Biometric based authorization systems for electronic fund transfers

ABSTRACT

A money transfer authorization method that includes the step of providing transferor biometric information to a party verification processor that verifies an identity of the transferor by comparing the transferor biometric information with previously registered biometric information from the transferor, where the transferor provides transfer identity information to receive the money. The method also includes confirming that the verified transferor has sufficient funds or credit for the money transfer, and providing transferee biometric identification to the party verification processor that verifies the transferee by comparing the transferee biometric information with previously registered biometric information from the transferee. The transferee has to provide transfer identity information before the money is given to the transferee.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a continuation of, U.S. patent application Ser. No.13/722,186, filed Dec. 20, 2012, issued as U.S. Pat. No. 8,837,784, andentitled “Biometric Based Authorization Systems For Electronic FundTransfers,” which is a continuation of U.S. patent application Ser. No.11/562,371, filed Nov. 21, 2006, issued as U.S. Pat. No. 8,345,931, andentitled “Biometric Based Authorization Systems For Electronic FundTransfers,” which claims the benefit of and priority to U.S. ProvisionalApp. No. 60/772,406, filed Feb. 10, 2006, and titled “Biometric BasedAuthorization Systems For Electronic Fund Transfers.” The entiredisclosures of the above application s are hereby incorporated byreference, for all purposes, as if fully set forth herein.

BACKGROUND OF THE INVENTION

An important activity in all corporations and governments is to preventthe diversion of capital into criminal enterprises. In the mid-1980s,trafficking in illegal drugs in the United States had reached a levelwhere the federal government felt compelled to increase the monitoringof financial transactions for drug related activity. In 1986 the UnitedStates Congress modified the Bank Secrecy Act to require alltransactions conducted thorough U.S. financial institutions for morethan $10,000 to be reported to appropriate government monitoringagencies. The intent of the law was to make drug traffickers fearful ofusing the U.S. financial infrastructure to allocate capital for drugtrafficking enterprises.

The $10,000 reporting threshold was enacted in a time when the financialinfrastructure was much more centralized around banks and savings andloan institutions. Perhaps more significantly, the law was enacted whenparties had fewer options for transferring money. Credit cardtransactions were not nearly as commonplace as today, and debit card,stored value card, and ATM card transactions were in their infancy. Themajority of financial transactions at that time involved financialaccounts administered by government regulated financial institutions(e.g., checking and savings accounts).

After the terrorist attacks of Sep. 11, 2001, the United States requiredeven closer scrutiny of the financial transactions of terroristorganizations was needed. But the ease with which small transactions canbe conducted for well under the $10,000 reporting threshold has mademonitoring very difficult.

Trying to shrink and recentralize the financial infrastructure foreasier monitoring would be nearly impossible and unacceptably costly.Approximately two-thirds of the economic activity in the United Statesdepends on consumer spending. Restricting consumers' payment choicescould have a dramatic impact on their spending and the overall economy.Also, the financial infrastructure has been globalized to a greatextent, making it impossible for the United States to make dramaticchanges without the voluntary cooperation of many other countries. Thus,there is a need for technological solutions that increase theeffectiveness of financial transaction monitoring without undulyinterfering with the growth and sophistication of our financialinfrastructure.

In addition to national security concerns, the challenges posed formonitoring the financial infrastructure poses economic threats tobusinesses and individuals. The financial industry is well aware of theincreased threats of theft and fraud that criminals are exploiting innew innovations of the financial infrastructure. These threats includeincreased payment card theft, breaches in Internet security, and evermore sophisticated forms of identity theft, among many others. Thefinancial industry is constantly taking steps to improve security in thefinancial infrastructure. But despite industry efforts, economic lossesfrom financial fraud and theft are now estimated at more than a billiondollars annually, and the losses are growing. A diversion of even asmall portion of these losses to finance terrorist activity presents asignificant threat to national security. Thus, there is also a need fortechnological solutions that increase the effectiveness of financialmonitoring to stop losses from theft and fraud.

One aspect of financial transaction monitoring is verifying the identityof the parties involved in the transaction. Payment transactionsconducted at merchant stores and across the Internet typically involvethe use of PIN numbers, passwords, machine address codes, and/orsignatures to verify the identities of the parties to the transaction.Thus there is a need for new systems and methods to verify theidentities of parties to a financial transaction. These and otherproblems are address by the present invention.

BRIEF SUMMARY OF THE INVENTION

Embodiments of the invention include a money transfer authorizationmethod that includes the step of providing transferor biometricinformation to a party verification processor that verifies an identityof the transferor by comparing the transferor biometric information withpreviously registered biometric information from the transferor, wherethe transferor identifies a transferee to receive the money. The methodalso includes confirming that the verified transferor has sufficientfunds or credit for the money transfer, and providing transfereebiometric identification to the party verification processor thatverifies the transferee by comparing the transferee biometricinformation with previously registered biometric information from thetransferee. The transferee has to provide transfer identity informationbefore the money is given to the transferee.

Embodiments of the invention also include an electronic money transfersystem for transferring money from a transferor to a transferee. Thesystem may include a party verification processor coupled to a databasethat stores biometric registration information provided by thetransferor and the transferee during a party registration process. Thesystem may also include a biometric input device that generatesbiometric transaction information from the transferor and the transfereeduring a money transfer process, and a data input device that allows thetransferee to provide an identity of the transferor to the electronicmoney transfer system. In addition, the system may have a moneydistribution device that provides money to the verified transferee. Thesystem is configured so the transferee does not receive the money untilthe party verification processor verifies the identities of thetransferor and transferee by comparing the biometric transactioninformation with the biometric registration information from thetransferor and transferee. The transferee also has to provide transferidentity information before receiving the money.

Embodiments of the invention still further include a method oftransferring an amount of money between a transferor and a transferee.The method may include inputting, by the transferor, the amount of moneyto be transferred at a first money transfer device at the transferor'slocation, where an identity of the transferor is verified withtransferor biometric data input into the first device by the transferor.The method may also include receiving the amount of money at a secondmoney transfer device at the transferee's location, where the transfereedoes not receive the money until an identity of the transferee isverified with transferee biometric data input into the second device bythe transferee, and the transferee inputs transfer identity informationinto the second device.

Additional embodiments and features are set forth in part in thedescription that follows, and in part will become apparent to thoseskilled in the art upon examination of the specification or may belearned by the practice of the invention. The features and advantages ofthe invention may be realized and attained by means of theinstrumentalities, combinations, and methods described in thespecification.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the presentinvention may be realized by reference to the remaining portions of thespecification and the drawings wherein like reference numerals are usedthroughout the several drawings to refer to similar components. In someinstances, a sublabel is associated with a reference numeral and followsa hyphen to denote one of multiple similar components. When reference ismade to a reference numeral without specification to an existingsublabel, it is intended to refer to all such multiple similarcomponents.

FIG. 1 shows a schematic overview of a financial network in whichembodiments of the invention may be implemented;

FIG. 2 illustrates a schematic structure for a party verificationprocessor according to embodiments of the invention;

FIG. 3 shows a simplified overview of a network for transferring moneyaccording to embodiments of the invention;

FIG. 4 is a flowchart for a method of registering biometric informationaccording to embodiments of the invention; and

FIG. 5 is a flowchart for a method of transferring money according toembodiments of the invention.

DETAILED DESCRIPTION OF THE INVENTION

Money transfers are described where the identity of both the transferorand the transferee are verified by biometric information. As an addedsecurity and verification feature, the transferee may be required toprovide transfer identity information before receiving the money. Thistransfer identity information may include a money transfer transactionnumber that is an alpha-numeric code number that uniquely identifies themoney transfer. The transfer identity information may also include theidentity of the transferor.

The identify verification system may be used for money transfers of anyamount, including amounts below the government reporting thresholds.Records of the transactions between verified transferors and transfereesmay be stored and searched by authorized persons when fraudulent and/orillegal money transfer activity is suspected.

The money transfer methods and system of the invention may beincorporated into an existing financial network to reduce implementationcosts. FIG. 1 shows a schematic overview of a financial network in whichembodiments of the invention may be implemented.

The structure of the architecture illustrated in FIG. 1 may beconsidered to surround a party verification processor 100 that hasaccess to a number of data repositories 104 used to store informationfor verifying the identity of a party involved in a money transfer. Thedata repositories 104 may include a biometrics repository that comprisesa database associating biometric parameters with identities ofregistrants. The biometric parameters may comprise raw biometricparameters, such as in embodiments where an entire fingerprint is storedor where a retinal pattern is stored. Alternatively, the biometricparameters may comprise derived biometric parameters, such as inembodiments where geometrical positions of fingerprint minutiae or otherstatistical characteristics of a raw biometric pattern are stored. Moregenerally, the information stored in the biometrics repository maycomprise any type of biometric information, including information thatresults from fingerprints or other dermatoglyphic patterns, hand orfacial geometry, retinal or iris patterns, vein structure, and the like.In some embodiments, the biometrics repository stores multiple types ofbiometric information associated with a registrant.

The other data repositories 104 may include a variety of types offinancial transaction information, which may also be associated with aregistrant. The financial transaction information stored in the datarepositories 104 may be obtained from a variety of different sources andsubjected to statistical analyses using methods known in the art toidentify irregularities characteristic of potential fraud. Thus, thedata repositories 104 may also provide information used for frauddetection in financial transactions, as well as identity verification ofa transaction participant (e.g., transferor, transferee, payor, payee,etc.).

Collection of biometric information and financial transactioninformation is facilitated with interfaces between the partyverification processor 100 and a variety of financial networks, some ofwhich are identified in FIG. 1 for illustrative purposes. For example,the party verification processor 100 may be interfaced with a financialnetwork 108 through which communications with or among financialinstitutions 120 are routed. The financial institutions 120 may comprisea variety of different types of financial institutions, and embodimentsof the invention are not limited by the specific types of financialservices offered by the respective financial institutions 120. Forexample, the financial institutions 120 may comprise banks, creditunions, trust organizations, brokerage firms, and/or the like.Interactions by transaction participants with respective financialinstitutions may be effected with a number of different types ofdevices, some of which are indicated explicitly in the drawing. Forexample, magnetic-stripe readers 124 may be used to read a variety ofdifferent card instruments, including bank cards, credit cards, debitcards and the like, as well as identity instruments such as drivers'licenses that include magnetic-stripe cards. Magnetic-ink readers 128may be used to read a variety of instruments that have informationprinted on them using magnetic ink, such as checks, deposit slips, andthe like.

In addition to these type of devices, biometric readers 132 may beprovided to collect biometric information from transaction participants.The specific design of the biometric readers 132 may vary, depending onthe type of biometric to be collected. For example, fingerprints may becollected using optical fingerprint readers that use total internalreflection to discriminate between ridges and valleys in the surfacestructure of fingers. Facial geometry measurements may be collectedusing digital cameras coupled with computational units that performeigenvalue analyses to extract characterizing features. Similartechniques may be performed using cameras to collect biometric retinalor iris information. Hand geometry measurements may be collected using atemplate over which a user places his hand, resulting in separation ofthe fingers, to permit cameras to acquire top and side views of thehand.

The party verification processor 100 may also be interfaced with atransaction network 116 through which transaction information may berouted both to the financial network 108 and to the party verificationprocessor 100. The routing through the financial network 108 permitstransaction information to be considered by financial institutions asdescribed in further detail below to determine whether to approve ordeny particular transactions by customers with merchants. The routing tothe party verification processor 100 generally includes biometricinformation collected when the transaction is staged, permittingauthentication of the biometric information by a centralized source. Insome embodiments, particulars of the transaction are also routed to theparty verification processor 100, which may then add such particularsand/or information derived from such particulars to the datarepositories 104. This information then becomes part of the body of datathat may be used by the party verification processor 100 to verify theidentities of the transaction participants and/or identify patterns thatmay indicate a suspicious money transfer.

The money transfer systems of the invention include embodiments wherethe transferor and/or transferee conduct the transfer at a merchantlocation (e.g., a supermarket, a retail goods store, a restaurant, a gasstation, an office services store, etc.). These embodiments may includehaving the transaction network 116 receive transaction information frommerchants 152, each of which may in turn collect money transferinformation at a point-of-transfer using a variety of different types ofdevices. Some of these devices are identified explicitly in FIG. 1, suchas a magnetic-stripe reader 156, a magnetic-ink reader, a chip-cardreader 164, and the like. The availability of multiple types of devicesprovides versatility in accepting and transferring different forms ofmoney (e.g., physical cash, and checks, electronic money transfers,etc.) from transaction participants, and may sometimes simplifyproviding a self-service facility for executing transactions with theparticipants. These point-of-transfer devices may also function aspoint-of-sales devices that include multiple capabilities foridentifying transaction instruments. Examples of these devices areprovided in the following commonly assigned applications, the entiredisclosures of which are incorporated herein by reference for allpurposes: U.S. Prov. Pat. Appl. No. 60/147,889, entitled “INTEGRATEDPOINT OF SALE DEVICE,” filed Aug. 9, 1999 by Randy J. Templeton et al.;U.S. patent application Ser. No. 09/634,901, entitled “POINT OF SALEPAYMENT SYSTEM,” filed Aug. 9, 2000 by Randy J. Templeton et al.; U.S.patent application Ser. No. 10/116,689, entitled “SYSTEMS AND METHODSFOR PERFORMING TRANSACTIONS AT A POINT-OF-SALE,” filed Apr. 3, 2002 byEarney Stoutenburg et al.; U.S. patent application Ser. No. 10/116,733,entitled “SYSTEMS AND METHODS FOR DEPLOYING A POINT-OF-SALE SYSTEM,”filed Apr. 3, 2002 by Earney Stoutenburg et al.; U.S. patent applicationSer. No. 10/116,686, entitled “SYSTEMS AND METHODS FOR UTILIZING APOINT-OF-SALE SYSTEM,” filed Apr. 3, 2002 by Earney Stoutenburg et al.;and U.S. patent application Ser. No. 10/116,735, entitled “SYSTEMS ANDMETHODS FOR CONFIGURING A POINT-OF-SALE SYSTEM,” filed Apr. 3, 2002 byEarney Stoutenburg (“the point-of-sale device applications”). Biometricinformation at a point-of-transfer may be collected using a biometricreader 168, which may have any of the structures described above indifferent embodiments, depending on the specific type of biometricinformation to be collected.

The party verification processor 100 may also be interfaced with amoney-transfer network 112, over which currency-transfer transactionsmay be executed between conventional money-transfer providers 136.Again, each of the money-transfer providers 136 may have a number ofdifferent types of devices for collecting or providing funds inexecuting the money-transfer transactions, such as magnetic-stripereaders 140, chip-card readers 144, and the like. In some embodiments,such devices may be comprised by an integrated point-of-sale device asdescribed in the point-of-sale device applications. Biometricinformation may be collected using a biometric reader 148 like thosedescribed above.

The party verification processor 100 may advantageously be embodied on acomputational structure such as illustrated schematically in FIG. 2,which broadly illustrates how individual processor elements may beimplemented in a separated or more integrated manner. The partyverification processor 100 is shown comprised of hardware elements thatare electrically coupled via bus 226. The hardware elements include aCPU 202, an input device 204, an output device 206, a storage device208, a computer-readable storage media reader 210 a, a communicationssystem 214, a processing acceleration unit 216 such as a DSP orspecial-purpose processor, and a memory 218. The computer-readablestorage media reader 210 a is further connected to a computer-readablestorage medium 210 b, the combination comprehensively representingremote, local, fixed, and/or removable storage devices plus storagemedia for temporarily and/or more permanently containingcomputer-readable information. The communications system 214 maycomprise a wired, wireless, modem, and/or other type of interfacingconnection and permits data to be exchanged with the transaction network116, the financial network 108, and/or the money-transfer network 112.

The party verification processor 100 also comprises software elements,shown as being currently located within working memory 220, including anoperating system 224 and other code 222, such as a program designed toimplement methods of the invention. It will be apparent to those skilledin the art that substantial variations may be used in accordance withspecific requirements. For example, customized hardware might also beused and/or particular elements might be implemented in hardware,software (including portable software, such as applets), or both.Further, connection to other computing devices such as networkinput/output devices may be employed.

Referring now to FIG. 3, an overview of portions of a structure 300 fortransferring money through a money-transfer network 312 according toembodiments of the invention is shown. The portion of network 300 shownincludes money transfer kiosks 302-1 and 302-2 that may be used totransfer money between a transferor and transferee in differentlocations (e.g., different states, countries, continents, etc.). Thekiosks 302 may be equipped with inputs 324 to receive a variety ofpayment tokens and other payment instrument types, including bank cards,credit cards, debit cards and the like, as well as identity instrumentssuch as drivers' licenses that include magnetic-stripe cards.Magnetic-ink readers 328 may be used to read a variety of instrumentsthat have information printed on them using magnetic ink, such aschecks, deposit slips, and the like. In addition, the kiosks 302 mayinclude biometric readers 332 to collect biometric information from thetransferor and transferee. Also, the kiosks 302 may include keyboards,keypads, microphones, cameras, etc. so the money transfer participantscan manually input information about the transfer, including transferidentity information such as a money transfer transaction number (alsocalled a money transfer control number) and/or the identity of thetransferor and/or transferee. In some embodiments, the kiosks 302 may bederived from conventional automatic teller machines (ATMs), and mayfunction as conventional ATMs that allow customers to deposit orwithdraw money from a financial account.

When the kiosks 302 are being used for a money transfer according toembodiments of the invention, the transferor may input money and/ormoney transfer instructions into kiosk 302-1. This may involve thetransferor inputting a payment token into input 324, which readsinformation from the token that identifies and transaction accountand/or the identity of the transferor. The transferor may also providephysical cash to a cash input 325 of the kiosk 302-1. Alternatively (orin addition) the transferor may manually input an amount of money to bewithdrawn from an account controlled by the transferor and sent to thetransferee. The transferor may also manually input the identity of thetransferee.

In addition, the transferor may input biometric information using thebiometric readers 332. The biometric information may be sent to theparty verification processor 301 to verify the identity of thetransferor. The party verification processor 301 may compare thebiometric information sent by the alleged transferor with previouslyrecorded biometric information stored in database 304. The database 304may include a biometrics repository for biometric parameters that areassociated with the identities of transferors who have registered withthe network 300. If the processor 301 can match the received and storedbiometric information to a unique individual within a predefined marginof error, then the processor will deem the transferor's identity asverified and allow the transfer to proceed.

The money transferee may use kiosk 302-2 located in a different placethan kiosk 302-1 to receive the money. The kiosk 302-2 may have the samefunctional elements as kiosk 302-1, which may be used by processor 301to verify the identity of the transferee. This may include thetransferee supplying biometric information to a biometric reader 332,which is then sent to processor 301 to verify the identity of thetransferee. The transferee may also manually input transfer identityinformation such as a money transfer transaction number, the identity ofthe transferor and other information about the transfer (e.g., theamount of money transferred, etc.). This information may be required asan additional check before the transfer is completed to verify that theintended money transfer is being conducted.

The transferor may also input additional transfer instructions, such asan earliest time that the transferee can receive the money, and/or atime window when the transferee can receive the money, the location ofthe transfer, and/or even the specific identity of the kiosk 302-2. Thenetwork 300 may also be configured to allow the transferor to set upperiodic transfers of money from a specified financial account. Once thetransferor's identity has been verified by processor 301, the transfereecan receive the money at the periodic intervals without furtherparticipation by the transferor. The transferee's identity may still beverified before each periodic transfer is received.

Money transfer network 300 may also be configured to allow personalcomputer 306 to kiosk 302-2 transfer. The transferor may authorize moneytransfers from a PC 306 located in a home or business. The PC 306 may beconnected to a peripheral device that functions as a biometric reader333 which allows the transferor to send biometric information to theprocessor 301. When the transferor's identity is verified by theprocessor 301, the transferor can manually input instructions into thePC 306 to authorize a transfer to the transferee from an accountcontrolled by the transferor.

FIG. 4 shows a flowchart for a method of registering biometricinformation according to embodiments of the invention. The method 400includes inputting identity information of registrant 402 into anidentity registration system that will associate the registrant'sidentity with biometric information supplied by the registrant. Theidentity information may include the registrant's name, home address,citizenship, gender, birthplace, birthdate, and/or social securitynumber, among other types of identity information.

The registrant's identity information may be verified 404 by, forexample, having the registrant produce one or more pieces ofverification information to a person or system conducting theregistration. Pieces of verification information that may be used toverify the identity of the registrant may include a drivers license, agreen card, a social security card, a voter registration card, a birthcertification, among other pieces of verification information. When theregistrant's identity has been verified, the registrant may input one ormore types of biometric information 406 into identity registrationsystem that will be associated with the identity. The biometricinformation supplied by the registrant may include a fingerprintinformation, handprint information, voice print information, retinalimage information, facial scan information, and/or handwritinginformation, among other kinds of biometric information.

Once the identity information and biometric information are provided,the identity registration system may verify that the biometricinformation is unique to the identified registrant 408. This willprevent a party verification processor or some other identityverification system from identifying the wrong party based on thebiometric data. This also serves as a security check against identitytheft by someone who tries to associate their biometric data withmultiple different identities. Similarly, the identity registrationsystem may verify that the identity of the registrant is unique 410. Thesystem may verify that the identity information supplied duringregistration has not already been used to register someone who hassupplied different biometric information.

Method 400 may also include associating the identity and/or biometricinformation with one or more financial accounts 412. This associationcould, for example, allow a registrant to authorized transfers from anassociated financial account just by supplying biometric informationthat verifies the account holder's identity. This may allow moneytransfers between transferor and transferees that do not require eitherparticipant to have a payment token to complete the transaction.

Referring now to FIG. 5, a flowchart for a method 500 of transferringmoney according to embodiments of the invention is shown. The method 500may include having a money transferor provide biometric information 502and the transferor's identity 504 to an identity verification system.The system may compare the biometric information to previously providedbiometric information to verify the identity of the transferor 506. Thetransferor may have provided the previous biometric information during aregistration process that associated the biometric information with averified identity of the registrant, as described in FIG. 4. When theregistration process also includes associating the registrant with oneor more financial accounts, the transferor may authorize a transfer ofmoney from an associated account without having to fill out a transferform or other paperwork.

The method 500 may also include having the transferor input moneytransfer information 508. The money transfer information may include anamount of money to be transferred, the source of funds for the transfer(e.g., physical money provided by the transferor, an account controlledby the transferor, etc.) and/or the time and location for executing thetransfer, among other information. The transferor may also inputtransfer identity information 510 as part of the money transferinformation. The transferee may be an individual or an organization.When the transferee is an organization, the transferor may input theidentity of an authorized person who can receive the money on behalf ofthe organization. Alternatively (or in addition) the identityverification system may include a list of persons who can act asauthorized transferees associated with the organization. When thetransferor inputs the name of the transferee organization, any one ofthe authorized transferees may receive the money on behalf of theorganization once his or her identity is verified.

The transferor may view a display or receive a printed receipt thatconfirms the authorization of the money transfer. The informationdisplayed and/or printed may include a money transaction transfer numberthat uniquely identifies the money transfer. The transferor can thencall, mail, email, or otherwise communicate the transfer number to thetransferee, who may need to provide the number in order to receive themoney.

When the transferee is ready to receive the money, he or she providesbiometric information 512 and identity information 514 to the identityverification system. The system uses this information to verify theidentity of the transferee 516 before the money is released. Inaddition, the system may require the transferee to provide transferidentity information 518, before the money is released to the transferee520. The transferee may provide the identity of the transferor in anumber of ways, depending on how the money is given to the transferee.When a person is involved in disbursing the money, the transferee mayspeak the identity of the transferor to that person in order to receivethe money. When a kiosk or some other machine is used to disburse themoney, the transferee may type the identity of the transferor into akeypad or keyboard that communicates with the machine.

It should be appreciated that numerous variations on the methods 400 and500 are also contemplated as embodiments of the invention. For examplethe order in which biometric information and money transfer informationare provided by the transferor may be switched. Similarly, thetransferee may provide the identity of the transferor either before orafter providing biometric information to verify the identity of thetransferee. The transferee may receive one portion of the money sent bythe transferor as physical money (i.e., cash), and another portionelectronically as a credit in a financial account or on a payment card.These and other variations are also included in the invention.

Having described several embodiments, it will be recognized by those ofskill in the art that various modifications, alternative constructions,and equivalents may be used without departing from the spirit of theinvention. Additionally, a number of well known processes and elementshave not been described in order to avoid unnecessarily obscuring thepresent invention. Accordingly, the above description should not betaken as limiting the scope of the invention.

Where a range of values is provided, it is understood that eachintervening value, to the tenth of the unit of the lower limit unlessthe context clearly dictates otherwise, between the upper and lowerlimits of that range is also specifically disclosed. Each smaller rangebetween any stated value or intervening value in a stated range and anyother stated or intervening value in that stated range is encompassed.The upper and lower limits of these smaller ranges may independently beincluded or excluded in the range, and each range where either, neitheror both limits are included in the smaller ranges is also encompassedwithin the invention, subject to any specifically excluded limit in thestated range. Where the stated range includes one or both of the limits,ranges excluding either or both of those included limits are alsoincluded.

As used herein and in the appended claims, the singular forms “a,” “an,”and “the” include plural referents unless the context clearly dictatesotherwise. Thus, for example, reference to “a process” includes aplurality of such processes and reference to “the electrode” includesreference to one or more electrodes and equivalents thereof known tothose skilled in the art, and so forth.

Also, the words “comprise,” “comprising,” “include,” “including,” and“includes” when used in this specification and in the following claimsare intended to specify the presence of stated features, integers,components, or steps, but they do not preclude the presence or additionof one or more other features, integers, components, steps, acts, orgroups.

What is claimed is:
 1. A method comprising the steps of: receiving, withat least one processor, a biometric characteristic of a user; receiving,with the at least one processor, non-biometric identity information ofthe user; verifying, with the at least one processor, the non-biometricidentity information corresponds to the user; comparing, with the atleast one processor, at least one biometric characteristic of the userto biometric characteristics associated with a plurality of previouslyregistered persons in a database; comparing, with the at least oneprocessor, non-biometric identity information of the user tonon-biometric identity information associated with the plurality ofpreviously registered persons in the database; and registering, with theleast one processor, the user by recording the biometric characteristicof the user and the non-biometric identity information of the user inthe database based at least in part on: the biometric characteristic ofthe user being unique because it does not match any individual biometriccharacteristic of the plurality of previously registered persons in thedatabase; and the non-biometric identity information of the user beingunique because it does not match any individual non-biometric identityinformation of the plurality of previously registered persons in thedatabase.
 2. The method of claim 1, further comprising: receiving a sendrequest from the user, the request including biometric information fromthe user; and causing transfer of funds based at least on the biometricinformation from the user corresponding with the biometriccharacteristic of the user.
 3. The method of claim 2, wherein the sendrequest further includes an identification of a recipient, and themethod further comprises: receiving a receive request from therecipient.
 4. The method of claim 2, wherein the send request furtherincludes an identification of a recipient, and the method furthercomprises: storing a list of persons who are authorized to collect fundson behalf of the recipient; receiving, from a person, a request toreceive funds associated with the send request; and verifying the personis in the list of persons prior to distributing funds to the requestingrecipient.
 5. The method of claim 2, wherein the send request furtherincludes an identification of a recipient, and the method furthercomprises: receiving biometric information from the recipient; andcausing transfer of funds based at least in part on the biometricinformation from the recipient corresponding with a known biometriccharacteristic of the recipient.
 6. A system comprising: a host systemhaving one or more processors configured for at least: receiving abiometric characteristic of a user; receiving non-biometric identityinformation of the user; verifying the non-biometric identityinformation corresponds to the user; comparing at least one biometriccharacteristic of the user to biometric characteristics associated witha plurality of previously registered persons in a database; comparingnon-biometric identity information of the user to non-biometric identityinformation associated with the plurality of previously registeredpersons in the database; and registering the user by recording thebiometric characteristic of the user and the non-biometric identityinformation of the user in the database based at least in part on: thebiometric characteristic of the user being unique because it does notmatch any individual biometric characteristic of the previouslyregistered persons in the database; and the non-biometric identityinformation of the user being unique because it does not match anyindividual non-biometric information of the plurality of previouslyregistered persons in the database.
 7. The system of claim 6, whereinthe host system is further configured for at least: receiving a sendrequest from the user, the request including biometric information fromthe user; and causing transfer of funds based at least on the biometricinformation from the user corresponding with the biometriccharacteristic of the user.
 8. The system of claim 7, wherein the sendrequest further includes an identification of a recipient, and the hostsystem if further configured for at least: receiving a receive requestfrom the recipient.
 9. The system of claim 7, wherein the send requestfurther includes an identification of a recipient, and the host systemif further configured for at least: storing a list of persons who areauthorized to collect funds on behalf of the recipient; receiving, froma person, a request to receive funds associated with the send request;and verifying the person is in the list of persons prior to distributingfunds to the requesting recipient.
 10. The system of claim 7, whereinthe send request further includes an identification of a recipient, andthe host system if further configured for at least: receiving biometricinformation from the recipient; and causing transfer of funds based atleast in part on the biometric information from the recipientcorresponding with a known biometric characteristic of the recipient.11. A non-transitory machine readable medium having instructions storedthereon, the instructions executable by one or more processors for atleast: receiving a biometric characteristic of a user; receivingnon-biometric identity information of the user; verifying thenon-biometric identity information corresponds to the user; comparing atleast one biometric characteristic of the user to biometriccharacteristics associated with a plurality of previously registeredpersons in a database; comparing non-biometric identity information ofthe user to non-biometric identity information associated with theplurality of previously registered persons in the database; andregistering the user by recording the biometric characteristic of theuser and the non-biometric identity information of the user in thedatabase based at least in part on: the biometric characteristic of theuser being unique because it does not match any individual biometriccharacteristic of the plurality of previously registered persons in thedatabase; and the non-biometric identity information of the user beingunique because it does not match any individual non-biometric identityinformation of the plurality of previously registered persons in thedatabase.
 12. The non-transitory machine readable medium of claim 11,wherein the instructions are further executable for at least: receivinga send request from the user, the request including biometricinformation from the user; and causing transfer of funds based at leaston the biometric information from the user corresponding with thebiometric characteristic of the user.
 13. The non-transitory machinereadable medium of claim 12, wherein the send request further includesan identification of a recipient, and the instructions are furtherexecutable for at least: receiving a receive request from the recipient.14. The non-transitory machine readable medium of claim 12, wherein thesend request further includes an identification of a recipient, and theinstructions are further executable for at least: storing a list ofpersons who are authorized to collect funds on behalf of the recipient;receiving, from a person, a request to receive funds associated with thesend request; and verifying the person is in the list of persons priorto distributing funds to the requesting recipient.