GB201010257D0 - Bio-cryptography secure cryptographic protocols with bipartite biotokens - Google Patents

Bio-cryptography secure cryptographic protocols with bipartite biotokens

Info

Publication number
GB201010257D0
GB201010257D0 GB201010257A GB201010257A GB201010257D0 GB 201010257 D0 GB201010257 D0 GB 201010257D0 GB 201010257 A GB201010257 A GB 201010257A GB 201010257 A GB201010257 A GB 201010257A GB 201010257 D0 GB201010257 D0 GB 201010257D0
Authority
GB
Grant status
Grant
Patent type
Prior art keywords
biotokens
bipartite
cryptography
bio
cryptographic protocols
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB201010257A
Other versions
GB2467884A (en )
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Colorado Boulder
Original Assignee
University of Colorado Boulder
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Grant date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • H04L9/0802
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
GB201010257A 2007-11-28 2008-11-26 Bio-cryptography secure cryptographic protocols with bipartite biotokens Withdrawn GB201010257D0 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US458407 true 2007-11-28 2007-11-28
US12550208 true 2008-04-25 2008-04-25
PCT/US2008/013190 WO2009073144A3 (en) 2007-11-28 2008-11-26 Bio-cryptography: secure cryptographic protocols with bipartite biotokens

Publications (2)

Publication Number Publication Date
GB201010257D0 true GB201010257D0 (en) 2010-07-21
GB2467884A true GB2467884A (en) 2010-08-18

Family

ID=40718411

Family Applications (1)

Application Number Title Priority Date Filing Date
GB201010257A Withdrawn GB201010257D0 (en) 2007-11-28 2008-11-26 Bio-cryptography secure cryptographic protocols with bipartite biotokens

Country Status (2)

Country Link
GB (1) GB201010257D0 (en)
WO (1) WO2009073144A3 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9336402B2 (en) 2010-09-13 2016-05-10 City University Of Hong Kong Secure data in removable storage devices via encryption token(s)
CN103607711B (en) * 2013-12-11 2017-01-04 北京交通大学 One kind of key distribution method for intelligent terminal location similarity Network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010039619A1 (en) * 2000-02-03 2001-11-08 Martine Lapere Speaker verification interface for secure transactions
US6754820B1 (en) * 2001-01-30 2004-06-22 Tecsec, Inc. Multiple level access system
DE60120369D1 (en) * 2001-05-23 2006-07-20 Daniel Buettiker Methods and media for registering users of a public key infrastructure and registration system
EP1529367A4 (en) * 2002-08-06 2011-08-03 Privaris Inc Methods for secure enrollment and backup of personal identity credentials into electronic devices

Also Published As

Publication number Publication date Type
WO2009073144A2 (en) 2009-06-11 application
WO2009073144A3 (en) 2012-04-05 application
WO2009073144A8 (en) 2011-05-05 application
GB2467884A (en) 2010-08-18 application

Similar Documents

Publication Publication Date Title
GB0818200D0 (en) the key
GB0709317D0 (en) Lock maechanism
GB0711426D0 (en) Lock
GB0724591D0 (en) Lock
GB0708088D0 (en) Lock
GB0716107D0 (en) Lock
JP1999513152T5 (en)
JP1999194678A5 (en)
JP1999163363A5 (en)
JP1999072355A5 (en)
JP2000122023A5 (en)
JP1999306391A5 (en)
JP2000197677A5 (en)
JP1999291471A5 (en)
JP2000036824A5 (en)
JP2000078558A5 (en)
JP2000076024A5 (en)
JP1999346486A5 (en)
JP1999210850A5 (en)
JP1999243512A5 (en)
JP1998257100A5 (en)
JP1999134294A5 (en)
JP1999288462A5 (en)
JP1999296675A5 (en)
JP1999513152A5 (en)

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)