Secure messaging for security token

Electrical computers and digital processing systems: support – System access control based on user identification by... – Using record or token

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S020000

Reexamination Certificate

active

07406601

ABSTRACT:
A method, system and computer program product for ensuring a biometric template is associated with a live entity comprising an intelligent biometric scanner in processing communications with a computer system and a security token. The intelligent biometric scanner applies a data transformation to an inputted entity biometric sample and a biometric challenge supplied by a security token. The transformed biometric sample is processed by a computer system using the transformed biometric challenge resulting in an transformed entity biometric template which will not match an enrollment template stored inside the security token until the transformation is reversed by the intelligent biometric scanner. Embodiment of the invention are also disclosed which does not require the use of a challenge.

REFERENCES:
patent: 5987155 (1999-11-01), Dunn et al.
patent: 6011858 (2000-01-01), Stock et al.
patent: 6092202 (2000-07-01), Veil et al.
patent: 6219439 (2001-04-01), Burger
patent: 6591249 (2003-07-01), Zoka
patent: 6629591 (2003-10-01), Griswold et al.
patent: 6735695 (2004-05-01), Gopalakrishnan et al.
patent: 7114646 (2006-10-01), Hillhouse
patent: 2002/0030581 (2002-03-01), Janiak et al.
patent: 2002/0174346 (2002-11-01), Ting
patent: 2 780 797 (2000-01-01), None
Ratha et al., Secure Data Hiding in Wavelet Compressed Fingerprint Images, 2000, ACM Multimedia Workshop, pp. 127-130.
Satonaka, Biometric Watermark Authentication with Multiple Verification Rule, IEEE, 2002, pp. 597-606.
Mimura et al., “Fingerprint Verification System on a Smart Card”, 2002, IEEE, pp. 182-183.
Seto, “Development of Personal Authentication Systems using Fingerprint with Smart Cards and Digital Signature Technologies”, Dec. 2002, Seventh International Conference on Control, Automation, Robotics and Vision, Dec. 2002, Singapore, pp. 996-1001.
Abadi, M. et al., “On Hiding Information from an Oracle,”Proceedings of the Annual Conferences on Structure in Complexity Theory, Ithaca, Jun. 16-19, 1987,Conf. 2, 1-29.
Ishida, S. et al., “Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,”IEICE Transactions on Information and Systems, Tokyo, Japan, Jul. 2001, 812-818.
Ozaki, S. et al., “Speeding up Fingerprint Verification with Insecure Auxiliary Devices,”International Solvent Extraction Conference, Mar. 16, 1990, 17-24.
Matsumoto, T. et al., “Speeding up Secret Computations with Insecure Auxiliary Devices,”Advances in Cryptology, Santa Barbara, Aug. 21-25, 1988, 497-506.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure messaging for security token does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure messaging for security token, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure messaging for security token will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2805991

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.