Authorisation of a transaction
A transaction and user authorization technology, applied in the direction of protocol authorization, user identity/authority verification, coin-free or similar appliances, etc., can solve the problem of inability to decrypt encrypted code words, and achieve the effect of increasing acceptance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] figure 1 A backend system 10 with a server 12 and a database 14 is shown. The server 12 is realized in the form of a high-efficiency computer, which is controlled by a program according to the method described below. Background system 10 serves multiple terminals on network 16, figure 1 One of the terminals 18 is shown as an example in . The network 16 may have multiple subsections, which may be implemented, for example, as a local area network and / or a data packet network (such as the Internet) and / or an analog or digital telephone network.
[0025] In this exemplary embodiment, the terminal 18 is designed as a small stand-alone device with operating means such as a keyboard or keypad 20, display means such as a graphic display 22 and means for calculating biometric features. In this exemplary embodiment, a fingerprint sensor 24 and a camera 26 are provided for the latter purpose. In alternative embodiments, more or fewer or other biometric sensors may be provided....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 