GENERATION SYSTEMS AND METHODS FOR TRANSACTION IDENTIFIERS HAVING BIOMETRIC KEYS ASSOCIATED THEREWITH
A system for generating transaction settlement identifiers includes an arrangement configured to receive a biometric sample from a customer and an arrangement configured to use the biometric sample to select the transaction settlement identifier from a pool of predetermined transaction settlements. A mapping arrangement configured to map the selected financial transaction settlement identifier to an identifier of the customer also may be included.
This application is a continuation of U.S. patent application Ser. No. 14/318,683, filed on Jun. 29, 2014, entitled “GENERATION SYSTEMS AND METHODS FOR TRANSACTION IDENTIFIERS HAVING BIOMETRIC KEYS ASSOCIATED THEREWITH”, which is a continuation of U.S. patent application Ser. No. 11/623,956, filed on Jan. 17, 2007, entitled “GENERATION SYSTEMS AND METHODS FOR TRANSACTION IDENTIFIERS HAVING BIOMETRIC KEYS ASSOCIATED THEREWITH”, both of which are incorporated by reference in their entirety for any and all purposes.
FIELD OF THE INVENTIONEmbodiments of the present invention relate generally to transaction settlement identifier generation systems and methods. More specifically, embodiments of the present invention relate to systems and methods for generating transaction settlement identifiers using biometric features.
BACKGROUND OF THE INVENTIONFraud in eCommerce transactions has become a significant problem. Credit card issuers have created the “surrogate card number” model in an attempt to address this problem. According to this model, a “one time” credit card number is generated by a credit card issuer and automatically mapped back (by the issuer system) to the original card number during any subsequent authorisation, capture or refund event. The original card number is, therefore, never exposed and in the event the “one time” number is compromised (e.g. a hacker successfully penetrates the merchant's system) the fraud risk is mitigated as the “one time” number is deactivated for further purchase activity once the first authorisation event is processed.
While this model represents a significant improvement in online fraud management and has helped to establish consumer confidence in online commerce, it remains vulnerable to the threat of identity theft (commonly referred to as “phishing”). A variety of sophisticated techniques, including social engineering, are employed by fraudsters to discover consumer information (e.g. User Ids, passwords etc.) to enable them to perform seemingly valid transactions for fraudulent purposes. For example, in the “one time” card model, the fraudster would attempt to discover the consumer's password to enable the fraudster to request a valid “one time” credit card number to purchase goods online and have them shipped to a different address. Customers subsequently repudiate the transaction leaving the issuer in the position of adjudicator with consequential financial loss or reduction in customer satisfaction levels.
In essence the point of attack is starting to shift away from merchant's systems back to the issuer's systems. While the “surrogate card number” model is principally designed to effectively address merchant vulnerabilities, further expansion of the concept is needed to consider issuer side threats and vulnerabilities.
Likewise, fraud is a significant problem in money transfer transactions. Under typical practice, a sender visits an “agent” (i.e., agent of a money transfer system operator, such as Western Union of Englewood, Colorado) location to specify payee details (name, destination country and test question, if applicable) and pay applicable fees and principal amount to be transferred. The agent receipts the transaction details into a money transmission system and receives a Money Transfer Control Number (“MTCN”) that uniquely references the transaction. The agent provides the MTCN to the sender. The sender advises the recipient (Payee) through independent means (e.g. phone call or SMS) of the transfer's availability for collection and the MTCN. The payee visits an agent location, and supplies the MTCN, appropriate identification and correct response to the test question (if applicable). The agent pays out the principal amount on successful completion of verification checks. Some of the foregoing steps may be performed by Internet-based means.
This model is vulnerable to a number of attacks. For example, a paying agent may collude with a fraudster and pay out funds without complying with local verification procedures. An unrelated agent in the paying country may also retrieve the transaction details from the money transfer software using limited search criteria and enable an accomplice to proceed with collection at a separate location in the expected payout country. Or, a number of fraudulently inclined individuals may present themselves simultaneously at different agent locations in the destination country of a transfer and all receive payout before the money transfer system is able to detect the problem.
Hence, a more robust payee authentication method is required at point of payout to secure the process from these attacks.
BRIEF SUMMARY OF THE INVENTIONOne embodiment of the invention provides for a transaction settlement identifier generation system. The system may include an arrangement configured to receive a biometric sample from a customer; an arrangement configured to use the biometric sample to select the transaction settlement identifier from a pool of predetermined transaction settlements; and a mapping arrangement configured to map the selected financial transaction settlement identifier to an identifier of the customer. The biometric sample may be a voiceprint, fingerprint, DNA sample, and/or a retinal scan. The transaction settlement identifier may be a one-time use credit card number.
Another embodiment of the invention provides a system for associating a biometric sample with a transaction settlement identifier. The system includes a storage arrangement adapted to store transaction settlement identifiers and keys; an input adapted to receive a biometric sample from a user; and a processor. The processor may be programmed to execute instructions to receive the biometric sample from a user through the input; instructions to use the biometric sample to select a transaction settlement identifier from a pool of predetermined transaction settlement identifiers; and instructions to thereafter use the transaction settlement identifier to settle a transaction. The processor may further have instructions to use the biometric sample to generate a first key; and instructions to store the first key and the transaction settlement identifier as a record. Processor instructions may further generate the first key by a cryptographic hashing of the biometric sample. The transaction settlement identifier may be a credit card number, a charge card number, a one-time use credit card number, a money transfer control number, a transfer authentication number, a transaction identifier, a debit card number, and/or a stored value card number. The biometric sample may be a voiceprint, a fingerprint, a retinal scan, and/or a DNA sample.
The processor may further include instructions to retrieve a second key associated with the transaction settlement identifier from the storage arrangement; and instructions to generate the first key by mathematically combining the first key with a cryptographic hash of the transaction settlement identifier. The processor may include instructions to apply an exclusive disjunction operator on the second key and the cryptographic hash of the transaction settlement identifier. The processor may also include instructions to receive a request from a user for a transaction settlement identifier, wherein the transaction settlement identifier comprises a one-time-use credit card number; instructions to retrieve a one-time-use credit card number from a pool of one-time-use credit card numbers; and instructions to issue the one-time-use credit card number to the customer. The processor may further include instructions to generate a one-time credit-card number.
Another embodiment of the invention may provide for a method for associating a cryptographic hash of a physical sample with a financial identifier. The method may include receiving a first biometric sample from a user; using the biometric sample to select a transaction settlement identifier from a pool of predetermined transaction settlement identifiers; and using the transaction settlement identifier to settle a transaction. The method may also include generating a first key from the biometric sample; and assigning the first key to the transaction settlement identifier. Generating a first key may include retrieving a second key associated with the financial identifier from a database; and mathematically combining the previous key with the hash to create the first. A first key may be generated by applying an exclusive disjunction operation on the previous key and the hash. The method may also include receiving a request from a user for a financial identifier, wherein the financial identifier comprises a one-time-use credit card number; retrieving a one-time-use credit card number from a pool of one-time-use credit card numbers; and issuing the one-time-use credit card number to the customer. A one-time-use credit card number may also be generated.
The transaction settlement identifier may be an account number, a credit card number, a charge card number, a one-time-use credit card number, a money transfer control number, a transfer authentication number, a transaction identifier, a debit card number, and/or a stored value card number. The biometric sample may be a voiceprint, a fingerprint, a retinal scan, and/or a DNA sample.
A further understanding of the nature and advantages of the present invention may be realized by reference to the remaining portions of the specification and the drawings wherein like reference numerals are used throughout the several drawings to refer to similar components. Further, various components of the same type may be distinguished by following the reference label by a dash and a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
Embodiments of the present invention relate to systems and methods for assigning transaction settlement identifiers. In order to provide a context for describing embodiments of the present invention, embodiments of the invention will be described herein with reference to providing transaction settlement identifiers (aka “transaction settlement numbers”) as one-time-use credit card numbers for purchase transactions and/or money transfer control number (MTCNs) for money transfer transactions. Those skilled in the art will appreciate, however, that other embodiments are possible. For example, embodiments of the invention may be used to provide brokerage account purchase and redemption transaction settlement numbers and the like.
The ensuing description provides preferred exemplary embodiment(s) only, and is not intended to limit the scope, applicability or configuration of the invention. Rather, the ensuing description of the preferred exemplary embodiment(s) will provide those skilled in the art with an enabling description for implementing a preferred exemplary embodiment of the invention. It is to be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the invention as set forth in the appended claims.
Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, systems may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known processes, structures and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
Also, it is noted that the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
Moreover, as disclosed herein, the term “storage medium” may represent one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information. The term “computer-readable medium” includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels and various other mediums capable of storing, containing or carrying instruction(s) and/or data.
Furthermore, embodiments may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine readable medium such as storage medium. A processor(s) may perform the necessary tasks. A code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
According to embodiments of the present invention, a biometric feature of an individual is used to generate a transaction identifier for subsequent use by the individual to complete a transaction. The transaction may be a purchase transaction, a money transfer transaction, or the like. The close association of the transaction identifier to the individual helps to minimize fraud associated with the transaction.
In the case of purchase transactions, a consumer provides a biometric sample to an issuer upon requesting the transaction identifier. The biometric sample may be a sample of any of a variety of biometric features of the consumer. For example, the consumer may provide a fingerprint, a voiceprint, DNA, retinal scan, or the like. Moreover, while embodiments of the present invention are described using a biometric feature of an individual to generate a transaction identifier, other physical identifiers may be used. For example, a PC signature or the keystroke dynamics of the user may be used. In such embodiments, the user may request a transaction identifier using a computer and use the PC signature or their keystroke dynamics to generate a transaction identifier. The PC signature or keystroke dynamics may be initiated locally by the user's computer or remotely through a network. Accordingly, while a biometric sample is used throughout the specification to describe embodiments of the invention, other physical identifiers uniquely identifying a user or user's system may be used to generate a transaction identifier.
The transaction identifier may be a one-time-use transaction identifier, such as a one-time-use credit card number, or the like. The issuer uses the biometric sample, or a function thereof (e.g., a hash), to select the transaction identifier from a large pool of transaction identifiers appropriate for the particular use. The consumer thereafter uses the transaction identifier to complete the transaction. In some cases, a second biometric sample is obtained from the consumer to authorize the transaction. In other cases, a second biometric sample is obtained only if the consumer attempts to repudiate the transaction.
In the case of money transfer transactions, a sender obtains a first transaction number upon depositing funds with a money transfer agent. The sender then provides the first transaction number to the desired recipient. The recipient then provides a biometric sample and the first transaction number to a money transfer system operator to receive a second transaction number (e.g., a MTCN, Money Transfer Control Number). The money transfer agent on the sender side, therefore, does not know the MTCN. The recipient then requests the funds deposited by the sender from a money transfer agent, which may be the same as the money transfer agent on the send side, but is most likely a different money transfer agent. At the time of request, the recipient provides the MTCN and a biometric sample. Only if the biometric sample matches the sample provided by the recipient to the money transfer system operator can the money transfer agent provide the funds. Hence, according to some embodiments, the transfer is protected from fraudulent collusion among money transfer agents since agents do not have access to transfer records using only an MTCN. Moreover, by providing a biometric sample at the time of receipt, a recipient is less able to claim not having received the funds. Further, embodiments of the present invention prevent multiple individuals from simultaneously requesting payment from different money transfer agents and receiving multiple payouts, since, presumably only one individual's biometric will result in transaction approval. Further still, collection of a biometric at the time of payment allows aggregation of transaction amounts for anti-money laundering compliance tracking.
Having described embodiments of the invention generally, attention is directed to
In the typical purchase transaction 100 of
Attention is directed to
The online merchant 208 may communicate with the issuer computer 204 via the network 204 or through a different network 212, which may be, for example, a credit card transaction processing network. The online merchant 208 communicates with the issuer to obtain authorization for credit card transactions.
According to some embodiments, the consumer obtains a one-time-use credit card by communicating with the issuer via the Internet. This assumes that the consumer is able to provide a biometric sample via the Internet. In other embodiments, the consumer may use a telephone 214 to contact the issuer via the PSTN (public switched telephone network) 216 or Internet using, for example VOIP (Voice Over Internet Protocol), to thereby provide a voiceprint. Those skilled in the art will appreciate, in light of the disclosure herein, a number of additional embodiments through which a consumer may provide a biometric sample to the issuer.
Having described an exemplary system 200, attention is directed to
The method 300 depicts the typical case in which the consumer does not attempt to repudiate the transaction.
Attention is directed to
Hence, according to embodiments of the invention, a consumer is less able to repudiate a transaction, due to the tight coupling between the consumer, using the biometric, and the issuance of the one-time-use number. Of course, the consumer could also claim that the one-time-use number was pilfered after issuance, but other controls may be used to limit such possibility. For example, a consumer may protect himself by requesting the number close in time to the planned usage. The issuer may protect itself by limiting the validity duration of the number to only a few minutes, a few hours, or a few days. The one-time-use nature of the number provides further protection for both the consumer and the issuer by preventing multiple uses of the number. Even further protection may be provided if the merchant takes a biometric sample from the consumer at the time of the purchase transaction. The merchant would then provide the sample to the issuer as part of the authorization process.
Those skilled in the art will appreciate a number of modifications and additional advantages to embodiments of the present invention in light of the disclosure herein. Moreover, in light of the disclosure herein, those skilled in the art will appreciate how the concepts disclosed herein by be applied to other types of transactions. For example,
Attention is directed to
The system 400 also includes a telephone 408 associated with a recipient and the PSTN (public switched telephone network) 410 though which the recipient may communicate with the money transfer system operator 406. The recipient, having received the transaction identifier from the sender, is able to provide the transaction identifier and a biometric sample to thereby obtain the MTCN. Those skilled in the art will appreciate many additional means through which the recipient may provide a biometric sample to and obtain a MTCN from the money transfer system operator.
The system also includes a recipient agent location 412 at which the sender may request payment. The sender agent location 412 is able to obtain a biometric sample from the recipient, communicate the biometric sample, along with the MTCN, to the money transfer system operator 406, and receive authorization to pay the recipient. The recipient is paid only if the biometric the recipient provides matches the biometric supplied to obtain the MTCN.
Having described the money transfer system 400, attention is directed to
At block 438, the recipient requests payment from a money transfer agent. The agent collects the MTCN and a biometric sample from the recipient at block 440 and supplies them to the operator at block 442 as part of an authorization request. The operator uses the MTCN to locate the biometric sample provided to obtain the MTCN and authorizes the agent to pay the recipient only if the samples match, which takes place at block 444.
Those skilled in the art will appreciate that the aforementioned embodiments are merely exemplary. Moreover, it will be appreciated that the any of a variety of methods may be employed to generate one-time-use credit card numbers, MTCNs, and the like from a biometric sample. In may embodiments, the one-time-use credit card number or MTCN is selected from a large pool of appropriately selected numbers using the biometric sample or a function of a biometric sample, but this is not required. The ensuing description, however, provides exemplary methods for generating a master pool, selecting numbers from the pool, and authorizing transactions using numbers selected from the pool.
Attention is directed to
At block 534, a first transaction settlement number is randomly selected from the from the array. At block 536 a determination is made whether the transaction settlement number has already been selected. If it has, another transaction settlement number is randomly selected at block 534. If the selected number has not been selected yet, the number is inserted into the master pool at block 538. The process continues, consecutively populating records of the master pool with transaction settlement numbers, until the master pool is fully populated with random selections of transaction settlement numbers from the array. Those skilled in the art will appreciate that this is but one exemplary method for populating an exemplary master pool.
A credit card number is selected at block 710 for populating the one-time-use credit card number pool 730 associated with the credit card number. A one-time-use credit card number is randomly generated at block 715. Generation of the one-time-use credit card number may also include steps to ensure the one-time-use credit card number complies with industry specifications. At block 720, the method determines if the one-time-use credit card number generated at block 715 is unique, if it is not unique, the method returns to block 715. The system may determine if the one-time-use credit card number is unique by refereeing to a list or array of issued credit card numbers, unissued credit card numbers or the like. If the one-time-use credit card number is unique, the method moves to block 725. At block 725, the one-time-use credit card number pool record number is incremented. At block 735, the system determines if the one-time-use credit card number pool is full. If the pool is full, the system returns to block 710, where another credit card number is selected. In alternative embodiments, the size of the one-time-use credit card number pool 730 may be increased and the system moves along to block 740. In other embodiments, more than one-time-use credit card number pool may be associated with the credit card number. At block 740, the randomly produced one-time-use credit card number is entered into the one-time-use credit card number pool and the system returns to block 715.
Attention is directed to
The key field provides an index to the assignment table. According to embodiments of the invention, the key field is based on a biometric sample as will be described in greater detail with respect to
The assignment table 800, unlike the master pool 500, is not fully populated initially. Additional records are added as transaction settlement numbers are requested and assigned by the issuer. A “last record assigned” pointer is used in the process of assigning transaction settlement numbers as will be described with respect to
Attention is directed to
At block 904, the issuer creates a hash of the biometric sample, thereby producing #V. In this embodiment, the hashing algorithm produces a #V that is repeatable for different biometric samples of the same individual. In other embodiments, a function other than hashing may be used to produce #V. In other embodiments, the function may not produce a #V that is repeatable for different biometric samples of the same individual.
At block 906, #V is used to search the assignment table. At block 908, a determination is made whether #V has been used previously as an assignment table key. If not, the process continues at block 910. If so, the process continues at block 918 as will be described below.
At block 910, #V is populated into the key field of a new assignment table record. At block 912, the “last record assigned” pointer is incremented to point to the next, unassigned, record in the master pool. At block 914, the record # of the indicated record of the master pool is populated into the record # field of the new record of the assignment table. The customer's real credit card account number is populated into the real CC# field of the new assignment record, the key of the new assignment record is populated into the assignment pointer field of the current master pool record, and any usage conditions are populated into the usage conditions field of the assignment record. The next and previous pointers of the new assignment record are populated appropriately as will be described in greater detail hereinafter.
At block 916, the transaction settlement number is returned to the customer. The customer may thereafter use the transaction settlement number in an appropriate transaction.
Returning to block 910, if #V has been used previously (i.e., a record in the assignment table has the value #V as a key), blocks 912 and 914 are traversed repeatedly until the last assignment table record in the chain is located. Locating the last record in the chain, however, requires knowing how subsequent keys are assigned.
Each time a customer requests a transaction settlement number (e.g., a one-time-use credit card number), a new key is created. The first key is #V. The second key is #V XOR the first transaction settlement number assigned to the customer. Third key is the second key XOR the second transaction settlement number assigned to the customer, and so on. Hence, each new key incorporates together the customer's biometric and each previously assigned transaction settlement number.
Returning to the discussion of
It should now be apparent to those skilled in the art that the next and previous pointer fields may be, at block 914, populated to assist with searches of the assignment table. This will be particularly useful during authorization and dispute resolution processes as will be described in greater detail hereinafter with reference to
At Block 1010 a user contacts issuer to dispute a transaction they consider to be fraudulent. The user's identity may need confirmation because the user may deny requesting and having been issued a one-time-use credit card number and, therefore, deny making a transaction with the one-time-use credit card number. The user may also wish to confirm their identity in order to receive a payout.
At block 1015, the issuer receives the transaction settlement number from the user as well as a biometric sample at block 1020. After receiving the biometric feature, the issuer creates a hash (#H) of the biometric sample at block 1025 using a hashing algorithm as discussed above. The issuer may then retrieve the record associated with the transaction settlement number at block 1030, for example, from the assignment table.
The record retrieved at block 1030, may contain the transaction settlement number, and a unique key. The record may also contain previous and next pointers. The previous and next pointers link the records for a particular user in a chain like fashion. As described above, the key associated with each transaction settlement number may be a mathematical combination of the previous key and the previous transaction settlement number. The first key associated with a user is the hash of the biometric sample. Thus, at block 1035, the method determines whether this record associated with the transaction settlement number is the first record in the chain. If the previous pointer is NULL, then the record is the first record in the chin. If it is not the first record the method retrieves the previous record at block 1040. If the previous pointer equals NULL then the record is the first record. Between blocks 1035 and 1040, the method traverses the chain of records to find the first record. Once the first record is found the stored hash of the biometric sample (#V) is the key associated with the first record. At block 1045, the method determines whether the received biometric sample hash (#H) equals the stored hash of the stored biometric sample (#V). If the two hashed samples match, the identity of the user is confirmed at block 1050. If the two hashed samples do not match, the identity of the user is not confirmed.
The method 1000, for example, may be applicable in a system generating one-time-use credit card numbers, where a one-time-use credit card number is the transaction settlement number. In such systems, a user receives a one-time-use credit card number upon receipt of a biometric sample. If a user claims that they did not request a one-time-use credit card number, the biometric sample received from the user and stored when the one-time-use credit card number was issued may be used to either confirm or deny the users claim. For example, the user contacts the issuer at block 1010, the credit card number is received 1015, and a biometric sample is received 1020. The stored biometric sample used when the one-time-use credit card number was issued is retrieved in blocks 1030, 1035 and 1040 and the chain of records may be traversed. The biometric samples are compared. If the hash of the biometric sample received when the one-time-use credit card number was issued matches the hash of the biometric sample received at block 1020, then the user's claim is denied, because the one-time-use credit card number was issued to the user and not a fraudster. Otherwise, if there is no match, the user may have a genuine fraud claim, whereupon the issuers may initiate procedures to address the fraudulent activity.
Attention is directed to
According to the embodiment 1200 of
At block 1216, the sender deposits funds and provides any additional details necessary to create the transaction. The transaction record established by the recipient is accessed using the transaction control number provided to the sender by the recipient. At this point, the ability to receive the funds is closely tied to the recipient via the biometric sample. The blocks 1210, 1212, 1214, and 1216 are substantially similar to the corresponding blocks 1310, 1312, 1314, and 1316 of the embodiment 1300 of
The recipient can now receive the funds in any of several ways. According to the embodiment 1200 of
According to the exemplary embodiment 1300 of
Thereafter, the recipient may use the MTCN to access the funds in any of a variety of ways, including by visiting a money transfer location, accessing an account electronically, and the like, as is apparent to those skilled in the art in light of this disclosure.
Having described several embodiments, it will be recognized by those of skill in the art that various modifications, alternative constructions, and equivalents may be used without departing from the spirit and scope of the invention. Additionally, a number of well-known processes and elements have not been described in order to avoid unnecessarily obscuring the present invention. For example, those skilled in the art know how MTCNs are used in money transfer transactions and how one-time-use credit card purchase transactions are settled. Moreover, those skilled in the art will appreciate that the concepts discussed herein may be directed toward other types of transactions. Accordingly, the above description should not be taken as limiting the scope of the invention, which is defined in the following claims.
Claims
1. (canceled)
2. A one-time credit card number generation system, comprising:
- an input device configured to receive a biometric sample from a customer;
- an processing device configured to use the biometric sample to select a one-time credit card number from a pool of predetermined one-time credit card numbers; and
- a mapping device configured to map the selected one-time credit card number to an identifier of the customer.
3. The one-time credit card number generation system of claim 2, wherein the input device configured to receive the biometric sample comprises a fingerprint scanner.
4. The one-time credit card number generation system of claim 2, wherein the processing device configured to use the biometric sample comprises a retinal scanner.
5. The one-time credit card number generation system of claim 2, wherein the biometric sample comprises a selection from the group consisting of voiceprint, fingerprint, DNA sample, and retinal scan.
6. A system for associating a biometric sample with a one-time credit card number comprising:
- a storage device configured to store one-time credit card number and keys;
- an input device configured to receive a biometric sample from a user; and
- a computer processor in communication with the storage device and the input device, wherein the computer processor is configured to execute sets of instruction which cause the computer processor to: receive the biometric sample from a user through the input; use the biometric sample to select a one-time credit card number from a pool of predetermined one-time credit card number; and use the one-time credit card number to settle a transaction.
7. The system of claim 6, wherein the sets of instructions to use the biometric sample to select a one-time credit card number from a pool of predetermined one-time credit card numbers further cause the computer processor to:
- use the biometric sample to generate a first key; and
- store the first key and the one-time credit card number as a record.
8. The system of claim 7, wherein the sets of instructions to use the biometric sample to generate a first key further cause the computer processor to:
- generate the first key by a cryptographic hashing of the biometric sample.
9. The system of claim 6, wherein the biometric sample comprises a selection from the group consisting of: a voiceprint, a fingerprint, a retinal scan, and a DNA sample.
10. The system of claim 7, wherein the sets of instructions to use the biometric sample to generate a first key further cause the computer processor to:
- retrieve a second key associated with the one-time credit card number from the storage arrangement; and
- generate the first key by mathematically combining the first key with a cryptographic hash of the one-time credit card number.
11. The system of claim 10, wherein the instructions to generate the first key by mathematically combining the first key with a cryptographic hash of the one-time credit card number further comprise instructions to apply an exclusive disjunction operator on the second key and the cryptographic hash of the one-time credit card number.
12. The system of claim 6, wherein the sets of instructions further cause the commuter processor to:
- issue the one-time-use credit card number to the customer.
13. The system of claim 6 wherein the sets of instructions further cause the commuter processor to:
- generate a one-time credit-card number.
14. A method for associating a cryptographic hash of a physical sample with a financial identifier, the method comprising:
- receiving a first biometric sample from a user;
- using the biometric sample to select a one-time credit card number from a pool of predetermined one-time credit card numbers; and
- using the one-time credit card number to settle a transaction.
15. The method of claim 14, wherein the biometric sample comprises a selection from the group consisting of: a voiceprint, a fingerprint, a retinal scan, and a DNA sample.
16. The method of claim 14, wherein selecting a one-time credit card number from a pool of one-time credit card numbers comprises:
- generating a first key from the biometric sample; and
- assigning the first key to the one-time credit card number.
17. The method of claim 16, wherein the generating a first key comprises:
- retrieving a second key associated with the financial identifier from a database; and
- mathematically combining the previous key with the hash to create the first key.
18. The method of claim 17, wherein mathematically combining the previous key with the hash to create the first key, further comprises applying an exclusive disjunction operation on the hash of the biometric feature and the previously generated key.
19. The method of claim 14, further comprising:
- issuing the one-time-use credit card number to the customer.
20. The method of claim 14, further comprising generating a one-time credit-card number.
Type: Application
Filed: Aug 5, 2015
Publication Date: Nov 26, 2015
Inventors: Tim Keane (Dublin), Dean Seifert (Dublin), Jonathan Grahmann (Dublin)
Application Number: 14/818,326