| CPC G05B 1/00 (2013.01) [G06F 21/32 (2013.01); G06F 21/35 (2013.01); G07C 9/257 (2020.01); H04L 9/321 (2013.01)] |

| AS A RESULT OF REEXAMINATION, IT HAS BEEN DETERMINED THAT: |
| Claims 1-17 are cancelled. |
| New claims 18-34 are added and determined to be patentable. |
|
[ 18. A method for verifying a user during authentication of an integrated device, comprising the steps of:
persistently storing biometric data of the user and a plurality of codes and other data values comprising a device ID code uniquely identifying the integrated device and a secret decryption value in a tamper proof format written to a storage element on the integrated device that is unable to be subsequently altered; wherein the biometric data is selected from a group consisting of a palm print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a signature recognition and a voice recognition;
responsive to receiving a request for a biometric verification of the user, receiving scan data from a biometric scan;
comparing the scan data to the biometric data to determine whether the scan data matches the biometric data;
responsive to a determination that the scan data matches the biometric data, wirelessly sending one or more codes from the plurality of codes and the other data values for authentication by an agent that is a third-party trusted authority possessing a list of device ID codes uniquely identifying legitimate integrated devices, wherein the one or more codes and other data values includes the device ID code; and
responsive to authentication of the one or more codes and the other data values by the agent, receiving an access message by an application from the agent allowing the user access to the application and complete a transaction of the user accessing the application, wherein principal parties to the transaction are the user and the application, and wherein the application is selected from a group consisting of a casino machine, a keyless lock, a garage door opener, an ATM machine, a hard drive, computer software, a web site and a file.]
|
|
[ 19. The method of claim 18, wherein the one or more codes and the other data values are transmitted to the agent over a network.]
|
|
[ 20. The method of claim 18, further comprising:
registering an age verification for the user in the association with the device ID code.]
|
|
[ 21. The method of claim 18, wherein the one or more codes and the other data values indicate that the biometric verification was successful.]
|
|
[ 22. The method of claim 18, wherein the biometric data and the scan data are both based on a fingerprint scan by the user.]
|
|
[ 23. The method of claim 18, further comprising:
establishing a secure communication channel prior to sending the one or more codes and the other data values for authentication.]
|
|
[ 24. The method of claim 18, further comprising:
receiving a request for the one or more codes and the other data values without a request for biometric verification; and
responsive to receiving the request for the one or more codes and the other data values without a request for biometric verification, sending the one or more codes and the other data values without requesting the scan data.]
|
|
[ 25. An integrated device for verifying a user during authentication of the integrated device, comprising:
a memory stores biometric data of a user and a plurality of codes and other data values comprising a device ID code uniquely identifying the integrated device and a secret decryption value in a tamper proof format written to the memory that is unable to be subsequently altered; wherein the biometric data is selected from a group consisting of a palm print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a signature recognition and a voice recognition;
a verification unit, in communication with the memory, receives scan data from a biometric scan for comparison against the biometric data, and if the scan data matches the biometric data, wirelessly sends one or more codes from the plurality of codes and the other data values for authentication by an agent that is a third-party trusted authority possessing a list of device ID codes uniquely identifying legitimate integrated devices, wherein the one or more codes and the other data values includes the device ID code; and
responsive to the agent authenticating the one or more codes and the other data values, a radio frequency communicator, receives an access message by an application from the agent allowing the user access to the application and complete a transaction of the user accessing the application, wherein principal parties to the transaction are the user and the application, and wherein the application is selected from a group consisting of a casino machine, a keyless lock, a garage door opener, an ATM machine, a hard drive, computer software, a web site and a file.]
|
|
[ 26. The integrated device of claim 25, wherein the one or more codes and the other data values are transmitted to the agent over a network.]
|
|
[ 27. The integrated device of claim 26, wherein an age verification is registered in association with the device ID code.]
|
|
[ 28. The integrated device of claim 25, wherein the verifier comprises: an LED to be activated for requesting the biometric scan.]
|
|
[ 29. A method for authenticating a verified user using a computer processor configured to execute method steps, comprising:
receiving one or more codes from a plurality of codes and other data values including a device ID code, wherein the plurality of codes and the other data values comprise the device ID code uniquely identifying an integrated device and a secret decryption value associated with a biometrically verified user, the device ID code being registered with an agent that is a third-party trusted authority possessing a list of device ID codes uniquely identifying legitimate integrated devices;
requesting authentication of the one or more codes and the other data values by the agent, wherein the authentication determines whether the one or more codes and the other data values are legitimate;
receiving an access message by an application from the agent; and
in response to a positive access message, allowing the biometrically verified user access to the application and complete a transaction of the user accessing the application, wherein principal parties to the transaction are the user and the application, and wherein the application is selected from a group consisting of a casino machine, a keyless lock, a garage door opener, an ATM machine, a hard drive, computer software, a web site and a file.]
|
|
[ 30. The method of claim 29, further comprising:
registering a date of birth or age with the agent.]
|
|
[ 31. The method of claim 29, further comprising:
establishing a secure communications channel with a biometric key, wherein the one or more codes and the other data values associated with the biometrically verified user is received from the biometric key.]
|
|
[ 32. A system comprising:
a biometric key stores biometric data of a user and a plurality of codes and other data values comprising a device ID code uniquely identifying the biometric key and a secret decryption value in a tamper proof format written to a storage element on the biometric key that is unable to be subsequently altered, and if scan data can be verified as being from the user by comparing the scan data to the biometric data, wirelessly sending, one or more codes from the plurality of codes and other data values wherein the one or more codes and the other data values include the device ID code, and the biometric data is selected from a group consisting of a palm print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a signature recognition and a voice recognition; and
an authentication unit receives the plurality of codes and the other data values and sends the plurality of codes and the other data values to an agent for authentication to determine whether the one or more codes and the other data values are legitimate, wherein the agent is a third-party trusted authority possessing a list of device ID codes uniquely identifying legitimate integrated devices, and responsive to the device ID code being authenticated, the authentication unit receiving an access message by an application from the agent allowing the user to access the application and complete a transaction of the user accessing the application, wherein principal parties to the transaction are the user and the application, and wherein the application is selected from a group consisting of a casino machine, a keyless lock, a garage door opener, an ATM machine, a hard drive, computer software, a web site and a file.]
|
|
[ 33. The system of claim 32, wherein the biometric key receives an authentication request from the authentication unit, and in response, requests a biometric scan from the user to generate the scan data.]
|
|
[ 34. The system of claim 32, wherein if the biometric key cannot verify the scan data as being from the user, it does not send the one or more codes and the other data values.]
|