US20040111625A1 - Data processing apparatus and method - Google Patents

Data processing apparatus and method Download PDF

Info

Publication number
US20040111625A1
US20040111625A1 US10/467,831 US46783104A US2004111625A1 US 20040111625 A1 US20040111625 A1 US 20040111625A1 US 46783104 A US46783104 A US 46783104A US 2004111625 A1 US2004111625 A1 US 2004111625A1
Authority
US
United States
Prior art keywords
data
key
operable
generate
representative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/467,831
Inventor
Dominic Duffy
Carl Goodwin
Aled Jones
Dominic Binks
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fountain Venture AS
Original Assignee
Scientific Generics Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB0103656A external-priority patent/GB0103656D0/en
Priority claimed from GBGB0113255.4A external-priority patent/GB0113255D0/en
Priority claimed from GB0113254A external-priority patent/GB0113254D0/en
Priority claimed from GB0119464A external-priority patent/GB0119464D0/en
Application filed by Scientific Generics Ltd filed Critical Scientific Generics Ltd
Assigned to SCIENTIFIC GENERICS LIMITED reassignment SCIENTIFIC GENERICS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JONES, ALED WYNNE, GOODWIN, CARL CHRISTOPHER, BINKS, DOMINIC FRANK JULIAN, DUFFY, DOMINIC GAVAN
Publication of US20040111625A1 publication Critical patent/US20040111625A1/en
Assigned to SAGENTIA LIMITED reassignment SAGENTIA LIMITED CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SCIENTIFIC GENERICS LIMITED
Assigned to FOUNTAIN VENTURE AS reassignment FOUNTAIN VENTURE AS ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SAGENTIA LIMITED
Priority to US12/896,101 priority Critical patent/US8607056B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • Encryption/decryption systems generally rely upon one or more cryptographic keys.
  • a symmetric encryption system for example the DES (Data Encryption Standard) system
  • the same cryptographic key is used to encrypt and decrypt data
  • an asymmetric encryption system for example the RSA (Rivest-Shamir-Adelman) system
  • different cryptographic keys are used for encryption and decryption.
  • a pair of cryptographic keys are generated of which one, known as the private key, is kept secret while the other, known as the public key, is publicly available.
  • the ROM 37 stores a number of routines which are used during operation of the cryptography unit 19 , four of which are shown in FIG. 4.
  • An ENROL_USER routine 51 is used to process image data corresponding to the fingerprint of a new user 21 to generate the biometric value K bio , and subsequently to generate a mapping key K map which when combined with the generated biometric value K bio using a mapping function generates the private key K pri for the user 21 .
  • a RECOVER_PRIVATE_KEY routine 53 enables the private key K pri associated with a user to be recovered by applying a mapping function to the biometric value K bio generated from the image data for the fingerprint of the user 21 and the mapping key K map .
  • step S 31 After either the alignment data has been stored as the reference alignment data (step S 31 ) or the alignment data has been found to match the reference alignment data (step S 35 ), the cryptography unit 19 decrements, in step S 39 , the count value by 1 and then checks, in step S 41 , if the count value is equal to 0. If the count value is not equal to 0, then the routine returns to step S 23 where a new image is captured. If the count value is equal to 0, then this indicates that N feature templates have successfully been stored and the analysis of the measurement minutiae 75 commences.
  • the sequence resolution vector is then formed by clusters of index numbers, each cluster identifying the index numbers for a group of minutiae which are to be re-indexed in order of increasing r. For example, if it is found that the values for ⁇ for minutiae with index numbers 6, 7 and 8 are within ⁇ of each other, the sequence resolution vector stores a cluster identifying the index values 6, 7 and 8.
  • the quantisation levels are closer together for a relatively low standard deviation than for a relatively high standard deviation.
  • the same procedure is than performed for the angle ⁇ to determine corresponding quantisation levels, and the resulting quantisation unit sizes for the normalised distance r and the angle ⁇ are stored in the feature vector.
  • the normalised distance r and the angle ⁇ are then divided by the corresponding quantisation unit to generate quantised values of the distance r and the angle ⁇ .
  • the cryptography unit 19 generates, in step S 55 , the biometric value K bio .
  • the category value and the quantised values for the normalised distance r and the angle ⁇ are concatenated to form a feature value, and the feature values for each of the measurement minutiae 75 are then concatenated in order of index number to form the biometric value K bio .
  • the cryptography unit 19 For each of the M feature templates, the cryptography unit 19 then aligns, in step S 65 , the minutiae using the alignment vector of the ambiguity resolution vector.
  • the cryptography unit 19 first identifies the principal minutia and the secondary minutiae, forms a principal axis by extending a straight line from the origin through the principal minutia, and normalises the distances from the origin to the minutiae using the distance between the origin and the principal minutia as a normalisation distance.
  • the authentication and data transfer unit 123 encrypts the secure data vector using the symmetric key received with the signal request and the weak public key K w pub and transmits the encrypted secure data vector to the computer terminal 103 . If, however, the first one-way hash is not identical to the second one-way hash then the authentication and data transfer unit 123 logs an unsuccessful request for the secure data vector associated with the user information. In this embodiment, as an additional security provision, if the authentication and data transfer unit 123 logs three unsuccessful requests for the secure data vector associated with the user information, then access to that secure data vector is blocked to all requests, including authentic requests, for a predetermined period of time. This reduces the chances of an interloper accessing the secure data vector by brute force (i.e. generating multiple signed requests using systematically varied cryptographic keys until the cryptographic key used matches the weak private key K w pri ).

Abstract

There is described an apparatus for generating a cryptographic key using data representative of an analogue source. The apparatus has a number generator which processes the data representative of the analogue source to generate an intermediate key, the intermediate key being a number, and a data store for storing a mapping key, the mapping key being a number predetermined to combine with the intermediate key in accordance with a monotonic mapping function to generate a desired cryptographic key. Preferably, the number generator processes the data representative of an analogue source in accordance with stored process data, determined by a training process, which indicates attributes of the data whose values are to be measured and adjustment data for adjusting the values to improve the repeatability of generation of the intermediate key.

Description

  • This invention relates to the generation of a cryptographic key using data from an analogue source. The invention has particular, but not exclusive, relevance to generating a cryptographic key using biometric data obtained by scanning a fingerprint, an iris, a retina or the like. The invention also provides a method of generating a number representative of data from an analogue source, and an apparatus therefor, which has applications outside of the field of cryptography. [0001]
  • Encryption/decryption systems generally rely upon one or more cryptographic keys. In a symmetric encryption system, for example the DES (Data Encryption Standard) system, the same cryptographic key is used to encrypt and decrypt data, while in an asymmetric encryption system, for example the RSA (Rivest-Shamir-Adelman) system, different cryptographic keys are used for encryption and decryption. In an asymmetric encryption system, typically a pair of cryptographic keys are generated of which one, known as the private key, is kept secret while the other, known as the public key, is publicly available. [0002]
  • It is important that the cryptographic key used in a symmetric encryption system or the private key used in an asymmetric encryption system is known only by authorised personnel or devices. However, the cryptographic keys employed are typically large numbers which are difficult for a person to memorise and therefore a permanent record of the cryptographic key is generally made. This raises the problem of security of the permanent record. [0003]
  • The RSA algorithm generates the public and private key using a random seed number. German patent application DE 4243908A1 describes using a biometric value calculated from a biometric attribute of a person, for example a fingerprint, as the random seed number. In this way, there is no requirement to maintain a permanent record of the private key because it can be generated whenever needed by scanning the fingerprint of the person. DE 4243908A1 does not, however, describe how to generate a repeatable biometric value from an analogue data source such as a fingerprint. [0004]
  • A problem with the encryption system described in DE 4243908A1 is that the biometric value is uniquely associated with a private key and therefore if the private key is discovered, then the security of the encryption system is irrevocably lost. International patent publication WO 98/48538 addresses this problem and describes an encryption system in which biometric data is processed by a filter to generate directly a private key for the RSA algorithm, enabling the generated private key to be changed by using a different filter. In order to be able to generate a repeatable private key from the biometric data, for each bit of the private key the filter compares a number of binary digits, generated from the biometric data, which should be identical, and selects the binary digit which appears most often. [0005]
  • The present inventors have recognised that a problem with the system described in WO 98/48538 is that by constraining the repeatable number generated from the biometric data to be equal to a private key, part of the inherent randomness (sometimes called entropy) of the biometric data is sacrificed. This results in a reduction in the entropy of the generated private key. [0006]
  • Those skilled in the art will appreciate that it is desirable for the private key to have as much entropy as possible because this increases the difficulty of cryptoanalysing an encrypted message by trying all possible private keys. [0007]
  • According to a first aspect of the invention, there is provided an apparatus for generating a predetermined cryptographic key, the apparatus comprising means for processing received data which is representative of an analogue source to generate an intermediate key, and means for combining the intermediate key and a stored mapping key using a monotonic mapping function to form the cryptographic key. In this way, it is not necessary to maintain a permanent record of the cryptographic key. Although the mapping key is stored, by itself the mapping key gives no information about the cryptographic key. Further, it is not necessary to constrain the intermediate key to a particular value and therefore a greater portion of the entropy of the data from the analogue source can be transferred to the cryptographic key. [0008]
  • Preferably, the data from the analogue source is biometric data generated from a characteristic of an individual, for example a fingerprint or an iris, because generally the cryptographic key can then only be generated in the presence of the individual. This is not, however, essential and in the alternative the analogue source could be, for example, a picture or a sound recording. [0009]
  • It is preferable that the level of repeatability of the intermediate key generated from the analogue source is as high as possible, so that the correct cryptographic key is generated as frequently as possible. [0010]
  • According to a second aspect of the invention, there is provided an apparatus for generating a number from data representative of an analogue source, the apparatus comprising means for processing, in accordance with stored processing instructions predetermined by a training process, the data to identify at least one attribute of at least one feature within the data and determine an attribute value for the or each identified attribute, and means for generating the number from the at least one attribute value. The training process enables the processing instructions to be determined in accordance with desired criteria. In an embodiment, the training process determines processing instructions to achieve a desired level of repeatability. [0011]
  • The processing instructions could affect either or both of the way attributes are identified and the way values are assigned to identified attributes.[0012]
  • Various embodiments of the invention will now be described with reference to the accompanying figures, in which: [0013]
  • FIG. 1 shows a computer system including a fingerprint sensor and a cryptography unit; [0014]
  • FIG. 2 is a schematic block diagram showing how data from the fingerprint sensor is processed by the cryptography unit illustrated in FIG. 1 to generate a mapping key or a cryptographic key; [0015]
  • FIG. 3 is a schematic block diagram showing the main components of the cryptography unit illustrated in FIG. 1; [0016]
  • FIG. 4 is a schematic block diagram showing routines stored in a read only memory forming part of the cryptography unit illustrated in FIG. 3; [0017]
  • FIG. 5 is a schematic block diagram showing the contents of a non-volatile random access memory which forms part of the cryptography unit illustrated in FIG. 2; [0018]
  • FIG. 6 is a flowchart showing operations performed by the cryptography unit illustrated in FIG. 3 when enrolling a new user; [0019]
  • FIGS. 7A and 7B form a flowchart which shows in more detail how biometric data from a new user is processed to generate a biometric value and an ambiguity resolution vector during the enrolling routine illustrated in FIG. 6; [0020]
  • FIG. 8 is a schematic diagram illustrating a feature template generated during enrolment of a new user; [0021]
  • FIG. 9 is a flowchart showing the main operations performed by the cryptography unit illustrated in FIG. 3 when recovering a cryptographic key from biometric data associated with an enrolled user; [0022]
  • FIG. 10 is a flowchart showing the main operations performed by the cryptographic unit illustrated in FIG. 3 when verifying the identity of an enrolled user; [0023]
  • FIG. 11 is a flowchart showing the main operations performed by the cryptographic unit illustrated in FIG. 3 when encrypting data using the cryptographic key derived using biometric data from an enrolled user; [0024]
  • FIG. 12 schematically shows a computer network including a computer terminal connected to a fingerprint sensor, a public server and a secure server; [0025]
  • FIG. 13 is a schematic block diagram showing routines stored in a ROM forming part of the computer terminal illustrated in FIG. 12; [0026]
  • FIG. 14 is a flowchart showing the main operations performed by the computer terminal illustrated in FIG. 12 in order to enrol a new user; and [0027]
  • FIG. 15 is a flowchart showing the main operations performed by the computer terminal illustrated in FIG. 12 to recover a cryptographic key from biometric data associated with an enrolled user.[0028]
  • FIG. 1 shows a [0029] computer 1 having a display 3, a keyboard 5 and a computer tower 7 which includes a slot 9 for receiving a floppy disk 11. The computer tower 7 includes a modem (not shown) which is connected, via a cable 13, to a telephone socket 15 to allow access to the Internet. A fingerprint sensor 17, which in this embodiment includes an ATMEL thermal sensing chip, is connected to a cryptographic unit 19 which is in turn connected to the computer tower 7.
  • FIG. 2 schematically shows how the [0030] cryptography unit 19 is configured to generate a biometric value Kbio from the image data representative of the fingerprint of the user 21 and to use the generated biometric value Kbio to generate either a mapping key Kmap or a cryptographic key Kpri. As shown, data from the fingerprint sensor 17 is input to an image processor 1001 which processes the data to form a feature template representative of features within the fingerprint. The feature template is then input to a number generator 1003.
  • When enrolling a new user, the [0031] number generator 1003 processes one or more feature templates representative of the fingerprint of the new user and determines processing instructions and process variables which improve the repeatability of a generated biometric value Kbio. These processing instructions and process variables are stored as an ambiguity resolution vector 1005. A switch 1007 then directs the biometric value Kbio to a mapping key generator 1009, and a cryptographic key generator 1011 generates a private key Kpri and public key Kpub pair, of which the public key Kpub is sent to a certifying authority and the private Kpri is input to the mapping key generator 1009. The biometric value Kbio and the private key Kpri are used by the mapping key generator 1009 to generate a mapping key Kmap, using a monotonic mapping function, and the mapping key Kmap is stored in a mapping key store 1013.
  • After enrolment, when a user wishes to generate the private key K[0032] pri, the fingerprint sensor 17 scans the fingerprint of the user and sends image data to the image processor 1001, which generates one or more feature templates. The number generator 1003 processes the one or more generated feature templates, using the processing instructions stored in the ambiguity resolution vector store 1005, to generate the biometric value Kbio and the switch 1007 directs the biometric value Kbio to a private key generator 1015. The biometric value Kbio and the mapping key Kmap are combined by the private key generator 1015, using the monotonic mapping function, to generate the private key Kpri.
  • The [0033] cryptographic unit 19 is then able, for example, to create a digital signature using the private key Kpri or to decrypt a message received from the computer 1 using private key Kpri.
  • FIG. 3 schematically shows the main components of the [0034] cryptography unit 19. As shown, the cryptography unit 19 has a sensor input/output port 31 for receiving data from and transmitting instructions to the fingerprint sensor 17. The sensor input/output port 31 is connected, via a data bus 33, to a central processing unit (CPU) 35, a read only memory (ROM) 37, a random access memory (RAM) 39, a non-volatile random access memory (NVRAM) 41 and a computer input/output port 47 for receiving data from and transmitting data to the computer 1. The central processing unit 35 coordinates the operation of the cryptography unit 19. The bus 33 is also connected to a number encoder 43, which is configured to generate the biometric value Kbio from received data from the fingerprint sensor 17, and a cryptography processor 45, which is configured to perform any required cryptographic operations.
  • In this embodiment, the [0035] cryptography processor 45 is capable of generating the private key Kpri and the public key Kpub pair using the RSA algorithm.
  • The [0036] ROM 37 stores a number of routines which are used during operation of the cryptography unit 19, four of which are shown in FIG. 4. An ENROL_USER routine 51 is used to process image data corresponding to the fingerprint of a new user 21 to generate the biometric value Kbio, and subsequently to generate a mapping key Kmap which when combined with the generated biometric value Kbio using a mapping function generates the private key Kpri for the user 21. A RECOVER_PRIVATE_KEY routine 53 enables the private key Kpri associated with a user to be recovered by applying a mapping function to the biometric value Kbio generated from the image data for the fingerprint of the user 21 and the mapping key Kmap. A SIGN_MESSAGE routine 55 is used to generate a digital signature, using the private key Kpri generated for a user, in order to authenticate the source and integrity of a message. A DECRYPT_MESSAGE routine 57 is used to decrypt, using the private key Kpri for the user 21, messages encoded with the associated public key Kpub.
  • FIG. 5 shows data stored in the [0037] NVRAM 41 after the ENROL_USER routine 51 has been run. As shown, the NVRAM 41 stores the mapping key 61 generated by the ENROL_USER routine 51, the mapping function 63 and an ambiguity resolution vector (ARV) 65 which, as will be described in detail hereafter, is used when processing the image data to generate a biometric value Kbio in order to improve the repeatability of the generated biometric value Kbio.
  • The four routines illustrated in FIG. 4 will now be described in greater detail. [0038]
  • A flow chart showing an overview of the ENROL_USER routine is shown in FIG. 6. The [0039] cryptography unit 19 receives, in step S1, biometric data from the fingerprint scanner 17 via the sensor I/O port 31 and processes the received biometric data to generate the biometric value Kbio and the ambiguity resolution vector.
  • A fingerprint image consists of a pattern of ridges with the smooth flow of the ridges being interrupted by discontinuities referred to as minutiae. These minutiae have been codified into different types which are generally known as Galton features. The positions of the minutiae in a fingerprint vary little over an individual's life, apart from scarring or the like, and are sufficiently random that they have been used for many years to identify an individual. Table 1 names and gives a brief description of the eight categories used in this embodiment. [0040]
    TABLE 1
    Categories of fingerprint minutiae.
    CATEGORY
    NUMBER NAME BRIEF DESCRIPTION
    1 Ridge Ending The point at which a ridge
    stops
    2 Bifurcation The point at which one ridge
    divides into two
    3 Dot Very small ridge
    4 Island Ridge slightly longer than a
    dot located between two
    temporarily divided ridges
    5 Pond Empty space between two
    temporarily divergent ridges
    6 Spur A notch protruding from a
    ridge
    7 Bridge Small ridge connecting two
    longer adjacent ridges
    8 Crossover Two ridges which cross each
    other
  • The processing performed to generate the biometric value K[0041] bio and the ambiguity resolution vector will be described in more detail hereinafter.
  • The generation of a public key K[0042] pub and a private key Kpri pair using the RSA algorithm is then performed, in step S3, using the cryptography processor 45. The generated public key Kpub is transmitted, in step S5, to the certification authority by transmitting the public key Kpub, via the computer I/O port 47, to the computer 1 which in turn transmits the public key Kpub, via the Internet, to the certification authority. In this way, third parties have access to the public key Kpub.
  • The [0043] CPU 35 then processes, in step S7, the private key Kpri and the biometric value Kbio to generate the mapping key Kmap. In this embodiment, the private key Kpri is a 128 bit binary number and the mapping key Kmap is generated by subtracting the biometric value Kbio from the private key Kpri as shown in equation 1.
  • K map =K pri −K bio   (1)
  • The ambiguity resolution vector and the mapping key K[0044] map are then stored, in step S9, in the NVRAM 41 for subsequent use by the RECOVER_PRIVATE_KEY routine 53. The ENROL_USER routine then concludes by deleting, in step S13, the private key Kpri, the biometric value Kbio and the biometric data. Therefore, after the ENROL_USER routine has been completed, the private key Kpri is not stored anywhere in the cryptography unit 19 and can only be regenerated when new biometric data corresponding to the fingerprint of the user 21 is received and processed to regenerate the biometric value Kbio. The mapping key Kmap, which is stored in the cryptography unit 19, by itself gives no information concerning the private key Kpri.
  • The process by which the biometric value K[0045] bio and the ambiguity resolution vector are generated from the biometric data will now be described. In this embodiment, each minutia has three attributes (i.e. category, normalised distance r and angle θ) for which values are measured and the measured attribute values are concatenated in order to form a single value representative of the minutia, which will hereafter be called the feature value. The biometric value Kbio is then formed by concatenating the feature values for multiple minutiae.
  • To enable repeatable generation of the biometric value K[0046] bio from different images of the fingerprint, the minutiae need to be reliably indexed in the same order so that they are concatenated in the same order. Further, the category and the (r,θ) co-ordinates need to be reliably calculated so that the feature value for a minutia does not vary. The ambiguity resolution vector contains process instructions and variables which are used to improve the repeatability of the biometric value Kbio.
  • In this embodiment, the ambiguity resolution vector consists of: [0047]
  • 1. an alignment vector storing reference alignment data which enables alignment of different images of a fingerprint; [0048]
  • 2. an exclusion vector which indicates minutiae which should be excluded because they cannot be reliably detected; [0049]
  • 3. a sequence resolution vector which reduces the likelihood of the minutia being indexed in the wrong order; [0050]
  • 4. a category resolution vector which reduces the likelihood of a minutia being wrongly categorised; [0051]
  • 5. a unit size vector which indicates for each minutia the spacing between the quantisation levels for the normalised distance r and the angle θ; [0052]
  • 6. an offset vector which stores offset values for adjusting the normalised distance r and angle θ for each minutia to be approximately midway between quantisation levels; and [0053]
  • 7. encoding data which provides more general information about how the feature template should be processed. [0054]
  • The category resolution vector, unit value vector and offset vector each store values associated with individual features. In this embodiment, for each minutia the values of the category resolution vector, unit value vector and offset vector are grouped together to form a feature vector. [0055]
  • The process of generating the biometric value K[0056] bio and the ambiguity reference vector will now be described with reference to FIGS. 7A, 7B and 8.
  • Firstly, a count value is set, in step S[0057] 21, to N where N is the number of images which are to be processed in order to generate the biometric value Kbio and the ambiguity resolution vector. The cryptography unit 19 then initiates, in step S23, capture of an image by the fingerprint sensor 17 and receives the image data for the captured image. In this embodiment, the image data received from the fingerprint sensor 17 is first thinned to provide more distinct ridges. Such a thinning operation is conventional in automatic fingerprint processing systems. The image data is then processed using conventional pattern recognition software to locate minutiae in the eight categories identified in Table 1.
  • The image data is also processed to locate, again using conventional pattern recognition software, the point of maximum ridge curvature which acts as an origin from which the positions of all the other identified minutiae are measured. A feature template is then formed by data representing the origin and the identified minutiae. [0058]
  • The [0059] cryptography unit 19 then checks, in step S27, the count value. If the count value is equal to N, the number encoder 43 identifies, in stop S29, four prominent minutiae, usually ridge endings or bifurcations, to act as alignment minutiae. In particular, a principal minutia 73 a is identified by looking in a predetermined region of the image and three secondary minutiae 73 b, 73 c, 73 d, are identified by looking in different regions of the image spaced away from each other and the principal minutia 73 a.
  • FIG. 8 schematically shows a feature template in which the [0060] origin 71 has been represented by a X, each alignment minutia 73 has been represented by a square enclosing the category number for the minutia, and each of the remaining minutiae, which will be referred to as measurement minutiae 75, have been represented by a circle enclosing the category number for the minutia.
  • A principal axis is then formed by a line connecting the [0061] origin 71 and the principal minutia 73 a. The distance between the origin 71 and the principal minutia 73 a is used as a normalisation distance R, and the positions of the other alignment minutiae 73 and the measurement minutiae 75 are then determined using polar coordinates (r,θ), where for each minutia r is the distance of the minutia from the origin 71 normalised by the normalisation distance R, and θ is the angle between the principal axis and a straight line extending from the origin 71 to the minutia.
  • The [0062] cryptography unit 19 then stores in step S31, the absolute positions and categorisations of the alignment minutiae 73 for use as reference alignment data. The purpose of storing the absolute positions in categorisations of the alignment minutia 73 are to facilitate the identification of the corresponding minutia in subsequent feature templates. If the count value is not equal to N, then this indicates that reference alignment data has already been stored, and alignment data for the new feature template is generated, in step S33, using the reference alignment data. In particular, minutia are identified which are in the vicinity of the absolute positions stored in the reference alignment data and whose category matches the category of the corresponding minutia of the reference alignment data. This relies upon the fact that there is a natural orientation in which a user places a finger on the fingerprint sensor and therefore the positions of the alignment minutiae will not vary to a large extent from one image scan to the next.
  • The [0063] cryptography unit 19 then compares, in step S35, the alignment data generated for the new feature template with the reference alignment data. This comparison involves comparing the (r,θ) co-ordinates of all but one of the secondary minutia for the new alignment data with the corresponding secondary minutia of the reference alignment data to identify image distortion, which may be caused by a change in orientation of the finger between different scans of the fingerprint. A transform function is then determined based on these differences to transform the r and θ values of the new secondary minutiae so that they align with the corresponding secondary minutiae of the reference alignment data. Finally, the determined transform function is applied to the (r,θ) co-ordinates for the last remaining secondary minutia and the transformed co-ordinates are compared with the (r,θ) co-ordinates for the corresponding secondary minutiae of the reference alignment data to check whether they coincide. In particular, if the normalised distance between transformed (r,θ) co-ordinates for the last remaining secondary minutia and the (r,θ) co-ordinates for the corresponding reference secondary minutia exceeds a preset amount, this indicates that at least one of the stored feature templates is unreliable and therefore the routine proceeds to delete, in step S37, all the stored feature templates and returns to step S21 in which the count value is reset to N, otherwise the determined transform is applied to the (r,θ) co-ordinates of the measurement minutiae 75.
  • After either the alignment data has been stored as the reference alignment data (step S[0064] 31) or the alignment data has been found to match the reference alignment data (step S35), the cryptography unit 19 decrements, in step S39, the count value by 1 and then checks, in step S41, if the count value is equal to 0. If the count value is not equal to 0, then the routine returns to step S23 where a new image is captured. If the count value is equal to 0, then this indicates that N feature templates have successfully been stored and the analysis of the measurement minutiae 75 commences.
  • The analysis begins by indexing, in step S[0065] 43, the minutiae in each of the N feature templates. In particular, for each feature template the minutiae are primarily indexed in the order of increasing value of θ. If two or more minutiae have the same value of θ, then these two or more minutiae are indexed in increasing value of r.
  • The minutiae of each of the N feature templates are compared, in step S[0066] 45, and any minutiae with a low repeatability are excluded. In particular, minutiae which do not appear in all of the N feature templates and minutiae which have been classified in more than two categories throughout the set of N feature templates are excluded. The exclusion vector giving details of the excluded minutia is then generated and stored as part of the ambiguity resolution vector. The exclusion vector lists the (r,θ) coordinates for the excluded minutiae so that, when processing subsequent fingerprint scans, minutiae at these co-ordinates are ignored.
  • The minutiae of each feature template are then indexed. A problem which can occur when indexing the minutiae is that if two or more minutiae have very similar values of θ, then the order in which these two or more minutiae are indexed can vary between different feature templates. In order to allow for this, sources of possible sequence ambiguity are identified, in step S[0067] 47, and the sequence resolution vector is generated. In particular, minutiae whose values of θ are within a determined amount Δθ from each other are grouped together and a secondary indexing rule, which is stored in the encoding data of the ambiguity resolution vector, is applied. In this embodiment, the secondary indexing rule is that the minutiae in each group are indexed in the order of increasing r. The sequence resolution vector is then formed by clusters of index numbers, each cluster identifying the index numbers for a group of minutiae which are to be re-indexed in order of increasing r. For example, if it is found that the values for θ for minutiae with index numbers 6, 7 and 8 are within Δθ of each other, the sequence resolution vector stores a cluster identifying the index values 6, 7 and 8.
  • Now that the minutiae have been indexed, each minutia is individually investigated to determine the corresponding feature vector. [0068]
  • Although minutiae which have been classified in more than two categories have already been excluded (step S[0069] 45), minutiae which have been classified in two different categories are still included. This category ambiguity is identified, in step S49, and the category resolution vector is generated. In particular, an order of precedence of the categories is preset, and stored in the encoding data of the ambiguity resolution vector, and for each minutia whose category is ambiguous it is determined whether the category which is higher or lower in the order of precedence is to be used. In this embodiment, this assignment is performed based on which category was assigned to the minutia in the majority of the N feature templates. The category resolution vector for the minutia is then generated by storing in the corresponding feature vector a value indicating whether or not the higher or lower category in the order of precedence is to be used in case of ambiguity.
  • The normalised distance r and the angle θ for each minutia are then processed to generate respective values. In this embodiment, a three-step process is performed for each minutia. [0070]
  • Firstly, the normalised distance r for the minutia is statistically compared over the N feature templates to determine the standard deviation of the measured values. A confidence interval, corresponding to a predetermined confidence level, is then calculated using conventional statistical analysis of the standard deviation. In this embodiment, the confidence interval is the range of normalised distance r within which, based on the determined standard deviation, 99% of measurements would fall. A quantisation unit Q, corresponding to the spacing between neighbouring ones of a series of quantisation levels, is then set equal to this confidence interval. In this way, if the mean value of the normalised distance r is midway between two neighbouring quantisation levels then there is a 99% probability that the value of the normalised distance r for a subsequent fingerprint image will fall within the neighbouring quantisation levels. It will be appreciated that the quantisation levels are closer together for a relatively low standard deviation than for a relatively high standard deviation. The same procedure is than performed for the angle θ to determine corresponding quantisation levels, and the resulting quantisation unit sizes for the normalised distance r and the angle θ are stored in the feature vector. The normalised distance r and the angle θ are then divided by the corresponding quantisation unit to generate quantised values of the distance r and the angle θ. [0071]
  • Secondly, offset values are determined for the quantised values of the distance r and angle θ which, when added to the quantised values, place the quantised values approximately midway between two neighbouring quantisation levels. For example, if the statistical analysis indicates that a quantisation level should occur every quarter of the normalisation distance (i.e. there are quantisation levels at 0.25, 0.5, 0.75 . . . ), then if the mean value of the normalisation distance r is 0.272, a quantised value is calculated by dividing the normalised distance r by 0.25 to give 1.088. An offset value of is then calculated by truncating the quantised value (to give a value of 1), adding 0.5 (to give a value of 1.5) and subtracting the quantised value to give an offset value of 0.412. Similarly, if the mean value of the normalisation distance r is 0.241 then an offset value is then calculated by truncating the quantised value, i.e truncating 0.964 to give 0, adding 0.5 and subtracting the quantised value. The offset values for the normalised distance r and angle θ and then stored as components of the feature vector for the minutia. [0072]
  • Finally, the [0073] cryptography unit 19 generates, in step S55, the biometric value Kbio. In particular, for each measurement minutia 75 the category value and the quantised values for the normalised distance r and the angle θ are concatenated to form a feature value, and the feature values for each of the measurement minutiae 75 are then concatenated in order of index number to form the biometric value Kbio.
  • The [0074] RECOVER_PRIVATE_KEY routine 53 will now be described with reference to FIG. 9. As has been described previously, after the ENROL_USER routine has been executed the mapping key K map 61, the mapping function 63 and the ambiguity resolution vector 65 are stored in the NVRAM 41.
  • When the [0075] RECOVER_PRIVATE_KEY routine 53 is initiated, firstly the cryptography unit 19 initiates, in step S61, the capture of M (where M>2) images of the fingerprint by the fingerprint sensor 17 and receives the corresponding image data. The cryptography unit 19 then processes, in step S63, the image data for each of the M images to identify the origin and the minutiae, thereby forming M feature templates.
  • For each of the M feature templates, the [0076] cryptography unit 19 then aligns, in step S65, the minutiae using the alignment vector of the ambiguity resolution vector. In particular, as in the ENROL_USER routine, the cryptography unit 19 first identifies the principal minutia and the secondary minutiae, forms a principal axis by extending a straight line from the origin through the principal minutia, and normalises the distances from the origin to the minutiae using the distance between the origin and the principal minutia as a normalisation distance. The cryptography unit 19 then compares the (r,θ) co-ordinates for all but one of the secondary minutiae with the (r,θ) co-ordinates of the corresponding secondary minutiae stored in the reference alignment data and determines a transform to compensate for image distortion. This transform is then applied to the co-ordinates of all the minutiae and the transformed (r,θ) co-ordinates of the remaining secondary minutia are then compared with the (r,θ) co-ordinates of the corresponding secondary minutia in the reference alignment data to check that the transform was adequate.
  • After the minutiae of each of the M feature templates have been aligned using the alignment vector, the [0077] cryptography unit 19 then excludes, in step S67, all minutia whose (r,θ) co-ordinates match, within a predetermined normalised distance, (r,θ) co-ordinates stored in the exclusion vector in order to remove unreliable minutia. For each of the M feature templates, the minutiae are then indexed, in step S69, in order of increasing value of the angle θ. The cryptography unit 19 then identifies from the sequence resolution vector the index numbers of groups of minutiae for which there may be sequence ambiguity due to similar values of angle θ, and applies the secondary indexing rule stored in the encoding data of the ambiguity resolution vector, in this embodiment ordering in increasing value of normalised distance r, to order these groups of minutiae.
  • Having indexed the minutiae in each of the M feature templates, feature values for each of the minutiae are determined. First, the [0078] cryptography unit 19 determines, in step S71, the position values for each minutia (i.e. the attribute values for the normalised distance r and the angle θ). In particular, for each minutia the normalised distance r and the angle θ in each feature template are quantised by dividing by the respective quantisation units stored in the feature vector for the minutia. These quantised values are then adjusted by adding the corresponding offset values stored in the feature vector for the minutia. The adjusted values are then truncated to respective integer numbers of quantisation units to give the position values.
  • The offset value has the effect that the probability that each position value will be correct matches the probability used to determine the quantisation unit. In other words, the offset value reduces the chance that the measurement of the attribute value is on the wrong side of the quantisation level backing to an incorrect position value. However, by comparing for each minutia the position values calculated for the M feature templates and selecting the position values which appear most frequently then the likelihood of the position values being incorrect is greatly reduced. [0079]
  • Secondly, for each minutia the [0080] cryptographic unit 19 resolves, in step S73, any anomaly in categorisation. In particular, the category of each minutia is compared over the M feature templates. If there is no category resolution value stored in the feature vector for the minutia, the possibility of the category being misidentified is low and therefore the category is assigned based on which category is assigned most often in the M feature templates. However, if the feature vector for the minutia does store a category resolution value, then the two most commonly identified categories for the minutia in the M feature templates are identified and the higher or lower in the order of prominence is selected in accordance with the category resolution value, unless all of the M feature templates identify the same category in which case the identified category is used.
  • The [0081] cryptography unit 19 then generates, in step S75, the biometric value Kbio by concatenating the category number and position values for the normalised distance r and angle θ of each measurement minutia to generate a feature vector for each measurement minutia, and then concatenates the feature vectors in index order to generate the biometric value Kbio. Finally the cryptography unit generates, in step S77, the private key Kpri by adding the mapping key Kmap stored in the NVRAM 41 to the biometric value Kbio.
  • As those skilled in the art will appreciate, messages encrypted with a private key K[0082] pri generated using the RSA algorithm can only be decrypted using the corresponding public key Kpub, and similarly messages encrypted with a public key Kpub generated using the RSA algorithm can only be decrypted using the corresponding private key Kpri. These properties are put to two main uses, to create digital signatures authenticating the source and integrity of a message and to encrypt a message so that only the desired recipient can decrypt the message.
  • In this embodiment, the SIGN_MESSAGE routine [0083] 55 stored in the ROM 37 is used to create a digital signature which authenticates the source and integrity of a message. When the user 21 wishes to attach a digital signature to a message, a copy of the message is transmitted from the computer 1 to the cryptography unit 19. As shown in FIG. 10, the cryptography unit 19 receives, in step S81, the message and then checks, in step S83, if the private key Kpri is currently generated.
  • If the private key is not currently generated, the [0084] cryptography unit 19 runs, in step S85, the RECOVER_PRIVATE_KEY routine to generate the private key Kpri. This requires the presence of the user 21 in order to generate the biometric key Kbio. If the private key Kpri is currently generated, or after the RECOVER_PRIVATE_KEY routine has been run (step S85), the cryptography unit 19 generates, in step S87, the digital signature. In this embodiment, the digital signature is generated by a two-step process. Firstly, the cryptography unit 19 applies the conventional Secure Hashing Algorithm (SHA) to create a first one-way hash. Those skilled in the art will appreciate that a one-way hash is a fixed length number generated from data of arbitrary length from which it is not possible to recover the original data. The first one-way hash is then encrypted using the generated private key Kpri to generate the digital signature.
  • The digital signature is then transmitted, in step S[0085] 89, to the computer 1, which attaches the digital signature to the original message to form a signed message and transmits the signed message to a desired recipient. The desired recipient is then able to, in a conventional manner, separate the signed message into the original message and the digital signature, apply the Secure Hashing Algorithm to the original message to generate a second one-way hash and decrypt the digital signature, using the public key Kpub corresponding to the private key Kpri of the user 21, to recover the first one-way hash. If the first one-way hash is identical to the second one-way hash, then the recipient can be confident both that the user 21 was the source of the message and that the message had not been tampered with in transit.
  • In this embodiment, the [0086] DECRYPT_MESSAGE_ routine 57 is used to decrypt a message which has been encrypted using the public key Kpub corresponding to the private key Kpri of the user 21. On receipt of an encrypted message, the computer 1 transmits the encrypted message to the cryptography unit 19. As shown in FIG. 11, the cryptography unit receives, in step S91, the encrypted data and then checks, in step S93, if the private key Kpri is currently generated.
  • If the private key is not currently generated, the [0087] cryptography unit 19 runs, in step S95, the RECOVER_PRIVATE_KEY routine to generate the private key Kpri. This requires the presence of the user 21. If the private key Kpri is currently generated, or after the RECOVER_PRIVATE_KEY routine has been run (step S95), the cryptography unit 19 decrypts, in step S97, the received encrypted data using the private key Kpri. The cryptography unit 19 then sends the decrypted data to the computer 1.
  • In the first embodiment, a dedicated cryptography unit is used to process the biometric data and to perform cryptographic operations. However, these operations could instead be performed by computer programs executed by a conventional computer. [0088]
  • A second embodiment will now be described, with reference to FIGS. [0089] 12 to 15, in which the user 21 is able to use any of a number of computer terminals connected to a local area network (LAN). In the second embodiment, the biometric data is processed and the cryptographic operations are performed by whichever computer terminal the user 21 is currently using.
  • FIG. 12 is a schematic block diagram showing a [0090] LAN 101 to which are attached a computer terminal 103, a public server 105 and a secure server 107. As shown in FIG. 12, the computer terminal 103 includes a processor 109 connected to a local hard disk 111, a RAM 113, a network port 115, a USB (Universal Serial Bus) port 117 and a keyboard 118 (other components of the computer terminal 103 have not been shown for ease of illustration). A fingerprint sensor 119 is connected to the computer terminal 103 via the USB port 117. Although not shown in FIG. 12, a number of additional computer terminals are attached to the LAN 101 together with other network devices such as printers, modems and the like.
  • The [0091] public server 105 is a conventional file server which is accessible by any application run by any of the computer terminals 103. The data stored in the public server 105 cannot, therefore, be considered secure.
  • As shown in FIG. 12, the [0092] secure server 107 includes a secure data store 121 which is connected to the LAN 101 via an authentication and data transfer unit 121. The authentication and data transfer unit 121 receives and processes requests for data stored in the secure data store 121. In particular, the authentication and data transfer unit 121 identifies the source of the request and checks that the identified source has access rights to the requested data. If the access request is authenticated, the authentication and data transfer unit 123 retrieves the requested data from the secure data store 121 and transmits the requested data to the source of the request. In this embodiment, the secure server 107 has its own private key and public key pair.
  • In this embodiment, the [0093] secure server 107 includes a Secure Execution Engine (SEE) manufactured by nCipher Corporation Limited, the operation of which is described in International Patent Publication WO 01/63385 (whose content is hereby incorporated by reference). The Secure Execution Engine allows processing operations to be securely performed at the secure server 107 using code which has been certified by a trusted authority as to the processing operations performed by the code. In this embodiment, the code run by the Source Execution Engine can process requests for data stored in the secure data store 121 to verify that the requestee is entitled to access, retrieve the stored data from the secure data store 121, and perform any cryptographic operations such as decrypting received messages, verifying digital signatures and encrypting transmitted messages. In this way, the secure server 107 is resistant to software attacks. The secure server 107 is also a tamper-proof environment, making it resistant to hardware attacks. In this way a user can have confidence that no unauthorised party has access to data stored in the secure server 107.
  • In this embodiment, the biometric value K[0094] bio is used to generate a strong private key Ks pri and a weak private key Kw pri using a strong mapping key Ks map and a weak mapping key Kw map respectively. As suggested by the nomenclature, the strong private key Ks pri has higher entropy than the weak mapping key Kw pri and therefore messages encrypted by the strong private key Ks pri are inherently more resilient to a brute force decryption attack than messages generated using the weak private key Kw pri. In particular, in this embodiment the strong private key Ks pri is a 1024 bit number generated by the RSA algorithm whereas the weak private key Kw pri is a 128 bit number generated by the RSA algorithm.
  • In this embodiment, the biometric value K[0095] bio has approximately the same entropy as the weak private key Kw pri, and the weak mapping key Kw map is stored in the public server 105. The user is therefore able to generate the weak private key Kw pri at the computer terminal 103 by entering the biometric data using a fingerprint sensor 119, enabling the computer terminal 103 to generate the biometric value Kbio, and retrieving the weak mapping key Kw map from the public server 105.
  • Once the weak private key K[0096] w pri has been generated, it is used to generate a digital signature which is sent to the secure server 107 along with a request for data, including the strong mapping key Kmap, which is stored in the secure data store 121 and, in combination with the biometric value Kbio, allows the strong private key Ks pri to be generated.
  • The local [0097] hard disk 111 of the computer terminal 103 stores routines which are used during operation of the computer terminal 103. FIG. 13 illustrates four of the routines stored in the local hard disk 111 of the computer 103, namely DK_ENROL_USER 131, RECOVER_STRONG_PRIVATE_KEY 133, SIGN_MESSAGE 135 and DECRYPT_MESSAGE 137.
  • The [0098] DK_ENROL_USER routine 131, which is executed to enrol a new user, will now be described with reference to FIG. 14. As shown in. FIG. 14, the computer terminal 103 receives, in step S101, user information identifying the new user via the keyboard 118. In this embodiment, the user information is formed by a user name and a password. The computer terminal then receives and processes, in step S103, biometric data corresponding to a fingerprint of the new user in the same manner as described with reference to FIGS. 7A, 7B and 8 for the first embodiment, to generate a biometric value Kbio and an ambiguity resolution vector.
  • Once the biometric value K[0099] bio has been generated, the computer terminal 103 generates, in step S105, a weak private key Kw pri and a weak public key Kw pub pair using the RSA algorithm. The weak private key Kw pri and the biometric value Kbio are then processed, in step S107, using a weak mapping function to generate a weak mapping key Kw map. In this embodiment, the weak mapping key Kw map is generated by subtracting the biometric value Kbio from the weak private key Kw pri as shown in equation 2.
  • K map w =K pri w −K bio   (2)
  • The [0100] computer terminal 103 generates, in step S109, a strong private key Ks pri and a strong public key Ks pub and transmits, in step S111, the strong public key Ks pub to a certification authority. The computer terminal 103 also generates, in step S113, a random number Krand whose entropy is approximately equal to that of the strong private key Ks pri.
  • The biometric value K[0101] bio and the random number Krand are then multiplexed to form a strong intermediate key, and the strong intermediate key and the strong private key Ks pri are processed, in step S115, using a strong mapping function to generate a strong mapping key Ks map. In this embodiment, the strong intermediate key is generated by adding the biometric value Kbio and the random number Krand, the strong mapping key Ks map is generated by subtracting the intermediate key from the strong private key Ks pri, as shown in equation 3.
  • K map s =K pri s−(K rand +K bio)   (3)
  • The [0102] computer terminal 103 then generates, in step 117, a secure data vector comprising data to be stored in the secure data store 121. In particular, the secure data vector comprises the user information, the weak public key Kw pub, the strong mapping key Ks map, the strong mapping function and the random number Krand. The computer terminal 103 then encrypts the secure data vector using the public key of the secure server and sends, in step S119, the encrypted secure data vector to the secure server 107, which decrypts the encrypted secure data vector using its private key and then stores the secure data vector in the secure data store 121.
  • The [0103] computer terminal 103 then generates, in step S121, an open data vector comprising data to be stored in the public server 105. In particular, the open data vector comprises the user information, the ambiguity resolution vector and the weak mapping key Kw map and the weak mapping function. The computer 103 then sends, in step S123, the open data vector to the public server 105 for storage. Finally, the computer terminal 103 deletes, in step S125, the weak private key Kw pri, the strong private key Ks pri, the biometric value Kbio and the biometric data from the RAM 113. Therefore, after the DK_ENROL_USER routine has been run the strong private key Ks pri and the weak private key Kw pri are not stored anywhere on or connected to the LAN 101.
  • Although the weak public key K[0104] w pub has been termed in this embodiment a public key, it is not in fact publicly available (and therefore is not transmitted to a certification authority) and after the DK_ENROL_USER routine has been finished is only known to the secure server 107.
  • The [0105] RECOVER_STRONG_PRIVATE_KEY routine 133, which is executed to recover the strong private key Ks pri associated with an enrolled user, will now be described with reference to FIG. 15. Firstly, in step S133, the computer terminal 103 receives, in step S131, the user name and password for the user (i.e. the user information) via the keyboard 118. The computer terminal 103 then retrieves, in step S133, the open data vector associated with the received user information from the public server 105.
  • The [0106] computer terminal 103 then receives, in step S135, biometric data corresponding to the fingerprint of the user from the fingerprint sensor 119, via the USB port 117, and processes, in step S137, the received biometric data to generate the biometric value Kbio. The manner in which the biometric value is generated from the biometric data, using the ambiguity resolution vector which forms part of the open data vector, is identical to the method used in the first embodiment and will not, therefore, be described again.
  • The [0107] computer terminal 103 now generates, in step S139, the weak private key Kw pri using the generated biometric value Kbio, the weak mapping key Kw map and the weak mapping function from the open data vector. In particular, the weak private key Kw pri is generated by adding the weak mapping key Kw map and the biometric value Kbio.
  • The [0108] computer terminal 103 then sends, in step S141, a signed request to the secure server 107 for the secure data vector associated with the user information. In particular, the computer terminal 103 generates a message including the user information, a challenge token which is periodically updated by the secure server, and a randomly generated symmetric key. The purpose of the challenge token is to ensure the signed request periodically varies. The computer terminal 103 then generates a digital signature by applying the secure hashing algorithm to a copy of the generated message to form a first one-way hash, and encrypting the first one-way hash using the weak private key Ks pri to generate a digital signature which is attached to the original message to form the signed request. The signed request is then encrypted using the public key of the secure server 107 and transmitted to the secure server 107.
  • On receiving the encrypted signed request from the [0109] computer terminal 103, the authentication and data transfer unit 123 of the secure server 107 decrypts the encrypted signed request, using its private key, to recover the signed request and separates the signed request into the original message and the digital signature. The authentication and data transfer unit 123 then extracts the user information from the original message and retrieves the weak public key Kw pub from the secure data vector associated with the user information, decrypts the digital signature using the weak public key Kw pub to recover the first one-way hash and applies the SHA algorithm to the original message to create a second one-way hash. If the first one-way hash is identical to the second one-way hash, the authentication and data transfer unit 123 encrypts the secure data vector using the symmetric key received with the signal request and the weak public key Kw pub and transmits the encrypted secure data vector to the computer terminal 103. If, however, the first one-way hash is not identical to the second one-way hash then the authentication and data transfer unit 123 logs an unsuccessful request for the secure data vector associated with the user information. In this embodiment, as an additional security provision, if the authentication and data transfer unit 123 logs three unsuccessful requests for the secure data vector associated with the user information, then access to that secure data vector is blocked to all requests, including authentic requests, for a predetermined period of time. This reduces the chances of an interloper accessing the secure data vector by brute force (i.e. generating multiple signed requests using systematically varied cryptographic keys until the cryptographic key used matches the weak private key Kw pri).
  • The [0110] computer terminal 103 receives, in step S143, the encrypted secure data vector and decrypts the encrypted secure data vector using the weak private key Kw pri to recover the secure data vector. The computer terminal 103 then generates, in step S145, the strong private key Ks pri using biometric value Kbio together with the strong mapping key Ks map, the strong mapping function and the random number Krand from the secure data vector. In particular, in this embodiment the strong private key Ks pri is generated by adding the strong mapping key Ks map, and the random number Krand to form the intermediate key, and then adding the intermediate key and the biometric value Kbio.
  • Once the strong private key K[0111] s pri has been generated, the user at the computer terminal 103 is able to sign messages with digital signatures generated using the strong private key Ks pri (using the SIGN_MESSAGE routine stored in the local hard disk 111) and decrypt using the strong private key Ks pri received messages which have been encrypted using the strong public key Ks pub (using the DECRYPT_MESSAGE routine stored in the local hard disk 111).
  • Modifications and Further Embodiments [0112]
  • In the first and second embodiments, a biometric value is calculated using image data representative of the fingerprint of a user. This biometric value forms an intermediate key linking a mapping key with a cryptographic key. This system will be referred to as Triple Key Cryptography. [0113]
  • Other sources of biometric data are available apart from fingerprints. For example the biometric data could be generated from a scan of an iris or a retina, or from a voice recording. The advantage of using biometric data is that the presence of a particular person is required to generate the biometric data. However, in the first and second embodiments the biometric data could be replaced by data representative of a different analogue source. For example, the analogue source could be a picture, an engraving or a jewel with an image sensor being used to generate representative data from which an intermediate key could be generated. Alternatively, the analogue source could be a purpose-designed object having sharply defined but random geometric properties that can be detected using ultra-sound to generate representative data. [0114]
  • Alternatively, the intermediate key could be generated from a combination of sources, not all of which need to be analogue. For example, the intermediate key could be generated by combining a first biometric value, which is determined from biometric data representing a fingerprint, a second biometric value, which is determined from biometric data representing an iris, and user inputs such as a password. In this way, the entropy of the intermediate key can be increased. [0115]
  • In the described embodiments, the intermediate key is generated by concatenating multiple attribute values. It will be appreciate that other ways of combining or multiplexing the attribute values could be used. [0116]
  • In the first embodiment, the mapping function which is applied to the intermediate key (i.e. the biometric value K[0117] bio) and the mapping key Kmap is a simple addition. However, any mapping function which is monotonic, i.e. each set of input variables generates a unique output, could be used. For example, the mapping function could be a simple subtraction. It can be shown that the mapping function used does not affect the security of the system. A bit-wise exclusive-OR function could also be used both to combine the intermediate key and the cryptographic key to generate the mapping key, and subsequently to combine the intermediate key and the mapping key to generate the private key.
  • Preferably, the mapping function used to generate the cryptographic key from the intermediate key and the mapping key has an inverse function which facilitates the generation of the mapping key using the intermediate key and the cryptographic key. [0118]
  • In the first and second embodiments, an ambiguity resolution vector is stored which contains process instructions and variables which were determined by a training process to achieve a desired level of repeatability of the intermediate key while maintaining a high level of entropy. However, for Triple Key Cryptography it is not essential to use such an ambiguity resolution vector. For example, a simple voting mechanism over multiple samples could be used. [0119]
  • In the first embodiment a dedicated hardware device is used to process the biometric data to form the biometric value and to perform the cryptographic processes, whereas in the second embodiment these processes are performed by software running on a conventional computer. [0120]
  • Alternatively, the processing could be split between a dedicated hardware device and software run on a conventional computer. In an embodiment, the processing of the biometric data to generate the biometric value is performed by software running on a conventional computer, and the generated biometric value is transmitted to a dedicated hardware device (which stores the mapping key and the mapping function) which generates the cryptographic key and performs cryptographic operations. In this way, the cryptographic key is never sent to, or generated in, the computer. [0121]
  • Although the description has concentrated on asymmetric encryption systems, Triple Key Cryptography could also be used for generating a symmetric key. [0122]
  • An application of triple key cryptography is to restrict access to the medical records of a patient to when the patient is present. In particular, medical records for a plurality of patients are stored in a data base along with respective identification numbers. A separate data base stores for each patient corresponding user information, a mapping key and an encrypted identification number. Biometric data representative of the patient is then processed to generate an intermediate key representative of the patient. The Intermediate key is then combined with the mapping key associated with the patients user information to generate the cryptographic key which is used to decrypt the encrypted identification number. The patients records are then located in the medical record data base by retrieving the medical records corresponding to the decrypted identification number. [0123]
  • The first embodiment describes a technique for generating a number from image data representative of a fingerprint using stored process instructions and variables generated by a training process. This technique could also be applied to generate data from other biometric data, for example a voice pattern or the image of an iris or a retina. Alternatively, this technique could be applied to data from other analogue sources such as pictures and sound recordings. Further, this technique has applications outside the field of cryptography. For example, a number generated from biometric data could be used as a password. [0124]
  • In order to generate a number from data representative of an analogue source it is necessary to determine what attributes of the data you are going to consider. During the enrolment of a new user, attributes which are most likely to give a repeatable value are determined and information identifying these attributes is stored. [0125]
  • In the first embodiment, features (i.e. minutiae of a fingerprint) are identified and extracted from the data, and the ambiguity resolution vector stores alignment data, exclusion data and sequence resolution data which are used when processing subsequent images of the fingerprint to identify more reliably the minutiae whose attributes are going to be measured. In other embodiments, for example the processing of an iris scan, rather than extracting features from the data, the data is segmented into blocks. In this case, during the enrolment of a user optimal segment sizes can be determined and details of these segment sizes stored in the ambiguity resolution vector. [0126]
  • Although the ambiguity resolution vector can be used to identify more reliably the attributes to be considered, the values of these attributes can still vary from one set of data to the next. Generally, the value of an attribute will either be a number corresponding to the classification of the attribute, for example the category number of a minutia in the first embodiment, or a direct measurement of a property of the attribute, for example the position values for a minutia in the first embodiment. As described in the first embodiment, the ambiguity resolution vector can store information which allows these values to be more reliably obtained. [0127]
  • In the first embodiment, after adjusting a quantised value using an offset value stored in the offset vector to move the quantised value towards a point midway between two quantisation levels, the adjusted value is truncated to give a position value. In other words, the adjusted value is rounded down to the nearest quantisation level. Alternatively, the adjusted value could be rounded up to the nearest quantisation level. In an alternative embodiment, the offset values are used to adjust the quantised values towards the nearest quantisation level, and the adjusted level is rounded to the nearest quantisation level. [0128]
  • Although in the first embodiment the offset value is used in combination with a quantisation unit which is determined to achieve a desired repeatability, offset value could also be used with arbitrary quantisation units to move on attribute value away from a boundary level separating two “low-resolution” position values. [0129]
  • Those skilled in the art will appreciate that it is not essential for all of the above factors to be taken into consideration when generating the ambiguity resolution vector for there still to be a significant improvement in the repeatability of a number generated from data representative of an analogue source. [0130]
  • In the first embodiment, the origin of a fingerprint pattern is found by identifying the point of maximum ridge curvature. In an alternative embodiment, an origin is identified in the data representative of the first image of the fingerprint, and the ridge pattern at the origin is stored in the ambiguity resolution vector. The origin can then be located in data representative of subsequent images of the fingerprint by a pattern recognition process using the stored patter data. [0131]
  • As described, as well as computer apparatus and processes performed in the computer apparatus, the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice. The computer program may be in the form of source code, object code, a code intermediate source and object code such as in partially compiled form, or in any other form suitable for use in the implementation of the processes according to the invention. [0132]
  • The carrier may be any entity or device capable of carrying the program. For example, the carrier may comprise a storage medium such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a floppy disk or hard disk. Further, the carrier may be a transmissible carrier such as an electrical or optical signal which may be conveyed via electrical or optical cable or by radio or other means. [0133]
  • When the program is embodied in a signal which may be conveyed directly by a cable or other device or means, the carrier may be constituted by such cable or other device or means. Alternatively, the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted for performing, or for use in the performance of, the relevant processes. [0134]

Claims (104)

1. An apparatus for generating a cryptographic key, the apparatus comprising:
a receiver operable to receive data representative of an analogue source;
a number generator operable to process the received data to generate an intermediate key representative of the received data, said intermediate key being a number;
a data store for storing a mapping key, said mapping key being a predetermined number; and
a key generator operable to combine the intermediate key and the stored mapping key in accordance with a monotonic mapping function to generate the cryptographic key.
2. An apparatus according to claim 1, wherein the number generator is operable to generate the number from at least one attribute value of a feature within the data representative of the analogue source, and wherein the number generator comprises:
a process data store operable to store process data, determined by a training process, for controlling the processing of the data representative of the analogue source; and
a data processor operable to process the data representative of the analogue source, using the stored process data, to determine said at least attribute value.
3. An apparatus according to claim 2, wherein the process data comprises feature information indicative of at least one feature within the data representative of the analogue source, and wherein the data processor is arranged to select the at least one feature for which said at least one attribute value is determined using the feature information of the process data.
4. An apparatus according to claim 3, wherein the data processor is operable to exclude the or each feature identified by the feature information.
5. An apparatus according to any of claims 2 to 4, wherein the process data comprises reference alignment data, and wherein the data processor is operable to vary the data representative of the analogue source in accordance with the stored reference alignment data.
6. An apparatus according to any of claims 2 to 5, wherein the process data comprises segmentation data, and wherein the data processor is operable to segment the data representative of the analogue source in accordance with the stored segmentation data.
7. An apparatus according to any of claims 2 to 6, wherein the process data identifies at least one basis function, and wherein the data processing apparatus is arranged to determine an attribute value by determining a transform co-efficient from the data representative of the analogue source using the stored basis function.
8. An apparatus according to any of claims 2 to 7, wherein the said at least one attribute value comprises a measurement value corresponding to a measurement of an attribute of a feature, wherein the process data comprises value adjustment data, and wherein the data processor is arranged to adjust the measurement value using the value adjustment data.
9. An apparatus according to claim 8, wherein the value adjustment data comprises offset data, and wherein the data processor is arranged to adjust the measurement value using the offset vector.
10. An apparatus according to claim 8 or 9, wherein the value adjustment data comprises a scaling factor, and wherein the data processor is arranged to scale the measurement value using the scaling factor to generate a scaled attribute value.
11. An apparatus according to claim 10, wherein the data processor is operable to apply a predetermined strategy to reduce the resolution of the scaled attribute value.
12. An apparatus according to claim 11, wherein the scaling factor defines a plurality of quantisation levels, and wherein the data processor is operable to truncate the scaled attribute value.
13. An apparatus according to claim 11, wherein the scaling factor defines a plurality of quantisation levels, wherein the data processor is operable to round the scaled attribute value up to the nearest quantisation level.
14. An apparatus according to claim 11, wherein the scaling factor defines a plurality of quantisation levels, and wherein the data processor is operable to round the scaled attribute value to the nearest quantisation level.
15. An apparatus according to any of claims 2 to 14, wherein the said at least one attribute value comprises a category value corresponding to a classification of an attribute of a feature, wherein the process data comprises category adjustment data, and wherein the data processor is arranged to adjust the category value using the category adjustment data.
16. An apparatus according to any preceding claim, wherein the monotonic mapping function has a corresponding inverse function.
17. An apparatus according to any preceding claim, wherein the number generator is operable to generate a number representative of the received data, and to combine the generated number with one or more additional numbers to generate the intermediate key.
18. An apparatus according to claim 17, wherein at least one of the one or more additional numbers is data from a digital source.
19. An apparatus according to any preceding claim, wherein the key generator is operable to add the intermediate key and the stored mapping key to generate the cryptographic key.
20. An apparatus according to any of claims 1 to 18, wherein the key generator is operable to subtract the intermediate key and the stored mapping key to generate the cryptographic key.
21. An apparatus according to any of claims 1 to 18, wherein the key generator is operable to perform a bit-wise exclusive-OR function on the intermediate key and the stored mapping key to generate the cryptographic key.
22. An apparatus according to any preceding claim, wherein the data store is a first data store, the cryptographic key is a first cryptographic key, and wherein the apparatus further comprises:
a second data store for storing a secure key and a public key, wherein the secure key comprises one of a second cryptographic key and a number required to generate the second cryptographic key, and wherein the public key is associated with the first cryptographic key by an asymmetric encryption algorithm;
an access controller operable to allow access to the secure key stored in the second data store only to an access request accompanied by a digital signature generated using the first cryptographic key; and
an access request signal generator operable to generate a digital signature using the first cryptographic key and to transmit an access request, including the generated digital signature, to the access controller in order to retrieve the secure key.
23. An apparatus according to claim 22, wherein the key generator is a first key generator, wherein the monotonic mapping function is a first monotonic mapping function, wherein the secure key comprises a number required to generate the second cryptographic key, and wherein the apparatus further comprises a second key generator operable to combine the intermediate key and the secure key in accordance with a second mapping function to generate the second cryptographic key.
24. An apparatus according to claim 23, wherein the first monotonic mapping function and the second monotonic mapping function are the same function.
25. An apparatus according to any of claims 22 to 24, wherein the access request signal generator is arranged to include in the access request a third cryptographic key for symmetric encrypted communication between the key generator and the second data store.
26. An apparatus according to any of claims 22 to 25, wherein the apparatus is formed multiple devices connected to a computer network.
27. An apparatus according to any preceding claim, further comprising a decrypter operable decrypt an encrypted message using the generated cryptographic key.
28. An apparatus according to any preceding claim, further comprising a digital signature generator operable to generate a digital signature using the generated cryptographic key.
29. An apparatus for generating a mapping key associating an intermediate key representative of data from an analogue source with a cryptographic key in accordance with a monotonic mapping function, the apparatus comprising:
a receiver operable to receive data representative of an analogue source;
a number generator operable to process the received data to generate an intermediate key representative of the received data, said intermediate key being a number;
a cryptographic key generator operable to generate a cryptographic key;
a data processor operable to process the intermediate key and the cryptographic key in accordance with a monotonic mapping function to generate a mapping key.
30. An apparatus according to claim 29, wherein said number generator is operable to generate the intermediate key from at least one attribute value of at least one feature within the data representative of the analogue source.
31. An apparatus according to claim 30, wherein the number generator comprises a process data generator operable to generate process data, using a training process, for controlling the processing of the data representative of the analogue source.
32. An apparatus according to claim 31, wherein the process data generator is operable to generate feature information indicative of at least one feature within the data representative of the analogue source.
33. An apparatus according to claim 32, wherein the process data generator is operable to generate the feature information based on the repeatability of features in a plurality of training data sets.
34. An apparatus according to any of claims 31 to 33, wherein the process data generator is operable to generate reference alignment data base on the distribution of features in one or more training data sets.
35. An apparatus according to any of claims 31 to 34, wherein the process data generator is operable to generate segmentation data for segmenting the data representative of the analogue source.
36. An apparatus according to any of claims 31 to 35, wherein the process data generator is operable to identify and store at least one basis function using one or more training data sets.
37. An apparatus according to any of claims 31 to 36, wherein the process data generator is operable to generate value adjustment data for adjusting an attribute value using one or more training data sets.
38. An apparatus according to claim 37, wherein the value adjustment data comprises offset data corresponding to the difference between a measured attribute value and one of a plurality of predetermined values.
39. An apparatus according to claim 37 or 38, wherein the value adjustment data comprises a scaling factor.
40. An apparatus according to claim 39, wherein the process data generator is operable to determine the scaling factor in accordance with the variation of the measured attribute value in a plurality of training data sets.
41. An apparatus according to claim 40, wherein the process data generator is operable to set the scaling factor to correspond to a theoretical confidence interval.
42. An apparatus according to claim 40 or 41 when dependent on claim 37, wherein the plurality of predetermined values corresponds to points midway between neighbouring quantisation levels, wherein the distance between neighbouring quantisation levels corresponds to the scaling factor.
43. An apparatus according to any of claims 31 to 42, wherein the said at least one attribute value comprises a category value corresponding to a classification of an attribute of a feature, wherein the process data generator is operable to generate category adjustment data using a plurality of training data sets.
44. An apparatus according to any of claims 31 to 43, wherein the data processor is operable to add the intermediate key and the cryptographic key to generate the stored mapping key.
45. An apparatus according to any of claims 31 to 43, wherein the data processor is operable to subtract the intermediate key and the cryptographic key to generate the mapping key.
46. An apparatus according to any of claims 31 to 43, wherein the key generator is operable to perform a bit-wise exclusive-OR function on the intermediate key and the cryptographic key to generate the mapping key.
47. An apparatus according to any proceeding claim, further comprising a generator operable to generate said data representative of an analogue source.
48. An apparatus according to claim 47, wherein the generator comprises an image sensor operable to generate said data representative of an analogue source by generating image data corresponding to an image of the analogue source.
49. An apparatus according to claim 48, wherein the image sensor is adapted to generate image data corresponding to an image of a fingerprint.
50. An apparatus according to claim 48, wherein the image sensor is adapted to generate image data corresponding to an image of an iris.
51. An apparatus according to claim 48, wherein the image sensor is adapted to generate image data corresponding to an image of a retina.
52. An apparatus according to preceding claim, wherein the data representative of an analogue source is biometric data representative of a feature of a human being.
53. An apparatus for generating a number from data representative of an analogue source, the apparatus comprising:
a data store operable to store process data, determined by a training process, for controlling the processing of the data representative of the analogue source;
a data processor operable to process the data representative of the analogue source, using the stored process data, to identify at least one attribute value of at least one feature within the data; and
a number generator operable to generate said number from the or each determined attribute value.
54. An apparatus according to claim 53, wherein the process data comprises feature information indicative of at least one feature within the data representative of the analogue source, and wherein the data processor is arranged to identify said at least one feature using the feature information of the process data.
55. An apparatus according to claim 54, wherein the data processor is operable to exclude the or each feature identified by the feature information.
56. An apparatus according to any of claims 53 to 55, wherein the process data comprises reference alignment data, and wherein the data processor is operable to vary the data representative of the analogue source in accordance with the stored reference alignment data.
57. An apparatus according to any of claims 53 to 56, wherein the process data comprises segmentation data, and wherein the data processor is operable to segment the data representative of the analogue source in accordance with the stored segmentation data.
58. An apparatus according to any of claims 53 to 57, wherein the process data identifies at least one basis function, and wherein the data processing apparatus is arranged to determine an attribute value by determining a transform co-efficient from the data representative of the analogue source using the stored basis function.
59. An apparatus according to any of claims 53 to 58, wherein the said at least one attribute value comprises a measurement value corresponding to a measurement of an attribute of a feature, wherein the process data comprises value adjustment data, and wherein the data processor is arranged to adjust the measurement value using the value adjustment data.
60. An apparatus according to claim 59, wherein the value adjustment data comprises offset data, and wherein the data processor is arranged to adjust the value of at the measurement value using the offset vector.
61. An apparatus according to claim 59 or 60, wherein the value adjustment data comprises a scaling factor, and wherein the data processor is arranged to scale the measurement value using the scaling factor to generate a scaled attribute value.
62. An apparatus according to claim 61, wherein the data processor is operable to apply a predetermined strategy to reduce the resolution of the scaled attribute value.
63. An apparatus according to claim 62, wherein the scaling factor defines a plurality of quantisation levels, and wherein the data processor is operable to truncate the scaled attribute value.
64. An apparatus according to claim 62, wherein the scaling factor defines a plurality of quantisation levels, and wherein the processor is operable to round the scaled attribute value up to the nearest quantisation level.
65. An apparatus according to claim 62, wherein the scaling factor defines a plurality of quantisation levels, and wherein the data processor is operable to round the scaled attribute value to the nearest quantisation level.
66. An apparatus according to any of claims 53 to 65, wherein the said at least one attribute value comprises a category value corresponding to a classification of an attribute of a feature, wherein the process data comprises category adjustment data, and wherein the data processor is arranged to adjust the category value using the category adjustment data.
67. A data processing apparatus comprising:
a receiver operable to receive one or more training data sets, each training data set representative of the analogue source;
a data processor operable to process the or each received training data set to identify at least one attribute of at least one feature; and
a process data generator operable to generate process data indicative of the identified at least one attribute.
68. An apparatus according to claim 67, wherein the process data generator is operable to generate feature information indicative of at least one feature within the data representative of the analogue source.
69. An apparatus according to claim 68, wherein the process data generator is operable to generate the feature information based on the repeatability of features in a plurality of training data sets.
70. An apparatus according to any of claims 67 to 69, wherein the process data generator is operable to generate reference alignment data base on the distribution of features in one or more training data sets.
71. An apparatus according to any of claims 67 to 70, wherein the process data generator is operable to generate segmentation data for segmenting the data representative of the analogue source.
72. An apparatus according to any of claims 67 to 71, wherein the process data generator is operable to identify and store at least one basis function using one or more training data sets.
73. An apparatus according to any of claims 67 to 72, wherein the process data generator is operable to generate value adjustment data for adjusting an attribute value using one or more training data sets.
74. An apparatus according to claim 73, wherein the value adjustment data comprises offset data corresponding to the difference between a measured attribute value and one of a plurality of predetermined values.
75. An apparatus according to claim 73 or 74, wherein the value adjustment data comprises a scaling factor.
76. An apparatus according to claim 75, wherein the process data generator is operable to determine the scaling factor in accordance with the variation of the measured attribute value in a plurality of training data sets.
77. An apparatus according to claim 76, wherein the process data generator is operable to set the scaling factor to correspond to a theoretical confidence interval.
78. An apparatus according to claim 74 or 75 when dependent on claim 71, wherein the plurality of predetermined values corresponds to points midway between neighbouring quantisation levels, wherein the distance between neighbouring quantisation levels corresponds to the scaling factor.
79. An apparatus according to any of claims 67 to 78, wherein the said at least one attribute value comprises a category value corresponding to a classification of an attribute of a feature, wherein the process data generator is operable to generate category adjustment data using a plurality of training data sets.
80. An apparatus for generating a number from data representative of an analogue source, the apparatus comprising:
means for processing the data to determine at least one attribute value of at least one feature within the data;
means for storing value adjustment data;
means for modifying the at least one attribute value using said stored value adjustment data; and
means for generating said number from the modified at least one attribute value.
81. An apparatus for generating a number from data representative of an analogue source, the apparatus comprising:
means for storing process data indicative of at least one attribute of at least one feature within the data;
means for processing the data, using the stored process data, to identify the at least one attribute of the at least one feature within the data;
means for determining an attribute value for the or each identified attribute; and
means for generating said number from the or each determined attribute value.
82. A system for generating a number from data representative of an analogue source, the system comprising a training apparatus and a number generating apparatus,
the training apparatus comprising: i) means for receiving a plurality of training data sets, each training data set representative of the analogue source; ii) means for processing the received training data sets to identify at least one attribute value of at least one feature; iii) means for generating process data indicative of the identified at least one attribute value of at least one feature,
and the number generating apparatus comprising: i) means for storing the process data generated by the training apparatus; ii) means for receiving data representative of the analogue source; iii) means for processing the data, using the stored process data, to identify the at least one attribute of the at least one feature within the data; iv) means for determining an attribute value for the or each identified attribute; and v) means for generating said number from the or each determined attribute value.
83. A system for generating a cryptographic key using a received external key, the system comprising:
a first data store for storing an authorisation key;
a second data store for storing a secure key and a public key, wherein the secure key comprises one of the cryptographic key and a number required to generate the cryptographic key, and wherein the public key is associated with an associated private key by an asymmetric encryption algorithm;
an access controller operable to allow access to the secure key stored in the second data store only to an access request accompanied by a digital signature generated using the private key corresponding to the stored public key;
a key generator operable to generate the private key using the received external key and the stored authorisation key using a mapping function; and
an access request signal generator operable to generate a digital signature using the private key and to transmit an access request, including the generated digital signature, to the access controller in order to retrieve the secure key.
84. A system according to claim 83, wherein the key generator is a first key generator, wherein the mapping function is a first mapping function, wherein the secure key comprises a number required to generate the cryptographic key, and wherein the apparatus further comprises a second key generator operable to combine the intermediate key and the secure key in accordance with a second mapping function to generate the second cryptographic key.
85. A system according to claim 83, wherein the first mapping function and the second mapping function are the same function.
86. A system according to any of claims 83 to 85, wherein the access controller is operable to log unsuccessful access requests and to deny all further access requests if the logged unsuccessful access requests satisfy a predetermined criterion.
87. A system according to any of claims 83 to 86, wherein the access request signal generator is arranged to include in the access request a third cryptographic key for symmetric encrypted communication between the key generator and the second data store.
88. A system according to any of claims 83 to 87, wherein the apparatus is formed multiple devices connected to a computer network.
89. A system according to any of claims 83 to 88, further comprising a decrypter operable decrypt an encrypted message using the generated cryptographic key.
90. A system according to any of claims 83 to 89, further comprising a digital signature generator operable to generate a digital signature using the generated cryptographic key.
91. A system according to any of claims 83 to 90, further comprising a key generator operable to generate the external key from data representative of an analogue source.
92. A system according to claim 91, wherein the data representative of the analogue source is biometric data representative of a feature of a human being.
93. An apparatus for generating a cryptographic key, the apparatus comprising:
means for receiving data representative of an analogue source;
means for processing the received data to generate an intermediate key representative of the received data, said intermediate key being a number;
means for storing a mapping key, said mapping key being a number; and
means for combining the intermediate key and the mapping key in accordance with a monotonic mapping function to generate the cryptographic key.
94. A method of generating a cryptographic key, the method comprising:
receiving data representative of an analogue source;
processing the received data to generate an intermediate key representative of the received data, said intermediate key being a number;
retrieving a stored mapping key, said mapping key being a number; and
combining the intermediate key and the mapping key in accordance with a monotonic mapping function to generate the cryptographic key.
95. An apparatus for generating a mapping key associating an intermediate key representative of data from an analogue source with a cryptographic key in accordance with a monotonic mapping function, the apparatus comprising:
means for receiving data representative of an analogue source;
means for processing the received data to generate an intermediate key representative of the received data, said intermediate key being a number;
means for generating a cryptographic key;
means for combining the intermediate key and the cryptographic key in accordance with a monotonic mapping function to generate a mapping key.
96. A method of generating a mapping key associating an intermediate key representative of data from an analogue source with a cryptographic key in accordance with a monotonic mapping function, the method comprising:
receiving data representative of an analogue source;
processing the received data to generate an intermediate key representative of the received data, said intermediate key being a number;
generating a cryptographic key;
combining the intermediate key and the cryptographic key in accordance with a monotonic mapping function to generate a mapping key.
97. An apparatus for generating a number from data representative of an analogue source, the apparatus comprising:
means for storing process data, determined by a training routine, operable to control the processing of the data representative of the analogue source;
means for processing the data representative of the analogue source, using the stored process data, to identify at least one attribute value of at least one feature within the data; and
means for generating said number from the or each determined attribute value.
98. A method of generating a number from data representative of an analogue source, the apparatus comprising:
storing process data, determined by a training routine, operable to control the processing of the data representative of the analogue source;
processing the data representative of the analogue source, using the stored process data, to identify at least one attribute value of at least one feature within the data; and
generating said number from the or each determined attribute value.
99. A data processing apparatus comprising:
means for receiving one or more training data sets, each training data set representative of the analogue source;
means for processing the or each received training data set to identify at least one attribute of at least one feature; and
means for generating process data indicative of the identified at least one attribute.
100. A data processing method comprising:
receiving one or more training data sets, each training data set representative of the analogue source;
processing the or each received training data set to identify at least one attribute of at least one feature; and
generating process data indicative of the identified at least one attribute.
101. A storage device storing instructions for causing a programmable processing apparatus to become operable to perform a method as claimed in any of claims 94, 96, 98 and 100.
102. A signal conveying instructions including instructions for causing a programmable processing apparatus to become operable to perform a method as claimed in any of claims 94, 96, 98 and 100.
103. An apparatus for generating a private key corresponding to a known public key, the public key being associated with a user, the apparatus comprising:
a receiver operable to receive data representative of an analogue source associated with the user;
a number generator operable to process the received data to generate an intermediate key representative of the received data, said intermediate key being a number;
a data store for storing a mapping key, said mapping key being a number predetermined to combine with the intermediate key generated from data representative of said analogue source, in accordance with a monotonic mapping function, to generate the private key; and
a key generator operable to combine the intermediate key and the stored mapping key in accordance with the monotonic mapping function to generate the private key.
104. A registration apparatus for generating a mapping key associating a private key, corresponding to a public key associated with a user, with an intermediate key representative of data from an analogue source, the analogue source being associated with the user, in accordance with a monotonic mapping function, the apparatus comprising:
a receiver operable to receive data representative of the analogue source;
a number generator operable to process the received data to generate the intermediate key representative of the received data, said intermediate key being a number; and
a data processor operable to process the intermediate key and the private key in accordance with the monotonic mapping function to generate the mapping key.
US10/467,831 2001-02-14 2002-02-14 Data processing apparatus and method Abandoned US20040111625A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/896,101 US8607056B2 (en) 2001-02-14 2010-10-01 Data processing apparatus and method

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
GB0103656.5 2001-02-14
GB0103656A GB0103656D0 (en) 2001-02-14 2001-02-14 Asymmetric cryptography
GB0113254.7 2001-05-31
GBGB0113255.4A GB0113255D0 (en) 2001-05-31 2001-05-31 Number generator
GB0113254A GB0113254D0 (en) 2001-05-31 2001-05-31 Asymmetric cryptography
GB0113255.4 2001-05-31
GB0119464A GB0119464D0 (en) 2001-08-09 2001-08-09 Key server
GB0119464.6 2001-08-09
PCT/GB2002/000626 WO2002065693A2 (en) 2001-02-14 2002-02-14 Cryptographic key generation apparatus and method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/896,101 Continuation US8607056B2 (en) 2001-02-14 2010-10-01 Data processing apparatus and method

Publications (1)

Publication Number Publication Date
US20040111625A1 true US20040111625A1 (en) 2004-06-10

Family

ID=27447926

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/467,831 Abandoned US20040111625A1 (en) 2001-02-14 2002-02-14 Data processing apparatus and method
US12/896,101 Expired - Fee Related US8607056B2 (en) 2001-02-14 2010-10-01 Data processing apparatus and method

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/896,101 Expired - Fee Related US8607056B2 (en) 2001-02-14 2010-10-01 Data processing apparatus and method

Country Status (4)

Country Link
US (2) US20040111625A1 (en)
EP (1) EP1366595B1 (en)
AU (1) AU2002229972A1 (en)
WO (1) WO2002065693A2 (en)

Cited By (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030172279A1 (en) * 2002-03-11 2003-09-11 Seiko Epson Corporation Recording medium, recording medium reading/writing apparatus, and method of using recording medium
US20040243356A1 (en) * 2001-05-31 2004-12-02 Duffy Dominic Gavan Data processing apparatus and method
US20060075255A1 (en) * 2002-05-31 2006-04-06 Duffy Dominic G Biometric authentication system
US20060090114A1 (en) * 2002-05-31 2006-04-27 Duffy Dominic G Data processing apparatus and method
US20060158425A1 (en) * 2005-01-15 2006-07-20 International Business Machines Corporation Screen calibration for display devices
US20060242426A1 (en) * 2003-08-01 2006-10-26 Oliver Schreyer Configuring a network connection
US20070198436A1 (en) * 2006-02-21 2007-08-23 Weiss Kenneth P Method and apparatus for secure access payment and identification
US20080005576A1 (en) * 2001-03-16 2008-01-03 Weiss Kenneth P Universal secure registry
US20080069343A1 (en) * 2006-09-07 2008-03-20 International Business Machines Corporation Secure transmission of cryptographic key
US20080072063A1 (en) * 2006-09-06 2008-03-20 Kenta Takahashi Method for generating an encryption key using biometrics authentication and restoring the encryption key and personal authentication system
US20080178008A1 (en) * 2006-10-04 2008-07-24 Kenta Takahashi Biometric authentication system, enrollment terminal, authentication terminal and authentication server
US20080216147A1 (en) * 2004-06-10 2008-09-04 Scientific Generics Limited Data Processing Apparatus And Method
WO2008143531A1 (en) * 2007-05-24 2008-11-27 Turner Technologies Limited Messaging system
US20090007258A1 (en) * 2006-01-06 2009-01-01 Verichk Global Technologies Inc. Secure Access to Information Associated With a Value Item
US20090028329A1 (en) * 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US20090110192A1 (en) * 2007-10-30 2009-04-30 General Electric Company Systems and methods for encrypting patient data
US20090292641A1 (en) * 2007-02-21 2009-11-26 Weiss Kenneth P Universal secure registry
US20090327732A1 (en) * 2003-03-04 2009-12-31 Peter Buhler Long-term secure digital signatures
DE102008002588A1 (en) * 2008-05-15 2010-02-04 Compugroup Holding Ag A method for generating an asymmetric cryptographic key pair and its application
US20100039218A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for transmitting illusory and non-illusory identification characteristics
US20100042669A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for modifying illusory user identification characteristics
US20100138668A1 (en) * 2007-07-03 2010-06-03 Nds Limited Content delivery system
US20100318595A1 (en) * 2008-08-14 2010-12-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for conditionally transmitting one or more locum tenentes
US20110022847A1 (en) * 2001-02-14 2011-01-27 Dominic Gavan Duffy Data processing apparatus and method
US20110041061A1 (en) * 2008-08-14 2011-02-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user
US20110041185A1 (en) * 2008-08-14 2011-02-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user
US20110083010A1 (en) * 2008-08-14 2011-04-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US20110081018A1 (en) * 2008-08-14 2011-04-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity
US20110093806A1 (en) * 2008-08-14 2011-04-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity
US20110110518A1 (en) * 2008-08-14 2011-05-12 Searete Llc Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
US20110131409A1 (en) * 2008-08-14 2011-06-02 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US20110154020A1 (en) * 2008-08-14 2011-06-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20110161217A1 (en) * 2008-08-14 2011-06-30 Searete Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements
US20110166972A1 (en) * 2008-08-14 2011-07-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally obfuscating one or more secret entities with respect to one or more billing statements
US20110166973A1 (en) * 2008-08-14 2011-07-07 Searete Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US20110173440A1 (en) * 2008-08-14 2011-07-14 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20110188709A1 (en) * 2010-02-01 2011-08-04 Gaurav Gupta Method and system of accounting for positional variability of biometric features
US7996683B2 (en) 2001-10-01 2011-08-09 Genkey As System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
US8041956B1 (en) 2010-08-16 2011-10-18 Daon Holdings Limited Method and system for biometric authentication
US20110264919A1 (en) * 2010-02-17 2011-10-27 Ceelox, Inc. Dynamic seed and key generation from biometric indicia
US20120303422A1 (en) * 2011-05-27 2012-11-29 Diran Li Computer-Implemented Systems And Methods For Ranking Results Based On Voting And Filtering
DE102005033228B4 (en) * 2005-07-15 2013-05-29 Siemens Enterprise Communications Gmbh & Co. Kg Method and security system for securing a data transmission in a communication system
US20130283062A1 (en) * 2012-04-23 2013-10-24 International Business Machines Corporation Preserving redundancy in data deduplication systems by encryption
US8583553B2 (en) 2008-08-14 2013-11-12 The Invention Science Fund I, Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US8613052B2 (en) 2010-09-17 2013-12-17 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
US8626848B2 (en) 2008-08-14 2014-01-07 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity
WO2014071704A1 (en) * 2012-11-07 2014-05-15 鹤山世达光电科技有限公司 Works transmission method and system
US8850044B2 (en) 2008-08-14 2014-09-30 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity
JP2015537483A (en) * 2012-12-03 2015-12-24 鶴山世達光電科技有限公司 Drawing management system and drawing management method by fingerprint authentication
US9262428B2 (en) 2012-04-23 2016-02-16 International Business Machines Corporation Preserving redundancy in data deduplication systems by designation of virtual address
US20160234174A1 (en) * 2015-02-04 2016-08-11 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
US20160306954A1 (en) * 2013-12-02 2016-10-20 Identity Authentication Management Methods and systems for multi-key veritable biometric identity authentication
US9590986B2 (en) 2015-02-04 2017-03-07 Aerendir Mobile Inc. Local user authentication with neuro and neuro-mechanical fingerprints
US9591537B1 (en) * 2008-05-19 2017-03-07 Sprint Spectrum L.P. Method and system for handoffs between public and private networks
US9779103B2 (en) 2012-04-23 2017-10-03 International Business Machines Corporation Preserving redundancy in data deduplication systems
US10133747B2 (en) 2012-04-23 2018-11-20 International Business Machines Corporation Preserving redundancy in data deduplication systems by designation of virtual device
US10148430B1 (en) * 2013-04-17 2018-12-04 Amazon Technologies, Inc Revocable stream ciphers for upgrading encryption in a shared resource environment
US10733415B1 (en) * 2015-06-08 2020-08-04 Cross Match Technologies, Inc. Transformed representation for fingerprint data with high recognition accuracy
WO2020167274A1 (en) * 2019-02-12 2020-08-20 Turkcell Teknoloji̇ Araştirma Ve Geli̇şti̇rme Anoni̇m Şi̇rketi̇ A document signing system
US11227676B2 (en) 2006-02-21 2022-01-18 Universal Secure Registry, Llc Universal secure registry
US11244526B2 (en) 2015-02-04 2022-02-08 Proprius Technologies S.A.R.L. Keyless access control with neuro and neuromechanical fingerprints

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070050303A1 (en) * 2005-08-24 2007-03-01 Schroeder Dale W Biometric identification device
US9172529B2 (en) * 2011-09-16 2015-10-27 Certicom Corp. Hybrid encryption schemes
US9736122B2 (en) 2015-09-02 2017-08-15 International Business Machines Corporation Bluesalt security
US9626549B1 (en) 2015-11-16 2017-04-18 MorphoTrak, LLC Derived virtual quality parameters for fingerprint matching
US10198613B2 (en) * 2016-09-09 2019-02-05 MorphoTrak, LLC Latent fingerprint pattern estimation
WO2019231252A1 (en) 2018-05-31 2019-12-05 Samsung Electronics Co., Ltd. Electronic device for authenticating user and operating method thereof
US11138409B1 (en) * 2020-09-02 2021-10-05 Tokenize, Inc. Biometric recognition and security system

Citations (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4109237A (en) * 1977-01-17 1978-08-22 Hill Robert B Apparatus and method for identifying individuals through their retinal vasculature patterns
US4135147A (en) * 1976-09-10 1979-01-16 Rockwell International Corporation Minutiae pattern matcher
US4187392A (en) * 1962-06-08 1980-02-05 American Standard Inc. Synchronous universal binary scrambler
US4316055A (en) * 1976-12-30 1982-02-16 International Business Machines Corporation Stream/block cipher crytographic system
US4641349A (en) * 1985-02-20 1987-02-03 Leonard Flom Iris recognition system
US4805222A (en) * 1985-12-23 1989-02-14 International Bioaccess Systems Corporation Method and apparatus for verifying an individual's identity
US5067162A (en) * 1986-06-30 1991-11-19 Identix Incorporated Method and apparatus for verifying identity using image correlation
US5291560A (en) * 1991-07-15 1994-03-01 Iri Scan Incorporated Biometric personal identification system based on iris analysis
US5347580A (en) * 1992-04-23 1994-09-13 International Business Machines Corporation Authentication method and system with a smartcard
US5497430A (en) * 1994-11-07 1996-03-05 Physical Optics Corporation Method and apparatus for image recognition using invariant feature signals
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5680460A (en) * 1994-09-07 1997-10-21 Mytec Technologies, Inc. Biometric controlled key generation
US5680470A (en) * 1993-12-17 1997-10-21 Moussa; Ali Mohammed Method of automated signature verification
US5712807A (en) * 1987-10-21 1998-01-27 Bangham; James Andrew Pulse analyzing method and apparatus
US5933516A (en) * 1997-08-07 1999-08-03 Lockheed Martin Corp. Fingerprint matching by estimation of a maximum clique
US5991408A (en) * 1997-05-16 1999-11-23 Veridicom, Inc. Identification and security using biometric measurements
US6035398A (en) * 1997-11-14 2000-03-07 Digitalpersona, Inc. Cryptographic key generation using biometric data
US6038315A (en) * 1997-03-17 2000-03-14 The Regents Of The University Of California Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy
US6067369A (en) * 1996-12-16 2000-05-23 Nec Corporation Image feature extractor and an image feature analyzer
US6078667A (en) * 1996-10-10 2000-06-20 Certicom Corp. Generating unique and unpredictable values
US6098330A (en) * 1997-05-16 2000-08-08 Authentec, Inc. Machine including vibration and shock resistant fingerprint sensor and related methods
US6154285A (en) * 1998-12-21 2000-11-28 Secugen Corporation Surface treatment for optical image capturing system
US6170073B1 (en) * 1996-03-29 2001-01-02 Nokia Mobile Phones (Uk) Limited Method and apparatus for error detection in digital communications
US6185316B1 (en) * 1997-11-12 2001-02-06 Unisys Corporation Self-authentication apparatus and method
US6202151B1 (en) * 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
US6219794B1 (en) * 1997-04-21 2001-04-17 Mytec Technologies, Inc. Method for secure key management using a biometric
US20010025342A1 (en) * 2000-02-03 2001-09-27 Kaoru Uchida Biometric identification method and system
US6330674B1 (en) * 1998-09-30 2001-12-11 Compaq Computer Corporation Use of biometrics as a methodology for defining components for ECC encryption
US6363485B1 (en) * 1998-09-09 2002-03-26 Entrust Technologies Limited Multi-factor biometric authenticating device and method
US20020056040A1 (en) * 2000-08-10 2002-05-09 Timothy J. Simms System and method for establishing secure communication
US20020124176A1 (en) * 1998-12-14 2002-09-05 Michael Epstein Biometric identification mechanism that preserves the integrity of the biometric information
US20020174347A1 (en) * 2001-05-18 2002-11-21 Imprivata, Inc. Authentication with variable biometric templates
US20020199103A1 (en) * 2000-10-11 2002-12-26 Dube Roger R. Method and apparatus for real-time digital certification of electronic files and transactions using entropy factors
US6567765B1 (en) * 2000-08-17 2003-05-20 Siemens Corporate Research, Inc. Evaluation system and method for fingerprint verification
US20030179909A1 (en) * 2002-02-14 2003-09-25 Wong Jacob Y. Personal choice biometric signature
US20030204732A1 (en) * 2002-04-30 2003-10-30 Yves Audebert System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients
US20030217264A1 (en) * 2002-05-14 2003-11-20 Signitas Corporation System and method for providing a secure environment during the use of electronic documents and data
US6678821B1 (en) * 2000-03-23 2004-01-13 E-Witness Inc. Method and system for restricting access to the private key of a user in a public key infrastructure
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
US20040107367A1 (en) * 2001-02-09 2004-06-03 Friedrich Kisters Method, arrangement and secure medium for authentication of a user
US20040128502A1 (en) * 2002-12-30 2004-07-01 American Express Travel Related Services Company, Inc. Methods and apparatus for credential validation
US20040218762A1 (en) * 2003-04-29 2004-11-04 Eric Le Saint Universal secure messaging for cryptographic modules
US20040243356A1 (en) * 2001-05-31 2004-12-02 Duffy Dominic Gavan Data processing apparatus and method
US20050021954A1 (en) * 2003-05-23 2005-01-27 Hsiang-Tsung Kung Personal authentication device and system and method thereof
US20050075255A1 (en) * 1997-05-22 2005-04-07 The Procter & Gamble Company Methods of cleansing skin or hair with cleansing articles
US6901145B1 (en) * 1999-04-08 2005-05-31 Lucent Technologies Inc. Generation of repeatable cryptographic key based on varying parameters
US6940976B1 (en) * 1999-06-02 2005-09-06 International Business Machines Corporation Generating user-dependent RSA keys
US6957337B1 (en) * 1999-08-11 2005-10-18 International Business Machines Corporation Method and apparatus for secure authorization and identification using biometrics without privacy invasion
US6959874B2 (en) * 2001-02-23 2005-11-01 Bardwell William E Biometric identification system using biometric images and personal identification number stored on a magnetic stripe and associated methods
US20050246763A1 (en) * 2004-03-25 2005-11-03 National University Of Ireland Secure digital content reproduction using biometrically derived hybrid encryption techniques
US6968459B1 (en) * 1999-12-15 2005-11-22 Imation Corp. Computing environment having secure storage device
US20060083372A1 (en) * 2004-10-15 2006-04-20 Industrial Technology Research Institute Biometrics-based cryptographic key generation system and method
US20060090114A1 (en) * 2002-05-31 2006-04-27 Duffy Dominic G Data processing apparatus and method
US7046829B2 (en) * 2001-05-30 2006-05-16 International Business Machines Corporation Fingerprint verification
US20060153369A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing cryptographic key based on user input data
US20060198514A1 (en) * 2001-10-01 2006-09-07 Jorn Lyseggen System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
US20060227974A1 (en) * 2005-03-30 2006-10-12 Attila Haraszti Encryption and decryption method
US7200549B1 (en) * 1999-06-21 2007-04-03 Fujitsu Limited Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information
US7274804B2 (en) * 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for hashing data
US20080216147A1 (en) * 2004-06-10 2008-09-04 Scientific Generics Limited Data Processing Apparatus And Method
US7526653B1 (en) * 1999-08-25 2009-04-28 Giesecke & Devrient Gmbh Method of data protection

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19715644A1 (en) * 1997-04-15 1998-10-22 Iks Gmbh Information Kommunika Identity verification procedures
US6148387A (en) * 1997-10-09 2000-11-14 Phoenix Technologies, Ltd. System and method for securely utilizing basic input and output system (BIOS) services
US6751729B1 (en) * 1998-07-24 2004-06-15 Spatial Adventures, Inc. Automated operation and security system for virtual private networks
EP1112554A1 (en) * 1998-09-07 2001-07-04 Kent Ridge Digital Labs A method of and apparatus for generation of a key
US6337910B1 (en) * 1998-09-09 2002-01-08 Koninklijke Philips Electronics N.V. (Kpenv) Method and apparatus for generating one time pads simultaneously in separate encryption/decryption systems
US6154543A (en) * 1998-11-25 2000-11-28 Hush Communications Anguilla, Inc. Public key cryptosystem with roaming user capability
EP1101319B1 (en) * 1999-05-27 2005-08-17 Koninklijke Philips Electronics N.V. Method and apparatus for secure creation of public/private key pairs
US20010034836A1 (en) * 2000-01-31 2001-10-25 Netmarks Inc. System for secure certification of network
GB0003920D0 (en) * 2000-02-21 2000-04-05 Ncipher Corp Limited Computer system
US7234060B1 (en) * 2000-07-11 2007-06-19 Amdur Eugene Generation and use of digital signatures
US20020095573A1 (en) * 2001-01-16 2002-07-18 O'brien William G. Method and apparatus for authenticated dial-up access to command controllable equipment
US20040111625A1 (en) * 2001-02-14 2004-06-10 Duffy Dominic Gavan Data processing apparatus and method
JP2003317070A (en) * 2002-04-23 2003-11-07 Ntt Docomo Inc Ic card, mobile terminal, and access control method
WO2007145687A1 (en) * 2006-02-21 2007-12-21 Weiss Kenneth P Method and apparatus for secure access payment and identification

Patent Citations (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4187392A (en) * 1962-06-08 1980-02-05 American Standard Inc. Synchronous universal binary scrambler
US4135147A (en) * 1976-09-10 1979-01-16 Rockwell International Corporation Minutiae pattern matcher
US4316055A (en) * 1976-12-30 1982-02-16 International Business Machines Corporation Stream/block cipher crytographic system
US4109237A (en) * 1977-01-17 1978-08-22 Hill Robert B Apparatus and method for identifying individuals through their retinal vasculature patterns
US4641349A (en) * 1985-02-20 1987-02-03 Leonard Flom Iris recognition system
US4805222A (en) * 1985-12-23 1989-02-14 International Bioaccess Systems Corporation Method and apparatus for verifying an individual's identity
US5067162A (en) * 1986-06-30 1991-11-19 Identix Incorporated Method and apparatus for verifying identity using image correlation
US5712807A (en) * 1987-10-21 1998-01-27 Bangham; James Andrew Pulse analyzing method and apparatus
US5291560A (en) * 1991-07-15 1994-03-01 Iri Scan Incorporated Biometric personal identification system based on iris analysis
US5347580A (en) * 1992-04-23 1994-09-13 International Business Machines Corporation Authentication method and system with a smartcard
US5680470A (en) * 1993-12-17 1997-10-21 Moussa; Ali Mohammed Method of automated signature verification
US5832091A (en) * 1994-09-07 1998-11-03 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5680460A (en) * 1994-09-07 1997-10-21 Mytec Technologies, Inc. Biometric controlled key generation
US5497430A (en) * 1994-11-07 1996-03-05 Physical Optics Corporation Method and apparatus for image recognition using invariant feature signals
US6170073B1 (en) * 1996-03-29 2001-01-02 Nokia Mobile Phones (Uk) Limited Method and apparatus for error detection in digital communications
US6078667A (en) * 1996-10-10 2000-06-20 Certicom Corp. Generating unique and unpredictable values
US6067369A (en) * 1996-12-16 2000-05-23 Nec Corporation Image feature extractor and an image feature analyzer
US6038315A (en) * 1997-03-17 2000-03-14 The Regents Of The University Of California Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy
US6219794B1 (en) * 1997-04-21 2001-04-17 Mytec Technologies, Inc. Method for secure key management using a biometric
US6202151B1 (en) * 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
US5991408A (en) * 1997-05-16 1999-11-23 Veridicom, Inc. Identification and security using biometric measurements
US6098330A (en) * 1997-05-16 2000-08-08 Authentec, Inc. Machine including vibration and shock resistant fingerprint sensor and related methods
US20050075255A1 (en) * 1997-05-22 2005-04-07 The Procter & Gamble Company Methods of cleansing skin or hair with cleansing articles
US5933516A (en) * 1997-08-07 1999-08-03 Lockheed Martin Corp. Fingerprint matching by estimation of a maximum clique
US6185316B1 (en) * 1997-11-12 2001-02-06 Unisys Corporation Self-authentication apparatus and method
US6035398A (en) * 1997-11-14 2000-03-07 Digitalpersona, Inc. Cryptographic key generation using biometric data
US6363485B1 (en) * 1998-09-09 2002-03-26 Entrust Technologies Limited Multi-factor biometric authenticating device and method
US6330674B1 (en) * 1998-09-30 2001-12-11 Compaq Computer Corporation Use of biometrics as a methodology for defining components for ECC encryption
US20020124176A1 (en) * 1998-12-14 2002-09-05 Michael Epstein Biometric identification mechanism that preserves the integrity of the biometric information
US6154285A (en) * 1998-12-21 2000-11-28 Secugen Corporation Surface treatment for optical image capturing system
US6901145B1 (en) * 1999-04-08 2005-05-31 Lucent Technologies Inc. Generation of repeatable cryptographic key based on varying parameters
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
US6940976B1 (en) * 1999-06-02 2005-09-06 International Business Machines Corporation Generating user-dependent RSA keys
US7200549B1 (en) * 1999-06-21 2007-04-03 Fujitsu Limited Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information
US6957337B1 (en) * 1999-08-11 2005-10-18 International Business Machines Corporation Method and apparatus for secure authorization and identification using biometrics without privacy invasion
US7526653B1 (en) * 1999-08-25 2009-04-28 Giesecke & Devrient Gmbh Method of data protection
US6968459B1 (en) * 1999-12-15 2005-11-22 Imation Corp. Computing environment having secure storage device
US20010025342A1 (en) * 2000-02-03 2001-09-27 Kaoru Uchida Biometric identification method and system
US6678821B1 (en) * 2000-03-23 2004-01-13 E-Witness Inc. Method and system for restricting access to the private key of a user in a public key infrastructure
US20020056040A1 (en) * 2000-08-10 2002-05-09 Timothy J. Simms System and method for establishing secure communication
US6567765B1 (en) * 2000-08-17 2003-05-20 Siemens Corporate Research, Inc. Evaluation system and method for fingerprint verification
US20020199103A1 (en) * 2000-10-11 2002-12-26 Dube Roger R. Method and apparatus for real-time digital certification of electronic files and transactions using entropy factors
US20040107367A1 (en) * 2001-02-09 2004-06-03 Friedrich Kisters Method, arrangement and secure medium for authentication of a user
US6959874B2 (en) * 2001-02-23 2005-11-01 Bardwell William E Biometric identification system using biometric images and personal identification number stored on a magnetic stripe and associated methods
US20020174347A1 (en) * 2001-05-18 2002-11-21 Imprivata, Inc. Authentication with variable biometric templates
US7046829B2 (en) * 2001-05-30 2006-05-16 International Business Machines Corporation Fingerprint verification
US20040243356A1 (en) * 2001-05-31 2004-12-02 Duffy Dominic Gavan Data processing apparatus and method
US20060198514A1 (en) * 2001-10-01 2006-09-07 Jorn Lyseggen System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
US20030179909A1 (en) * 2002-02-14 2003-09-25 Wong Jacob Y. Personal choice biometric signature
US20030204732A1 (en) * 2002-04-30 2003-10-30 Yves Audebert System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients
US20030217264A1 (en) * 2002-05-14 2003-11-20 Signitas Corporation System and method for providing a secure environment during the use of electronic documents and data
US7274804B2 (en) * 2002-05-30 2007-09-25 Activcard Ireland Limited Method and apparatus for hashing data
US20060090114A1 (en) * 2002-05-31 2006-04-27 Duffy Dominic G Data processing apparatus and method
US20040128502A1 (en) * 2002-12-30 2004-07-01 American Express Travel Related Services Company, Inc. Methods and apparatus for credential validation
US20040218762A1 (en) * 2003-04-29 2004-11-04 Eric Le Saint Universal secure messaging for cryptographic modules
US20050021954A1 (en) * 2003-05-23 2005-01-27 Hsiang-Tsung Kung Personal authentication device and system and method thereof
US20050246763A1 (en) * 2004-03-25 2005-11-03 National University Of Ireland Secure digital content reproduction using biometrically derived hybrid encryption techniques
US20080216147A1 (en) * 2004-06-10 2008-09-04 Scientific Generics Limited Data Processing Apparatus And Method
US20060083372A1 (en) * 2004-10-15 2006-04-20 Industrial Technology Research Institute Biometrics-based cryptographic key generation system and method
US20060153369A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing cryptographic key based on user input data
US20060227974A1 (en) * 2005-03-30 2006-10-12 Attila Haraszti Encryption and decryption method

Cited By (126)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8607056B2 (en) * 2001-02-14 2013-12-10 Genkey Netherlands B.V. Data processing apparatus and method
US20110022847A1 (en) * 2001-02-14 2011-01-27 Dominic Gavan Duffy Data processing apparatus and method
US9754250B2 (en) 2001-03-16 2017-09-05 Universal Secure Registry, Llc Universal secure registry
US10885504B2 (en) 2001-03-16 2021-01-05 Universal Secure Registry, Llc Universal secure registry
US10636023B2 (en) 2001-03-16 2020-04-28 Universal Secure Registry, Llc Universal secure registry
US10636022B2 (en) 2001-03-16 2020-04-28 Universal Secure Registry, Llc Universal secure registry
US9947000B2 (en) 2001-03-16 2018-04-17 Universal Secure Registry, Llc Universal secure registry
US8856539B2 (en) 2001-03-16 2014-10-07 Universal Secure Registry, Llc Universal secure registry
US9928495B2 (en) 2001-03-16 2018-03-27 Universal Secure Registry, Llc Universal secure registry
US20080005576A1 (en) * 2001-03-16 2008-01-03 Weiss Kenneth P Universal secure registry
US8229177B2 (en) 2001-05-31 2012-07-24 Fountain Venture As Data processing apparatus and method
US20040243356A1 (en) * 2001-05-31 2004-12-02 Duffy Dominic Gavan Data processing apparatus and method
US7996683B2 (en) 2001-10-01 2011-08-09 Genkey As System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
US20030172279A1 (en) * 2002-03-11 2003-09-11 Seiko Epson Corporation Recording medium, recording medium reading/writing apparatus, and method of using recording medium
US7647505B2 (en) * 2002-03-11 2010-01-12 Seiko Epson Corporation Recording medium, recording medium reading/writing apparatus, and method of using recording medium
US7882363B2 (en) 2002-05-31 2011-02-01 Fountain Venture As Biometric authentication system
US20060090114A1 (en) * 2002-05-31 2006-04-27 Duffy Dominic G Data processing apparatus and method
US20060075255A1 (en) * 2002-05-31 2006-04-06 Duffy Dominic G Biometric authentication system
US8271791B2 (en) * 2003-03-04 2012-09-18 International Business Machines Corporation Long-term secure digital signatures
US20090327732A1 (en) * 2003-03-04 2009-12-31 Peter Buhler Long-term secure digital signatures
US20060242426A1 (en) * 2003-08-01 2006-10-26 Oliver Schreyer Configuring a network connection
US20080216147A1 (en) * 2004-06-10 2008-09-04 Scientific Generics Limited Data Processing Apparatus And Method
US8572673B2 (en) 2004-06-10 2013-10-29 Dominic Gavan Duffy Data processing apparatus and method
US7593024B2 (en) * 2005-01-15 2009-09-22 International Business Machines Corporation Screen calibration for display devices
US20060158425A1 (en) * 2005-01-15 2006-07-20 International Business Machines Corporation Screen calibration for display devices
DE102005033228B4 (en) * 2005-07-15 2013-05-29 Siemens Enterprise Communications Gmbh & Co. Kg Method and security system for securing a data transmission in a communication system
US20090007258A1 (en) * 2006-01-06 2009-01-01 Verichk Global Technologies Inc. Secure Access to Information Associated With a Value Item
US9397837B2 (en) * 2006-01-06 2016-07-19 Sicpa Holding Sa Secure access to information associated with a value item
US11227676B2 (en) 2006-02-21 2022-01-18 Universal Secure Registry, Llc Universal secure registry
US9100826B2 (en) 2006-02-21 2015-08-04 Universal Secure Registry, Llc Method and apparatus for secure access payment and identification
US8577813B2 (en) 2006-02-21 2013-11-05 Universal Secure Registry, Llc Universal secure registry
US7805372B2 (en) 2006-02-21 2010-09-28 Weiss Kenneth P Universal secure registry
US7809651B2 (en) * 2006-02-21 2010-10-05 Weiss Kenneth P Universal secure registry
US9530137B2 (en) 2006-02-21 2016-12-27 Universal Secure Registry, Llc Method and apparatus for secure access payment and identification
US10163103B2 (en) 2006-02-21 2018-12-25 Universal Secure Registry, Llc Method and apparatus for secure access payment and identification
US10733607B2 (en) 2006-02-21 2020-08-04 Universal Secure Registry, Llc Universal secure registry
US8538881B2 (en) 2006-02-21 2013-09-17 Universal Secure Registry, Llc Method and apparatus for secure access payment and identification
US10832245B2 (en) 2006-02-21 2020-11-10 Univsersal Secure Registry, Llc Universal secure registry
US20070289000A1 (en) * 2006-02-21 2007-12-13 Weiss Kenneth P Universal secure registry
US8271397B2 (en) 2006-02-21 2012-09-18 Universal Secure Registry, Llc Method and apparatus for secure access, payment and identification
US20070288758A1 (en) * 2006-02-21 2007-12-13 Weiss Kenneth P Universal secure registry
US20070198436A1 (en) * 2006-02-21 2007-08-23 Weiss Kenneth P Method and apparatus for secure access payment and identification
US8001055B2 (en) 2006-02-21 2011-08-16 Weiss Kenneth P Method, system and apparatus for secure access, payment and identification
US8417960B2 (en) * 2006-09-06 2013-04-09 Hitachi, Ltd. Method for generating an encryption key using biometrics authentication and restoring the encryption key and personal authentication system
US20080072063A1 (en) * 2006-09-06 2008-03-20 Kenta Takahashi Method for generating an encryption key using biometrics authentication and restoring the encryption key and personal authentication system
US7751559B2 (en) * 2006-09-07 2010-07-06 International Business Machines Corporation Secure transmission of cryptographic key
US20080069343A1 (en) * 2006-09-07 2008-03-20 International Business Machines Corporation Secure transmission of cryptographic key
US8443201B2 (en) * 2006-10-04 2013-05-14 Hitachi, Ltd. Biometric authentication system, enrollment terminal, authentication terminal and authentication server
US20080178008A1 (en) * 2006-10-04 2008-07-24 Kenta Takahashi Biometric authentication system, enrollment terminal, authentication terminal and authentication server
US8234220B2 (en) 2007-02-21 2012-07-31 Weiss Kenneth P Universal secure registry
US20090292641A1 (en) * 2007-02-21 2009-11-26 Weiss Kenneth P Universal secure registry
WO2008143531A1 (en) * 2007-05-24 2008-11-27 Turner Technologies Limited Messaging system
US20100138668A1 (en) * 2007-07-03 2010-06-03 Nds Limited Content delivery system
US8347106B2 (en) * 2007-07-03 2013-01-01 Nds Limited Method and apparatus for user authentication based on a user eye characteristic
US20090028078A1 (en) * 2007-07-23 2009-01-29 Savi Technology, Inc. Method and apparatus for providing security in a radio frequency identification system
US20090028337A1 (en) * 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US8204225B2 (en) 2007-07-23 2012-06-19 Savi Technology, Inc. Method and apparatus for providing security in a radio frequency identification system
US20090028334A1 (en) * 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US20090028329A1 (en) * 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US8116454B2 (en) 2007-07-23 2012-02-14 Savi Technology, Inc. Method and apparatus for providing security in a radio frequency identification system
US8547957B2 (en) 2007-07-23 2013-10-01 Savi Technology, Inc. Method and apparatus for providing security in a radio frequency identification system
US20090110192A1 (en) * 2007-10-30 2009-04-30 General Electric Company Systems and methods for encrypting patient data
DE102008002588B4 (en) * 2008-05-15 2010-06-02 Compugroup Holding Ag A method for generating an asymmetric cryptographic key pair and its application
DE102008002588A1 (en) * 2008-05-15 2010-02-04 Compugroup Holding Ag A method for generating an asymmetric cryptographic key pair and its application
US9591537B1 (en) * 2008-05-19 2017-03-07 Sprint Spectrum L.P. Method and system for handoffs between public and private networks
US20110110518A1 (en) * 2008-08-14 2011-05-12 Searete Llc Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
US20100039218A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for transmitting illusory and non-illusory identification characteristics
US20110166972A1 (en) * 2008-08-14 2011-07-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally obfuscating one or more secret entities with respect to one or more billing statements
US20100318595A1 (en) * 2008-08-14 2010-12-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for conditionally transmitting one or more locum tenentes
US20110041185A1 (en) * 2008-08-14 2011-02-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user
US8583553B2 (en) 2008-08-14 2013-11-12 The Invention Science Fund I, Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US20110083010A1 (en) * 2008-08-14 2011-04-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US20110081018A1 (en) * 2008-08-14 2011-04-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity
US8626848B2 (en) 2008-08-14 2014-01-07 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity
US20110093806A1 (en) * 2008-08-14 2011-04-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating reception of communiqué affiliated with a source entity
US8730836B2 (en) 2008-08-14 2014-05-20 The Invention Science Fund I, Llc Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US20110041061A1 (en) * 2008-08-14 2011-02-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user
US8850044B2 (en) 2008-08-14 2014-09-30 The Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity
US20110131409A1 (en) * 2008-08-14 2011-06-02 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
US8929208B2 (en) 2008-08-14 2015-01-06 The Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20110154020A1 (en) * 2008-08-14 2011-06-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20110166973A1 (en) * 2008-08-14 2011-07-07 Searete Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
US20110173440A1 (en) * 2008-08-14 2011-07-14 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US9659188B2 (en) 2008-08-14 2017-05-23 Invention Science Fund I, Llc Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use
US20100042669A1 (en) * 2008-08-14 2010-02-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware System and method for modifying illusory user identification characteristics
US20110161217A1 (en) * 2008-08-14 2011-06-30 Searete Llc Conditionally obfuscating one or more secret entities with respect to one or more billing statements
US9641537B2 (en) * 2008-08-14 2017-05-02 Invention Science Fund I, Llc Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
US20110188709A1 (en) * 2010-02-01 2011-08-04 Gaurav Gupta Method and system of accounting for positional variability of biometric features
US8520903B2 (en) 2010-02-01 2013-08-27 Daon Holdings Limited Method and system of accounting for positional variability of biometric features
US20150263857A1 (en) * 2010-02-17 2015-09-17 Ceelox Patents, LLC Dynamic seed and key generation from biometric indicia
US9160532B2 (en) * 2010-02-17 2015-10-13 Ceelox Patents, LLC Dynamic seed and key generation from biometric indicia
US20110264919A1 (en) * 2010-02-17 2011-10-27 Ceelox, Inc. Dynamic seed and key generation from biometric indicia
US8745405B2 (en) * 2010-02-17 2014-06-03 Ceelox Patents, LLC Dynamic seed and key generation from biometric indicia
US8041956B1 (en) 2010-08-16 2011-10-18 Daon Holdings Limited Method and system for biometric authentication
US8977861B2 (en) 2010-08-16 2015-03-10 Daon Holdings Limited Method and system for biometric authentication
US9531696B2 (en) 2010-09-17 2016-12-27 Universal Secure Registry, Llc Apparatus, system and method for secure payment
US8613052B2 (en) 2010-09-17 2013-12-17 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
US10616198B2 (en) 2010-09-17 2020-04-07 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
US20120303422A1 (en) * 2011-05-27 2012-11-29 Diran Li Computer-Implemented Systems And Methods For Ranking Results Based On Voting And Filtering
US8990581B2 (en) * 2012-04-23 2015-03-24 International Business Machines Corporation Preserving redundancy in data deduplication systems by encryption
US10152486B2 (en) 2012-04-23 2018-12-11 International Business Machines Corporation Preserving redundancy in data deduplication systems by designation of virtual device
US8996881B2 (en) * 2012-04-23 2015-03-31 International Business Machines Corporation Preserving redundancy in data deduplication systems by encryption
US9767113B2 (en) 2012-04-23 2017-09-19 International Business Machines Corporation Preserving redundancy in data deduplication systems by designation of virtual address
US9779103B2 (en) 2012-04-23 2017-10-03 International Business Machines Corporation Preserving redundancy in data deduplication systems
US9792450B2 (en) 2012-04-23 2017-10-17 International Business Machines Corporation Preserving redundancy in data deduplication systems by encryption
US9798734B2 (en) 2012-04-23 2017-10-24 International Business Machines Corporation Preserving redundancy in data deduplication systems by indicator
US9824228B2 (en) * 2012-04-23 2017-11-21 International Business Machines Corporation Preserving redundancy in data deduplication systems by encryption
US9262428B2 (en) 2012-04-23 2016-02-16 International Business Machines Corporation Preserving redundancy in data deduplication systems by designation of virtual address
US9268785B2 (en) 2012-04-23 2016-02-23 International Business Machines Corporation Preserving redundancy in data deduplication systems by designation of virtual address
US20130283062A1 (en) * 2012-04-23 2013-10-24 International Business Machines Corporation Preserving redundancy in data deduplication systems by encryption
US10133747B2 (en) 2012-04-23 2018-11-20 International Business Machines Corporation Preserving redundancy in data deduplication systems by designation of virtual device
US10691670B2 (en) 2012-04-23 2020-06-23 International Business Machines Corporation Preserving redundancy in data deduplication systems by indicator
US20150154411A1 (en) * 2012-04-23 2015-06-04 International Business Machines Corporation Preserving redundancy in data deduplication systems by encryption
WO2014071704A1 (en) * 2012-11-07 2014-05-15 鹤山世达光电科技有限公司 Works transmission method and system
JP2015537483A (en) * 2012-12-03 2015-12-24 鶴山世達光電科技有限公司 Drawing management system and drawing management method by fingerprint authentication
US10735186B2 (en) 2013-04-17 2020-08-04 Amazon Technologies, Inc. Revocable stream ciphers for upgrading encryption in a shared resource environment
US10148430B1 (en) * 2013-04-17 2018-12-04 Amazon Technologies, Inc Revocable stream ciphers for upgrading encryption in a shared resource environment
US20160306954A1 (en) * 2013-12-02 2016-10-20 Identity Authentication Management Methods and systems for multi-key veritable biometric identity authentication
US9577992B2 (en) * 2015-02-04 2017-02-21 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
US20170111359A1 (en) * 2015-02-04 2017-04-20 Aerendir Mobile Inc. Data encryption/decryption using neurological fingerprints
US9853976B2 (en) * 2015-02-04 2017-12-26 Proprius Technologies S.A.R.L. Data encryption/decryption using neurological fingerprints
US9590986B2 (en) 2015-02-04 2017-03-07 Aerendir Mobile Inc. Local user authentication with neuro and neuro-mechanical fingerprints
US20160234174A1 (en) * 2015-02-04 2016-08-11 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
US11244526B2 (en) 2015-02-04 2022-02-08 Proprius Technologies S.A.R.L. Keyless access control with neuro and neuromechanical fingerprints
US10733415B1 (en) * 2015-06-08 2020-08-04 Cross Match Technologies, Inc. Transformed representation for fingerprint data with high recognition accuracy
WO2020167274A1 (en) * 2019-02-12 2020-08-20 Turkcell Teknoloji̇ Araştirma Ve Geli̇şti̇rme Anoni̇m Şi̇rketi̇ A document signing system

Also Published As

Publication number Publication date
WO2002065693A2 (en) 2002-08-22
EP1366595A2 (en) 2003-12-03
US20110022847A1 (en) 2011-01-27
WO2002065693A3 (en) 2003-02-27
EP1366595B1 (en) 2018-11-14
AU2002229972A1 (en) 2002-08-28
US8607056B2 (en) 2013-12-10

Similar Documents

Publication Publication Date Title
US8607056B2 (en) Data processing apparatus and method
US10594688B2 (en) Privacy-enhanced biometrics-secret binding scheme
US9621342B2 (en) System and method for hierarchical cryptographic key generation using biometric data
US6553494B1 (en) Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document
US8838990B2 (en) Bio-cryptography: secure cryptographic protocols with bipartite biotokens
US6185316B1 (en) Self-authentication apparatus and method
US7131009B2 (en) Multiple factor-based user identification and authentication
JP3743246B2 (en) Biometric input device and biometric verification device
US8670562B2 (en) Generation and use of a biometric key
EP1520369B1 (en) Biometric authentication system
US8281148B2 (en) Securely computing a similarity measure
Mariño et al. A crypto-biometric scheme based on iris-templates with fuzzy extractors
US7017182B2 (en) Method of securely transmitting information
EP1402681A2 (en) Application-specific biometric templates
EP1832036A2 (en) Method and device for key generation and proving authenticity
KR20070052296A (en) Feature extraction algorithm for automatic ear recognition
Braithwaite et al. Application-specific biometric templates
US7937590B2 (en) Secure identification with biometric data
Chiou Secure method for biometric-based recognition with integrated cryptographic functions
US20070106903A1 (en) Multiple Factor-Based User Identification and Authentication
US20020017781A1 (en) Seat belt guide
Reddy et al. Authentication using fuzzy vault based on iris textures
Theodorakis Secure and Privacy-Preserving User Authentication Using Biometrics
Θεοδωράκης Secure and privacy-preserving user authentication using biometrics
Sarier Security analysis of revocable and bipartite biotokens

Legal Events

Date Code Title Description
AS Assignment

Owner name: SCIENTIFIC GENERICS LIMITED, GREAT BRITAIN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DUFFY, DOMINIC GAVAN;GOODWIN, CARL CHRISTOPHER;JONES, ALED WYNNE;AND OTHERS;REEL/FRAME:014874/0530;SIGNING DATES FROM 20031112 TO 20031218

AS Assignment

Owner name: FOUNTAIN VENTURE AS, NORWAY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SAGENTIA LIMITED;REEL/FRAME:019912/0200

Effective date: 20070920

Owner name: SAGENTIA LIMITED, UNITED KINGDOM

Free format text: CHANGE OF NAME;ASSIGNOR:SCIENTIFIC GENERICS LIMITED;REEL/FRAME:019912/0171

Effective date: 20061020

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION