Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
VERIFICATION SYSTEM AND METHOD
Document Type and Number:
WIPO Patent Application WO/2002/032151
Kind Code:
A2
Abstract:
A system and method of combining a transmission protocol or standard such as Bluetooth with a writing instrument. In an embodiment, the writing instrument may be further instrumented to record measurements during a writing event, wherein the measurements may include biometric data such as writing force, angles, accelerations, fluidity, speed, etc. The writing instrument may transmit the measurements to a verification device that may process the measurements, and in one embodiment, compare the measurements to a known template or data set to provide authorization of a writing instrument user. In one embodiment, the authorization may be displayed on a verification system screen or display, while in other embodiments, the authorization system may utilize a communications protocol or standard such as Bluetooth, to transmit an authorization code to the writing instrument or other such device, for display.

Inventors:
DESCHRIJVER STEFAAN
Application Number:
PCT/US2001/031833
Publication Date:
April 18, 2002
Filing Date:
October 11, 2001
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LCI SMARTPEN NV (US)
International Classes:
G06F3/0354; G06F3/038; G06F21/32; G06K9/00; G07C9/00; (IPC1-7): H04Q/
Attorney, Agent or Firm:
Kelly, Edward J. (MA, US)
Download PDF:
Claims:
Claims:
1. An identification system, comprising: a verification system for receiving data, processing data, and transmitting verification results; a data collection device for collecting data, transmitting data to the verification system, and receiving verification results; and, a communication protocol to allow communication between the verification system and the data collection device.
2. A system according to claim 1, wherein the communication protocol further comprises encryption and decryption.
3. A system according to claim 2, wherein the data collection device is connected to the verification device by a wire.
4. A system according to claim 2, wherein the communication protocol is a wireless communication protocol.
5. A system according to claim 4, wherein the communication protocol is Bluetooth.
6. A system according to claim 1, wherein the data collection device further comprises sensors to collect biometric data.
7. A system according to claim 1, wherein the data collection device is a writing instrument to collect biometric data from a writing event.
8. A system according to claim 1, wherein the verification system further comprises a receiver and a verification module, wherein: the receiver receives signals containing collected data and transmits signals containing a verification result; and, the verification module processes the received signals, compares the processed signals to previously stored signals, and based upon the comparison, generates the verification result for transmission by the receiver.
9. An identification method, comprising : designating a verification system for receiving data, processing data, and transmitting verification results ; designing a data collection device for collecting data, transmitting data to the verification system, and receiving verification results; and, establishing a communication protocol to allow communication between the verification system and the data collection device.
10. A method according to claim 9, wherein establishing a communication protocol further comprises providing encryption and decryption.
11. A method according to claim 10, wherein designing a data collection device further comprising connecting the data collection device to the verification device by a wire.
12. A method according to claim 10, wherein establishing a communication protocol further comprises implementing a wireless communication protocol.
13. A method according to claim 12, wherein establishing a communication protocol comprises implementing Bluetooth.
14. A method according to claim 9, wherein designing a data collection device further comprises designing sensors to collect biometric data.
15. A method according to claim 9, wherein designing a data collection device comprises implementing a writing instrument to collect biometric data from a writing event.
16. A method according to claim 9, wherein designating a verification system further comprises identifying a receiver and identifying a verification module, wherein: identifying a receiver comprises identifying a device that receives signals containing collected data and transmits signals containing a verification result; and, identifying a verification module comprises identifying a device that processes the received signals, compares the processed signals to previously stored signals, and based upon the comparison, generates the verification result for transmission by the receiver.
17. A method according to claim 16, further comprising establishing a connection between the receiver and the verification module.
18. A method according to claim 17, further wherein establishing a connection further comprises providing an internet connection between the receiver and the verification module.
19. A method according to claim 17, wherein establishing a connection further comprises providing a wireless connection between the receiver and the verification module.
Description:
VERIFICATION SYSTEM AND METHOD Field of the Invention The present invention relates generally to identification systems, and more particularly to allowing remote operation of identification systems using wireless communications.

Description of the Prior Art The problem of identification is prevalent in modern society. The expansion of computer record systems and the development of e-commerce has led to a desire to find additional ways to verify a user's identity digitally. As commerce and monetary systems integrate computer systems, the need to transact sales with a user who is anonymous and not physically present is increased. Many transaction systems rely on the purchaser's physical presence to insure security.

Checks require an individual to be present to sign the check in the presence of an employee, thereby increasing the probability of detecting forgery.

Transactions over phones, the internet, and other anonymous systems are becoming more important as the world moves towards a new type of commerce. The retail store is being replaced by the virtual store where consumers and retail employees do not interact, where consumers can shop at anytime, and transactions are accomplished by exchanging digital information. With

the advent of this new type of commerce, there is a need for a new type of security.

Currently, transactions over networks such as the internet or phone lines, use traditional payment means including credit cards or mailed checks. This system presents problems in that the seller cannot verify the buyer's identity before sending the product, or alternately the seller must verify payment before shipping, thereby eliminating the speed benefit of this new type of commerce.

In addition to the need for improved identification for commerce, there is also a need for easy digital identification over similar networks for other purposes.

One of these is the"paperless office", where official documents and formal agreements, as well as everyday paperwork are stored on a computer for ease of access and elimination of extraneous paper. In these transactions, there is also a need for positive identification of those who create and use documents.

In particular, there is a desire for an"instant agreement"involving parties in separate locations negotiating and executing an agreement without ever being in physical contact. Such a system could dramatically decrease the difficulty in obtaining legal documents, or recording official approval for actions.

In response to this heightened need for devices that can digitally recognize and record identification information, devices have been built for internet use,

or across other networks, to provide increased security for electronic transactions by switching from a manual identification process to a digital identification process. Computers are effective at matching large strings of information that can be represented digitally very quickly, and in many respects the digital methods are more effective in insuring accurate identification than the manual methods. Some of these products include bioscanners such as fingerprint or palm print readers, self encoded security cards or smartcards, and signature . analyzing devices.

To achieve full functionality and wide acceptance, identification devices should be available to the user in any location where identity authentication is desired. As computers pervade more facets of society, the number of such places demanding identity authentication increases, and includes homes, offices, security checkpoints, retail outlets, and numerous other locations. The device can be available at the location it will be used, or the device can be easily transportable with the user.

The former of these options is currently the solution for many identification purposes. Credit card scanners, passcode entry pads, etc., are examples of portable identity authentication devices. A difficulty arises for users that are separated from known systems.

Not all systems are integrated to allow access by all users. For example, it can be difficult to enter a

password into a telephone or pager system, or to type an English password on a Japanese keyboard. In addition, the device to access the verification device may not communicate with the verification device due to different operating systems or architectures. This is problematic because it requires the user to be physically present with the system.

For example, consider commerce over a network.

This system requires the user to have a possible scanner at every computer or terminal where they would perform a transaction, therefore the systems would all be public access and are susceptible to tampering. Additionally, such public access areas could be undesirably located and dangerous to use. The scanner's increased use also increases the likelihood of malfunction and repair, thereby denying user access.

To make a universally acceptable digital identification device, portability is desirable to allow each individual complete control over his/her device.

It is also desirable for this device to be able to interact with networks so that verification could be performed at a location external to the receiving device. Finally, it is desirable that the identification device require user input so that device theft does not result expose the owner to a security breach.

This last point is best visualized by the ubiquitous credit card. The card has many of the above-

mentioned desirable facets, but unfortunately also includes many undesirable features regarding falsification and theft. Credit cards are readily transferred and used, and beyond a signature verification that is rarely examined, credit cards do not actively authenticate the owner's identity during a given transaction.

There is presently not an identification system that identifies the owner in a transaction with a high degree of accuracy, while still being easily transportable.

What is needed is a system and method that provide remote, digital, and reliable identification.

Summary of The Invention The invention herein is a system and method that utilize a portable device with a verification database and a universally accepted communication standard to provide identity authentication. Because of the diverse problems with a locally available solution on a client machine in a client-server configuration, the portable device herein allows a user to maintain communication with a verification device, or any receiving device with connections to a verification device. The portable device interconnects with a variety of other devices, in a variety of circumstances, through a universal communication link. The method and apparatus allows communication to any type of receiving device that can

subsequently access the Internet, where a verification database or other verification tool is available.

In an embodiment, the system and method record data associated with a user, allow for transferring the data to a verification system for comparison to a template, and subsequently provide a user identification result indicating whether or not the user identity is authenticate. In one embodiment, the system and method comprise a device that records biometric information.

An identity verification system is compiled using data acquired from registered users. Subsequently, users may obtain reliable identity verification by remotely accessing the database using a universally accepted communication standard with associated protocols, such as Bluetooth. Data extracted provided by the user from a remote, portable device is communicated either directly or indirectly to the verification system, and the verification system compares the received user data with the verification system data to provide an identity decision. The identity decision, indicating either positive identification or negative identification, is transmitted from the verification system to the requesting device. In the preferred embodiment, the provided user data comprises biometric data.

Other objects and advantages of the present invention will become more obvious hereinafter in the specification and drawings.

Brief Description of the Drawings A more complete understanding of the invention and many of the attendant advantages thereto will be readily appreciated as the same becomes better understood by reference to the following detailed description when considered in conjunction with the accompanying drawings, wherein like reference numerals refer to like parts and wherein : FIG. 1 presents a block diagram of a system practicing the principles of the invention; and, FIG. 2 presents an alternate system from A system according to FIG. 1, in which the receiving and verifying systems are connected through the internet.

Best Mode For Carrying Out The Invention To provide an overall understanding of the invention, certain illustrative embodiments will now be described; however, it will be understood by one of ordinary skill in the art that the systems described herein can be adapted and modified to provide systems for other suitable applications and that other additions and modifications can be made to the invention without departing from the scope hereof.

Although the discussion herein shall disclose the invention primarily in terms of the publicly available "bluetooth"communications standard, the invention herein is not so limited and is applicable to any

communication standard that provides the capability to access the Internet using a computer or specialized receiving device.

Referring now to FIG. 1, there is shown a general diagram of one embodiment of the invention wherein the remote, portable device for generating user data comprises a biometric device writing implement 10 such as the LCI-SMARTpent ; however, the system and method presented herein is not so limited to the exact device, or even a biometric device, and is widely applicable to any remote, portable device that accepts user information. The embodiment shown in FIG. 1 employs the biometric signature analyzing device to obtain user data at a remote location. As shown by FIG. li the pen 10 records various biometric processes related to the signature 12 as the signature is placed on a writing surface 14. In this embodiment, the biometric data includes the writing speed, the writing pressure, forces, and angles measured during the writing event, and writing fluidity (i. e., stops and starts), although the invention herein is not limited to such measurements. In the illustrated system, the biometric data is transmitted 18 to a verification device 20, and in this embodiment, the verification device 20 is a computer, such as a personal computer, SUN workstation, personal digital assistant (PDA), handheld computer, etc., but the invention herein is not so limited, and the verification device may be any microprocessor-

controlled device capable of receiving a signal and comparing it against a known template. In all instances, the transmission may be wired or wireless.

Similarly, it is not necessary that the writing instrument produce a perceivable output to the human eye, and the writing surface is irrelevant to the invention herein; therefore, the writing instrument may also be in the form of, for example, a stylus.

A system according to FIG. 1 illustrates an antenna 32 for reception of the signal'from the pen, however other embodiments for receiving the Bluetooth signal may be utilized, including for instance, an infrared port that is built-in to a handheld computer.

Referring now to FIG. 2, there is shown a configuration providing an alternate embodiment of the invention wherein the receiving device is not the verification system. In FIG. 2, the writing instrument 10 records the various biometric processes from the signature 12 on the writing surface 14 and transmits 18, using Bluetooth in the illustrated embodiment, the biometric data to a receiving device 22 that is not capable of verifying the signature, but is rather an intermediate device that relays the data to the verifying device 20. In the illustrated embodiment of FIG. 2, the medium connecting the receiving device 22 and the verifying device 20 is the internet ; however, the transmission from receiving device 22 to verifying device 20 may be wired or wireless in all instances, and

the invention herein is not limited to the transmission medium or protocol. Although FIG. 2 depicts a scenario indicating separate receiving and verification devices, the remainder of this specification shall not make such a distinction between the two devices, and it shall be understood that references to the verification system or device implies an architecture wherein the devices are the same, and also an architecture wherein the devices are separate and linked directly or indirectly through a communication channel.

Because a main feature of the present invention is portability, the preferred embodiment implements wireless communications for all data transfers.

Wireless transmission also eliminates wired system compatibility and wear and tear issues. In the wireless embodiment, the portable device therefore preferably comprises an antenna or other transmission device for transmitting data.

Because communications standards and protocols vary widely amongst industries and applications, a secure, globally recognized, and universally accepted communication protocol among verification system devices is desired. Additionally, data encryption and decryption is also required for secure communications; and, a communication protocol and standard that is impervious to other devices and systems is necessary.

In the illustrated embodiments, the well-known Bluetooth standard may be used for the apparatus and

system communication standard. Bluetooth is a well- known, open communications standard providing short- range wireless connectivity between a multitude of devices, although the invention herein is not so limited. Bluetooth uses radio frequency transmission in the 2.4 GHz ISM band and is compatible with a multitude of different devices including cellular phones, computers, and Personal Digital Assistants. The 2.4 GHz ISM radio frequency band is used by Bluetooth worldwide, thereby providing a geographically unrestricted standard. Because Bluetooth is not proprietary, but is an open standard, transmitting and receiving devices may be readily manufactured without licensing or complex compatibility issues. An additional Bluetooth benefit includes the capability to automatically detect other Bluetooth compatible devices within the short-range region. This feature allows instant compatibility between the verification system and the remote device that obtains the user data, with virtually no user knowledge. Systems with different operating systems and interfaces may be added to the network of verification systems without compatibility concerns. The source and destination of transmissions is also not fixed, providing lower probability of intercepting signals.

The Bluetooth standard also provides another aspect of the invention herein, which is encryption and authentication technology to prevent signal interception or interference. Another Bluetooth advantage that may

be incorporated in the invention herein is power adaptation based upon range requirements.

One advantage of the current invention is that the advantages of the Bluetooth communications standard and protocol may be combined with a portable instrumented device such as a writing instrument, to provide portable authorization systems.

What has thus been described is a system and method of combining a transmission protocol or standard such as Bluetooth with a writing instrument. In an embodiment, the writing instrument may be further instrumented to record measurements during a writing event, wherein the measurements may include biometric data such as writing force, angles, accelerations, fluidity, speed, etc. The writing instrument may transmit the measurements to a verification device that may process the measurements, and in one embodiment, compare the measurements to a known template or data set to provide authorization of a writing instrument user. In one embodiment, the authorization may be displayed on a verification system screen or display, while in other embodiments, the authorization system may utilize a communications protocol or standard such as Bluetooth, to transmit an authorization code to the writing instrument or other such device, for display.

Although the present invention has been described relative to a specific embodiment thereof, it is not so limited. Obviously many modifications and variations of

the present invention may become apparent in light of the above teachings. For example, although the Bluetooth communication standard was presented, any secure, wireless communication standard or protocol may be used. The preferred embodiment included a pen with biometric sensors, however the user data collection may be performed by any device, and the data may be biometric data or other user-specific information. The verification system may comprise a receiver and a separate verification module, or a single device performing both capabilities. The user-data collection device may have a wired or wireless connection to the verification system.

Many additional changes in the details, materials, steps and arrangement of parts, herein described and illustrated to explain the nature of the invention, may be made by those skilled in the art within the principle and scope of the invention. Many additional changes in the details, materials, steps and arrangement of parts, herein described and illustrated to explain the nature of the invention, may be made by those skilled in the art within the principle and scope of the invention.

Accordingly, it will be understood that the invention is not to be limited to the embodiments disclosed herein, may be practiced otherwise than specifically described, and is to be understood from the following claims, that are to be interpreted as broadly as allowed under the law.