement, heart rate,blood pressure, body temperature, perspiration production, the like, andcombinations thereof. The security module 116 may compare the detectedcharacteristics to one or more criteria, such as thresholds, fordetermining whether to adjust a security level of the transaction system100 and/or for determining a security level of the transaction system100.

The control terminal 102 may be in communication with one or morenetworks 122 with network entities, such as financial institutions.Purchases may be made via the customer terminals 102 whereby thecustomer terminals 102 facilitate electronic funds transfers overnetwork(s) 110 between customer accounts for one or more financialinstitutions and an establishment that implements the customer terminal102 (i.e., a vendor). For this purpose, the customer terminals 102 arecommunicatively coupled to network(s) 110. The one or more networks 110may be in communication with a server 122. Server 122 may be a servercontrolled by the retail or commercial establishment, or may be anexternal server connected to the one or more networks 110.

FIG. 2 illustrates a flowchart of a method for adjusting a securitylevel of a transaction system based on a biometric characteristic of acustomer in accordance with embodiments of the present invention. Themethod of FIG. 2 is described as being implemented by the transactionsystem 100 shown in FIG. 1, although the method may be implemented byany suitable transaction system.

Referring to FIG. 2, the method includes interacting 200 with a customerat a transaction terminal. For example, the user interface 108 may beconfigured for interacting with the customer. The user interface 108 mayinteract with the customer by, for example, presenting one or morequestions. For example, the security module 116 may control a display ofthe user interface 108 to display text of one or more questions to thecustomer. In another example, the security module 116 may control aspeaker of the user interface 108 to emit a recording of one or morespoken questions. In yet another example, the security module 116 maycontrol a display of the user interface 108 to display an image forviewing by the customer. In another example, the security module 116 maycontrol a display screen of the user interface 108 to present one ormore images and questions to the customer. In an example, the image maybe an image or video of a person who presents the questions to thecustomer.

The method of FIG. 2 may include determining 202 a biometriccharacteristic of the customer based on the interaction with thecustomer. For example, during or subsequent to interaction with thecustomer, the security module 116 may control the biometric sensor(s)118 to detect one or more biometric measures of a customer. The userinterface 108 may be an interface of a self-checkout system, and mayinclude touch sensors for detecting a biometric measure of the customer.Continuing the example of the user interface 108 presenting questions tothe customer, the customer may be prompted to touch icons, enter text,or otherwise interact with a display screen of the user interface 108for responding to the questions. In another example, the customer mayrespond with speech, which may be recorded by use of a microphone of theuser interface 108. The security module 116 may be configured to controlany suitable biometric sensor of the user interface 108 for measuringheart rate, blood pressure, body temperature, and/or perspirationproduction of the customer as the customer interacts with the system100. Further, the security module 116 may determine the biometriccharacteristic based on one or more of the measurements.

The method of FIG. 2 may also include adjusting 204 a security level ofa transaction system based on the biometric characteristics. Forexample, the security module 116 may adjust a security level of thetransaction system 100 based on one or more of the determined biometriccharacteristics. The security level may be one of several securitylevels for the transaction system 100. In an example, the transactionsystem 100 can be set to a security level based on biometriccharacteristics or one or more other security-related events orcharacteristics. Each security level may define a predetermined actionto be implemented when the transaction system 100 is set to the securitylevel. Example actions include, but are not limited to, adjustingproduct checkout criteria of one or more customer terminals of atransaction system.

In accordance with embodiments of the present invention, FIG. 3illustrates a flowchart of another example of a method for adjusting asecurity level of a transaction system. The method of FIG. 3 isdescribed as being implemented by the transaction system 100 shown inFIG. 1, although the method may be implemented by any suitabletransaction system. The method may be implemented by hardware, software,and/or firmware of the customer terminal 102, and/or another computingdevice, such as a server.

Referring to FIG. 3, the method includes initiating 300 a transaction ina transaction environment. For example, a transaction may be initiatedwhen a purchase transaction starts at a customer terminal, such ascustomer terminal 102 shown in FIG. 1. The transaction may initiate, forexample, when an item to be purchased is scanned by the scanner 106. Inanother example, a transaction may be initiated in the case of acustomer scanning an article of merchandise at a price check module. Inanother example, a transaction may be initiated upon detection that acustomer is in proximity to or within a checkout area. In anotherexample, a transaction may be initiated by the customer using acomputing device, such as, but not limited to, a personal computer, asmart phone or other suitable device, to purchase one or more items ofmerchandise.

The method of FIG. 3 includes presenting 302 one or more questions to acustomer. The question(s) may be selected to invoke a response from thecustomer for creating an elevated intrinsic or behavioral trait oraction from the customer suitable for measuring a biometriccharacteristic. The question(s) may be designed for use in determiningthe customer's honesty. For example, the question may ask whether thecustomer intends to shoplift. In this example, an increase in heart rateof the customer may be indicative of a customer's plan to shoplift, andthus a security level may be adjusted based on the change in heart rateof the customer. In another example, the question may be designed togage the customer's satisfaction with the store or establishment.Questions may be presented to the customer in conjunction with thedisplay of an image or video depicting, for example, a person's image.

The method of FIG. 3 includes receiving 304 a response of the customerto the one or more question(s). The response may be received by, forexample, the customer selecting a touch-sensitive area of a touch screendisplay of the user interface 108. In another example, a response may bereceived by a microphone configured to detect an audible response orspeech of the customer. In these examples, the security module 116 mayreceive data representative of the customer's response and may interpretthe data as a biometric characteristic of the customer. In anotherexample, a response may be detected when a customer touches a biometricsensor configured to generate an electrical signal representative of thecustomer's touch. In this example, the biometric sensor 118 may be asensor configured to detect a customer's touch that can be used tomeasure the customer's heart rate, blood pressure, body temperature,perspiration of the customer, or the like. In another example, aresponse may be received if the customer responds to a question in amanner in which a biometric characteristic may be determined based onthe movement, or lack of movement, of the customer. For example, thebiometric sensor 118 may be a video camera configured to capture imagesof the customer for use in determining one or more biometriccharacteristics of the customer.

The method of FIG. 3 includes determining 306 a biometric characteristicbased on the response of the customer. For example, continuing theexample of the customer touching a touch-sensitive area of a touchscreen display, detection of an elevated heart rate may be indicative ofa biometric characteristic that the customer may be dishonest. Inanother example, an elevated heart rate in the presence of increasedperspiration may be indicative of another biometric characteristic. Inthe example of capturing an image of the customer, an image of thecustomer in which the customer is shielding or covering his or her facemay be indicative of a biometric characteristic that the customer may bedishonest.

The method of FIG. 3 includes determining 308 an honesty level of thecustomer based on the biometric characteristic. The security module 116may be configured for determining an honesty level of the customer basedon the measurements of the biometric sensor(s) 118. In an example, thesecurity module 116 may determine that one or more biometriccharacteristics indicate that the customer either likely honest or notlikely honest. In this example, the security module 116 can adjust thehonesty level to a “likely honest” level or “not likely honest” levelfor the customer. In another example, the honesty level may be aplurality of honesty levels having a reference value indicative of thedetermined honesty level for each respective customer.

The method of FIG. 3 includes adjusting 310 a security level of atransaction system based on the honesty level. For example, thetransaction system may be the system 100 of FIG. 1. The security module116 may adjust the security level of the transaction system based on thehonesty level. The security level may be one of several security levelsfor the transaction system 100. In an example, the transaction system100 can be set to a security level based on the honesty level of acustomer. Further, each security level may define a predetermined actionto be implemented when the transaction system 100 is set to the selectedsecurity level. Example actions include, but are not limited to,adjusting product checkout criteria of one or more customer terminals ofa transaction system.

In accordance with embodiments of the present invention, adjustingproduct checkout criteria may include, for example, increasing a matchlevel required to verify a product or item when comparing a measurementof the product or item and product checkout criteria. The articledetection device 110 may capture weight, dimension, color, and/or othermeasurements of purchase items. The captured weight, dimension, color,and/or other measurements may be compared to expected measurements ofthe item to determine if the item measurements are within a tolerancerange. The action may include narrowing or reducing the tolerance rangesuch that the item measurements must more closely match the expectedmeasurements. If item measurements do not fit within the narrowed orreduced tolerance range, the corresponding transaction may be held up,or a notification may be sent to a customer assistant terminal. As aresult of this action, security of the system may be increased.

In accordance with embodiments of the present invention, securitylevels, actions to be implemented at security levels, and honesty levelsbased biometric characteristics of a customer may be configured based onuser-defined criteria. For example, a user of a transaction system maygenerate or edit a security level list for associating one or moresecurity levels in the list with an action as described herein. Further,for example, a user may specify honesty levels based on biometriccharacteristics for association with one or more security levels in thelist. In this example, when the specified biometric characteristic isdetected or reported, the system will enter the security levelassociated with the specified biometric characteristic. If an action isassociated with the security level, the system may implement theassociated action.

In accordance with embodiments of the present invention, an associationof a security level with an action may be based on user-definedcriteria. For example, user-defined criteria may specify a plan of atransaction environment. Based on the plan, a user-defined action mayadjust a product checkout criteria at one or more customer terminals ina transaction system. For example, an action may include increasing amatch level required to verify a product or item when comparing ameasurement of the product or item and product checkout criteria. Thematch level may be increased at a customer terminal in which the levelof honesty is relatively low. Additionally, in systems in which multiplecustomer terminals may be provided, the customer terminals that are moreremote from, for example, a customer assistant terminal may haveadjusted security levels that are higher than adjusted security levelsof customer terminals that are more closely-spaced to a customerassistant terminal.

In accordance with embodiments of the present invention, security levelsmay be set based on a number and/or value of one or more biometriccharacteristics of a customer. For example, the security module 116 mayset a security of the system to a predetermined security level based ondetermined biometric characteristics of a customer. For example, if nobiometric characteristics have been determined, the security level maybe set to or maintained at a normal level. In response to determiningbiometric characteristics associated with dishonest behavior, thesecurity module 116 may adjust the security level to a high level.Further, for example, increased security may be implemented if a highnumber of biometric characteristics associated with a low level ofhonesty of a respective customer are determined. If no biometriccharacteristics associated with a low level of honesty of a respectivecustomer are determined, the system may be at a normal security level inwhich no security actions are implemented. The actions associated witheach security level may differ.

In an example of determining a biometric characteristic of a customer,facial expressions may be detected and interpreted for determining abiometric characteristic of a customer. For example, a digital still orvideo camera may capture one or more images of a face of a customer. Thesecurity module may identify features of the face for determining afacial expression of the customer. In an example, the facial expressionmay be associated in time with the presentation of questions to thecustomer in accordance with embodiments of the present disclosure. Inanother example, the security module may use the determined facialexpressions for determining an honesty level of the customer. Thesecurity module may adjust the security level of the system based on thefacial expressions of the customer.

In accordance with embodiments of the present invention, a securitymodule as disclosed herein may be implemented on any computing devicesuitable for implementing a transaction. For example, the securitymodule may be implemented on a web server, notebook computer, desktopcomputer, smart phone, or other electronic device configured to interactwith a customer for conducting a purchase transaction. The securitymodule may detect user input during the interaction and adjust asecurity level to one of multiple security levels based on theinteraction. One or more actions may be associated with each securitylevel. The security module may implement the action(s) in response toadjusting to the security level. An action may heighten the scrutiny orattention given to the transaction. For example, in approving customercredentials for purchasing items, heightened scrutiny may be given toapproval of the customer's credentials in response to determining that abiometric characteristic of the customer may indicate dishonesty.

As will be appreciated by one skilled in the art, aspects of the presentinvention may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present invention may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, aspects of the present invention may take the form of acomputer program product embodied in one or more computer readablemedium(s) having computer readable program code embodied thereon.

Any combination of one or more computer readable medium(s) may beutilized. The computer readable medium may be a computer readable signalmedium or a computer readable storage medium (including, but not limitedto, non-transitory computer readable storage media). A computer readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, or device, or any suitable combination of the foregoing. Morespecific examples (a non-exhaustive list) of the computer readablestorage medium would include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. In the context of this document, a computer readable storagemedium may be any tangible medium that can contain, or store a programfor use by or in connection with an instruction execution system,apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer readable signal medium may be any computer readable medium thatis not a computer readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thepresent invention may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the lattersituation scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider).

Aspects of the present invention are described below with reference toflowchart illustrations and/or diagrams of methods, apparatus (systems)and computer program products according to embodiments of the invention.For example, aspects of the present invention are described withreference to the diagram of FIG. 1 and the flowcharts of FIGS. 2 and 3.It will be understood that each block of the flowchart illustrationsand/or diagrams, and combinations of blocks in the flowchartillustrations and/or diagrams, can be implemented by computer programinstructions. These computer program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/ordiagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be noted,in some alternative implementations, the functions noted in the blockmay occur out of the order noted in the figures. For example, two blocksshown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a,” “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiment was chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

What is claimed is:
 1. A method comprising: capturing, by a processor,at least one of a physiological and a psychological response from acustomer at a transaction terminal for purchase of a product; capturing,by the processor, measurement information of the product; storing, inmemory via a processor, the captured measurement information of theproduct; determining, by the processor, a biometric characteristic ofthe customer based on the at least one of the physiological and thepsychological response of the customer; determining, by the processor,an honesty level of the customer based on an analysis of the biometriccharacteristic; verifying, by the processor, whether the honesty levelof the customer meets a predetermined honesty level; adjusting, by theprocessor, a security level of the transaction terminal based on thebiometric characteristic of the customer and whether the honesty levelof the customer meets the predetermined honesty level; retrieving, fromthe memory via the processor, expected measurement information of theproduct stored in memory; determining, by the processor, a tolerancerange and a match level of the product based on the biometriccharacteristic of the customer, a comparison between the retrievedexpected measurement information and the captured measurementinformation from the product; increasing, by the processor, the matchlevel when comparing the retrieved expected measurement information andthe captured measurement information from the product; and deactivating,by the processor, the transaction terminal when the match level isoutside the tolerance range.
 2. The method of claim 1, wherein the atleast one of the physiological and the psychological response is ameasure of at least one of a speech pattern, eye movement, facialmovement, heart rate, blood pressure, body temperature, and perspirationof the customer.
 3. The method of claim 1, further comprises:evaluating, by the processor, the customer; presenting, by the processorvia a user interface, at least one question to the customer; andreceiving a response of the customer to the at least one question, andanalyzing the biometric characteristic based on the response of thecustomer.
 4. The method of claim 3, wherein the transaction terminalcomprises at least one of a touch, visual, and audio sensor, and whereinevaluating a customer at the transaction terminal comprises using the atleast one of the touch, visual, and audio sensor to evaluate thecustomer.
 5. The method of claim 4, further comprising displaying animage at the transaction terminal, and wherein determining a biometriccharacteristic of the customer comprises using the at least one of thetouch, visual, and audio sensor to determine the honestly level of thecustomer in response to displaying the image at the transactionterminal.
 6. The method of claim 1, wherein adjusting a security levelof the transaction system comprises adjusting the security level of thetransaction system to one of a plurality of security levels that areeach associated with at least one biometric characteristic.
 7. Themethod of claim 6, further comprising implementing a predeterminedaction in response to adjusting the security level.
 8. The method ofclaim 7, further comprises adjusting product checkout criteria of thetransaction terminal.
 9. The method of claim 1, further comprisingdetermining a biometric characteristic history of the customer based ona plurality of interactions with the customer.
 10. The method of claim9, wherein adjusting a security level of the transaction systemcomprises adjusting the security level of the transaction system basedon the biometric characteristic history.
 11. A system comprising: aprocessor and memory; a user interface of a transaction terminal thatinteracts with a customer for purchase of a product; and a securitymodule, which when executed by the program code stored in memory,instructs the processor to: capture at least one of a physiological anda psychological response from a customer at a transaction terminal forpurchase of a product; capture measurement information of the product;store the captured measurement information of the product; determine abiometric characteristic of the customer based on the capture of atleast one of the physiological and the psychological response of thecustomer; determine an honesty level of the customer based on ananalysis of the biometric characteristic; verify whether the honestylevel of the customer meets a predetermined honesty level; adjust asecurity level of the transaction terminal based on the biometriccharacteristic of the customer and whether the honesty level of thecustomer meets the predetermined honesty level; retrieve expectedmeasurement information of the product stored in memory; determine atolerance range and a match level of the product based on the biometriccharacteristic of the customer, a comparison between the retrievedexpected measurement information and the captured measurementinformation from the product; increase, by the processor, the matchlevel when comparing the retrieved expected measurement information andthe captured measurement information from the product; and deactivatethe transaction terminal when the match level is outside the tolerancerange.
 12. The system of claim 11, wherein the at least one of thephysiological and the psychological response is a measure of at leastone of a speech pattern, eye movement, facial movement, heart rate,blood pressure, body temperature, and perspiration of the customer. 13.The system of claim 11, wherein the security module is configured tocontrol the user interface to: present at least one question to thecustomer; and receive a response of the customer to the at least onequestion, and wherein the security module is configured to determine abiometric characteristic based on the response of the customer.
 14. Thesystem of claim 11, wherein the user interface of the transactionterminal comprises at least one of a touch, visual, and audio sensor forinteracting with the customer.
 15. The system of claim 14, wherein thesecurity module is configured to control the user interface to displayan image at the transaction terminal to invoke a response from thecustomer, and wherein the security module is configured to create thebiometric characteristic of the customer using the at least one of thetouch, visual, and audio sensor to determine the honesty level of thecustomer in response to displaying the image at the transactionterminal.
 16. The system of claim 11, wherein the security module isconfigured to adjust product checkout criteria of the transactionterminal in response to adjusting the security level.
 17. A computerprogram product for adjusting a security level of a transaction system,said computer program product comprising: a computer readable storagemedium having computer readable program code embodied therewith, thecomputer readable program code comprising instructions to: capture atleast one of a physiological and a psychological response from acustomer at a transaction terminal for purchase of a product; capturemeasurement information of the product; store the captured measurementinformation of the product; determine a biometric characteristic of thecustomer based on the capture of at least one of the physiological andthe psychological response of the customer; determine an honesty levelof the customer based on an analysis of the biometric characteristic;verify whether the honesty level of the customer meets a predeterminedhonesty level; adjust a security level of the transaction terminal basedon the biometric characteristic of the customer and whether the honestylevel of the customer meets the predetermined honesty level; retrieveexpected measurement information of the product stored in memory;determine a tolerance range and a match level of the product based onthe biometric characteristic of the customer, a comparison between theretrieved expected measurement information and the captured measurementinformation from the product; increase, by the processor, the matchlevel when comparing the retrieved expected measurement information andthe captured measurement information from the product; and deactivatethe transaction terminal when the match level is outside the tolerancerange.
 18. The computer program product of claim 17, wherein thecomputer readable program code comprises: computer readable program codeconfigured to present at least one question to the customer at the userinterface; computer readable program code configured to receive aresponse of the customer to the at least one question; and computerreadable program code configured to determine the biometriccharacteristic based on the response of the customer.