Client Identification System Using Video Conferencing Technology

ABSTRACT

A system and process for identifying a client, comprising a client device having a video camera and a voice transmitting and receiving device capable of transmitting a client&#39;s image and voice via a communication carrier system and a communications network to a user terminal, whereby the user terminal permits an authentication of the client&#39;s image and voice in real time. Another aspect of the present invention includes a method of identifying a fraudster, comprising the steps of using a client device having a video camera and voice transmitting and receiving device to initiate an authentication of a client&#39;s identity, transmitting the fraudster&#39;s image and voice over a communication carrier system and a communications network to a user terminal, comparing the fraudster&#39;s image and voice to client data, and storing the fraudster data.

RELATED APPLICATION

This application claims priority to and the benefit of pending U.S.Provisional Patent Application Ser. No. 61/240,592, filed on Sep. 8,2009, titled, “Client Identification System Using Video ConferencingTechnology,” under 35 U.S.C. §119(e)(1), which is hereby incorporated byreference in its entirety for all purposes.

FIELD OF THE INVENTION

The present invention relates generally to the field of authenticationand security systems. The present invention also relates to a method andan apparatus for a client identification system using video conferencingtechnology. The present invention can be applied to any industry thatuses authentication systems.

BACKGROUND OF THE INVENTION

A number of financial and non-financial institutions have implementedvarious “online financial transaction” capabilities. Most such servicesrequire clients to register a debit/credit card or bank account beforesending or receiving funds. As an example, recipients of payments mayreceive email notifications with a specially coded link to register andauthenticate before receiving several payment options, such asdepositing or withdrawing funds into a bank or credit card account.

However, authentication in a communication network normally includesconfirming a client attempting to access a system or a network. Theauthentication process is the most basic and essential process ofprotecting principal assets. Currently, there are three authenticationschemes which are primarily used in a communication network.

A first authentication scheme is to confirm something you know, a secondauthentication scheme is to confirm something you have, and a thirdauthentication scheme is to confirm you yourself. Among the threeauthentication schemes, the authentication scheme of confirmingsomething the client knows, e.g., a log-on password, is most widely usedon computer networks. In this scheme, when a client-input password iscorrect, the client is authorized. However, in the scheme of confirmingthe log-on password, a password may be stolen or robbed, exposed due tocarelessness, or lost. Furthermore, many users or clients are sufferingfrom password fatigue, and many are looking to simplify the manner inwhich day-to-day transactions and activities are conducted, includingtransactions for larger funds. To solve this problem, a more powerfulauthentication scheme is necessary.

As more powerful authentication, Two-Factor Authentication using acombination of two of the three methods, as mentioned earlier, has beenproposed. The two-factor authentication is widely used for applicationsnecessitating powerful client authentication. The two-factorauthentication is commonly based on both ‘Something you know’ and‘Something you have’. Representative examples of the two-factorauthentication include a credit card, a cash card, and Internet bankingservice. The card itself is what a client has physically (“What youhave”), and a password corresponding to this card is what the clientknows (“What you know”). The two factors are required for successfulauthentication.

The two-factor authentication greatly reduces losses or damage due toon-line fraudulent use of an ID. This is because one cannot accessdesired information or system through fraudulent use of a passwordwithout holding a card. Accordingly, the two-factor authenticationprovides much higher security than typical single factor authenticationschemes.

However, there are some constraints obstructing spreading of thetwo-factor authentication. That is, clients tend to dislike carryingsomething new. Furthermore, enterprises have adopted differenttwo-factor authentications, resulting in low compatibility. Further, theinformation contained in either three authentication schemes containstatic information, that is information that can be “hijacked” if theclient's identity is stolen via malicious software and hackingtechniques designed to infiltrate personal accounts and personalinformation. Thus, an authentication scheme capable of providing bothpowerful security and client-friendliness is urgently needed.

With the recent rapid development of communication network technology,and where rapid acquisition of a substantial amount of information is ofimportance, and where clients are exponentially more mobile and notbound to a single office in a specific city, clients are demandingadvanced solutions utilizing multimedia information including sound,image, and moving picture, in addition to existing telephone and datatransmission service, more suited to their needs. Video conference as arepresentative application using multimedia transmission service hasbeen studied, and developed and implemented in a variety ofenvironments.

SUMMARY OF THE INVENTION

An aspect of the present invent includes a system for identifying aclient, comprising a client device having a video camera and a voicetransmitting and receiving device capable of transmitting a client'simage and voice via a communication carrier system and a communicationsnetwork to a user terminal, whereby the user terminal permits anauthentication of the client's image and voice in real time.

Another aspect of the present invention includes a method of identifyinga client, comprising the steps of using a client device having a videocamera and voice transmitting and receiving device to initiate anauthentication of a client's identity, transmitting a client's image andvoice over a communication carrier system and a communications networkto a user terminal, and authenticating the client's image and voice inreal time.

Another aspect of the present invention includes a method of identifyinga fraudster, comprising the steps of using a client device having avideo camera and voice transmitting and receiving device to initiate anauthentication of a client's identity, transmitting the fraudster'simage and voice over a communication carrier system and a communicationsnetwork to a user terminal, comparing the fraudster's image and voice toclient data, and storing the fraudster data.

BRIEF DESCRIPTION OF THE DRAWINGS

Although the scope of the present invention is much broader than anyparticular embodiment, a detailed description of the preferredembodiment follows together with drawings. These drawings are forillustration purposes only and are not drawn to scale. Like numbersrepresent like features and components in the drawings. The inventionmay best be understood by reference to the ensuing detailed descriptionin conjunction with the drawings in which:

FIG. 1 illustrates a diagram of an exemplary embodiment of the presentinvention depicting the client identification system using videoconferencing technology.

FIG. 2 illustrates a diagram of an exemplary embodiment of the presentinvention that shows a client device.

FIG. 3 illustrates a diagram of an exemplary embodiment of the presentinvention that shows a user terminal.

FIG. 4 illustrates a flowchart of an exemplary embodiment of the presentinvention depiction the major steps of the processing method.

DETAILED DESCRIPTION OF THE INVENTION

The following is a detailed description of the exemplary embodiments ofthe present system and process for client identification system usingvideo conferencing technology. However, the present invention is in noway intended to be limited to the embodiments discussed below or shownin the drawings. Rather, the description and drawings are merelyillustrative of the exemplary and presently preferred embodiments of theinvention.

Client Identification System

The present invention relates to a system for enabling businesstransactions using video conferencing technology to verify clientidentification for security purposes. More specifically, the presentinvention consists of a client device capable of capturing andtransmitting real-time images of the client to the user terminal andcapable of communicating with the user terminal in real-time, an onlinenetwork connecting the client to the user terminal, and a user terminalcapable of displaying the client's image and communicating with theclient in real-time.

FIG. 1 illustrates an embodiment of the present invention, where thereis shown an exemplary operating environment that comprises a clientidentification system 100, that can be used to implement the processingmethod disclosed herein. Client identifications system 100 generallyincludes a client device 101, one or more wireless carrier systems 103,a land communications network 105, a computer 107, a call center 109,and a user terminal 111. It should be understood that the disclosedmethod can be used with any number of different systems and is notspecifically limited to the operating environment shown here. Thefeatures not discussed in detail, such as, architecture, construction,setup, and operation of the system and its individual components aregenerally well known in the art. The following paragraphs simply providea brief overview of one such exemplary system; however, other systemsnot shown here could employ the disclosed method as well.

Aspects of the present invention may be implemented in variousconfigurations which are well known to those practicing in the art. Asan example, in one embodiment the client device 101 may be implementedas a desktop personal computer, stand alone computer, workstationcomputer, mobile computer, portable computing device, personal digitalassistant (PDA) device, cellular telephone, digital audio or videoplayback device, or any other similar type of computing device. Clientdevice 101 may include a video camera 119 and a voice transmitting andreceiving device 121 such as a microphone and audio system in one unit.In an alternate embodiment, the client device may be implemented in aplurality of units such as a separate video camera device 119 and aseparate voice transmitting and receiving device 121 that is connectedor networked to the client device. Examples of suitable networkconnections include a controller area network (CAN), a media orientedsystem transfer (MOST), a local interconnection network (LIN), a localarea network (LAN), and other appropriate connections such as Ethernetor others that conform with known ISO, SAE and IEEE standards andspecifications, to name but a few.

Client device 101 enables wireless voice and/or data communication overwireless carrier system 103 and via wireless networking so that clientdevice 101 can communicate with the call center 109. In one embodiment,client device 101 uses radio transmissions to establish a communicationschannel (a voice channel and a data channel) with wireless carriersystem 103 so that voice and data transmissions can be sent and receivedover the communications channel. Data can be sent over a dataconnection, such as via packet data transmission over a data channel, orvia a voice channel using techniques well known in the art. Clientdevice 101 can utilize a single call over a voice channel and switch asneeded between voice and data transmission over the voice channel, andthis can be done using techniques known to those skilled in the art.

According to one embodiment, client device 101 utilizes cellularcommunication according to either GSM or CDMA standards and thusincludes a standard cellular chipset 113 for voice communications likehands-free calling, a wireless modem 123 for data transmission, anelectronic processing device 115, one or more digital memory devices117, and a dual antenna (not shown). It should be appreciated that modem123 can either be implemented through software that is stored in clientdevice 101 and is executed by processor 115, or, as mentioned above, itcan be a separate hardware component located internal or external toclient device 101. Modem 123 can operate using any number of differentstandards or protocols such as EVDO, CDMA, GPRS, and EDGE.

Electronic processing device 115 can be any type of device capable ofprocessing electronic instructions including microprocessors,microcontrollers, host processors, controllers, vehicle communicationprocessors, and application specific integrated circuits (ASICs), toname a few. It can be a dedicated processor 115, used only for clientdevice 101 or it can be shared with other systems. Processor 115executes various types of digitally-stored instructions, such assoftware or firmware programs stored in memory 117, which enable clientdevice 101 to provide a wide variety of services. For instance,processor 115 can execute programs or process data to carry out at leasta part of the processing method discussed herein.

Client device 101 may communicate with call center 109 via a landcommunications network 105 or a wireless carrier system 103, or acombination of both, and this can be done using techniques known tothose skilled in the art. Wireless carrier system 103 is preferably acellular telephone system that includes a plurality of cell towers (onlyone shown) 125, one or more mobile switching centers (MSCs) 127, as wellas any other networking components required to connect wireless carriersystem 103 with land network 105. Each cell tower 125 includes sendingand receiving antennas and a base station, with the base stations fromdifferent cell towers being connected to the MSC 127 either directly orvia intermediary equipment such as a base station controller. Wirelesscarrier system 103 can implement any suitable communications technology,including for example, analog technologies such as AMPS, or the newerdigital technologies such as CDMA (e.g., CDMA2000) or GSM/GPRS. As willbe appreciated by those skilled in the art, various cell tower 125/basestation/MSC arrangements are possible and could be used with wirelesssystem 103. For instance, the base station and cell tower 125 could beco-located at the same site or they could be remotely located from oneanother, each base station could be responsible for a single cell tower125 or a single base station could service various cell towers 125, andvarious base stations could be coupled to a single MSC, to name but afew of the possible arrangements.

Apart from using wireless carrier system 103, a different wirelesscarrier system in the form of satellite communication can be used toprovide bi-directional communication with client device 101. This can bedone using one or more communication satellites 129 and anuplink/downlink transmitting station 131. Bi-directional communicationcan be, for example, satellite telephony services using satellite 129 torelay telephone communications between the client device 101 and station131. If used, this satellite telephony can be utilized either inaddition to or in lieu of wireless carrier system 103.

Land network 105 may be a conventional land-based telecommunicationsnetwork that is connected to one or more landline telephones andconnects wireless carrier system 103 to call center 109. For example,land network may include a public switched telephone network (PSTN) suchas that used to provide hardwired telephony, packet-switched datacommunications, and the Internet infrastructure. One or more segments ofland network could be implemented through the use of a standard wirednetwork, a fiber or other optical network, a cable network, power lines,other wireless networks such as wireless local area networks (WLANs), ornetworks providing broadband wireless access (BWA), or any combinationthereof. Furthermore, call center 109 need not be connected via landnetwork 105, but could include wireless telephony equipment so that itcan communicate directly with a wireless network, such as wirelesscarrier system 103.

Computer 107 can be one of a number of computers accessible via aprivate or public network such as the Internet. Each such computer 107can be used for one or more purposes, such as a web server accessible bythe client device 101 and wireless carrier 103. Other such accessiblecomputers 107, can be, for example: a service center computer whereaccounting information and other transaction data can beuploaded/downloaded from the client device 101; or a third partyrepository to or from which fraudsters identification or otherinformation is provided, whether by communicating with the client device101 or call center 109, or both. A computer 107 can also be used forproviding Internet connectivity such as DNS services or as a networkaddress server that uses DHCP or other suitable protocol to assign an IPaddress to client device 101.

Call center 109 is designed to provide client device 101 with a numberof different system back-end functions such as the ability to store theclient's information, such as his/her photo identification information,passport information, social security information, biometrics orpersonal information or description, such as hair color, eye color,approximate weight, any facial or body markings, etc., to assist in theverification of the client, and according to the exemplary embodimentshown here, generally includes one or more switches 151, servers 153,databases 155, live advisors 157, as well as an automated voice responsesystem (VRS) (159), or Voice System Module (VSM) 159 (usedinterchangeably), all of which are known in the art. These various callcenter 109 components are preferably coupled to one another via a wiredor wireless local area network 169. Switch 151, which can be a privatebranch exchange (PBX) switch, routes incoming signals so that voicetransmissions are usually sent to either the live advisor 157 by regularphone or to the VRS 159 using VoIP (Voice over Internet Protocol). Thelive advisor 157 phone can also use VoIP. VoIP and other datacommunication through switch 151 is implemented via a modem (not shown)connected between the switch and network. Data transmissions are passedvia the modem to server 153 and/or database 155. Database 155 can storeaccount information such as subscriber authentication information, andother similar information listed above. Data transmissions may also beconducted by wireless systems, such as 802.11x, GPRS (General PacketRadio Service), and the like. Although the illustrated embodiment hasbeen described as it would be used in conjunction with a manned callcenter 109 using live advisor 157, it will be appreciated that callcenter 109 can instead utilize VRS 159 as an automated advisor or, acombination of VRS 159 and the live advisor 109 can be used.

As a further example, each live advisor 109 operates a user terminal 111which may be implemented as a desktop personal computer, stand alonecomputer, workstation computer, mobile computer, portable computingdevice, personal digital assistant (PDA) device, cellular telephone,digital audio or video playback device, or any other similar type ofcomputing device. User terminal 111 may include a display screen 161 anda voice transmitting and receiving device 163 in one unit. In analternate embodiment, the user terminal may be implemented in aplurality of units such as a separate display screen 161 and a separatevoice transmitting and receiving device 163 that is linked or networkedto user terminal 111. As a further example, user terminal 111 mayinclude similar components, features, and capabilities as thosedescribed above with respect to client device 101 (i.e., enablement ofwireless voice and/or data communication over wireless carrier systemand via wireless networking, utilization of cellular communication,utilization of a processor, communication via a land communicationsnetwork, satellite communication, etc.) Call center 109 may employ theuse of enterprise software 165 and various technology interfaces 167that enable the user terminal to communicate with client device 101, andperform authentication measures as disclosed herein. Enterprise software165 and technology interfaces 167 are generally well known to thoseskilled in the art.

FIG. 2 illustrates an exemplary embodiment of the present invention thatshows a client device 201. Client device 201 includes a video camera 203and a voice transmitting and receiving device 205 such as a microphoneand audio system in one unit. The client device 201, can also include adata input/retrieval feature 207, such as, a key pad, key board, button,touch screen, to name a few, and a display device 209.

FIG. 3 illustrates a diagram of an exemplary embodiment of the presentinvention that shows a user terminal 301. User terminal 301 implements aplurality of units such as a separate display screen 309 and a separatevoice transmitting and receiving device 305. The user terminal 301, canalso have at least one video camera 303, and can also include a datainput/retrieval feature 307, such as, a key pad, key board, button,touch screen, to name a few.

Aspects of the present invention may be implemented on one or morecomputers executing software instructions. According to one embodimentof the present invention, server and client computer systems transmitand receive data over a computer network or a fiber or copper-basedtelecommunications network. The steps accessing, downloading, andmanipulating the data, as well as other aspects of the present inventionare implemented by central processing units (CPU) in the server andclient computers executing sequences of instructions stored in a memory.The memory may be random access memory (RAM), read-only memory (ROM), apersistent store, such as a mass storage device, or any combination ofthese devices. Execution of the sequences of instructions causes the CPUto perform steps according to embodiments of the present invention.

The instructions may be loaded into the memory of the server or clientcomputers from a storage device or from one of more other computersystems over a network connection. For example, a client computer maytransmit a sequence of instructions to the server computer in responseto a message transmitted to the client over a network by the server. Asthe server receives the instructions over the network connection, itstores the instructions in memory. The server may store the instructionsfor later execution, or it may execute the instructions as they arriveover the network connection. In some cases, the instructions may not bedirectly executable by the CPU, and may instead be executed by aninterpreter that interprets the instructions. In other embodiments,hardwired circuitry may be used in place of, or in combination with,software instructions to implement the present invention. Thus, thepresent invention is not limited to any specific combination of hardwarecircuitry and software, nor to any particular source for theinstructions executed by the server or client computers. In someinstances, the client and server functionality may be implemented on asingle computer platform. Aspects of the present invention can be usedin a distributed electronic commerce application that included aclient/server network system that links one or more server computers toone or more client computers. The client and server computers may beimplemented as desktop personal computers, workstation computers, mobilecomputers, portable computing devices, personal digital assistant (PDA)devices, cellular telephones, digital audio or video playback devices,or any other similar type of computing device. For purposes of thefollowing description, the terms “computer network” and “online” may beused interchangeably and do not imply a particular network embodiment ortopography. In general, any type of network (e.g., LAN, WAN, orInternet) may be used to implement the online or computer networkedimplementation of the software.

Actual Use of the Client Identification System

The Client Identification System 100 is easy to use. The clientidentification system enables financial transactions to take placewithout the need for the client to go to a branch or dedicated office.Turning now to FIG. 4, there is shown of an exemplary embodiment of thepresent invention depiction some of the steps the processing method. Forexample, in one embodiment, if the client wishes to transfer a verylarge amount of money from one bank account to another bank account, theclient would connect with call center 109 using client device 101. Theclient would use video camera 119 associated with client device 101 andspeak into the voice transmitting and receiving device 121 tocommunicate with live advisor 157 and initiate the transaction 401. Atcall center 109, live advisor 157 would operate his or her user terminal111. User terminal 111 also has a display device 161, that would streamthe live image of the client and a voice transmitting and receivingdevice so that live advisor 157 could communicate with the client 403.Once an acceptable connection is established 403, live advisor 157 canbegin to authenticate the identity of the client before permitting thefinancial transaction in question.

In the exemplary embodiment described above, live advisor 157 cancompare and visually authenticate the live video image of the client 405with an image and other visual specifics (client data) of the client atthe disposal of the live advisor 157. For example, the image and othervisual specifics may be in the form of a government issuedidentification card, passport, or other listed information or biometricsor personal information or description such as eye color, hair color,body markings, etc. In one embodiment, this information can be stored ina database 155 on or offsite and can be made accessible to the liveadvisor's 157 user terminal 111 through various means well known tothose skilled in the art. Once a visual identification and comparison iscomplete, live advisor 157 may begin to communicate with the client 407to complete the authentication process.

In the exemplary embodiment described above, live advisor 157 is notlimited to static or confidential one or two factor themes such associal security number, mother's maiden name, previous addresses,country of birth, elementary schools, or other similar biographical orstatic information as previously discussed. Live advisor 157 can asknon-confidential information of the client to determine a liveconnection. For example, live advisor 157 can make “small talk,” or askthe client about the weather or the clothes he is wearing, or theenvironment he is in now. Alternatively, Live advisor 157 can askconfidential or non-confidential information in the form of preferencesor likes and dislikes of the client. For example, Live advisor 157 canask a question (or a question can be generated by the system andprovided to Live advisor 157 in a manner well known to those skilled inthe art) such as “Do you like pizza?” The responses given by a clientcan be a “yes” or “no” answer or alternatively can be a response basedon a continuum, or scale such as 1 to 5 (1 being strongly like and 5being strongly dislike). In one embodiment these preferences can bestored in database 155 on or offsite and can be made accessible (orprovided) to the live advisor's 157 user terminal 111 through variousmeans well known to those skilled in the art.

Once a client's preferences are stored and made accessible to liveadvisor 157, an infinite or endless number of questions may asked basedon the client's preferences. The list or descriptions of nonconfidential questions or subject matter that may be discussed isendless, and well known to those practicing in the art. At least onepurpose of these questions are to confirm that the client is truly theclient and that a video loop or other fraudulent image is not attemptingto perpetrate a financial transaction. These questions also serve thepurpose of being a “one time question” (OTQ) that has a “one timeanswer” (OTA) that act as a “one time password” (OTP). An OTP is apassword that is only valid for a single login session or transaction.OTPs avoid a number of shortcomings that are associated with traditional(static) passwords. The most important shortcoming that is addressed byOTPs is that, in contrast to static passwords, they are not vulnerableto replay attacks. This means that, if a potential intruder manages torecord an OTP that was already used to log into a service or to conducta transaction, he will not be able to abuse it since it will be nolonger valid. This will prevent fraudsters reusing the OTQ to setup aphishing scam and/or directly using the OTA (specific answer) again.

In the exemplary embodiment described above, live advisor 157 inaddition to conducting small talk or asking non-confidentialinformation, may also ask static questions to further confirm theidentity of the client. Static questions that the live advisor may askinclude, but are not limited to, social security number, home address,driver's license number, birth date, mother's maiden name, father'sfirst name, favorite sport, school name, etc.

In the exemplary embodiment described above, once the client'sidentification is authenticated, live advisor 157 can permit thefinancial transaction to take place 409.

In another example, if live advisor 157 were to “catch” an imposter orfraudster, the image of the fraudster and other fraudster data caneasily be stored in a database, such as the phone number, IP address, orother digital signatures, and can be reported to the proper lawenforcement authorities. The image can also be stored in an on oroffsite database to easily detect and spoil future attempts by thefraudster. Of course, although the illustrated embodiment has beendescribed as it would be used in conjunction with a manned call center109 using live advisor 157, it will be appreciated that the call centercan instead utilize VRS 159 as an automated advisor or, a combination ofVRS 159 and the live advisor 157 can be used.

The present invention is not limited to the embodiments described abovebut the constituent elements of the invention can be modified in variousmanners without departing from the spirit and scope of the invention.Various aspects of the invention can also be extracted from anyappropriate combination of a plurality of constituent elements disclosedin the embodiments. Some constituent elements may be deleted in all ofthe constituent elements disclosed in the embodiments. The constituentelements described in different embodiments may be combined arbitrarily.

While certain embodiments of the inventions have been described, theseembodiments have been presented by way of example only, and are notintended to limit the scope of the inventions. Indeed, the novel methodsand systems described herein may be embodied in a variety of otherforms; furthermore, various omissions, substitutions and changes in theform of the methods and systems described herein may be made withoutdeparting from the spirit of the inventions.

As used in this specification and claims, the terms “for example,” “forinstance,” “such as,” and “like,” and the verbs “comprising,” “having,”“including,” and their other verb forms, when used in conjunction with alisting of one or more components or other items, are each to beconstrued as open-ended, meaning that that the listing is not to beconsidered as excluding other, additional components or items. Otherterms are to be construed using their broadest reasonable meaning unlessthey are used in a context that requires a different interpretation.

1. A system for identifying a client, comprising: a client device havinga video camera and a voice transmitting and receiving device capable oftransmitting a client's image and voice via a communication carriersystem and a communications network to a user terminal, whereby the userterminal permits an authentication of the client's image and voice inreal time.
 2. The system of claim 1, wherein the communication carriersystem is selected from a group consisting of a cellular telephonesystem, a wireless carrier system, and a satellite communication system.3. The system of claim 1, wherein the user terminal has a voicetransmitting and receiving device.
 4. The system of claim 1, wherein theuser terminal is operated by a live advisor.
 5. The system of claim 1,wherein the client's image and voice is authenticated by comparing itwith at least one client's identification data.
 6. The system of claim5, wherein the at least one client's identification data is stored in adatabase.
 7. The system of claim 1, wherein the client's image and voiceis authenticated with non-confidential information.
 8. The system ofclaim 1, wherein the client's image and voice is authenticated withstatic information.
 9. A method of identifying a client, comprising thesteps of: using a client device having a video camera and voicetransmitting and receiving device to initiate an authentication of aclient's identity; transmitting a client's image and voice over acommunication carrier system and a communications network to a userterminal; and authenticating the client's image and voice in real time.10. The method of claim 9, further comprising the step of displaying theclient's image and voice on the user terminal's voice transmitting andreceiving device.
 11. The method of claim 9, further comprising the stepof authenticating the client's image by comparing the client's image toclient data stored by the user terminal.
 12. The method of claim 9,further comprising the step of authenticating the client's voice bycomparing the client's voice to client data stored by the user terminal.13. The method of claim 9, further comprising the step of authenticatingthe client's image and voice by asking non-confidential information. 14.The method of claim 9, further comprising the step of authenticating theclient's image and voice by asking static information.
 15. A method ofidentifying a fraudster, comprising the steps of using a client devicehaving a video camera and voice transmitting and receiving device toinitiate an authentication of a client's identity; transmitting thefraudster's image and voice over a communication carrier system and acommunications network to a user terminal; comparing the fraudster'simage and voice to client data; and storing the fraudster data.
 16. Themethod of claim 15, further comprising the step of displaying thefraudster's image and voice on the user terminal's voice transmittingand receiving device.
 17. The method of claim 15, further comprising thestep of comparing the fraudster's image to client data stored by theuser terminal.
 18. The method of claim 15, further comprising the stepof comparing the fraudster's voice to client data stored by the userterminal.
 19. The method of claim 15, further comprising the step ofcomparing the fraudster's image and voice to client data by askingnon-confidential information.
 20. The method of claim 15, furthercomprising the step of comparing the fraudster's image and voice toclient data by asking static information.