Methods for secure restoration of personal identity credentials into electronic devices
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/32
G06F-021/32
출원번호
US-0932642
(2013-07-01)
등록번호
US-9160537
(2015-10-13)
발명자
/ 주소
Abdallah, David S.
Johnson, Barry W.
출원인 / 주소
Apple Inc.
대리인 / 주소
Blakely, Sokoloff, Taylor & Zafman LLP
인용정보
피인용 횟수 :
1인용 특허 :
130
초록▼
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier f
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.
대표청구항▼
1. A method, comprising: receiving, by a personal identification device, an encrypted first section and a decrypted second section of a biometric encryption key, wherein the second section includes a digital signature, the second section having been decrypted by a server using a private key associat
1. A method, comprising: receiving, by a personal identification device, an encrypted first section and a decrypted second section of a biometric encryption key, wherein the second section includes a digital signature, the second section having been decrypted by a server using a private key associated with the server and the digital signature having been decrypted by the server using a public key associated with a second personal identification device;verifying, by the personal identification device, a validity of the digital signature using the public key associated with the second personal identification device;decrypting, by the personal identification device, the encrypted first section of the biometric encryption key; andcombining, by the personal identification device, the first section of the biometric encryption key and the second section of the biometric encryption key to restore the biometric encryption key when the validity of the signature is verified. 2. The method of claim 1, further comprising: before the receiving, sending the digital signature in encrypted form to the server. 3. The method of claim 1, wherein the biometric encryption key is a symmetric key. 4. The method of claim 1, wherein: the private key associated with the server is the private key of a first asymmetric key pair, the first asymmetric key pair being associated with the server; andthe public key associated with the personal identification device is the public key of a second asymmetric key pair, the second asymmetric key pair being associated with the personal identification device. 5. The method of claim 1 wherein a server comprises one of: a manufacturer server, an enrollment authority server, a system controller, certificate authority, or other trusted authority. 6. A method, comprising: decrypting, by a server, a section of a symmetric key containing a digital signature in encrypted form, using a private key associated with the server, the section of the symmetric key being less than an entirety of the symmetric key;decrypting, by the server, the digital signature of the decrypted section of the symmetric key using a public key of a personal identification device to produce the decrypted section of the symmetric key including the decrypted digital signature; andsending, by the server, the decrypted section of the symmetric key, including the decrypted digital signature, to a second personal identification device. 7. The method of claim 6, further comprising: before the decrypting the digital signature in encrypted form, receiving the digital signature in encrypted form from the personal identification device. 8. The method of claim 6, further comprising: before the decrypting the section of the symmetric key in encrypted form, receiving the section of the symmetric key in encrypted form from the personal identification device. 9. The method of claim 6, wherein the symmetric key is configured to decrypt biometric data in encrypted form. 10. The method of claim 6, wherein the sending the digital signature is performed such that the second personal identification device verifies a validity of the server when the digital signature in decrypted form is received by the second personal identification device. 11. The method of claim 6, wherein the symmetric key is a biometric encryption and decryption key, the section of the biometric encryption and decryption key is a first section of the biometric encryption and decryption key, the biometric encryption and decryption key having been split into the first section and a second section after encryption of a biometric at the personal identification device. 12. A method, comprising: decrypting, by a server, a section of a first symmetric key in encrypted form containing a digital signature, the decrypting based on a private key of the server, to produce the section of the first symmetric key in decrypted form, the section of the first symmetric key in decrypted form being less than an entirety of the first symmetric key, the private key being associated with a server;after the decrypting the section of the first symmetric key in encrypted form, sending the section of the first symmetric key in decrypted form, and sending the remainder of the entirety of the first symmetric key in encrypted form, to a personal identification device, the first symmetric key associated with biometric data for the personal identification device;decrypting, by a server, a section of a second symmetric key in encrypted form containing a digital signature, the decrypting based on the private key of the server, to produce the section of the second symmetric key in decrypted form, the section of the second symmetric key in decrypted form being less than an entirety of the second symmetric key; andafter the decrypting the section of the second symmetric key in encrypted form, sending the section of the second symmetric key in decrypted form, and the remainder of the entirety of the second symmetric key in encrypted form, to the personal identification device. 13. The method of claim 12, further comprising: before the decrypting the section of the first symmetric key in encrypted form, receiving the section of the first symmetric key in encrypted form from the personal identification device. 14. The method of claim 12, further comprising: before the decrypting the section of the second symmetric key in encrypted form, receiving the section of the second symmetric key in encrypted form from the personal identification device. 15. The method of claim 12, further comprising: decrypting a digital signature in encrypted form associated with the section of the first symmetric key based on the private key of the server to produce the digital signature in decrypted form associated with the section of the first symmetric key, the sending the section of the first symmetric key in decrypted form to the personal identification device including sending the digital signature in decrypted form to the second personal identification device such that the second personal identification device verifies a validity of the server when the digital signature is received by the personal identification device. 16. The method of claim 12, wherein the first symmetric key is configured to decrypt the biometric data in encrypted form. 17. The method of claim 12, wherein the second symmetric key is configured to decrypt personal identity credential in encrypted form for the personal identification device. 18. The method of claim 12, wherein the personal identification device is a first personal identification device, the biometric data previously being stored on a second personal identification device. 19. The method of claim 12, wherein the decrypting the section of the first symmetric key in encrypted form is performed before the decrypting the section of the second symmetric key in encrypted form. 20. The method of claim 12, wherein the section of the second symmetric key is a first section of the second symmetric key, the sending the first section of the second symmetric key is performed such that the personal identification device combines the first section of the second symmetric key with a second section of the second symmetric key to restore the second symmetric key associated with the personal identity credential for the personal identification device. 21. A non-transitory computer readable medium programmed with executable instructions that, when executed by a processing system, perform a method, comprising: receiving, by a personal identification device, an encrypted first section and a decrypted second section of a biometric encryption key, wherein the second section includes a digital signature, the second section having been decrypted by a server using a private key associated with the server and the digital signature having been decrypted by the server using a public key associated with a second personal identification device;verifying, by the personal identification device, a validity of the digital signature using the public key associated with the second personal identification device;decrypting, by the personal identification device, the encrypted first section of the biometric encryption key; andcombining, by the personal identification device, the first section of the biometric encryption key and the second section of the biometric encryption key to restore the biometric encryption key when the validity of the signature is verified. 22. A non-transitory computer readable medium programmed with executable instructions that, when executed by a processing system, perform a method, comprising: decrypting, by a server, a section of a symmetric key containing a digital signature in encrypted form, using a private key associated with the server, the section of the symmetric key being less than an entirety of the symmetric key;decrypting, by the server, the digital signature of the decrypted section of the symmetric key using a public key of a personal identification device to produce the decrypted section of the symmetric key including the decrypted digital signature; andsending, by the server, the decrypted section of the symmetric key, including the decrypted digital signature, to a second personal identification device. 23. A non-transitory computer readable medium programmed with executable instructions that, when executed by a processing system, perform a method, comprising: decrypting, by a server, a section of a first symmetric key in encrypted form containing a digital signature, the decrypting based on a private key of the server, to produce the section of the first symmetric key in decrypted form, the section of the first symmetric key in decrypted form being less than an entirety of the first symmetric key, the private key being associated with a server;after the decrypting the section of the first symmetric key in encrypted form, sending the section of the first symmetric key in decrypted form, and sending the remainder of the entirety of the first symmetric key in encrypted form, to a personal identification device, the first symmetric key associated with biometric data for the personal identification device;decrypting, by a server, a section of a second symmetric key in encrypted form containing a digital signature, the decrypting based on the private key of the server, to produce the section of the second symmetric key in decrypted form, the section of the second symmetric key in decrypted form being less than an entirety of the second symmetric key; andafter the decrypting the section of the second symmetric key in encrypted form, sending the section of the second symmetric key in decrypted form, and the remainder of the entirety of the second symmetric key in encrypted form, to the personal identification device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (130)
Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
Richards, Bruce G.; Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Automated banking machine and system.
Green, Patrick C.; Smith, Mark; Ramachandran, Natarajan; Delaney, Daniel J.; Barker, David A.; Theriault, Franklin M.; Herrera, Elizabeth; Hill, Jeffrey A.; Douglas, Mark, Automated transaction system and method.
Bernstein Robert J. (First Options ; One Financial Plz. 440 S. LaSalle St. Chicago IL 60605), Automatic portable account controller for remotely arranging for payment of debt to a vendor.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Booth, Kevin E.; Popolow, Harry N.; Ford, Richard R.; Johnson, Edward E.; Loftin, Jon S.; Osborne, Lance C.; Johnson, David W., Electronically-controlled locker system.
Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
Chainer, Timothy Joseph; Kitchens, Bruce P.; Maes, Stephane Herman; Martens, Marco; Rutledge, Joseph Dela; Tresser, Charles Philippe, Method and apparatus for secure authorization and identification using biometrics without privacy invasion.
Campbell, Bruce S.; Strauss, III, Burton M.; Dolecki, Myron C., Method and system for partitioned service-enablement gateway with utility and consumer services.
Boate,Alan; Reed,Brian, Method and system for securing a computer network and personal identification device used therein for controlling access to network components.
Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
Stephen J. Borza CA, Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter.
Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Method of using an automated banking machine.
Gopalakrishnan, Ponani S.; Kanevsky, Dimitri; Maes, Stephane Herman, Methods and apparatus for restricting access of a user using random partial biometrics.
Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
Johnson, Richard C., Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts.
Futamura,Ichiro; Ishibashi,Yoshihito; Matsuyama,Shinako; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
McClurg, George William; Brunell, David; Scott, Walter Guy, Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface.
Morgan, Stephen P.; Russell, Lance W.; Reed, Benjamin Clay, Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same.
Stephen F. Bisbee ; Jack J. Moskowitz ; Michael W. White, System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee ; Philip Dean Lapsley, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.