Method for Replacing Traditional Payment and Identity Management Systems and Components to Provide Additional Security and a System Implementing Said Method

a technology of a payment and identity management system, applied in the field of digital and electronic wallets, can solve the problems of limiting the use and acceptance of digital wallet software solutions, the inability to fully secure mobile devices with digital wallet technologies, and the number of false starts of an already skeptical consumer market, so as to reduce the number and variety of devices, increase the security of the user authentication process and the consumer transaction, and reduce the number of payment devices and methods carried by users

Inactive Publication Date: 2014-04-17
GARMIN INT
View PDF6 Cites 96 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010]The present invention provides unique alternatives to reducing the number and variety of devices holding personal information within a wallet while increasing security of the user authentication process and the consumer transaction. To conform to current payment methods, rather than requiring any special software or equipment modifications by a merchant or bank, this invention reduces the number of payment devices and methods carried by a user and increases security while working within the paradigm of the current magnetic stripe readers, contactless NFC and EMV systems, and bar code payment methods that are so prevalent within society today. Further, this invention addresses chief security concerns not only with physical electronic wallets, but also digital wallets on mobile devices such as cell phones, which desperately need authentication and security solutions to overcome current mobile payment security deficiencies and user perceptions.
[0011]This invention improves security by requiring authentication between a user and two devices (i.e., the first and second devices) prior to any transaction taking place. The first device is an electronic vault device that can be physically part of a physical wallet, insert to a wallet, or in other embodiments, wearable / portable devices such as money clips, key chain accessories, watches, dongles, cell phone accessories, or any other device typically carried or worn by an individual. The first device requires unique user-configurable, biometrically enabled multi-factor authentication to ensure only owners and their private information can be copied into the secure vault wallet device. Authenticated users may then select payment information, identification information, medical information or virtually any private information via touch display or voice command on the first device, or alternatively on the second device after a successful authentication.
[0012]Encrypted information can be then sent from the first device to the second device, after successful authentication. The second device can comprise a programmable card having a dynamic magnetic stripe, a cell phone, or a display device displaying a payment barcode to replicate the selected private information stored on the first device. This method and attendant devices reduces the number of cards and other devices a user must carry. The second device may include mobile devices such as cell phone, tablets and laptops, or fixed devices such as desktop PCs and the like. The second device then acts as a conduit to provide private information via other communication methods such as NFC or dynamic magnetic stripe for financial transactions, and HIPPA controlled communication methods for private medical documents.

Problems solved by technology

However, many shortcomings have limited the use and acceptance of digital wallet software solutions as the technology migrates to mobile devices.
The chief issue with mass consumer acceptance of “mobile money” solutions involves securing private information on the devices as well as securing authentication information during the transaction itself.
As evident in recent reviews, digital wallet technologies on cell phones will be further challenged to fully secure mobile devices.
Security holes within operating systems and firewalls have caused numerous false starts to an already skeptical consumer market.
Even if security concerns can be overcome, the perception of the public to utilize cell phones that have open access via the internet is questionable.
Furthermore, a simple biometric key that authenticates with a server in the cloud does nothing to address hacking of the device and using the captured bio-key improperly “remotely” over the internet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for Replacing Traditional Payment and Identity Management Systems and Components to Provide Additional Security and a System Implementing Said Method
  • Method for Replacing Traditional Payment and Identity Management Systems and Components to Provide Additional Security and a System Implementing Said Method
  • Method for Replacing Traditional Payment and Identity Management Systems and Components to Provide Additional Security and a System Implementing Said Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]Before describing in detail the particular methods and apparatuses related to replacing traditional payment and identify management systems and components with methods and components that provide additional levels of security, it should be observed that the embodiments of the present invention reside primarily in a novel and non-obvious combination of elements and method steps. So as not to obscure the disclosure with details that will be readily apparent to those skilled in the art, certain conventional elements and steps have been presented with lesser detail, while the drawings and the specification describe in greater detail other elements and steps pertinent to understanding the embodiments. The presented embodiments are not intended to define limits as to the structures, elements or methods of the inventions, but only to provide exemplary constructions. The embodiments are permissive rather than mandatory and illustrative rather than exhaustive.

[0041]The present inventio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An electronic wallet system that protects payment accounts, identification and other personal information found within a typical wallet with a secure electronic vault (first) device that can be part of a physical wallet, insert to a wallet, or in other embodiments, wearable/portable devices. A unique biometrically enabled multi-factor authentication process ensures only owners of the information can copy the information to the device or retrieve it thereafter. Authenticated users may then select payment, identification, medical or virtually any private information via touch display or voice command on the vault or on another (second) device that operates in conjunction with the vault. The second device comprises, for example, a programmable card with dynamic magnetic stripe, cell phone, or other wearable technology, that initiates and processes a payment and/or transfer of private information.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This patent application claims the benefit of the U.S. provisional patent application filed on Oct. 8, 2012 and assigned Application No. 61 / 710,826, which is incorporated herein.FIELD OF THE INVENTION[0002]The present invention relates to the field of digital and electronic wallets, specifically methods and related apparatuses for securing private information found within a typical wallet, such as payment accounts, payment cards, identification information, medical information and records, and virtually any private information desired to be carried by a person.BACKGROUND OF THE INVENTION[0003]Prior art digital wallets focus on financial transactions, attempting to replace current technologies of credit and debit cards and the like with mostly electronic commerce (e-commerce) and similar methods and devices. Likewise, security concerns for most digital wallet technologies are focused primarily on the transaction between the customer, merch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q20/36
CPCG06Q20/363G06Q20/321G06F21/6245G06Q20/3552G06Q20/357G06Q20/3674
Inventor TUNNELL, CHARLES DAVIDMITCHELL, JUSTINPEREIRA, GINOZURASKY, JACOB
Owner GARMIN INT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products