Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1995-12-19
1998-08-04
Gregory, Bernarr E.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 4, 380 9, 380 23, 380 49, 380 50, H04L 900
Patent
active
057906688
ABSTRACT:
A person wanting an entitlement, such as welfare, typically inputs his fingerprint to a database. On a match with a fingerprint already in the database, a profile of the person with the matching fingerprint is retrieved to guard against double dipping. There is a concern for the privacy of the information in the database. To assure privacy, the profile associated with each fingerprint in the database is encrypted so that when a new person attempts to enroll and a matching fingerprint is found in the database, the associated profile returned is encrypted. In order to access this encrypted profile, PINs are required from one or two authorized operators. The PIN of an authorized operator is stored on a card in an encrypted fashion such that it may be recovered by the authorized operator inputting his fingerprint to the system. One or both PINs are needed to decipher the profile.
REFERENCES:
patent: 4876725 (1989-10-01), Tomko
patent: 5050220 (1991-09-01), Marsh et al.
patent: 5095194 (1992-03-01), Barbanell
patent: 5138468 (1992-08-01), Barbanell
patent: 5345508 (1994-09-01), Lynn et al.
patent: 5469506 (1995-11-01), Berson et al.
Proceedings of the 29th. Annual International Carnahan Conference on Security Technology, Sanderstead, GB, Oct. 18-20, 1995, No. Conf. 29, 18-20 Oct., 1995, Sanson L D (ED), pp. 397-401, XP000575565; Anna Stockel: "Securing Data and Financial Transactions".
Computer & Security International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, vol. 11, No. 4, Jul. 1, 1992, pp. 315-325, XP000294687, T.P. de Vries: "The Implemntation of TSS".
SIGSAC Review, vol. 10 No. 2/3, Spring/Summer 1992, NY US, pp. 44-62, S.Albert et al., "Reference Model for Data Management Security and Privacy".
ICL Technical Journal, Nov. 1982, pp. 175-188, R.W. Jones, "Some Techniques for Handling Encipherment Keys".
Computers & Security, vol. 7 No. 6, Dec. 1988, Oxford GB, pp. 575-597, J.Biskup et al., "The Personal Model of Data: Towards a Privacy-Oriented Information System".
IBM Tech. Disclosure Bulletin, vol. 35 No. 1B, Jun. 1992, "Use of biometric data to control use of cryptographic keys".
Gregory Bernarr E.
Mytec Technologies Inc.
LandOfFree
Method and apparatus for securely handling data in a database of does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for securely handling data in a database of, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securely handling data in a database of will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1186929