Entries |
Document | Title | Date |
20080201579 | Biometric based repeat visitor recognition system and method - A biometric authorization method, system, and program product Biometric data associated with a subject can be detected and acquired. Thereafter, particular biometric features can be segmented and extracted from the biometric data. These particular biometric features are then compared to biometric data previously stored in a database in order to determine if the particular biometric features match the biometric data previously stored in the database and thereby rapidly and automatically determine if the subject comprises a repeat visitor. | 08-21-2008 |
20080209226 | User Authentication Via Biometric Hashing - Techniques for authenticating biometric parameters via biometric hashing are described. In one implementation, a biometric parameter of a user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more biometric hashes are produced from the biometric parameter. To generate hashes that appear random, pseudorandom metrics are applied over the biometric parameter. The hashes are stored in association with user information that can be employed to authenticate the user. Subsequently, during authentication, a new biometric parameter is captured and hashes are computed from the parameter. The new biometric hashes are then compared with the predetermined stored hashes. If any of the new hashes are found to be identical, or sufficiently similar, to one or more of the predetermined biometric hashes, the biometric parameter is deemed valid and the user is authenticated. | 08-28-2008 |
20080209227 | User Authentication Via Biometric Hashing - Techniques for authenticating biometric parameters via biometric hashing are described. In one implementation, a biometric parameter of a user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more biometric hashes are produced from the biometric parameter. To generate hashes that appear random, pseudorandom metrics are applied over the biometric parameter. The hashes are stored in association with user information that can be employed to authenticate the user. Subsequently, during authentication, a new biometric parameter is captured and hashes are computed from the parameter. The new biometric hashes are then compared with the predetermined stored hashes. If any of the new hashes are found to be identical, or sufficiently similar, to one or more of the predetermined biometric hashes, the biometric parameter is deemed valid and the user is authenticated. | 08-28-2008 |
20080209228 | Method and Apparatus for a Merged Power-Communication Cable in Door Security Environment - A method controlling access to a door using a merged power-communication cable. An access controlled door lock in door is operated using merged power-communication cable. Access control identification mechanism in door may operate using merged power-communication cable. The access controlled door lock may include a piezoelectric controlled door lock or a standalone door lock or a solenoid controlled door lock. A processing module may operate in door to control access with power interface receiving at least part of the electrical power from the merged power-communication cable. The invention includes a strike plate containing a magnetic sensor aligns by a latch hole to a latch included an access control door lock. The invention also includes using a door conduit to provide the merged power-communication cable to at least the processing module in the door. | 08-28-2008 |
20080209229 | METHOD OF AND SYSTEM FOR SELECTING AND PRESENTING CONTENT BASED ON USER IDENTIFICATION - Methods of and systems for selecting and presenting content based on user identification are provided. A user-interface method of selecting and presenting content items in which the presentation is ordered at least in part based on inferring which user of a collection of users is using an input device includes providing a set of content items, providing a set of preference information for each user indicating content item preferences of a corresponding user, and providing a set of user keypress biometric models representing expected keypress activity for the corresponding user. User keypress activity to identify desired content items is monitored to biometrically characterize the user and analyzed to find the closest match to one of the keypress biometric models. Based on the closest match, which user of the collection of users entered the input is inferred and the corresponding preference information is used to select, order, and present content items. | 08-28-2008 |
20080209230 | Method and System for Quantitative Determination of Software Ease of Use - The present invention uses biometrics for the quantitative determination of software ease of use by collecting biometric data from a software user, identifying changes in the biometric data as the user uses the software, determining if the changes are indicative of software ease of use issues, and generating a signal as output if the changes are determined to be indicative of software ease of use issues. The sensors may be integrated into a computer mouse or other peripheral device with which the user comes in regular contact during use. | 08-28-2008 |
20080215890 | System and method for secure remote biometric authentication - Systems and methods for secure remote biometric authentication are provided. A network-based biometric authentication platform stores biometric templates for individuals which have been securely enrolled with the authentication platform. A plurality of sensor platforms separately establishes secure communications with the biometric authentication platform. The sensor platform can perform a biometric scan of an individual and generate a biometric authentication template. The sensor platform then requests biometric authentication of the individual by the biometric authentication platform via the established secure communications. The biometric authentication platform compares the generated biometric template to one or more of the enrolled biometric templates stored in memory at the biometric authentication platform. The result of the authentication is then communicated to the requesting sensor platform via the established secure communications. | 09-04-2008 |
20080222426 | Security Device - A security device comprising means for authenticating an entity using biometric data, characterized by means for alternatively authenticating the entity using a security code such as a personal identification number. Also a system configured to grant an authorization upon a successful authorization by the security device, in which the authorization granted after the authentication using the security code is restricted in scope compared to the authorization granted after the authentication using the biometric data. | 09-11-2008 |
20080235515 | Pre-processing Biometric Parameters before Encoding and Decoding - Biometric parameters acquired from human faces, voices, fingerprints, and irises are used for user authentication and access control. Because the biometric parameters are continuous and vary from one reading to the next, syndrome codes are applied to determine biometric syndrome vectors. The biometric syndrome vectors can be stored securely, while tolerating an inherent variability of biometric data. The stored biometric syndrome vector is decoded during user authentication using biometric parameters acquired at that time. The syndrome codes can also be used to encrypt and decrypt data. The biometric parameters can be pre-processed to form a binary representation, in which the binary representation has a set of predetermined statistical properties enforced imposed by a set of binary logical conditions. | 09-25-2008 |
20080235516 | Portable electronic door opener device and method for secure door opening - A portable computing device for opening a door (an electronic door opener) and a method for its use is disclosed. The computing device has a shared secret key, a standard certificate, means for communicating with the door, and a processor adapted for performing operations with shared secret keys and standard certificates. The door also possesses the same shared secret key. Under normal operation, messages encoded with the shared secret key serve to establish a right to open the door. The portable computing device's standard certificate is used to respond to occasional challenges by the door, and to generate the shared secret key. Biometric capabilities of the portable computing device add an additional layer of security in screening the identity of the user of the device. A security system for controlling access, involving a first plurality of computing devices and a second plurality of doors, and operating based on shared secret keys and occasional challenges is also disclosed. | 09-25-2008 |
20080270803 | Biometric Encryption And Decryption - Cryptographic methods and systems are disclosed. The cryptographic methods provide transparent encryption and decryption of documents in an electronic document management system. The cryptographic system adds a software module to an electronic document management system which traps file I/O events and performs cryptographic functions on the relevant documents before passing control back to the electronic document management system. | 10-30-2008 |
20080276099 | Universal Serial Bus (USB) Flash Drive Having Locking Pins and Locking Grooves for Locking Swivel Cap - In one embodiment of the present invention a Universal Serial Bus (USB) flash drive with locking swivel cap includes a USB device, a swivel cap having a top swivel cap face and a bottom swivel cap face. The swivel cap is connectably attached to the USB device, four locking pins, two of which disposed on the top swivel cap face and two of which disposed on the bottom swivel cap face, two top locking grooves disposed on a top surface of the USB device, and two bottom locking grooves disposed on a bottom surface of the USB device, wherein the locking pins disposed on top swivel cap face coupled with the two top locking grooves and the locking pins disposed on the bottom swivel cap face couple with the two bottom locking grooves allowing the swivel cap to lock in fully open (180 degrees) and fully closed (0 degree). A USB connector is connected to the USB device to couple the USB flash drive to a host device. A fingerprint sensor area is disposed on the top side of the USB device, the fingerprint sensor scans fingerprints of a user of the portable flash drive with swivel cap and optional fingerprint verification capability, and allowing access to data stored on the portable flash drive with swivel cap and optional fingerprint verification capability. | 11-06-2008 |
20080282092 | Card reading apparatus with integrated identification function - A card reading apparatus integrating identification function is provided, including a USB interface, a memory card interface, an ATA/ATAPI interface, a USB OTG controller, an identification interface module, an encrypted identification processor, and at least an identification device. The USB interface, the memory card interface, and the ATA/ATAPI interface are connected respectively to a USB interface media device, a flash memory card, and a data storage device, such as hard disk or CD-RW. The USB OTG controller is connected to the USB interface, the memory card interface, and the ATA/ATAPI interface so that the USB interface media device, the flash memory card, and the data storage device can exchange data under the control of the USB OTG controller. The identification interface module is connected to the USB OTG controller, the encrypted identification processor is connected to the identification interface module, and the identification device is connected to the encrypted identification processor. Therefore, the identification device can use fingerprint, other biological identification data or magnetic card to transmit the identification data to the encrypted identification processor. The results from the encrypted identification processor are used to enable and disable the USB OTG controller so that the stored data can be protected by encrypted identification function. | 11-13-2008 |
20080288782 | Method and Apparatus of Providing Security to an External Attachment Device - Systems and methods of providing security to an external Serial Advanced Technology Attachment (SATA) device are described herein. One embodiment includes presenting to a computing device, a first partition of an external Serial Advanced Technology Attachment storage device, as a Read Only Memory; restricting the computing device from accessing a secured second partition of the external Serial Advanced Technology Attachment storage device; and in response to receiving a valid identity authentication, unrestricting access to the second partition of the external Serial Advanced Technology Attachment storage device. In one embodiment, in response to receiving a logon request from the computing device, an identity authentication process is initiated, wherein the process is stored on the first partition. Furthermore, in one embodiment, a process stored on a disk controller receives an encryption key from the process stored on the first partition of the Serial Advanced Technology Attachment storage device, and the process stored on the disk controller uses the encryption key to decrypt the second partition of the Serial Advanced Technology Attachment storage device. | 11-20-2008 |
20080294907 | Methods for using a biometric parameter in the identification of persons - Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification. | 11-27-2008 |
20080301464 | Two-dimensional bar code for ID card - A method and apparatus for an identity card having improved security features. The identity card can have a two-dimensional bar code or similar encoding of data allowing for verification of the authenticity of the identity card. The two-dimensional bar code can store security data such as codes or image data that can be decoded and cross-checked against the visible user data to ensure that the card has not been improperly modified. | 12-04-2008 |
20090006859 | SYSTEM AND METHOD FOR OUT-OF-BAND ASSISTED BIOMETRIC SECURE BOOT - In some embodiments, the invention involves using a dedicated service processor with out-of-band capabilities to enable a secure boot using biometric data to authenticate the user. In some embodiments, at least a secondary token is used enhance the secure boot. An off-line database may be accessed by the service processor during boot to store or retrieve biometric templates to compare with scanned, live, biometric data. Other embodiments are described and claimed. | 01-01-2009 |
20090013191 | MULTISYSTEM BIOMETRIC TOKEN - An apparatus and a method for generating a unique user identification code for a user of a biometric security system is presented. No biometric information is stored either within the security system or on a device, and process enables a unique user identification code to be generated to allow multi-system identification of the same user. | 01-08-2009 |
20090031139 | System and Method for Electronic Certification and Authentification - The invention relates to electronic document security systems and in particular to user authentication and to the certification and secure transfer of sensitive document information of various type, like whole documents, certificates, signatures, stamps, etc., especially by verifying its correctness and safety/immunity from fraud. | 01-29-2009 |
20090031140 | METHODS FOR SECURE ENROLLMENT OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 01-29-2009 |
20090037742 | BIOMETRIC AUTHENTICATION DEVICE, SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION - A biometric sensor device, a portable electronic device including an actuatable biometric input device, and method of biometric authentication that includes an input device that generates a signal or completes a circuit when actuated, and a biometric reader that reads a biometric of a user when the user actuates the input device to generate the signal or complete the circuit. An authentication section authenticates the biometric read on the biometric reader to generate one of a data access allowance function based on authentication of the biometric input to the actuatable biometric input device and a data access prevention function based on non-authentication of the biometric input to the actuatable biometric input device. The data access allowance function permits data to be accessed at the data access interface, and the data access prevention function prevents reading and/or access to data anywhere on the data storage and access device. | 02-05-2009 |
20090037743 | BIOMETRIC AUTHENTICATION DEVICE, SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION - A biometric sensor device, a portable electronic device including an actuatable biometric input device, and method of biometric authentication that includes an input device that generates a signal or completes a circuit when actuated, and a biometric reader that reads a biometric of a user when the user actuates the input device to generate the signal or complete the circuit. An authentication section authenticates the biometric read on the biometric reader to generate one of a data access allowance function based on authentication of the biometric input to the actuatable biometric input device and a data access prevention function based on non-authentication of the biometric input to the actuatable biometric input device. The data access allowance function permits data to be accessed at the data access interface, and the data access prevention function prevents reading and/or access to data anywhere on the data storage and access device. | 02-05-2009 |
20090037744 | Biometric pin block - A system for biometric user identification. Biometric information is captured from a user and compared to a biometric template that is read from an identification token associated with the user. A data structure is constructed comprising data having a predetermined arrangement, wherein the predetermined arrangement is selected to indicate the result of the comparison | 02-05-2009 |
20090037745 | METHODS FOR SECURE BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 02-05-2009 |
20090037746 | METHODS FOR SECURE RESTORATION OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 02-05-2009 |
20090044023 | CONTROL DEVICE WITH AN INTEGRATED USER INTERFACE - A control device for controlling operation of a controlled apparatus is disclosed. The control device may include a sensor configured to acquire a first biometric signal, a second biometric signal, and a third biometric signal. A difference between the first biometric signal and the second biometric signal may be utilized to determine movement of a controlled object. The controlled object may pertain to the operation of the controlled apparatus. At least one of the first biometric signal, the second biometric signal, and the third biometric signal may be utilized to initiate performance of a first function of the controlled apparatus. Further, one or more of the first biometric signal, the second biometric signal, and the third biometric signal may be utilized to determine an identification of a user. | 02-12-2009 |
20090063866 | USER AUTHENTICATION VIA EVOKED POTENTIAL IN ELECTROENCEPHALOGRAPHIC SIGNALS - Techniques are disclosed for authentication and identification of a user by use of an electroencephalographic (EEG) signal. For example, a method for authenticating a user includes the following steps. At least one electroencephalographic response is obtained from a user in accordance with perceptory stimuli presented to the user. The user is authenticated based on the obtained electroencephalographic response. The authenticating step may be based on detection of an event-related potential in the obtained electroencephalographic response. The event-related potential may be a P300 event-related potential. The method may also include the step of enrolling the user prior to authenticating the user. The enrolling step may include a supervised enrollment procedure or an unsupervised enrollment procedure. | 03-05-2009 |
20090070592 | FINGER SENSING APPARATUS USING ENCRYPTED USER TEMPLATE AND ASSOCIATED METHODS - A finger sensing apparatus may include an integrated circuit (IC) substrate, an array of finger sensing elements on the IC substrate, and encryption circuitry on the IC substrate cooperating with the array of finger sensing elements for encrypting a user template comprising finger template data and at least one user credential. The at least one user credential may enable another device, such as a host platform, to perform at least one protected operation. | 03-12-2009 |
20090070593 | FINGER SENSING APPARATUS USING UNIQUE SESSION KEY AND ASSOCIATED METHODS - A finger sensor apparatus may include a finger sensor having an integrated circuit (IC) substrate, an array of finger sensing elements on the IC substrate, and session key negotiation circuitry on the IC substrate. The finger sensing apparatus may also include a host platform external from the finger sensor and cooperating with the session key negotiation circuitry to negotiate a unique session key for secure communication with the finger sensor during a respective communication session therewith. | 03-12-2009 |
20090083544 | SECURITY PROCESS FOR PRIVATE DATA STORAGE AND SHARING - A method and system for supplementing and/or replacing current security protocols and/or mechanisms used to store, manage and/or disseminate information for use on private data management devices and/or a private network and/or public network access provider's network. The system includes processing hardware, proprietary software, and firmware. The system protects private data without the need to trust the security or veracity of third parties and/or intermediate computers and/or networks. When a “user” stores data it is immediately protected from active and passive compromise attempts. Once protected and stored, data is never released and/or transferred unprotected. Only the authorized “receiver” of the data is capable of accessing the protected data. Encryption is used to enhance authentication of the participants and/or protection of the data. This method can be used in conjunction with other secure data transfer applications such as, but not limited to, Secure Socket Layer (SSL) encryption and/or the Secure Electronic Transaction (SET) protocol, etc. This method can also be used in conjunction with any data transfer mechanism such as, but not limited to, Ethernet, WiFi, Bluetooth, RFID transponders, etc. | 03-26-2009 |
20090100269 | BIOMETRIC AUTHENTICATION METHOD, COMPUTER PROGRAM, AUTHENTICATION SERVER, CORRESPONDING TERMINAL AND PORTABLE OBJECT - A biometric authentication method and apparatus are provided. A user to be authenticated uses a portable object including at least one biometric sensor. The portable object is adapted to cooperate with a terminal. The method includes: capturing, by the portable object, a biometric sample to be compared coming from the user to be authenticated; transmitting, by the portable object, the biometric sample, in a secure form to an authentication server; and determining, by the authentication server, a signature to be authenticated using said biometric sample, then comparing the signature with a reference signature. | 04-16-2009 |
20090100270 | BIOMETRIC AUTHENTICATION FOR REMOTE INITIATION OF ACTIONS AND SERVICES - In one aspect, the invention relates to generating a trusted communication channel with a client. An agent module is provided at the client along with a task set including one or more tasks. One or more client components needed to complete each of the tasks of the task set is determined, and it is further determined whether each of the needed client components is trustworthy. An equivalent component for components determined to be untrustworthy may be provided. | 04-16-2009 |
20090106559 | Method of Identifying a User by Means of Modified Biometric Characteristics, and a Database for Implementing the Method - The present invention relates to a method of identifying a user, the method being implemented by means of a database containing personal data of users and containing for each user at least one unmodified biometric characteristic (E | 04-23-2009 |
20090113209 | BIOMETRIC AUTHENTICATION METHOD - Provided is a biometric authentication method. A biometric authentication method in accordance with an aspect of the present invention includes generating a first one-time authentication template from biometric information using one-time transform information, and requesting authentication, comparing the first one-time authentication template with a one-time registration template, updating the one-time registration template and the one-time transform information when authentication is achieved according to a result of the comparison, wherein the updated one-time transform information is used to generate a second one-time authentication template to be authenticated according to the result of the comparison with the updated one-time registration template when successive authentication is requested. | 04-30-2009 |
20090138724 | BIOMETRIC METHOD AND APPARATUS AND BIOMETRIC DATA ENCRYPTION METHOD THEREOF - A biometric method, a biometric apparatus, and a biometric data encryption method thereof are disclosed. In the biometric method and the biometric apparatus, a biometric data is quantified to obtain a quantified data. A one-way function is then performed to convert the quantified data into an encrypted data. In the present invention, the biometric data is protected through a cryptography system so as to prevent the biometric features from being stolen or misappropriated. Moreover, in the present invention, a biometric technique can be integrated with a cryptography technique. | 05-28-2009 |
20090138725 | Authentication System and Method - An authentication system comprises a sensor for detecting a fingerprint and a doodle drawn by the user. The fingerprint, or other biometric information, is distorted in accordance with the doodle to provide distorted biometric information that is referred to as a doodleprint. The user can use different doodles on different systems, and if the doodleprint is compromised, can change the doodle to create a different doodleprint. | 05-28-2009 |
20090158049 | Building a security access system - In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately. | 06-18-2009 |
20090164796 | ANONYMOUS BIOMETRIC TOKENS - A biometrically enabled machine readable token is biometrically associated with the user or owner of the token. Such a token may be generated by initially providing biometric data of the user, and concealing the biometric data such that the biometric data is selectively accessible. The concealed biometric data is then used in generation of a token request message either by embedding the concealed biometric data into the token request message or by providing a concealed link thereto within the token request message. Once a token request message is received by a token issuer the concealed biometric data may be associated with the token. As the biometric data is concealed the specifics of that data are not accessible to third parties. Optionally the authenticity of the token may be effected by having the token issuer digitally signing the token. | 06-25-2009 |
20090164797 | SECURE OFF-CHIP PROCESSING SUCH AS FOR BIOMETRIC DATA - In a biometric sensor system and method, storage of acquired biometric data and/or processing of that data may be shifted from specialized secure processing hardware to host system resources for improved speed and reduced cost of biometric sensor devices and systems. Stored data may be encrypted and/or signed by the specialized secure processing hardware and/or software. A database of authorized biometric data (e.g., patterns or key features representing all or a portion of the fingerprints of authorized users) may be stored on the host system either encrypted or non-encrypted or both. Preliminary matching against a database of many enrolled fingerprints may be accomplished by the system processor to ease the processing burden on the specialized secure processing hardware/software. Final match confirmation remains within exclusive control of the specialized secure processing hardware/software in order to prevent data tampering or other efforts to defeat the security provided by biometric identification. | 06-25-2009 |
20090164798 | System and method for wireless state identification - A system and method for processing a state identifier. A request is received for a state identifier. A biometric associated with the state identifier is requested from a user. Authenticity of the biometric is verified in response to receiving the biometric from the user. The state identifier is transmitted to a receiving device in response to determining the biometric is authentic. | 06-25-2009 |
20090164799 | IC CARD IN WHICH BIOMETRIC INFORMATION IS STORED AND METHOD OF CONTROLLING ACCESS TO THE IC CARD - Biometric information previously obtained from an IC card bearer and security status for determining whether or not the IC card is accessible are stored in the IC card. Then, a biometric authentication device obtains biometric information from the IC card bearer and reads the previously-obtained biometric information from the IC card. The biometric authentication device compares the biometric information with the previously-obtained biometric information and transmits a result of the comparison to the IC card. The IC card verifies the comparison result transmitted thereto and determines whether or not the comparison result was illegally fabricated or altered, and updates the security status when it is determined that the comparison result was neither fabricated nor altered. | 06-25-2009 |
20090183008 | IDENTITY AUTHENTICATION AND SECURED ACCESS SYSTEMS, COMPONENTS, AND METHODS - Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the token and the user's biometric identifier, convert the biometric identifier to a biometric key, and apply the biometric key to decrypt the token. In this way, the decoders authenticate the users without performing a biometric identifier comparison. In some embodiments pieces or sets of the data are stored in designated data compartments, which are individually encrypted based on authority keys, and all of the encrypted data compartments are collectively encrypted based on the biometric key to create the token. The decoders store only the authority keys corresponding to the data compartments which they have authorization to open. In addition, in some embodiments the token and the biometric identifier are encrypted and sent to a remote authentication server for decryption of the token. | 07-16-2009 |
20090222670 | System and method for providing access to a keyboard video and mouse drawer using biometric authentication - The present invention relates generally to a system and method for providing a user access to a Keyboard, Video, Mouse (KVM) drawer based upon biometric authentication of the user, and more particularly, to a system and method for providing a user access to at least one host computer associated with a KVM drawer based, at least in part, on the user's unique biometric data. In one embodiment, an emulation controller, which emulates a KVM switch, is enabled or disabled based upon whether the associated user is properly authenticated. In another embodiment, an input-output buffer is enabled or disabled based upon whether the associated user is properly authenticated. Methods are also provided wherein the storage device containing at least a portion of the biometric data associated with authorized users is enabled upon receiving biometric data associated with a user of the KVM drawer. | 09-03-2009 |
20090222671 | SAFETY FEATURES FOR MEDICAL DEVICES REQUIRING ASSISTANCE AND SUPERVISION - An automatic locking system for a medical treatment device helps to ensure that an assistant is present during treatment of a patient. Among the features disclosed biometric authentication to verify that a trained assistant is present, a presence detector to ensure the assistant is continuously present during treatment, and warning and recovery processes that allow intermittent lapses in the continuous presence of the assistant. | 09-03-2009 |
20090240950 | Information processing apparatus and information management method - An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores therein user signature information in which biometric information of a user and a user electronic signature key that is a key for generating an electronic signature of the user for information created by the user are associated with each other and an encryption key that is a key for encrypting information, an electronic signature adding unit that, if the biometric information is obtained from the user, searches the storage unit for the user signature information corresponding to the biometric information, and adds the electronic signature of the user to user created information with a user electronic signature key in the user signature information, and an encrypt processing unit that encrypts with the encryption key the user created information processed by the electronic signature adding unit. | 09-24-2009 |
20090249079 | Information processing apparatus and start-up method - An information processing apparatus includes a chip that is implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores biometric information of a user allowed to operate the information processing apparatus as biometric authentication information, and a biometric determining unit that obtains, when obtaining a request for starting up the information processing apparatus, biometric information of the user and determines whether the information processing apparatus is allowed to start up, based on the biometric information and the biometric authentication information. | 10-01-2009 |
20090254757 | OPERATOR RECOGNITION DEVICE, OPERATOR RECOGNITION METHOD AND OPERATOR RECOGNITION PROGRAM - An operator recognition device is provided that eliminates the registration of data such as HMM data having a characteristic amount for which error in recognition occurs easily when recognizing an operator, and thus reduces the possibility of errors in recognition, and has stable recognition performance. When registering HMM data that is used when performing recognition processing, a speaker recognition device | 10-08-2009 |
20090271634 | Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens - Techniques, systems and methods are described relating to combining biometric and cryptographic techniques to support securely embedding data within a token and subsequent biometrically-enabled recovery of said data. Various transformation approaches are described that provide a secure means for transforming a stored or live, secure biometric-based identity token, embedding data into such tokens and biometric-based matching to both verify the user's identity and recover the embedded data. Security enhancements to a range of existing protocols are described using the techniques. Systems using novel protocols based on these techniques are described | 10-29-2009 |
20090271635 | METHODS AND SYSTEMS FOR AUTHENTICATION - The present invention discloses a method and system for authentication. The method for authentication includes: acquiring the privilege security level corresponding to a client-end; inquiring the identity security level corresponding to the privilege security level according to an established relation of association between privilege security level and identity security level; determining the authentication parameters for identity authentication according to the identity security level; performing identity authentication on the client-end using the authentication parameters; and obtaining an authentication result. The identity authentication and privilege authentication are combined, and identity authentication is performed according to the identity security level in accord with the privilege security level so that rules of identity authentication can be adjusted, and the flexibility of the process of authentication may be improved. | 10-29-2009 |
20090282260 | ELECTRONIC DATA VAULT PROVIDING BIOMETRICALLY PROTECTED ELECTRONIC SIGNATURES - An eVault system securely stores personal data and documents for citizens and allows controlled access by citizens and optionally by service providers. The eVault may be adapted to allow processes involving the documents to be carried out in a secure and paperless fashion. Documents are certified, and biometric matching is used for security. On effecting a match with a biometric identifier presented by a user, the user is allowed access to his personal eVault and to access a personal cryptographic key stored therein. One or more of these personal keys may be securely applied within the eVault to generate an electronic signature, amongst other functions. | 11-12-2009 |
20090287938 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 11-19-2009 |
20090292928 | Acquisition and particular association of inference data indicative of an inferred mental state of an authoring user and source identity data - A computationally implemented method includes, but is not limited to: acquiring inference data indicative of an inferred mental state of an authoring user in connection with at least a particular item of an electronic message, acquiring source identity data providing one or more identities of one or more sources that is or are basis, at least in part, for the inference data indicative of the inferred mental state of the authoring user, associating the inference data indicative of the inferred mental state of the authoring user with the particular item; and associating the source identity data providing one or more identities of the one or more sources with the particular item. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 11-26-2009 |
20090319798 | METHOD AND APPARATUS OF STORAGE ANTI-PIRACY KEY ENCRYPTION (SAKE) DEVICE TO CONTROL DATA ACCESS FOR NETWORKS - A method comprises performing an authentication of a user of a portable device, performing an authentication handshake between the portable device and a content server, wherein the portable device includes a USB plug that plugs directly into a USB port of a host computer and the host computer is communicatively coupled to the content server, and sending a first key sent from the portable device to the content server, wherein access to restricted content on the content server by the user is enabled if the user authentication, the authentication handshake, and an authentication using the first key are all successful. The process may also include encrypting restricted content received from the content server using a private key before storing the restricted content in a non-volatile memory of the portable device. | 12-24-2009 |
20090327743 | SECURE PORTABLE DATA TRANSPORT & STORAGE SYSTEM - A portable data transport device that provides security to data stored therein, and is configured to communicate data with a host computer for securing and transporting data. The portable data transport device includes a first processor and a biometric identification system. Upon successful biometric identification of an enrolled user, the first processor permits mounting of the data transport device to a host computer. However, prior to the commencement of read/write operations, cross-checking of stored identification codes of components of the portable data transport device occurs, including the use of a hash function. If any identifier does not match, no read/write data operations are permitted. The portable data transport device includes a file security program that includes a DLL encryption/decryption program having a self-check feature. Upon self check, if any changes were made to the encryption/decryption program, no read/write operations are permitted. The portable data transport device permits the selection of multiple files for encryption together into a single data container pack file and to store that data container pack file. The file security program permits an enrolled user at a host computer to assign only a password to a data container pack file. If a user at a host computer enters an incorrect password a predetermined number of times, portable data transport device processor will erase all data in any volatile memory it is using and will lock itself in a non-operational configuration. | 12-31-2009 |
20090327744 | INFORMATION PROCESSING APPARATUS AND SECURITY PROTECTION METHOD - According to one embodiment, an information processing apparatus includes an input module to input a password, a biological authentication device including a storage unit for storing biological information and identification information, and an authentication control module which sets and holds identification information to be stored in the storage unit of the biological authentication device, and permits a password input using the input module to be substituted by authentication using the biological authentication device when the identification information held by itself and the identification information stored in the storage unit of the biological authentication device match. The authentication control module includes a setting module to perform a setting for the identification information stored in the storage unit of the biological identification device and held by itself, on both conditions of authentication establishment with a registered password entry using the input module and authentication establishment using the biological authentication device. | 12-31-2009 |
20100005314 | IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA - The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, and is secured using industry-established mechanisms for preventing information tampering or eavesdropping, such as the addition of oxygen reactive layers. This invention also incorporates means for establishing security settings, profiles, and responses for the in-circuit security system and enrolled individuals. The in-circuit security system can be used in a variety of electronic devices, including handheld computers, secure facility keys, vehicle operation/ignition systems, and digital rights management. | 01-07-2010 |
20100005315 | METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 01-07-2010 |
20100017618 | METHOD AND SYSTEM FOR BIOMETRIC AUTHENTICATION AND ENCRYPTION - A biometric user authentication method, includes enrolling a user based on user's biometric samples to generate user's reference data; and authenticating the user based on a user's live biometric sample and the user's reference data; wherein enrolling a user includes acquiring the user's biometric samples; extracting an enrollment feature vector from each user's biometric sample; computing a biometric reference template vector as a mean vector based on the enrollment feature vectors; computing a variation vector based on the enrollment feature vectors and the mean vector; randomly generating an enrollment secret vector; computing an enrollment code vector based on the enrollment secret vector and the variation vector; computing a difference vector as a wrap-around difference between the enrollment code vector and the mean vector; computing an error correction vector based on the enrollment secret vector to enable error correction during the user authentication phase according to a given error tolerance level, wherein the error correction vector is not computed if the error tolerance level is equal to zero; and storing the variation vector, the difference vector, and the error correction vector as a part of the user's reference data to be used during the user authentication phase. | 01-21-2010 |
20100017619 | SYSTEMS AND METHODS FOR SECURE AND AUTHENTIC ELECTRONIC COLLABORATION - The present disclosure relates to systems and methods for secure and authentic electronic collaboration between a plurality of users using a combination of biometric security, a separate and secure network infrastructure, management processes, encrypted electronic storage, and collaborative templates. In an exemplary embodiment, an online collaboration system includes a server including a network interface connected to the Internet, a data store including electronic data storage, and a processor, wherein each of the network interface, the data store and the processor are communicatively coupled, and wherein the network interface, the data store and the processor are collectively configured to: biometrically authenticate a plurality of users; and enable online collaboration between the plurality of users. | 01-21-2010 |
20100031053 | BIOMETRIC DATA TRANSMISSION DEVICE AND METHOD - A data transmission device for secure biometric transmission includes first and second input-output units, and a biometric identification apparatus. The input-output units electrically connect to one of the two electronic devices, respectively. The biometric identification unit is configured for electrically interconnecting the first and second input-output units, receiving a biometric input, outputting biometric data in response to the biometric input, and encrypting the biometric data to be transmitted to one of the electronic device having a storage unit. | 02-04-2010 |
20100037064 | Method of encryption and decryption and a keyboard apparatus integrated with functions of memory card reader and fingerprint encryption/decryption - A method of encryption and decryption and a keyboard apparatus integrated with a memory card reader and an encryption/decryption scheme using fingerprints is disclosed. The invention integrates a memory card reader and a fingerprint scan module into a keyboard apparatus. The memory card reader and fingerprint scan module are jointly using the power supply and data transmission port. Therefore, the keyboard apparatus uses the memory card reader to function data transferring, and the fingerprint scan module is used to retrieve a fingerprint of the user, which is used to encrypt or decrypt the data in the memory card by the keyboard's driver. Thereby, in the preferred embodiment, the biometric characteristic is applied to encrypt/decrypt the data in the computer system or the data in the memory card by a program installed in the computer system. The multi-functional keyboard is achieved. | 02-11-2010 |
20100042850 | AUTHENTICATION METHOD AND APPARATUS - An authentication method for use in an apparatus having a function, a function to execute a first program that executes a predetermined process after first user authentication with biometrics authentication is performed and does not have a network connection function, and a function to execute a second program that is invoked after the first program is executed, executed after second user authentication and has a network connection function comprises executing the first program in forgery detection mode regardless of a result of a user determination if biometrics authentication with forgery is detected at the time of the first user authentication, invoking the second program in the forgery detection mode after the first program is executed in the forgery detection mode, and notifying a device connected to an external network of forgery detection information by using the network connection function after the second program is invoked in the forgery detection mode. | 02-18-2010 |
20100049987 | METHOD AND ARRANGEMENT FOR SECURE USER AUTHENTICATION BASED ON A BIOMETRIC DATA DETECTION DEVICE - An arrangement for secure user authentication includes a computer or telecommunication terminal with a smartcard and a device. The smartcard is adapted to securely store biometric information relating to at least one user and the device is adapted to detect biometric data of users. The smartcard and the device include a radio interface for communicating together and a module for exchanging biometric information between each other. In this way, tampering of the transferred biometric information is difficult. In order to increase the security, one or more of the following measures may be used: a secure communication channel between the device and the smartcard, a direct (preferably short range) communication channel between the device and the smartcard and encryption and decryption of biometric information transferred between the device and the smartcard. | 02-25-2010 |
20100077224 | MULTIPLATFORM INDEPENDENT BIOMETRIC IDENTIFICATION SYSTEM - An independent biometric identification system having an independent biometric identification server and a capture device connected to a user's system to receive biometric characteristics of a user. The independent biometric identification server causes the user to identify its capture device to the server and provides biometric identification of the user independently of individual applications implemented on the user's system. The system further includes a biometric capture agent application chosen by the independent biometric identification server and individually developed for the identified capture device. Finally, the system includes a biometric database storing the biometric characteristics of the user. | 03-25-2010 |
20100083000 | Fingerprint Sensor Device and System with Verification Token and Methods of Using - A method and system of verification is provided for sensing a fingerprint. The present invention offers a secure authentication method and system based on a user's fingerprint data to grant the access to information at a remote location. A biometric input corresponding to the fingerprint is provided by a user and the biometric input is than validated. Based on the validation, a token is transmitted to a remote location. The method and system can be further enhanced by additional security comprising receiving a request based on the authentication of the user information and transmitting, to a second remote location, a token based on the biometric input in response to the request. | 04-01-2010 |
20100106975 | SYSTEM AND METHOD FOR USER AUTHENTIFICATION USING NON-LANGUAGE WORDS - A system and method for user authentication include a user instructing component and a voice authentication component. The user instructing component generates an instruction for authenticating a voice of a user. The instruction includes a first instruction to recite one or more non-language words. The voice authentication component analyzes a sound signal which includes a response to the instruction. The voice authentication component can authenticate the voice of the user using the response to the instruction including a response to the first instruction to recite the one or more non-language words. | 04-29-2010 |
20100138666 | SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element. | 06-03-2010 |
20100138667 | AUTHENTICATION USING STORED BIOMETRIC DATA - A method is provided for storing a biometric template extracted a smart card for use on a user computing device. The biometric template is extracted from the smart card using a smart card reader. The biometric template is encrypted using a content protection key. The content protection key is encrypted using at least one of a device password or a smart card password. The password may be hashed. The encrypted biometric template, the encrypted content protection key and the hashed password may then be stored in a cache. A method for using the stored biometric template to access the user computer device is also provided. | 06-03-2010 |
20100138668 | CONTENT DELIVERY SYSTEM - An information delivery device interacting with a user's eye, the device comprising an eye characteristic reader for reading at least one characteristic of the user's eye, a retinal projector for projecting information onto the retina, and an eye characteristic processor operative to receive at least one characteristic of the eye and to select the information based at least partly thereupon. A content protection system may comprise a multiplicity of such eye characteristic readers and a content protector receiving said at least one characteristic from such readers and controlling the user population's use of content to be protected based on that at least one characteristic. Related apparatus and methods are also provided. | 06-03-2010 |
20100153737 | Method of Projecting a Secure USB Key - A method of protecting a secure USB key comprising: a step of obtaining at least one parameter concerning the use of a function that can be executed on said key; a step of detecting at least one blocking condition that depends on said parameter, and where appropriate, a first check step suitable for preventing the execution of said function; a step of detecting at least one determined event independent of said function; and a second check step suitable for authorizing the execution of said first check step only in the event of said determined event being detected, said second check step being active even when said blocking condition is not satisfied. | 06-17-2010 |
20100153738 | AUTHORIZED ANONYMOUS AUTHENTICATION - A method, program and system for processing data is disclosed. The method, program and system comprising the steps of: (a) receiving (e.g., during an enrollment process) a first biometric data and a first personal key, (b) processing the first biometric data and the first personal key through an irreversible cryptographic algorithm, sometimes after: (i) generating one or more variants from the first biometric data, (ii) processing the first personal key through a reversible cryptographic algorithm, and (iii) adding salt to the first biometric data or first personal key, (c) receiving (e.g., during an authentication process) a second biometric data and a second personal key, (d) processing the second biometric data and the second personal key through the irreversible cryptographic algorithm, (e) comparing the second processed data to the first processed data, and (f) generating a signal pertaining to the comparison of the second processed data to the first processed data, such as: (i) a confirmation reflecting authentication when the second processed data matches the first processed data (sometimes allowing access to a facility or system) or (ii) a denial reflecting no confirmation when the second processed data does not match the first processed data. | 06-17-2010 |
20100174913 | MULTI-FACTOR AUTHENTICATION SYSTEM FOR ENCRYPTION KEY STORAGE AND METHOD OF OPERATION THEREFOR - A method for operating a multi-factor authentication system includes: authenticating a user by a self-authenticating token system; and retrieving a decryption key from the self-authenticating token system by a computer system after authenticating the user, the computer system using encryption to encrypt data. | 07-08-2010 |
20100174914 | SYSTEM AND METHOD FOR TRACELESS BIOMETRIC IDENTIFICATION WITH USER SELECTION - A device, system and method for identifying an individual with a biometric identifier that is designed to be non-unique, such that at least one other individual in a given population has the identical biometric identifier. The biometric identifier according to the present invention, also referred to herein as a “BIdToken”, is implemented to be biometrically traceless, such that an exact image or copy of the biometric information is preferably not maintained by the present invention. Instead, the BldToken refers to an incomplete identifier obtained from the biometric information, which is non-unique. Preferably the invention operates so as to obviate the obligation to trust a third party. | 07-08-2010 |
20100180127 | BIOMETRIC AUTHENTICATION BASED UPON USAGE HISTORY - Customized biometric authentication based at least in part upon usage history and learning capabilities of a user is provided. A biometric sample of a user received at a biometric interface of a device is compared with at least one stored template that uniquely identifies the user, and a match score generated when the biometric sample matches one of the stored templates. The match score is compared to a match score threshold value of an application that the user is attempting to access to generate match score comparison results, and an updated false reject ratio (FRR) for the last N matches of the user is calculated. The user is allowed to access the application when the match score comparison results indicate that the match score is at least equal to the match score threshold value and the updated FRR is less than a FRR threshold value of the application. | 07-15-2010 |
20100185871 | SYSTEM AND METHOD TO PROVIDE SECURE ACCESS TO PERSONAL INFORMATION - A personal information system allowing users to securely collect, store, and transfer personal information is disclosed. The personal information system provides a central location for users to store information, and allows third parties to securely access the information in accordance with user-defined access rules. By providing a central storage area that may be electronically accessed by third parties, the personal information system facilitates the transfer of user information to these third parties. In order to control access to a user's stored personal information, user-defined access rules define the conditions under which third parties may access the stored information. The system also provides user authentication devices that include biometric recognition components and a touch screen display. The user authentication devices may be installed at third party locations to enable a user to authorize the transfer of personal information to third parties. | 07-22-2010 |
20100205452 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR COMMUNICATING A PRIVACY POLICY ASSOCIATED WITH A BIOMETRIC REFERENCE TEMPLATE - A system, method and program product for communicating a privacy policy associated with a reference template. The method includes assigning a first identifier for identifying a reference template created from biometric data collected, defining a second identifier for identifying a privacy policy that indicates a level of protection to be provided by a relying party requesting access to the reference template, the second identifier including an accept-reject provision for controlling the proper use and handling of the biometric data, cryptographically binding the reference template to the privacy policy and transmitting, responsive to a request received from the relying party, the accept-reject provision for the reference template, where based on a response received from the relying party to the accept-reject provision for the privacy policy, the reference template is either transmitted or not transmitted to the relying party. | 08-12-2010 |
20100223474 | METHOD AND APPARATUS FOR MANAGING CONFIDENTIAL INFORMATION - The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information using biometric keys to lock data storage devices, a secure data input/output device and authorization procedures to facilitate identity rights management; and/or data querying techniques to preserve the anonymity of disclosed personal data. | 09-02-2010 |
20100235646 | Verification method and system thereof - A verification method and a verification system are disclosed. The verification method is applicable to an electronic device including a system memory and a BIOS memory provided with a Pre-Boot Authentication (PBA) application and prescribed biometric data. In one embodiment, the verification method comprises the steps of executing a BIOS process to load the operation code (OPCode) or the BIOS driver of the BIOS from the BIOS memory to the system memory to establish a communication channel between the electronic device and a biometric device; loading the PBA application to the system memory for running; loading the prescribed biometric data to the system to compare with biometric data acquired by the biometric data capture device; and requesting the BIOS to load an operation system when the comparing result is matched. | 09-16-2010 |
20100241868 | METHOD AND APPARATUS FOR STORING, MANAGING, AND SECURING PERSONAL INFORMATION - Some embodiments of the invention work in conjunction with a portable device, which when attached to a computing device invokes operations for storing personal information on the portable device, retrieving personal information from the portable device, encrypting personal information on the portable device, and decrypting information from the portable device. For these embodiments, the operations reside on the portable device and remain there during their performance. The operations are performed on the computing device, but are not permanently installed onto the computing device during performance. In addition, once the operations of these embodiments cease performance on the computing device, all data temporarily transferred from the portable device to the computing device during operation. In particular, any sensitive information that is stored and retrieved during the operations is removed from the computing device. | 09-23-2010 |
20100250957 | Method of Authenticating a User on a Network - A method of controlling access to electronic information is provided. The method requires the use of a portable token adapted to read and verify a user's biometric data in order to view encrypted files or data fields. If the proper biometric data is entered into the token, the user is presented with a unique and dynamic password for logon. The unique password is displayed on a small LCD screen on the token. Access to the protected information is allowed once the unique password is verified by the enterprise system containing the encrypted. | 09-30-2010 |
20100268961 | Method and Arrangement for User Validation - A controlled access storage device includes a resource store storing two or more resources, the resource store having two or more levels of administration, wherein at least a first administration level is adapted to provide exclusive access to at least a first resource. The system includes an access control server ( | 10-21-2010 |
20100299530 | USER AUTHENTICATION SYSTEM AND METHOD - A high security computer system and method that authenticates a user using iris recognition and liveliness detection. The method for authenticating the user to the secure system includes capturing an image of the user's face and generating an iris template from the image. While the iris template is being generated, liveliness verification is performed on the user's face. User access is granted if the iris template matches the enrolled iris template and if the liveness verification demonstrates the user's face is live, and denied if otherwise. The method may optionally silently re-authenticate the user after access is granted to the secure system. The authentication system includes an image capture device for capturing an image, an iris template generation component to generate an iris template from the image, a liveness detection component, and an iris comparison component adapted to compare the iris template to iris templates of previously enrolled users. | 11-25-2010 |
20100306550 | DEFINING CLASSIFICATION THRESHOLDS IN TEMPLATE PROTECTION SYSTEMS - A method for configuring a biometric template protected authentif ication system, in which the desired classification threshold (T) is first selected to optimize the trade-i off between FAR and FRR of the system, and then the ECC used in the authentif ication process is chosen such that the number (b) of errors which can be corrected thereby is equal to or greater than the selected classification threshold. During authentif ication, the number (b) of errors in a first codeword derived from biometric data associated with a physical object is determined and used in the decision process to accept or reject authentif ication. | 12-02-2010 |
20100325442 | SYSTEM AND METHOD FOR NAMELESS BIOMETRIC AUTHENTICATION AND NON-REPUDIATION VALIDATION - A system, method, and computer program product for authenticating a requestor using a previously-stored biometric print. Records are stored in a database, where each record contains a previously-stored biometric print corresponding to an individual and is disassociated from an identity of the individual. An identifier and a biometric sample are requested from the requestor. The identifier is then used to locate one of the plurality of records corresponding to the requestor. The requestor is authenticated if the biometric sample matches the previously-stored biometric print. | 12-23-2010 |
20100332842 | DETERMINING A MOOD OF A USER BASED ON BIOMETRIC CHARACTERISTIC(S) OF THE USER IN AN ONLINE SYSTEM - Techniques are described herein that enable a determination of a user's mood based on biometric characteristic(s) of the user in an online system. An online system is a system that supports the transfer of information via the Internet. The mood of the user at a time instance (i.e., a mood instance) is determined based on the biometric characteristic(s) of the user and a substantially real-time instance(s) associated with the user. A substantially real-time instance associated with the user is any occurrence with respect to the user that is determined in substantially real-time. The mood instance of the user and the substantially real-time instance that is associated with the user may (or may not) occur at the same time instance. Online content may be provided to the user and/or action(s) may be recommended to the user in response to determining the mood instance of the user. | 12-30-2010 |
20110010558 | BIOMETRICS BASED IDENTIFICATION - A biometrics template matching method includes the steps of: providing a reference biometric template and a candidate biometric template, each including position data and orientation data of a respective plurality of minutiae; comparing the orientation data of each minutia from the candidate template with the orientation data of each minutia from the reference template; when the orientation data of a selected pair differ by no more than a first threshold, determining a displacement vector representative of the difference in position data of the selected pair of minutiae; determining the maximum number of displacement vectors that differ from each other by less than a second threshold; if the maximum number of displacement vectors is less than a third threshold, returning a mismatch, otherwise returning a match. | 01-13-2011 |
20110016327 | AUTHENTICATION METHOD, AUTHENTICATION DEVICE, PROGRAM AND RECORDING MEDIUM - An authentication method of performing authentication for an information processing device connected via a communication network by an authentication device, including: receiving information related to biometric authentication concerning the information processing device; receiving information related to identification information for identifying the information processing device; receiving information related to environment of the information processing device; receiving an electronic signature by a secret key which is paired with an electronic certification transmitted from the information processing device; and determining, by a control unit, a biometric level based on the received information related to biometric authentication, a device level based on the received information related to identification information and an environment level based on the received information related to environment; correcting, by the control unit, the determined level based on validity of the received electronic signature. | 01-20-2011 |
20110035598 | COMPUTER PROGRAM AND METHOD FOR GRANTING MULTIPLE USERS ACCESS TO A SECURE REPOSITORY - A computer program, system, and method for granting multiple users access to a secure repository. Embodiments of the present invention provide for authenticating either of first or second users desiring access to the secure repository. In embodiments of the present invention, a respective encryption or decryption operation of files or folders transferred in or out of the secure repository is performed using a key created, at least in part, on an enrolled security template provided by said first user. Thus, even if the second user is authenticated and allowed access to the secure repository, said creation of the key is performed using the security template associated with the first user. In even further embodiments of the present invention, a single storage device contains a plurality of secure repositories. | 02-10-2011 |
20110083018 | Secure User Authentication - Biometric information is authenticated by a web-enabled application that identifies a biometric sensor installed in a client device. The authentication procedure reads biometric information associated with a user and compares the biometric information with a biometric template associated with that user. If the biometric information matches the biometric template, the authentication procedure retrieves credentials associated with the user and communicates those credentials to a requesting process. | 04-07-2011 |
20110099385 | BIOMETRIC AUTHENTICATION METHOD AND COMPUTER SYSTEM - A biometric authentication method for a computer system, the computer system comprising: a computer; and an authentication server, the biometric authentication method including steps of: extracting a first feature from the captured biometric information; generating a template polynomial for enrollment; extracting a second feature from the captured biometric information; generating a template polynomial for authentication; generating a correlation function for calculating a correlation between the template polynomial for authentication and the enrolled template polynomial; calculating a correlation value between the template polynomial for authentication and the enrolled template polynomial by using the generated correlation function, and determining based on the calculated correlation value whether or not the biometric information at the time of authentication coincides with the biometric information enrolled. | 04-28-2011 |
20110126024 | Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device - Biometric data, suitably transformed are obtained from a biometric input device contained within a stand-alone computing device and used in conjunction with a PIN to authenticate the user to the device. The biometric template and other data residing on the device are encrypted using hardware elements of the device, the PIN and Password hash. A stored obfuscated password is de-obfuscated and released to the device authentication mechanism in response to a successfully decrypted template and matching biometric sample and PIN. The de-obfuscated password is used to authenticate the user to device, the user to a remote computer, and to encrypt device data at rest on the device and in transit to and from the remote computer. This creates a trusted relationship between the stand-alone device and the remote computer. The system also eliminates the need for the user to remember and enter complex passwords on the device. | 05-26-2011 |
20110138187 | SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION USING MULTIPLE KINDS OF TEMPLATES - In additional enrollment of a template in a biometric authentication system, the template is automatically enrolled on the basis of a plurality of authentication results to assure a user's convenience and security. A post-migration authentication server receives a first template and a second template from a post-migration authentication terminal, performs authentication on the basis of the comparison result between the received first template and the user's preliminarily first enrolled template, and provisionally enrolls the first template and the second template. It repeats the reception, authentication, and provisional enrollment and calculates a match probability from a plurality of comparison results of the provisionally first enrolled templates, determines whether or not to store a second enrolled template on the basis of the match probability, and automatically enrolls the second template in the post-migration authentication server. | 06-09-2011 |
20110179284 | Information processing apparatus and information managing method - An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores user unique information in which biometric information of a user and unique information for use when a unique process corresponding to the user is performed are associated with each other, and an information processing unit that retrieves, when biometric information of the user is obtained, unique information corresponding to the obtained biometric information from the user unique information and performs a predetermined process by using the retrieved unique information. | 07-21-2011 |
20110197074 | METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service. | 08-11-2011 |
20110231666 | ELECTRONIC SIGNATURE METHOD AND DEVICE - An electronic signature method uses a signature generation unit with a memory that is spatially separated from a data processing device. At least one biometric trait of a person who will electronically sign an electronic dataset is captured, and an electronic biometric dataset is generated based thereon. The biometric dataset is encrypted using a randomly generated value. Subsequently, the encrypted biometric data are transmitted to the data processing device, a first checksum is generated in the data processing device for the encrypted biometric data and the electronic dataset, and the first checksum is transmitted from the data processing device to the signature generation unit. The random value is encrypted using the first checksum, and the encryption result is further encrypted using the stored key. The result of this is then transmitted to the data processing device. | 09-22-2011 |
20110231667 | Method of Identification or Authorization, and Associated System and Secure Module - Method of identification or of authorization using a system comprising at least one sensor for acquiring biometric data and one secure module storing a set of digital data obtained starting from a set of respective biometric data by means of a digitization algorithm. According to this method, a biometric data value is obtained, acquired by the sensor; a digital value is obtained by application of the digitization algorithm to the acquired biometric data value; within the secure module, at least some of the digital data from said set of digital data are ranked according to their proximity to the digital value obtained; and a biometric data value is obtained from said set of biometric data by taking into account a position of the corresponding digital data within the ranking. | 09-22-2011 |
20110264919 | DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA - A system, a method, and a computer program for generating a seed and/or a key from live biometric indicia, such that all the information necessary for generating the seed and/or the key is not stored on a storage medium. The method comprises receiving a biometric template from a user and enrolling the template; assigning an optimization value to the enrolled biometric template; encrypting an item of test data using the optimization value, such that the optimization value is an encryption seed; storing the encrypted item of test data on the storage medium; destroying the encryption seed after encrypting the item of test data; receiving a live biometric template; comparing the templates and determining an interval based on a probability that the templates are specific to the same user; iteratively testing values within the interval to identify the value in the interval for decrypting the encrypted item of test data, wherein the value used to decrypt the item of test data is the encryption seed; and generating the key using the seed. | 10-27-2011 |
20110302423 | METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 12-08-2011 |
20120030474 | System and Method for Personal Biometric Data Sequestering and Remote Retrieval with Power Checking - Provided is a sequestered personal match server apparatus and protocol for remote use, across common telecommunications technology or infrastructure, for establishing a blinded, zero-knowledge transaction between distributed computing devices, in which personal data is stored or retrieved and may be further transmitted or represented to the user's selected transaction counterparts, including boundary-keepers. A user may cloak their legal identification in some transaction or may substantiate it, since the capacity of proving the user's traceability to their legal identity is consistent with an electronic report issued to any user-queried interests indicating the success or failure of an attempt at accessing the data within the device. Biometrics and device sequestration are viewed as synergistic enhancements to scalability, including methods of power-checking any attempt at breach by or through various agencies of a commercial, private or public market. Transparency of use is further emphasized by relying upon common, mature electronics, which the user may bootstrap and use, unaided. The more important embodiments assume a role for a public witness agent or officer, during commissioning or first-use of said electronic device. A preferred embodiment further develops wireless networking synergies in approaching personal safety as an economic concern. | 02-02-2012 |
20120030475 | MACHINE-MACHINE AUTHENTICATION METHOD AND HUMAN-MACHINE AUTHENTICATION METHOD FOR CLOUD COMPUTING - A Machine-Machine Authentication method and a Human-Machine Authentication method for Cloud Computing. A Smart Card IC that includes a TPM/TCM/USB key function module and a storage memory, and a bio-feature identification method are used to achieve the Machine-Machine Authentication and Human-Machine Authentication. The Machine-Machine Authentication uses the Smart Card IC to achieve an authentication between the Server and the Client, and the Human-Machine Authentication uses the bio-feature identification method to achieve an authentication between the user and the Client or the user and the Server. | 02-02-2012 |
20120030476 | SYSTEM AND METHOD FOR AUTOMATICALLY COLLECTING OPINIONS - A system and a method for automatically collecting opinions are provided. The method for automatically collecting opinions according to the present invention comprises the steps of: distributing, to user terminals, content containing actual metadata corresponding to metadata items required for executing an opinion-collecting service program; and extracting opinions of users contained in the reply content received from user terminals, and compiling statistics with the extracted opinions. The present invention enables an automatic online collection of user opinions regarding voting, public opinion polls, surveys and other feedback via PCs or portable communication equipment, and automatically compiles statistics with the collected user opinions. | 02-02-2012 |
20120042171 | METHOD AND SYSTEM FOR BIOMETRIC AUTHENTICATION - A method of authentication is provided that includes capturing biometric data for a desired biometric type from an individual, determining an algorithm for converting the biometric data into authentication words, converting the captured biometric data into authentication words in accordance with the determined algorithm, including the authentication words in a probe, and comparing the probe against identity records stored in a server system. Each of the identity records includes enrollment biometric words of an individual obtained during enrollment. Moreover, the method includes identifying at least one of the identity records as a potential matching identity record when at least one of the authentication words included in the probe matches at least one of the enrollment biometric words included in the at least one identity record, and generating a list of potential matching identity records. | 02-16-2012 |
20120042172 | SYSTEM AND METHOD FOR PLATFORM-INDEPENDENT BIOMETRICALLY VERIFIED SECURE INFORMATION TRANSFER AND ACCESS CONTROL - The inventive data processing system and method enable verifiable secure transfer of information between two or more parties, each having access to at least one identity verification system, utilizing a platform-independent architecture to enable verification of identities of parties sending and receiving secured information, and ensuring that only an authorized receiving party gains access to the secured information, regardless of the type, model, ownership and/or quantity of biometric identity verification (BIV) systems being utilized by each party. Parties desiring to securely transfer information between one another register at a central security management system, and each provide at least one biometric enrollment to their unique record configured for storing multiple BIV system enrollments for each party. The inventive system and method also provide an adaptive enrollment feature which enables the system to function automatically and transparently with new BIV systems that have not been previously enrolled by the user. | 02-16-2012 |
20120047370 | METHODS FOR SECURE RESTORATION OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 02-23-2012 |
20120066507 | IDENTITY AUTHENTICATION AND SECURED ACCESS SYSTEMS, COMPONENTS, AND METHODS - Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the token and the user's biometric identifier, convert the biometric identifier to a biometric key, and apply the biometric key to decrypt the token. In this way, the decoders authenticate the users without performing a biometric identifier comparison. In some embodiments pieces or sets of the data are stored in designated data compartments, which are individually encrypted based on authority keys, and all of the encrypted data compartments are collectively encrypted based on the biometric key to create the token. The decoders store only the authority keys corresponding to the data compartments which they have authorization to open. In addition, in some embodiments the token and the biometric identifier are encrypted and sent to a remote authentication server for decryption of the token. | 03-15-2012 |
20120066508 | METHOD FOR MANAGING AND CONTROLLING ACCESS TO CONFIDENTIAL INFORMATION CONTAINED IN PORTABLE ELECTRONIC MEDIA - The management of confidential information contained in portable memory media provides for:
| 03-15-2012 |
20120084572 | SECURE DEVICE SHARING - A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device with others but maintain security over aspects of the device. A task change request is evaluated to determine whether the requested task is permitted and, if so, the requested task is allowed; if not, then an authorization process is invoked to prompt the user to input authorization data. Upon verification of the authorization data, the device may be unlocked and the requested change implemented. The permitted tasks may designate specific applications, specific operations or functions within applications or at the operating system level, one or more currently open windows, and other levels of granularity. | 04-05-2012 |
20120102332 | MOBILE, WIRELESS HAND-HELD BIOMETRIC CAPTURE, PROCESSING AND COMMUNICATION SYSTEM AND METHOD FOR BIOMETRIC IDENTIFICATION - A mobile, wireless biometric identification system includes a biometric capture device, associated software and processes which enable a commercially available wireless communication device, such as a smartphone, using a commercially established wireless communication networks, to capture a digital image of a human biometric (iris, fingerprint, etc.) for transmission via a secure connection to a central server. The capture device is designed to focus on the difficult task of capturing the highest possible quality image for encoding and comparison, while the overall system is designed to leverage the existing cellular communication network. At the server level, the server system receives the image, encodes the image to a biometric template, and compares the encoded template to a plurality of reference templates stored in a database to identify the individual. Identification data is then transmitted back to the smartphone device and displayed. | 04-26-2012 |
20120110340 | SYSTEM, PORTABLE DEVICE AND METHOD FOR DIGITAL AUTHENTICATING, CRYPTING AND SIGNING BY GENERATING SHORT-LIVED CRYPTOKEYS - A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated from a unique set of input parameters. The system comprises an input device designed to extract predetermined characteristic values from value input by the user, which value is specific to the user, by means of a given algorithm, which algorithm is designed to remove the natural variation in the characteristic values in order to yield an identical set of characteristic values upon input of the same value, and a device designed to generate at least one user specific encryption key comprising said characteristic values. | 05-03-2012 |
20120110341 | Mobile Device Transaction Using Multi-Factor Authentication - The following is a system in which a person may use a Cellular (Mobile) Telephone, a PDA or any other handheld computer to make a purchase. This is an example only. The process may entail any type of transaction which requires authentication, such as any financial transaction, any access control (to account information, etc.), and any physical access scenario such as doubling for a passport or an access key to a restricted area (office, vault, etc.). It may also be used to conduct remote transactions such as those conducted on the Internet (E-Commerce, account access, etc.). In the process, a multi-factor authentication is used. | 05-03-2012 |
20120124387 | Animal Data Management - Animal data is stored in memory accessible to a server. The server allows users to access the animal data, such as across a communication network. In some embodiments an identifier for an animal is stored with animal information. The identifier can be used to control access to animal records and to quickly locate animal information associated with a particular animal. | 05-17-2012 |
20120131350 | BIOMETRIC IDENTIFICATION METHOD - A biometric and cryptographic processing unit includes a biometric receiver receiving biometric information of a BCU user. A biometric unit of the BCU has a store of biometric information of an authorized BCU user and compares received biometric information with the stored biometric information to determine if the user is an authorized BCU user. A cryptographic unit generates/stores an asymmetric cryptographic public/private key pair associated with each authorized BCU user. An input/output port allows encrypted/unencrypted data to be input to/output from the BCU. The cryptographic unit operates in response to a specific authorized user giving permission to undertake a specific cryptographic operation on data input to the BCU only upon the specific authorized user being determined as an authorized BCU user, whereby a specific private key corresponding to the specific authorized user is enabled for use in the specific cryptographic operation after which the specific private key is disabled. | 05-24-2012 |
20120144204 | UPDATES OF BIOMETRIC ACCESS SYSTEMS - Methods are disclosed for performing an update to a biometric access system. An instruction is received at a handheld device defining the update. An encoded signal is generated from the instruction to be transmitted to a biometric terminal from the handheld device. An acknowledgment is received from the biometric terminal at the handheld device that the encoded signal has been received and acted upon. Update information is transmitted from the handheld device over a network to a server to record the update. | 06-07-2012 |
20120166810 | Biometrically Securing and Transmitting Data - The disclosed technology combines biometric authentication and data transmission technologies to provide for secure storing of private information and wireless transmission of the private information in order to perform predefined tasks. A user may securely store his private information in an electronic database. To access the private information stored securely, the user provides his biometric data. Upon successful biometric authentication of the user, authorization is granted to the user to access the private information stored in the electronic database. Upon successful biometric authentication, the private information can be transmitted via short range wireless communication. Optionally, upon successful biometric authentication, the private information can be transmitted via wireless communication over a computer network. | 06-28-2012 |
20120185698 | Protecting Codes, Keys and User Credentials with Identity and Patterns - Computer security applications use cryptography keys, cryptography codes—such as one-time passcodes—and other user credentials to protect the secrecy, authenticity and integrity of applications such as financial information, financial transactions and infrastructure (e.g. the electrical grid, power plants, and defense systems). The prior art attempted to generate (e.g. derive) an invariant from a biometric template, biometric print or non-biometric pattern that is used as a security key or code. Biometric variability has been a difficult obstacle for the prior art. | 07-19-2012 |
20120204035 | Cryptographic Proofs in Data Processing Systems - A prover of a data processing system may prove to a verifier of the system that the prover satisfies a condition imposed by the verifier. The prover holds in memory at least one cryptographic credential in which are encoded a biometric template characteristic of the prover and a set of prover attributes such that each of the template and attributes are bound to a common secret value of the prover. A biometric measurement is made of the prover, which then communicates with the verifier to make a cryptographic proof demonstrating: possession of the cryptographic credential; that the biometric measurement matches the biometric template encoded in the cryptographic credential; and that the set of prover attributes encoded in the cryptographic credential satisfies the condition imposed by the verifier. The cryptographic proof is made without revealing the template or the at least one credential to the verifier. | 08-09-2012 |
20120239939 | Secure Resume for Encrypted Drives - Systems, methods and products are described that provide secure resume for encrypted drives. One aspect provides a method including: receiving an indication to resume from a suspended state at a computing device; responsive to authenticating a user at one or more input devices, accessing a value in a BIOS derived from authenticating the user at the one or more input devices; responsive to accessing the value, releasing a credential for unlocking one or more encrypted drives; and thereafter proceeding to resume from the suspend state. | 09-20-2012 |
20120239940 | IDENTIFICATION BY MEANS OF CHECKING A USER'S BIOMETRIC DATA - The invention relates to a database ( | 09-20-2012 |
20120303966 | METHOD OF ASSIGNING A SECRET TO A SECURITY TOKEN, A METHOD OF OPERATING A SECURITY TOKEN, STORAGE MEDIUM AND SECURITY TOKEN - A method of assigning a secret to a security token ( | 11-29-2012 |
20120311343 | REMOTE ENTRY SYSTEM - A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem comprising a biometric sensor for receiving a biometric signal, means for matching the biometric signal against members of the database of biometric signatures to thereby output an accessibility attribute, and means for emitting a secure access signal conveying information dependent upon said accessibility attribute, wherein the secure access signal comprises one of at least a rolling code, an encrypted Bluetooth™ protocol, and a WiFi™ protocol, and a receiver sub-system comprising means for receiving the transmitted secure access signal and means for providing conditional access to the controlled item dependent upon said information. | 12-06-2012 |
20120324235 | SYSTEM AND METHOD FOR REMOTE SELF-ENROLLMENT IN BIOMETRIC DATABASES - Methods and systems for remotely enrolling enrollees into biometric databases are provided. The method includes acquiring biometric data from one or more biometric sensors and authenticating an enrollee associated with the biometric data. The method includes enrolling the authenticated enrollee associated with the biometric data. The acquiring occurs externally from equipment that requires an identification. The method includes verifying individual samplings of the biometric data for quality at the time of enrollment based on a pre-determined threshold and verifying whether the enrollee presenting the biometric data is authenticated at the time of enrollment. The method includes signing a request of a third party with a private key associated with the third party, the signing denoting that the biometric data is verified for a transaction between the third party and the enrollee. The method includes sending the signed third party request to the third party to complete authenticating of the transaction. | 12-20-2012 |
20130007465 | Apparatus, Systems and Method for Virtual Desktop Access and Management - Systems and methods are provided for accessing and managing a virtual desktop. In some examples a desktop access manager may be provided to enable and communicatively link a virtual desktop key such that a user may access a linked desktop virtually over a second computing device. The systems and methods provide increased security when accessing a virtual desktop and enable customization of access to the virtual desktop. | 01-03-2013 |
20130036309 | SYSTEM AND METHOD FOR VERIFYING THE IDENTITY OF AN INDIVIDUAL BY EMPLOYING BIOMETRIC DATA FEATURES ASSOCIATED WITH THE INDIVIDUAL - The invention relates to a system for verifying the identity of an individual by employing biometric data features associated with the individual, which system comprises at least one or more hardware components, an enrolment means, and a verifying means, wherein said enrolment means are arranged in deriving a first biometric template data, said first biometric template data being secret and associated with a first set of first biometric data features of said individual, and in receiving a further set of first biometric data features of said individual, and in deriving a further biometric template data associated with said further set of first biometric data, and wherein said verifying means are arranged in comparing the first biometric template data with the further biometric template data to check for correspondence, wherein the identity of the individual is verified if correspondence exists. The invention aims to provide a solution to the above identified drawbacks and thereto at least one of said hardware components is provided with at least one component specific data feature associated therewith and wherein said enrolment means are arranged in associating at least one of said component specific data features with said biometric template data. | 02-07-2013 |
20130046993 | Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption - A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed. | 02-21-2013 |
20130067235 | COMPUTING DEVICE FOR AUTHENTICATION - There is provided a computing device for authentication. The computing device comprises a processor for processing digital data; a memory device for storing digital data including computer program code and being coupled to the processor; and an interface for sending and receiving digital data and being coupled to the processor. The processor is controlled by the computer program code to receive, via the interface, image selection data representing an image selection from a set of candidate images; and authenticate in accordance with the image selection data. | 03-14-2013 |
20130080788 | Biometric Key - A biometric key ( | 03-28-2013 |
20130080789 | Multi-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 03-28-2013 |
20130103951 | SYSTEMS AND METHODS FOR IDENTIFYING AN INDIVIDUAL - The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an individual. These systems and methods are useful for, amongst many applications, more secure identification of high-risk individuals attempting to gain access to an entity, transport, information, location, security organization, law enforcement organization, transaction, services, authorized status, and/or funds. | 04-25-2013 |
20130103952 | User Authentication System and Method for Encryption and Decryption - A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read. | 04-25-2013 |
20130111214 | BIOMETRIC AUTHENTICATION METHOD AND COMPUTER SYSTEM | 05-02-2013 |
20130132732 | SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element. | 05-23-2013 |
20130151860 | METHOD AND APPARATUS FOR SECURE MEASUREMENT CERTIFICATION - The invention relates to methods and apparatuses for acquiring a physical measurement, and for creating a cryptographic certification of that measurement, such that its value and time can be verified by a party that was not necessarily present at the measurement. | 06-13-2013 |
20130173925 | Systems and Methods for Fingerprint-Based Operations - A method for operating a system based on fingerprint scanning inputs includes receiving, by a fingerprint sensor, a fingerprint input and providing, from a processor coupled with the fingerprint sensor, fingerprint feature data representing features of the fingerprint input. The method also includes executing a first command, by the processor, if comparing the fingerprint feature data with at least a portion of stored fingerprint data results in a first match reflecting that the fingerprint input occurred in a first direction and executing a second command that is different from the first command, by the processor, if comparing the fingerprint feature data with the at least a portion of the stored fingerprint data results in a second match reflecting that the fingerprint input occurred in a second direction. | 07-04-2013 |
20130173926 | Method, Apparatus and Applications for Biometric Identification, Authentication, Man-to-Machine Communications and Sensor Data Processing - Applications, algorithms and technologies are disclosed for machine-to-machine communications, biometric identification and sensor data fusion. Applications include authentication, e-commerce and energy management. Algorithms include biometric signature generation and identification, as well as data fusion methods. Technologies include biometric and environmental sensing and identification. Advantages of the invention include more robust person authentication, greater immunity to theft of personal property and information, and enhanced building energy management. | 07-04-2013 |
20130173927 | SECURE REGISTRATION-FREE FINGERPRINT AUTHENTICATION METHOD AND SYSTEM BASED ON LOCAL FEATURES - A secure registration-free fingerprint authentication method based on local structures comprising: extracting descriptor features and local structure features of fingerprint minutiae from an input fingerprint image; conducting quantization and feature selection with respect to the features of the fingerprint minutiae; and encrypting the selected features and then decrypting the encrypted features to obtain the fingerprint image. The method adopts local features for fingerprint authentication, thus avoiding the complex registration in encryption domain. The method lowers the risk of the fingerprint authentication being attacked and improves security. | 07-04-2013 |
20130191647 | Secure Wireless Access to Medical Data - A method is disclosed that allows secure access to medical data. A device application running on a wireless device, optionally including associated scanners, acquires a patient's biometric information (e.g., a finger-print at a resolution exceeding | 07-25-2013 |
20130205138 | SYSTEM AND METHOD FOR REAL WORLD BIOMETRIC ANALYTICS THROUGH THE USE OF A MULTIMODAL BIOMETRIC ANALYTIC WALLET - A system and method for real world biometric analytics through the use of a multimodal analytic wallet. The system includes a biometric wallet comprising a pervasive repository for storing biometric data, the pervasive repository including at least one of a biometric layer, a genomic layer, a health layer, a privacy layer, and a processing layer. The biometric wallet further comprises a biometric analytic interface configured to communicate the biometric data to one or more devices. | 08-08-2013 |
20130219186 | Personal Digital Key Initialization and Registration for Secure Transactions - A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes. | 08-22-2013 |
20130227299 | METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS INTO ELECTRONIC DEVICES - A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device. | 08-29-2013 |
20130262873 | METHOD AND SYSTEM FOR AUTHENTICATING REMOTE USERS - A user of a mobile device can be authenticated based on multiple factors including biometric data of the user. During an enrollment process of the user, an encryption key is sent to the mobile device via a message. The encryption key is recovered from the message and used to encrypt communications between the mobile device and a server. Biometric data is collected from the user and sent to the server for computing a biometric model (e.g., a voice model, etc.) of the user for later use in authentication. An encrypted biometric model is stored only in the mobile device and the encrypted biometric model is sent to the server for authentication of the user. For authentication, various information including an identification of the mobile device, responses to challenge questions, biometric data including the biometric model, etc. are used at the server. | 10-03-2013 |
20130283057 | BIOMETRIC AUTHENTICATION APPARATUS, BIOMETRIC AUTHENTICATION METHOD, AND BIOMETRIC AUTHENTICATION COMPUTER PROGRAM - A biometric authentication apparatus includes a biometric information acquiring unit which captures an image of a first body part of a user carrying biometric information to generate a biometric image representing the biometric information, and a processing unit configured to determine a position of a second body part of the user on a position detection image to determine the user's position relative to a reference position, determine a rotation angle corresponding to the user's position based on a relationship between the user's position relative to the reference position and the rotation angle, rotate registered biometric information of a registered user or the biometric information on the biometric image according to the rotation angle so as to make the direction of the registered biometric information substantially parallel to the direction of the biometric information, and compare the registered biometric information and the biometric information to each other. | 10-24-2013 |
20130290728 | Method and system for a secure, searchable and sharable digital notary journal - Disclosed is a method and system for an electronic notary journal, to run on a smartphone or computer or similar device. Embodiments allow for the storage in local memory or in a database of data that would go in a notary journal, plus metadata. Further embodiments record digital photographs or scans of the customer, witnesses, and documents. Video of the service itself can also be included in the data. Metadata recording the time, date, and geographical location at which the notary data was saved are incorporated with the notary data. | 10-31-2013 |
20130297945 | Using biometrics as an encryption key - An image of an biometric part is used as encryption or decryption key. The biometric part image is obtained, and items within the biometric part are analyzed. Relationships between those parts are determined, e.g. ratios between different parameters of different parts. Those ratios are then used to form the key. A sequence of biometric information can used in which case both the information itself and the sequence are used to form to the key. | 11-07-2013 |
20130305055 | BIOMETRIC IDENTIFICATION METHOD - A biometric and cryptographic processing unit includes a biometric receiver receiving biometric information of a BCU user. A biometric unit of the BCU has a store of biometric information of an authorized BCU user and compares received biometric information with the stored biometric information to determine if the user is an authorized BCU user. A cryptographic unit generates/stores an asymmetric cryptographic public/private key pair associated with each authorized BCU user. An input/output port allows encrypted/unencrypted data to be input to/output from the BCU. The cryptographic unit operates in response to a specific authorized user giving permission to undertake a specific cryptographic operation on data input to the BCU only upon the specific authorized user being determined as an authorized BCU user, whereby a specific private key corresponding to the specific authorized user is enabled for use in the specific cryptographic operation after which the specific private key is disabled. | 11-14-2013 |
20130305056 | IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA - The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, and is secured using industry-established mechanisms for preventing information tampering or eavesdropping, such as the addition of oxygen reactive layers. This invention also incorporates means for establishing security settings, profiles, and responses for the in-circuit security system and enrolled individuals. The in-circuit security system can be used in a variety of electronic devices, including handheld computers, secure facility keys, vehicle operation/ignition systems, and digital rights management. | 11-14-2013 |
20130326229 | VERIFICATION APPARATUS, VERIFICATION PROGRAM, AND VERIFICATION METHOD - In a verification apparatus, a biometric information acquisition unit acquires a plurality of biometric information pieces from an object. A first verification unit calculates, as a verification score, the similarity between the biometric information piece and a verification information piece, and compares the calculated verification score with a first determination value to determine whether the biometric information piece matches the verification information piece. When the verification fails, a second verification unit performs verification on the plurality of biometric information pieces having a predetermined relationship, using the verification information piece and a second determination value which defines a less stringent criterion than the first determination value. The second verification unit compares the verification score with the second determination value, and determines that the match is confirmed when a plurality of biometric information pieces satisfy the criterion defined by the second determination value. | 12-05-2013 |
20130339748 | PERSONAL BIOMETRIC SYSTEM AND METHOD FOR WIRELESS DEVICE CONTROL - In one embodiment, a biometric device includes a first portion having a processor and a second portion releasably coupled to the first portion. The processor is configured to determine whether the second portion is coupled to the first portion. The processor is configured to operate in an enrollment mode while the first portion is coupled to the second portion and operate in an authentication mode while the first portion is decoupled from the second portion. In one embodiment, a method of biometric authentication includes, first, coupling two portions of a biometric device to put it into an enrollment mode, collecting a biometric sample, and generating and storing a corresponding enrollment code; and second, decoupling the two portions of the biometric device, collecting a biometric sample, generating a corresponding access code, and granting or denying access to an asset based on comparison of the enrollment code and the access code. | 12-19-2013 |
20130339749 | DISTRIBUTED BIOMETRIC DATA STORAGE AND VALIDATION - Systems and methods for securely storing biometric data for use in a biometric identification system, and accessing such data for validating individuals, are described. One method of securely storing biometric data for use in a biometric identification system includes receiving a template describing biometric data that identifies a person. The method also includes encrypting the template using an encryption key, and separating the encrypted template into at least first and second portions, wherein both the first portion and the second portion are required to reconstruct the template. The method also includes storing the first portion in a database and storing the second portion on an access device issued to the person. | 12-19-2013 |
20140006795 | Continual Authorization for Secured Functions | 01-02-2014 |
20140019768 | System and Method for Shunting Alarms Using Identifying Tokens - Alarms are shunted dependent on an authorized user's location being confirmed as in the vicinity of an unpowered token, such as an NFC chip, QR code or other 2D barcode. The tokens may be attached to the doors or elsewhere in the spaces to be alarmed. The tokens are detected with a user's personal mobile electronic device and a token identifier is sent with an identification of the user's device to a remote server, where a decision is made whether to override the alarm or not. | 01-16-2014 |
20140032923 | System and device for authenticating a user - A system for authenticating a user trying to access a service ( | 01-30-2014 |
20140032924 | MEDIA ENCRYPTION BASED ON BIOMETRIC DATA - Embodiments of techniques and systems for biometric-data-based media encryption are described. In embodiments, an encryption key may be created for a recipient user based at least in part on biometric data of the recipient user. This encryption key may be maintained on a key maintenance component and used by a sharing user to encrypt a media file for access by the recipient user. One or more access policies associated with recipient user may be encrypted in the encrypted media file as well. In embodiments, the media file may be encrypted for use by multiple recipient users. When a recipient user desires to access the encrypted media file, a decryption key may be generated in real time based on contemporaneously captured biometric data and used to provide access to the encrypted media file. Other embodiments may be described and claimed. | 01-30-2014 |
20140082368 | BIOMETRIC AUTHENTICATION METHOD AND COMPUTER SYSTEM - A biometric authentication method for a computer system, the computer system comprising: a computer; and an authentication server, the biometric authentication method including steps of: extracting a first feature from the captured biometric information; generating a template polynomial for enrollment; extracting a second feature from the captured biometric information; generating a template polynomial for authentication; generating a correlation function for calculating a correlation between the template polynomial for authentication and the enrolled template polynomial; calculating a correlation value between the template polynomial for authentication and the enrolled template polynomial by using the generated correlation function, and determining based on the calculated correlation value whether or not the biometric information at the time of authentication coincides with the biometric information enrolled. | 03-20-2014 |
20140089672 | WEARABLE DEVICE AND METHOD TO GENERATE BIOMETRIC IDENTIFIER FOR AUTHENTICATION USING NEAR-FIELD COMMUNICATIONS - Techniques associated with a wearable device and method to generate biometric identifier for authentication using near-field communications are described, including capturing data associated with a habitual activity, a physiological characteristic, and a motion pattern using a wearable device, generating a biometric identifier using the data, storing the biometric identifier on the wearable device, and authenticating a user using the biometric identifier. | 03-27-2014 |
20140089673 | BIOMETRIC IDENTIFICATION METHOD AND APPARATUS TO AUTHENTICATE IDENTITY OF A USER OF A WEARABLE DEVICE THAT INCLUDES SENSORS - Embodiments relate generally to electrical and electronic hardware, computer software, wired and wireless network communications, and wearable computing devices for facilitating health and wellness-related information, and more particularly, to an apparatus or method for using a wearable device (or carried device) having sensors to identify a wearer and/or generate a biometric identifier for security and authentication purposes (e.g., using the generated biometric identifier similar to a passcode). In one embodiment, a method includes determining a pattern of activity based on a first activity and a second activity, comparing data representing the pattern of activity against match data associated with a habitual activity, and authenticating an identity of a user associated with a wearable device. | 03-27-2014 |
20140095884 | MULTI-FACTOR AUTHENTICATION USING BIOMETRIC DATA - Technologies for enabling biometric multi-factor authentication includes a transform selector value, a transform function that uses the transform selector value and a biometric user identifier as input, a salt derived from the output of the transform function, and a cryptographic hash function that generates a hash value based on the salt and a non-biometric user identifier. | 04-03-2014 |
20140095885 | METHODS FOR BIOMETRIC REGISTRATION AND VERIFICATION, AND RELATED SYSTEMS AND DEVICES - The invention relates to a registration method for future biometric verification purposes, including the following steps for one person (I): obtaining first biometric data ( | 04-03-2014 |
20140136851 | BIOMETRIC-BASED WIRELESS DEVICE ASSOCIATION - According to one aspect of the present disclosure, a method and technique for automatically associating a wireless device to a data processing system using biometric data is disclosed. The method includes: receiving biometric data corresponding to a user of a data processing system; creating a certificate by the data processing system based on the biometric data; discovering a wireless device able to communicate with the data processing system; responsive to discovering the wireless device, automatically requesting a certificate from the wireless device; and, responsive to the certificate from the wireless device matching the certificate created by the data processing system, automatically associating the wireless device with the data processing system. | 05-15-2014 |
20140149747 | METHOD AND APPARATUS FOR MANAGING CONFIDENTIAL INFORMATION - The invention is a method and apparatus for managing the secure acquisition, storage and disclosure of confidential information, to facilitate identity rights management; and/or preemptively authorized data querying techniques to preserve the anonymity of disclosed personal data. | 05-29-2014 |
20140195815 | METHODS AND SYSTEMS FOR FINGERPRINT TEMPLATE ENROLLMENT AND DISTRIBUTION PROCESS - A system and method may comprise providing a database comprising a user list and a user device list, the user list comprising a list of user biometric identifiers, each extracted from and unique to a respective template of a user biometric of a verified user, and the user device list comprising a list of user biometric identifiers each extracted from and unique to a respective template of a user biometric of a verified user device associated with the verified user; and determining one of (1) whether a user biometric identifier of a known user biometric received from an unverified user device matches a user biometric identifier on the user device list and (2) whether a user biometric identifier extracted from and unique to a new user biometric template received from a verified user device matches a user biometric identifier in the stored user list. | 07-10-2014 |
20140201537 | MOBILE DEVICE-BASED AUTHENTICATION WITH ENHANCED SECURITY MEASURES PROVIDING FEEDBACK ON A REAL TIME BASIS - The tracking of user authentication is disclosed. A first user biometric data set is received from a mobile device on an authentication server, and a second user biometric data set is received from a site resource on the authentication server. The second user biometric is transmitted from the site resource in response to receipt of an authentication command from the mobile device on the site resource. The user is rejected for access to the site resource in the event of an authentication failure. A security procedure is initiated on at least one of the mobile device and a remote physical device separate from the mobile device in response to the rejecting of the user for access to the site resource. | 07-17-2014 |
20140223191 | Communication System and Authentication Card - One of the objects of the present invention is to provide a communication system in which biometrics can be utilized without leaking to a third person so that a strict personal authentication can be conducted. The communication system includes, storing a correspondence table in a card, storing a reference password which is formed by converting a part of biometrics of an authorized user in the card by using the correspondence table, reading a part of biometrics of a user by the card, converting a part of the biometrics of the user into a password by the card using the correspondence table, and checking the password against the reference password by the card, wherein the card and the user are authenticated if a the password and the reference password match in the step of checking. | 08-07-2014 |
20140237256 | METHOD FOR SECURING DATA USING A DISPOSABLE PRIVATE KEY - A method for securing data uses a unitary device to obtain a biometric reading from a user, and to generate a new key pair corresponding to the user's biometrics. The unitary device uses a private key from the key pair to encrypt data or voice, sends the encrypted data or voice to a second device and deletes the private key. The unitary device can authenticate the user using a previously generated public key corresponding to the user's biometrics. Also, the second device can decrypt the received data or voice using a public key corresponding to the user and previously received from the unitary device. | 08-21-2014 |
20140281567 | Method for Authenticating an Encryption of Biometric Data - A method authenticates an encryption of a probe vector of biometric data based on an encryption of an enrolment vector of the biometric data using consistency of discriminative elements of the biometric data. The method determines an encryption of a first distance between discriminative elements of an enrolment vector stored at a server and a probe vector presented for an authentication. The method also determines an encryption of a second distance between discriminative elements of a first consistency vector stored at the server and a second consistency vector presented for the authentication. Next, the biometric data is authenticated based on encryptions of the first and the second distances. | 09-18-2014 |
20140281568 | Using Biometrics to Generate Encryption Keys - An electronic device may be used to support user authentication based on biometric readings. In this regard, a unique identification parameter may be generated for each user associated with the electronic device. The unique identification parameter may comprise a user identification input parameter (e.g., alphanumerical password) combined with a set of values (e.g., alphanumerical) generated based on biometrics data generated for the user. In this regard, the biometric based values may be generated based on configuring, for each possible biometric identifier, a range of valid values, such as based on a type of biometric identifier and a specified degree of accuracy. User access may be permitted based on obtaining of a subsequent biometric reading, and generating based thereon a second identification parameter that is compared with the unique identification parameters recognized by the electronic device. | 09-18-2014 |
20140281569 | BIOMETRIC AUTHENTICATION METHOD AND COMPUTER SYSTEM - A biometric authentication method for a computer system, the computer system comprising: a computer; and an authentication server, the biometric authentication method including steps of: extracting a first feature from the captured biometric information; generating a template polynomial for enrollment; extracting a second feature from the captured biometric information; generating a template polynomial for authentication; generating a correlation function for calculating a correlation between the template polynomial for authentication and the enrolled template polynomial; calculating a correlation value between the template polynomial for authentication and the enrolled template polynomial by using the generated correlation function, and determining based on the calculated correlation value whether or not the biometric information at the time of authentication coincides with the biometric information enrolled. | 09-18-2014 |
20140289534 | SYSTEMS, METHODS AND APPARATUS FOR MULTIVARIATE AUTHENTICATION - Systems, methods, and apparatus are disclosed for electronically sharing data using authentication variables, such as biometrics and contextual data. Example contextual data includes machine identifications (IDs) and data collected from sensors of computing devices. | 09-25-2014 |
20140310531 | METHOD AND SYSTEM FOR SECURING THE ENTRY OF DATA TO A DEVICE - A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device with keys of the device, the key map indicating data different from that of the keys of the device. | 10-16-2014 |
20140331059 | Method and System for Authenticating Biometric Data - A method for authenticating biometric data determines a first set of descriptors of a fingerprint. Each descriptor in the first set represents a region of the fingerprint that includes multiple minutiae. The method compares each descriptor in the first set of descriptors with each descriptor in a second set of descriptors to determine a number of matching descriptors and compares the number of matching descriptors with a threshold for authenticating the biometric data. | 11-06-2014 |
20140331060 | User and Device Authentication in Enterprise Systems - Methods and systems for authenticating users of client devices to allow access of resources and services in enterprise systems are described herein. An authentication device may validate a user based on authentication credentials received from a client device. Validation data stored by the authentication device, and a corresponding access token transmitted to the client device, may be used to authenticate the user for future resource access requests. A user secret also may be stored by the authentication device and used to validate the user for future resource access requests. Additionally, after validating a user with a first set of authentication credentials, additional sets of credentials for the user may be retrieved and stored at an access gateway for future requests to access other services or resources in an enterprise system. | 11-06-2014 |
20140337634 | Biometric Authentication Substitute For Passwords On A Wearable Computing Device - Methods, apparatus, and computer-readable media are described herein related to biometric authentication. A first computing device can detect a machine-readable code displayed by a second computing device, where the machine-readable code can identify protected information viewable via the second computing device. In response to detecting the machine-readable code, the first computing device can acquire biometric data via one or more biometric sensors associated with the first computing device. Based at least in part on the biometric data, the first computing device can generate an authentication message that includes authentication information and identifies the protected information. The first computing device can then send the authentication message to an authentication server for verification of the authentication information, where verification of the authentication information can allow access to the protected information via the second computing device. | 11-13-2014 |
20140337635 | BIOMETRIC VERIFICATION WITH IMPROVED PRIVACY AND NETWORK PERFORMANCE IN CLIENT-SERVER NETWORKS - The present invention relates to improving the privacy of biometric information used in biometric authentication of identity by retaining all biometric information corresponding to a given user, and conducting all transactions related thereto (i.e., the actual authentication process) on a client (i.e., user) side of the system, thereby maximizing the user's control over biometric information corresponding to himself and preventing the storage of biometric templates on third-party servers outside of the control of the concerned individual. In a particular example of the present invention, security for the biometric information is further enhanced by encrypting the biometric template (used as a comparison reference during authentication, as is known) stored on the client side and completely destroying an original unencrypted version of the template. Also specified is secure storage of encryption keys for encrypting biometric data at the client. In yet a further example of the present invention, authentication is preferably conducted using the encrypted biometric templates. | 11-13-2014 |
20140337636 | SIMPLIFIED MULTI-FACTOR AUTHENTICATION - A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element. | 11-13-2014 |
20140365782 | Method and System for Providing Password-free, Hardware-rooted, ASIC-based Authentication of a Human to a Mobile Device using Biometrics with a Protected, Local Template to Release Trusted Credentials to Relying Parties - Biometric data, which may be suitably transformed are obtained from a biometric input device contained within a stand-alone computer or a mobile device, which may contain an ASIC chip connected to or incorporated within the stand-alone computer or mobile device and which includes the capability for capturing one or more biometric samples and for biometric feature extraction, matching and encryption. For extra security, the biometric matching is used in conjunction with a PIN to authenticate the user to the stand-alone computer or mobile device. The biometric template and other sensitive data residing on the mobile device are encrypted using hardware elements of the mobile device (or the ASIC) together with the PIN hash and/or the Password hash. An obfuscated version of the Password, stored on the ASIC or the mobile device is de-obfuscated and released to the mobile device authentication mechanism, including a Trusted Platform Module if present, in response to a successfully decrypted template and matching biometric sample and PIN. A de-obfuscated password is used to authenticate the user to the mobile device and the same or a different de-obfuscated password may be used to authenticate the user to a remote computer using the SSL/TLS or a process based upon a symmetric encryption algorithm. The locally generated password may be used to encrypt data at rest on the mobile device or ASIC and the remote authentication password may be used to encrypt data in transit to and from a remote computer. This creates a trusted relationship between the stand-alone computer or mobile device and the remote computer. The system also eliminates the need for the user to remember and enter complex passwords on the mobile device or for secure transmission of data. A similar method may be used, with the signature/sign biometric modality to determine whether the holder of an IC chip card is, in fact the card owner. | 12-11-2014 |
20140380060 | ELECTRONIC AUTHENTICATION DOCUMENT SYSTEM AND METHOD - In one embodiment a controller comprises logic configured to receive a document copy, wherein the document copy comprises an identifier which uniquely identifies an electronic device and an authentication algorithm logic, generate, with the authentication algorithm logic, a security key for the document copy based on at least one input from the user, transmit the security key to a remote device, and store the document copy and a computer-readable code which uniquely associates the document with the electronic device in a memory. Other embodiments may be described. | 12-25-2014 |
20150019873 | SYSTEM FOR EMBEDDED BIOMETRIC AUTHENTICATION, IDENTIFICATION AND DIFFERENTIATION - An electronic device authenticates a user without requiring active input from the user. At least one user interface receives a plurality of user inputs to the electronic device that are unrelated to an active authentication action of the user of the electronic device. At least one biometric sensor extracts from the plurality of user inputs, biometric data identifying the user. A processor authenticates the user responsive to the extracted biometric data. | 01-15-2015 |
20150026480 | Personal Digital Key Initialization And Registration For Secure Transactions - A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes. | 01-22-2015 |
20150039899 | METHOD FOR ENCRYPTING A PLURALITY OF DATA IN A SECURE SET - A server-implemented method encrypting at least two pieces of indexed data as lists of elements, each element belonging to a finite set of indexed symbols on an alphabet. The data is encrypted to form a protected set, including: the server randomly generates, for each datum, a corresponding encoding function; if at least one element that constitutes a datum is the symbol of the alphabet, the server determines the image of the symbol of the alphabet via the encoding function corresponding to the datum to obtain a codeword coordinate and adds the codeword coordinate to an indexed set corresponding to the element of the alphabet; then the server completes the indexed set with error-inducing points; the server randomly reindexes the elements of the indexed set corresponding to the symbol of the alphabet; and the server adds the indexed set to the protected set. The method can identify an individual. | 02-05-2015 |
20150052365 | Network Managed Antivirus Appliance - Data can be scanned using a network managed appliance. The network managed appliance may integrate commercial hardware elements connected through a basic or simplified operating system environment expressly developed for the appliance, thus being more malware resistant and less vulnerable to attacks from the scanned data or other sources. The network managed appliance may be a self-contained apparatus with an integrated chassis, designed and configured as “single-purpose” device. Such appliances may be connected to an appliance management network including central management servers in communication with appliances in remote locations. The central management servers may ensure that scanning software and the definitions lists for each of the appliances are current and match an enterprise-approved configuration. | 02-19-2015 |
20150067348 | DATA ENCRYPTION AND SMARTCARD STORING ENCRYPTED DATA - A data encryption and decryption process, particularly for use in smart cards, in which the data is encrypted using an encryption key derived from a fingerprint template. The fingerprint template is stored, in unencrypted form, in a memory which, apart from the fingerprint template, is filled or substantially filled with random data values thereby to conceal the fingerprint template. The template may be broken up into components stored in disparate locations in the memory to further increase security. Decryption is performed by, firstly, carrying out scanning a fingerprint to obtain a new template, comparing the new template with the previously stored template and, if there is a match, regenerating the encryption key from the previously stored template. The regenerated encryption key is then used to decrypt the data. | 03-05-2015 |
20150074418 | METHOD AND APPARATUS FOR OUTPUTTING RECOGNIZED ERROR OF SENSOR IN ELECTRONIC DEVICE - A method and an apparatus are provided for operating an electronic device. The electronic device recognizes biometric data of a user that is input to the electronic device. Information related to an input error of the biometric data based on the recognition of the biometric data is presented to the user. | 03-12-2015 |
20150089240 | Biometric management system - The invention is directed toward a system and method of verifying the identity of a person based on biometric information. The system includes a server computer, a client computer, a software application, and a biometric device. The software application applies a hash algorithm to the biometric information input into the system, permitting the storage of a hash value. A user inputs initial biometric information and a hash value of that biometric information is stored. At a later time the user inputs verification biometric information. The system creates a second hash value and confirms the identity of the user by comparing the hash values. The system permits a user to create a social network with other users. A user may create a response function in the system which is performed when a second user is granted permission based on a level of social connection and confirms his identity. | 03-26-2015 |
20150089241 | Image Sensor and Payment Authentication Method - The invention relates to an image sensor and a payment authentication method. The image sensor includes: a sensing module configured to optically sense an image and to convert an optical signal of the image into an image signal; and an encryption module configured to encrypt the image signal and to output the encrypted image signal. The payment authentication method includes the steps of: converting an individual image into an image signal by an image sensor, wherein the image sensor includes a sensing module configured to optically sense an image and to convert an optical signal of the image into an image signal and an encryption module configured to encrypt the image signal; encrypting the image signal by the image sensor; and transmitting the image signal processed in the preceding step. With the image sensor and the payment authentication method of the invention, the security of mobile and remote payment may be greatly improved. | 03-26-2015 |
20150095654 | CRYPTOGRAPHIC KEY GENERATION BASED ON MULTIPLE BIOMETRICS - In an embodiment, an apparatus includes a processor including a first core. The first core includes multi-biometric logic to output first biometric data w | 04-02-2015 |
20150127951 | MULTI-FUNCTION IDENTIFICATION SYSTEM AND OPERATION METHOD THEREOF - A multi-function identification system is described in the present invention. The system includes an appliance and a number of keys. Under a registration process, the system allows multiple appliances to be controlled by a single key or an appliance can be controlled by different keys. The system can also allow users to set specified actions to be conducted after identification processes are completed. That satisfies requirements of a multi-function identification. Meanwhile, the key is a plug-and play and on-the-go product. It is desired that the key is a host used for other purpose. | 05-07-2015 |
20150295924 | SYSTEMS AND METHODS FOR SECURE AND EFFICIENT ENROLLMENT INTO A FEDERATION WHICH UTILIZES A BIOMETRIC REPOSITORY - A method includes receiving data related to an individual, the data comprising a plurality of elements of personally-identifying information (PII). The method further includes building, via the plurality of elements of the PII, a compositional key for the individual. In addition, the method includes storing the compositional key and a biometric print for the individual as a biometric record in a biometric repository. The method also includes, via the compositional key, providing a plurality of federated entity (FE) computer systems with access to the biometric repository. | 10-15-2015 |
20150295925 | SECURE METHOD OF PROCESSING DATA - The invention relates to a secure method of processing data in which method is implemented the evaluation of a function that may be written as a linear combination of sub-functions with two binary inputs, in which a client and a server each possess a binary code, comprising n indexed bits, the method comprising the evaluation of the function with the binary codes of the client and of the server as inputs, without one of the client or the server obtaining information about the code of the other, the method being characterized in that it comprises the following steps: —the server randomly generates n indexed values and calculates the linear combination of these values with the same linear combination as that applied to the sub-functions to obtain the function, —the client implements, for each bit of his binary code, a technique of unconscious transfer to obtain from the server an intermediate data item comprising the randomly generated value of same index as the bit of the code of the client, increased by the value of the corresponding sub-function evaluated at the bit of same index of the code of the server and at said bit of his binary code, and —the client performs a linear combination of the intermediate data for all the bits of his binary code, with the same linear combination as that applied to the sub-functions to obtain the function, in such a way as to obtain a final result comprising the linear combination of the randomly generated values, increased by the evaluation of the function at the two binary codes. | 10-15-2015 |
20150312039 | BEHAVIORAL FINGERPRINT IN A WHITE-BOX IMPLEMENTATION - A method of determining a fingerprint identification of a cryptographic implementation in a cryptographic system, including: receiving, by the cryptographic system, an input message that is a fingerprint identification message; performing, by the cryptographic system, a keyed cryptographic operation mapping the fingerprint identification message into an output message that includes a fingerprint identification; and outputting the output message. | 10-29-2015 |
20150319168 | METHODS AND SYSTEMS FOR ESTABLISHING COMMUNICATION WITH USERS BASED ON BIOMETRIC DATA - Methods and systems are disclosed herein for establishing communication with users based on biometric data. For example, in response to determining that a user has a particular biometric state, the media guidance application may present an option to contact another user that is associated with that biometric state. | 11-05-2015 |
20150319170 | COMPUTER IMPLEMENTED FRAMEWORKS AND METHODOLOGIES FOR ENABLING IDENTIFICATION VERIFICATION IN AN ONLINE ENVIRONMENT - Described herein are computer implemented frameworks and methodologies for enabling identification verification in an online environment. Embodiments of the invention have been particularly developed to enable Internet users to have their identities verified by a central authority, and use that verification in the context of later online interactions. | 11-05-2015 |
20150333910 | SYSTEMS, METHODS, AND APPARATUSES FOR SECURELY ACCESSING USER ACCOUNTS - The systems, methods, and apparatuses of the present disclosure quickly and securely populate account information fields of an account using biometric information, such as fingerprint information. A portable electronic apparatus of the present disclosure includes memory that stores first fingerprint information in association with account information of an account that can be presented by another electronic device through a website or an application running on the other electronic device. The portable electronic apparatus also includes a fingerprint scanner that scans a fingerprint to obtain second fingerprint information, an interface that interfaces with data input interface, such as a keyboard interface, of the other electronic device, and a processor that compares the first fingerprint information with the second fingerprint information, and, if the fingerprint information matches, populates the account information field of the account with the account information via the data input interface of the other electronic device. | 11-19-2015 |
20150349959 | User Authentication Retry with a Biometric Sensing Device - An electronic device includes, or is connected to, a biometric sensing device. A non-textual graphical element may be displayed when a biometric image received from the biometric sensing device does not match a reference biometric image. The non-textual graphical element indicates a number of authentication retries remaining for the user. The non-textual graphical element is modified when another biometric image received from the biometric sensing device does not match the reference biometric image. The non-textual graphical element is modified to indicate that a fewer number of authentication retries remain for the user. | 12-03-2015 |
20150358317 | Behavioral Authentication System using a biometric fingerprint sensor and User Behavior for Authentication - A method and a corresponding device for authenticating a user for access to protected information, including at a registration stage, generating a biometric user profile and a behavioral user profile associated with a user to be authenticated, and an authenticating stage, obtaining from the user a biometric user sample and a behavioral user sample, comparing the biometric user sample and the behavioral user sample to the biometric user profile and to the biometric behavioral profile associated with the user, and if the biometric user sample and the behavioral user sample match the biometric user profile and the biometric behavioral profile, respectively, enabling the user to access the protected information. | 12-10-2015 |
20150365406 | GENERATION AND AUTHENTICATION OF BIOMETRIC INFORMATION USING WATERMARK - An apparatus for generating biometric information, the apparatus includes a biometric scanning module configured to scan a body of a user to generate biometric image information; a seed supplying module configured to supply a secure seed having a security that is effective for a preset time period; a security pattern generating module configured to generate a secure watermark pattern based on the secure seed; and a biometric information generating module configured to generate biometric information to be used for authentication by the use of the biometric image information and the secure watermark pattern. | 12-17-2015 |
20150381616 | SECRET DATA MATCHING DEVICE, COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM FOR UPDATING SECRET DATA, AND SECRET DATA UPDATING METHOD - A secret data matching device includes a memory unit for storing a first secret vector obtained by concealing a first data set and a key data using a determination matrix; an obtaining unit for obtaining a second secret vector by concealing a second data set using the determination matrix; a calculating unit for calculating a residue vector which is a residue when the determination matrix is a modulus, from a difference between the first and second secret vectors; a determination unit for determining whether the first and second data sets are approximate based on the residue vector; an extracting unit for extracting the key data from the residue vector when the first data set and the second data set are approximate; a creating unit for generating a third secret vector by combining the key data and the second secret vector; and a storing unit for storing the third secret vector. | 12-31-2015 |
20160028545 | SYSTEMS AND METHODS FOR IDENTIFYING AN INDIVIDUAL - The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an individual. These systems and methods are useful for, amongst many applications, more secure identification of high-risk individuals attempting to gain access to an entity, transport, information, location, security organization, law enforcement organization, transaction, services, authorized status, and/or funds. | 01-28-2016 |
20160034708 | DEVICE AND METHOD OF SETTING OR REMOVING SECURITY ON CONTENT - A device for removing security on content using biometric information includes a memory configured to store content on which security has been set based on first biometric information of a user; and a controller configured to obtain second biometric information of the user, which is of a different type than the first biometric information, and remove the security on the content based on the second biometric information, in response to a user input for executing the content. | 02-04-2016 |
20160072801 | ENCRYPTING AND DECRYPTING INFORMATION - An example information encryption method that includes acquiring to-be-encrypted information and converting the to-be-encrypted information into a polynomial of a predetermined format; extracting biometric information, and acquiring biometric data; and substituting the biometric data into the polynomial for calculation to acquire a value of the polynomial and using a two-dimensional dataset including the biometric data and the value of the polynomial corresponding to the biometric data as first encrypted information. The techniques of the present disclosure improve the security of information encryption, and reduce the risk of illegal decryption of encrypted information. | 03-10-2016 |
20160087978 | MULTI - LAYERED BIOMETRIC SECURITY - A method including a computer device receiving a first authentication input from at least one user to start a multi-layered security protocol; the computer device receiving secondary authentication inputs from the at least one user to continue the multi-layered security protocol to determine if a security protocol has been met, wherein the secondary authentication inputs include receiving a first feature input from the at least one user and receiving a second feature from the at least one user; and the computer device determining if the first and secondary authentication inputs pass or fail the multi-layered security protocol. | 03-24-2016 |
20160094548 | METHOD FOR SECURE KEY INJECTION WITH BIOMETRIC SENSORS - Systems and methods are disclosed for securely injecting one or more key values into an electronic device by reading with a fingerprint sensor a manufactured key device having a key value. A secure communication channel between a fingerprint sensor and a secure processing system enables the reading, processing, and storing of the fingerprint sensor data from the key device. The key device includes a conductive substantially planar substrate (“substrate”) with raised conductive portions configured to encode a key value. The substrate can be made from a non-conductive material and have conductive material applied to the substrate to encode the key value. The substrate can be covered with an opaque, conductive layer so that the encoding cannot be visually perceived. The encoding scheme can be a QR code, a bar code, an image, an alphanumeric string, or other encoding. One or more electronic device access policies can be associated with a key value to control how an electronic device can be used when the electronic device is accessed with the manufactured key device. | 03-31-2016 |
20160100314 | MOBILE DATA COMMUNICATION USING BIOMETRIC ENCRYPTION - A mobile App using biometric encryption and decryption for privacy and security having both authentication and recognition functions. It utilizes the built-in camera of the mobile device to provide facial images for authentication purposes. It further includes a secured data communication system for conveniently sending and receiving data on the mobile devices. The secured data communication system also utilizes biometric encryption and decryption technology for granting permissions to access the data communication system. The biometric encryption is implemented by using a selective biometric feature and optimized biometric feature detection and tracking methods. Different biometric feature authentication methods are optimized for use on various mobile platforms, such as, Android, iOS, Windows and others. Data encryption and decryption are achieved by using selected biometric feature vectors as cryptographic keys. The biometric data encryption system further includes liveness detection module with anti-spoofing features to ensure the encryption and decryption processes only accept biometric features from a live person conveniently without the user's intervention. Alternative authentication method is provided if the biometric feature authentication module fails to recognize the valid user, or fails in the liveness detection module in order to maintain privacy and security of the data in the mobile device. | 04-07-2016 |
20160103984 | DECRYPTION DEVICE, METHOD FOR DECRYPTING AND METHOD AND SYSTEM FOR SECURE DATA TRANSMISSION - A decryption device for decrypting a document encrypted using biometric information of an intended receiver of the document is provided. The decryption device comprises: an imaging device configured to capture an image of at least a portion of the document; a biometric detection device configured to detect biometric information of a user; a processor configured to decrypt at least the portion of the document using the captured image and the detected biometric information; and a display device configured to display at least the portion of the document decrypted by the processor. | 04-14-2016 |
20160105285 | DERIVING CRYPTOGRAPHIC KEYS FROM BIOMETRIC PARAMETERS - One feature pertains to a biometric cryptographic technique that exploits synthetic fingerprints or other synthetic biometric information. In one aspect, biometric parameters are obtained from a user and compared to a database of biometric templates to identify templates that most closely match the biometric parameters of the user. The database includes several authentic templates for the user and a much larger number of templates derived from synthetic biometric information (e.g. a million or more synthetic templates) not associated with the user. A set of candidate cryptographic keys are obtained based on the templates that most closely match the biometric parameters from the user. The candidate cryptographic keys are applied to access information secured with a valid cryptographic key of the user to identify a key that gains access, thus decrypting data and authenticating the user. In addition to decryption and authentication, digital signatures can be obtained using techniques described herein. | 04-14-2016 |
20160112415 | METHOD OF PROVIDING INFORMATION SECURITY AND ELECTRONIC DEVICE THEREOF - A method of operating an electronic device and an electronic device are provided. The method includes generating biometric information using at least one sensor of the electronic device, and storing the generated biometric information in a memory of the electronic device, generating access right information relating to the biometric information, determining whether an external electronic device is connected to the electronic device, and when the external electronic device is connected to the electronic device, transmitting the generated access right information to the external electronic device. | 04-21-2016 |
20160119143 | USER IDENTITY AUTHENTICATING METHOD, TERMINAL, AND SERVER - A user identity authenticating method, a terminal, and server are provided. The method includes determining according to a preset first-biological-feature processing instruction set, whether a currently-entered first user biological feature matches a second user biological feature, to obtain a first result, where the first-biological-feature processing instruction set is configured by a server, and the second user biological feature is a biological feature that is registered on the server; determining, whether the first result is correct; and if the first result is correct, sending the first result to the server to determine whether the first user biological feature is authenticated. The method not only enhances security when the server performs user identity authenticating, but also prevents the second user biological feature from being leaked to a non-secure area. | 04-28-2016 |
20160142209 | METHOD AND SYSTEM FOR SECURING THE ENTRY OF DATA TO A DEVICE - Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device | 05-19-2016 |
20160149904 | SYSTEMS AND METHODS TO GENERATE AUTHORIZATION DATA BASED ON BIOMETRIC DATA AND NON-BIOMETRIC DATA - A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data. The method also includes obtaining, at the authentication device, first common synthetic data and second biometric data. The method further includes generating, at the authentication device, second common synthetic data based on the first information and the second biometric data. The method also includes selectively authorizing, by the authentication device, access based on a comparison of the first common synthetic data and the second common synthetic data. | 05-26-2016 |
20160164682 | PRIVACY PRESERVING SET-BASED BIOMETRIC AUTHENTICATION - A method includes extracting a set of enrollment feature points from an enrollment biometric measurement. The method also includes randomly selecting one or more enrollment code words from an error correction code. The method also includes determining obfuscated enrollment feature point data describing an obfuscated version of the set of feature points that is obfuscated using the one or more enrollment code words. The method also includes determining obfuscated enrollment code word data describing an obfuscated version of the one or more enrollment code words that is obfuscated using a random enrollment polynomial. The method also includes determining an enrollment biometric template including the obfuscated enrollment feature point data and the obfuscated enrollment code word data. The method also includes determining enrollment data including the enrollment biometric template. The enrollment data may be configured to keep the one or more enrollment code words and the random enrollment polynomial secret. | 06-09-2016 |
20160164867 | NFC PACKAGE FOR STORING BIOMETRIC INFORMATION AND ELECTRONIC DEVICE - An electronic device includes a biometric sensor configured to generate biometric data by sensing a biometric characteristic and to encrypt the biometric a near field communication (NFC) controller configured to perform a near field communication, and a secure storage device coupled to the NFC controller, and configured to receive the encrypted biometric data from the biometric sensor through an internal communications channel, which may include an application processor and the NFC controller, and to store the biometric data by decrypting the encrypted biometric data. | 06-09-2016 |
20160171199 | Method & system for Providing Password-Free, Hardware-rooted, ASIC-Based, Authentication of Human to a Stand-Alone Computing Device Using Biometrics with a Protected Local Template to Release Trusted Credentials to Relying Parties | 06-16-2016 |
20160171200 | Biometric Personal Data Key (PDK) Authentication | 06-16-2016 |
20160182501 | MOBILE USER INTERFACE SYSTEM AND METHODS THEREFOR | 06-23-2016 |
20160197919 | REAL IDENTITY AUTHENTICATION | 07-07-2016 |
20190147155 | METHOD OF REMOTELY IDENTIFYING A PHYSICAL PERSON IN ASYNCHRONOUS MODE, AIMED AT THE RELEASE OF AN ADVANCED ELECTRONIC SIGNATURE, QUALIFIED ELECTRONIC SIGNATURE OR DIGITAL IDENTITY | 05-16-2019 |
20190147156 | SECURE AUTOMATED TELLER MACHINE (ATM) AND METHOD THEREOF | 05-16-2019 |
20190149541 | SYSTEMS AND METHODS FOR PERFORMING BIOMETRIC REGISTRATION AND AUTHENTICATION OF A USER TO PROVIDE ACCESS TO A SECURE NETWORK | 05-16-2019 |
20220138294 | SYSTEMS AND METHODS FOR A CONFIGURABLE DEVICE ENVIRONMENT - A system for a configurable device environment, the system comprising a computing device configured to receive remote data corresponding to a subject and a plurality of signals from at least a sensor proximate to the subject, retrieve a biometric profile of the subject, identify a pattern of accessory device states for a plurality of accessory devices, wherein identifying includes determining a coordinated state change for a group of accessory devices of the plurality of accessory devices as a function of the remote data and the biometric profile and identifying the pattern of accessory device states as a function of the coordinated state change, determine an automation rule for the group of accessory devices as a function of the pattern of accessory device states, and transmit, to the group of accessory devices, the automation rule. | 05-05-2022 |