Patent application number | Description | Published |
20090033461 | Biometric Access Control Protection - An access control system ( | 02-05-2009 |
20090231096 | Processing Biometric Data in a Multidimensional Coordinate System - The invention concerns a biometric system provided with a set of reference biometric data (B′i) resulting from the application of a disjunction between a first set of biometric data (Bi) and a first encoded key (Ki), and from an information concerning the first key. A second set of biometric data (B | 09-17-2009 |
20090274344 | METHOD OF INDENTIFYING AN INDIVIDUAL - A method of identifying an individual in which captured images are encrypted by a transformation function and superimposed over previously recorded encrypted images. The superimposition image thus formed is used for identity verification. If the verification is negative a looping step repeats the process until positive verification is achieved. | 11-05-2009 |
20100110170 | Method and Equipment for the Identification of an Individual by Optical Capture of a Body Imprint Image - The invention relates to equipment for the identification of an individual by capture of body imprint images and of the underlying venous network, comprising: a prismatic optical element having: a large side for apposition of a body zone; a first inclined lateral side receiving a first radiation having a first wave length emitted by a first lighting means to light the large side with total reflection; a second inclined lateral side facing a first sensor receiving the first reflected radiation carrying an image of the body imprint; and a small side receiving a second radiation having a second wave length emitted by second lighting means, perpendicularly reaching the apposition zone and penetrating the body zone, and which faces a second sensor receiving the second reflected radiation carrying an image of the underlying venous network. | 05-06-2010 |
20100281269 | Identification Based on Encrypted Biometric Data - A database comprising biometric data stored in encrypted form is managed by a management unit. It comprises a set of filters respectively associated with filter identifiers. A biometric data item is received at a management unit; next, said biometric data item is stored in an encrypted form at a given address in the database. Then keywords are obtained on the basis of a first set of hash functions and of the biometric data item. A subset of indexing filters is associated with each keyword by selecting, for each keyword, filters as a function of the respectively associated filter identifiers, of said keywords, and of a second set of hash functions; and the given address is associated with each of the filters of the subset of filters. | 11-04-2010 |
20100284538 | Control of an Entity to be Controlled by a Control Entity - A control entity communicates with an entity to be controlled so as to effect a control, a secret key being associated with the control entity. These entities share public parameters, a second public parameter being a combination of a first public parameter of the said plurality with the secret key. At the level of the entity to be controlled, a random value is generated, a first message is transmitted to the control entity, this first message comprising at least one value obtained by combining the first public parameter with the random value; and a second message is transmitted to the control entity, this second message comprising at least one value obtained by combining the first random value, a secret key of the entity to be controlled and a value received from the control entity. One of the values included in the first or the second message is based on the second public parameter. | 11-11-2010 |
20100310070 | Generation and Use of a Biometric Key - In a control system comprising control device adapted for, on the one hand, receiving signal indicating a first biometric datum (W), and, on the other hand, obtaining a second biometric datum captured (w′), at the level of the control device, the first and second biometric date are compared. Next, it is decided whether the first and second biometric data correspond on the basis of the comparison. Thereafter, at least a secret cryptographic key part (H(w)) is generated by applying cryptographic function to the first biometric datum. | 12-09-2010 |
20110213972 | METHOD OF EXECUTING A CRYPTOGRAPHIC CALCULATION - A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an intrusion into the electronic component. The one-way function is based on a first affine operation corresponding to a first secret key. The one-way function is applied, by obtaining ( | 09-01-2011 |
20110231667 | Method of Identification or Authorization, and Associated System and Secure Module - Method of identification or of authorization using a system comprising at least one sensor for acquiring biometric data and one secure module storing a set of digital data obtained starting from a set of respective biometric data by means of a digitization algorithm. According to this method, a biometric data value is obtained, acquired by the sensor; a digital value is obtained by application of the digitization algorithm to the acquired biometric data value; within the secure module, at least some of the digital data from said set of digital data are ranked according to their proximity to the digital value obtained; and a biometric data value is obtained from said set of biometric data by taking into account a position of the corresponding digital data within the ranking. | 09-22-2011 |
20120131051 | METHOD FOR SEARCHING FOR AN ENTITY USING A VERIFIER DEVICE, AND RELATED DEVICES - In a method for searching for an entity belonging to a set of entities, a verifier device and the entities are arranged so as to exchange information via at least one communication channel. Each entity has a first respective identifier from which a plurality of representatives can be obtained. According to the method, a first identification word (m | 05-24-2012 |
20120134493 | CRYPTOGRAPHY BY PARAMETERIZING ON ELLIPTIC CURVE - A device is controlled by a controller on the basis of a password. A determination is made at the device or at the controller, on the basis of a random value r | 05-31-2012 |
20120239940 | IDENTIFICATION BY MEANS OF CHECKING A USER'S BIOMETRIC DATA - The invention relates to a database ( | 09-20-2012 |
20130230170 | PROTECTION AGAINST PASSIVE SNIFFING - The invention relates in particular to a method for securing the execution of a cryptographic algorithm (ALG) against passive sniffing, the method implementing masking (MSK) of data processed by the cryptographic algorithm. The masking (MSK) of said data includes a linear encoding step such as x′=x.L+c, in which x is the data to be masked, x′ is the corresponding masked data, c is a code word included in a linear code C, and L is a matrix made up of linearly independent vectors not included in the linear code C. The invention also relates to a device (SC) implementing such a method. | 09-05-2013 |
Patent application number | Description | Published |
20130279765 | Method for Enabling Authentication or Identification, and Related Verification System - The invention relates to a method for enabling the authentication or identification of a person ( | 10-24-2013 |
20140095885 | METHODS FOR BIOMETRIC REGISTRATION AND VERIFICATION, AND RELATED SYSTEMS AND DEVICES - The invention relates to a registration method for future biometric verification purposes, including the following steps for one person (I): obtaining first biometric data ( | 04-03-2014 |
20140181932 | METHOD FOR MANAGING AND CHECKING DATA FROM DIFFERENT IDENTITY DOMAINS ORGANIZED INTO A STRUCTURED SET - The invention relates to a method and system for managing and checking different identity data relating to a person. According to the invention, a derived-identity management server generates for the person at least part of the identity data with which said person can be authenticated in relation to a service provider for the derived-identity domain, on the basis of information derived from identity data from parent domains. The identity data generation processing ensures that no link can be established from two authentications in two separate domains in the absence of link information. If necessary, said link information is transmitted by a parent domain to a derived-identity server so that the latter establishes the link between the identity data of the derived-identity domain and the identity data of the parent domain, e.g. for the cascade revocation of a person from various domains. | 06-26-2014 |
20150039899 | METHOD FOR ENCRYPTING A PLURALITY OF DATA IN A SECURE SET - A server-implemented method encrypting at least two pieces of indexed data as lists of elements, each element belonging to a finite set of indexed symbols on an alphabet. The data is encrypted to form a protected set, including: the server randomly generates, for each datum, a corresponding encoding function; if at least one element that constitutes a datum is the symbol of the alphabet, the server determines the image of the symbol of the alphabet via the encoding function corresponding to the datum to obtain a codeword coordinate and adds the codeword coordinate to an indexed set corresponding to the element of the alphabet; then the server completes the indexed set with error-inducing points; the server randomly reindexes the elements of the indexed set corresponding to the symbol of the alphabet; and the server adds the indexed set to the protected set. The method can identify an individual. | 02-05-2015 |