Method and apparatus for securely handling data in a database of

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 4, 380 9, 380 23, 380 49, 380 50, H04L 900

Patent

active

057906688

ABSTRACT:
A person wanting an entitlement, such as welfare, typically inputs his fingerprint to a database. On a match with a fingerprint already in the database, a profile of the person with the matching fingerprint is retrieved to guard against double dipping. There is a concern for the privacy of the information in the database. To assure privacy, the profile associated with each fingerprint in the database is encrypted so that when a new person attempts to enroll and a matching fingerprint is found in the database, the associated profile returned is encrypted. In order to access this encrypted profile, PINs are required from one or two authorized operators. The PIN of an authorized operator is stored on a card in an encrypted fashion such that it may be recovered by the authorized operator inputting his fingerprint to the system. One or both PINs are needed to decipher the profile.

REFERENCES:
patent: 4876725 (1989-10-01), Tomko
patent: 5050220 (1991-09-01), Marsh et al.
patent: 5095194 (1992-03-01), Barbanell
patent: 5138468 (1992-08-01), Barbanell
patent: 5345508 (1994-09-01), Lynn et al.
patent: 5469506 (1995-11-01), Berson et al.
Proceedings of the 29th. Annual International Carnahan Conference on Security Technology, Sanderstead, GB, Oct. 18-20, 1995, No. Conf. 29, 18-20 Oct., 1995, Sanson L D (ED), pp. 397-401, XP000575565; Anna Stockel: "Securing Data and Financial Transactions".
Computer & Security International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, vol. 11, No. 4, Jul. 1, 1992, pp. 315-325, XP000294687, T.P. de Vries: "The Implemntation of TSS".
SIGSAC Review, vol. 10 No. 2/3, Spring/Summer 1992, NY US, pp. 44-62, S.Albert et al., "Reference Model for Data Management Security and Privacy".
ICL Technical Journal, Nov. 1982, pp. 175-188, R.W. Jones, "Some Techniques for Handling Encipherment Keys".
Computers & Security, vol. 7 No. 6, Dec. 1988, Oxford GB, pp. 575-597, J.Biskup et al., "The Personal Model of Data: Towards a Privacy-Oriented Information System".
IBM Tech. Disclosure Bulletin, vol. 35 No. 1B, Jun. 1992, "Use of biometric data to control use of cryptographic keys".

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for securely handling data in a database of does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for securely handling data in a database of, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securely handling data in a database of will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1186929

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.