U.S. patent application number 13/105989 was filed with the patent office on 2011-09-01 for customer and purchase identification based upon a scanned biometric of a customer.
This patent application is currently assigned to BANK OF AMERICA CORPORATION. Invention is credited to Timothy J. Bendel, Debashis Ghosh, Joseph A. Giordano, Christopher R. Griggs, David Joa, Kurt D. Newman, Michael James O'Hagan.
Application Number | 20110213709 13/105989 |
Document ID | / |
Family ID | 44505818 |
Filed Date | 2011-09-01 |
United States Patent
Application |
20110213709 |
Kind Code |
A1 |
Newman; Kurt D. ; et
al. |
September 1, 2011 |
CUSTOMER AND PURCHASE IDENTIFICATION BASED UPON A SCANNED BIOMETRIC
OF A CUSTOMER
Abstract
Systems and methods for biometrically identifying an individual
for purchasing a product and/or service without a need for the
individual to input authentication data into a system/device are
described. Data representative of a scanned iris of a customer
desiring to make a purchase may be made. The customer may be
identified based upon the scanned iris. A determination may be made
as to whether the identified customer desires to make a purchase
with an associated payment amount from an entity. A determination
may be made as to whether the identified customer has a default
purchase at the entity. Information of an account of the customer
to make a purchase may be received and funds in the account may be
debited by the associated payment amount. An item corresponding
with the purchase based upon the scanned iris may be
determined.
Inventors: |
Newman; Kurt D.; (Matthews,
NC) ; Griggs; Christopher R.; (Hickory, NC) ;
Giordano; Joseph A.; (Waxhaw, NC) ; Ghosh;
Debashis; (Charlotte, NC) ; Joa; David;
(Pacifica, CA) ; Bendel; Timothy J.; (Charlotte,
NC) ; O'Hagan; Michael James; (Charlotte,
NC) |
Assignee: |
BANK OF AMERICA CORPORATION
Charlotte
NC
|
Family ID: |
44505818 |
Appl. No.: |
13/105989 |
Filed: |
May 12, 2011 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
12242804 |
Sep 30, 2008 |
|
|
|
13105989 |
|
|
|
|
61026387 |
Feb 5, 2008 |
|
|
|
61057829 |
May 31, 2008 |
|
|
|
Current U.S.
Class: |
705/44 |
Current CPC
Class: |
G06Q 20/40 20130101;
G07C 9/257 20200101; G06K 9/00604 20130101; G07F 7/1008 20130101;
G06F 21/32 20130101; G06Q 20/20 20130101; G06Q 10/06 20130101; G06Q
20/40145 20130101 |
Class at
Publication: |
705/44 |
International
Class: |
G06Q 40/00 20060101
G06Q040/00 |
Claims
1. An apparatus comprising: at least one processor; and at least
one memory having stored therein computer executable instructions,
that when executed by the at least one processor, cause the
apparatus to perform a method of: identifying a customer based upon
a scanned iris of the customer; determining whether the identified
customer desires to make a purchase with an associated payment
amount from an entity; determining whether the identified customer
has a default purchase at the entity; receiving information of an
account of the customer to make a purchase; decreasing funds in the
account by the associated payment amount; and determining an item
corresponding with the purchase based upon the scanned iris.
2. The apparatus of claim 1, further comprising an iris scanner
configured to scan the iris of the customer.
3. The apparatus of claim 1, further comprising initiating an
instruction to provide the item to the customer.
4. The apparatus of claim 1, wherein the default purchase is the
item.
5. The apparatus of claim 1, the at least one memory having stored
therein further computer executable instructions, that when
executed by the at least one processor, cause the apparatus to
perform a method of determining whether sufficient funds exist in
the account to make the purchase.
6. The apparatus of claim 1, wherein determining whether the
identified customer has the default purchase at the entity includes
receiving customer designated information representative of at
least one default item to purchase associated with the entity.
7. The apparatus of claim 6, wherein determining whether the
identified customer has the default purchase at the entity
includes: determining whether the received customer designated
information includes information representative of different
purchase items for different times of a day; determining a time of
day the customer is identified.
8. The apparatus of claim 6, wherein determining whether the
identified customer has the default purchase at the entity
includes: determining whether the received customer designated
information includes information representative of different
purchase items for different events; determining an event when the
customer is identified.
9. The apparatus of claim 8, wherein the event is an exterior
weather temperature.
10. The apparatus of claim 8, wherein the event is a time of
year.
11. A computer-implemented method comprising: scanning an iris of a
customer of an entity; identifying the customer based upon the
scanned iris; determining whether the identified customer desires
to make a purchase with an associated payment amount from the
entity; determining whether the identified customer has a default
purchase at the entity; receiving information of an account of the
customer to make a purchase; decreasing funds in the account by the
associated payment amount; and determining an item corresponding
with the purchase based upon the scanned iris.
12. The computer-implemented method of claim 11, wherein the
default purchase is the item.
13. The computer-implemented method of claim 11, further comprising
determining whether sufficient funds exist in the account to make
the purchase.
14. The computer-implemented method of claim 11, wherein
determining whether the identified customer has the default
purchase at the entity includes receiving customer designated
information representative of at least one default item to purchase
associated with the entity.
15. The computer-implemented method of claim 14, wherein
determining whether the identified customer has the default
purchase at the entity includes: determining whether the received
customer designated information includes information representative
of different purchase items for different times of a day;
determining a time of day the customer is identified.
16. The computer-implemented method of claim 14, wherein
determining whether the identified customer has the default
purchase at the entity includes: determining whether the received
customer designated information includes information representative
of different purchase items for different events; determining an
event when the customer is identified.
17. The computer-implemented method of claim 16, wherein the event
is an exterior weather temperature.
18. The computer-implemented method of claim 16, wherein the event
is a time of year.
19. One or more non-transitory computer-readable media storing
computer-readable instructions that, when executed by at least one
computer, cause the at least one computer to perform a method of:
scanning an iris of a customer of an entity; identifying the
customer based upon the scanned iris; determining whether the
identified customer desires to make a purchase with an associated
payment amount from the entity; determining whether the identified
customer has a default purchase at the entity; receiving
information of an account of the customer to make a purchase;
decreasing funds in the account by the associated payment amount;
and determining an item corresponding with the purchase based upon
the scanned iris.
20. The one or more non-transitory computer-readable media of claim
19, wherein determining whether the identified customer has the
default purchase at the entity includes: receiving customer
designated information representative of at least one default item
to purchase associated with the entity, determining whether the
received customer designated information includes information
representative of different purchase items for one of: different
times of a day and different events, and determining one of: a time
of day the customer is identified and an event when the customer is
identified.
Description
RELATED APPLICATIONS
[0001] This application is a divisional application based on U.S.
application Ser. No. 12/242,804, filed Sep. 30, 2008, entitled
"Authentication Systems, Operations, Processing, and Interactions,"
which claims priority from U.S. Provisional Patent Application Ser.
No. 61/026,387, filed Feb. 5, 2008, entitled, "Payment Acquisition,
Routing, and Processing," and U.S. Provisional Patent Application
Ser. No. 61/057,829, filed May 31, 2008, entitled, "Authentication
Systems, Operations, Processing, and Interactions." The contents of
the aforementioned applications are hereby incorporated by
reference in their entirety.
BACKGROUND
[0002] Convenience in transactional purchases, whether for products
or services, is a useful tool in attracting and maintaining
customers for an entity providing products and/or services. With
respect to purchases, credit cards and stored value cards have
become widely used. Under such systems, a user presents a card or a
device with account information. Then upon payment authorization,
goods and/or services are purchased. Such systems carry operational
situations that may be harmful to both a customer and an entity
providing a service and/or product.
[0003] Fraud has been increasing steadily under such systems. The
actual fraud loss amount in addition to fraud detection capability
development to reduce fraud losses are large business expenses. In
addition, theft of credit or debit cards or information associated
with such cards has led to an increase in identify theft.
Correction of fraudulent transaction by identify theft is costly
both for a consumer and for entities associated with the fraudulent
purchases by the thief.
[0004] In addition, under such systems, a purchaser has to carry a
card or a device to the Point of Sale (POS) to initiate a
transaction. If a purchaser wants to purchase a product at a store
and forgets her purse with the card or device in it, she cannot
complete the transaction. Although new payment technology
developments, including touch less transactions supported by radio
frequency identification (RFID) chips in devices such as cell
phones, are supported through current networks, a user must still
have the RFID chip on her.
[0005] FIG. 3 illustrates a card payment system. At 301, a payer
presents a card or a device with account information to a merchant.
The merchant sends the transaction information on the card or
device to a transaction acquiring bank in step 303. Such a
situation may occur when a merchant swipes the credit card of the
payer in a card reading machine and the data on the card is
transferred to the transaction acquiring bank. In 305, the
transaction acquiring bank sends a message to the card issuing bank
through card networks to request a transaction authorization.
[0006] In 307, the card issuing bank issues an authorization to the
transaction acquiring bank.
[0007] Upon receipt of the authorization at the POS in 309, the
payer provides a signature or inputs a Personal Identification
Number (PIN) to conduct the transaction as an authentication of the
payer. The transaction acquiring bank presents the actual charge to
the card issuing bank in 311. In 313, the card issuing bank sends
the payment to the transaction acquiring bank. In 315, the payer
eventually pays the issuing card bank for the transaction and/or
acquires debt to the issuing card bank and the merchant eventually
receives payment from the transaction acquiring bank. Interchange
and processing fees are withheld from the payment prior to
crediting the merchants account. The interchange fees cover costs
for the transaction including credit risk, fraud risk, and the
transaction processing. Such a system demonstrates the need for a
card or device for authentication of the payer.
[0008] Still further, funding accounts for payments are primarily
limited to demand deposit accounts (DDA) (debit card transactions)
and unsecured line of credit (credit card transactions). Each
funding account requires a different card or account number for use
and/or operation. Therefore, if a payer desires to charge different
transaction types to different accounts, she has to maintain
different payment cards or devices. Such a situation requires a
payer to maintain a number of different cards or devices on her
person.
[0009] Still further, identification of an individual still may not
prevent fraud or other illegal activities from occurring. For
example, a vault system that includes some type of identification
before allowing entry into the vault may be harmed by a number of
problems. First, an individual may be forced to open a vault system
and a thief merely follows the person in. Second, in another
scenario, a user may legally gain access to the vault and then have
to prop the door of the vault open for exiting the vault. Such a
scenario allows an unauthorized individual to slip into the vault
and take something while the legal individual is occupied carrying
items out of the vault. Third, a user may be authorized to enter
into the vault but remove nothing or only certain items of known
weight. However, without systems of prevention in place, a user may
be authorized to enter and then take more than allowed o take with
them.
[0010] In addition, security of a building can be affected by
unauthorized individuals being in unauthorized areas. Locks on
doors prevent individuals without keys from entering, but once in,
a person can enter areas that she is not authorized to enter. Such
a scenario allows a person that has gotten in or successfully
bypassed a security measure to move freely about a facility or
building. Should she even later be detected, she can exit out of a
certain point without restriction.
[0011] General retail transactions can force individuals to have to
wait for long periods of time. If too long, an individual may
choose to take her business elsewhere at that time or even in the
future. Still further, even if the individual decides to wait in
line the entire time, more time is lost in servicing the individual
for her specific need. As such, a customer waits in line and then
has to explain the needed service or product when interacting with
a person or machine.
[0012] Still further, identification of patients in a hospital
ensures minimal mistakes with respect to incorrect treatment or
medication, in addition to proper location of the patient. A
patient suffering from Alzheimer's disease may find herself walking
outside of a treatment home or hospital or into areas that she
should not be. If a loved one comes to visit, an orderly or other
individual may have to take considerable time to locate the
patient.
SUMMARY
[0013] In light of the foregoing background, the following presents
a simplified summary of the present disclosure in order to provide
a basic understanding of some aspects of the invention. This
summary is not an extensive overview of the invention. It is not
intended to identify key or critical elements of the invention or
to delineate the scope of the invention. The following summary
merely presents some concepts of the invention in a simplified form
as a prelude to the more detailed description provided below.
[0014] Aspects of the present disclosure are directed to a method
and system for a new payment routing system to create a direct
linkage between a Point of Sale (POS) and a financial entity to
reduce cost and enable creation of proprietary touch less and token
less transactions.
[0015] For payments where a funding account is associated with a
particular entity account, aspects of the present disclosure
recognize and use various transaction acquisition protocols, some
of which may be proprietary (traditional card, touch less using
radio frequency identification [RFID], and token less transactions
acquired through biometric identification). Additionally, various
account types, and sub-accounts thereof, may be used to fund the
payments.
[0016] For payments where the funding account is not associated
with a particular entity account, in accordance with aspects
herein, the financial entity may act as a transaction acquiring
bank and process a transaction as a traditional card transaction
using existing networks and protocols. When funds for the payment
are received by the financial entity, they may be transferred to a
financial institution and an account designated by the
merchant.
[0017] Another aspect of the present disclosure is directed to
methods and systems for biometrically identifying an individual for
purchasing a product and/or service without a need for the
individual to input authentication data into a system/device.
[0018] Aspects of the present disclosure are directed to
authentication systems, operations, processing, and interactions.
Aspects describe authentication systems for security and vaults
that are configured to authorize only specific individuals entry
into a vault or area. Aspects describe systems to prevent
maintaining a doorway open into the area or vault in addition to
unauthorized entry or exit of people or things into or out of such
areas or vaults.
[0019] Other aspects of the present disclosure are directed to
building security authentication and tracking systems to allow
authorized individuals into certain buildings or areas and
preventing unauthorized individuals from entering and/or accessing
certain buildings or areas. Aspects describe tracking of
individuals throughout a building or facility to ensure authorized
access in addition to identification of individuals in the event of
an emergency and/or disaster situation.
[0020] Another aspect of the present disclosure is directed to
methods and systems for customer authentication and identification
during transactional situations. Aspects describe systems and
methods for identifying a customer upon entry into an establishment
and one or more various responses in return. In accordance with one
embodiment, upon identification and authentication of a customer,
an individual of a store or business may be notified to an arrival.
If a meeting is already scheduled, that individual can immediately
interact with the customer. Alternatively, if the meeting is not
scheduled, but the individual is identified as an important
customer or one that should be addressed immediately, an individual
may be notified to address the needs of that customer. With
identification and authentication, the individual of the business
to interact with the customer may be notified of the customer's
name and/or other information in order to address the person by
specific name as opposed to a simple greeting of "how may I help
you?."
[0021] In accordance with still other aspects, customer's interests
within the store may be tracked in order to provide additional
information. Such information may be provided by means of a display
and/or individual. In addition, a cellular telephone or other
device of that customer may be contacted in order to provide such
information. Further aspects allow for identification of known past
fraudulent offenders or other individuals wanted by the police.
Immediate action may be taken to remove other customers from the
premises and/or subdue the individual.
[0022] Other aspects allow for identification and authentication of
individuals at a drive up window of a business. For a bank entity,
the processing of identification and authentication on one or more
accounts can be handled as the individual drives up to the business
and not after the individual gets to the window. For a prescription
pick-up window, once identified and authenticated, the prescription
can be picked up directly without waiting in a line. Still other
aspects allow for action in response to authentication of armed car
guards, night deposit workers, cash recycling individuals, and
other individuals.
[0023] This Summary is provided to introduce a selection of
concepts in a simplified form that are further described below in
the Detailed Description. The Summary is not intended to identify
key features or essential features of the claimed subject matter,
nor is it intended to be used to limit the scope of the claimed
subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] A more complete understanding of aspects of the present
disclosure and the advantages thereof may be acquired by referring
to the following description in consideration of the accompanying
drawings, in which like reference numbers indicate like features,
and wherein:
[0025] FIG. 1 illustrates a schematic diagram of a general-purpose
digital computing environment in which certain aspects of the
present disclosure may be implemented;
[0026] FIG. 2 is an illustrative block diagram of workstations and
servers that may be used to implement the processes and functions
of certain embodiments of the present disclosure;
[0027] FIG. 3 is an example card payment system;
[0028] FIG. 4 is a flowchart of an illustrative method for
transaction routing and processing in accordance with at least one
aspect of the present disclosure;
[0029] FIG. 5 is a flowchart of an illustrative method for
identifying an individual for transaction processing in accordance
with at least one aspect of the present disclosure;
[0030] FIG. 6 is an example block diagram of an illustrative
environment for identifying an individual for transaction
processing in accordance with at least one aspect of the present
disclosure; and
[0031] FIG. 7 is an illustrative schematic diagram of a security
system for biometric identification and authentication in
accordance with one or more aspects of the present disclosure.
DETAILED DESCRIPTION
[0032] In the following description of the various embodiments,
reference is made to the accompanying drawings, which form a part
hereof, and in which is shown by way of illustration various
embodiments in which the disclosure may be practiced. It is to be
understood that other embodiments may be utilized and structural
and functional modifications may be made.
[0033] FIG. 1 illustrates a block diagram of a generic computing
device 101 (e.g., a computer server) that may be used according to
an illustrative embodiment of the disclosure. The computer server
101 may have a processor 103 for controlling overall operation of
the server and its associated components, including RAM 105, ROM
107, input/output module 109, and memory 115.
[0034] I/O 109 may include a microphone, keypad, touch screen,
and/or stylus through which a user of device 101 may provide input,
and may also include one or more of a speaker for providing audio
output and a video display device for providing textual,
audiovisual and/or graphical output. Software may be stored within
memory 115 and/or storage to provide instructions to processor 103
for enabling server 101 to perform various functions. For example,
memory 115 may store software used by the server 101, such as an
operating system 117, application programs 119, and an associated
database 121. Alternatively, some or all of server 101 computer
executable instructions may be embodied in hardware or firmware
(not shown). As described in detail below, the database 121 may
provide centralized storage of account information and account
holder information for the entire business, allowing
interoperability between different elements of the business
residing at different physical locations.
[0035] The server 101 may operate in a networked environment
supporting connections to one or more remote computers, such as
terminals 141 and 151. The terminals 141 and 151 may be personal
computers or servers that include many or all of the elements
described above relative to the server 101. The network connections
depicted in FIG. 1 include a local area network (LAN) 125 and a
wide area network (WAN) 129, but may also include other networks.
When used in a LAN networking environment, the computer 101 is
connected to the LAN 125 through a network interface or adapter
123. When used in a WAN networking environment, the server 101 may
include a modem 127 or other means for establishing communications
over the WAN 129, such as the Internet 131. It will be appreciated
that the network connections shown are illustrative and other means
of establishing a communications link between the computers may be
used. The existence of any of various well-known protocols such as
TCP/IP, Ethernet, FTP, HTTP and the like is presumed, and the
system can be operated in a client-server configuration to permit a
user to retrieve web pages from a web-based server. Any of various
conventional web browsers can be used to display and manipulate
data on web pages.
[0036] Additionally, an application program 119 used by the server
101 according to an illustrative embodiment of the disclosure may
include computer executable instructions for invoking user
functionality related to communication, such as email, short
message service (SMS), and voice input and speech recognition
applications.
[0037] Computing device 101 and/or terminals 141 or 151 may also be
mobile terminals including various other components, such as a
battery, speaker, and antennas (not shown).
[0038] The disclosure is operational with numerous other general
purpose or special purpose computing system environments or
configurations. Examples of well known computing systems,
environments, and/or configurations that may be suitable for use
with the disclosure include, but are not limited to, personal
computers, server computers, hand-held or laptop devices,
multiprocessor systems, microprocessor-based systems, set top
boxes, programmable consumer electronics, network PCs,
minicomputers, mainframe computers, distributed computing
environments that include any of the above systems or devices, and
the like.
[0039] The disclosure may be described in the general context of
computer-executable instructions, such as program modules, being
executed by a computer. Generally, program modules include
routines, programs, objects, components, data structures, etc. that
perform particular tasks or implement particular abstract data
types. The disclosure may also be practiced in distributed
computing environments where tasks are performed by remote
processing devices that are linked through a communications
network. In a distributed computing environment, program modules
may be located in both local and remote computer storage media
including memory storage devices.
[0040] Referring to FIG. 2, an illustrative system 200 for
implementing methods according to the present disclosure is shown.
As illustrated, system 200 may include one or more workstations
201. Workstations 201 may be local or remote, and are connected by
one or communications links 202 to computer network 203 that is
linked via communications links 205 to server 204. In system 200,
server 204 may be any suitable server, processor, computer, or data
processing device, or combination of the same. Server 204 may be
used to process the instructions received from, and the
transactions entered into by, one or more participants.
[0041] Computer network 203 may be any suitable computer network
including the Internet, an intranet, a wide-area network (WAN), a
local-area network (LAN), a wireless network, a digital subscriber
line (DSL) network, a frame relay network, an asynchronous transfer
mode (ATM) network, a virtual private network (VPN), or any
combination of any of the same. Communications links 202 and 205
may be any communications links suitable for communicating between
workstations 201 and server 204, such as network links, dial-up
links, wireless links, hard-wired links, etc.
[0042] The steps that follow in the Figures may be implemented by
one or more of the components in FIGS. 1 and 2 and/or other
components, including other computing devices.
[0043] FIG. 4 is a flowchart of an illustrative method for
transaction routing and processing in accordance with at least one
aspect of the present disclosure. In step 401, a transaction
request occurs at a point of sale (POS). Such a situation may occur
when an individual enters a grocery store and is at a check line
for purchasing the groceries, or a car service shop payment booth,
or a vending machine with products for purchase. The transaction
request may be a traditional card or device, such as a credit or
debit card, a touch less based request, such as utilizing radio
frequency identification (RFID), and/or biometric identification as
described herein. Proceeding to step 403, transaction information
associated with the individual and the transaction is sent through
a network that may be proprietary, to a financial entity associated
with the network.
[0044] A funding account associated with the transaction data of
the individual is determined and, in step 405, a determination is
made as to the funding account exists at the financial entity
associated with the network. An example may be a situation where
the individual has accounts with a first bank and is utilizing a
debit card of the first bank in the transaction while the financial
entity associated with the network in the determination at step 405
is a second, different financial entity. If the funding account is
not at the financial entity, the process moves to step 407 where
the financial entity acts as a transaction acquiring bank. In such
a situation, the financial entity may communicate with the card
issuing bank of the individual to obtain transaction authorization
and may send the authorization to the POS. With the individual
provides a signature or inputs a PIN to conduct the transaction,
the financial entity forwards the transaction to the issuing bank.
When the financial entity receives funds for the transaction, less
interchange fees, the funds may be transferred to an account at the
financial institution designated by the merchant.
[0045] Returning to step 405, if the funding account of the
individual is at the financial entity, the method moves to step
409. In step 409, a request may be sent to the individual to select
an account to be used to fund the specific transaction that is
occurring. Such a situation may occur when the user is at a
checkout line at a grocery store. The individual has already swiped
her card on a machine that has read the transaction data on the
card. Now, the machine may prompt the user to enter a number that
corresponds to the desired account to use. The transaction
information, having been processed by some internal and/or external
computing system, may lead to identification of multiple accounts
of the individual and/or sub-accounts with an account of the
individual.
[0046] For example, having identified the particular individual
from the transaction data, the individual may have several
different funding accounts with the financial entity, and may now
be able to choose the particular account for debit of the funds for
payment on the transaction. As such, in such an example, the user
may see four different options on a display associated with the
machine. The display may prompt the user to choose a funding
account from one or more of stored value accounts, such as
non-interest accounts, demand deposit accounts, such as interest
accounts including checking and savings, secured line of credit
accounts, such as home equity and pledged asset, and/or unsecured
line of credit, such as a traditional credit card.
[0047] Returning to step 411, the system may receive a selected
entry of an account of the payer for the transaction. For example,
the individual, payer, may push a button corresponding to using a
checking account of the individual for debit of the funds needed
for the transaction. At step 413, a determination is made as to
whether there is sufficient funding identified in the account
selected by the individual. If there is not sufficient funding in
the selected account, the process may return to step 409 where the
individual is prompted to select a different account of the
individual for funding the transaction. In such as situation, the
prompt may be shown not to include an option of the previously
selected account that did not have sufficient funds to complete the
transaction. Returning to step 413, if there is sufficient funds in
the account selected by the individual, the system debits the
payment amount from the selected account and completes the
processing of the transaction in step 415. Such processing may
include withholding transaction processing costs, transferring
funds to an account at a financial institution designated by the
merchant, and sends a processing complete message to the POS.
[0048] As should be understood, any of a number of different types
of accounts may be designated under such an account selection
system. For example, a user with a checking account may have a
plurality of sub-accounts associated with the master account. One
or more sub-accounts may allow for withdrawal of funds for a
particular entity, such as grocery stores, coffees chops, sports
clothing stores, etc. One or more sub-accounts may allow for
withdrawal of funds for a genre of entity, such as an entertainment
sub-account that allows for withdrawal to movie theaters,
amusements parks, video rental stores, and bars. In accordance with
one or more aspects of the present disclosure, the selection of
accounts by the user may occur prior to the POS.
[0049] For example, an individual may access a website to enter
specific funding accounts for specific uses. A user may designate
that all grocery expenses should be funded through a checking
account of the user, while all gas purchases should be funded
through a savings accounts of the user. Thus, when making a
transaction, the user may use a single card to debit funds from
different accounts for different entities. In addition, utilizing
biometric identification described herein, the user need not even
have a card or other identifying device. In still other examples, a
user may designate a temporal feature associated with one or more
accounts. For example, a user may designate that groceries should
be debited from a checking account for a predetermined period
during a calendar month and then from a different accounts, such as
an unsecured line of credit, a credit card, for another period in
the calendar month. Such a situation may arise for paydays of the
user. On paydays and for a week thereafter, a user may want funds
to come out of the checking account directly, while, for other
periods of time the user may want to have funds debited to a credit
card. As should be understood, any of a number of different periods
of time, genres of entities, and/or other parameters may be
implemented with one or more accounts and sub-accounts in
accordance with one or more aspects of the present disclosure.
[0050] FIG. 5 is a flowchart of an illustrative method for
identifying an individual for transaction processing in accordance
with at least one aspect of the present disclosure. The process
begins and at step 501, an individual initiates a transaction
request at a point of sale. At step 503, the system receives
biometric information to identify the user. In accordance with at
least one aspect of the present disclosure, the individual may look
into the field of view of a scanning device configured to scan the
iris of a person. In such a situation, the individual need not
supply a name, an account number, or any other type of
identification to complete a transaction. The identification of the
individual in step 503 may be based upon previous biometric and
other information gathered about the individual. The individual may
have allowed for an initial scan of their iris to associate herself
with an account. The account may then be associated with a funding
account for payment purposes.
[0051] Returning to FIG. 5, at step 505, a determination is made as
to whether the individual is identified to have an account. Step
505 may be an identification of the individual and their account,
an identification of the individual, but she does not have an
account, or no identification of the individual. In one example,
the system may not be able to identify the individual if she has
never registered for an account before. In another example, the
system may be able to identify an individual from previous
transactions, but may note no active account if the individual has
previously closed the account. In another example, with an active
account, the system may identify the individual from previous
transaction and/or registration.
[0052] If there is no active account in step 505, the process moves
to step 507 where the system may direct the individual to an offer
to sign up, e.g., register, for an account for future use. In such
a situation, the individual may need to provide information up
front to associate a funding account she has with the account of
the system. If the individual and associated account is identified
in step 505, the process may move to step 509 where the system may
debit the payment amount from the account of the individual and
complete the processing of the transaction as necessary. With an
active account in operation under the system, an individual may
make transactions without providing more than a single biometric
identifier.
[0053] In accordance with one or more aspects of the present
disclosure, optional method portions may be included as shown in
FIG. 5 in broken line form. From identification of the individual
and account with the system in step 505, the process may proceed to
step 511 where the system may provide an option to the individual
to choose an account for withdrawal of funds to complete the
transaction. Such may be similar to step 409 in FIG. 4. In response
to step 511, the individual may select an account, such as a debit
account, for payment of the funds. In another illustrative example,
the option for an individual to choose an account for withdrawal of
funds to complete a transaction may occur prior to a point of sale
as described herein.
[0054] The process may proceed to step 513 if the system determines
that the selected account includes insufficient funds to complete
the transaction. Such may be similar to step 413 in FIG. 4. In step
513, the individual may be prompted to select another account to
withdrawal funds from for the transaction payment. From step 513,
the process may proceed to step 509 to complete the
transaction.
[0055] An illustrative example in accordance with one or more
aspects of the present disclosure is described herein. A city may
have a mass transit system for transporting patrons via multiple
modes of transport, including bus, underground subway, and above
ground trains. A user may want to use one or more of these public
services for work and/or pleasure purposes. For example, the user
may travel to and from work via one or more of these public
transportation services. Initially, the user may register for an
account with the public services system of the city. The user may
be able to register via a website registration service, an in
person registration service, a mail-in registration service, and/or
some other registration service. The registration may have a user
provide certain financial information, such as one or more accounts
to withdrawal funds from for use of the public transportation
services on a per use basis. As such, the user may provide account
information about herself and her financial entity. In addition,
the user may be requested to provide a biometric identification.
Such may be a scan of her iris. Any of a number of technologies may
be utilized to scan an individual's iris for identification and/or
other biometric systems ma be utilized. With an active account, a
user may utilize the public transportation services.
[0056] The user may initially walk to an underground subway
entrance as the first part of her trip to work. Upon entering, the
user may be prompted to look into a camera for recordation of a
biometric parameter of the user. Such may be a case where a camera
configured to measure her iris. The user may look into the field of
view of the camera and the camera may capture the iris of the
individual. With the scanned iris information, the system may
search and find the associated account of the user. The system may
immediately debit the account of the user and allow them to proceed
to the underground train. In such a situation, the user need not
carry a card or device associated with an account to use the
service. If the user has forgotten her purse at home, she need not
return home to get her card for use of the underground train. The
biometric information that she carries on her at all times may be
utilized.
[0057] Upon exit from the underground train, a second scan may be
performed. Such a situation may be a case where the public
transportation system has different fares for different distances,
times, locations, events, etc. If the public transportation system
charges a single fare for use, a second scan during exit may not be
needed. Similarly, upon exit the user may now need to take a bus to
get closer to work instead of walking A similar scanning camera may
be located at the entrance of the bus. Upon identifying the user,
an account may be debited for the tip on the bus. In addition, a
second scan may occur when departing from the bus if different
fares for use, time, event, etc. are in place by the mass transit
system.
[0058] As such, a user is provided an opportunity to utilize public
transportation services without the need to carry money, a token,
an account card, or some other form of identification except for
biometric information that the user always has on her person. As
should be known, although the examples described herein relate to
identification by iris scanning, other biometric parameters may be
scanned and/or identified for use in accordance with one or more
aspects of the present disclosure. For example, a finger print
analysis may be performed.
[0059] In accordance with another aspect of the present disclosure,
anonymous accounts may be coordinated through a product or service
provider for its customers and a financial entity. Some consumer
payment scenarios, such as most public transportation systems, have
the equivalent of "anonymous accounts" because consumers can
deposit funds for later use without having to identify themselves.
For public transportation systems, passengers can insert cash into
a machine and receive tokens used for passenger fares. Passengers
do not have to identify themselves before they purchase tokens. A
financial entity does not currently have the ability to implement
"anonymous accounts" because of government regulations requiring
knowledge of the identity of the customer associated with the
account. As understood by those skilled in the art, the following
illustrative examples are with respect to a public transportation
infrastructure; however, one or more aspects of an anonymous
account described herein may be implemented and/or utilized by any
of a number of service and/or product providers.
[0060] Using the example of a public transportation system, there
are two high level processes.
[0061] First, there is a process identified as payment. In such a
process, passengers purchase tokens that may be used as a
transportation fare. Such may be analogous to creating a credit or
a "stored value." In public transportation where operating costs
exceed fare revenue, the "stored value" does not exist in a
monetary account waiting for the passenger to travel. Second, there
is a process identified as check token. In such a system, the
system checks tokens for each passenger to ensure that the
passenger has what is required for each transportation fare. The
fare is checked before each passenger boards a vehicle in secure
gate scenarios and after the passenger boards vehicles in open gate
scenarios. Such may be analogous to "authorizing" that the customer
has appropriate "stored value."
[0062] Continuing with the public transportation example and in
accordance with aspects of the present invention, when passengers
purchase tokens that may be used as transportation fare two
different things may happen. The physical money presented, or money
transferred from a payment item such as a debit card, credit card,
etc., may be credited into a monetary account owned by the company
or organization providing the product or service that the consumer
will purchase. This monetary account may be at a financial entity,
such as a bank. The physical money presented, or money transferred
from a payment item, such as a debit card, credit card, etc., may
be represented virtually in a non-monetary account that is
analogous to a deposit account or a sub-account thereof. This
non-monetary account may be associated with the consumer and may be
used for accounting purposes to keep a record of deposits and
withdrawals.
[0063] The second process identified as check token, may become an
"authorization" against the virtual value in the non-monetary
account or sub-account thereof. Such may be analogous to a debit
card authorization for a transaction from a deposit account. The
"deposit" account accessed for the authorization is a non-monetary
account used for accounting purposes only. The process checks to
see if the consumer has used all of the funds previously deposited
into the monetary account. If sufficient virtual funds exist, the
authorization may be approved and the virtual value may be
decreased by the transaction amount.
[0064] The process, identified as payment, by consumers may be
deposited into a monetary account owned by a product and/or service
provider and credit may be created in a non-monetary account
associated with the consumer. This process may separate monetary
deposits into two pieces, a traditional monetary account designated
by the product and/or service provider, and a virtual credit in a
non-monetary account at a financial entity associated with the
consumer. When the consumer attempts to purchase a product and/or
service, the process is a traditional debit card authorization
against the non-monetary account that contains virtual credit.
Since the authorization is applied to a non-monetary account used
only for accounting purposes, this account can be anonymous. This
process may be applied to public transportation systems and any
other scenario where consumers "pre-pay" for products and/or
services that will be received at a later time.
[0065] An illustrative example of aspects of an anonymous account
system in accordance with the present disclosure is described. A
company may exist that sells a product X in its stores all
throughout the United States. The company may own a monetary
account at a financial entity. A customer may use a debit card or
other payment item to transfer monetary assets to the monetary
account owned by the company at the financial entity. The transfer
may be a credit of funds for use at stores of the company. The
transferred monetary assets may be represented virtually in a
non-monetary account associated with the customer. This may be used
for accounting purposes and maintained by the financial entity or
the company. If the customer decides to purchase a product X from a
store of the company, she may desire to utilize the transferred
monetary funds. In one scenario, the customer may simply utilize
her biometric information with an iris scan to purchase the product
X. Such a transaction acts as an authorization against the virtual
monetary assets in the non-monetary account that the customer has
with the company. This authorization ensures that the customer has
not used all of the monetary assets previously deposited into the
monetary account. If sufficient virtual funds exist, the
authorization is approved and the virtually represented value in
the non-monetary account is decreased by the transaction amount to
purchase product X.
[0066] In still other scenarios, biometric identification for
purchase transactions may be utilized. For example, a user may
register with an entity in a similar manner as described before.
Such an example may be a national company of coffees shop where a
user has provided similar information of financial data, such as a
checking account number, and biometric data, such as a scan of her
iris. Thereafter, if a user enters a coffee shop of the national
company, a user may just need to order and have her iris scanned to
complete the transaction.
[0067] In still another example, the user may not even need to
order. As part of the registration process or sometime thereafter,
a user may specify that they always want a coffee when going to
that national company. Thereafter, when entering the coffee shop
and having her iris scanned, the user may pick up her coffee and
go. The user need not provide a name, an order, or any other type
of identification. Still further, as part of the registration
process or sometime thereafter, a user may specify different orders
for different times, events, situations. For example, the system
may allow a user to specify that she wants coffee if in the
morning, cappuccino if in the afternoon, and hot chocolate if at
night. Alternatively, the user may specify that she wants hot
coffee on days when it is below 60 degrees and iced coffee on days
when it is 60 degrees or higher. Any number of different operations
may be utilized in accordance with one or more aspects of the
present disclosure.
[0068] In accordance with other aspects of the present disclosure,
a user may register in a similar manner as described herein. Upon
entering a restaurant where the user may have a registration, a
camera may passively capture the iris of the user. Thereafter, a
maitre de, host, and/or server may be prompted to the arrival of
the individual and thereafter may be greeted personally and led to
a table. Any of a number of different uses may be utilized in
accordance with the aspects described herein.
[0069] In accordance with another illustrative example, a user may
register with a clothing store in a similar manner as described
herein. Upon purchasing products from the clothing store, the iris
of the user may be scanned. The user may be prompted to select an
account for withdrawal of the funds from for payment on the
transaction or may be prompted to select a different account from a
default account. In such an example, the user may select "2" on a
keypad with a display that corresponds to a checking account of the
user. Upon receipt of the selection, the system may confirm that
the account has sufficient funds to complete the transaction. If
not, the system may prompt the user to choose a different account
for withdrawal of the funds for the transaction.
[0070] FIG. 6 is an example block diagram of an illustrative
environment 600 for identifying an individual for transaction
processing in accordance with at least one aspect of the present
disclosure. FIG. 6 illustrates an in-person transaction to purchase
a product 603 at a checkout station, which occurs between an
individual purchaser 601 and an employee 607 of a store. A camera
605 is shown having an optical field of view 611 that encompasses
the area in front of the employee 607 and is capable of capturing
an image of the iris of the individual purchaser 601. Camera 605
may be any of a number of different image capturing devices with a
focal length capable of capturing clear images of the iris of an
individual purchaser within its field of view.
[0071] With the captured iris information, a computer, local to or
remote from, the camera 605 may receive the captured iris data for
processing and identification of the individual purchaser 601. Any
of a number of different program applications may be utilized with
respect to hardware, firmware, and/or software for matching a
captured iris image with stored iris images. Once a match is found,
the employee 607 may be prompted by a computer output 613 that the
transaction has been processed and the individual purchaser 601 may
leave with the product 603.
[0072] In an alternative example, the individual purchaser 601 may
be prompted by a computer output/input device 609 to select from a
number of funding accounts that funds for the transaction payment
amount may be transferred from. Individual purchaser 601 may enter
in a selection and the transaction may then be completed. If the
selected funding account is deficient in funds to complete the
transaction, the employee 607 through output device 613 and/or the
individual purchaser 601 through output/input device 609 may be
prompted to have the individual select a different account.
[0073] Further aspects of the present disclosure describe
authentication systems for security and vaults that are configured
to authorize only specific individuals entry into a vault or area.
A system in accordance with the present disclosure is shown in FIG.
7 of a security authentication system configured to authorize
specific people into an area, such as a vault associated with a
financial entity.
[0074] As shown, a security authentication system may include
multiple components that may be included within the same device or
configured across multiple devices. A configuration system may be
included to allow for configuration of any one or multiple
components. A database may be accessible by any one of the
components. A biometric system may be included to allow for
scanning of an iris of an individual and/or other types of
biometric identification and authentication, including fingerprint
analysis. Multiple security systems, such as primary and secondary
systems shown, may be included. The primary security system may be
configured to be a first point of security in identifying and/or
authenticating a person.
[0075] With respect to the example of a bank vault, the primary
security may be an iris scanning result coupled with a video feed.
The primary security system may be configured to detect more than
one individual at the door of the vault in order to restrict entry,
even if an individual with the proper and allowed iris match is one
of the people at the door. As such, if the proper individual is
being forced to scan her iris for entry, such as in a hostage
situation during a bank robbery, the primary and/or the secondary
security system may be configured to prevent access even if the
biometric system determines the individual to be allowed to access
the vault. Under such a situation, a notification system may be
configured to notify someone or something as to the current
situation for an appropriate response to occur.
[0076] In still other scenarios, the system may be configured to
detect that a person is attempting to access the vault and is
carrying something that restricts her ability to open doors, such
as the individual carrying a large stack of papers. The system may
be configured to identify and authenticate the individual, and if a
proper match occurs to an authorized individual in the database,
the vault door may be configured to open directly for the
individual so she need not put down her papers to open them. In
still another scenario, the same might occur as an individual is
leaving the vault. In such a case, as the individual approaches the
door, the vault door may open for her to exit. Under one scenario,
the system may first determine that no one else is outside of the
vault that might attempt to gain unauthorized access.
[0077] In still further examples, primary or secondary security
systems may be configured to ensure that individuals authorized to
access the vault are not performing some unauthorized activity in
conjunction. For example, if an individual with proper access to
the vault attempts to remove unauthorized material from the vault,
one or both of the security systems may be configured to respond.
The secondary security system may include a system for weighing an
individual upon entry and exit from the vault. Such a system would
ensure that a person entering the vault is of the same weight in
exiting the vault. Concurrently and/or alternatively, one of the
security systems may be configured to track the individual's
movement within the vault to ensure that the individual remains in
areas or portions that she is authorized to access. Other secondary
systems may be implemented herewith including additional logging
systems for additions made to the vault or items removed from the
vault. Similar aspects may be utilized with respect to safe deposit
boxes as well.
[0078] Other aspects of the present disclosure are directed to
building security authentication and tracking systems to allow
authorized individuals into certain buildings or areas and
preventing unauthorized individuals from entering and/or accessing
certain buildings or areas. A similar configuration of components
may be utilized for such as system as shown in FIG. 7. In such a
scenario, additional components may be included in accordance with
additional aspects. For example, upon identification and
authentication of an individual, the system may track movement of
the individual throughout a building. Upon entering an elevator,
the system may be configured to default automatically the floor
option for the individual. Such a situation might be a building in
which multiple companies on multiple floors exists. Alternatively,
one company with different departments on different floors of a
building may also apply.
[0079] Based upon a historical determination from the database of
what floor the individual usually exits the elevator, the system
may default the choice of floor for that individual. Such a system
is extremely useful for individual with disabilities. Such an
individual on crutches need not have to push a button to choose a
floor option. Even if the individual wants to go to a different
floor, other systems may be configured then to allow the individual
to override the floor choice either verbally or in some other
manner.
[0080] Such a configuration may be utilized with a tracking system.
Such a tracking system may be a secondary security system. The
tracking system may be configured to approximate the location of an
individual throughout her time within a building or area. The
tracking system may be a number of cameras or detectors and may
include a video feed and/or additional biometric scanning systems.
Such a system ensures that an individual authorized to be in the
building is restricted to only those areas within the building that
she is authorized to access. As such, an individual authorized to
exit an elevator on the fifth floor since that is her place of
employment may be restricted form exiting the sixth floor of the
building. Still further, areas within a floor may similarly be
restricted by such features to ensure that an individual remains
within authorized areas of a particular floor. Such features and
system may be integrated with additional card based, voice based,
and/or other security systems.
[0081] Aspects describe systems to prevent maintaining a doorway
open into the area or vault in addition to unauthorized entry or
exit of people or things into or out of such areas or vaults.
Should an authorized individual attempt to bypass the closing of a
door to a room and/or vault, the system may be configured to take
responsive action. For example, the system may be set up to have
two doors. A second door may be configured to remain closed until
the first door has shut. As such, an authorized individual may
enter a first door and wait for it to close before a second door
opens to allow her access to the room and/or vault.
[0082] Aspects describe tracking of individuals throughout a
building or facility to ensure authorized access in addition to
identification of individuals in the event of an emergency and/or
disaster situation. With implementation of a tracking system based
upon biometric and/or other security systems, a real time
monitoring of individuals within a building or area may occur. With
such real time monitoring, the system may know exactly who is in a
building and where they are located. Such may be extremely helpful
in the event of an emergency.
[0083] Should a natural disaster, man made incident, or other
incident occur within or around a building or area being monitored,
a notification system may forward identification of known
individuals in the area for disaster recovery teams, security
personnel, members of the police or fire department, and/or other
individuals. Such information as to number of individuals,
locations of individuals, etc. may be helpful in assisting teams or
other individuals to respond in certain areas first. If known that
no one was on the second, third, or fifth floors of a building, in
the event of an earthquake, disaster recovery teams need not access
those areas until other areas where people were known to have
been.
[0084] Still another aspect is directed to a child or elder care
facility identification system. A biometric system may identify a
child and/or elder individual upon entry into such a facility. For
example, when a child is dropped off at a day care facility, an
iris scanning system may be utilized to scan the child's iris for
identification and authentication of the child. Based upon previous
authorized people to pick-up the child from the facility, the
system may be configured to scan the iris of the individual picking
up the child to ensure that she is authorized to do so. For
example, a parent of the child may allow either parent, an aunt,
and a particular caretaker, such as an authorized babysitter, to
pick up her child from the facility. In such a case, when an
individual attempts to retrieve a child form the facility, the iris
scanning system may be configured to ensure that she is authorized
to take the child. Should an unauthorized individual attempt to
remove a child, a notification system may be configured to alert
someone or something as to the situation.
[0085] Another aspect of the present disclosure is directed to
methods and systems for customer authentication and identification
during transactional situations. Aspects describe systems and
methods for identifying a customer upon entry into an establishment
and one or more various responses in return. In accordance with one
embodiment, upon identification and authentication of a customer,
an individual of a store or business may be notified to an arrival.
If a meeting is already scheduled, that individual can immediately
interact with the customer. Alternatively, if the meeting is not
scheduled, but the individual is identified as an important
customer or one that should be addressed immediately, an individual
may be notified to address the needs of that customer. With
identification and authentication, the individual of the business
to interact with the customer may be notified of the customer's
name and/or other information in order to address the person by
specific name as opposed to a simple greeting of "how may I help
you?."
[0086] Such a system may be utilized for a financial entity. In
such a situation, as a customer enters the banking center, an iris
scanning system may be configured to capture the iris of the
individual. The system identifies and authenticates the individual.
In response, a banking center greeter may be notified by a
notification system that a particular individual, such as Mr. John
Smith, a loyal customer for over 5 years, has entered the facility.
The greeter may then have instructions under various scenarios for
responding to the entry of Mr. Smith. For example, the greeter may
approach Mr. Smith and inquire as to his business needs today.
Alternatively, if an apportionment has been arranged, the greeter,
or the individual to which Mr. Smith has an appointment, may
directly address Mr. Smith regarding his needs. A database may be
utilized in conjunction with the biometric system and/or security
systems to gain further information regarding the needs of Mr.
Smith. For example, if Mr. Smith has an appointment with a
particular individual with the banking center, upon identification
and authentication of the individual as Mr. Smith, the system may
notify the particular individual to which Mr. Smith has an
appointment and/or may have someone bring necessary forms or
paperwork for Mr. Smith to fill out. In an alternative system, such
forms may be sent to Mr. Smith electronically upon entry into the
facility, such as through his cellular telephone.
[0087] In accordance with still other aspects, customer's interests
within the store may be tracked in order to provide additional
information. Such information may be provided by means of a display
and/or individual. For example, interactive displays may be
customized specific to a customer or group of customer as she is or
they are waiting in line for access to a teller. If a customer
enters a banking center is spends a threshold amount of time
looking at one area, such as signs or displays regarding current
home equity loan rates, one or more ads or other information may be
displayed for the customer. For example, additional details on the
length of the term, the current prime interest rate, the
approximately amount of time for closing, etc. may be provided
while the user waits. Different options may also be provided for a
customer to consider, such as alternatives to home equity loans.
Any of a number of different advertisements and/or other
information may be provided to a customer.
[0088] In an alternative example, an automated greeter may address
the customer to inquire about needs and then present information on
the subject, notify an individual to address the needs of the
customer, and/or take some other action such as to print out forms
for the customer to fill out. Such an automated greeter may be a
station separate located within the facility and/or may be a number
of kiosks or other areas for accessing information. For example,
with respect to an airport, an individual need only walk up to the
electronic ticketing area to confirm a boarding pass and seat. A
paper copy of the boarding pass may not be needed as the identified
and authenticated individual can pass through security and get
right onto a plane flight by continuous monitoring of her location
and tracking of her movement within the airport.
[0089] When used with respect to an external device, such as an
automated teller machine (ATM) of a financial entity, iris scanning
and/or other biometric data may be utilized to identify and
authenticate a user. As such, under such systems, an individual
that attempts to fraud the ATM may be prevented. Even with a valid
debit card and password for the debit card, the system may require
an iris scan, thus preventing an individual with a stolen or
otherwise illegal card form withdrawing funds from an account.
Still other features associated with ATM withdrawals and/or
deposits may be utilized.
[0090] In a similar manner, online banking and/or other online
transactions may utilize iris scanning and/or other biometric
identification and authentication. For example, if an individuals
seeks to get a prescription mailed directly to them, an iris scan
of the individual may be taken and matched against allowed drugs or
other things that the individual may have sent to her home. As
such, an authorized individual need not go to a store to pick up
the drugs but may have allowable drugs and/or other items sent
directly to her.
[0091] Based upon historical data on a customer, action may be
taken regarding a change of behavior of the customer. For example,
if a customer has called a service line of an entity to look into
changing service or even canceling service, the next time she
enters a store of the entity, she may be notified to available
options or features for her to attempt to maintain her business. In
addition, if historical data on the customer shows particular
interest in certain products or services, upon entering a store,
ads and/or other information may be provided to the customer that
is similar. For example, is a customer has been searching a website
of the entity for baby sheets and blankets, information on baby
sheets and blankets and/or other baby products may be provided to
the customer if she enters a store of the entity. Thus, changes of
the behavior of the customer and/or interests of the customer may
be addressed prior to the customer canceling all services or
business with the entity.
[0092] In addition to displays, a cellular telephone or other
device of a customer may be contacted in order to provide ads
and/or other information. For example, upon determining that a
customer in line has been reviewing a chart on current mortgage
rates for a threshold period of time, a text message and/or other
data may be sent to the cellular telephone of the individual with
other information on mortgage rates. As such, a user may interact
electronically while waiting in line. Thus, upon getting to an
individual, such as a teller, information may already be provided
to the teller regarding the needs of the customer for her
transaction. For example, background credit checks and other
information may already be processed to start and application
process on a new mortgage with the entity.
[0093] Still other aspects are directed to use of the present
disclosure with secondary authentication systems. For example, if a
purchase exceeds a threshold amount, such as $25, additional
authentication of the individual may be required, such as a license
and/or or other identification. For any transactions of $25 or
less, identification and authentication by iris scanning once may
be enough to allow the transaction to be completed. Any of a number
of different variables for secondary authentication may be utilized
in conjunction with the present disclosure.
[0094] Other uses within a retail transactional environment may be
utilized. For example, upon entry to a store, further aspects of
the present disclosure allow for identification of known past
fraudulent offenders or other individuals wanted by the police.
Immediate action may be taken to remove other customers from the
premises and/or subdue the individual. As such, if an individual
has attempted to cash a fraudulent check in the past, a teller
and/or other individual, such as security and/or the police, may be
notified to either prevent cashing of the check and/or to hold the
individual for questioning. A database of known offenders may be
accessed upon entry of the individual in the center. If identified,
a teller may be informed not to allow the transaction to cash the
check to be completed. Other security measure to record the
transaction and/or notify other individuals may be implemented. If
a first time occurrence by an individual, data on the identified
individual, such as video and/or biometric data captured, such as
the scanned iris of the individual, may be maintained and/or
forward to other individuals including security personnel, the
police department, and/or others.
[0095] Other aspects allow for identification and authentication of
individuals at a drive up window of a business. Such as system may
be configured to scan the iris of an individual either directly,
e.g., by requesting the individual look at a particular area, such
as a camera, or indirectly, e.g., by capturing an image of the iris
as the individual is looking around. As such, while waiting until
her turn to access the drive-up window, the system can process the
credentials and other information of the individual to identify and
authenticate the drive. Therefore, when the drive approaches the
window, a teller may respond by directly addressing the person by
name. Such a service-orientated approach to customers may assist
retention of the customer for future business. For a bank entity,
the processing of identification and authentication on one or more
accounts can be handled as the individual drives up to the business
and not after the individual gets to the window. For a prescription
pick-up window, once identified and authenticated, the prescription
can be picked up directly without waiting in a line.
[0096] Other situations may be utilized in conjunction. For
example, as an individual drives up to a gas station pump, her iris
may be scanned near to or upon leaving the vehicle. Processing of
the identification and authentication of the individual may occur
so that the person need only lift the pump and engage with the gas
tank to start the process. The individual need not wait while a
credit card is read and authorized. Defaults may be set up where
the system identifies the car type, whether form previous
information supplied by the individual and/or by identifying the
vehicle directly by the system. Under such a scenario, the type of
fuel, such as highest octane may be chosen by the system for
pumping into the vehicle. Additional security measures may be used
in conjunction with such a system and/or override conditions may be
utilized to allow the individual to change the fuel grade to be
inputted into the vehicle.
[0097] Such an identification and authentication system may be
utilized to prevent gas station fraud as well. For example, if a
known individual is identified by such a biometric system that has
committed fraud on the gas station in the past, such as pumping gas
and not paying for it, the system may lock the pump down from
dispensing gas. Other responses may occur such as to notify and
attendant or to notify the police or other security. For first time
offenders where the system does not know of past incidents, a
record of the scanned iris may be maintained and/or sent to law
enforcement or other individuals for action to be taken as
necessary under the circumstances. A secondary security system may
be set to have a camera also take a license plate picture or other
data to identify the vehicle used in the fraud.
[0098] Still other aspects allow for action in response to
authentication of armed car guards, night deposit workers, cash
recycling individuals, and other individuals. One or more aspects
described herein may be utilized to ensure that properly
identified, authenticated, and authorized individuals are gaining
access to certain areas and/or things. As such, iris scanning may
be utilized to ensure that someone dressed as an armored car guard
and having credentials of an armored car guard is actually one that
is authorized to obtain monetary and/or financial related
documents/instruments on behalf of a financial entity.
[0099] Identification and authentication of an individual may occur
remotely for use with a web site as well. For example, an employee
of an entity may utilize a webcam on a laptop remote from a
database facility to gain access to records within the facility. As
opposed to a userid and password that may be used by anyone, a
biometric scanning feature may be utilized to ensure that the
individual is an authorized employee.
[0100] One or more database may be utilized herein and various
aspects may be used for different indented purposes in accordance
with aspects of the present disclosure. For example, one database
for access may include particular legal documents associated with a
contract, transaction, litigation, or other legal matter. Utilizing
biometric identification and authentication, authorized individuals
may be allowed access to documents contained therein from remote
locations. Such a system may allow for litigations in which
documents must be provided in discovery to be maintained by all
parties in one database and only authorized individuals are then
allowed to access. Similar databases may be utilized in conjunction
with an iris scanning and/or other biometric identification and
authentication system. One such example is a database of financial
records. Such a database may allow for individuals to configure
accounts to be accessed by any of a number of different people,
such as spouses, children, parents, other family members, financial
advisors, accountants, and/or other individuals.
[0101] Utilizing one or more aspects of the present disclosure,
areas that general require an individual to have cash on hand may
now be configured as a cashless environment. For example, at
sporting or other events, concessions, paraphernalia, and/or other
items may now be purchased on hand without need for anything more
than a particular biometric of an individual. Utilizing an iris
scanner, an individual can have an account accessed for withdrawal
of funds to purchase food, a jersey, and/or other items while
attending the game. In addition, even if the individual has
forgotten a ticket, such a system may be utilized to allow access
to the event without a ticket if previously noted as having
purchased one for the event. A database may be maintained to ensure
that two people under the same seat number do not enter the event
and/or may be tracked once within the event to ensure fraud on the
event is not occurring and/or is addressed.
[0102] Other environments that may utilize such a system include an
airport. Security may be sped up by performing an iris scan on all
individuals seeking to gain entry onto a flight. Secondary measure
may additional be included, such as a license or passport check.
However, use of the iris scanning may be used to ensure that false
documents are not being utilized by the individual. Still further,
aspects of the cashless environment may still be utilized within
the airport once the individual is identified and authorized. As
such, prior to a flight, the individual may purchase a soda and a
magazine without need for cash or a credit card.
[0103] While illustrative systems and methods as described herein
embodying various aspects of the present disclosure are shown, it
will be understood by those skilled in the art, that the disclosure
is not limited to these embodiments. Modifications may be made by
those skilled in the art, particularly in light of the foregoing
teachings. For example, each of the elements of the aforementioned
embodiments may be utilized alone or in combination or
subcombination with elements of the other embodiments. It will also
be appreciated and understood that modifications may be made
without departing from the true spirit and scope of the present
disclosure. The description is thus to be regarded as illustrative
instead of restrictive on the present disclosure.
* * * * *