Methods for secure restoration of personal identity credentials into electronic devices
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/32
H04L-029/06
H04L-009/30
G06F-021/32
H04L-009/08
G06K-009/00
G06Q-020/40
출원번호
US-0849473
(2015-09-09)
등록번호
US-9979709
(2018-05-22)
발명자
/ 주소
Abdallah, David S.
Johnson, Barry W.
출원인 / 주소
Apple Inc.
대리인 / 주소
Morrison & Foerster LLP
인용정보
피인용 횟수 :
0인용 특허 :
155
초록▼
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier f
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the manufacturer of the device and an enrollment authority. The manufacturer is responsible for recording serial numbers or another unique identifier for each device that it produces, along with a self-generated public key for each device. The enrollment authority is recognized by the manufacturer or another suitable institution as capable of validating an individual before enrolling him into the device. The enrollment authority maintains and operates the appropriate equipment for enrollment, and provides its approval of the enrollment. The methods described herein discuss post-manufacturing, enrollment, backup, and recovery processes for the device.
대표청구항▼
1. A computer-implemented method, comprising: receiving, by a personal identification device, a signature associated with a biometric encryption key from a party, the signature having been decrypted by the party based on a private key associated with the party, wherein the biometric encryption key w
1. A computer-implemented method, comprising: receiving, by a personal identification device, a signature associated with a biometric encryption key from a party, the signature having been decrypted by the party based on a private key associated with the party, wherein the biometric encryption key was previously split into a first section and a second section, the first section and second sections each encrypted using a different key;verifying, by the personal identification device, a validity of the signature based on a public key associated with a first personal identification device;decrypting, by the personal identification device, the encrypted first and second sections of the biometric encryption key; andcombining, by the personal identification device, the decrypted first section of the biometric encryption key and the decrypted second section of the biometric encryption key to restore the biometric encryption key when the validity of the signature is verified. 2. The computer-implemented method of claim 1, wherein the second section of the biometric encryption key was decrypted by the party using the private key associated with the party. 3. The computer-implemented method of claim 1, wherein the first section of the biometric encryption key was decrypted using a passcode entered by a user. 4. The computer-implemented method of claim 3, wherein the passcode was entered by the user on a second personal identification device. 5. The computer-implemented method of claim 1, further comprising: decrypting, by a second personal identification device, biometric data associated with the first personal identification device. 6. The computer-implemented method of claim 5, further comprising: receiving the biometric data associated with the first personal identification device from one of: the party, an electronic storage repository, or a persistent storage medium. 7. The computer-implemented method of claim 5, further comprising: storing the biometric data associated with the first personal identification device in the second personal identification device. 8. The method of claim 1, wherein the personal identification is one of the first personal identification device, or a second personal identification device. 9. A non-transitory computer-readable medium programmed with executable instructions that, when executed by a processing system comprising at least one hardware processor, perform operations comprising: receiving, by a personal identification device, a signature associated with a biometric encryption key from a party, the signature having been decrypted by the party based on a private key associated with the party, wherein the biometric encryption key was previously split into a first section and a second section, the first section and second sections each encrypted using a different key;verifying, by the personal identification device, a validity of the signature based on a public key associated with a first personal identification device;decrypting, by the personal identification device, the encrypted first and second sections of the biometric encryption key; andcombining, by the personal identification device, the decrypted first section of the biometric encryption key and the decrypted second section of the biometric encryption key to restore the biometric encryption key when the validity of the signature is verified. 10. The non-transitory computer-readable medium of claim 9, wherein the second section of the biometric encryption key was decrypted by the party using the private key associated with the party. 11. The non-transitory computer-readable medium of claim 9, wherein the first section of the biometric encryption key was decrypted using a passcode entered by a user. 12. The non-transitory computer-readable medium of claim 11, wherein the passcode was entered by the user on a second personal identification device. 13. The non-transitory computer-readable medium of claim 9, the operations further comprising: decrypting, by a second personal identification device, biometric data associated with the first personal identification device. 14. The non-transitory computer-readable medium of claim 13, the operations further comprising: receiving the biometric data associated with the first personal identification device from one of: the party, an electronic storage repository, or a persistent storage medium. 15. The non-transitory computer-readable medium of claim 13, the operations further comprising: storing the biometric data associated with the first personal identification device in the second personal identification device. 16. A system comprising a personal identification device having a memory coupled to at least one hardware processor, the memory comprising processor-executable instructions that, when executed by the at least one hardware processor, perform operations comprising: receiving, by the personal identification device, a signature associated with a biometric encryption key from a party, the signature having been decrypted by the party based on a private key associated with the party, wherein the biometric encryption key was previously split into a first section and a second section, the first section and second sections each encrypted using a different key;verifying, by the personal identification device, a validity of the signature based on a public key associated with a first personal identification device;decrypting, by the personal identification device, the encrypted first and second sections of the biometric encryption key; andcombining, by the personal identification device, the decrypted first section of the biometric encryption key and the decrypted second section of the biometric encryption key to restore the biometric encryption key when the validity of the signature is verified. 17. The system of claim 16, wherein the second section of the biometric encryption key was decrypted by the party using the private key associated with the party. 18. The system of claim 16, wherein the first section of the biometric encryption key was decrypted using a passcode entered by a user. 19. The system of claim 18, wherein the passcode was entered by the user on a second personal identification device. 20. The system of claim 16, the operations further comprising: decrypting, by a second personal identification device, biometric data associated with the first personal identification device. 21. The system of claim 20, the operations further comprising: receiving the biometric data associated with the first personal identification device from one of: the party, an electronic storage repository, or a persistent storage medium. 22. The system of claim 20, the operations further comprising: storing the biometric data associated with the first personal identification device in the second personal identification device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (155)
Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
Villa, Emilio; Zidaritz, Adrian; Varga, Michael David; Eschelbeck, Gerhard; Jones, Michael Kevin; McArdle, Mark James, Active firewall system and methodology.
Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
Richards, Bruce G.; Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Automated banking machine and system.
Green, Patrick C.; Smith, Mark; Ramachandran, Natarajan; Delaney, Daniel J.; Barker, David A.; Theriault, Franklin M.; Herrera, Elizabeth; Hill, Jeffrey A.; Douglas, Mark, Automated transaction system and method.
Bernstein Robert J. (First Options ; One Financial Plz. 440 S. LaSalle St. Chicago IL 60605), Automatic portable account controller for remotely arranging for payment of debt to a vendor.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Booth, Kevin E.; Popolow, Harry N.; Ford, Richard R.; Johnson, Edward E.; Loftin, Jon S.; Osborne, Lance C.; Johnson, David W., Electronically-controlled locker system.
Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
Chainer, Timothy Joseph; Kitchens, Bruce P.; Maes, Stephane Herman; Martens, Marco; Rutledge, Joseph Dela; Tresser, Charles Philippe, Method and apparatus for secure authorization and identification using biometrics without privacy invasion.
Campbell, Bruce S.; Strauss, III, Burton M.; Dolecki, Myron C., Method and system for partitioned service-enablement gateway with utility and consumer services.
Boate,Alan; Reed,Brian, Method and system for securing a computer network and personal identification device used therein for controlling access to network components.
Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
Stephen J. Borza CA, Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter.
Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Method of using an automated banking machine.
Gopalakrishnan, Ponani S.; Kanevsky, Dimitri; Maes, Stephane Herman, Methods and apparatus for restricting access of a user using random partial biometrics.
Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
Johnson, Richard C., Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts.
Futamura,Ichiro; Ishibashi,Yoshihito; Matsuyama,Shinako; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
McMinn Edward W. (Rte. 1 ; Box 406 Paragould AR 72450) Lloyd Thomas L. (2010 Rosemond Jonesboro AR 72401) Middleton Jack (726 W. Washington Jonesboro AR 72401), Phone activated emergency signaling system.
Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
Kennedy Paul Roy ; Hall Timothy Gerard ; Yip William Chunhung, Radio telecommunication device and method of authenticating a user with a voice authentication token.
McClurg, George William; Brunell, David; Scott, Walter Guy, Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface.
Morgan, Stephen P.; Russell, Lance W.; Reed, Benjamin Clay, Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same.
Stephen F. Bisbee ; Jack J. Moskowitz ; Michael W. White, System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
Ned Hoffman ; David Ferrin Pare, Jr. ; Jonathan Alexander Lee ; Philip Dean Lapsley, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
Seely Joel ; Malak Robert Leonard ; Allen Timothy Peter ; Schediwy Richard Robert ; Cesarotti William Andrew, Two-layer capacitive touchpad and method of making same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.