Abstract: A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior to responding to the user request for data access. The remote computers are handheld when in operational mode. A sensor in the handheld computer captures a biometric image while the remote computer is being used. The biometric sensor is positioned in such a way that the sensor enables the capture of the biometric image continually during computer usage with each request for access to secure data. The biometric authentication occurs in a seamless manner and is incidental to the data request enabling user identity authentication with each request to access secure data.
Abstract: This pen-based, identity verification uses biometric technology. For use in commercial transactions at a point-of-sale terminal, a customer registers advising the system of a customer account that is to be used for payment. The customer also submits a digital signature for reference purposes—a fingerprint. The customer is then issued a transponder that links the customer to the customer account and to the reference digital signature. When the customer is at the point-of-sale terminal for making payment, an interrogator disposed at the point-of-sale terminal transmits a radio signal requesting identity verification. The transponder submits data to the interrogator. Thereafter, when the customer uses a stylus to submit written data (a signature), a sensor in the stylus makes incidental capture of biometric data that enables the interrogator to confirm customer identity.