$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for secure key management using a biometric 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0947224 (1997-10-08)
우선권정보 CA2203212 (1997-04-21)
발명자 / 주소
  • Soutar Colin,CAX
  • Roberge Danny B.,CAX
  • Stoianov Alexei,CAX
  • Gilroy Rene M.,CAX
  • Bhagavatula Vijayakumar
출원인 / 주소
  • Mytec Technologies, Inc., CAX
대리인 / 주소
    Marshall, O'Toole, Gerstein, Murray & Borun
인용정보 피인용 횟수 : 64  인용 특허 : 30

초록

This invention describes a secure method for consistently reproducing a digital key using a biometric, such as a fingerprint. The digital key is linked to the biometric only through a secure block of data, known as the protected filter. The key cannot be released from the protected filter other than

대표청구항

[ What is claimed is:] [22.]22. A method for secure user verification, comprising:capturing at least one biometric image;obtaining transformed image information comprising transforming said at least one biometric image to a transform domain;obtaining verification magnitude information from said tran

이 특허에 인용된 특허 (30)

  1. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  2. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  3. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Biometric controlled key generation.
  4. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  5. Kallman Robert R. (Denton TX) Goldstein Dennis H. (Niceville FL), Coding intensity images as phase-only images for use in an optical correlator.
  6. Saito Tutomu (Yokohama JPX) Matsui Toshikazu (Kobe JPX), Computer-assisted holographic image formation technique which determines interference pattern data used to form the holo.
  7. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Fingerprint controlled public key cryptographic system.
  8. Barbanell Joseph (1945 Contra Costa Blvd. Pleasant Hill CA 94523), Holographic credit card with automatical authentication and verification.
  9. Tomko George J.,CAX ; Stoianov Alexei,CAX, Holographic method for encrypting and decrypting information using a fingerprint.
  10. Owechko Yuri (Newbury Park CA), Hybrid optical and electronic associative memory.
  11. Stoianov Alexei,CAX ; Soutar Colin,CAX ; Tomko George J.,CAX, Hybrid optical-digital method and apparatus for fingerprint verification.
  12. Barbanell Joseph (Concord CA), Keyless holographic lock.
  13. Itoh Masami (Takarazuka JPX) Nishii Kanji (Osaka JPX) Kawamura Hiroyuki (Katano JPX) Fukui Atsushi (Hirakata JPX), Logarithmic polar coordinate transforming method, vision recognizing method, and optical information processing apparatu.
  14. Tomko George J. (Toronto CAX), Method and apparatus for fingerprint verification.
  15. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO) Engel George L. (St. Louis MO) Hege Alan L. (St. Louis MO), Method and apparatus for fingerprinting and authenticating magnetic media.
  16. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
  17. Lynn Kerry E. (Redwood City CA) Zweig Jonathan M. (Cupertino CA) Mincher Richard W. (San Jose CA), Method and apparatus for variable-overhead cached encryption.
  18. Ibenthal Achim,DEX, Method of fractal image coding and arrangement of performing the method.
  19. Takesue Toshiharu (Tokyo JPX) Mitsuoka Yasuyuki (Tokyo JPX), Optical correlator.
  20. Simon Darren M. (Denver CO) Serati Steven A. (Golden CO), Optical correlator using ferroelectric liquid crystal spatial light modulators and Fourier transform lenses.
  21. Marsh Ronald A. (Ridgecrest CA) Petty George S. (Jamestown NC), Optical fingerprint correlator.
  22. Itoh Masami (Takarazuka JPX) Nishii Kanji (Osaka JPX) Kawamura Hiroyuki (Kadoma JPX) Fukui Atsushi (Hirakata JPX), Optical information processing apparatus and method using computer generated hologram.
  23. Nakajima Hiroshi,JPX ; Kobayashi Koji,JPX ; Kawamata Masayuki,JPX ; Aoki Takafumi,JPX ; Higuchi Tatsuo,JPX, Pattern collation apparatus based on spatial frequency characteristics.
  24. Ruell Hartwig (Fuerstenfeldbruck DEX), Personal authentication system.
  25. Sampsell Jeffrey B. (Plano TX) Bienstock Rachelle J. (Dallas TX), Real time optical correlation system.
  26. Horner Joseph L. (Cambridge MA), Single SLM joint transform correaltors.
  27. Florence James M. (Richardson TX), Spatial light modulator with full complex light modulation capability.
  28. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), System for encoding personalized identification for storage on memory storage devices.
  29. Franke Marc A. (Fairfield IA) Hekker Roeland M. T. (Fairfield IA) Livny Izhak M. (Fairfield IA) Mercurio Gregory S. (Fairfield IA) Casasent David P. (Pittsburgh PA), Transform optical processing system.
  30. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.

이 특허를 인용한 특허 (64)

  1. Chen, Lee; Oshiba, Dennis; Chiong, John, Applying security policy to an application session.
  2. Thomas,Edward V.; Draelos,Timothy J., Authenticating concealed private data while maintaining concealment.
  3. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  4. Fraser, Jay, Authentication method and system.
  5. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  6. Duffy, Dominic Gavan; Jones, Aled Wynne, Biometric authentication system.
  7. Govindaraju, Venu; Chavan, Viraj; Chikkerur, Sharat, Biometric convolution using multiple biometrics.
  8. Chang, Yao-Jen; Chen, Tsu-Han; Zhang, Wen-De, Biometrics-based cryptographic key generation system and method.
  9. Nechytaylo, Maksym; Theimer, Wolfgang Michael; Balon, Thomas, Blacklisting of frequently used gesture passwords.
  10. Theimer, Wolfgang Michael; Balon, Thomas; Wissmann, Pascal, Blacklisting of frequently used gesture passwords.
  11. Duffy, Dominic Gavan, Data processing apparatus and method.
  12. Duffy, Dominic Gavan; Jones, Aled Wynne, Data processing apparatus and method.
  13. Rakic, Milan; Varshney, Rimpu, Data protection using distributed security key.
  14. Cheng, Ericson W.; Pradenas, Ricardo Dario; Russo, Anthony P.; Weigand, David L., Dynamic finger detection mechanism for a fingerprint sensor.
  15. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  16. Pizano, Erix; Sass, Joe, Dynamic seed and key generation from biometric indicia.
  17. Moon, Dae-Sung; Moon, Ki-Young; Yoo, Jang-Hee; Chung, Yun-Su; Choi, Woo-Yong; Park, So-Hee; Kang, Byung-Jun; Lee, Yong-Jin, Fingerprint verification method and apparatus with high security.
  18. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Generating user-dependent RSA keys.
  19. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Generating user-dependent keys and random numbers.
  20. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  21. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  22. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  23. Thompson, Micheal, Location determination for user authentication.
  24. Thompson, Micheal, Location determination for user authentication.
  25. Thompson, Micheal, Location determination for user authentication.
  26. Hamre, John D.; Maase, Daniel F., Low settle time micro-scanning system.
  27. St. Jacques, Brian; Rogers, Michael, Low-profile or ultra-thin navigation pointing or haptic feedback device.
  28. Celik, Mehmet Utku; Skoric, Boris; Tuyls, Pim Theo, Method and apparatus for encrypting/decrypting data.
  29. Javidi, Bahram, Method and apparatus for encryption using partial information.
  30. Javidi,Bahram, Method and apparatus for encryption using partial information.
  31. Chmora, Andrey L.; Ourivski, Alexei V., Method and apparatus for generating cryptographic key using biometric data.
  32. Fujii, Yusaku; Shinzaki, Takashi, Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information.
  33. Fujii,Yusaku; Shinzaki,Takashi, Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information.
  34. White, Conor Robert; Peirce, Michael; Gupta, Gaurav, Method and system for biometric authentication.
  35. White, Conor Robert; Peirce, Michael; Gupta, Gaurav, Method and system for biometric authentication.
  36. Golic, Jovan; Baltatu, Madalina, Method and system for biometric authentication and encryption.
  37. Beatson, Rodney; Kelty, Mark A.; Beatson, Christopher J., Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device.
  38. Beatson, Rodney; Kelty, Mark A.; Beatson, Christopher J., Method and system for providing password-free, hardware-rooted, ASIC-based, authentication of human to a stand-alone computing device using biometrics with a protected local template to release trusted credentials to relying parties.
  39. Beatson, Rodney; Kelty, Mark A.; Beatson, Christopher J., Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates.
  40. Gupta, Gaurav; Peirce, Michael; White, Conor Robert, Method and system of accounting for positional variability of biometric features.
  41. Takahashi, Kenta; Hirata, Shinji; Hino, Hideitsu; Mimura, Masahiro, Method, system and program for authenticating a user by biometric information.
  42. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Methods, systems and computer program products for generating user-dependent RSA values without storing seeds.
  43. Chakraborty, Soumyajit; Beattie, Jr., James Gordon; Jacob, Carl, Methods, systems, and computer program products for media-based authentication.
  44. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  45. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  46. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  47. Javidi, Bahram; Esmail, Ahouzi; Zhang, Guanshen (Eric), Optical security system using fourier plane encoding.
  48. Bringer, Julien; Chabanne, Herve; Cottard, Martin, Processing biometric data in a multidimensional coordinate system.
  49. Tulyakov, Sergey; Farooq, Faisal; Chikkerur, Sharat; Govindaraju, Venu, Secure fingerprint matching by hashing localized information.
  50. El Defrawy, Karim; Minkovich, Kirill; Baron, Joshua W.; Tressler, Eric P., Secure multi-dimensional pattern matching for secure search and recognition.
  51. Yang, Chinping; Du, Robert, System and method for efficiently performing a pattern matching procedure.
  52. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  53. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  54. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  55. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  56. Russo, Anthony P.; Yang, Wayne, System for and method of assigning confidence values to fingerprint minutiae points.
  57. Howell, Mark J.; Russo, Anthony P.; Tsuchiya, Marcia; Chen, Frank H., System for and method of finger initiated actions.
  58. Russo, Anthony P.; Weigand, David L., System for and method of generating rotational inputs.
  59. Zabroda, Oleksiy; Cheng, Ericson W.; Ngo, Hung Xuan, System for and method of protecting an integrated circuit from over currents.
  60. Yang, Wayne; Krishnapura, Rohini, Systems for and methods of providing inertial scrolling and navigation using a fingerprint sensor calculating swiping speed and length.
  61. Chen, Lee; Chiong, John; Yu, Yang, User access authentication based on network access point.
  62. Harris, Scott C., Using biometrics as an encryption key.
  63. Harris, Scott C., Using biometrics as an encryption key.
  64. Harris, Scott C., Using biometrics as an encryption key.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로