$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0819158 (1997-03-17)
발명자 / 주소
  • Strait Robert S.
  • Pearson Peter K.
  • Sengupta Sailes K.
출원인 / 주소
  • The Regents of the University of California
대리인 / 주소
    Sartorio
인용정보 피인용 횟수 : 146  인용 특허 : 1

초록

A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individ

대표청구항

[ The invention claimed is:] [18.] A computer-usable medium embodying computer program code for causing a computer to effect biometric password enrollment by performing the steps of:producing a secret codeword "C";combining a biometric measurement "E", having an inherent natural variability from a u

이 특허에 인용된 특허 (1)

  1. Villa Pierre (Fresnes FRX), Process of identifying and authenticating data characterizing an individual.

이 특허를 인용한 특허 (146)

  1. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  2. Kestenbaum, Gerald Isaac, Apparatus and method for providing building management information.
  3. Busch, Christoph; Hartung, Daniel, Authenticated transmission of data.
  4. Thomas,Edward V.; Draelos,Timothy J., Authenticating concealed private data while maintaining concealment.
  5. Shinzaki,Takashi; Fujii,Yusaku, Authentication apparatus and computer-readable storage medium.
  6. Devadas, Srinivas; Gassend, Blaise, Authentication of integrated circuits.
  7. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Base charging station for monitoring device.
  8. Aoki, Takahiro, Biometric authentication device and computer readable, non-transitory medium.
  9. Duffy, Dominic Gavan; Jones, Aled Wynne, Biometric authentication system.
  10. Gennaro Rosario ; Halevi Shai ; Maes Stephane ; Rabin Tal ; Sorensen Jeffrey, Biometric authentication system with encrypted models.
  11. Ortiz, Luis M.; Lopez, Kermit D., Biometric authentication utilizing unique biometric signatures and portable electronic devices.
  12. Vetro, Anthony; Yedidia, Jonathan S.; Martinian, Emin; Yekhanin, Sergey M., Biometric based user authentication and data encryption.
  13. Isshiki, Toshiyuki; Araki, Toshinori; Mori, Kengo, Bit string collation system, bit string collation method, and program.
  14. Tadokoro, Asami, Communication system and authentication card.
  15. Duffy, Dominic Gavan, Data processing apparatus and method.
  16. Duffy, Dominic Gavan; Jones, Aled Wynne, Data processing apparatus and method.
  17. Nasserbakht, Gitty N.; Nasserbakht, Mitra, Data system with temporal user interface.
  18. Chitkara, Rajnish K.; Banks, Barbara J.; Patel, Anita R., Database system providing SQL extensions for automated encryption and decryption of column data.
  19. Banks, Barbara J.; Chitkara, Rajnish Kumar; Chen, Shiping, Database system providing encrypted column support for applications.
  20. Hebert, Cedric, Deception-based network security using false positive responses to unauthorized access requests.
  21. Harvey, John M.; Atella, Michael David; Doyle, Thomas Francis; Sims, III, Loyie H.; Ram, Satish N., Digital over-the-air keying system.
  22. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  23. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  24. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  25. Jobmann, Brian C., Identity authentication and secured access systems, components, and methods.
  26. Jobmann, Brian C., Identity authentication and secured access systems, components, and methods.
  27. Nanavati, Samir H.; Nanavati, Rajkumar H., Identity verification method using a central biometric authority.
  28. Nanavati,Samir H.; Nanavati,Rajkumar, Identity verification method using a central biometric authority.
  29. Felsher, David Paul, Information record infrastructure, system and method.
  30. Nasserbakht, Gitty N.; Nasserbakht, Mitra, Information security and privacy system and method.
  31. Kermani, Bahram Gaffarzadeh, Method and apparatus for achieving secure password access.
  32. von Wendorff, Wilhard, Method and apparatus for embedded memory security.
  33. Chmora, Andrey L.; Ourivski, Alexei V., Method and apparatus for generating cryptographic key using biometric data.
  34. Chainer, Timothy Joseph; Kitchens, Bruce P.; Maes, Stephane Herman; Martens, Marco; Rutledge, Joseph Dela; Tresser, Charles Philippe, Method and apparatus for secure authorization and identification using biometrics without privacy invasion.
  35. Tsuria, Yossi; Wald, Stephanie; Kipnis, Aviad, Method and apparatus for user authentication based on a user eye characteristic.
  36. Wang, Yige; Rane, Shantanu D.; Vetro, Anthony, Method and system for authenticating reliable biometric data.
  37. Schultz, Paul T.; Sartini, Robert A., Method and system for multi-factor biometric authentication.
  38. Proud, James, Method using wearable device with unique user ID and telemetry system in communication with one or more social networks.
  39. Royer, Coby, Methods and apparatus for credential validation.
  40. Royer, Coby, Methods and apparatus for credential validation.
  41. Carter, Samuel J.; Ream, Christopher L.; Makthal, Sarvesh; Gerber, Stephen Charles, Methods and systems for managing network activity using biometrics.
  42. Carter, Samuel J.; Ream, Christopher L.; Makthal, Sarvesh; Gerber, Stephen Charles, Methods and systems for managing network activity using biometrics.
  43. Ortiz, Luis M.; Lopez, Kermit D., Methods and systems for providing enhanced security over, while also facilitating access through, secured points of entry.
  44. Proud, James, Methods from monitoring health, wellness and fitness with feedback.
  45. Proud, James, Methods using a monitoring device to monitor individual activities, behaviors or habit information and communicate with a database with corresponding individual base information for comparison.
  46. Proud, James, Methods using activity manager for monitoring user activity.
  47. Proud, James, Methods using patient monitoring devices with unique patient IDs and a telemetry system.
  48. Proud, James, Mobile device that monitors an individuals activities, behaviors, habits or health parameters.
  49. Johnson, Chris; Asgarian, Hamid; Morshige, Kevin; Joseph, Benjamin; Proud, James, Monitoring device using radar and measuring motion with a non-contact device.
  50. Proud, James, Monitoring device with selectable wireless communication.
  51. Proud, James, Monitoring device with selectable wireless communication.
  52. Proud, James, Monitoring device with voice interaction.
  53. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Monitoring system and device with sensors and user profiles based on biometric user information.
  54. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Monitoring system and device with sensors that are responsive to skin pigmentation.
  55. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Monitoring system and device with sensors that are responsive to skin pigmentation.
  56. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Monitoring system and device with sensors that is remotely powered.
  57. Carlisle Adams CA; Michael J. Wiener CA, Multi-factor biometric authenticating device and method.
  58. Nasserbakht, Gitty N; Nasserbakht, Mitra, Multi-platform storage and user interface environment.
  59. Hoffberg, Steven M., Multifactorial optimization system and method.
  60. Devadas, Srinivas, Non-networked RFID-PUF authentication.
  61. Hebert, Cedric, Password protection techniques using false passwords.
  62. Proud, James, Patient monitoring systems and messages that send alerts to patients.
  63. Proud, James, Patient monitoring systems and messages that send alerts to patients.
  64. Proud, James, Patient monitoring systems and messages that send alerts to patients only when the patient is awake.
  65. Proud, James, Patient monitoring systems and messages that send alerts to patients only when the patient is awake.
  66. Kittler, Josef; Windeatt, Terry, Personal identity verification process and system.
  67. Yedidia, Jonathan S.; Draper, Stark C.; Sutcu, Yagiz; Vetro, Anthony, Pre-processing biometric parameters before encoding and decoding.
  68. Hagan, Thomas; Levy, David; Kamerman, Matthew, Privacy and security method and system for a world-wide-web site.
  69. Hagan, Thomas; Levy, David; Kamerman, Matthew, Privacy and security method and system for a world-wide-web site.
  70. Chabanne, Hervé; Bringer, Julien, Processing of biometric data by transformation.
  71. Keiser, Luke; Cooper, Bruce; Viola, John J.; Hoffman, Randy, Processor-based self-service terminals used with respect to controlled environment facilities.
  72. Banks, Barbara Jane; Chitkara, Rajnish Kumar; Chen, Shiping, Protection of encryption keys in a database.
  73. Ortiz, Luis Melisendro, Random biometric authentication apparatus.
  74. Proud, James, Remote communication systems and methods for communicating with a building gateway control to control building systems and elements.
  75. Akkermans, Antonius Hermanus Maria; Conrado, Claudine Viegas; Denteneer, Theodorus Jacobus Johannes, Renewable and private biometrics.
  76. Proud, James, Room monitoring device.
  77. Proud, James, Room monitoring device and sleep analysis methods.
  78. Sandeep, Banisetti; Kaladgi, Mohammed Mujeeb; Sawant, Yashwant Ramkishan; Kaladgi, Ruqiya Nikhat, Secure biometric authentication with client-side feature extraction.
  79. Tuyls, Pim Theo; Akkermans, Antonius Hermanus Maria; Goseling, Jasper, Secure protection of biometric templates.
  80. Devadas, Srinivas; Ziola, Thomas J., Securely field configurable device.
  81. Nasserbakht, Gitty N; Nasserbakht, Mitra, Security for mobile system.
  82. Califano, Andrea; Kaufman, Stephen Carl; Martens, Marco; Pulleyblank, William Robert; Stolovitzky, Gustavo Alejandro; Tresser, Charles Philippe; Wu, Chai Wah, Semiotic system and method with privacy protection.
  83. Califano, Andrea; Kaufman, Stephen Carl; Martens, Marco; Pulleyblank, William Robert; Stolovitzky, Gustavo Alejandro; Tresser, Charles Philippe; Wu, Chai Wah, Semiotic system and method with privacy protection.
  84. Suh, Gookwon Edward; Devadas, Srinivas, Signal generator based device security.
  85. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  86. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  87. Davida, George I.; Frankel, Yair, System and method for authenticated and privacy preserving biometric identification systems.
  88. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  89. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  90. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  91. Rae, Robert L.; Viola, John J.; Falcone, Richard, System and method for call treatment using a third party database.
  92. Cheng, Jung-Fu; Wang, Yi-Pin Eric; Grant, Stephen, System and method for coding WCDMA MIMO CQI reports.
  93. Cheng, Jung-Fu; Wang, Yi-Pin Eric; Grant, Stephen, System and method for coding WCDMA MIMO CQI reports.
  94. Hoffberg, Steven M., System and method for determining contingent relevance.
  95. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  96. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  97. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  98. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  99. Martinez, Veronica; Hite, Marc; Keiser, Luke, System and method for proactively establishing a third-party payment account for services rendered to a resident of a controlled-environment facility.
  100. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  101. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  102. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  103. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  104. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  105. Proud, James, System for monitoring health, wellness and fitness with feedback.
  106. Proud, James, System for monitoring individuals with a monitoring device, telemetry system, activity manager and a feedback system.
  107. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, System or device with wearable devices having one or more sensors with assignment of a wearable device user identifier to a wearable device user.
  108. Proud, James, System using wearable device with unique user ID and telemetry system.
  109. Proud, James, System with a monitoring device that monitors individual activities, behaviors or habit information and communicates with a database with corresponding individual base information for comparison.
  110. Sidler, James S.; Viola, John J.; Polozola, Michelle L., Systems and methods for acquiring, accessing, and analyzing investigative information.
  111. Sidler, James S.; Viola, John J.; Polozola, Michelle L., Systems and methods for acquiring, accessing, and analyzing investigative information.
  112. Rae, Robert L.; Viola, John J.; Falcone, Richard, Systems and methods for call treatment using a third party database.
  113. Proud, James, Systems using lifestyle database analysis to provide feedback.
  114. Proud, James, Systems using lifestyle database analysis to provide feedback.
  115. Tsitkova, Zhanna A.; Carter, Stephen R.; Green, Tammy Anita; Burch, Lloyd Leon, Techniques for non-unique identity establishment.
  116. Proud, James, Telemetry system with remote firmware updates.
  117. Proud, James, Telemetry system with remote firmware updates or repair for remote monitoring devices when the monitoring device is not in use by the user.
  118. Proud, James, Telemetry system with tracking receiver devices.
  119. Proud, James, Telemetry system with wireless power receiver and monitoring devices.
  120. Proud, James, Telemetry system with wireless power receiver and monitoring devices.
  121. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  122. Ha,Tai Dong; Jun,Jae Hyun; Chang,Woo Seok; Kang,Young Mi; Lee,Dong Won, User authenticating system and method using one-time fingerprint template.
  123. Proud, James, User monitoring device configured to be in communication with an emergency response system or team.
  124. Proud, James, User monitoring system.
  125. Proud, James, User or patient monitoring methods using one or more analysis tools.
  126. Proud, James, User or patient monitoring systems with one or more analysis tools.
  127. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device coupled by magnets positioned in a frame in an interior of the wearable device with at least one electronic circuit.
  128. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device made with silicone rubber and electronic components.
  129. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device made with silicone rubber and electronic components.
  130. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with adjacent magnets magnetized in different directions.
  131. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with adjacent magnets magnetized in different directions.
  132. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with interior frame.
  133. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with magnets distanced from exterior surfaces of the wearable device.
  134. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with magnets having first and second polarities.
  135. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with magnets having first and second polarities.
  136. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with magnets magnetized through their widths or thickness.
  137. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with magnets positioned at opposing ends and overlapped from one side to another.
  138. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with magnets sealed in a wearable device structure.
  139. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with magnets with a defined distance between adjacent magnets.
  140. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with overlapping ends coupled by magnets.
  141. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with overlapping ends coupled by magnets of a selected width, length and depth.
  142. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with overlapping ends coupled by magnets operating in a temperature range of 200° F. to 400° F..
  143. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with overlapping ends coupled by magnets operating with a selectable strength.
  144. Proud, James; Fan, Bryan; Shook, Robert; Fernandez, Joaquin, Wearable device with overlapping ends coupled by magnets positioned in the wearable device by an undercut.
  145. Proud, James, Wireless monitoring of patient exercise and lifestyle.
  146. Proud, James, Wireless monitoring system with activity manager for monitoring user activity.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트