Biometric based user authentication and data encryption

Electrical computers and digital processing systems: support – System access control based on user identification by... – Using record or token

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C382S115000

Reexamination Certificate

active

07620818

ABSTRACT:
First biometric parameters are acquired from a user. Input data are encrypted according to the biometric parameters to produce ciphertext. The biometric parameters are encoded using a syndrome encoder to produce a syndrome code. The ciphertext and the syndrome code are associated with each other and stored in a computer readable media so that only the same user can subsequently decrypt the cipher text.

REFERENCES:
patent: 6038315 (2000-03-01), Strait et al.
patent: 7391890 (2008-06-01), Kaleedhass
patent: 2003/0097559 (2003-05-01), Shimizu et al.
patent: 2004/0049685 (2004-03-01), Jaloveczki
patent: 2004/0158815 (2004-08-01), Potgieter
patent: 2005/0058324 (2005-03-01), Karthik
patent: 2006/0075233 (2006-04-01), Turner et al.
patent: 2006/0082439 (2006-04-01), Bazakos et al.
patent: 2006/0095963 (2006-05-01), Crosby et al.
patent: 2390705 (2004-01-01), None
Slepian and Wolf in “Noiseless coding of correlated information sources,” IEEE Transactions on Information Theory, vol. 19, pp. 471-480, Jul. 1973.
Pradhan and Ramchandran described a practical implementation of such codes in “Distributed Source Coding Using Syndromes (DISCUS): Design and Construction,” IEEE Transactions on Information Theory, vol. 49, pp. 626-643, Mar. 2003.
“On some new approaches to practical Slepian-Wolf compression inspired by channel coding” by Coleman et al., in Proceedings of the Data Compression Conference, Mar. 2004, pp. 282-291.
“On enabling secure applications through off-line biometric identification,” by Davida, G.I., Frankel, Y., Matt, B.J. in Proceedings of the IEEE Symposium on Security and Privacy, May 1998.
“A Fuzzy Vault Scheme,” by Juels, A., Sudan, M., in Proceedings of the 2002 IEEE International Symposium on Information Theory, Jun. 2002.
Ron Rivest in “The MD5 Message Digest Algorithm,” RFC 1321, Apr. 1992.
J. Li, K.R. Narayanan, and C.N. Georghiades, “Product Accumulate Codes: A Class of Codes With Near-Capacity Performance and Low Decoding Complexity,” IEEE Transactions on Information Theory, vol. 50, pp. 31-46, Jan. 2004.
D. Divsalar and S. Dolinar, “Concatenation of Hamming Codes and Accumulator Codes with High Order Modulation for High Speed Decoding,” IPN Progress Report 42-156, Jet Propulsion Laboratory, Feb. 15, 2004.
“Design of capacity-approaching irregular low-density parity-check codes” by T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke in theIEEE Transactions on Information Theory, vol. 47, Issue 2, Feb. 2001 pp. 619-637.
“Factor graphs and the sum-product algorithm,” by F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, inIEEETransactions on Information Theory, vol. 47, Issue 2, Feb. 2001, pp. 498-519.
“How iris recognition works,” by J. Daugman in IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, Issue 1, Jan. 2004 pp. 21-30.
V. K. Goyal, “Multiple description coding: compression meets the network,” IEEE Signal Processing Magazine, vol. 18, pp. 74-93, Sep. 2001.
Effros “Distortion-rate bounds for fixed- and variable-rate multiresolution source codes,” IEEE Transactions on Information Theory, vol. 45, pp. 1887-1910, Sep. 1999.
Steinberg and Merhav, “On successive refinement for the Wyner-Ziv problem,” IEEE Transactions on Information Theory, vol. 50, pp. 1636-1654, Aug. 2004.
Doodis et al.: “Fuzzy extractors : how to generate strong keys from biomentric and other noisy data,” 2004.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Biometric based user authentication and data encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Biometric based user authentication and data encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Biometric based user authentication and data encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4135253

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.