GB201010257D0 - Bio-cryptography secure cryptographic protocols with bipartite biotokens - Google Patents

Bio-cryptography secure cryptographic protocols with bipartite biotokens

Info

Publication number
GB201010257D0
GB201010257D0 GB201010257A GB201010257A GB201010257D0 GB 201010257 D0 GB201010257 D0 GB 201010257D0 GB 201010257 A GB201010257 A GB 201010257A GB 201010257 A GB201010257 A GB 201010257A GB 201010257 D0 GB201010257 D0 GB 201010257D0
Authority
GB
United Kingdom
Prior art keywords
biotokens
bipartite
bio
cryptographic protocols
secure cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB201010257A
Other versions
GB2467884A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Colorado Boulder
Original Assignee
University of Colorado Boulder
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US458407P priority Critical
Priority to US12550208P priority
Application filed by University of Colorado Boulder filed Critical University of Colorado Boulder
Priority to PCT/US2008/013190 priority patent/WO2009073144A2/en
Publication of GB201010257D0 publication Critical patent/GB201010257D0/en
Publication of GB2467884A publication Critical patent/GB2467884A/en
Application status is Withdrawn legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • H04L9/0802
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
GB1010257A 2007-11-28 2008-11-26 Bio-cryptography secure cryptographic protocols with bipartite biotokens Withdrawn GB2467884A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US458407P true 2007-11-28 2007-11-28
US12550208P true 2008-04-25 2008-04-25
PCT/US2008/013190 WO2009073144A2 (en) 2007-11-28 2008-11-26 Bio-cryptography: secure cryptographic protocols with bipartite biotokens

Publications (2)

Publication Number Publication Date
GB201010257D0 true GB201010257D0 (en) 2010-07-21
GB2467884A GB2467884A (en) 2010-08-18

Family

ID=40718411

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1010257A Withdrawn GB2467884A (en) 2007-11-28 2008-11-26 Bio-cryptography secure cryptographic protocols with bipartite biotokens

Country Status (2)

Country Link
GB (1) GB2467884A (en)
WO (1) WO2009073144A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9336402B2 (en) 2010-09-13 2016-05-10 City University Of Hong Kong Secure data in removable storage devices via encryption token(s)
CN103607711B (en) * 2013-12-11 2017-01-04 北京交通大学 One kind of key distribution method for intelligent terminal location similarity Network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010039619A1 (en) * 2000-02-03 2001-11-08 Martine Lapere Speaker verification interface for secure transactions
US6754820B1 (en) * 2001-01-30 2004-06-22 Tecsec, Inc. Multiple level access system
AT329426T (en) * 2001-05-23 2006-06-15 Daniel Buettiker Methods and data media for registration of users of a public-key infrastructure and entry system
US7590861B2 (en) * 2002-08-06 2009-09-15 Privaris, Inc. Methods for secure enrollment and backup of personal identity credentials into electronic devices

Also Published As

Publication number Publication date
WO2009073144A2 (en) 2009-06-11
WO2009073144A3 (en) 2012-04-05
WO2009073144A8 (en) 2011-05-05
GB2467884A (en) 2010-08-18

Similar Documents

Publication Publication Date Title
IL180748A (en) Secure archive
GB0714578D0 (en) Viruses
TWI356763B (en) Molding-system lock
GB0708088D0 (en) Lock
GB0818200D0 (en) the key
TWI329698B (en) Lock
TWI327331B (en) Key
AU2007100499A4 (en) Cyber lock
TWM327898U (en) Lock
GB0720624D0 (en) Viral Modification
JP1999151232A5 (en)
JP1999188263A5 (en)
JP1999250377A5 (en)
JP1999210850A5 (en)
JP1999243512A5 (en)
JP1998290245A5 (en)
JP1998257100A5 (en)
JP1999195569A5 (en)
JP1999134294A5 (en)
JP1999072355A5 (en)
JP1999184267A5 (en)
JP1999194678A5 (en)
JP1999001033A5 (en)
JP1999110479A5 (en)
JP1998337313A5 (en)

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)