Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Biometric acquisition

Subclass of:

713 - Electrical computers and digital processing systems: support

713182000 - SYSTEM ACCESS CONTROL BASED ON USER IDENTIFICATION BY CRYPTOGRAPHY

713185000 - Using record or token

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20080270803Biometric Encryption And Decryption - Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system.10-30-2008
20100077224MULTIPLATFORM INDEPENDENT BIOMETRIC IDENTIFICATION SYSTEM - An independent biometric identification system having an independent biometric identification server and a capture device connected to a user's system to receive biometric characteristics of a user. The independent biometric identification server causes the user to identify its capture device to the server and provides biometric identification of the user independently of individual applications implemented on the user's system. The system further includes a biometric capture agent application chosen by the independent biometric identification server and individually developed for the identified capture device. Finally, the system includes a biometric database storing the biometric characteristics of the user.03-25-2010
20130080788Biometric Key - A biometric key (03-28-2013
20130080789Multi-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication.03-28-2013
20130036309SYSTEM AND METHOD FOR VERIFYING THE IDENTITY OF AN INDIVIDUAL BY EMPLOYING BIOMETRIC DATA FEATURES ASSOCIATED WITH THE INDIVIDUAL - The invention relates to a system for verifying the identity of an individual by employing biometric data features associated with the individual, which system comprises at least one or more hardware components, an enrolment means, and a verifying means, wherein said enrolment means are arranged in deriving a first biometric template data, said first biometric template data being secret and associated with a first set of first biometric data features of said individual, and in receiving a further set of first biometric data features of said individual, and in deriving a further biometric template data associated with said further set of first biometric data, and wherein said verifying means are arranged in comparing the first biometric template data with the further biometric template data to check for correspondence, wherein the identity of the individual is verified if correspondence exists. The invention aims to provide a solution to the above identified drawbacks and thereto at least one of said hardware components is provided with at least one component specific data feature associated therewith and wherein said enrolment means are arranged in associating at least one of said component specific data features with said biometric template data.02-07-2013
20100042850AUTHENTICATION METHOD AND APPARATUS - An authentication method for use in an apparatus having a function, a function to execute a first program that executes a predetermined process after first user authentication with biometrics authentication is performed and does not have a network connection function, and a function to execute a second program that is invoked after the first program is executed, executed after second user authentication and has a network connection function comprises executing the first program in forgery detection mode regardless of a result of a user determination if biometrics authentication with forgery is detected at the time of the first user authentication, invoking the second program in the forgery detection mode after the first program is executed in the forgery detection mode, and notifying a device connected to an external network of forgery detection information by using the network connection function after the second program is invoked in the forgery detection mode.02-18-2010
20090158049Building a security access system - In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.06-18-2009
20100106975SYSTEM AND METHOD FOR USER AUTHENTIFICATION USING NON-LANGUAGE WORDS - A system and method for user authentication include a user instructing component and a voice authentication component. The user instructing component generates an instruction for authenticating a voice of a user. The instruction includes a first instruction to recite one or more non-language words. The voice authentication component analyzes a sound signal which includes a response to the instruction. The voice authentication component can authenticate the voice of the user using the response to the instruction including a response to the first instruction to recite the one or more non-language words.04-29-2010
20120166810Biometrically Securing and Transmitting Data - The disclosed technology combines biometric authentication and data transmission technologies to provide for secure storing of private information and wireless transmission of the private information in order to perform predefined tasks. A user may securely store his private information in an electronic database. To access the private information stored securely, the user provides his biometric data. Upon successful biometric authentication of the user, authorization is granted to the user to access the private information stored in the electronic database. Upon successful biometric authentication, the private information can be transmitted via short range wireless communication. Optionally, upon successful biometric authentication, the private information can be transmitted via wireless communication over a computer network.06-28-2012
20130046993Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption - A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed.02-21-2013
20090044023CONTROL DEVICE WITH AN INTEGRATED USER INTERFACE - A control device for controlling operation of a controlled apparatus is disclosed. The control device may include a sensor configured to acquire a first biometric signal, a second biometric signal, and a third biometric signal. A difference between the first biometric signal and the second biometric signal may be utilized to determine movement of a controlled object. The controlled object may pertain to the operation of the controlled apparatus. At least one of the first biometric signal, the second biometric signal, and the third biometric signal may be utilized to initiate performance of a first function of the controlled apparatus. Further, one or more of the first biometric signal, the second biometric signal, and the third biometric signal may be utilized to determine an identification of a user.02-12-2009
20090327744INFORMATION PROCESSING APPARATUS AND SECURITY PROTECTION METHOD - According to one embodiment, an information processing apparatus includes an input module to input a password, a biological authentication device including a storage unit for storing biological information and identification information, and an authentication control module which sets and holds identification information to be stored in the storage unit of the biological authentication device, and permits a password input using the input module to be substituted by authentication using the biological authentication device when the identification information held by itself and the identification information stored in the storage unit of the biological authentication device match. The authentication control module includes a setting module to perform a setting for the identification information stored in the storage unit of the biological identification device and held by itself, on both conditions of authentication establishment with a registered password entry using the input module and authentication establishment using the biological authentication device.12-31-2009
20090282260ELECTRONIC DATA VAULT PROVIDING BIOMETRICALLY PROTECTED ELECTRONIC SIGNATURES - An eVault system securely stores personal data and documents for citizens and allows controlled access by citizens and optionally by service providers. The eVault may be adapted to allow processes involving the documents to be carried out in a secure and paperless fashion. Documents are certified, and biometric matching is used for security. On effecting a match with a biometric identifier presented by a user, the user is allowed access to his personal eVault and to access a personal cryptographic key stored therein. One or more of these personal keys may be securely applied within the eVault to generate an electronic signature, amongst other functions.11-12-2009
20090271635METHODS AND SYSTEMS FOR AUTHENTICATION - The present invention discloses a method and system for authentication. The method for authentication includes: acquiring the privilege security level corresponding to a client-end; inquiring the identity security level corresponding to the privilege security level according to an established relation of association between privilege security level and identity security level; determining the authentication parameters for identity authentication according to the identity security level; performing identity authentication on the client-end using the authentication parameters; and obtaining an authentication result. The identity authentication and privilege authentication are combined, and identity authentication is performed according to the identity security level in accord with the privilege security level so that rules of identity authentication can be adjusted, and the flexibility of the process of authentication may be improved.10-29-2009
20090271634Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens - Techniques, systems and methods are described relating to combining biometric and cryptographic techniques to support securely embedding data within a token and subsequent biometrically-enabled recovery of said data. Various transformation approaches are described that provide a secure means for transforming a stored or live, secure biometric-based identity token, embedding data into such tokens and biometric-based matching to both verify the user's identity and recover the embedded data. Security enhancements to a range of existing protocols are described using the techniques. Systems using novel protocols based on these techniques are described10-29-2009
20090070592FINGER SENSING APPARATUS USING ENCRYPTED USER TEMPLATE AND ASSOCIATED METHODS - A finger sensing apparatus may include an integrated circuit (IC) substrate, an array of finger sensing elements on the IC substrate, and encryption circuitry on the IC substrate cooperating with the array of finger sensing elements for encrypting a user template comprising finger template data and at least one user credential. The at least one user credential may enable another device, such as a host platform, to perform at least one protected operation.03-12-2009
20090031139System and Method for Electronic Certification and Authentification - The invention relates to electronic document security systems and in particular to user authentication and to the certification and secure transfer of sensitive document information of various type, like whole documents, certificates, signatures, stamps, etc., especially by verifying its correctness and safety/immunity from fraud.01-29-2009
20130067235COMPUTING DEVICE FOR AUTHENTICATION - There is provided a computing device for authentication. The computing device comprises a processor for processing digital data; a memory device for storing digital data including computer program code and being coupled to the processor; and an interface for sending and receiving digital data and being coupled to the processor. The processor is controlled by the computer program code to receive, via the interface, image selection data representing an image selection from a set of candidate images; and authenticate in accordance with the image selection data.03-14-2013
20090013191MULTISYSTEM BIOMETRIC TOKEN - An apparatus and a method for generating a unique user identification code for a user of a biometric security system is presented. No biometric information is stored either within the security system or on a device, and process enables a unique user identification code to be generated to allow multi-system identification of the same user.01-08-2009
20090006859SYSTEM AND METHOD FOR OUT-OF-BAND ASSISTED BIOMETRIC SECURE BOOT - In some embodiments, the invention involves using a dedicated service processor with out-of-band capabilities to enable a secure boot using biometric data to authenticate the user. In some embodiments, at least a secondary token is used enhance the secure boot. An off-line database may be accessed by the service processor during boot to store or retrieve biometric templates to compare with scanned, live, biometric data. Other embodiments are described and claimed.01-01-2009
20080294907Methods for using a biometric parameter in the identification of persons - Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.11-27-2008
20090164796ANONYMOUS BIOMETRIC TOKENS - A biometrically enabled machine readable token is biometrically associated with the user or owner of the token. Such a token may be generated by initially providing biometric data of the user, and concealing the biometric data such that the biometric data is selectively accessible. The concealed biometric data is then used in generation of a token request message either by embedding the concealed biometric data into the token request message or by providing a concealed link thereto within the token request message. Once a token request message is received by a token issuer the concealed biometric data may be associated with the token. As the biometric data is concealed the specifics of that data are not accessible to third parties. Optionally the authenticity of the token may be effected by having the token issuer digitally signing the token.06-25-2009
20090100269BIOMETRIC AUTHENTICATION METHOD, COMPUTER PROGRAM, AUTHENTICATION SERVER, CORRESPONDING TERMINAL AND PORTABLE OBJECT - A biometric authentication method and apparatus are provided. A user to be authenticated uses a portable object including at least one biometric sensor. The portable object is adapted to cooperate with a terminal. The method includes: capturing, by the portable object, a biometric sample to be compared coming from the user to be authenticated; transmitting, by the portable object, the biometric sample, in a secure form to an authentication server; and determining, by the authentication server, a signature to be authenticated using said biometric sample, then comparing the signature with a reference signature.04-16-2009
20110302423METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.12-08-2011
20090037744Biometric pin block - A system for biometric user identification. Biometric information is captured from a user and compared to a biometric template that is read from an identification token associated with the user. A data structure is constructed comprising data having a predetermined arrangement, wherein the predetermined arrangement is selected to indicate the result of the comparison02-05-2009
20100268961Method and Arrangement for User Validation - A controlled access storage device includes a resource store storing two or more resources, the resource store having two or more levels of administration, wherein at least a first administration level is adapted to provide exclusive access to at least a first resource. The system includes an access control server (10-21-2010
20120239940IDENTIFICATION BY MEANS OF CHECKING A USER'S BIOMETRIC DATA - The invention relates to a database (09-20-2012
20120110341Mobile Device Transaction Using Multi-Factor Authentication - The following is a system in which a person may use a Cellular (Mobile) Telephone, a PDA or any other handheld computer to make a purchase. This is an example only. The process may entail any type of transaction which requires authentication, such as any financial transaction, any access control (to account information, etc.), and any physical access scenario such as doubling for a passport or an access key to a restricted area (office, vault, etc.). It may also be used to conduct remote transactions such as those conducted on the Internet (E-Commerce, account access, etc.). In the process, a multi-factor authentication is used.05-03-2012
20120110340SYSTEM, PORTABLE DEVICE AND METHOD FOR DIGITAL AUTHENTICATING, CRYPTING AND SIGNING BY GENERATING SHORT-LIVED CRYPTOKEYS - A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated from a unique set of input parameters. The system comprises an input device designed to extract predetermined characteristic values from value input by the user, which value is specific to the user, by means of a given algorithm, which algorithm is designed to remove the natural variation in the characteristic values in order to yield an identical set of characteristic values upon input of the same value, and a device designed to generate at least one user specific encryption key comprising said characteristic values.05-03-2012
20090183008IDENTITY AUTHENTICATION AND SECURED ACCESS SYSTEMS, COMPONENTS, AND METHODS - Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the token and the user's biometric identifier, convert the biometric identifier to a biometric key, and apply the biometric key to decrypt the token. In this way, the decoders authenticate the users without performing a biometric identifier comparison. In some embodiments pieces or sets of the data are stored in designated data compartments, which are individually encrypted based on authority keys, and all of the encrypted data compartments are collectively encrypted based on the biometric key to create the token. The decoders store only the authority keys corresponding to the data compartments which they have authorization to open. In addition, in some embodiments the token and the biometric identifier are encrypted and sent to a remote authentication server for decryption of the token.07-16-2009
20100083000Fingerprint Sensor Device and System with Verification Token and Methods of Using - A method and system of verification is provided for sensing a fingerprint. The present invention offers a secure authentication method and system based on a user's fingerprint data to grant the access to information at a remote location. A biometric input corresponding to the fingerprint is provided by a user and the biometric input is than validated. Based on the validation, a token is transmitted to a remote location. The method and system can be further enhanced by additional security comprising receiving a request based on the authentication of the user information and transmitting, to a second remote location, a token based on the biometric input in response to the request.04-01-2010
20090254757OPERATOR RECOGNITION DEVICE, OPERATOR RECOGNITION METHOD AND OPERATOR RECOGNITION PROGRAM - An operator recognition device is provided that eliminates the registration of data such as HMM data having a characteristic amount for which error in recognition occurs easily when recognizing an operator, and thus reduces the possibility of errors in recognition, and has stable recognition performance. When registering HMM data that is used when performing recognition processing, a speaker recognition device 10-08-2009
20090287938METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.11-19-2009
20110197074METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service.08-11-2011
20080209229METHOD OF AND SYSTEM FOR SELECTING AND PRESENTING CONTENT BASED ON USER IDENTIFICATION - Methods of and systems for selecting and presenting content based on user identification are provided. A user-interface method of selecting and presenting content items in which the presentation is ordered at least in part based on inferring which user of a collection of users is using an input device includes providing a set of content items, providing a set of preference information for each user indicating content item preferences of a corresponding user, and providing a set of user keypress biometric models representing expected keypress activity for the corresponding user. User keypress activity to identify desired content items is monitored to biometrically characterize the user and analyzed to find the closest match to one of the keypress biometric models. Based on the closest match, which user of the collection of users entered the input is inferred and the corresponding preference information is used to select, order, and present content items.08-28-2008
20080209228Method and Apparatus for a Merged Power-Communication Cable in Door Security Environment - A method controlling access to a door using a merged power-communication cable. An access controlled door lock in door is operated using merged power-communication cable. Access control identification mechanism in door may operate using merged power-communication cable. The access controlled door lock may include a piezoelectric controlled door lock or a standalone door lock or a solenoid controlled door lock. A processing module may operate in door to control access with power interface receiving at least part of the electrical power from the merged power-communication cable. The invention includes a strike plate containing a magnetic sensor aligns by a latch hole to a latch included an access control door lock. The invention also includes using a door conduit to provide the merged power-communication cable to at least the processing module in the door.08-28-2008
20080209226User Authentication Via Biometric Hashing - Techniques for authenticating biometric parameters via biometric hashing are described. In one implementation, a biometric parameter of a user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more biometric hashes are produced from the biometric parameter. To generate hashes that appear random, pseudorandom metrics are applied over the biometric parameter. The hashes are stored in association with user information that can be employed to authenticate the user. Subsequently, during authentication, a new biometric parameter is captured and hashes are computed from the parameter. The new biometric hashes are then compared with the predetermined stored hashes. If any of the new hashes are found to be identical, or sufficiently similar, to one or more of the predetermined biometric hashes, the biometric parameter is deemed valid and the user is authenticated.08-28-2008
20100299530USER AUTHENTICATION SYSTEM AND METHOD - A high security computer system and method that authenticates a user using iris recognition and liveliness detection. The method for authenticating the user to the secure system includes capturing an image of the user's face and generating an iris template from the image. While the iris template is being generated, liveliness verification is performed on the user's face. User access is granted if the iris template matches the enrolled iris template and if the liveness verification demonstrates the user's face is live, and denied if otherwise. The method may optionally silently re-authenticate the user after access is granted to the secure system. The authentication system includes an image capture device for capturing an image, an iris template generation component to generate an iris template from the image, a liveness detection component, and an iris comparison component adapted to compare the iris template to iris templates of previously enrolled users.11-25-2010
20090037743BIOMETRIC AUTHENTICATION DEVICE, SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION - A biometric sensor device, a portable electronic device including an actuatable biometric input device, and method of biometric authentication that includes an input device that generates a signal or completes a circuit when actuated, and a biometric reader that reads a biometric of a user when the user actuates the input device to generate the signal or complete the circuit. An authentication section authenticates the biometric read on the biometric reader to generate one of a data access allowance function based on authentication of the biometric input to the actuatable biometric input device and a data access prevention function based on non-authentication of the biometric input to the actuatable biometric input device. The data access allowance function permits data to be accessed at the data access interface, and the data access prevention function prevents reading and/or access to data anywhere on the data storage and access device.02-05-2009
20100005315METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.01-07-2010
20080276099Universal Serial Bus (USB) Flash Drive Having Locking Pins and Locking Grooves for Locking Swivel Cap - In one embodiment of the present invention a Universal Serial Bus (USB) flash drive with locking swivel cap includes a USB device, a swivel cap having a top swivel cap face and a bottom swivel cap face. The swivel cap is connectably attached to the USB device, four locking pins, two of which disposed on the top swivel cap face and two of which disposed on the bottom swivel cap face, two top locking grooves disposed on a top surface of the USB device, and two bottom locking grooves disposed on a bottom surface of the USB device, wherein the locking pins disposed on top swivel cap face coupled with the two top locking grooves and the locking pins disposed on the bottom swivel cap face couple with the two bottom locking grooves allowing the swivel cap to lock in fully open (180 degrees) and fully closed (0 degree). A USB connector is connected to the USB device to couple the USB flash drive to a host device. A fingerprint sensor area is disposed on the top side of the USB device, the fingerprint sensor scans fingerprints of a user of the portable flash drive with swivel cap and optional fingerprint verification capability, and allowing access to data stored on the portable flash drive with swivel cap and optional fingerprint verification capability.11-06-2008
20080282092Card reading apparatus with integrated identification function - A card reading apparatus integrating identification function is provided, including a USB interface, a memory card interface, an ATA/ATAPI interface, a USB OTG controller, an identification interface module, an encrypted identification processor, and at least an identification device. The USB interface, the memory card interface, and the ATA/ATAPI interface are connected respectively to a USB interface media device, a flash memory card, and a data storage device, such as hard disk or CD-RW. The USB OTG controller is connected to the USB interface, the memory card interface, and the ATA/ATAPI interface so that the USB interface media device, the flash memory card, and the data storage device can exchange data under the control of the USB OTG controller. The identification interface module is connected to the USB OTG controller, the encrypted identification processor is connected to the identification interface module, and the identification device is connected to the encrypted identification processor. Therefore, the identification device can use fingerprint, other biological identification data or magnetic card to transmit the identification data to the encrypted identification processor. The results from the encrypted identification processor are used to enable and disable the USB OTG controller so that the stored data can be protected by encrypted identification function.11-13-2008
20080288782Method and Apparatus of Providing Security to an External Attachment Device - Systems and methods of providing security to an external Serial Advanced Technology Attachment (SATA) device are described herein. One embodiment includes presenting to a computing device, a first partition of an external Serial Advanced Technology Attachment storage device, as a Read Only Memory; restricting the computing device from accessing a secured second partition of the external Serial Advanced Technology Attachment storage device; and in response to receiving a valid identity authentication, unrestricting access to the second partition of the external Serial Advanced Technology Attachment storage device. In one embodiment, in response to receiving a logon request from the computing device, an identity authentication process is initiated, wherein the process is stored on the first partition. Furthermore, in one embodiment, a process stored on a disk controller receives an encryption key from the process stored on the first partition of the Serial Advanced Technology Attachment storage device, and the process stored on the disk controller uses the encryption key to decrypt the second partition of the Serial Advanced Technology Attachment storage device.11-20-2008
20110126024Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device - Biometric data, suitably transformed are obtained from a biometric input device contained within a stand-alone computing device and used in conjunction with a PIN to authenticate the user to the device. The biometric template and other data residing on the device are encrypted using hardware elements of the device, the PIN and Password hash. A stored obfuscated password is de-obfuscated and released to the device authentication mechanism in response to a successfully decrypted template and matching biometric sample and PIN. The de-obfuscated password is used to authenticate the user to device, the user to a remote computer, and to encrypt device data at rest on the device and in transit to and from the remote computer. This creates a trusted relationship between the stand-alone device and the remote computer. The system also eliminates the need for the user to remember and enter complex passwords on the device.05-26-2011
20100138667AUTHENTICATION USING STORED BIOMETRIC DATA - A method is provided for storing a biometric template extracted a smart card for use on a user computing device. The biometric template is extracted from the smart card using a smart card reader. The biometric template is encrypted using a content protection key. The content protection key is encrypted using at least one of a device password or a smart card password. The password may be hashed. The encrypted biometric template, the encrypted content protection key and the hashed password may then be stored in a cache. A method for using the stored biometric template to access the user computer device is also provided.06-03-2010
20090164799IC CARD IN WHICH BIOMETRIC INFORMATION IS STORED AND METHOD OF CONTROLLING ACCESS TO THE IC CARD - Biometric information previously obtained from an IC card bearer and security status for determining whether or not the IC card is accessible are stored in the IC card. Then, a biometric authentication device obtains biometric information from the IC card bearer and reads the previously-obtained biometric information from the IC card. The biometric authentication device compares the biometric information with the previously-obtained biometric information and transmits a result of the comparison to the IC card. The IC card verifies the comparison result transmitted thereto and determines whether or not the comparison result was illegally fabricated or altered, and updates the security status when it is determined that the comparison result was neither fabricated nor altered.06-25-2009
20090138724BIOMETRIC METHOD AND APPARATUS AND BIOMETRIC DATA ENCRYPTION METHOD THEREOF - A biometric method, a biometric apparatus, and a biometric data encryption method thereof are disclosed. In the biometric method and the biometric apparatus, a biometric data is quantified to obtain a quantified data. A one-way function is then performed to convert the quantified data into an encrypted data. In the present invention, the biometric data is protected through a cryptography system so as to prevent the biometric features from being stolen or misappropriated. Moreover, in the present invention, a biometric technique can be integrated with a cryptography technique.05-28-2009
20090164798System and method for wireless state identification - A system and method for processing a state identifier. A request is received for a state identifier. A biometric associated with the state identifier is requested from a user. Authenticity of the biometric is verified in response to receiving the biometric from the user. The state identifier is transmitted to a receiving device in response to determining the biometric is authentic.06-25-2009
20090164797SECURE OFF-CHIP PROCESSING SUCH AS FOR BIOMETRIC DATA - In a biometric sensor system and method, storage of acquired biometric data and/or processing of that data may be shifted from specialized secure processing hardware to host system resources for improved speed and reduced cost of biometric sensor devices and systems. Stored data may be encrypted and/or signed by the specialized secure processing hardware and/or software. A database of authorized biometric data (e.g., patterns or key features representing all or a portion of the fingerprints of authorized users) may be stored on the host system either encrypted or non-encrypted or both. Preliminary matching against a database of many enrolled fingerprints may be accomplished by the system processor to ease the processing burden on the specialized secure processing hardware/software. Final match confirmation remains within exclusive control of the specialized secure processing hardware/software in order to prevent data tampering or other efforts to defeat the security provided by biometric identification.06-25-2009
20090063866USER AUTHENTICATION VIA EVOKED POTENTIAL IN ELECTROENCEPHALOGRAPHIC SIGNALS - Techniques are disclosed for authentication and identification of a user by use of an electroencephalographic (EEG) signal. For example, a method for authenticating a user includes the following steps. At least one electroencephalographic response is obtained from a user in accordance with perceptory stimuli presented to the user. The user is authenticated based on the obtained electroencephalographic response. The authenticating step may be based on detection of an event-related potential in the obtained electroencephalographic response. The event-related potential may be a P300 event-related potential. The method may also include the step of enrolling the user prior to authenticating the user. The enrolling step may include a supervised enrollment procedure or an unsupervised enrollment procedure.03-05-2009
20090083544SECURITY PROCESS FOR PRIVATE DATA STORAGE AND SHARING - A method and system for supplementing and/or replacing current security protocols and/or mechanisms used to store, manage and/or disseminate information for use on private data management devices and/or a private network and/or public network access provider's network. The system includes processing hardware, proprietary software, and firmware. The system protects private data without the need to trust the security or veracity of third parties and/or intermediate computers and/or networks. When a “user” stores data it is immediately protected from active and passive compromise attempts. Once protected and stored, data is never released and/or transferred unprotected. Only the authorized “receiver” of the data is capable of accessing the protected data. Encryption is used to enhance authentication of the participants and/or protection of the data. This method can be used in conjunction with other secure data transfer applications such as, but not limited to, Secure Socket Layer (SSL) encryption and/or the Secure Electronic Transaction (SET) protocol, etc. This method can also be used in conjunction with any data transfer mechanism such as, but not limited to, Ethernet, WiFi, Bluetooth, RFID transponders, etc.03-26-2009
20110231666ELECTRONIC SIGNATURE METHOD AND DEVICE - An electronic signature method uses a signature generation unit with a memory that is spatially separated from a data processing device. At least one biometric trait of a person who will electronically sign an electronic dataset is captured, and an electronic biometric dataset is generated based thereon. The biometric dataset is encrypted using a randomly generated value. Subsequently, the encrypted biometric data are transmitted to the data processing device, a first checksum is generated in the data processing device for the encrypted biometric data and the electronic dataset, and the first checksum is transmitted from the data processing device to the signature generation unit. The random value is encrypted using the first checksum, and the encryption result is further encrypted using the stored key. The result of this is then transmitted to the data processing device.09-22-2011
20090037746METHODS FOR SECURE RESTORATION OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.02-05-2009
20090100270BIOMETRIC AUTHENTICATION FOR REMOTE INITIATION OF ACTIONS AND SERVICES - In one aspect, the invention relates to generating a trusted communication channel with a client. An agent module is provided at the client along with a task set including one or more tasks. One or more client components needed to complete each of the tasks of the task set is determined, and it is further determined whether each of the needed client components is trustworthy. An equivalent component for components determined to be untrustworthy may be provided.04-16-2009
20090222670System and method for providing access to a keyboard video and mouse drawer using biometric authentication - The present invention relates generally to a system and method for providing a user access to a Keyboard, Video, Mouse (KVM) drawer based upon biometric authentication of the user, and more particularly, to a system and method for providing a user access to at least one host computer associated with a KVM drawer based, at least in part, on the user's unique biometric data. In one embodiment, an emulation controller, which emulates a KVM switch, is enabled or disabled based upon whether the associated user is properly authenticated. In another embodiment, an input-output buffer is enabled or disabled based upon whether the associated user is properly authenticated. Methods are also provided wherein the storage device containing at least a portion of the biometric data associated with authorized users is enabled upon receiving biometric data associated with a user of the KVM drawer.09-03-2009
20090106559Method of Identifying a User by Means of Modified Biometric Characteristics, and a Database for Implementing the Method - The present invention relates to a method of identifying a user, the method being implemented by means of a database containing personal data of users and containing for each user at least one unmodified biometric characteristic (E04-23-2009
20090222671SAFETY FEATURES FOR MEDICAL DEVICES REQUIRING ASSISTANCE AND SUPERVISION - An automatic locking system for a medical treatment device helps to ensure that an assistant is present during treatment of a patient. Among the features disclosed biometric authentication to verify that a trained assistant is present, a presence detector to ensure the assistant is continuously present during treatment, and warning and recovery processes that allow intermittent lapses in the continuous presence of the assistant.09-03-2009
20090249079Information processing apparatus and start-up method - An information processing apparatus includes a chip that is implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores biometric information of a user allowed to operate the information processing apparatus as biometric authentication information, and a biometric determining unit that obtains, when obtaining a request for starting up the information processing apparatus, biometric information of the user and determines whether the information processing apparatus is allowed to start up, based on the biometric information and the biometric authentication information.10-01-2009
20130219186Personal Digital Key Initialization and Registration for Secure Transactions - A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes.08-22-2013
20100153738AUTHORIZED ANONYMOUS AUTHENTICATION - A method, program and system for processing data is disclosed. The method, program and system comprising the steps of: (a) receiving (e.g., during an enrollment process) a first biometric data and a first personal key, (b) processing the first biometric data and the first personal key through an irreversible cryptographic algorithm, sometimes after: (i) generating one or more variants from the first biometric data, (ii) processing the first personal key through a reversible cryptographic algorithm, and (iii) adding salt to the first biometric data or first personal key, (c) receiving (e.g., during an authentication process) a second biometric data and a second personal key, (d) processing the second biometric data and the second personal key through the irreversible cryptographic algorithm, (e) comparing the second processed data to the first processed data, and (f) generating a signal pertaining to the comparison of the second processed data to the first processed data, such as: (i) a confirmation reflecting authentication when the second processed data matches the first processed data (sometimes allowing access to a facility or system) or (ii) a denial reflecting no confirmation when the second processed data does not match the first processed data.06-17-2010
20100185871SYSTEM AND METHOD TO PROVIDE SECURE ACCESS TO PERSONAL INFORMATION - A personal information system allowing users to securely collect, store, and transfer personal information is disclosed. The personal information system provides a central location for users to store information, and allows third parties to securely access the information in accordance with user-defined access rules. By providing a central storage area that may be electronically accessed by third parties, the personal information system facilitates the transfer of user information to these third parties. In order to control access to a user's stored personal information, user-defined access rules define the conditions under which third parties may access the stored information. The system also provides user authentication devices that include biometric recognition components and a touch screen display. The user authentication devices may be installed at third party locations to enable a user to authorize the transfer of personal information to third parties.07-22-2010
20120124387Animal Data Management - Animal data is stored in memory accessible to a server. The server allows users to access the animal data, such as across a communication network. In some embodiments an identifier for an animal is stored with animal information. The identifier can be used to control access to animal records and to quickly locate animal information associated with a particular animal.05-17-2012
20100153737 Method of Projecting a Secure USB Key - A method of protecting a secure USB key comprising: a step of obtaining at least one parameter concerning the use of a function that can be executed on said key; a step of detecting at least one blocking condition that depends on said parameter, and where appropriate, a first check step suitable for preventing the execution of said function; a step of detecting at least one determined event independent of said function; and a second check step suitable for authorizing the execution of said first check step only in the event of said determined event being detected, said second check step being active even when said blocking condition is not satisfied.06-17-2010
20100241868METHOD AND APPARATUS FOR STORING, MANAGING, AND SECURING PERSONAL INFORMATION - Some embodiments of the invention work in conjunction with a portable device, which when attached to a computing device invokes operations for storing personal information on the portable device, retrieving personal information from the portable device, encrypting personal information on the portable device, and decrypting information from the portable device. For these embodiments, the operations reside on the portable device and remain there during their performance. The operations are performed on the computing device, but are not permanently installed onto the computing device during performance. In addition, once the operations of these embodiments cease performance on the computing device, all data temporarily transferred from the portable device to the computing device during operation. In particular, any sensitive information that is stored and retrieved during the operations is removed from the computing device.09-23-2010
20100235646Verification method and system thereof - A verification method and a verification system are disclosed. The verification method is applicable to an electronic device including a system memory and a BIOS memory provided with a Pre-Boot Authentication (PBA) application and prescribed biometric data. In one embodiment, the verification method comprises the steps of executing a BIOS process to load the operation code (OPCode) or the BIOS driver of the BIOS from the BIOS memory to the system memory to establish a communication channel between the electronic device and a biometric device; loading the PBA application to the system memory for running; loading the prescribed biometric data to the system to compare with biometric data acquired by the biometric data capture device; and requesting the BIOS to load an operation system when the comparing result is matched.09-16-2010
20100223474METHOD AND APPARATUS FOR MANAGING CONFIDENTIAL INFORMATION - The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information using biometric keys to lock data storage devices, a secure data input/output device and authorization procedures to facilitate identity rights management; and/or data querying techniques to preserve the anonymity of disclosed personal data.09-02-2010
20120144204UPDATES OF BIOMETRIC ACCESS SYSTEMS - Methods are disclosed for performing an update to a biometric access system. An instruction is received at a handheld device defining the update. An encoded signal is generated from the instruction to be transmitted to a biometric terminal from the handheld device. An acknowledgment is received from the biometric terminal at the handheld device that the encoded signal has been received and acted upon. Update information is transmitted from the handheld device over a network to a server to record the update.06-07-2012
20090138725Authentication System and Method - An authentication system comprises a sensor for detecting a fingerprint and a doodle drawn by the user. The fingerprint, or other biometric information, is distorted in accordance with the doodle to provide distorted biometric information that is referred to as a doodleprint. The user can use different doodles on different systems, and if the doodleprint is compromised, can change the doodle to create a different doodleprint.05-28-2009
20100138668CONTENT DELIVERY SYSTEM - An information delivery device interacting with a user's eye, the device comprising an eye characteristic reader for reading at least one characteristic of the user's eye, a retinal projector for projecting information onto the retina, and an eye characteristic processor operative to receive at least one characteristic of the eye and to select the information based at least partly thereupon. A content protection system may comprise a multiplicity of such eye characteristic readers and a content protector receiving said at least one characteristic from such readers and controlling the user population's use of content to be protected based on that at least one characteristic. Related apparatus and methods are also provided.06-03-2010
20090327743SECURE PORTABLE DATA TRANSPORT & STORAGE SYSTEM - A portable data transport device that provides security to data stored therein, and is configured to communicate data with a host computer for securing and transporting data. The portable data transport device includes a first processor and a biometric identification system. Upon successful biometric identification of an enrolled user, the first processor permits mounting of the data transport device to a host computer. However, prior to the commencement of read/write operations, cross-checking of stored identification codes of components of the portable data transport device occurs, including the use of a hash function. If any identifier does not match, no read/write data operations are permitted. The portable data transport device includes a file security program that includes a DLL encryption/decryption program having a self-check feature. Upon self check, if any changes were made to the encryption/decryption program, no read/write operations are permitted. The portable data transport device permits the selection of multiple files for encryption together into a single data container pack file and to store that data container pack file. The file security program permits an enrolled user at a host computer to assign only a password to a data container pack file. If a user at a host computer enters an incorrect password a predetermined number of times, portable data transport device processor will erase all data in any volatile memory it is using and will lock itself in a non-operational configuration.12-31-2009
20090113209BIOMETRIC AUTHENTICATION METHOD - Provided is a biometric authentication method. A biometric authentication method in accordance with an aspect of the present invention includes generating a first one-time authentication template from biometric information using one-time transform information, and requesting authentication, comparing the first one-time authentication template with a one-time registration template, updating the one-time registration template and the one-time transform information when authentication is achieved according to a result of the comparison, wherein the updated one-time transform information is used to generate a second one-time authentication template to be authenticated according to the result of the comparison with the updated one-time registration template when successive authentication is requested.04-30-2009
20090037742BIOMETRIC AUTHENTICATION DEVICE, SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION - A biometric sensor device, a portable electronic device including an actuatable biometric input device, and method of biometric authentication that includes an input device that generates a signal or completes a circuit when actuated, and a biometric reader that reads a biometric of a user when the user actuates the input device to generate the signal or complete the circuit. An authentication section authenticates the biometric read on the biometric reader to generate one of a data access allowance function based on authentication of the biometric input to the actuatable biometric input device and a data access prevention function based on non-authentication of the biometric input to the actuatable biometric input device. The data access allowance function permits data to be accessed at the data access interface, and the data access prevention function prevents reading and/or access to data anywhere on the data storage and access device.02-05-2009
20090037745METHODS FOR SECURE BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.02-05-2009
20100306550DEFINING CLASSIFICATION THRESHOLDS IN TEMPLATE PROTECTION SYSTEMS - A method for configuring a biometric template protected authentif ication system, in which the desired classification threshold (T) is first selected to optimize the trade-i off between FAR and FRR of the system, and then the ECC used in the authentif ication process is chosen such that the number (b) of errors which can be corrected thereby is equal to or greater than the selected classification threshold. During authentif ication, the number (b) of errors in a first codeword derived from biometric data associated with a physical object is determined and used in the decision process to accept or reject authentif ication.12-02-2010
20090070593FINGER SENSING APPARATUS USING UNIQUE SESSION KEY AND ASSOCIATED METHODS - A finger sensor apparatus may include a finger sensor having an integrated circuit (IC) substrate, an array of finger sensing elements on the IC substrate, and session key negotiation circuitry on the IC substrate. The finger sensing apparatus may also include a host platform external from the finger sensor and cooperating with the session key negotiation circuitry to negotiate a unique session key for secure communication with the finger sensor during a respective communication session therewith.03-12-2009
20130132732SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element.05-23-2013
20100325442SYSTEM AND METHOD FOR NAMELESS BIOMETRIC AUTHENTICATION AND NON-REPUDIATION VALIDATION - A system, method, and computer program product for authenticating a requestor using a previously-stored biometric print. Records are stored in a database, where each record contains a previously-stored biometric print corresponding to an individual and is disassociated from an identity of the individual. An identifier and a biometric sample are requested from the requestor. The identifier is then used to locate one of the plurality of records corresponding to the requestor. The requestor is authenticated if the biometric sample matches the previously-stored biometric print.12-23-2010
20100332842DETERMINING A MOOD OF A USER BASED ON BIOMETRIC CHARACTERISTIC(S) OF THE USER IN AN ONLINE SYSTEM - Techniques are described herein that enable a determination of a user's mood based on biometric characteristic(s) of the user in an online system. An online system is a system that supports the transfer of information via the Internet. The mood of the user at a time instance (i.e., a mood instance) is determined based on the biometric characteristic(s) of the user and a substantially real-time instance(s) associated with the user. A substantially real-time instance associated with the user is any occurrence with respect to the user that is determined in substantially real-time. The mood instance of the user and the substantially real-time instance that is associated with the user may (or may not) occur at the same time instance. Online content may be provided to the user and/or action(s) may be recommended to the user in response to determining the mood instance of the user.12-30-2010
20110010558BIOMETRICS BASED IDENTIFICATION - A biometrics template matching method includes the steps of: providing a reference biometric template and a candidate biometric template, each including position data and orientation data of a respective plurality of minutiae; comparing the orientation data of each minutia from the candidate template with the orientation data of each minutia from the reference template; when the orientation data of a selected pair differ by no more than a first threshold, determining a displacement vector representative of the difference in position data of the selected pair of minutiae; determining the maximum number of displacement vectors that differ from each other by less than a second threshold; if the maximum number of displacement vectors is less than a third threshold, returning a mismatch, otherwise returning a match.01-13-2011
20110035598COMPUTER PROGRAM AND METHOD FOR GRANTING MULTIPLE USERS ACCESS TO A SECURE REPOSITORY - A computer program, system, and method for granting multiple users access to a secure repository. Embodiments of the present invention provide for authenticating either of first or second users desiring access to the secure repository. In embodiments of the present invention, a respective encryption or decryption operation of files or folders transferred in or out of the secure repository is performed using a key created, at least in part, on an enrolled security template provided by said first user. Thus, even if the second user is authenticated and allowed access to the secure repository, said creation of the key is performed using the security template associated with the first user. In even further embodiments of the present invention, a single storage device contains a plurality of secure repositories.02-10-2011
20100138666SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element.06-03-2010
20090031140METHODS FOR SECURE ENROLLMENT OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.01-29-2009
20110083018Secure User Authentication - Biometric information is authenticated by a web-enabled application that identifies a biometric sensor installed in a client device. The authentication procedure reads biometric information associated with a user and compares the biometric information with a biometric template associated with that user. If the biometric information matches the biometric template, the authentication procedure retrieves credentials associated with the user and communicates those credentials to a requesting process.04-07-2011
20120303966METHOD OF ASSIGNING A SECRET TO A SECURITY TOKEN, A METHOD OF OPERATING A SECURITY TOKEN, STORAGE MEDIUM AND SECURITY TOKEN - A method of assigning a secret to a security token (11-29-2012
20100005314IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA - The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, and is secured using industry-established mechanisms for preventing information tampering or eavesdropping, such as the addition of oxygen reactive layers. This invention also incorporates means for establishing security settings, profiles, and responses for the in-circuit security system and enrolled individuals. The in-circuit security system can be used in a variety of electronic devices, including handheld computers, secure facility keys, vehicle operation/ignition systems, and digital rights management.01-07-2010
20120204035Cryptographic Proofs in Data Processing Systems - A prover of a data processing system may prove to a verifier of the system that the prover satisfies a condition imposed by the verifier. The prover holds in memory at least one cryptographic credential in which are encoded a biometric template characteristic of the prover and a set of prover attributes such that each of the template and attributes are bound to a common secret value of the prover. A biometric measurement is made of the prover, which then communicates with the verifier to make a cryptographic proof demonstrating: possession of the cryptographic credential; that the biometric measurement matches the biometric template encoded in the cryptographic credential; and that the set of prover attributes encoded in the cryptographic credential satisfies the condition imposed by the verifier. The cryptographic proof is made without revealing the template or the at least one credential to the verifier.08-09-2012
20090240950Information processing apparatus and information management method - An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores therein user signature information in which biometric information of a user and a user electronic signature key that is a key for generating an electronic signature of the user for information created by the user are associated with each other and an encryption key that is a key for encrypting information, an electronic signature adding unit that, if the biometric information is obtained from the user, searches the storage unit for the user signature information corresponding to the biometric information, and adds the electronic signature of the user to user created information with a user electronic signature key in the user signature information, and an encrypt processing unit that encrypts with the encryption key the user created information processed by the electronic signature adding unit.09-24-2009
20120066508METHOD FOR MANAGING AND CONTROLLING ACCESS TO CONFIDENTIAL INFORMATION CONTAINED IN PORTABLE ELECTRONIC MEDIA - The management of confidential information contained in portable memory media provides for: 03-15-2012
20120066507IDENTITY AUTHENTICATION AND SECURED ACCESS SYSTEMS, COMPONENTS, AND METHODS - Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the token and the user's biometric identifier, convert the biometric identifier to a biometric key, and apply the biometric key to decrypt the token. In this way, the decoders authenticate the users without performing a biometric identifier comparison. In some embodiments pieces or sets of the data are stored in designated data compartments, which are individually encrypted based on authority keys, and all of the encrypted data compartments are collectively encrypted based on the biometric key to create the token. The decoders store only the authority keys corresponding to the data compartments which they have authorization to open. In addition, in some embodiments the token and the biometric identifier are encrypted and sent to a remote authentication server for decryption of the token.03-15-2012
20080201579Biometric based repeat visitor recognition system and method - A biometric authorization method, system, and program product Biometric data associated with a subject can be detected and acquired. Thereafter, particular biometric features can be segmented and extracted from the biometric data. These particular biometric features are then compared to biometric data previously stored in a database in order to determine if the particular biometric features match the biometric data previously stored in the database and thereby rapidly and automatically determine if the subject comprises a repeat visitor.08-21-2008
20110016327AUTHENTICATION METHOD, AUTHENTICATION DEVICE, PROGRAM AND RECORDING MEDIUM - An authentication method of performing authentication for an information processing device connected via a communication network by an authentication device, including: receiving information related to biometric authentication concerning the information processing device; receiving information related to identification information for identifying the information processing device; receiving information related to environment of the information processing device; receiving an electronic signature by a secret key which is paired with an electronic certification transmitted from the information processing device; and determining, by a control unit, a biometric level based on the received information related to biometric authentication, a device level based on the received information related to identification information and an environment level based on the received information related to environment; correcting, by the control unit, the determined level based on validity of the received electronic signature.01-20-2011
20110179284Information processing apparatus and information managing method - An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores user unique information in which biometric information of a user and unique information for use when a unique process corresponding to the user is performed are associated with each other, and an information processing unit that retrieves, when biometric information of the user is obtained, unique information corresponding to the obtained biometric information from the user unique information and performs a predetermined process by using the retrieved unique information.07-21-2011
20110264919DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA - A system, a method, and a computer program for generating a seed and/or a key from live biometric indicia, such that all the information necessary for generating the seed and/or the key is not stored on a storage medium. The method comprises receiving a biometric template from a user and enrolling the template; assigning an optimization value to the enrolled biometric template; encrypting an item of test data using the optimization value, such that the optimization value is an encryption seed; storing the encrypted item of test data on the storage medium; destroying the encryption seed after encrypting the item of test data; receiving a live biometric template; comparing the templates and determining an interval based on a probability that the templates are specific to the same user; iteratively testing values within the interval to identify the value in the interval for decrypting the encrypted item of test data, wherein the value used to decrypt the item of test data is the encryption seed; and generating the key using the seed.10-27-2011
20120311343REMOTE ENTRY SYSTEM - A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem comprising a biometric sensor for receiving a biometric signal, means for matching the biometric signal against members of the database of biometric signatures to thereby output an accessibility attribute, and means for emitting a secure access signal conveying information dependent upon said accessibility attribute, wherein the secure access signal comprises one of at least a rolling code, an encrypted Bluetooth™ protocol, and a WiFi™ protocol, and a receiver sub-system comprising means for receiving the transmitted secure access signal and means for providing conditional access to the controlled item dependent upon said information.12-06-2012
20100180127BIOMETRIC AUTHENTICATION BASED UPON USAGE HISTORY - Customized biometric authentication based at least in part upon usage history and learning capabilities of a user is provided. A biometric sample of a user received at a biometric interface of a device is compared with at least one stored template that uniquely identifies the user, and a match score generated when the biometric sample matches one of the stored templates. The match score is compared to a match score threshold value of an application that the user is attempting to access to generate match score comparison results, and an updated false reject ratio (FRR) for the last N matches of the user is calculated. The user is allowed to access the application when the match score comparison results indicate that the match score is at least equal to the match score threshold value and the updated FRR is less than a FRR threshold value of the application.07-15-2010
20110138187SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION USING MULTIPLE KINDS OF TEMPLATES - In additional enrollment of a template in a biometric authentication system, the template is automatically enrolled on the basis of a plurality of authentication results to assure a user's convenience and security. A post-migration authentication server receives a first template and a second template from a post-migration authentication terminal, performs authentication on the basis of the comparison result between the received first template and the user's preliminarily first enrolled template, and provisionally enrolls the first template and the second template. It repeats the reception, authentication, and provisional enrollment and calculates a match probability from a plurality of comparison results of the provisionally first enrolled templates, determines whether or not to store a second enrolled template on the basis of the match probability, and automatically enrolls the second template in the post-migration authentication server.06-09-2011
20100031053BIOMETRIC DATA TRANSMISSION DEVICE AND METHOD - A data transmission device for secure biometric transmission includes first and second input-output units, and a biometric identification apparatus. The input-output units electrically connect to one of the two electronic devices, respectively. The biometric identification unit is configured for electrically interconnecting the first and second input-output units, receiving a biometric input, outputting biometric data in response to the biometric input, and encrypting the biometric data to be transmitted to one of the electronic device having a storage unit.02-04-2010
20090292928Acquisition and particular association of inference data indicative of an inferred mental state of an authoring user and source identity data - A computationally implemented method includes, but is not limited to: acquiring inference data indicative of an inferred mental state of an authoring user in connection with at least a particular item of an electronic message, acquiring source identity data providing one or more identities of one or more sources that is or are basis, at least in part, for the inference data indicative of the inferred mental state of the authoring user, associating the inference data indicative of the inferred mental state of the authoring user with the particular item; and associating the source identity data providing one or more identities of the one or more sources with the particular item. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.11-26-2009
20100037064 Method of encryption and decryption and a keyboard apparatus integrated with functions of memory card reader and fingerprint encryption/decryption - A method of encryption and decryption and a keyboard apparatus integrated with a memory card reader and an encryption/decryption scheme using fingerprints is disclosed. The invention integrates a memory card reader and a fingerprint scan module into a keyboard apparatus. The memory card reader and fingerprint scan module are jointly using the power supply and data transmission port. Therefore, the keyboard apparatus uses the memory card reader to function data transferring, and the fingerprint scan module is used to retrieve a fingerprint of the user, which is used to encrypt or decrypt the data in the memory card by the keyboard's driver. Thereby, in the preferred embodiment, the biometric characteristic is applied to encrypt/decrypt the data in the computer system or the data in the memory card by a program installed in the computer system. The multi-functional keyboard is achieved.02-11-2010
20100017619SYSTEMS AND METHODS FOR SECURE AND AUTHENTIC ELECTRONIC COLLABORATION - The present disclosure relates to systems and methods for secure and authentic electronic collaboration between a plurality of users using a combination of biometric security, a separate and secure network infrastructure, management processes, encrypted electronic storage, and collaborative templates. In an exemplary embodiment, an online collaboration system includes a server including a network interface connected to the Internet, a data store including electronic data storage, and a processor, wherein each of the network interface, the data store and the processor are communicatively coupled, and wherein the network interface, the data store and the processor are collectively configured to: biometrically authenticate a plurality of users; and enable online collaboration between the plurality of users.01-21-2010
20100017618METHOD AND SYSTEM FOR BIOMETRIC AUTHENTICATION AND ENCRYPTION - A biometric user authentication method, includes enrolling a user based on user's biometric samples to generate user's reference data; and authenticating the user based on a user's live biometric sample and the user's reference data; wherein enrolling a user includes acquiring the user's biometric samples; extracting an enrollment feature vector from each user's biometric sample; computing a biometric reference template vector as a mean vector based on the enrollment feature vectors; computing a variation vector based on the enrollment feature vectors and the mean vector; randomly generating an enrollment secret vector; computing an enrollment code vector based on the enrollment secret vector and the variation vector; computing a difference vector as a wrap-around difference between the enrollment code vector and the mean vector; computing an error correction vector based on the enrollment secret vector to enable error correction during the user authentication phase according to a given error tolerance level, wherein the error correction vector is not computed if the error tolerance level is equal to zero; and storing the variation vector, the difference vector, and the error correction vector as a part of the user's reference data to be used during the user authentication phase.01-21-2010
20080209230Method and System for Quantitative Determination of Software Ease of Use - The present invention uses biometrics for the quantitative determination of software ease of use by collecting biometric data from a software user, identifying changes in the biometric data as the user uses the software, determining if the changes are indicative of software ease of use issues, and generating a signal as output if the changes are determined to be indicative of software ease of use issues. The sensors may be integrated into a computer mouse or other peripheral device with which the user comes in regular contact during use.08-28-2008
20120042171METHOD AND SYSTEM FOR BIOMETRIC AUTHENTICATION - A method of authentication is provided that includes capturing biometric data for a desired biometric type from an individual, determining an algorithm for converting the biometric data into authentication words, converting the captured biometric data into authentication words in accordance with the determined algorithm, including the authentication words in a probe, and comparing the probe against identity records stored in a server system. Each of the identity records includes enrollment biometric words of an individual obtained during enrollment. Moreover, the method includes identifying at least one of the identity records as a potential matching identity record when at least one of the authentication words included in the probe matches at least one of the enrollment biometric words included in the at least one identity record, and generating a list of potential matching identity records.02-16-2012
20120042172SYSTEM AND METHOD FOR PLATFORM-INDEPENDENT BIOMETRICALLY VERIFIED SECURE INFORMATION TRANSFER AND ACCESS CONTROL - The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one identity verification system, utilizing a platform-independent architecture to enable verification of identities of parties sending and receiving secured information, and ensuring that only an authorized receiving party gains access to the secured information, regardless of the type, model, ownership and/or quantity of biometric identity verification (BIV) systems being utilized by each party. Parties desiring to securely transfer information between one another register at a central security management system, and each provide at least one biometric enrollment to their unique record configured for storing multiple BIV system enrollments for each party. The inventive system and method also provide an adaptive enrollment feature which enables the system to function automatically and transparently with new BIV systems that have not been previously enrolled by the user.02-16-2012
20120047370METHODS FOR SECURE RESTORATION OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.02-23-2012
20110099385BIOMETRIC AUTHENTICATION METHOD AND COMPUTER SYSTEM - A biometric authentication method for a computer system, the computer system comprising: a computer; and an authentication server, the biometric authentication method including steps of: extracting a first feature from the captured biometric information; generating a template polynomial for enrollment; extracting a second feature from the captured biometric information; generating a template polynomial for authentication; generating a correlation function for calculating a correlation between the template polynomial for authentication and the enrolled template polynomial; calculating a correlation value between the template polynomial for authentication and the enrolled template polynomial by using the generated correlation function, and determining based on the calculated correlation value whether or not the biometric information at the time of authentication coincides with the biometric information enrolled.04-28-2011
20100250957Method of Authenticating a User on a Network - A method of controlling access to electronic information is provided. The method requires the use of a portable token adapted to read and verify a user's biometric data in order to view encrypted files or data fields. If the proper biometric data is entered into the token, the user is presented with a unique and dynamic password for logon. The unique password is displayed on a small LCD screen on the token. Access to the protected information is allowed once the unique password is verified by the enterprise system containing the encrypted.09-30-2010
20120131350BIOMETRIC IDENTIFICATION METHOD - A biometric and cryptographic processing unit includes a biometric receiver receiving biometric information of a BCU user. A biometric unit of the BCU has a store of biometric information of an authorized BCU user and compares received biometric information with the stored biometric information to determine if the user is an authorized BCU user. A cryptographic unit generates/stores an asymmetric cryptographic public/private key pair associated with each authorized BCU user. An input/output port allows encrypted/unencrypted data to be input to/output from the BCU. The cryptographic unit operates in response to a specific authorized user giving permission to undertake a specific cryptographic operation on data input to the BCU only upon the specific authorized user being determined as an authorized BCU user, whereby a specific private key corresponding to the specific authorized user is enabled for use in the specific cryptographic operation after which the specific private key is disabled.05-24-2012
20100174914SYSTEM AND METHOD FOR TRACELESS BIOMETRIC IDENTIFICATION WITH USER SELECTION - A device, system and method for identifying an individual with a biometric identifier that is designed to be non-unique, such that at least one other individual in a given population has the identical biometric identifier. The biometric identifier according to the present invention, also referred to herein as a “BIdToken”, is implemented to be biometrically traceless, such that an exact image or copy of the biometric information is preferably not maintained by the present invention. Instead, the BldToken refers to an incomplete identifier obtained from the biometric information, which is non-unique. Preferably the invention operates so as to obviate the obligation to trust a third party.07-08-2010
20100174913MULTI-FACTOR AUTHENTICATION SYSTEM FOR ENCRYPTION KEY STORAGE AND METHOD OF OPERATION THEREFOR - A method for operating a multi-factor authentication system includes: authenticating a user by a self-authenticating token system; and retrieving a decryption key from the self-authenticating token system by a computer system after authenticating the user, the computer system using encryption to encrypt data.07-08-2010
20100049987METHOD AND ARRANGEMENT FOR SECURE USER AUTHENTICATION BASED ON A BIOMETRIC DATA DETECTION DEVICE - An arrangement for secure user authentication includes a computer or telecommunication terminal with a smartcard and a device. The smartcard is adapted to securely store biometric information relating to at least one user and the device is adapted to detect biometric data of users. The smartcard and the device include a radio interface for communicating together and a module for exchanging biometric information between each other. In this way, tampering of the transferred biometric information is difficult. In order to increase the security, one or more of the following measures may be used: a secure communication channel between the device and the smartcard, a direct (preferably short range) communication channel between the device and the smartcard and encryption and decryption of biometric information transferred between the device and the smartcard.02-25-2010
20120185698Protecting Codes, Keys and User Credentials with Identity and Patterns - Computer security applications use cryptography keys, cryptography codes—such as one-time passcodes—and other user credentials to protect the secrecy, authenticity and integrity of applications such as financial information, financial transactions and infrastructure (e.g. the electrical grid, power plants, and defense systems). The prior art attempted to generate (e.g. derive) an invariant from a biometric template, biometric print or non-biometric pattern that is used as a security key or code. Biometric variability has been a difficult obstacle for the prior art.07-19-2012
20120084572SECURE DEVICE SHARING - A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device with others but maintain security over aspects of the device. A task change request is evaluated to determine whether the requested task is permitted and, if so, the requested task is allowed; if not, then an authorization process is invoked to prompt the user to input authorization data. Upon verification of the authorization data, the device may be unlocked and the requested change implemented. The permitted tasks may designate specific applications, specific operations or functions within applications or at the operating system level, one or more currently open windows, and other levels of granularity.04-05-2012
20090319798METHOD AND APPARATUS OF STORAGE ANTI-PIRACY KEY ENCRYPTION (SAKE) DEVICE TO CONTROL DATA ACCESS FOR NETWORKS - A method comprises performing an authentication of a user of a portable device, performing an authentication handshake between the portable device and a content server, wherein the portable device includes a USB plug that plugs directly into a USB port of a host computer and the host computer is communicatively coupled to the content server, and sending a first key sent from the portable device to the content server, wherein access to restricted content on the content server by the user is enabled if the user authentication, the authentication handshake, and an authentication using the first key are all successful. The process may also include encrypting restricted content received from the content server using a private key before storing the restricted content in a non-volatile memory of the portable device.12-24-2009
20080301464Two-dimensional bar code for ID card - A method and apparatus for an identity card having improved security features. The identity card can have a two-dimensional bar code or similar encoding of data allowing for verification of the authenticity of the identity card. The two-dimensional bar code can store security data such as codes or image data that can be decoded and cross-checked against the visible user data to ensure that the card has not been improperly modified.12-04-2008
20120239939Secure Resume for Encrypted Drives - Systems, methods and products are described that provide secure resume for encrypted drives. One aspect provides a method including: receiving an indication to resume from a suspended state at a computing device; responsive to authenticating a user at one or more input devices, accessing a value in a BIOS derived from authenticating the user at the one or more input devices; responsive to accessing the value, releasing a credential for unlocking one or more encrypted drives; and thereafter proceeding to resume from the suspend state.09-20-2012
20120324235SYSTEM AND METHOD FOR REMOTE SELF-ENROLLMENT IN BIOMETRIC DATABASES - Methods and systems for remotely enrolling enrollees into biometric databases are provided. The method includes acquiring biometric data from one or more biometric sensors and authenticating an enrollee associated with the biometric data. The method includes enrolling the authenticated enrollee associated with the biometric data. The acquiring occurs externally from equipment that requires an identification. The method includes verifying individual samplings of the biometric data for quality at the time of enrollment based on a pre-determined threshold and verifying whether the enrollee presenting the biometric data is authenticated at the time of enrollment. The method includes signing a request of a third party with a private key associated with the third party, the signing denoting that the biometric data is verified for a transaction between the third party and the enrollee. The method includes sending the signed third party request to the third party to complete authenticating of the transaction.12-20-2012
20110231667Method of Identification or Authorization, and Associated System and Secure Module - Method of identification or of authorization using a system comprising at least one sensor for acquiring biometric data and one secure module storing a set of digital data obtained starting from a set of respective biometric data by means of a digitization algorithm. According to this method, a biometric data value is obtained, acquired by the sensor; a digital value is obtained by application of the digitization algorithm to the acquired biometric data value; within the secure module, at least some of the digital data from said set of digital data are ranked according to their proximity to the digital value obtained; and a biometric data value is obtained from said set of biometric data by taking into account a position of the corresponding digital data within the ranking.09-22-2011
20120102332MOBILE, WIRELESS HAND-HELD BIOMETRIC CAPTURE, PROCESSING AND COMMUNICATION SYSTEM AND METHOD FOR BIOMETRIC IDENTIFICATION - A mobile, wireless biometric identification system includes a biometric capture device, associated software and processes which enable a commercially available wireless communication device, such as a smartphone, using a commercially established wireless communication networks, to capture a digital image of a human biometric (iris, fingerprint, etc.) for transmission via a secure connection to a central server. The capture device is designed to focus on the difficult task of capturing the highest possible quality image for encoding and comparison, while the overall system is designed to leverage the existing cellular communication network. At the server level, the server system receives the image, encodes the image to a biometric template, and compares the encoded template to a plurality of reference templates stored in a database to identify the individual. Identification data is then transmitted back to the smartphone device and displayed.04-26-2012
20100205452SYSTEM, METHOD AND PROGRAM PRODUCT FOR COMMUNICATING A PRIVACY POLICY ASSOCIATED WITH A BIOMETRIC REFERENCE TEMPLATE - A system, method and program product for communicating a privacy policy associated with a reference template. The method includes assigning a first identifier for identifying a reference template created from biometric data collected, defining a second identifier for identifying a privacy policy that indicates a level of protection to be provided by a relying party requesting access to the reference template, the second identifier including an accept-reject provision for controlling the proper use and handling of the biometric data, cryptographically binding the reference template to the privacy policy and transmitting, responsive to a request received from the relying party, the accept-reject provision for the reference template, where based on a response received from the relying party to the accept-reject provision for the privacy policy, the reference template is either transmitted or not transmitted to the relying party.08-12-2010
20080235516Portable electronic door opener device and method for secure door opening - A portable computing device for opening a door (an electronic door opener) and a method for its use is disclosed. The computing device has a shared secret key, a standard certificate, means for communicating with the door, and a processor adapted for performing operations with shared secret keys and standard certificates. The door also possesses the same shared secret key. Under normal operation, messages encoded with the shared secret key serve to establish a right to open the door. The portable computing device's standard certificate is used to respond to occasional challenges by the door, and to generate the shared secret key. Biometric capabilities of the portable computing device add an additional layer of security in screening the identity of the user of the device. A security system for controlling access, involving a first plurality of computing devices and a second plurality of doors, and operating based on shared secret keys and occasional challenges is also disclosed.09-25-2008
20080235515Pre-processing Biometric Parameters before Encoding and Decoding - Biometric parameters acquired from human faces, voices, fingerprints, and irises are used for user authentication and access control. Because the biometric parameters are continuous and vary from one reading to the next, syndrome codes are applied to determine biometric syndrome vectors. The biometric syndrome vectors can be stored securely, while tolerating an inherent variability of biometric data. The stored biometric syndrome vector is decoded during user authentication using biometric parameters acquired at that time. The syndrome codes can also be used to encrypt and decrypt data. The biometric parameters can be pre-processed to form a binary representation, in which the binary representation has a set of predetermined statistical properties enforced imposed by a set of binary logical conditions.09-25-2008
20130173926Method, Apparatus and Applications for Biometric Identification, Authentication, Man-to-Machine Communications and Sensor Data Processing - Applications, algorithms and technologies are disclosed for machine-to-machine communications, biometric identification and sensor data fusion. Applications include authentication, e-commerce and energy management. Algorithms include biometric signature generation and identification, as well as data fusion methods. Technologies include biometric and environmental sensing and identification. Advantages of the invention include more robust person authentication, greater immunity to theft of personal property and information, and enhanced building energy management.07-04-2013
20130173927SECURE REGISTRATION-FREE FINGERPRINT AUTHENTICATION METHOD AND SYSTEM BASED ON LOCAL FEATURES - A secure registration-free fingerprint authentication method based on local structures comprising: extracting descriptor features and local structure features of fingerprint minutiae from an input fingerprint image; conducting quantization and feature selection with respect to the features of the fingerprint minutiae; and encrypting the selected features and then decrypting the encrypted features to obtain the fingerprint image. The method adopts local features for fingerprint authentication, thus avoiding the complex registration in encryption domain. The method lowers the risk of the fingerprint authentication being attacked and improves security.07-04-2013
20080222426Security Device - A security device comprising means for authenticating an entity using biometric data, characterized by means for alternatively authenticating the entity using a security code such as a personal identification number. Also a system configured to grant an authorization upon a successful authorization by the security device, in which the authorization granted after the authentication using the security code is restricted in scope compared to the authorization granted after the authentication using the biometric data.09-11-2008
20080215890System and method for secure remote biometric authentication - Systems and methods for secure remote biometric authentication are provided. A network-based biometric authentication platform stores biometric templates for individuals which have been securely enrolled with the authentication platform. A plurality of sensor platforms separately establishes secure communications with the biometric authentication platform. The sensor platform can perform a biometric scan of an individual and generate a biometric authentication template. The sensor platform then requests biometric authentication of the individual by the biometric authentication platform via the established secure communications. The biometric authentication platform compares the generated biometric template to one or more of the enrolled biometric templates stored in memory at the biometric authentication platform. The result of the authentication is then communicated to the requesting sensor platform via the established secure communications.09-04-2008
20130173925Systems and Methods for Fingerprint-Based Operations - A method for operating a system based on fingerprint scanning inputs includes receiving, by a fingerprint sensor, a fingerprint input and providing, from a processor coupled with the fingerprint sensor, fingerprint feature data representing features of the fingerprint input. The method also includes executing a first command, by the processor, if comparing the fingerprint feature data with at least a portion of stored fingerprint data results in a first match reflecting that the fingerprint input occurred in a first direction and executing a second command that is different from the first command, by the processor, if comparing the fingerprint feature data with the at least a portion of the stored fingerprint data results in a second match reflecting that the fingerprint input occurred in a second direction.07-04-2013
20130103952User Authentication System and Method for Encryption and Decryption - A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.04-25-2013
20130103951SYSTEMS AND METHODS FOR IDENTIFYING AN INDIVIDUAL - The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an individual. These systems and methods are useful for, amongst many applications, more secure identification of high-risk individuals attempting to gain access to an entity, transport, information, location, security organization, law enforcement organization, transaction, services, authorized status, and/or funds.04-25-2013
20080209227User Authentication Via Biometric Hashing - Techniques for authenticating biometric parameters via biometric hashing are described. In one implementation, a biometric parameter of a user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more biometric hashes are produced from the biometric parameter. To generate hashes that appear random, pseudorandom metrics are applied over the biometric parameter. The hashes are stored in association with user information that can be employed to authenticate the user. Subsequently, during authentication, a new biometric parameter is captured and hashes are computed from the parameter. The new biometric hashes are then compared with the predetermined stored hashes. If any of the new hashes are found to be identical, or sufficiently similar, to one or more of the predetermined biometric hashes, the biometric parameter is deemed valid and the user is authenticated.08-28-2008
20130151860METHOD AND APPARATUS FOR SECURE MEASUREMENT CERTIFICATION - The invention relates to methods and apparatuses for acquiring a physical measurement, and for creating a cryptographic certification of that measurement, such that its value and time can be verified by a party that was not necessarily present at the measurement.06-13-2013
20130191647Secure Wireless Access to Medical Data - A method is disclosed that allows secure access to medical data. A device application running on a wireless device, optionally including associated scanners, acquires a patient's biometric information (e.g., a finger-print at a resolution exceeding 07-25-2013
20120030476SYSTEM AND METHOD FOR AUTOMATICALLY COLLECTING OPINIONS - A system and a method for automatically collecting opinions are provided. The method for automatically collecting opinions according to the present invention comprises the steps of: distributing, to user terminals, content containing actual metadata corresponding to metadata items required for executing an opinion-collecting service program; and extracting opinions of users contained in the reply content received from user terminals, and compiling statistics with the extracted opinions. The present invention enables an automatic online collection of user opinions regarding voting, public opinion polls, surveys and other feedback via PCs or portable communication equipment, and automatically compiles statistics with the collected user opinions.02-02-2012
20120030475MACHINE-MACHINE AUTHENTICATION METHOD AND HUMAN-MACHINE AUTHENTICATION METHOD FOR CLOUD COMPUTING - A Machine-Machine Authentication method and a Human-Machine Authentication method for Cloud Computing. A Smart Card IC that includes a TPM/TCM/USB key function module and a storage memory, and a bio-feature identification method are used to achieve the Machine-Machine Authentication and Human-Machine Authentication. The Machine-Machine Authentication uses the Smart Card IC to achieve an authentication between the Server and the Client, and the Human-Machine Authentication uses the bio-feature identification method to achieve an authentication between the user and the Client or the user and the Server.02-02-2012
20120030474System and Method for Personal Biometric Data Sequestering and Remote Retrieval with Power Checking - Provided is a sequestered personal match server apparatus and protocol for remote use, across common telecommunications technology or infrastructure, for establishing a blinded, zero-knowledge transaction between distributed computing devices, in which personal data is stored or retrieved and may be further transmitted or represented to the user's selected transaction counterparts, including boundary-keepers. A user may cloak their legal identification in some transaction or may substantiate it, since the capacity of proving the user's traceability to their legal identity is consistent with an electronic report issued to any user-queried interests indicating the success or failure of an attempt at accessing the data within the device. Biometrics and device sequestration are viewed as synergistic enhancements to scalability, including methods of power-checking any attempt at breach by or through various agencies of a commercial, private or public market. Transparency of use is further emphasized by relying upon common, mature electronics, which the user may bootstrap and use, unaided. The more important embodiments assume a role for a public witness agent or officer, during commissioning or first-use of said electronic device. A preferred embodiment further develops wireless networking synergies in approaching personal safety as an economic concern.02-02-2012
20130205138SYSTEM AND METHOD FOR REAL WORLD BIOMETRIC ANALYTICS THROUGH THE USE OF A MULTIMODAL BIOMETRIC ANALYTIC WALLET - A system and method for real world biometric analytics through the use of a multimodal analytic wallet. The system includes a biometric wallet comprising a pervasive repository for storing biometric data, the pervasive repository including at least one of a biometric layer, a genomic layer, a health layer, a privacy layer, and a processing layer. The biometric wallet further comprises a biometric analytic interface configured to communicate the biometric data to one or more devices.08-08-2013

Patent applications in class Biometric acquisition