$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Methods for secure enrollment of personal identity credentials into electronic devices

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
  • G06K-009/00
  • G05B-023/00
출원번호 US-0190058 (2008-08-12)
등록번호 US-8127143 (2012-02-28)
발명자 / 주소
  • Abdallah, David S.
  • Johnson, Barry W.
출원인 / 주소
  • Privaris, Inc.
인용정보 피인용 횟수 : 13  인용 특허 : 118

초록

A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier f

대표청구항

1. A method, comprising: verifying, at a personal identification device, a validity of an enrollment authority based on an encrypted verification string associated with the enrollment authority, the verifying including comparing a decrypted verification string and an unencrypted verification string

이 특허에 인용된 특허 (118)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Arnold Todd W. (Charlotte NC), Access control apparatus and method.
  3. Seroussi, Gadiel; Paterson, Kenneth Graham; Mao, Wenbo; Smith, Mark T., Access control through secure channel using personal identification system.
  4. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  5. Gray Robert J., Apparatus and method for providing an authentication system based on biometrics.
  6. Robert J. Gray, Apparatus and method for providing and authentication system.
  7. Davis Derek L., Apparatus and method for securely processing biometric information to control access to a node.
  8. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  9. Uchida, Kaoru, Authentication executing device, portable authentication device, and authentication method using biometrics identification.
  10. Richards, Bruce G.; Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Automated banking machine and system.
  11. Green, Patrick C.; Smith, Mark; Ramachandran, Natarajan; Delaney, Daniel J.; Barker, David A.; Theriault, Franklin M.; Herrera, Elizabeth; Hill, Jeffrey A.; Douglas, Mark, Automated transaction system and method.
  12. Bernstein Robert J. (First Options ; One Financial Plz. 440 S. LaSalle St. Chicago IL 60605), Automatic portable account controller for remotely arranging for payment of debt to a vendor.
  13. Gennaro Rosario ; Halevi Shai ; Maes Stephane ; Rabin Tal ; Sorensen Jeffrey, Biometric authentication system with encrypted models.
  14. Manfred Bromba DE; Bernhard Raaf DE, Biometric authentication technology for wireless transceiver activation.
  15. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  16. Joseph, Joseph, Biometric identification and security system associated with cash register.
  17. Jurij Jakovlevich Kharon RU; Roman Rozenberg, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  18. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  19. Vogt, James R.; Hasbun, Robert N.; Brizek, John P., Biometric-based authentication in a nonvolatile memory device.
  20. Wiebe, Linus, Checking of right to access.
  21. Teng, Harry H.; Jo, Sung-Chan, Compact optical fingerprint capturing and recognition system.
  22. Silverbrook, Kia; Lapstun, Paul, Computer system control via interface surface with coded marks.
  23. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  24. Booth, Kevin E.; Popolow, Harry N.; Ford, Richard R.; Johnson, Edward E.; Loftin, Jon S.; Osborne, Lance C.; Johnson, David W., Electronically-controlled locker system.
  25. Russell David C., Ergonomic customizable user/computer interface device.
  26. Russell David C., Ergonomic customizeable user/computer interface device.
  27. Russell David C. (2967 Aldgate Dr. Bloomfield Hill MI 48013), Ergonomic customizeable user/computer interface devices.
  28. Karamchetty, Somayajulu, Fingerprint and signature identification and authorization card and pen.
  29. Yau, Shing-Tung; Gu, Xianfeng; Zhang, Zhiwu, Fingerprint recognition system.
  30. Salatino Matthew M. ; Setlak Dale R. ; Newton Mike ; Adkins Cal ; Van Vanno Nicolaas W., Fingerprint sensor and token reader and associated methods.
  31. Kinsella, David J., Fingerprint sensor with feature authentication.
  32. Tumey, David M.; Xu, Tianning; Arndt, Craig, Fingerprint verification system utilizing a facial image-based heuristic search method.
  33. McNeil, William Lloyd, Functional clock observation controlled by JTAG extensions.
  34. Hamid, Larry; Bouius, Derek; Hum, Albert, High security personalized wireless portable biometric device.
  35. Pearson Peter Kelley ; Rowley Thomas Edward ; Upton Jimmy Ray, Identification and security using biometric measurements.
  36. Kyle, Wayne, Identity verification system.
  37. Appenzeller, Guido; Pauker, Matthew J.; Kacker, Rishi R., Identity-based encryption system.
  38. Hoffberg, Steven M., Intelligent electronic appliance system and method.
  39. Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
  40. Henderson, Daniel A., Method and apparatus for an improved call interrupt feature in a cordless telephone answering device.
  41. Stoltz, Benjamin H.; Hanko, James G., Method and apparatus for remotely administered authentication and access control.
  42. Chainer, Timothy Joseph; Kitchens, Bruce P.; Maes, Stephane Herman; Martens, Marco; Rutledge, Joseph Dela; Tresser, Charles Philippe, Method and apparatus for secure authorization and identification using biometrics without privacy invasion.
  43. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  44. Romney Gordon ; Zubeldia Pedro (Kepa), Method and apparatus for witnessed authentication of electronic documents.
  45. Chau, Lam Ko, Method and system for fingerprint encoding and authentication.
  46. Russo, Anthony P., Method and system for fingerprint template matching.
  47. Borza Stephen J.,CAX, Method and system for improving security in network applications.
  48. Campbell, Bruce S.; Strauss, III, Burton M.; Dolecki, Myron C., Method and system for partitioned service-enablement gateway with utility and consumer services.
  49. Boate,Alan; Reed,Brian, Method and system for securing a computer network and personal identification device used therein for controlling access to network components.
  50. Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
  51. Flink,Yona; Gerber,Itzhak; Maroely,Yariv, Method for carrying out secure digital signature and a system therefor.
  52. Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
  53. Scott, Walter G., Method for obtaining biometric data for an individual in a secure transaction.
  54. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  55. Stephen J. Borza CA, Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter.
  56. Dunn, Christopher S., Method of detecting authorised biometric information sensor.
  57. Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Method of using an automated banking machine.
  58. Li Yang ; Rao D. Ramesh K. ; Subbiah Subramanian, Method of using fingerprints to authenticate wireless communications.
  59. Ritter, Rudolf, Method, system and devices for authenticating persons.
  60. Gopalakrishnan, Ponani S.; Kanevsky, Dimitri; Maes, Stephane Herman, Methods and apparatus for restricting access of a user using random partial biometrics.
  61. Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
  62. Johnson, Richard C., Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts.
  63. Abdallah, David S.; Johnson, Barry W., Methods for secure backup of personal identity credentials into electronic devices.
  64. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  65. Shinzaki, Takashi, Mobile electronic apparatus having function of verifying a user by biometrics information.
  66. Futamura,Ichiro; Ishibashi,Yoshihito; Matsuyama,Shinako; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  67. Prokoski, Francine J.; Prokoski, Veronica Mikos, Personal biometric key.
  68. Strongin, Geoffrey S.; Gulick, Dale E., Personal computer security mechanism.
  69. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Personal identification fob.
  70. John D. Scott AU; Terence Patrick Curtis AU, Personal identification system.
  71. Senanayake Daya R. (9 Ecrin Place Colombo 8 LKX), Personal identification system.
  72. Cambier, James L.; Siedlarz, John E., Portable authentication device and method using iris patterns.
  73. Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
  74. Dennis Hollingshead CA, Portable device and method for accessing data key actuated devices.
  75. Lowensohn,Brent A.; Bellenger,David A.; Braun,Jimmy E.; Grosser,Richard C.; Thompson,David L.; Woodmancy,William J.; Pomerantz,Steven R., Portable wireless access to computer-based systems.
  76. Glazer, Elliott; Bishop, Fred, Privacy service.
  77. McClurg, George William; Brunell, David; Scott, Walter Guy, Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface.
  78. Witte, Markus Valter, Remote communication system for use with a vehicle.
  79. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Remote identity verification technique using a personal identification device.
  80. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Remote identity verification technique using a personal identification device.
  81. Pentel, Randolph M., Remote ordering device.
  82. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  83. Novoa, Manuel; Crisan, Adrian, Secure and dynamic biometrics-based token generation for access control and authentication.
  84. Hamid, Larry; Bouius, Derek; Hum, Albert, Security access method and apparatus.
  85. Korshun Yvan,UAX, Security device for controlling the access to a personal computer or to a computer terminal.
  86. Jayaratne, Yohan R., Security in mag-stripe card transactions.
  87. Kennedy Paul Roy ; Hall Timothy Gerard ; Hardy Douglas Allen, Security token and method for wireless applications.
  88. Buffam William J., Self-authentication apparatus and method.
  89. Silverbrook, Kia; Lapstun, Paul; Walmsley, Simon Robert; King, Tobin Allen, Sensing device.
  90. Musgrave Clyde ; Dulude Robert S., System and method for authenticating electronic transactions using biometric certificates.
  91. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  92. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  93. Catalano, John F.; Magnant, Paul H., System and method for capturing, enrolling and verifying a fingerprint.
  94. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  95. Ellingson, John F., System and method for verification of identity.
  96. Musgrave, Clyde; Cambier, James L., System and method of fast biometric database searching using digital certificates.
  97. Byford, Derrick John, System, apparatus and method for controlling access.
  98. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  99. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  100. Bunton,William P., Time-division multiplexed link for use in a service area network.
  101. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  102. Pare, Jr., David Ferrin; Hoffman, Ned; Lee, Jonathan Alexander, Tokenless biometric electronic debit and credit transactions.
  103. Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  104. Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee ; Philip Dean Lapsley, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
  105. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric transaction authorization method and system.
  106. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  107. Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee, Tokenless electronic transaction system.
  108. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  109. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  110. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.
  111. Michener,John R.; Ryan,Paul F., Trusted authorization device.
  112. Gilchrist Gary ; Viavant Steven D., Trusted biometric client authentication.
  113. Abbott, Shawn D.; Afghani, Bahram; Anderson, Allan D.; Godding, Patrick N.; Punt, Maarten G.; Sotoodeh, Mehdi, USB-compliant personal key.
  114. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  115. Ha,Tai Dong; Jun,Jae Hyun; Chang,Woo Seok; Kang,Young Mi; Lee,Dong Won, User authenticating system and method using one-time fingerprint template.
  116. Gotfried, Bradley L.; Gotfried, Benjamin, Vehicle identification system.
  117. Xia, Tao; Liu, Bao; Yew Tham, Jo; Shen, Lixin; Lee, Seng Luan, Wavelet-enhanced automated fingerprint identification system.
  118. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based biometric authentication system and method.

이 특허를 인용한 특허 (13)

  1. Morris, Cameron Craig; Erickson, Douglas M., Anonymous authentication using backup biometric information.
  2. Tkachev, Dmitri, Methods and systems for identifying, verifying, and authenticating an identity.
  3. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  4. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  5. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  6. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  7. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  8. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  9. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  10. Lakshminarayanan, Anantharaman; Takru, Kalyan, Portable system and method for remotely accessing data.
  11. Camenisch, Jan; Lehmann, Anja; Neven, Gregory, Reissue of cryptographic credentials.
  12. Camenisch, Jan; Lehmann, Anja; Neven, Gregory, Reissue of cryptographic credentials.
  13. Tan, Teik Guan, Transforming static password systems to become 2-factor authentication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트