Biometric personal data key (PDK) authentication
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/35
G06F-021/32
출원번호
US-0521982
(2014-10-23)
등록번호
US-9298905
(2016-03-29)
발명자
/ 주소
Giobbi, John J.
출원인 / 주소
Proxense, LLC
대리인 / 주소
Patent Law Works LLP
인용정보
피인용 횟수 :
1인용 특허 :
104
초록▼
Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an authentication unit. The integrated device stores biometric data of a user and a plurality of codes and other data values comprising a device ID code
Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an authentication unit. The integrated device stores biometric data of a user and a plurality of codes and other data values comprising a device ID code uniquely identifying the integrated device and a secret decryption value in a tamper proof format, and when scan data is verified by comparing the scan data to the biometric data, wirelessly sends one or more codes and other data values including the device ID code. The authentication unit receives and sends the one or more codes and the other data values to an agent for authentication, and receives an access message from the agent indicating that the agent successfully authenticated the one or more codes and other data values and allows the user to access an application.
대표청구항▼
1. A method comprising: persistently storing biometric data of a legitimate user and an ID code on an integrated device;responsive to receiving a request for a biometric verification of a user, receiving, from a biometric sensor, scan data from a biometric scan performed by the biometric sensor;comp
1. A method comprising: persistently storing biometric data of a legitimate user and an ID code on an integrated device;responsive to receiving a request for a biometric verification of a user, receiving, from a biometric sensor, scan data from a biometric scan performed by the biometric sensor;comparing the scan data to the biometric data to determine whether the scan data matches the biometric data;responsive to a determination that the scan data matches the biometric data, wirelessly sending the ID code for comparison by a third-party trusted authority against one or more previously registered ID codes maintained by the third-party trusted authority; andresponsive to receiving an access message from the third-party trusted authority-indicating that the third-party trusted authority successfully authenticated the ID code, allowing the user to complete a financial transaction. 2. The method of claim 1, further comprising: registering an age verification for the user in association with the ID code. 3. The method of claim 1, wherein an indication that the biometric verification was successful is sent with the ID code. 4. The method of claim 1, wherein the biometric data includes data from one or more of a fingerprint, palm print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a signature recognition and a voice recognition. 5. The method of claim 1, wherein the integrated device comprises one or more of a mobile phone, tablet, laptop, mp3 player, mobile gaming device, watch and a key fob. 6. The method of claim 1, wherein completing the financial transaction includes accessing an application. 7. The method of claim 1, wherein completing the financial transaction includes accessing one or more of a casino machine, a keyless lock, an ATM machine, a web site, a file and a financial account. 8. The method of claim 1, further comprising: responsive to determining the action does not require biometric verification, receiving a request for the ID code without a request for biometric verification; andresponsive to receiving the request for the ID code without a request for biometric verification, sending the ID code for authentication without requesting the scan data. 9. An integrated device comprising: a persistent storage media that persistently stores biometric data of a user and an ID code;a validation module, coupled to communicate with the persistent storage media, that receives scan data from a biometric scan for comparison against the biometric data, and that sends the ID code for comparison by a third-party trusted authority against one or more previously registered ID codes maintained by the third-party trusted authority; anda radio frequency communication module that receives an access message from the third-party trusted authority indicating that the third-party trusted authority successfully authenticated the ID code sent to the third-party trusted authority based on the comparison of the ID code and allowing the user to—complete a financial transaction. 10. The integrated device of claim 7, wherein the ID code is transmitted to the third-party trusted authority over a network. 11. The integrated device of claim 7, wherein an age verification is registered in association with the ID code. 12. The integrated device of claim 7, wherein the integrated device comprises one or more of a mobile phone, tablet, laptop, mp3 player, mobile gaming device, watch and a key fob. 13. A system, comprising: an integrated hardware device that persistently stores biometric data of a legitimate user and an ID code in the integrated hardware device, and that wirelessly sends the—ID code; an authentication circuit that receives the ED code and sends the ID code to a third-party trusted authority for authentication, and that receives an access message from the third-party trusted authority indicating that the third-party trusted authority successfully authenticated the ID code and allows the user to complete a financial transaction; andthe third-party trusted authority operated by a third party, the third-party trusted authority storing a list of legitimate codes and determining the authentication of the ID code received based on a comparison of the ID code received and the legitimate codes included in the list of the legitimate codes. 14. The system of claim 11 wherein the integrated hardware device receives an authentication request from the authentication circuit, and in response, requests a biometric scan from a user to generate scan data and, when the integrated hardware device cannot verify the scan data as being from the legitimate user, the integrated hardware device does not send the ID code. 15. The system of claim 11, wherein the integrated hardware device comprises one or more of a mobile phone, tablet, laptop, mp3 player, mobile gaming device, watch and a key fob. 16. The system of claim 11, wherein the biometric data includes data based on one or more of a fingerprint, palm print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a signature recognition and a voice recognition. 17. The system of claim 11, wherein completing the financial transaction includes accessing one or more of a casino machine, a keyless lock, an ATM machine, a web site, a file and a financial account. 18. The system of claim 11, wherein completing the financial transaction includes accessing an application.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (104)
Yap, Sue-Ken; Yourlo, Zhenya Alexander, Apparatus and method for distributing audio and video content.
Van Tilburg Johan,NLX ; Hekstra Andries Pieter,NLX, Authentication system wherein definition signals of two devices are altered, communicated between the two devices, and compared.
Matsuyama, Shinako; Ishibashi, Yoshihito; Futamura, Ichiro; Kon, Masashi; Watanabe, Hideaki, Content distribution system, content distribution method, information processing apparatus, and program providing medium.
Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
Steven T. Ansell ; Andrew R. Cherenson ; Mark E. Paley ; Steven B. Katz ; John Michael Kelsey, Jr. ; Bruce Schneier, Copy security for portable music players.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
Johnson, Barry W.; Olvera, Kristen R.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
Rosin Robert ; Hsu P. Robert ; Sonoda Yumie ; Niijima Makoto,JPX ; Nakano Hiroaki, Internet content and television programming selectively displaying system.
Hammersley Scott D. (Rochester MN) Smet Arthur D. (Rochester MN) Wottreng Peter M. (Rochester MN), Method and apparatus for intraprocess locking of a shared resource in a computer system.
Adams, William Mark; Coyne, John Robert; Coyne, Christopher Andrew; Wallace, Raymond Munson, Method and system for creating and operating biometrically enabled multi-purpose credential management devices.
Schena, Robert J.; Anderer, Mike; Ritz, Peter B.; Bernstein, Mike, Method for managing printed medium activated revenue sharing domain name system schemas.
Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
Kato Naotaka,JPX ; Kanada Yoshihisa,JPX, Methods and apparatus for downloading data between an information processing device and an external device via a wireless communications technique.
Naotaka Kato JP; Yoshihisa Kanada JP, Methods and apparatus for downloading data between an information processing device and an external device via a wireless communications technique.
Blair William (1154 W. Lunt ; Apt. 302 Chicago IL 60626) Brooks Stanley J. (P.O. Box 906 Douglas GA 31533), Microprocessor controlled security system for computers.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Campinos Arnaldo,FRX ; Fischer Jean-Bernard,FRX, Process for protecting an information item transmitted from a security element to a decoder and protection system using such a process.
Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
Kamibayashi,Tooru; Yamada,Hisashi; Iwasaki,Hiroshi; Tamura,Masafumi; Ishibashi,Yasuhiro; Kato,Taku; Tatebayashi,Makoto; Harada,Shunji; Katsuta,Noboru, Storage medium and contents protection method using the storage medium.
Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for remote unlocking of local content located on a client device.
Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.