$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Biometric controlled key generation 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-009/00
출원번호 US-0512491 (1995-08-08)
발명자 / 주소
  • Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX)
출원인 / 주소
  • Mytec Technologies, Inc. (Don Mills CAX 03)
인용정보 피인용 횟수 : 84  인용 특허 : 22

초록

A key generation system is implemented as follows. In an enrolment apparatus, a unique number for use with PIN operated machines or public key cryptography systems is generated by manipulation of fingerprint information of a subscriber. A filter is then generated which is a function both of the Four

대표청구항

A biometric controlled key generation system, comprising: a body part input for generating an information signal bearing biometric information from a body part; means for reading comparison data from a data carrier, said comparison data comprising private key data encrypted by biometric data; and me

이 특허에 인용된 특허 (22)

  1. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  2. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  3. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  4. Saito Tutomu (Yokohama JPX) Matsui Toshikazu (Kobe JPX), Computer-assisted holographic image formation technique which determines interference pattern data used to form the holo.
  5. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Fingerprint controlled public key cryptographic system.
  6. Barbanell Joseph (1945 Contra Costa Blvd. Pleasant Hill CA 94523), Holographic credit card with automatical authentication and verification.
  7. Owechko Yuri (Newbury Park CA), Hybrid optical and electronic associative memory.
  8. Barbanell Joseph (Concord CA), Keyless holographic lock.
  9. Itoh Masami (Takarazuka JPX) Nishii Kanji (Osaka JPX) Kawamura Hiroyuki (Katano JPX) Fukui Atsushi (Hirakata JPX), Logarithmic polar coordinate transforming method, vision recognizing method, and optical information processing apparatu.
  10. Tomko George J. (Toronto CAX), Method and apparatus for fingerprint verification.
  11. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO) Engel George L. (St. Louis MO) Hege Alan L. (St. Louis MO), Method and apparatus for fingerprinting and authenticating magnetic media.
  12. Lynn Kerry E. (Redwood City CA) Zweig Jonathan M. (Cupertino CA) Mincher Richard W. (San Jose CA), Method and apparatus for variable-overhead cached encryption.
  13. Takesue Toshiharu (Tokyo JPX) Mitsuoka Yasuyuki (Tokyo JPX), Optical correlator.
  14. Simon Darren M. (Denver CO) Serati Steven A. (Golden CO), Optical correlator using ferroelectric liquid crystal spatial light modulators and Fourier transform lenses.
  15. Marsh Ronald A. (Ridgecrest CA) Petty George S. (Jamestown NC), Optical fingerprint correlator.
  16. Itoh Masami (Takarazuka JPX) Nishii Kanji (Osaka JPX) Kawamura Hiroyuki (Kadoma JPX) Fukui Atsushi (Hirakata JPX), Optical information processing apparatus and method using computer generated hologram.
  17. Ruell Hartwig (Fuerstenfeldbruck DEX), Personal authentication system.
  18. Sampsell Jeffrey B. (Plano TX) Bienstock Rachelle J. (Dallas TX), Real time optical correlation system.
  19. Horner Joseph L. (Cambridge MA), Single SLM joint transform correaltors.
  20. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), System for encoding personalized identification for storage on memory storage devices.
  21. Franke Marc A. (Fairfield IA) Hekker Roeland M. T. (Fairfield IA) Livny Izhak M. (Fairfield IA) Mercurio Gregory S. (Fairfield IA) Casasent David P. (Pittsburgh PA), Transform optical processing system.
  22. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.

이 특허를 인용한 특허 (84)

  1. Tumey, David M.; Xu, Tianning; Arndt, Craig M., Animated toy utilizing artificial intelligence and fingerprint verification.
  2. Thomas,Edward V.; Draelos,Timothy J., Authenticating concealed private data while maintaining concealment.
  3. Tsukamura, Yoshihiro; Funahashi, Takeshi, Authentication system, fingerprint identification unit, and authentication method.
  4. Pugliese ; III Anthony V., Baggage check-in and security system and method.
  5. Duffy, Dominic Gavan; Jones, Aled Wynne, Biometric authentication system.
  6. Borza Michael Andrew,CAX, Biometric input with encryption.
  7. Huang, Kung Shiuh; Yao, Shu Chuan, Biometric non-repudiation network security systems and methods.
  8. Lowe, Peter R, Biometrically authenticated portable access device.
  9. Nechytaylo, Maksym; Theimer, Wolfgang Michael; Balon, Thomas, Blacklisting of frequently used gesture passwords.
  10. Theimer, Wolfgang Michael; Balon, Thomas; Wissmann, Pascal, Blacklisting of frequently used gesture passwords.
  11. Teng, Harry H.; Jo, Sung-Chan, Compact optical fingerprint capturing and recognition system.
  12. Bjorn Vance, Cryptographic key generation using biometric data.
  13. Duffy, Dominic Gavan, Data processing apparatus and method.
  14. Duffy, Dominic Gavan; Goodwin, Carl Christopher; Jones, Aled Wynne; Binks, Dominic Frank Julian, Data processing apparatus and method.
  15. Duffy, Dominic Gavan; Jones, Aled Wynne, Data processing apparatus and method.
  16. Rakic, Milan; Varshney, Rimpu, Data protection using distributed security key.
  17. Goheen Joel R., Electronic ticketing and reservation system and method.
  18. Tamori, Teruhiko, Electronic transaction system including a fingerprint identification encoding.
  19. Bjorn, Vance C.; Belongie, Serge J., Fingerprint recognition system.
  20. Harra, David James; Sanner, Rick Eugene; Iverson, Mark Norman, Gas scanning and analysis.
  21. Kawale, Jaikumar N., Generating secure private keys for use in a public key communications environment.
  22. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Generating user-dependent RSA keys.
  23. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Generating user-dependent keys and random numbers.
  24. Bohannon, Philip L.; Jakobsson, Bjorn Markus; Monrose, Fabian; Reiter, Michael Kendrick; Wetzel, Susanne Gudrun, Generation of repeatable cryptographic key based on varying parameters.
  25. Teng, Harry H.; Jo, Sung-Chan, High contrast, low distortion optical acquisition system for image capturing.
  26. Pearson Peter Kelley ; Rowley Thomas Edward ; Upton Jimmy Ray, Identification and security using biometric measurements.
  27. Silverbrook,Kia; Lapstun,Paul, Information management system with authenticity check.
  28. Felsher, David Paul, Information record infrastructure, system and method.
  29. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  30. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  31. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  32. Bhatt, Ashwinkumar; Hills, Michael; McNamara, Jr., James J.; Tiberia, Candido, Item identification control method.
  33. Tuyls, Pim Theo; Goseling, Jasper Johannes Adrianus, Key generation using biometric data and secret extraction codes.
  34. Brownlee Kenneth, Method and apparatus for illuminating a fingerprint through side illumination of a platen.
  35. Wu, Jiankang; Sun, Qibin; Deng, Huijie Robert, Method and apparatus for protecting the legitimacy of an article.
  36. Brownlee Kenneth, Method and apparatus for scanning a fingerprint using a linear sensor.
  37. Brownlee Kenneth, Method and apparatus for scanning a fingerprint using a linear sensor within a cursor control device.
  38. Fujii, Yusaku; Shinzaki, Takashi, Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information.
  39. Fujii,Yusaku; Shinzaki,Takashi, Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information.
  40. Waugh, Donald Craig; Roberts, Michael Albert; Alibhai, Rahim, Method and system for restricting access to the private key of a user in a public key infrastructure.
  41. Flink,Yona; Gerber,Itzhak; Maroely,Yariv, Method for carrying out secure digital signature and a system therefor.
  42. Spalka, Adrian; Lehnhardt, Jan; Schmid, Michael, Method for providing cryptographic key pairs.
  43. Soutar Colin,CAX ; Roberge Danny B.,CAX ; Stoianov Alexei,CAX ; Gilroy Rene M.,CAX ; Bhagavatula Vijayakumar, Method for secure key management using a biometric.
  44. Grajewski,Joseph; Jaeger,Douglas, Method of authenticating proper access to secured site and device for implementation thereof.
  45. Li Yang ; Rao D. Ramesh K. ; Subbiah Subramanian, Method of using fingerprints to authenticate wireless communications.
  46. Takahashi, Kenta; Hirata, Shinji; Hino, Hideitsu; Mimura, Masahiro, Method, system and program for authenticating a user by biometric information.
  47. Hsieh, Jiang; Dong, Fang Frank; Myers, Thomas John; Seidenschnur, George; Conry, Anne Marie; Sopcak, Zachary William; Grekowicz, Brian, Methods and apparatus for image reconstruction.
  48. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Methods, systems and computer program products for generating user-dependent RSA values without storing seeds.
  49. Carlisle Adams CA; Michael J. Wiener CA, Multi-factor biometric authenticating device and method.
  50. Hoffberg, Steven M., Multifactorial optimization system and method.
  51. Harra, David James; Xu, Aiguo, Non-invasive determination of characteristics of a sample.
  52. Harra, David James; Mastin, Peter F.; Iverson, Mark Norman; Sanner, Rick Eugene; Hutchinson, Martin Albert, Non-invasive scanning apparatuses.
  53. Harra, David James; Fuzell, Jacquelyn; Casey, Timothy Daniel, Non-invasive weight and performance management.
  54. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  55. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  56. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  57. Lee, Jong Ik; Shin, Sung Hyu; Lee, Dong Won, Optical fingerprint acquisition apparatus.
  58. Ozolins, Helmars E., Portable access device.
  59. Ozolins, Helmars E., Portable access device.
  60. Dennis Hollingshead CA, Portable device and method for accessing data key actuated devices.
  61. Hollingshead,Dennis W., Portable device and method for accessing data key actuated devices.
  62. Silverbrook, Kia; Lapstun, Paul, Product having encoded authentication writing areas.
  63. Abe, Hiroshi, Pseudorandom number generation apparatus, pseudorandom number generation method and program.
  64. Pinchen, Stephen Paul; Rasmussen, Jens Jacob Juul, Secure barcode.
  65. Tulyakov, Sergey; Farooq, Faisal; Chikkerur, Sharat; Govindaraju, Venu, Secure fingerprint matching by hashing localized information.
  66. Chen, Liqun; Harrison, Keith Alexander, Security method and apparatus using biometric data.
  67. Silverbrook,Kia; Lapstun,Paul, Signature capture via interface surface.
  68. Silverbrook,Kia; Lapstun,Paul, Signature capture via interface surface and sensor with identifier.
  69. Silverbrook,Kia; Lapstun,Paul, Signature capture via interface surface with coded marks.
  70. Preta, Joseph Frank; Simmons, William Monty; Preta, Dominic Joseph; Simmons, Isaiah Monty, Smart apparatus for making secure transactions.
  71. Hewton, Alfred, Smart card with random temporary account number generation.
  72. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  73. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  74. Davida, George I.; Frankel, Yair, System and method for authenticated and privacy preserving biometric identification systems.
  75. Hoffberg, Steven M., System and method for determining contingent relevance.
  76. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  77. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  78. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  79. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  80. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  81. Silverbrook,Kia; Lapstun,Paul, System for registering a user with a sensing device using a form.
  82. Ivanov, Viatcheslav; Lai, Qinshen; Mansell, Michael Graves; Roberts, Michael Albert; Sorbara, Joseph Dominic Michael, System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient.
  83. Campisi, Steven E., Transaction authentication card.
  84. Harris, Scott C., Using biometrics as an encryption key.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로