Patent application number | Description | Published |
20130336545 | USER INTERFACE FOR COMBINED BIOMETRIC MOBILE DEVICE - A mobile device is able to capture a plurality of different biometric identifiers of a subject. The mobile device displays a user interface on a screen of the device to guide the user in the capture of valid biometric identifiers. The user interface includes several different displays configured to guide users through the capture process to improve the chance that the user will capture valid biometric identifiers. The user interface includes displays for iris image capture, face image capture, voice capture, and fingerprint capture. The displays streamline the capture process, decreasing the overall knowledge and time required of the user to capture valid biometric identifiers. This also decreases the risk to the user in hostile environments. The device also processes the captured biometric identifiers to determine if they are valid, and updates the display of the user interface accordingly. | 12-19-2013 |
20130336546 | BIOMETRIC ENCLOSURE FOR A MOBILE DEVICE - An enclosure works in conjunction with a mobile device to capture biometric identifiers. The mobile device has a screen on a first side and a camera on a second side opposite the first side. The enclosure at least partially covers the mobile device on the first and second sides. The enclosure includes a fingerprint subsystem configured to capture fingerprints with sufficient resolution for biometric identification. The fingerprint subsystem is located on a portion of the enclosure covering the second side of the mobile device. The enclosure includes an iris imaging subsystem configured to capture iris images with sufficient resolution for biometric identification. The iris imaging subsystem includes an iris imaging aperture facing outward from the portion of the enclosure covering the second side of the mobile device. The enclosure includes an electronic data interface configured to communicatively couple the fingerprint and iris imaging subsystems to the mobile device. | 12-19-2013 |
20150245767 | DUAL IRIS AND COLOR CAMERA IN A MOBILE COMPUTING DEVICE - A dual purpose iris and color camera system is described provides good iris and color image capture in either IR or visible bands depending upon which type of image is being captured at that moment. For iris imaging the iris camera is capable of imaging in the 700 to 900 nm wavelength range where the iris structure becomes visible. The iris camera is able to perform iris imaging outside with full sunlight. The iris camera requires only a low level of cooperation from the user, in that they must be within a range of distances away from the iris camera, must hold relatively still for a short period of time, and must face towards the camera. The iris capture process is fully automated once activated. | 09-03-2015 |
Patent application number | Description | Published |
20080222413 | METHOD AND APPARATUS FOR INTEGRATED PROVISIONING OF A NETWORK DEVICE WITH CONFIGURATION INFORMATION AND IDENTITY CERTIFICATION - According to one aspect, a provisioning server comprises a configuration module that configures a network device and an identification certification module that certifies the identity of the network device. With use of the provisioning server, the network device does not require configuration with network connectivity in order to obtain its certified identity. In one embodiment, configuration module configures the device for operation at the device's point of deployment in a network. In one embodiment, the identity certification module is configured to generate a digital certificate for the network device and the configuration module is configured to automatically configure the network device based on its digital certificate. The provisioning server is coupled to the network device with a secure communication link. As a result, a more trusted network device is ultimately deployed into its network of operation. | 09-11-2008 |
20090037727 | METHOD AND APPARATUS FOR SECURELY EXCHANGING CRYPTOGRAPHIC IDENTITIES THROUGH A MUTUALLY TRUSTED INTERMEDIARY - A method of securely exchanging cryptographic identities through a mutually trusted intermediary is disclosed. Data, which specifies a petitioner's cryptographic identity and a petitioner's resource identifier, is received. Input, which specifies an authority's resource identifier, is received. The petitioner's cryptographic identity and the petitioner's resource identifier are sent to a destination that is associated with the authority's resource identifier. Data, which specifies the authority's cryptographic identity, is received. The authority's cryptographic identity is sent to a destination that is associated with the petitioner's resource identifier. | 02-05-2009 |
20120060027 | CERTIFYING THE IDENTITY OF A NETWORK DEVICE - According to one aspect, a method for certifying the identity of a network device. The method includes an initial step of coupling the network device to a provisioning device via a physically secure communications link. The provisioning device then certifies the identity of the network device including generating a cryptographic private key for the network device and sending the generated private key to the network device over the physically secure communications link. | 03-08-2012 |
Patent application number | Description | Published |
20130318343 | SYSTEM AND METHOD FOR ENABLING UNCONFIGURED DEVICES TO JOIN AN AUTONOMIC NETWORK IN A SECURE MANNER - A method in an example embodiment includes creating an initial information package for a device in a domain of a network environment when the device is unconfigured. The method further includes communicating the initial information package to a signing authority, receiving an authorization token from the signing authority, and sending the authorization token to the unconfigured device, where the unconfigured device validates the authorization token based on a credential in the unconfigured device. In more specific embodiments, the initial information package includes a unique device identifier of the unconfigured device and a domain identifier of the domain. In further embodiments, the signing authority creates the authorization token by applying an authorization signature to the unique device identifier and the domain identifier. In other embodiments, the method includes receiving an audit history report of the unconfigured device and applying a policy to the device based on the audit history report. | 11-28-2013 |
20140223530 | Secure Network Deployment - In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration profile. When the configuration file is received, the IP phone is provisioned according to the configuration profile. | 08-07-2014 |
20140351581 | Revocation of Public Key Infrastructure Signatures - In one implementation, a public key infrastructure utilizes a two stage revocation process for a set of data. One stage authenticates or revokes the set of data based on the status of the digital signature and another stage authenticates or revokes the set of data based on the status of an individual signature by the digital certificate. For example, a digital certificate based is assigned a certificate number. A serial number is assigned for a signature for the set of data as signed by the digital certificate. A data transmission, data packet, or install package includes the set of data, the certificate number and the serial number. Therefore, individual instances of the signature may be revoked according to serial number. | 11-27-2014 |
20150067323 | Software Revocation Infrastructure - In one implementation, software components include an identity of a revocation authority. Prior to loading of the software in a given platform, the revocation authority is checked for any revocation messages. The revocation authority creates software component specific messages for any software components to be revoked, rather than using certificate revocation or individual licenses. The messages include mitigation information, such as instructions for automatically configuring already installed software without requiring an update or change in code. | 03-05-2015 |
20150280916 | SYSTEM AND METHOD FOR ENABLING UNCONFIGURED DEVICES TO JOIN AN AUTONOMIC NETWORK IN A SECURE MANNER - A method in an example embodiment includes creating an initial information package for a device attempting to join a network domain of a network environment; communicating the initial information package to a signing authority; sending an authorization token generated by the signing authority to the device, wherein the device validates the authorization token based on a credential in the device; and receiving an audit history report of the device, wherein the audit history report comprises information regarding previous attempts by the device to join the network environment. The method may also include applying a policy to the device based on the audit history report; generating a completed information package, wherein the completed information package includes an authorization token; applying a second signature to the completed information package; and sending the authorization token and the completed information package to the device, the device validating the second signature on the completed information package. | 10-01-2015 |