US20180309750A1 - In-circuit security system and methods for controlling access to and use of sensitive data - Google Patents

In-circuit security system and methods for controlling access to and use of sensitive data Download PDF

Info

Publication number
US20180309750A1
US20180309750A1 US15/890,021 US201815890021A US2018309750A1 US 20180309750 A1 US20180309750 A1 US 20180309750A1 US 201815890021 A US201815890021 A US 201815890021A US 2018309750 A1 US2018309750 A1 US 2018309750A1
Authority
US
United States
Prior art keywords
electronic device
user
biometric information
access
authentication criteria
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/890,021
Inventor
Barry W. Johnson
Kristen R.O. Riemenschneider
David C. Russell
Jonathan A. Tillack
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple Inc filed Critical Apple Inc
Priority to US15/890,021 priority Critical patent/US20180309750A1/en
Publication of US20180309750A1 publication Critical patent/US20180309750A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • G06F17/3028
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • G06K9/00013
    • G06K9/00087
    • G06K9/6201
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • H04N21/4415Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card using biometric characteristics of the user, e.g. by voice recognition or fingerprint scanning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1076Revocation
    • G06F2221/0771

Definitions

  • the invention disclosed herein relates to the security of sensitive data stored, processed and distributed using electronic circuits. More particularly, the invention relates to the identification of individuals prior to accessing/using data, and the execution of security controls upon unauthorized attempts to access/use said data.
  • a growing number of electronic devices such as smart cards, are intended to specifically identify and authenticate users using the public key infrastructure, which requires secure storage of private keys. These devices are common in building security; for example, an individual with proper authorization to access a facility is assigned a smart card and an asymmetric key pair.
  • a certificate authority generates a digital certificate for the public key, which is stored in the smart card.
  • the private key is also stored on the smart card.
  • the card transmits its digital certificate, and the reader challenges the card to encrypt a supplied string with the individual's private key.
  • the reader obtains the public key out of the digital certificate and decrypts the private key-encrypted string to verify that the keys are related. This has an inherent problem because there is no guarantee that the individual using the private key is the assigned owner of the smart card. Furthermore, it is fairly simple for an experienced attacker to gain access to keys stored on the card.
  • Some handheld devices such as Hewlett Packard's iPAQ PocketPC h5450, include biometric sensors for improved personal identification before allowing access to sensitive data. An individual possessing this device is instructed to enroll one or more of his fingerprints into the device's software. The enrolled fingerprint can be used as the sole password or as an alternative to a typed password. This type of device can be a substantial improvement on traditional data-access methods, because the biometric can be definitively tied to a single individual. However, if the sensitive data is stored or transmitted insecurely, the biometric authentication does not substantially hinder an attacker from probing the memory and compromising it.
  • U.S. Pat. No. 5,533,123 to Force, et al. discloses programmable distributed personal security inventions.
  • the patent teaches a “Secured Processing Unit” (“SPU”) comprising an “SPU chip” and a microprocessor designed especially for secure data processing.
  • the invention integrates keys, encryption and decryption engines, and algorithms in the SPU of the invention.
  • the security process is portable and easily distributed across physical boundaries.
  • the invention is based upon three interdependent subsystems.
  • the first subsystem of the invention is a detector subsystem, which alerts an SPU to the existence and to the character of a security attack.
  • a second subsystem is a filter subsystem that correlates data from multiple detectors, then assesses the severity of the attack against the risk to the SPU's integrity, both to its secret data and to the design of the SPU itself.
  • a third subsystem is a response subsystem for generating responses, or countermeasures, calculated by the filters to be most appropriate under the circumstances, in order to deal with the attack(s) detected. Force does not disclose identity credential verification within the SPU.
  • U.S. Pat. No. 5,825,878 to Takahashi discloses a secure embedded memory management unit for a microprocessor.
  • a microprocessor memory management apparatus is used for encrypted instruction and data transfer from an external memory. Physical security is obtained by embedding the direct memory access controller on the same chip with a microprocessor core, an internal memory, and encryption/decryption logic. Data transfer to and from an external memory takes place between the external memory and the memory controller of the memory management unit. All firmware to and from the external memory is handled on a page-by-page basis. Since all of the processing takes place on buses internal to the chip, detection of clear unencrypted instructions and data is prevented. Takahashi does not disclose any capability, anticipation, intention, or provision for including identity credential verification on the management unit or within the microprocessor core.
  • U.S. Pat. No. 5,832,207 to Little, et al. teaches a secure module including a microprocessor and a co-processor.
  • the electronic module is provided with at least one microprocessor and a co-processor deployed into a single integrated circuit.
  • the electronic module may be contained in a small form factor housing.
  • the electronic module provides secure bi-directional data communication via a data bus.
  • the electronic module may include an integrated circuit including a microprocessor and a co-processor adapted to handle 1,024-bit modulo mathematics primarily aimed at RSA calculations.
  • the electronic module is preferably contained in a small token-sized metallic container.
  • the module preferably communicates via a single wire data bus using a one-wire protocol. Little et al. does not disclose personal identification systems.
  • U.S. Pat. No. 5,894,550 to Thireit discloses a method of implementing a secure program in a microprocessor card, and a microprocessor card including a secure program.
  • the invention claims that a program can be made secure relative to a CPU.
  • the invention accomplishes this by storing in a first memory zone predetermined address functions that are directly executable by the CPU.
  • the first memory zone is then write-protected, then the program is stored in a second memory zone in the form of a series of instructions that are executable within the second memory zone or that activate functions contained in the first memory zone.
  • U.S. Pat. Nos. 5,481,265, 5,729,220, 6,201,484 and 6,441,770 to Russell detail a handheld device used to authenticate persons and said device to remote computer systems.
  • the invention further includes a “kill switch” or “kill signal” enabling the computer system to remotely disable the handheld device and restrict further emissions.
  • the system is primarily targeted at local area network applications and does not anticipate or suggestion broader applications.
  • the invention disclosed herein is an in-circuit security system for electronic devices.
  • the in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, lowering component cost and reducing board space.
  • the in-circuit security system chip is secured using mechanisms for preventing information tampering or eavesdropping, such as the addition of oxygen reactive layers.
  • This invention also incorporates means for establishing security settings and profiles for the in-circuit security system and enrolled individuals.
  • the in-circuit security system can be used in a variety of electronic devices, including handheld computers, secure facility keys, vehicle operation/ignition systems, and digital rights management.
  • FIG. 1 Sample embodiment of in-circuit security system components
  • FIG. 2 Handheld computer with the in-circuit security system
  • FIG. 3 Electronic lock mechanism with the in-circuit security system
  • FIG. 1 is a schematic view of a sample embodiment of the in-circuit security system.
  • FIG. 2 is a schematic view of the components of a simple handheld computer using the in-circuit security system.
  • FIG. 3 is a schematic view of the components of an electronic lock mechanism using the in-circuit security system.
  • FIGS. 4-5 depict embodiments of a biometric personal identification device (BPID) for remoted controlled applications.
  • BPID biometric personal identification device
  • the invention described herein is an in-circuit security system by which pre-enrolled individuals may access sensitive data or perform actions on sensitive data in an environment that is fully monitored and protected.
  • the in-circuit security system requires full authentication of individuals and can perform a variety of programmed responses in the event that pre-established authentication standards are not met.
  • the in-circuit security system includes secure transmission of sensitive data to remote devices.
  • the in-circuit security system comprises several components combined securely into a single, secure chip.
  • the primary embodiment of the in-circuit security system 100 comprises a processor 101 , a memory 102 , a real-time clock 105 , and a random number generator 108 .
  • the in-circuit security system 100 also includes a cryptographic subsystem 104 and an identity credential verification subsystem 103 . These subsystems may be logical, physical, or some combination thereof, and are described in further detail below.
  • the in-circuit security system 100 will also contain a power source 106 , such as a battery, in order to maintain power to the real-time clock 105 .
  • the in-circuit security system 100 receives a unique, one-time programmable electronic identification code that can be read but cannot be altered or removed.
  • the in-circuit security system 100 also preferably provides multiple input/output interfaces 110 - 112 for connection to optional internal/external components, such as transceivers 107 , antennae, identity credential sensors, non-secure processors, etc.
  • the processor 101 is the main control component; it is responsible for loading and executing instructions to control the various components of the chip, as well as performing user-requested tasks.
  • the memory 102 is coupled to the processor 101 . It comprises both volatile and non-volatile components and can be used to store instructions or data, such as security settings or profiles and cryptographic keys. The application of these security settings is discussed below.
  • the real-time clock 105 is also coupled to the processor 101 and is used to maintain an accurate time, which can be used in cryptographic signing, audit records, or other transactions.
  • the real-time clock 105 may be connected to a power source 106 in order to constantly maintain time. If the in-circuit security system 100 does not include the power source 106 , the real-time clock 105 must be cognizant of power disconnects, which means that it can no longer provide an accurate time.
  • the fourth component of the in-circuit security system 100 is a random number generator 108 .
  • the random number generator 108 is used for seeding cryptographic algorithms, and may use any of established methods for guaranteeing sufficient randomness.
  • the random number generator 108 may be included as part of the cryptographic subsystem 104 or may be a standalone component coupled to the subsystem 104 .
  • the cryptographic subsystem 104 is a dedicated system for performing encryption and decryption, digital signing and digital signature verification. In one embodiment the subsystem 104 is responsible for storing cryptographic keys in its own memory; in another, the subsystem is coupled to and uses the main memory 102 of the in-circuit security system 100 . Additionally, one primary embodiment of the invention uses a cryptographic acceleration chip or component as the cryptographic subsystem 104 . Alternative embodiments are coupled to and use the main processor 101 as the cryptographic engine.
  • the identity credential verification subsystem 103 is used to determine the identity of an individual attempting to use the in-circuit security system 100 and identify his associated security privileges.
  • the identity credential verification subsystem 103 performs identity credential acquisition, analysis, storage and matching.
  • the identity credential verification subsystem 103 uses digital representations of fingerprints as the identity credential.
  • the identity credential verification subsystem 103 performs fingerprint image acquisition, and template generation, storage, and matching.
  • the identity credential verification subsystem 103 may use the main processor 101 of the in-circuit security system 100 for credential processing actions or may use its own specialized processor. Similarly, it may employ its own memory for credential storage or use the main memory 102 of the in-circuit security system 100 .
  • the in-circuit security system 100 provides one or more connections 110 to external components for credential sensing, such as a fingerprint sensor.
  • the in-circuit security system 100 incorporates an interface 112 to a transceiver 107 , antenna, wire, or other remote communication device that is coupled to the processor 101 .
  • This component is used for transmission of data from one device to another. All sensitive data that is to be transmitted from the in-circuit security system 100 can be encrypted using the cryptographic subsystem 104 , so it is not necessary to place a transceiver 107 within the secure boundaries of the in-circuit security system 100 . However, in some embodiments it may prove to be convenient to incorporate the transceiver 107 into the chip. In these embodiments the interface 112 would be from the transceiver to an antenna, wire, or other communication device.
  • the transmission technology is radio-frequency identification (RFID), such as the ISO 14443 A/B or 15693 standards.
  • RFID radio-frequency identification
  • the in-circuit security system 100 uses Bluetooth or infrared technology. Other embodiments provide a combination of these technologies or others. In alternative embodiments, it may be useful to use a wired technology, such as a serial or USB connection.
  • the in-circuit security system 100 preferably provides external connections 112 for requisite connectors, cables or antennae.
  • the authentication of individuals allows the in-circuit security system 100 to associate an individual with specific security privileges within the system. For example, one user may be enrolled and identified as a typical user with no ability to reset the system 100 , while an alternate user may be identified as an administrator with that ability. Additionally, the in-circuit security system 100 may be programmed to perform a variety of both temporary and permanent responses to security events. For example, a specified number of access denials within a particular time interval may cause the in-circuit security system 100 to suspend all actions or halt the real-time clock 105 until reset by an enrolled administrator. Alternatively, an attempt to crack open the case of the chip housing the in-circuit security system 100 may result in permanent erasure of memory 102 , or destruction of other components. The in-circuit security system 100 may also be programmed to allow an enrolled individual to directly disable or destroy components.
  • the in-circuit security system 100 is combined into one secured chip with three major interfaces: an interface to a credential sensing mechanism, such as a fingerprint sensor; an interface to peripheral components, such as non-secure processors or user-interface devices; and an interface to a transceiver or antenna for remote communications. Other interfaces are strictly prevented.
  • the chip may use one or more physical security measures to prevent information eavesdropping. These obfuscation techniques include use of “potting”, oxygen-reactive layers, photo-sensors, Hall effect sensors, and circuits that monitor clock frequency and/or reset frequency.
  • the system 100 may additionally perform algorithmic analysis of interface traffic. For example, fingerprint images received from a fingerprint sensor may be analyzed by the identity credential verification subsystem 103 ; if the identity credential verification subsystem 103 repeatedly receives the exact same bit pattern representation of fingerprints, it is possible that someone is deliberately placing that bit pattern on the interface. Similarly, if the identity credential verification subsystem 103 receives bit patterns that are an exact rotation or other permutation of a previously received image, again someone may be altering the contents of the interface.
  • the in-circuit security system can be used as a standalone component for security applications or as one of multiple components within an electronic device.
  • a handheld computer is equipped with the in-circuit security system 100 , as seen in FIG. 2 .
  • the computer further comprises a display 213 , a keypad 214 , a non-secure processor 201 and memory 202 , and a fingerprint sensor 203 .
  • the handheld computer also incorporates an antenna 204 .
  • the primary user of the handheld computer enrolls a fingerprint, a digital certificate, and an associated private key into the in-circuit security system 100 .
  • the fingerprint is stored in the identity credential verification subsystem 103 and is used to authorize use of the private key associated with the digital certificate.
  • the digital certificate may be stored in the cryptographic subsystem 104 or the main memory 102 of the in-circuit security system 100 .
  • the individual typically uses the handheld computer to transmit and receive e-mail. He requires the in-circuit security system 100 to digitally sign his e-mail, which requires accessing the stored private key associated with his fingerprint. He selects his e-mail program, and types an e-mail for transmission using the keypad 214 .
  • the keypad 214 is coupled to the processor 201 , which receives the data and creates an appropriate message packet for transmission. Once created, the message packet is sent to the in-circuit security system 100 for further processing.
  • the processor 101 of the in-circuit security system 100 receives the message packet and analyzes the established security settings for transmission of e-mail. Because the in-circuit security system 100 is configured to require digital signing of e-mail prior to transmission, the individual must first authenticate his fingerprint to the identity credential verification subsystem 103 . The biometric authentication is required to prevent unauthorized users from encrypting e-mail with a private key that is not theirs.
  • the processor 101 signals the identity credential verification subsystem 103 to wait for a new fingerprint sample from the fingerprint sensor 203 , and signals the non-secure processor 201 to provide a visual prompt to the user on the display 213 . After the user places his finger on the fingerprint sensor 203 it sends the new fingerprint image to the identity credential verification subsystem 103 .
  • the identity credential verification subsystem 103 analyzes the image, generates a template, and compares it to the enrolled fingerprint template. If the two match, the identity credential verification subsystem 103 sends a signal to the processor 101 that the individual is authorized to use the stored private key.
  • the processor 101 now sends the e-mail message to the cryptographic subsystem 104 and instructs the cryptographic subsystem 104 to sign the message. This typically involves generating a hash of the message and encrypting it with the private key.
  • the cryptographic subsystem 104 may also include a timestamp generated by the real-time clock, the unique device identifier, or other data, prior to the hash.
  • the cryptographic subsystem 104 now sends the signed e-mail message back to the processor 101 .
  • the processor 101 sends the signed e-mail to the cellular transceiver 107 for transmission to a remote recipient.
  • the in-circuit security system 100 is embedded into an electronic door locking mechanism that is used to control access to a secure facility.
  • the system comprises the in-circuit security system 100 with a wired connection to the electronic door lock 314 , a fingerprint sensor 203 , and a series of light emitting diodes (LEDs) 313 that are used to provide visual feedback to the user.
  • LEDs light emitting diodes
  • Individuals access the secure facility by demonstrating enrollment of their fingerprint into the in-circuit security system 100 .
  • the security settings of the in-circuit security system 100 are configured to shut down the entire locking mechanism on a pre-specified number of failed attempts within a pre-specified time span. This is example of security parameters and settings that are stored within the memory 102 .
  • An enrolled individual wishes to enter the facility.
  • One LED 313 glows green, signaling that the fingerprint sensor 303 is ready.
  • the individual places his finger on the sensor 203 , which generates a fingerprint image and sends it to the identity credential verification subsystem 103 .
  • the identity credential verification subsystem 103 generates a fingerprint template and compares it to the enrolled fingerprints. The new fingerprint template matches an existing template, so the identity credential verification subsystem 103 sends the individual's unique identifier to the processor 101 .
  • the processor 101 accesses the memory 102 , which stores security privileges associated with enrolled individuals.
  • the individual who is currently authenticated is authorized to enter the secure facility alone, so the processor 101 sends a signal to the transceiver 107 to trigger the lock 314 to release.
  • an individual who has not been pre-enrolled into the identity credential verification subsystem 103 attempts to enter the secure facility.
  • the individual places his finger on the fingerprint sensor 203 , which sends an image of the fingerprint back to the identity credential verification subsystem 103 .
  • the fingerprint is compared to all of the enrolled fingerprints, and no match is found because the individual is not enrolled.
  • the identity credential verification subsystem 103 records the date, time and other requisite characteristics of the failed access attempt, and flashes a red LED 313 to show that access has been denied.
  • the identity credential verification subsystem 103 also notifies the appropriate process within the processor 101 that an access failure has occurred.
  • the identity credential verification subsystem 103 records the subsequent failure, and notifies the processor 101 that there has been another failure. When the number of failed attempts reaches the pre-established limit, the identity credential verification subsystem 103 again notifies the processor 101 that a failure has occurred.
  • the processor 101 applies the security settings and places the electronic lock mechanism 314 in a state where it cannot be unlocked unless it is reset by a recognized authority; in a primary embodiment this would be implemented using a “fail-secure” lock and would involve disconnecting a power source. Alternative actions can occur to put the lock 314 into this state as necessary.
  • the processor 101 may also put the identity credential verification subsystem 103 into a state where it does not accept new fingerprints, create images, or perform matching. As desired by the regulator of the secure facility, the processor 101 may instruct the identity credential verification subsystem 103 to delete any enrolled fingerprint images. These are all examples of programmable security settings.
  • FIGS. 4-5 depict embodiments of a biometric personal identification device (BPID) for remoted controlled applications.
  • BPID biometric personal identification device
  • Remote control products have been in service for decades and have become ubiquitous for many applications. However, despite the many successful applications for saving time, steps, and effort, there are only limited examples among remote control products and remote control communication systems that demonstrate the capacity to provide security to remote control applications that need or could be improved by security.
  • latent demand exists for apparatuses, methods, and systems capable of monitoring, auditing, and enforcing different privilege levels of authorized usage for a remote control apparatus and corresponding different privilege levels of authorized remote control of remote-controlled resources, e.g., entertainment resources, polling resources, testing resources, interactive or user response-oriented resources, and other resources and assets including remote controlled machinery, etc.
  • Typical examples of potential products and applications for which latent demand exists where differentiable privacy- and security-oriented remote control transmitter and/or transceiver apparatuses are appropriate include:
  • BPID privacy- and security-oriented remote controller apparatus, method, and system for privately and securely controlling a variety of remotely controllable machinery, including (but not limited to) televisions, personal computers, set-top control terminals, etc.
  • Another object of the BPID is to enable service providers to monitor, audit, and track the activity of users accessing, or attempting to access, restricted and protected equipment and services by means of remote controllers.
  • Another object of the present BPID is to match physical persons to discrete devices such that only authorized individuals are associated with each device and so that only authorized individuals can effectuate access with a remote controller.
  • a related object of the BPID is to create multiple levels of privilege and access for a plurality of users accessing a plurality of remote control apparatuses to control a plurality of remote-controlled devices and applications.
  • the BPIDs disclosed herein provide privacy- and security-oriented identity credential verification devices (in prior art applications of the instant inventors) and privacy- and security oriented remote control apparatuses, subsystem apparatuses, methods, and systems adapted for authenticating and verifying prospective remote control apparatus users (in this application).
  • the most basic user-operated devices of prior art inventions to the instant inventors are simply identity credential verification devices. While such devices excel at identifying prospective users thereof, by means of re-verifying a submitted biometric credential such as a fingerprint, they do not effectuate remote control events in remotely controlled machinery.
  • BPID Prospective users of remote controllers of the present BPID must verify their pre-enrolled identities prior to accessing their preauthorized, assigned privileges to their remote control devices, prior to being authorized and granted access to their remote control devices, and subsequently, to compatible remote-controlled resources equipped according to teachings of the present BPID.
  • User-operated apparatuses of the BPID are privacy- and security oriented, remote control apparatuses.
  • the authenticated and verified, user-operated remote control apparatuses of the present BPID either (1) include an identity credential verification subsystem (ICVS) module for verifying a prospective user's pre-enrolled status and privileges, and/or (2) interface with either an independent, proximate, ICVS, and/or (3) an ICVS module embedded into a remote-controlled resource.
  • ICVS identity credential verification subsystem
  • Such a remote-controlled resource can only be operated by properly enabled remote controllers, which are accessible and operable only by pre-enrolled, preauthorized users who are re-authenticated and re-
  • the methods of the BPID comprise steps, procedures, policies for accomplishing and enforcing pre-enrollment and subsequent authentication of preauthorized users.
  • the systems of the BPID embed an ICVS subsystem in the remote control apparatus of the BPID and/or implement an ICVS system external and proximate to the remote control apparatus by means of a wireless interactive communication link, such as a Bluetooth connection.
  • the platform, fundamental apparatus of the invention comprises the BPID as described above, plus one or more implementations of enabling application software.
  • This allows the device to function as a remote control for apparatuses including (but not limited to) televisions, VCRs, DVD players and stereo systems, radios, etc., which can be pre-programmed to respond only to pre-determined, authorized remote control apparatuses.
  • the remote control apparatuses of the present invention including platform BPID functionality, can be embodied as either transmitters—using any appropriate transmission media, including, but not limited to, infrared and RF—or, in more advanced applications with additional privacy and security features—as transceivers.
  • remotely controlled functionality of the present invention can be alternatively embodied into interface controller devices such as “set-top controllers” or “set-top boxes”, rather than solely in one or more remotely controlled devices themselves such as televisions, DVD players and stereo systems, radios, etc.
  • the ICVS subsystem apparatuses of the invention include (1) modular, factory-installed components for implementing ICVS in a remote control apparatus of the present invention; (2) standalone and independent ICVS-class apparatuses, i.e., either (2a) multi-functional set-top boxes or (2b) single function ICVS boxes accessible by RF or other viable communications standard; and (3) customer-installable modules to upgrade platform devices such as to implement advanced features, or to upgrade existing features.
  • both a factory-installed, embedded core ICVS subsystem apparatus and a user-installed modular core subsystem apparatus are disclosed; either or both can be installed in the remote control of the present invention.
  • Both installed and/or modularly installable subsystem apparatuses can enable and perform authentication of pre-authorized users.
  • ICVS-borne, “user authentication functions” implement not only basic user authentication in a remote controller, but can also permit multiple levels of privileged access to remote-controlled resources as well as portable privileges for accessing remote-controlled resources and their applications, services, etc.
  • the user authentication process is further performed in a manner supportive of the individual's right to privacy, in accord with the application accessed and the stipulations of the remote-controlled resource or application owner, if any.
  • the preferred embodiment of the invention stores a pre-enrolled biometric template of the authorized individual within tamper-resistant memory within the remote control apparatus.
  • the template is never authorized to leave the device, and is “zeroed-out” upon unauthorized attempted physical or logical access.
  • an individual wishes to access controlled resources, he/she submits another biometric template through a reader on the device. If the submitted identity credential matches the template stored therein, the user is granted access to operate the remote controller and the machinery it controls.
  • One primary preferred embodiment of the remote controller apparatus of the present invention is a transmitter adapted for generating and transmitting a basic, “standalone”, simplex, one-way “identity credential verification signal” transmission from a user's remote control device to a target device after successful initial user authentication.
  • This first primary embodiment performs the user authentication process, displays of the result in the form of a user “identity credential verification display”, generates and transmits as appropriate, a user “identity credential verification signal”, and also transmits user control signals to the remotely controlled device.
  • a second primary preferred embodiment of the remote controller apparatus comprises a transceiver version.
  • the transceiver version is capable of performing standalone user authentication, but is also capable of communicating with an external identity credential verification system (ICVS) and/or other external device or transceiver, based on how it is configured at manufacturing and/or based on how it was optioned by a user and a system administrator after deployment.
  • ICVS identity credential verification system
  • the user-operated remote control transceiver may use a wireless technology ranging from IrDA to RF, or optionally, may use a wired communications medium and/or protocol.
  • this second preferred embodiment is capable of receiving a plurality of signals from other remote control user apparatuses and/or from external, remote-controlled apparatuses, appropriately equipped.
  • signals may be transmitted and received by appropriately equipped user remote control apparatuses and remotely controlled interface devices including set-top boxes and/or other appropriately equipped transceiver apparatuses.
  • the apparatus of the invention will be described as using a fingerprint for the identity credential verification method and Bluetooth RF wireless technology as the communication media.
  • a variety of modifications and substitutions may be made thereto without departing from the spirit and scope of the inventions.
  • the invention is not limited to the use of any specific communications architecture or system, or specific method or type of ICVS.
  • the remote control apparatus of the invention is used in conjunction with a television, a television set-top box, and a premium cable channel such as HBO, Cinemax or Showtime.
  • the remote control is issued to the paying customer and is enrolled with his fingerprint upon application for the premium service.
  • the enrollment process may take place within the cable company's office, online, or through another company-approved method.
  • the cable company will also supply the set-top box in order to provide access to the premium cable channel.
  • the set-top box is adapted to allow access to the premium channel only upon receipt of an encrypted authorization signal from the authorized remote control device, from among a “premium class” of remote control devices. This further requires that the set-top box is assigned either a public/private key pair or a symmetric key, and that it receives the public key of the authorized remote control apparatus.
  • the device When the individual wishes to access the channel, he selects the remote control function within his BPID, and selects the premium access channel that he wishes to watch.
  • the device will prompt the individual to authenticate himself. Upon successful verification, the device searches the memory to verify that the authenticated individual owns the necessary privileges to watch the channel. If the individual is accepted, the device creates a message comprising the selected service and an authorization notice, and signs it with the device private key. The device further encrypts the message with either a shared symmetric key or the public key of the set-top box before message transmission. Successful decryption and signature verification within the set-top box will enable the television to display the premium channel. It is important to note that the set-top box functionality, as described, may be implemented within the television itself in order to reduce the physical equipment required by the system.
  • One individual, Alice may have a subscription to a premium cable channel, while another individual, Bob, may not.
  • Alice and Bob would like to watch a movie on the premium channel together, but for practical reasons cannot watch the movie at Alice's home.
  • Alice and Bob would not be able to watch the movie at Bob's home, as he does not subscribe to the service.
  • Alice can use her remote control apparatus to take her privileges to Bob's house if he has an appropriate set-top box or television, and they can watch the movie together.
  • an individual purchases rights to a premium cable channel, and the cable provider issues and enrolls the individual into one device.
  • the individual may be convenient for the individual, or the individual's family, to have multiple remote control devices. In this situation, the individual may use the pre-enrolled device to enroll subsequent devices, creating a master-slave relationship.
  • Another embodiment of the invention creates a “parental control” method for limiting individuals' access to programs, movies and channels that have comment deemed unsuitable.
  • the owner of the remote control device may enroll multiple persons—and their corresponding fingerprints—into his or an alternate remote control device, along with authorization and privilege levels.
  • persons wishing to watch particular television programs must authenticate to the remote control device.
  • the remote control processes the authorization, and transmits an authorization or denial signal appropriately to the television or set-top box.
  • This invention can be extended to cover the operation of VCRs and DVD players; DVDs, for example, can be encoded to include multiple versions of a movie satisfying multiple Motion Picture Association of America (MPAA) ratings.
  • MPAA Motion Picture Association of America
  • users can perform purchasing and other financial transactions through their television and/or set-top box.
  • television networks and infomercials in which individuals view purchasable items on their televisions. If the individual would like to place an order, he typically calls a telephone number provided at the bottom of the television screen, and supplies a credit card number for payment.
  • This method of shopping is convenient for many users, but lacks personal security because it simply requires possession of a credit card number, without ensuring ownership of the number.
  • persons can still order items through their televisions, yet making use of the security benefits of the remote control apparatus. Because the BPID is designed to store a variety of account information, individuals can store credit card numbers and other financial data for this application.
  • the remote control When the viewer selects a home shopping channel, the remote control will register an option for purchasing. If the individual decides to purchase an item, he simply selects the purchasing option on the remote control, and enters the item number and price. He will then select one of the enrolled accounts to pay for the item. This will prompt the user to authenticate himself/herself to the device. If the user is authenticated successfully, the device will sign the message and transmit the appropriate credentials to the television or set-top box. The information can then be transmitted via Internet, phone or other connective medium to pay the seller.
  • the operational embodiments as described above are also suited for accessing “content distribution” subscription services within stereophonic audio systems in homes, offices and automobiles, such as the emerging XM radio service, pay-per-view television services, and other types of subscription services that use remote control devices.
  • the various features and characteristics of the BPID interactive system may include:
  • a private and secure remote control apparatus adapted for authenticating and for matching at least one user identity credential of a prospective user with at least one stored pre-enrolled user identity credential of at least one preauthorized user, further adapted for transmitting user permissions and transmitting remote control signals for accessing and controlling remotely controlled apparatuses comprising resources, applications, and services.
  • a method for administering and distributing premium cable television services comprising:
  • a method for accessing premium cable television service comprising:
  • An identity credential verification system for matching and authenticating at least one submitted identity credential of a prospective user, wherein said submitted identity credential is matched and verified by said identity credential verification system, comprising:
  • an onboard identity credential verification system embedded into said remote control apparatus platform including an identity credential verification apparatus means for initially enrolling said at least one user by means of storing at least one enrolled user identity credential and for subsequently matching said at least one user identity credential prior to authorizing and granting access to said remote controller apparatus platform to said at least one remote control user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Biomedical Technology (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Computer Graphics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Storage Device Security (AREA)
  • Image Input (AREA)
  • User Interface Of Digital Computer (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Collating Specific Patterns (AREA)
  • Technology Law (AREA)
  • Lock And Its Accessories (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Position Input By Displaying (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

A first electronic device comprises a transmitter, a secure processor, a secure memory, and one or more biometric sensors. The first electronic device is configured to communicate securely via the transmitter with a second electronic device that is separate from the first electronic device. The first electronic device receives first biometric information of a user via the one or more biometric sensors. In response to receiving the first biometric information, the first electronic device compares, via the secure processor, the first biometric information to second biometric information stored in the secure memory; and determines, based on the comparison, whether the user meets authentication criteria. In accordance with a determination that the user meets authentication criteria, the first electronic device generates a verification signal that, when received by the second electronic device, grants access to operate the second electronic device, and transmits the verification signal to the second electronic device. In accordance with a determination that the user does not meet the authentication criteria, the first electronic device forgoes generating the verification signal and transmitting the verification signal to the second electronic device.

Description

    RELATED U.S. APPLICATION DATA
  • This application is a continuation of U.S. patent application Ser. No. 14/716,766 (now U.S. Pat. No. 9,923,884), filed May 19, 2015, entitled “An In-Circuit Security System And Methods For Controlling Access To And Use Of Sensitive Data,” which is a continuation of U.S. patent application Ser. No. 13/947,313 (now U.S. Pat. No. 9,124,930), filed on Jul. 22, 2013, entitled “An In-Circuit Security System And Methods For Controlling Access To And Use Of Sensitive Data,” which is a continuation of U.S. patent application Ser. No. 12/555,480 (now U.S. Pat. No. 8,495,382), filed Sep. 8, 2009, entitled “An In-Circuit Security System And Methods For Controlling Access To And Use Of Sensitive Data,” which is a divisional of U.S. patent application Ser. No. 10/858,287 (now U.S. Pat. No. 7,587,611), filed Jun. 1, 2004, entitled “An In-Circuit Security System And Methods For Controlling Access To And Use Of Sensitive Data,” which claims priority under U.S.C. § 119(e) of provisional patent application Ser. No. 60/474,750, filed May 30, 2003, entitled “Secure Biometric Identification Devices and Systems for Various Applications,” each of which is hereby incorporated by reference in its entirety.
  • BACKGROUND OF THE INVENTION Field of the Invention
  • The invention disclosed herein relates to the security of sensitive data stored, processed and distributed using electronic circuits. More particularly, the invention relates to the identification of individuals prior to accessing/using data, and the execution of security controls upon unauthorized attempts to access/use said data.
  • In recent years there has been an explosion of electronic devices that individuals may use for storing and transmitting sensitive data. In a low-security example, portable devices like a Palm™ or BlackBerry handled computer typically contain software for e-mail, along with options for storing credit cards, schedules, and other data. Most people wish to protect this information, but most handheld devices rely on their operating system to secure data. Unfortunately, the most common operating systems for these handheld computers were not designed with security as the main goal, and retrofitting basic security mechanisms has been clumsy.
  • A growing number of electronic devices, such as smart cards, are intended to specifically identify and authenticate users using the public key infrastructure, which requires secure storage of private keys. These devices are common in building security; for example, an individual with proper authorization to access a facility is assigned a smart card and an asymmetric key pair. A certificate authority generates a digital certificate for the public key, which is stored in the smart card. The private key is also stored on the smart card. When the individual places his smart card in the reader at the access point of the facility, the card transmits its digital certificate, and the reader challenges the card to encrypt a supplied string with the individual's private key. The reader obtains the public key out of the digital certificate and decrypts the private key-encrypted string to verify that the keys are related. This has an inherent problem because there is no guarantee that the individual using the private key is the assigned owner of the smart card. Furthermore, it is fairly simple for an experienced attacker to gain access to keys stored on the card.
  • Some handheld devices, such as Hewlett Packard's iPAQ PocketPC h5450, include biometric sensors for improved personal identification before allowing access to sensitive data. An individual possessing this device is instructed to enroll one or more of his fingerprints into the device's software. The enrolled fingerprint can be used as the sole password or as an alternative to a typed password. This type of device can be a substantial improvement on traditional data-access methods, because the biometric can be definitively tied to a single individual. However, if the sensitive data is stored or transmitted insecurely, the biometric authentication does not substantially hinder an attacker from probing the memory and compromising it.
  • These concerns have contributed to the marketing of products billed as ‘secure memory’ or ‘secure processor’. These products are typically constructed with varying degrees of security; one lower degree is considered ‘tamper-evident’, in which an unskilled observer would see that someone had attempted to maliciously gain access to secured data. A higher level is ‘tamper-resistant’, in which the product actively resists tampering by use of a self-destruct mechanism, an impermeable substance that coats the components storing sensitive data such as a polymer-based coating or other so-called “conformal coating”, or some other process. Furthermore, these products may encrypt input/output lines, mislabel parts, and perform other types of obfuscation.
  • DESCRIPTION OF THE RELATED ART
  • U.S. Pat. No. 5,533,123 to Force, et al., discloses programmable distributed personal security inventions. The patent teaches a “Secured Processing Unit” (“SPU”) comprising an “SPU chip” and a microprocessor designed especially for secure data processing. The invention integrates keys, encryption and decryption engines, and algorithms in the SPU of the invention. Purportedly, the security process is portable and easily distributed across physical boundaries. The invention is based upon three interdependent subsystems. The first subsystem of the invention is a detector subsystem, which alerts an SPU to the existence and to the character of a security attack. A second subsystem is a filter subsystem that correlates data from multiple detectors, then assesses the severity of the attack against the risk to the SPU's integrity, both to its secret data and to the design of the SPU itself. A third subsystem is a response subsystem for generating responses, or countermeasures, calculated by the filters to be most appropriate under the circumstances, in order to deal with the attack(s) detected. Force does not disclose identity credential verification within the SPU.
  • U.S. Pat. No. 5,825,878 to Takahashi discloses a secure embedded memory management unit for a microprocessor. A microprocessor memory management apparatus is used for encrypted instruction and data transfer from an external memory. Physical security is obtained by embedding the direct memory access controller on the same chip with a microprocessor core, an internal memory, and encryption/decryption logic. Data transfer to and from an external memory takes place between the external memory and the memory controller of the memory management unit. All firmware to and from the external memory is handled on a page-by-page basis. Since all of the processing takes place on buses internal to the chip, detection of clear unencrypted instructions and data is prevented. Takahashi does not disclose any capability, anticipation, intention, or provision for including identity credential verification on the management unit or within the microprocessor core.
  • U.S. Pat. No. 5,832,207 to Little, et al., teaches a secure module including a microprocessor and a co-processor. The electronic module is provided with at least one microprocessor and a co-processor deployed into a single integrated circuit. The electronic module may be contained in a small form factor housing. The electronic module provides secure bi-directional data communication via a data bus. The electronic module may include an integrated circuit including a microprocessor and a co-processor adapted to handle 1,024-bit modulo mathematics primarily aimed at RSA calculations. The electronic module is preferably contained in a small token-sized metallic container. The module preferably communicates via a single wire data bus using a one-wire protocol. Little et al. does not disclose personal identification systems.
  • U.S. Pat. No. 5,894,550 to Thireit discloses a method of implementing a secure program in a microprocessor card, and a microprocessor card including a secure program. The invention claims that a program can be made secure relative to a CPU. The invention accomplishes this by storing in a first memory zone predetermined address functions that are directly executable by the CPU. The first memory zone is then write-protected, then the program is stored in a second memory zone in the form of a series of instructions that are executable within the second memory zone or that activate functions contained in the first memory zone.
  • U.S. Pat. Nos. 5,481,265, 5,729,220, 6,201,484 and 6,441,770 to Russell detail a handheld device used to authenticate persons and said device to remote computer systems. The invention further includes a “kill switch” or “kill signal” enabling the computer system to remotely disable the handheld device and restrict further emissions. However, the system is primarily targeted at local area network applications and does not anticipate or suggestion broader applications.
  • BRIEF SUMMARY OF THE INVENTION
  • The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, lowering component cost and reducing board space. The in-circuit security system chip is secured using mechanisms for preventing information tampering or eavesdropping, such as the addition of oxygen reactive layers. This invention also incorporates means for establishing security settings and profiles for the in-circuit security system and enrolled individuals. The in-circuit security system can be used in a variety of electronic devices, including handheld computers, secure facility keys, vehicle operation/ignition systems, and digital rights management.
  • BRIEF DESCRIPTION OF DRAWINGS Master Reference Numeral List
  • FIG. 1: Sample embodiment of in-circuit security system components
      • 100 In-circuit security system
      • 101 Processor
      • 102 Memory
      • 103 Identity credential verification subsystem
      • 104 Cryptographic subsystem
      • 105 Real-time clock
      • 106 Power source (OPTIONAL)
      • 107 Transceiver (OPTIONAL)
      • 108 Random number generator
      • 110 Connection to identity credential sensor
      • 111 Connection to peripheral components
      • 112 Connection to antenna or cables
  • FIG. 2: Handheld computer with the in-circuit security system
      • 100 In-circuit security system
      • 201 Non-secure processor
      • 202 Non-secure memory
      • 203 Fingerprint sensor
      • 204 Antenna
      • 213 Display
      • 214 Keypad
  • FIG. 3: Electronic lock mechanism with the in-circuit security system
      • 100 In-circuit security system
      • 313 LEDs
      • 314 Electronic lock mechanism
  • FIG. 1 is a schematic view of a sample embodiment of the in-circuit security system.
  • FIG. 2 is a schematic view of the components of a simple handheld computer using the in-circuit security system.
  • FIG. 3 is a schematic view of the components of an electronic lock mechanism using the in-circuit security system.
  • FIGS. 4-5 depict embodiments of a biometric personal identification device (BPID) for remoted controlled applications.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The invention described herein is an in-circuit security system by which pre-enrolled individuals may access sensitive data or perform actions on sensitive data in an environment that is fully monitored and protected. The in-circuit security system requires full authentication of individuals and can perform a variety of programmed responses in the event that pre-established authentication standards are not met. The in-circuit security system includes secure transmission of sensitive data to remote devices.
  • The in-circuit security system comprises several components combined securely into a single, secure chip. As seen in FIG. 1, the primary embodiment of the in-circuit security system 100 comprises a processor 101, a memory 102, a real-time clock 105, and a random number generator 108. The in-circuit security system 100 also includes a cryptographic subsystem 104 and an identity credential verification subsystem 103. These subsystems may be logical, physical, or some combination thereof, and are described in further detail below. In typical embodiments, the in-circuit security system 100 will also contain a power source 106, such as a battery, in order to maintain power to the real-time clock 105. During manufacture, the in-circuit security system 100 receives a unique, one-time programmable electronic identification code that can be read but cannot be altered or removed. The in-circuit security system 100 also preferably provides multiple input/output interfaces 110-112 for connection to optional internal/external components, such as transceivers 107, antennae, identity credential sensors, non-secure processors, etc.
  • The processor 101 is the main control component; it is responsible for loading and executing instructions to control the various components of the chip, as well as performing user-requested tasks. The memory 102 is coupled to the processor 101. It comprises both volatile and non-volatile components and can be used to store instructions or data, such as security settings or profiles and cryptographic keys. The application of these security settings is discussed below. The real-time clock 105 is also coupled to the processor 101 and is used to maintain an accurate time, which can be used in cryptographic signing, audit records, or other transactions. The real-time clock 105 may be connected to a power source 106 in order to constantly maintain time. If the in-circuit security system 100 does not include the power source 106, the real-time clock 105 must be cognizant of power disconnects, which means that it can no longer provide an accurate time.
  • The fourth component of the in-circuit security system 100 is a random number generator 108. The random number generator 108 is used for seeding cryptographic algorithms, and may use any of established methods for guaranteeing sufficient randomness. The random number generator 108 may be included as part of the cryptographic subsystem 104 or may be a standalone component coupled to the subsystem 104. The cryptographic subsystem 104 is a dedicated system for performing encryption and decryption, digital signing and digital signature verification. In one embodiment the subsystem 104 is responsible for storing cryptographic keys in its own memory; in another, the subsystem is coupled to and uses the main memory 102 of the in-circuit security system 100. Additionally, one primary embodiment of the invention uses a cryptographic acceleration chip or component as the cryptographic subsystem 104. Alternative embodiments are coupled to and use the main processor 101 as the cryptographic engine.
  • The identity credential verification subsystem 103 is used to determine the identity of an individual attempting to use the in-circuit security system 100 and identify his associated security privileges. The identity credential verification subsystem 103 performs identity credential acquisition, analysis, storage and matching. In the primary embodiment of the invention, the identity credential verification subsystem 103 uses digital representations of fingerprints as the identity credential. In this embodiment the identity credential verification subsystem 103 performs fingerprint image acquisition, and template generation, storage, and matching. The identity credential verification subsystem 103 may use the main processor 101 of the in-circuit security system 100 for credential processing actions or may use its own specialized processor. Similarly, it may employ its own memory for credential storage or use the main memory 102 of the in-circuit security system 100. The in-circuit security system 100 provides one or more connections 110 to external components for credential sensing, such as a fingerprint sensor.
  • The in-circuit security system 100 incorporates an interface 112 to a transceiver 107, antenna, wire, or other remote communication device that is coupled to the processor 101. This component is used for transmission of data from one device to another. All sensitive data that is to be transmitted from the in-circuit security system 100 can be encrypted using the cryptographic subsystem 104, so it is not necessary to place a transceiver 107 within the secure boundaries of the in-circuit security system 100. However, in some embodiments it may prove to be convenient to incorporate the transceiver 107 into the chip. In these embodiments the interface 112 would be from the transceiver to an antenna, wire, or other communication device. In a primary embodiment of the invention, the transmission technology is radio-frequency identification (RFID), such as the ISO 14443 A/B or 15693 standards. In another embodiment the in-circuit security system 100 uses Bluetooth or infrared technology. Other embodiments provide a combination of these technologies or others. In alternative embodiments, it may be useful to use a wired technology, such as a serial or USB connection. The in-circuit security system 100 preferably provides external connections 112 for requisite connectors, cables or antennae.
  • The authentication of individuals allows the in-circuit security system 100 to associate an individual with specific security privileges within the system. For example, one user may be enrolled and identified as a typical user with no ability to reset the system 100, while an alternate user may be identified as an administrator with that ability. Additionally, the in-circuit security system 100 may be programmed to perform a variety of both temporary and permanent responses to security events. For example, a specified number of access denials within a particular time interval may cause the in-circuit security system 100 to suspend all actions or halt the real-time clock 105 until reset by an enrolled administrator. Alternatively, an attempt to crack open the case of the chip housing the in-circuit security system 100 may result in permanent erasure of memory 102, or destruction of other components. The in-circuit security system 100 may also be programmed to allow an enrolled individual to directly disable or destroy components.
  • As described above, the in-circuit security system 100 is combined into one secured chip with three major interfaces: an interface to a credential sensing mechanism, such as a fingerprint sensor; an interface to peripheral components, such as non-secure processors or user-interface devices; and an interface to a transceiver or antenna for remote communications. Other interfaces are strictly prevented. The chip may use one or more physical security measures to prevent information eavesdropping. These obfuscation techniques include use of “potting”, oxygen-reactive layers, photo-sensors, Hall effect sensors, and circuits that monitor clock frequency and/or reset frequency.
  • The system 100 may additionally perform algorithmic analysis of interface traffic. For example, fingerprint images received from a fingerprint sensor may be analyzed by the identity credential verification subsystem 103; if the identity credential verification subsystem 103 repeatedly receives the exact same bit pattern representation of fingerprints, it is possible that someone is deliberately placing that bit pattern on the interface. Similarly, if the identity credential verification subsystem 103 receives bit patterns that are an exact rotation or other permutation of a previously received image, again someone may be altering the contents of the interface.
  • The in-circuit security system can be used as a standalone component for security applications or as one of multiple components within an electronic device. In one use of the invention, a handheld computer is equipped with the in-circuit security system 100, as seen in FIG. 2. The computer further comprises a display 213, a keypad 214, a non-secure processor 201 and memory 202, and a fingerprint sensor 203. Additionally, for embodiments in which the in-circuit security system 100 includes a transceiver 107 that uses cellular wireless technology, the handheld computer also incorporates an antenna 204.
  • The primary user of the handheld computer enrolls a fingerprint, a digital certificate, and an associated private key into the in-circuit security system 100. The fingerprint is stored in the identity credential verification subsystem 103 and is used to authorize use of the private key associated with the digital certificate. The digital certificate may be stored in the cryptographic subsystem 104 or the main memory 102 of the in-circuit security system 100.
  • The individual typically uses the handheld computer to transmit and receive e-mail. He requires the in-circuit security system 100 to digitally sign his e-mail, which requires accessing the stored private key associated with his fingerprint. He selects his e-mail program, and types an e-mail for transmission using the keypad 214. The keypad 214 is coupled to the processor 201, which receives the data and creates an appropriate message packet for transmission. Once created, the message packet is sent to the in-circuit security system 100 for further processing.
  • The processor 101 of the in-circuit security system 100 receives the message packet and analyzes the established security settings for transmission of e-mail. Because the in-circuit security system 100 is configured to require digital signing of e-mail prior to transmission, the individual must first authenticate his fingerprint to the identity credential verification subsystem 103. The biometric authentication is required to prevent unauthorized users from encrypting e-mail with a private key that is not theirs. The processor 101 signals the identity credential verification subsystem 103 to wait for a new fingerprint sample from the fingerprint sensor 203, and signals the non-secure processor 201 to provide a visual prompt to the user on the display 213. After the user places his finger on the fingerprint sensor 203 it sends the new fingerprint image to the identity credential verification subsystem 103. The identity credential verification subsystem 103 analyzes the image, generates a template, and compares it to the enrolled fingerprint template. If the two match, the identity credential verification subsystem 103 sends a signal to the processor 101 that the individual is authorized to use the stored private key.
  • The processor 101 now sends the e-mail message to the cryptographic subsystem 104 and instructs the cryptographic subsystem 104 to sign the message. This typically involves generating a hash of the message and encrypting it with the private key. The cryptographic subsystem 104 may also include a timestamp generated by the real-time clock, the unique device identifier, or other data, prior to the hash. The cryptographic subsystem 104 now sends the signed e-mail message back to the processor 101. The processor 101, in turn, sends the signed e-mail to the cellular transceiver 107 for transmission to a remote recipient.
  • In a second embodiment of the invention, the in-circuit security system 100 is embedded into an electronic door locking mechanism that is used to control access to a secure facility. As seen in FIG. 3, the system comprises the in-circuit security system 100 with a wired connection to the electronic door lock 314, a fingerprint sensor 203, and a series of light emitting diodes (LEDs) 313 that are used to provide visual feedback to the user. Individuals access the secure facility by demonstrating enrollment of their fingerprint into the in-circuit security system 100. The security settings of the in-circuit security system 100 are configured to shut down the entire locking mechanism on a pre-specified number of failed attempts within a pre-specified time span. This is example of security parameters and settings that are stored within the memory 102.
  • An enrolled individual wishes to enter the facility. One LED 313 glows green, signaling that the fingerprint sensor 303 is ready. The individual places his finger on the sensor 203, which generates a fingerprint image and sends it to the identity credential verification subsystem 103. The identity credential verification subsystem 103 generates a fingerprint template and compares it to the enrolled fingerprints. The new fingerprint template matches an existing template, so the identity credential verification subsystem 103 sends the individual's unique identifier to the processor 101. The processor 101 accesses the memory 102, which stores security privileges associated with enrolled individuals. The individual who is currently authenticated is authorized to enter the secure facility alone, so the processor 101 sends a signal to the transceiver 107 to trigger the lock 314 to release.
  • Now an individual who has not been pre-enrolled into the identity credential verification subsystem 103 attempts to enter the secure facility. The individual places his finger on the fingerprint sensor 203, which sends an image of the fingerprint back to the identity credential verification subsystem 103. The fingerprint is compared to all of the enrolled fingerprints, and no match is found because the individual is not enrolled. The identity credential verification subsystem 103 records the date, time and other requisite characteristics of the failed access attempt, and flashes a red LED 313 to show that access has been denied. The identity credential verification subsystem 103 also notifies the appropriate process within the processor 101 that an access failure has occurred.
  • The individual now tries another, un-enrolled finger. The identity credential verification subsystem 103 records the subsequent failure, and notifies the processor 101 that there has been another failure. When the number of failed attempts reaches the pre-established limit, the identity credential verification subsystem 103 again notifies the processor 101 that a failure has occurred. At this point, the processor 101 applies the security settings and places the electronic lock mechanism 314 in a state where it cannot be unlocked unless it is reset by a recognized authority; in a primary embodiment this would be implemented using a “fail-secure” lock and would involve disconnecting a power source. Alternative actions can occur to put the lock 314 into this state as necessary. The processor 101 may also put the identity credential verification subsystem 103 into a state where it does not accept new fingerprints, create images, or perform matching. As desired by the regulator of the secure facility, the processor 101 may instruct the identity credential verification subsystem 103 to delete any enrolled fingerprint images. These are all examples of programmable security settings.
  • FIGS. 4-5 depict embodiments of a biometric personal identification device (BPID) for remoted controlled applications.
  • Necessity of the BPID of the present invention:
  • Remote control products have been in service for decades and have become ubiquitous for many applications. However, despite the many successful applications for saving time, steps, and effort, there are only limited examples among remote control products and remote control communication systems that demonstrate the capacity to provide security to remote control applications that need or could be improved by security.
  • Moreover, at the time of this writing, the inventors have found few existing examples in the arts relating to “remote control” intellectual property or to “remote-controlled products and applications”, where privacy concerns are simultaneously addressed along with security and authentication concerns. Notwithstanding, there are many existing and potential remote control applications where privacy and security, user authentication, user auditing, and user monitoring, concerns abound. Unsurprisingly, latent demand exists for appropriate existing and potential applications. The marketplace is ready for privacy and security oriented remote controller devices and associated remote-controlled products and applications, despite the shortage of applicable technology prior to the emergence of the present inventions.
  • More specifically, latent demand exists for apparatuses, methods, and systems capable of monitoring, auditing, and enforcing different privilege levels of authorized usage for a remote control apparatus and corresponding different privilege levels of authorized remote control of remote-controlled resources, e.g., entertainment resources, polling resources, testing resources, interactive or user response-oriented resources, and other resources and assets including remote controlled machinery, etc. Typical examples of potential products and applications for which latent demand exists where differentiable privacy- and security-oriented remote control transmitter and/or transceiver apparatuses are appropriate include:
      • Entertainment Applications, most notably, conventional TV and/or PC control applications such as parental control, Nielsen sweep analysis, etc.; cable television (CATV) applications including “set-top box” control applications including parental control and Nielsen sweeps, access to premium services, access to portable and mobile subscription services, access to bi-directional interactive applications such as multi-player leisure game services, leisure game show inputs, etc.;
      • Remote Polling, Voting, and Testing Applications, where differentiable remote control transmitters and transceivers can be used to register, verify, and log in—and where applicable, continuously verify—proven single instances of distinct, unique, authenticated voters' votes, or responders' voting responses to polling application choices, or test subjects' responses to test questions;
      • Educational Services, such as unidirectional and bi-directional “remote learning” content control applications, including “Interactive Learning” applications, including continuously verifiable, preauthorized testing services and applications;
      • Military, Government, and Law Enforcement Services, e.g., “Soldier of the Future” products.
  • Everything considered, there is a definite need in the art to provide consolidated security, and privacy features into remote control apparatuses and remote controlled systems. There is also a definite need in the art to provide anonymity features, where applicable and appropriate, into remote control apparatuses and remote controlled systems. While prior art inventors have addressed security concerns to a certain extent, and while a few inventors have addressed privacy and security concerns together, no prior art or products have addressed privacy and security in the flexible and robust apparatuses, methods, and systems of the present BPID. Several examples of prior art addressing privacy and/or security follow below.
  • Accordingly, it is a primary object of the BPID disclosed herein, to provide a privacy- and security-oriented remote controller apparatus, method, and system for privately and securely controlling a variety of remotely controllable machinery, including (but not limited to) televisions, personal computers, set-top control terminals, etc.
  • It is another primary object to provide a privacy- and security-oriented remote control apparatus, method, and system for cross-platform and cross-application mobility and portability, where preauthorized, enrolled users can freely carry their privileges from one location to another to control the same, similar, and/or different remotely controlled equipment.
  • It is another primary object, to provide an apparatus, method and system, which taken together, provide means for absolute personal identity authentication for individuals wishing to remotely control access-protected, restricted, metered, monitored resources, assets, and services.
  • Another object of the BPID is to enable service providers to monitor, audit, and track the activity of users accessing, or attempting to access, restricted and protected equipment and services by means of remote controllers.
  • Another object of the present BPID is to match physical persons to discrete devices such that only authorized individuals are associated with each device and so that only authorized individuals can effectuate access with a remote controller. A related object of the BPID is to create multiple levels of privilege and access for a plurality of users accessing a plurality of remote control apparatuses to control a plurality of remote-controlled devices and applications.
  • It is another primary object of the BPID to decentralize authentication and verification services such that the user apparatuses serve as autonomous authentication devices and can identify persons and their assigned user privileges without requiring remote access to a central system or to a centralized authentication database.
  • The BPIDs disclosed herein provide privacy- and security-oriented identity credential verification devices (in prior art applications of the instant inventors) and privacy- and security oriented remote control apparatuses, subsystem apparatuses, methods, and systems adapted for authenticating and verifying prospective remote control apparatus users (in this application).
  • The most basic user-operated devices of prior art inventions to the instant inventors are simply identity credential verification devices. While such devices excel at identifying prospective users thereof, by means of re-verifying a submitted biometric credential such as a fingerprint, they do not effectuate remote control events in remotely controlled machinery.
  • Prospective users of remote controllers of the present BPID must verify their pre-enrolled identities prior to accessing their preauthorized, assigned privileges to their remote control devices, prior to being authorized and granted access to their remote control devices, and subsequently, to compatible remote-controlled resources equipped according to teachings of the present BPID. User-operated apparatuses of the BPID are privacy- and security oriented, remote control apparatuses. The authenticated and verified, user-operated remote control apparatuses of the present BPID either (1) include an identity credential verification subsystem (ICVS) module for verifying a prospective user's pre-enrolled status and privileges, and/or (2) interface with either an independent, proximate, ICVS, and/or (3) an ICVS module embedded into a remote-controlled resource. Such a remote-controlled resource can only be operated by properly enabled remote controllers, which are accessible and operable only by pre-enrolled, preauthorized users who are re-authenticated and re-verified prior to each operational event.
  • The methods of the BPID comprise steps, procedures, policies for accomplishing and enforcing pre-enrollment and subsequent authentication of preauthorized users. The systems of the BPID embed an ICVS subsystem in the remote control apparatus of the BPID and/or implement an ICVS system external and proximate to the remote control apparatus by means of a wireless interactive communication link, such as a Bluetooth connection.
  • The platform, fundamental apparatus of the invention comprises the BPID as described above, plus one or more implementations of enabling application software. This allows the device to function as a remote control for apparatuses including (but not limited to) televisions, VCRs, DVD players and stereo systems, radios, etc., which can be pre-programmed to respond only to pre-determined, authorized remote control apparatuses. The remote control apparatuses of the present invention including platform BPID functionality, can be embodied as either transmitters—using any appropriate transmission media, including, but not limited to, infrared and RF—or, in more advanced applications with additional privacy and security features—as transceivers. Optionally, some or all of the remotely controlled functionality of the present invention can be alternatively embodied into interface controller devices such as “set-top controllers” or “set-top boxes”, rather than solely in one or more remotely controlled devices themselves such as televisions, DVD players and stereo systems, radios, etc.
  • Notwithstanding, in most embodiments there is no need for external “central site interaction”, nor a need for elaborate, expensive, or technically laborious centralized interactions or complex, non-proximate signal processing chains.
  • The ICVS subsystem apparatuses of the invention include (1) modular, factory-installed components for implementing ICVS in a remote control apparatus of the present invention; (2) standalone and independent ICVS-class apparatuses, i.e., either (2a) multi-functional set-top boxes or (2b) single function ICVS boxes accessible by RF or other viable communications standard; and (3) customer-installable modules to upgrade platform devices such as to implement advanced features, or to upgrade existing features.
  • To implement privacy and security features into remote controllers of the present invention, both a factory-installed, embedded core ICVS subsystem apparatus and a user-installed modular core subsystem apparatus are disclosed; either or both can be installed in the remote control of the present invention. Both installed and/or modularly installable subsystem apparatuses can enable and perform authentication of pre-authorized users. ICVS-borne, “user authentication functions” implement not only basic user authentication in a remote controller, but can also permit multiple levels of privileged access to remote-controlled resources as well as portable privileges for accessing remote-controlled resources and their applications, services, etc.
  • The user authentication process is further performed in a manner supportive of the individual's right to privacy, in accord with the application accessed and the stipulations of the remote-controlled resource or application owner, if any. The preferred embodiment of the invention stores a pre-enrolled biometric template of the authorized individual within tamper-resistant memory within the remote control apparatus. The template is never authorized to leave the device, and is “zeroed-out” upon unauthorized attempted physical or logical access. When an individual wishes to access controlled resources, he/she submits another biometric template through a reader on the device. If the submitted identity credential matches the template stored therein, the user is granted access to operate the remote controller and the machinery it controls.
  • One primary preferred embodiment of the remote controller apparatus of the present invention is a transmitter adapted for generating and transmitting a basic, “standalone”, simplex, one-way “identity credential verification signal” transmission from a user's remote control device to a target device after successful initial user authentication. This first primary embodiment performs the user authentication process, displays of the result in the form of a user “identity credential verification display”, generates and transmits as appropriate, a user “identity credential verification signal”, and also transmits user control signals to the remotely controlled device.
  • A second primary preferred embodiment of the remote controller apparatus comprises a transceiver version. The transceiver version is capable of performing standalone user authentication, but is also capable of communicating with an external identity credential verification system (ICVS) and/or other external device or transceiver, based on how it is configured at manufacturing and/or based on how it was optioned by a user and a system administrator after deployment. As described in the BPID discussion, the user-operated remote control transceiver may use a wireless technology ranging from IrDA to RF, or optionally, may use a wired communications medium and/or protocol. In Willis of interactivity, this second preferred embodiment is capable of receiving a plurality of signals from other remote control user apparatuses and/or from external, remote-controlled apparatuses, appropriately equipped. Depending on the situation, a variety of different signal types may be transmitted and received by appropriately equipped user remote control apparatuses and remotely controlled interface devices including set-top boxes and/or other appropriately equipped transceiver apparatuses.
  • For purposes of illustration, the apparatus of the invention will be described as using a fingerprint for the identity credential verification method and Bluetooth RF wireless technology as the communication media. However, a variety of modifications and substitutions may be made thereto without departing from the spirit and scope of the inventions. Thus, by way of example, the invention is not limited to the use of any specific communications architecture or system, or specific method or type of ICVS.
  • Theory of Operation
  • In one operational embodiment, the remote control apparatus of the invention is used in conjunction with a television, a television set-top box, and a premium cable channel such as HBO, Cinemax or Showtime. The remote control is issued to the paying customer and is enrolled with his fingerprint upon application for the premium service. The enrollment process may take place within the cable company's office, online, or through another company-approved method. As per traditional methods, the cable company will also supply the set-top box in order to provide access to the premium cable channel. In this embodiment of the invention, the set-top box is adapted to allow access to the premium channel only upon receipt of an encrypted authorization signal from the authorized remote control device, from among a “premium class” of remote control devices. This further requires that the set-top box is assigned either a public/private key pair or a symmetric key, and that it receives the public key of the authorized remote control apparatus.
  • When the individual wishes to access the channel, he selects the remote control function within his BPID, and selects the premium access channel that he wishes to watch. The device will prompt the individual to authenticate himself. Upon successful verification, the device searches the memory to verify that the authenticated individual owns the necessary privileges to watch the channel. If the individual is accepted, the device creates a message comprising the selected service and an authorization notice, and signs it with the device private key. The device further encrypts the message with either a shared symmetric key or the public key of the set-top box before message transmission. Successful decryption and signature verification within the set-top box will enable the television to display the premium channel. It is important to note that the set-top box functionality, as described, may be implemented within the television itself in order to reduce the physical equipment required by the system.
  • An important ramification of a decentralized architecture, as described above, is the portability of users' privileges. One individual, Alice, may have a subscription to a premium cable channel, while another individual, Bob, may not. Alice and Bob would like to watch a movie on the premium channel together, but for practical reasons cannot watch the movie at Alice's home. In the traditional implementation of premium services, Alice and Bob would not be able to watch the movie at Bob's home, as he does not subscribe to the service. With the present invention, however, Alice can use her remote control apparatus to take her privileges to Bob's house if he has an appropriate set-top box or television, and they can watch the movie together.
  • In another primary embodiment of the invention, again an individual purchases rights to a premium cable channel, and the cable provider issues and enrolls the individual into one device. However, it may be convenient for the individual, or the individual's family, to have multiple remote control devices. In this situation, the individual may use the pre-enrolled device to enroll subsequent devices, creating a master-slave relationship.
  • Another embodiment of the invention creates a “parental control” method for limiting individuals' access to programs, movies and channels that have comment deemed unsuitable. The owner of the remote control device may enroll multiple persons—and their corresponding fingerprints—into his or an alternate remote control device, along with authorization and privilege levels. Similarly to the request for premium cable services as described above, persons wishing to watch particular television programs must authenticate to the remote control device. The remote control processes the authorization, and transmits an authorization or denial signal appropriately to the television or set-top box. This invention can be extended to cover the operation of VCRs and DVD players; DVDs, for example, can be encoded to include multiple versions of a movie satisfying multiple Motion Picture Association of America (MPAA) ratings.
  • In another primary embodiment of the invention, users can perform purchasing and other financial transactions through their television and/or set-top box. In recent years we have seen a proliferation of home shopping television networks and infomercials, in which individuals view purchasable items on their televisions. If the individual would like to place an order, he typically calls a telephone number provided at the bottom of the television screen, and supplies a credit card number for payment. This method of shopping is convenient for many users, but lacks personal security because it simply requires possession of a credit card number, without ensuring ownership of the number. In this embodiment of the invention, persons can still order items through their televisions, yet making use of the security benefits of the remote control apparatus. Because the BPID is designed to store a variety of account information, individuals can store credit card numbers and other financial data for this application.
  • When the viewer selects a home shopping channel, the remote control will register an option for purchasing. If the individual decides to purchase an item, he simply selects the purchasing option on the remote control, and enters the item number and price. He will then select one of the enrolled accounts to pay for the item. This will prompt the user to authenticate himself/herself to the device. If the user is authenticated successfully, the device will sign the message and transmit the appropriate credentials to the television or set-top box. The information can then be transmitted via Internet, phone or other connective medium to pay the seller.
  • The operational embodiments as described above are also suited for accessing “content distribution” subscription services within stereophonic audio systems in homes, offices and automobiles, such as the emerging XM radio service, pay-per-view television services, and other types of subscription services that use remote control devices.
  • For example, the various features and characteristics of the BPID interactive system may include:
  • 1) A private and secure remote control apparatus adapted for authenticating and for matching at least one user identity credential of a prospective user with at least one stored pre-enrolled user identity credential of at least one preauthorized user, further adapted for transmitting user permissions and transmitting remote control signals for accessing and controlling remotely controlled apparatuses comprising resources, applications, and services.
  • 2) The private and secure remote control apparatus recited in 1, wherein the user identity credential comprises at least one personal biometric means.
  • 3) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human fingerprints.
  • 4) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human handprints.
  • 5) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human voice.
  • 6) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human iris patterns.
  • 7) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human facial patterns.
  • 8) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human retinal patterns.
  • 9) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human heartbeat patterns.
  • 10) The private and secure remote control apparatus as recited in 2, wherein said personal biometric means comprise human DNA patterns.
  • 11) The private and secure remote control apparatus as recited in 1, further adapted as a transceiver means both for transmitting user permissions and remote control signals and for receiving data, information, and control signals from remote-controlled apparatuses and interface devices comprising resources, applications, services.
  • 12) The private and secure remote control apparatus as recited in 11, wherein the user identity credential comprises at least one personal biometric means.
  • 13) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human fingerprints.
  • 14) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human handprints.
  • 15) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human voice.
  • 16) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human iris patterns.
  • 17) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human facial patterns.
  • 18) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human retinal patterns.
  • 19) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human heartbeat patterns.
  • 20) The private and secure remote control apparatus as recited in 12, wherein said personal biometric means comprise human DNA patterns.
  • 21) A method for administering and distributing premium cable television services comprising:
  • a) assigning at least one of the private and secure remote control apparatus (of any of the preceding claims) to a pre-authorized user,
  • b) assigning at least one remote-controlled interface device comprising a set-top box adapted for communicating with said remote control apparatus assigned to a pre-authorized user,
  • c) providing said remote control apparatus and said remote-controlled interface device comprising a set-top box with corresponding encryption keys such that the two communicate securely,
  • d) enrolling a pre-authorized user's personal identity credentials into said remote control apparatus,
  • e) enrolling a pre-authorized user's predetermined privileges and authorizations into said remote control apparatus, and
  • f) enrolling into said remote-controlled interface device an access privilege list of classes of remote control apparatuses allowed to access premium services from said remote controlled interface device comprising a set-top box for controlling remote-controlled apparatuses comprising resources, applications, and services.
  • 22) A method for accessing premium cable television service comprising:
  • a) selecting the service using the secure remote control apparatus as recited in any of 1-20,
  • b) authenticating the user to said secure remote control apparatus,
  • c) verifying within said secure remote control apparatus that the user has proper privileges to access the service,
  • d) creating within said secure remote control apparatus a message comprising the authorization and a digital signature,
  • e) encrypting within said secure remote control apparatus the authorization message, using encryption keys distributed at enrollment,
  • f) transmission from said secure remote control apparatus to a pre-distributed remote-controlled interface device comprising a set-top box,
  • g) decrypting within said interface device comprising a set-top box,
  • h) verification of digital signature within said interface device comprising a set-top box, and
  • i) verification of user authorization.
  • 23) A method for establishing restricted access for subsequent users using the secure and private remote control apparatus as recited in any of 1-20, comprising:
  • a) establishing restricted access and privilege levels for subsequent users,
  • b) demonstrating ownership of said device by verifying personal identity,
  • c) enrolling subsequent users' identity credentials within said device, and
  • d) enrolling subsequent users' predetermined privileges and authorizations into said remote control apparatus.
  • 24) An identity credential verification system for matching and authenticating at least one submitted identity credential of a prospective user, wherein said submitted identity credential is matched and verified by said identity credential verification system, comprising:
  • a) at least one remote control user,
  • b) a remote control apparatus platform,
  • c) an onboard identity credential verification system embedded into said remote control apparatus platform including an identity credential verification apparatus means for initially enrolling said at least one user by means of storing at least one enrolled user identity credential and for subsequently matching said at least one user identity credential prior to authorizing and granting access to said remote controller apparatus platform to said at least one remote control user.
  • While the description above refers to particular embodiments of the present invention, it will be understood that many modifications may be made without departing from the spirit thereof. The accompanying claims are intended to cover such modifications as would fall within the true scope and spirit of the present invention.

Claims (19)

1. (canceled)
2. A method comprising:
at a first electronic device comprising a transmitter, a secure processor, a secure memory, and one or more biometric sensors, wherein the first electronic device is configured to communicate securely via the transmitter with a second electronic device that is separate from the first electronic device:
receiving first biometric information of a user via the one or more biometric sensors;
in response to receiving the first biometric information, comparing, via the secure processor, the first biometric information to second biometric information stored in the secure memory;
determining, based on the comparison, whether the user meets authentication criteria;
in accordance with a determination that the user meets authentication criteria:
generating a verification signal that, when received by the second electronic device, grants access to operate the second electronic device, and
transmitting the verification signal to the second electronic device; and
in accordance with a determination that the user does not meet the authentication criteria, forgoing generating the verification signal and transmitting the verification signal to the second electronic device.
3. The method of claim 2, wherein the second biometric information cannot be removed from the first electronic device.
4. The method of claim 2, wherein the secure memory comprises a tamper-resistant memory, and the second biometric information is zeroed-out upon unauthorized attempted access.
5. The method of claim 2, wherein the second biometric information comprises a biometric template, and the user meets authentication criteria when the first biometric information is consistent with the biometric template.
6. The method of claim 2, further comprising:
in accordance with a determination that the user meets authentication criteria, providing access to a resource of the second electronic device to the user.
7. The method of claim 2, wherein the second electronic device is an interface device and the access provided to the user in accordance with the determination that the user meets authentication criteria includes access to a service and an application on the interface device.
8. The method of claim 2, further comprising:
receiving a signal from the second electronic device after providing the verification signal to the second electronic device.
9. The method of claim 2, wherein granting access to operate the second electronic device comprises granting access to media content via the second device.
10. The method of claim 9, wherein the access to media content comprises access to a premium subscription service.
11. The method of claim 2, wherein granting access to operate the second electronic device comprises granting access to educational content via the second device.
12. The method of claim 11, wherein the educational content comprises one or more of a remote learning application, a testing service, and a testing application.
13. The method of claim 2, wherein the second electronic device is locked by an electronic lock mechanism, and granting access to operate the second electronic device comprises unlocking the second electronic device.
14. The method of claim 2, wherein the verification signal, when received by the second electronic device, permits pre-enrolling a third electronic device with access to operate the second electronic device.
15. The method of claim 14, wherein pre-enrolling the third electronic device creates a master-slave relationship between the first electronic device and the third electronic device.
16. A method comprising:
at a first electronic device comprising a transmitter, a secure processor, a secure memory, and one or more biometric sensors, wherein the first electronic device is configured to communicate securely via the transmitter with a second electronic device that is separate from the first electronic device:
receiving, at the first electronic device, a request to purchase an item via a shopping service;
receiving, at the first electronic device, a selection of a purchasing account;
receiving first biometric information of a user via the one or more biometric sensors;
in response to receiving the first biometric information, comparing, via the secure processor, the first biometric information to second biometric information stored in the secure memory;
determining, based on the comparison, whether the user meets authentication criteria;
in accordance with a determination that the user meets authentication criteria:
transmitting to the second electronic device credentials that, when received by the second electronic device, causes a seller of the item to be paid via the purchasing account; and
in accordance with a determination that the user does not meet the authentication criteria, forgoing transmitting the credentials to the second electronic device.
17. The method of claim 16, wherein the shopping service is accessible via the second electronic device.
18. A first electronic device comprising:
a transmitter;
one or more processors, the one or more processors comprising a secure processor;
one or more memories, the one or more memories comprising a secure memory;
one or more biometric sensors; and
one or more programs, wherein the one or more programs are stored in the one or more memories and are configured to be executed by the one or more processors, the one or more programs including instructions, which when executed by the one or more processors, cause the first electronic device to:
receive first biometric information of a user via the one or more biometric sensors;
in response to receiving the first biometric information, compare, via the secure processor, the first biometric information to second biometric information stored in the secure memory;
determine, based on the comparison, whether the user meets authentication criteria;
in accordance with a determination that the user meets authentication criteria:
generate a verification signal that, when received by a second electronic device separate from the first electronic device, grants access to operate the second electronic device, and
transmit the verification signal to the second electronic device; and
in accordance with a determination that the user does not meet the authentication criteria, forgo generating the verification signal and transmitting the verification signal to the second electronic device,
wherein the first electronic device is configured to communicate securely via the transmitter with the second electronic device.
19. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a first electronic device comprising a transmitter, a secure processor, a secure memory, and one or more biometric sensors, the first electronic device configured to communicate securely via the transmitter with a second electronic device that is separate from the first electronic device, cause the first electronic device to:
receive first biometric information of a user via the one or more biometric sensors;
in response to receiving the first biometric information, compare, via the secure processor, the first biometric information to second biometric information stored in the secure memory;
determine, based on the comparison, whether the user meets authentication criteria;
in accordance with a determination that the user meets authentication criteria:
generate a verification signal that, when received by the second electronic device, grants access to operate the second electronic device, and
transmit the verification signal to the second electronic device; and
in accordance with a determination that the user does not meet the authentication criteria, forgo generating the verification signal and transmitting the verification signal to the second electronic device.
US15/890,021 2003-05-30 2018-02-06 In-circuit security system and methods for controlling access to and use of sensitive data Abandoned US20180309750A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/890,021 US20180309750A1 (en) 2003-05-30 2018-02-06 In-circuit security system and methods for controlling access to and use of sensitive data

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US47475003P 2003-05-30 2003-05-30
US10/858,287 US7587611B2 (en) 2003-05-30 2004-06-01 In-circuit security system and methods for controlling access to and use of sensitive data
US12/555,480 US8495382B2 (en) 2003-05-30 2009-09-08 In-circuit security system and methods for controlling access to and use of sensitive data
US13/947,313 US9124930B2 (en) 2003-05-30 2013-07-22 In-circuit security system and methods for controlling access to and use of sensitive data
US14/716,766 US9923884B2 (en) 2003-05-30 2015-05-19 In-circuit security system and methods for controlling access to and use of sensitive data
US15/890,021 US20180309750A1 (en) 2003-05-30 2018-02-06 In-circuit security system and methods for controlling access to and use of sensitive data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/716,766 Continuation US9923884B2 (en) 2003-05-30 2015-05-19 In-circuit security system and methods for controlling access to and use of sensitive data

Publications (1)

Publication Number Publication Date
US20180309750A1 true US20180309750A1 (en) 2018-10-25

Family

ID=33511627

Family Applications (18)

Application Number Title Priority Date Filing Date
US10/858,290 Abandoned US20040239648A1 (en) 2003-05-30 2004-06-01 Man-machine interface for controlling access to electronic devices
US10/858,336 Expired - Fee Related US7783892B2 (en) 2003-05-30 2004-06-01 System and methods for assignation and use of media content subscription service privileges
US10/858,287 Expired - Fee Related US7587611B2 (en) 2003-05-30 2004-06-01 In-circuit security system and methods for controlling access to and use of sensitive data
US10/997,291 Ceased US7420546B2 (en) 2003-05-30 2004-11-24 Man-machine interface for controlling access to electronic devices
US12/201,568 Expired - Lifetime US7525537B2 (en) 2003-05-30 2008-08-29 Man-machine interface for controlling access to electronic devices
US12/430,702 Expired - Lifetime US7688314B2 (en) 2003-05-30 2009-04-27 Man-machine interface for controlling access to electronic devices
US12/555,480 Expired - Lifetime US8495382B2 (en) 2003-05-30 2009-09-08 In-circuit security system and methods for controlling access to and use of sensitive data
US12/604,814 Expired - Lifetime USRE42038E1 (en) 2003-05-30 2009-10-23 Man-machine interface for controlling access to electronic devices
US12/732,946 Abandoned US20100182125A1 (en) 2003-05-30 2010-03-26 Man-machine interface for controlling access to electronic devices
US12/861,121 Expired - Fee Related US8327152B2 (en) 2003-05-30 2010-08-23 System and methods for assignation and use of media content subscription service privileges
US13/693,607 Expired - Lifetime US8788813B2 (en) 2003-05-30 2012-12-04 System and methods for assignation and use of media content subscription service privileges
US13/947,313 Expired - Fee Related US9124930B2 (en) 2003-05-30 2013-07-22 In-circuit security system and methods for controlling access to and use of sensitive data
US14/305,904 Expired - Fee Related US9319405B2 (en) 2003-05-30 2014-06-16 System and methods for assignation and use of media content subscription service privileges
US14/640,020 Expired - Lifetime US9342674B2 (en) 2003-05-30 2015-03-05 Man-machine interface for controlling access to electronic devices
US14/716,766 Expired - Fee Related US9923884B2 (en) 2003-05-30 2015-05-19 In-circuit security system and methods for controlling access to and use of sensitive data
US15/077,646 Abandoned US20160308854A1 (en) 2003-05-30 2016-03-22 System and methods for assignation and use of media content subscription service privileges
US15/655,801 Abandoned US20170359335A1 (en) 2003-05-30 2017-07-20 In-circuit security system and methods for controlling access to and use of sensitive data
US15/890,021 Abandoned US20180309750A1 (en) 2003-05-30 2018-02-06 In-circuit security system and methods for controlling access to and use of sensitive data

Family Applications Before (17)

Application Number Title Priority Date Filing Date
US10/858,290 Abandoned US20040239648A1 (en) 2003-05-30 2004-06-01 Man-machine interface for controlling access to electronic devices
US10/858,336 Expired - Fee Related US7783892B2 (en) 2003-05-30 2004-06-01 System and methods for assignation and use of media content subscription service privileges
US10/858,287 Expired - Fee Related US7587611B2 (en) 2003-05-30 2004-06-01 In-circuit security system and methods for controlling access to and use of sensitive data
US10/997,291 Ceased US7420546B2 (en) 2003-05-30 2004-11-24 Man-machine interface for controlling access to electronic devices
US12/201,568 Expired - Lifetime US7525537B2 (en) 2003-05-30 2008-08-29 Man-machine interface for controlling access to electronic devices
US12/430,702 Expired - Lifetime US7688314B2 (en) 2003-05-30 2009-04-27 Man-machine interface for controlling access to electronic devices
US12/555,480 Expired - Lifetime US8495382B2 (en) 2003-05-30 2009-09-08 In-circuit security system and methods for controlling access to and use of sensitive data
US12/604,814 Expired - Lifetime USRE42038E1 (en) 2003-05-30 2009-10-23 Man-machine interface for controlling access to electronic devices
US12/732,946 Abandoned US20100182125A1 (en) 2003-05-30 2010-03-26 Man-machine interface for controlling access to electronic devices
US12/861,121 Expired - Fee Related US8327152B2 (en) 2003-05-30 2010-08-23 System and methods for assignation and use of media content subscription service privileges
US13/693,607 Expired - Lifetime US8788813B2 (en) 2003-05-30 2012-12-04 System and methods for assignation and use of media content subscription service privileges
US13/947,313 Expired - Fee Related US9124930B2 (en) 2003-05-30 2013-07-22 In-circuit security system and methods for controlling access to and use of sensitive data
US14/305,904 Expired - Fee Related US9319405B2 (en) 2003-05-30 2014-06-16 System and methods for assignation and use of media content subscription service privileges
US14/640,020 Expired - Lifetime US9342674B2 (en) 2003-05-30 2015-03-05 Man-machine interface for controlling access to electronic devices
US14/716,766 Expired - Fee Related US9923884B2 (en) 2003-05-30 2015-05-19 In-circuit security system and methods for controlling access to and use of sensitive data
US15/077,646 Abandoned US20160308854A1 (en) 2003-05-30 2016-03-22 System and methods for assignation and use of media content subscription service privileges
US15/655,801 Abandoned US20170359335A1 (en) 2003-05-30 2017-07-20 In-circuit security system and methods for controlling access to and use of sensitive data

Country Status (6)

Country Link
US (18) US20040239648A1 (en)
EP (3) EP1629624B1 (en)
JP (7) JP2007503797A (en)
CA (7) CA2857208C (en)
DK (1) DK1629624T3 (en)
WO (3) WO2005001611A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11494470B2 (en) 2016-10-24 2022-11-08 Sony Corporation Information processing apparatus and information processing method

Families Citing this family (310)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11204729B2 (en) 2000-11-01 2021-12-21 Flexiworld Technologies, Inc. Internet based digital content services for pervasively providing protected digital content to smart devices based on having subscribed to the digital content service
AU2002226948A1 (en) 2000-11-20 2002-06-03 Flexiworld Technologies, Inc. Tobile and pervasive output components
US9613483B2 (en) * 2000-12-27 2017-04-04 Proxense, Llc Personal digital key and receiver/decoder circuit system and method
JP2007503797A (en) * 2003-05-30 2007-02-22 プリヴァリス・インコーポレーテッド In-circuit security system and method for controlling access and use of sensitive data
US7712140B2 (en) * 2003-08-04 2010-05-04 Lsi Corporation 3-prong security/reliability/real-time distributed architecture of information handling system
EP2937805B1 (en) * 2003-09-30 2022-01-05 Nxp B.V. Proximity authentication system
US9020854B2 (en) 2004-03-08 2015-04-28 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
US8296562B2 (en) * 2004-07-15 2012-10-23 Anakam, Inc. Out of band system and method for authentication
US8528078B2 (en) * 2004-07-15 2013-09-03 Anakam, Inc. System and method for blocking unauthorized network log in using stolen password
US8533791B2 (en) * 2004-07-15 2013-09-10 Anakam, Inc. System and method for second factor authentication services
WO2006019451A1 (en) * 2004-07-15 2006-02-23 Anakam L.L.C. System and method for blocking unauthorized network log in using stolen password
US20100100967A1 (en) * 2004-07-15 2010-04-22 Douglas James E Secure collaborative environment
US8190907B2 (en) 2004-08-11 2012-05-29 Sony Computer Entertainment Inc. Process and apparatus for automatically identifying user of consumer electronics
AU2005319019A1 (en) 2004-12-20 2006-06-29 Proxense, Llc Biometric personal data key (PDK) authentication
US20060136717A1 (en) 2004-12-20 2006-06-22 Mark Buer System and method for authentication via a proximate device
US8228299B1 (en) 2005-01-27 2012-07-24 Singleton Technology, Llc Transaction automation and archival system using electronic contract and disclosure units
US8194045B1 (en) 2005-01-27 2012-06-05 Singleton Technology, Llc Transaction automation and archival system using electronic contract disclosure units
US20080222426A1 (en) * 2005-02-10 2008-09-11 Koninklijke Philips Electronics, N.V. Security Device
US7743977B2 (en) * 2005-02-28 2010-06-29 Broadcom Corporation Method and system for random data access for security applications
JP2006260054A (en) * 2005-03-16 2006-09-28 Sharp Corp Apparatus and method for authentication, authentication program for making computer execute same method, and machine-readable recording medium recording same program
JP4922288B2 (en) 2005-03-24 2012-04-25 プリバリス,インコーポレイテッド Biometric device with smart card function
EP1710764A1 (en) * 2005-04-07 2006-10-11 Sap Ag Authentication of products using identification tags
WO2006126310A1 (en) * 2005-05-27 2006-11-30 Sharp Kabushiki Kaisha Display device
ATE480860T1 (en) * 2005-07-26 2010-09-15 Sony Ericsson Mobile Comm Ab ARRANGEMENT FOR GENERATING DOUBLE IMAGES
US8140601B2 (en) * 2005-08-12 2012-03-20 Microsoft Coporation Like processing of owned and for-purchase media
EP1802030A1 (en) * 2005-12-23 2007-06-27 Nagracard S.A. Secure system-on-chip
US7657849B2 (en) 2005-12-23 2010-02-02 Apple Inc. Unlocking a device by performing gestures on an unlock image
EP1811415A1 (en) * 2005-12-23 2007-07-25 Nagracard S.A. Secure system-on-chip
US8656191B2 (en) 2005-12-23 2014-02-18 Nagravision S.A. Secure system-on-chip
US8219129B2 (en) 2006-01-06 2012-07-10 Proxense, Llc Dynamic real-time tiered client access
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US8024811B2 (en) * 2006-01-19 2011-09-20 Research In Motion Limited System and method for secure PIN exchange
WO2007130232A2 (en) * 2006-03-24 2007-11-15 Home 2Us Communications, Inc. Subscriber management system and method
US8111243B2 (en) 2006-03-30 2012-02-07 Cypress Semiconductor Corporation Apparatus and method for recognizing a tap gesture on a touch sensing device
US7904718B2 (en) 2006-05-05 2011-03-08 Proxense, Llc Personal digital key differentiation for secure transactions
JP4177858B2 (en) * 2006-05-18 2008-11-05 株式会社カシオ日立モバイルコミュニケーションズ Portable terminal device with fingerprint authentication function and program
US20070286464A1 (en) * 2006-06-08 2007-12-13 Jayanetti J K D Ruwan System and method for capturing a fingerprint using an electronic sensor
FR2905187B1 (en) * 2006-08-22 2012-11-16 Ingenico Sa BIOMETRIC ELECTRONIC PAYMENT TERMINAL AND TRANSACTION METHOD
KR100826873B1 (en) * 2006-09-07 2008-05-06 한국전자통신연구원 Method and Apparatus for Biometrics
KR100894277B1 (en) * 2006-09-15 2009-04-21 엘지전자 주식회사 Mobile terminal
US8468591B2 (en) 2006-10-13 2013-06-18 Computer Protection Ip, Llc Client authentication and data management system
KR101270379B1 (en) 2006-10-18 2013-06-05 삼성전자주식회사 Method for performing specific function in wireless terminal with lock function
US20080115198A1 (en) * 2006-10-31 2008-05-15 Hsu Paul J Multi-factor authentication transfer
US9269221B2 (en) 2006-11-13 2016-02-23 John J. Gobbi Configuration of interfaces for a location detection system and application
JP4953850B2 (en) * 2007-02-09 2012-06-13 シャープ株式会社 Content output system, portable communication terminal, and content output device
US20080197971A1 (en) * 2007-02-16 2008-08-21 Avraham Elarar System, method and article for online fraudulent schemes prevention
US9660812B2 (en) * 2007-02-28 2017-05-23 Red Hat, Inc. Providing independent verification of information in a public forum
DE102007015228A1 (en) * 2007-03-29 2008-10-02 Siemens Ag Chip-protected smart card and method associated with its manufacture
US8692655B2 (en) * 2007-05-07 2014-04-08 Bloomberg Finance L.P. Dynamically programmable RFID transponder
JP5023389B2 (en) * 2007-07-04 2012-09-12 Necカシオモバイルコミュニケーションズ株式会社 Portable terminal device and program
JP2009054118A (en) * 2007-08-29 2009-03-12 Sharp Corp User interface device, user interface method, and program
DE102007041768B4 (en) * 2007-09-04 2010-03-04 Deckel Maho Pfronten Gmbh System for controlling access to a machine tool
US20090067688A1 (en) * 2007-09-07 2009-03-12 Authentec, Inc. Finger sensing apparatus with credential release and associated methods
US9158957B2 (en) 2007-09-07 2015-10-13 Apple Inc. Finger sensing apparatus using hybrid matching and associated methods
US9053351B2 (en) * 2007-09-07 2015-06-09 Apple Inc. Finger sensing apparatus using image watermarking and associated methods
US20090067685A1 (en) * 2007-09-07 2009-03-12 Authentec, Inc. Finger sensing apparatus using template watermarking and associated methods
KR101615461B1 (en) 2007-09-24 2016-04-25 애플 인크. Embedded authentication systems in an electronic device
US10181055B2 (en) * 2007-09-27 2019-01-15 Clevx, Llc Data security system with encryption
US8659427B2 (en) 2007-11-09 2014-02-25 Proxense, Llc Proximity-sensor supporting multiple application services
KR100925327B1 (en) * 2007-11-26 2009-11-04 한국전자통신연구원 The method and apparatus for detecting network movement of dcas host in downloadable conditional access system
JP4744503B2 (en) * 2007-11-30 2011-08-10 シャープ株式会社 Operation processing device
US8171528B1 (en) 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US9251332B2 (en) 2007-12-19 2016-02-02 Proxense, Llc Security system and method for controlling access to computing resources
US9361440B2 (en) * 2007-12-21 2016-06-07 Apple Inc. Secure off-chip processing such as for biometric data
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
US8508336B2 (en) 2008-02-14 2013-08-13 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
US20090224874A1 (en) * 2008-03-05 2009-09-10 International Business Machines Corporation Apparatus, system, and method for providing authentication and activation functions to a computing device
US11120449B2 (en) 2008-04-08 2021-09-14 Proxense, Llc Automated service-based order processing
KR101053872B1 (en) * 2008-06-16 2011-08-03 삼성전자주식회사 Mobile terminal and its personal information protection method
US8267526B2 (en) 2008-06-17 2012-09-18 The Invention Science Fund I, Llc Methods associated with receiving and transmitting information related to projection
US20090310039A1 (en) * 2008-06-17 2009-12-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Methods and systems for user parameter responsive projection
US8641203B2 (en) 2008-06-17 2014-02-04 The Invention Science Fund I, Llc Methods and systems for receiving and transmitting signals between server and projector apparatuses
US8384005B2 (en) 2008-06-17 2013-02-26 The Invention Science Fund I, Llc Systems and methods for selectively projecting information in response to at least one specified motion associated with pressure applied to at least one projection surface
US8403501B2 (en) 2008-06-17 2013-03-26 The Invention Science Fund, I, LLC Motion responsive devices and systems
US8955984B2 (en) 2008-06-17 2015-02-17 The Invention Science Fund I, Llc Projection associated methods and systems
US8936367B2 (en) 2008-06-17 2015-01-20 The Invention Science Fund I, Llc Systems and methods associated with projecting in response to conformation
US8733952B2 (en) 2008-06-17 2014-05-27 The Invention Science Fund I, Llc Methods and systems for coordinated use of two or more user responsive projectors
US20090310038A1 (en) 2008-06-17 2009-12-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Projection in response to position
US8944608B2 (en) 2008-06-17 2015-02-03 The Invention Science Fund I, Llc Systems and methods associated with projecting in response to conformation
US20090309826A1 (en) 2008-06-17 2009-12-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Systems and devices
US8308304B2 (en) 2008-06-17 2012-11-13 The Invention Science Fund I, Llc Systems associated with receiving and transmitting information related to projection
US8540381B2 (en) 2008-06-17 2013-09-24 The Invention Science Fund I, Llc Systems and methods for receiving information associated with projecting
US8608321B2 (en) 2008-06-17 2013-12-17 The Invention Science Fund I, Llc Systems and methods for projecting in response to conformation
US8723787B2 (en) 2008-06-17 2014-05-13 The Invention Science Fund I, Llc Methods and systems related to an image capture projection surface
US20100060419A1 (en) * 2008-09-05 2010-03-11 Smith Gaylan S Biometric Control System and Method For Machinery
JP5347388B2 (en) * 2008-09-05 2013-11-20 富士通株式会社 Operation instruction receiving device
US8902044B2 (en) * 2008-09-05 2014-12-02 Gaylon Smith Biometric control system and method for machinery
US20110302412A1 (en) * 2008-10-08 2011-12-08 Leiwen Deng Pseudonymous public keys based authentication
US20100122082A1 (en) * 2008-10-08 2010-05-13 Leiwen Deng User identity validation system and method
JP2010108098A (en) * 2008-10-28 2010-05-13 Sharp Corp Information processing system, information processing apparatus, authentication apparatus, authentication method, and authentication program
US8370640B2 (en) 2008-12-01 2013-02-05 Research In Motion Limited Simplified multi-factor authentication
CN101782953B (en) * 2009-01-16 2012-11-21 深圳富泰宏精密工业有限公司 Portable electronic device having fingerprint identification function
US20120047566A1 (en) * 2009-01-30 2012-02-23 Precise Biometrics Ab Password protected secure device
JP2010183500A (en) * 2009-02-09 2010-08-19 Sony Corp Information processing device, method, and program
US8176080B2 (en) * 2009-03-06 2012-05-08 Hewlett-Packard Development Company, L.P. Desensitizing character strings
KR101549557B1 (en) * 2009-03-10 2015-09-03 엘지전자 주식회사 Mobile terminal and control method thereof
KR101549558B1 (en) * 2009-03-18 2015-09-03 엘지전자 주식회사 Mobile terminal and control method thereof
US8320985B2 (en) * 2009-04-02 2012-11-27 Empire Technology Development Llc Touch screen interfaces with pulse oximetry
US20100265204A1 (en) * 2009-04-21 2010-10-21 Sony Ericsson Mobile Communications Ab Finger recognition for authentication and graphical user interface input
US8786575B2 (en) * 2009-05-18 2014-07-22 Empire Technology Development LLP Touch-sensitive device and method
KR101610109B1 (en) 2009-05-19 2016-04-11 삼성전자주식회사 Method and Apparatus for tracking input position using E-Field Communication
US10705692B2 (en) 2009-05-21 2020-07-07 Sony Interactive Entertainment Inc. Continuous and dynamic scene decomposition for user interface
US20100310136A1 (en) * 2009-06-09 2010-12-09 Sony Ericsson Mobile Communications Ab Distinguishing right-hand input and left-hand input based on finger recognition
US20110006880A1 (en) * 2009-07-09 2011-01-13 Medtronic Minimed, Inc. Fingerprint-linked control of a portable medical device
JP5238635B2 (en) * 2009-07-29 2013-07-17 京セラ株式会社 Information processing apparatus and application program activation method
EP2306280B1 (en) * 2009-10-01 2017-11-29 Siemens Aktiengesellschaft Touch-sensitive sensor assembly and display device
JP2011087785A (en) * 2009-10-23 2011-05-06 Hitachi Ltd Operation processor, operation processing method and operation processing program
US9336428B2 (en) 2009-10-30 2016-05-10 Synaptics Incorporated Integrated fingerprint sensor and display
US9274553B2 (en) 2009-10-30 2016-03-01 Synaptics Incorporated Fingerprint sensor and integratable electronic display
EP2731039A1 (en) 2009-12-18 2014-05-14 Uwe Peter Braun External device, method for the verification of an access authorisation and computer system
US8791792B2 (en) 2010-01-15 2014-07-29 Idex Asa Electronic imager using an impedance sensor grid array mounted on or about a switch and method of making
US8866347B2 (en) 2010-01-15 2014-10-21 Idex Asa Biometric image sensing
US8421890B2 (en) * 2010-01-15 2013-04-16 Picofield Technologies, Inc. Electronic imager using an impedance sensor grid array and method of making
US8878791B2 (en) * 2010-01-19 2014-11-04 Avaya Inc. Event generation based on print portion identification
US20110179185A1 (en) * 2010-01-20 2011-07-21 Futurewei Technologies, Inc. System and Method for Adaptive Differentiated Streaming
WO2011097482A1 (en) * 2010-02-05 2011-08-11 Maxlinear, Inc. Conditional access integration in a soc for mobile tv applications
US8656486B2 (en) 2010-02-12 2014-02-18 Authentec, Inc. Biometric sensor for human presence detection and associated methods
JPWO2011101940A1 (en) * 2010-02-19 2013-06-17 日本電気株式会社 Mobile terminal and control method thereof
DE102010010806B4 (en) * 2010-03-09 2013-05-29 Continental Automotive Gmbh Operating device for inputting control commands into an electronic device
US9418205B2 (en) 2010-03-15 2016-08-16 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
US8803258B2 (en) 2010-04-15 2014-08-12 Authentec, Inc. Finger sensor including capacitive lens and associated methods
US8370926B1 (en) * 2010-04-27 2013-02-05 Symantec Corporation Systems and methods for authenticating users
KR101678812B1 (en) * 2010-05-06 2016-11-23 엘지전자 주식회사 Mobile terminal and operation control method thereof
WO2011146503A1 (en) * 2010-05-17 2011-11-24 Ultra-Scan Corporation Control system and method using an ultrasonic area array
KR20110139504A (en) * 2010-06-23 2011-12-29 삼성전자주식회사 Composite sensing apparatus and the sensing method using composite sensor, and touch pad apparatus using the same
US8918854B1 (en) 2010-07-15 2014-12-23 Proxense, Llc Proximity-based system for automatic application initialization
US8528072B2 (en) 2010-07-23 2013-09-03 Apple Inc. Method, apparatus and system for access mode control of a device
US8620870B2 (en) * 2010-09-30 2013-12-31 Commvault Systems, Inc. Efficient data management improvements, such as docking limited-feature data management modules to a full-featured data management system
IT1402546B1 (en) * 2010-10-29 2013-09-13 Dainese Spa APPLIANCES, SYSTEM AND PROCEDURE FOR PROTECTIVE CLOTHING
IT1402544B1 (en) 2010-10-29 2013-09-13 Dainese Spa EQUIPMENT, SYSTEM AND PROCEDURE FOR PERSONAL PROTECTION
IT1402545B1 (en) 2010-10-29 2013-09-13 Cefriel Società Consortile A Responsabilità Limitata APPLIANCES, SYSTEM AND PROCEDURE TO DETECT ACCIDENTS
US8797283B2 (en) 2010-11-22 2014-08-05 Sony Computer Entertainment America Llc Method and apparatus for performing user-defined macros
US9355389B2 (en) 2010-12-06 2016-05-31 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
US8907903B2 (en) 2011-01-13 2014-12-09 Sony Computer Entertainment America Llc Handing control of an object from one touch input to another touch input
DE102011011767A1 (en) * 2011-02-18 2012-08-23 Fresenius Medical Care Deutschland Gmbh Medical device with multi-function display
US9265450B1 (en) 2011-02-21 2016-02-23 Proxense, Llc Proximity-based system for object tracking and automatic application initialization
TW201239675A (en) * 2011-03-18 2012-10-01 Acer Inc Handheld devices, and related data transmission methods
US8484687B2 (en) 2011-04-18 2013-07-09 Ericsson Television Inc. System and method providing remote video-on-demand (VOD)
US8638385B2 (en) 2011-06-05 2014-01-28 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
EP2541452A1 (en) * 2011-06-29 2013-01-02 Fujitsu Limited Authentication method of user of electronic device
WO2013007573A1 (en) 2011-07-08 2013-01-17 Robert Bosch Gmbh An electronic device providing different accesses to different users through single user interface
US8779893B2 (en) 2011-09-12 2014-07-15 King Fahd University Of Petroleum And Minerals System and method for controlling vehicle ignition
US8831568B2 (en) * 2011-09-27 2014-09-09 Qualcomm Incorporated Automatic configuration of a wireless device
EP3457672B1 (en) * 2011-09-27 2019-11-20 Nec Corporation Portable electronic device, touch operation processing method, and program
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US8769624B2 (en) 2011-09-29 2014-07-01 Apple Inc. Access control utilizing indirect authentication
BR112014008859B1 (en) 2011-10-13 2021-06-22 Walled Sami Haddad BIOMETRIC APPARATUS AND METHOD OF OPERATION OF TOUCH-SENSITIVE DEVICES
KR101160681B1 (en) 2011-10-19 2012-06-28 배경덕 Method, mobile communication terminal and computer-readable recording medium for operating specific function when activaing of mobile communication terminal
US10043052B2 (en) * 2011-10-27 2018-08-07 Synaptics Incorporated Electronic device packages and methods
KR101866272B1 (en) * 2011-12-15 2018-06-12 삼성전자주식회사 Apparatas and method of user based using for grip sensor in a portable terminal
US8436828B1 (en) * 2012-01-27 2013-05-07 Google Inc. Smart touchscreen key activation detection
EP2626804B1 (en) * 2012-02-09 2017-09-13 Inside Secure Method for managing memory space in a secure non-volatile memory of a secure element
US10150025B2 (en) * 2012-02-10 2018-12-11 Envisionbody, Llc Process to aid in motivation of personal fitness, health monitoring and validation of user
NZ714501A (en) * 2012-02-13 2016-04-29 Xceedid Corp Credential management system
US9043878B2 (en) * 2012-03-06 2015-05-26 International Business Machines Corporation Method and system for multi-tiered distributed security authentication and filtering
US9563295B2 (en) * 2012-03-06 2017-02-07 Lenovo (Beijing) Co., Ltd. Method of identifying a to-be-identified object and an electronic device of the same
US9251329B2 (en) * 2012-03-27 2016-02-02 Synaptics Incorporated Button depress wakeup and wakeup strategy
TW201349009A (en) 2012-04-13 2013-12-01 Ologn Technologies Ag Secure zone for digital communications
EP2836968B1 (en) 2012-04-13 2020-05-06 OLogN Technologies AG Apparatuses, methods and systems for computer-based secure transactions
TW201403375A (en) 2012-04-20 2014-01-16 歐樂岡科技公司 Secure zone for secure purchases
US9239911B2 (en) * 2012-04-26 2016-01-19 Red Hat, Inc. Replacement of security credentials for secure proxying
EP2850510A2 (en) * 2012-05-18 2015-03-25 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
TWI457790B (en) * 2012-06-13 2014-10-21 Pixart Imaging Inc Portable electronic apparatus and method used for portable electronic apparatus
US9092652B2 (en) 2012-06-29 2015-07-28 Apple Inc. Zero reference based ridge flow map
US9342725B2 (en) 2012-06-29 2016-05-17 Apple Inc. Image manipulation utilizing edge detection and stitching for fingerprint recognition
US9035895B2 (en) 2012-07-13 2015-05-19 Apple Inc. Redundant sensing element sampling
US8943187B1 (en) * 2012-08-30 2015-01-27 Microstrategy Incorporated Managing electronic keys
US20140096270A1 (en) * 2012-09-28 2014-04-03 Richard T. Beckwith Secure data containers and data access control
GB2506867A (en) * 2012-10-09 2014-04-16 Barclays Bank Plc System and method for authenticating a payment transaction
US20140133715A1 (en) * 2012-11-15 2014-05-15 Identity Validation Products, Llc Display screen with integrated user biometric sensing and verification system
EP2943907A1 (en) * 2012-12-17 2015-11-18 Thomson Licensing Method and apparatus for assigning devices to a media service
US10521188B1 (en) 2012-12-31 2019-12-31 Apple Inc. Multi-user TV user interface
US9218544B2 (en) 2013-02-01 2015-12-22 Apple Inc. Intelligent matcher based on situational or spatial orientation
US10108515B2 (en) * 2013-03-01 2018-10-23 Sony Interactive Entertainment LLC Remotely testing electronic devices using messaging and presence protocol
US10586064B2 (en) * 2013-03-15 2020-03-10 Christopher V. Beckman Security case with quarantined memory
US11373439B1 (en) 2013-03-14 2022-06-28 Telos Corporation Touchless fingerprint matching systems and methods
US9721086B2 (en) 2013-03-15 2017-08-01 Advanced Elemental Technologies, Inc. Methods and systems for secure and reliable identity-based computing
CA3234925A1 (en) 2013-03-15 2014-09-18 Ologn Technologies Ag Systems, methods and apparatuses for securely storing and providing payment information
US10075384B2 (en) 2013-03-15 2018-09-11 Advanced Elemental Technologies, Inc. Purposeful computing
US9357250B1 (en) * 2013-03-15 2016-05-31 Apple Inc. Multi-screen video user interface
US9378065B2 (en) * 2013-03-15 2016-06-28 Advanced Elemental Technologies, Inc. Purposeful computing
US9094388B2 (en) 2013-05-01 2015-07-28 Dmitri Tkachev Methods and systems for identifying, verifying, and authenticating an identity
US9405898B2 (en) 2013-05-10 2016-08-02 Proxense, Llc Secure element as a digital pocket
US9158410B2 (en) 2013-05-16 2015-10-13 International Business Machines Corporation Utilizing a touch screen as a biometric device
US20140359757A1 (en) * 2013-06-03 2014-12-04 Qualcomm Incorporated User authentication biometrics in mobile devices
US9262003B2 (en) * 2013-11-04 2016-02-16 Qualcomm Incorporated Piezoelectric force sensing array
US9323393B2 (en) 2013-06-03 2016-04-26 Qualcomm Incorporated Display with peripherally configured ultrasonic biometric sensor
WO2015015473A1 (en) 2013-08-02 2015-02-05 Ologn Technologies Ag A secure server on a system with virtual machines
US9536126B2 (en) * 2013-08-28 2017-01-03 Samsung Electronics Co., Ltd. Function execution method based on a user input, and electronic device thereof
US9436844B2 (en) 2013-08-29 2016-09-06 Microsoft Technology Licensing, Llc Access enablement security circuit
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US9436863B2 (en) 2013-09-09 2016-09-06 Apple Inc. Reconstructing a biometric image
US9716708B2 (en) 2013-09-13 2017-07-25 Microsoft Technology Licensing, Llc Security certificates for system-on-chip security
KR20150034832A (en) * 2013-09-24 2015-04-06 삼성전자주식회사 Electronic Device Including Fingerprint Identification Sensor And Method For Performing User Authentication And Registering User Fingerprint Of The Electronic Device Including Fingerprint Identification Sensor, And Recording Medium Storing Program For Executing The Method
US9697516B2 (en) * 2013-10-10 2017-07-04 Google Inc. System, methods, and computer program products for storing and managing program data
EP2869176A3 (en) * 2013-10-10 2015-06-24 Lg Electronics Inc. Mobile terminal and method of controlling therefor
US10530582B2 (en) * 2013-10-28 2020-01-07 Singou Technology Ltd. Method and device for information system access authentication
KR102180226B1 (en) * 2013-10-30 2020-11-18 삼성전자주식회사 Electronic device and method for securing using complex biometrics
WO2015066330A1 (en) * 2013-11-04 2015-05-07 Qualcomm Incorporated User authentication biometrics in mobile devices
KR20150056353A (en) * 2013-11-15 2015-05-26 엘지전자 주식회사 The mobile terminal and the control method thereof
EP4071589A1 (en) * 2013-12-12 2022-10-12 QUALCOMM Incorporated Micromechanical ultrasonic transducers and display
US9477818B1 (en) * 2014-01-02 2016-10-25 Google Inc. Leveraging a unification of content hosting and social networking
US9608970B1 (en) 2014-01-16 2017-03-28 Microstrategy Incorporated Sharing keys
US9710691B1 (en) * 2014-01-23 2017-07-18 Diamond Fortress Technologies, Inc. Touchless fingerprint matching systems and methods
US20160335469A1 (en) * 2014-04-10 2016-11-17 Kuo-Ching Chiang Portable Device with Security Module
US20170200038A1 (en) * 2014-04-10 2017-07-13 Kuo-Ching Chiang Portable Device with Security Module
US20150294516A1 (en) * 2014-04-10 2015-10-15 Kuo-Ching Chiang Electronic device with security module
US10482461B2 (en) 2014-05-29 2019-11-19 Apple Inc. User interface for payments
US9672343B2 (en) * 2014-05-30 2017-06-06 Canon Kabushiki Kaisha Information processing apparatus, method for controlling information processing apparatus, and storage medium
TWI540894B (en) * 2014-06-13 2016-07-01 國立臺灣大學 Display system and program selection method thereof
KR20240138132A (en) 2014-06-24 2024-09-20 애플 인크. Input device and user interface interactions
US10650052B2 (en) 2014-06-24 2020-05-12 Apple Inc. Column interface for navigating in a user interface
US9524415B2 (en) * 2014-07-18 2016-12-20 Qualcomm Incorporated Test techniques for assessing ultrasonic fingerprint sensors
US9665763B2 (en) * 2014-08-31 2017-05-30 Qualcomm Incorporated Finger/non-finger determination for biometric sensors
US9582705B2 (en) * 2014-08-31 2017-02-28 Qualcomm Incorporated Layered filtering for biometric sensors
US9195879B1 (en) 2014-08-31 2015-11-24 Qualcomm Incorporated Air/object determination for biometric sensors
WO2016036661A1 (en) * 2014-09-05 2016-03-10 Utc Fire & Security Corporation System and method for access authentication
US9431354B2 (en) 2014-11-06 2016-08-30 International Business Machines Corporation Activating reactions in integrated circuits through electrical discharge
JP6256785B2 (en) * 2014-11-21 2018-01-10 京セラドキュメントソリューションズ株式会社 Operating device and operating method
KR102290892B1 (en) * 2014-12-12 2021-08-19 엘지전자 주식회사 Mobile terminal and method for controlling the same
US9817956B2 (en) * 2014-12-12 2017-11-14 Excalibur Ip, Llc User authentication and data encryption
CN104536766B (en) * 2015-01-09 2018-01-26 京东方科技集团股份有限公司 The control method and electronic equipment of a kind of electronic equipment
KR102277453B1 (en) 2015-02-05 2021-07-14 삼성전자주식회사 Electronic device with touch sensor and driving method thereof
CN107210917A (en) * 2015-02-20 2017-09-26 惠普发展公司有限责任合伙企业 User authentication device
US20160246396A1 (en) * 2015-02-20 2016-08-25 Qualcomm Incorporated Interactive touchscreen and sensor array
US20160253538A1 (en) * 2015-02-28 2016-09-01 Yang Lu Methods and Apparatus of Integrating Fingerprint Imagers with Touch Panels and Displays
US20160269411A1 (en) * 2015-03-12 2016-09-15 Ronen MALACHI System and Method for Anonymous Biometric Access Control
US20160321655A1 (en) * 2015-05-01 2016-11-03 Gilbarco Inc. Fuel dispensing environment having on-demand remote support
US9787478B2 (en) 2015-06-10 2017-10-10 Qualcomm Incorporated Service provider certificate management
CN105117631B (en) * 2015-08-24 2018-08-31 联想(北京)有限公司 Information processing method and electronic equipment
US10181020B2 (en) * 2015-09-21 2019-01-15 American Express Travel Related Services Company, Inc. Systems and methods for gesture based biometric security
US10390222B2 (en) 2015-09-26 2019-08-20 Intel Corporation Technologies for touch-free multi-factor authentication
US10931455B2 (en) * 2015-09-28 2021-02-23 EyeVerify Inc. Secure image pipeline
JP6603544B2 (en) * 2015-10-28 2019-11-06 株式会社ジャパンディスプレイ Touch detection device, display device with touch detection function
US9813396B2 (en) 2015-10-30 2017-11-07 Rovi Guides, Inc. Methods and systems for managing content subscription data
US10178421B2 (en) 2015-10-30 2019-01-08 Rovi Guides, Inc. Methods and systems for monitoring content subscription usage
FR3043228B1 (en) 2015-11-03 2018-03-30 Proton World International N.V. STARTING THE CONTROL OF AN ELECTRONIC CIRCUIT
FR3043229B1 (en) 2015-11-03 2018-03-30 Proton World International N.V. SECURE STARTING OF AN ELECTRONIC CIRCUIT
EP3378004A1 (en) 2015-11-17 2018-09-26 Idee Limited Security systems and methods for continuous authorized access to restricted access locations
US10382210B2 (en) * 2016-01-10 2019-08-13 Apple Inc. Secure device pairing
KR102509018B1 (en) * 2016-01-11 2023-03-14 삼성디스플레이 주식회사 Display device and driving method thereof
KR102483832B1 (en) 2016-02-19 2023-01-03 삼성전자주식회사 Method and apparatus for connectiong between electronic devices using authentication based on biometric information
CN109477857A (en) 2016-03-09 2019-03-15 分辨率产品公司 House is wirelessly found
JP6562862B2 (en) 2016-03-29 2019-08-21 株式会社ジャパンディスプレイ Touch detection device and display device with touch detection function
DE102016116152A1 (en) * 2016-04-30 2017-11-02 Krohne Messtechnik Gmbh Electrical device with a functional device
DK179186B1 (en) 2016-05-19 2018-01-15 Apple Inc REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION
KR102532599B1 (en) * 2016-05-30 2023-05-15 삼성전자주식회사 Method and device for acquiring input
US10210344B2 (en) * 2016-06-09 2019-02-19 JPS Engineering Corp. Systems and methods for cybersecurity
DK201670581A1 (en) 2016-06-12 2018-01-08 Apple Inc Device-level authorization for viewing content
DK201670582A1 (en) 2016-06-12 2018-01-02 Apple Inc Identifying applications on which content is available
US10536464B2 (en) * 2016-06-22 2020-01-14 Intel Corporation Secure and smart login engine
US9859227B1 (en) 2016-06-30 2018-01-02 International Business Machines Corporation Damaging integrated circuit components
DK179471B1 (en) 2016-09-23 2018-11-26 Apple Inc. Image data for enhanced user interactions
US11966560B2 (en) 2016-10-26 2024-04-23 Apple Inc. User interfaces for browsing content from multiple content applications on an electronic device
JP6770103B2 (en) * 2016-10-27 2020-10-14 サーク・コーポレーション Finger tracking on input devices with proximity sensing
CN108073831B (en) * 2016-11-15 2020-07-24 华为技术有限公司 Method for detecting working state of safety chip and detection circuit
JP7365903B2 (en) * 2016-11-29 2023-10-20 ピーアンドピー・ウルトラ・ジー・リミテッド Preventing unauthorized use of devices
CN106534171B (en) * 2016-12-02 2020-03-10 全球能源互联网研究院有限公司 Security authentication method, device and terminal
CA3046803C (en) 2016-12-14 2023-01-10 Novetechnologies, LLC Livestock biosecurity system and method of use
CN106599259B (en) * 2016-12-21 2021-01-01 江苏省连云港工贸高等职业技术学校 System for quickly accessing SQL database
KR102609753B1 (en) 2017-01-03 2023-12-06 삼성전자주식회사 Computer readable recording medium and electronic apparatus for processing image signal
WO2018156067A1 (en) * 2017-02-21 2018-08-30 Fingerprint Cards Ab Trusted key server
JP2018147223A (en) * 2017-03-06 2018-09-20 オムロン株式会社 Authentication device, control method thereof, and door lock system
KR102322683B1 (en) * 2017-03-20 2021-11-08 삼성전자 주식회사 Electronic device and method for identifying falsification of biometric information
US10552294B2 (en) 2017-03-31 2020-02-04 Commvault Systems, Inc. Management of internet of things devices
US11221939B2 (en) 2017-03-31 2022-01-11 Commvault Systems, Inc. Managing data from internet of things devices in a vehicle
US11294786B2 (en) 2017-03-31 2022-04-05 Commvault Systems, Inc. Management of internet of things devices
US11095678B2 (en) * 2017-07-12 2021-08-17 The Boeing Company Mobile security countermeasures
US11285915B2 (en) * 2017-08-09 2022-03-29 M2MD Technologies, Inc. Method and system for using a wireless mobile device as a smart key
US10740494B2 (en) * 2017-09-06 2020-08-11 Google Llc Central and delegate security processors for a computing device
KR102185854B1 (en) 2017-09-09 2020-12-02 애플 인크. Implementation of biometric authentication
JP6736686B1 (en) 2017-09-09 2020-08-05 アップル インコーポレイテッドApple Inc. Implementation of biometrics
KR102445514B1 (en) * 2017-10-26 2022-09-21 현대자동차주식회사 A vehicle and vehicle system
JP6616379B2 (en) * 2017-10-30 2019-12-04 京セラ株式会社 Electronics
WO2019133769A1 (en) 2017-12-29 2019-07-04 Idee Limited Single sign on (sso) using continuous authentication
US11468154B2 (en) * 2018-06-01 2022-10-11 Huawei Technologies Co., Ltd. Information content viewing method and terminal
DK201870354A1 (en) 2018-06-03 2019-12-20 Apple Inc. Setup procedures for an electronic device
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11144620B2 (en) * 2018-06-26 2021-10-12 Counseling and Development, Inc. Systems and methods for establishing connections in a network following secure verification of interested parties
US11336968B2 (en) * 2018-08-17 2022-05-17 Samsung Electronics Co., Ltd. Method and device for generating content
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
WO2020140265A1 (en) * 2019-01-04 2020-07-09 Baidu.Com Times Technology (Beijing) Co., Ltd. Data processing accelerator having security unit to provide root trust services
US11539785B2 (en) * 2019-02-22 2022-12-27 Microsoft Technology Licensing, Llc Simultaneous cross-device application platform
WO2020185388A1 (en) 2019-03-08 2020-09-17 Master Lock Company Llc Locking device biometric access
US11445263B2 (en) 2019-03-24 2022-09-13 Apple Inc. User interfaces including selectable representations of content items
CN114302210B (en) 2019-03-24 2024-07-05 苹果公司 User interface for viewing and accessing content on an electronic device
US11683565B2 (en) 2019-03-24 2023-06-20 Apple Inc. User interfaces for interacting with channels that provide content that plays in a media browsing application
CN113906419A (en) 2019-03-24 2022-01-07 苹果公司 User interface for media browsing application
US11863837B2 (en) 2019-05-31 2024-01-02 Apple Inc. Notification of augmented reality content on an electronic device
US11797606B2 (en) 2019-05-31 2023-10-24 Apple Inc. User interfaces for a podcast browsing and playback application
US11736466B2 (en) * 2019-09-18 2023-08-22 Bioconnect Inc. Access control system
US11540354B2 (en) 2019-09-30 2022-12-27 Resolution Products, Llc Gateway with backup power and communications system
US11508227B2 (en) 2019-09-30 2022-11-22 Resolution Products, Llc Mobile device as a security system component
US11770374B1 (en) 2019-12-31 2023-09-26 Cigna Intellectual Property, Inc. Computer user credentialing and verification system
US20230012574A1 (en) * 2020-01-14 2023-01-19 Hewlett-Packard Development Company, L.P. Multi-zone display privacy based on location and content
US11843838B2 (en) 2020-03-24 2023-12-12 Apple Inc. User interfaces for accessing episodes of a content series
US11652632B2 (en) * 2020-05-07 2023-05-16 Vmware, Inc. Contextual automated device onboarding
FR3111441B1 (en) 2020-06-10 2022-08-05 Proton World Int Nv Secure start of an electronic circuit
US11899895B2 (en) 2020-06-21 2024-02-13 Apple Inc. User interfaces for setting up an electronic device
US20230275760A1 (en) * 2020-07-20 2023-08-31 Hewlett-Packard Development Company, L.P. Pairing hardware components to authorize operation
US11409410B2 (en) 2020-09-14 2022-08-09 Apple Inc. User input interfaces
CA3132547A1 (en) * 2020-10-02 2022-04-02 Spectrum Brands, Inc. Untrusted user management in electronic locks
US20220166762A1 (en) * 2020-11-25 2022-05-26 Microsoft Technology Licensing, Llc Integrated circuit for obtaining enhanced privileges for a network-based resource and performing actions in accordance therewith
US11720229B2 (en) 2020-12-07 2023-08-08 Apple Inc. User interfaces for browsing and presenting content
EP4264460A1 (en) 2021-01-25 2023-10-25 Apple Inc. Implementation of biometric authentication
US11934640B2 (en) 2021-01-29 2024-03-19 Apple Inc. User interfaces for record labels
WO2023225078A1 (en) 2022-05-20 2023-11-23 Advanced Elemental Technologies, Inc. Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans
US11528144B1 (en) * 2022-06-09 2022-12-13 Uab 360 It Optimized access in a service environment
US20240086416A1 (en) * 2022-09-09 2024-03-14 Honeywell International Inc. Methods and systems for integrating external systems of records with final report

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020002683A1 (en) * 2000-02-14 2002-01-03 Benson Justin H. Security module system, apparatus and process
US20020073416A1 (en) * 2000-12-12 2002-06-13 Philips Electronics North America Corporation Remote control account authorization system
US20020112183A1 (en) * 2001-02-12 2002-08-15 Baird Leemon C. Apparatus and method for authenticating access to a network resource
US20020178446A1 (en) * 2001-04-23 2002-11-28 Svod Llc Program guide environment
US20030005336A1 (en) * 2001-06-28 2003-01-02 Poo Teng Pin Portable device having biometrics-based authentication capabilities
US20030046228A1 (en) * 2001-08-28 2003-03-06 Jean-Marc Berney User-wearable functional jewelry with biometrics and smartcard to remotely sign and/or authenticate to e-services
US20030073065A1 (en) * 2001-10-12 2003-04-17 Lee Riggs Methods and systems for providing training through an electronic network to remote electronic devices
US20030177347A1 (en) * 1995-11-22 2003-09-18 Bruce Schneier Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US20040019564A1 (en) * 2002-07-26 2004-01-29 Scott Goldthwaite System and method for payment transaction authentication
US20040073432A1 (en) * 2002-10-15 2004-04-15 Stone Christopher J. Webpad for the disabled
US20040085188A1 (en) * 2002-03-15 2004-05-06 Atsushi Minemura Individual authentication device and cellular terminal apparatus
US10108939B1 (en) * 1999-12-23 2018-10-23 Swisscom Ag Payment transaction method and payment transaction system

Family Cites Families (461)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AUPQ055999A0 (en) 1999-05-25 1999-06-17 Silverbrook Research Pty Ltd A method and apparatus (npage01)
US4005428A (en) * 1975-05-15 1977-01-25 Sound Technology, Inc. Secure remote control communication systems
US4353056A (en) * 1980-06-05 1982-10-05 Siemens Corporation Capacitive fingerprint sensor
US4965825A (en) * 1981-11-03 1990-10-23 The Personalized Mass Media Corporation Signal processing apparatus and methods
US4805222A (en) 1985-12-23 1989-02-14 International Bioaccess Systems Corporation Method and apparatus for verifying an individual's identity
US4890321A (en) * 1986-07-08 1989-12-26 Scientific Atlanta, Inc. Communications format for a subscription television system permitting transmission of individual text messages to subscribers
DE3880695T2 (en) 1987-10-02 1993-09-23 Daya Ranjit Senanayake SYSTEM AND METHOD FOR PERSONAL IDENTIFICATION.
US4847542A (en) * 1987-10-22 1989-07-11 Multi-Elmac Corporation Automatic garage door operator with remote load control
US5189700A (en) * 1989-07-05 1993-02-23 Blandford Robert R Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents
JPH05502130A (en) 1989-11-22 1993-04-15 ラッセル、デヴィッド、シー computer control system
US4993068A (en) 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
GB2244164A (en) * 1990-05-18 1991-11-20 Philips Electronic Associated Fingerprint sensing
JPH04158434A (en) 1990-10-23 1992-06-01 Toshiba Corp Pointing device for display device
US5131038A (en) 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system
US6850252B1 (en) 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US5473318A (en) * 1992-01-10 1995-12-05 Active Control Technology Inc. Secure remote control system with receiver controlled to add and delete identity codes
US5483261A (en) 1992-02-14 1996-01-09 Itu Research, Inc. Graphical input controller and method with rear screen image detection
US5448045A (en) * 1992-02-26 1995-09-05 Clark; Paul C. System for protecting computers via intelligent tokens or smart cards
US5280527A (en) 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5559505A (en) * 1992-05-20 1996-09-24 Lucent Technologies Inc. Security system providing lockout for invalid access attempts
US5880411A (en) 1992-06-08 1999-03-09 Synaptics, Incorporated Object position detector with edge motion feature and gesture recognition
US5488204A (en) 1992-06-08 1996-01-30 Synaptics, Incorporated Paintbrush stylus for capacitive touch sensor pad
US5489095A (en) * 1992-07-01 1996-02-06 U.S. Philips Corporation Device for protecting the validity of time sensitive information
US5495235A (en) * 1992-09-30 1996-02-27 At&T Corp. Access control system with lockout
EP0593386A3 (en) * 1992-10-16 1996-07-31 Ibm Method and apparatus for accessing touch screen desktop objects via fingerprint recognition
US5396215A (en) * 1992-10-28 1995-03-07 Hinkle; Terry A. Vehicle operation inhibitor control apparatus
US5475835A (en) 1993-03-02 1995-12-12 Research Design & Marketing Inc. Audio-visual inventory and play-back control system
US6408388B1 (en) * 1993-05-05 2002-06-18 Addison M. Fischer Personal date/time notary device
US6135646A (en) 1993-10-22 2000-10-24 Corporation For National Research Initiatives System for uniquely and persistently identifying, managing, and tracking digital objects
JP2813728B2 (en) 1993-11-01 1998-10-22 インターナショナル・ビジネス・マシーンズ・コーポレイション Personal communication device with zoom / pan function
US5526428A (en) 1993-12-29 1996-06-11 International Business Machines Corporation Access control apparatus and method
US20020013898A1 (en) * 1997-06-04 2002-01-31 Sudia Frank W. Method and apparatus for roaming use of cryptographic values
US5469506A (en) 1994-06-27 1995-11-21 Pitney Bowes Inc. Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic
US5533123A (en) 1994-06-28 1996-07-02 National Semiconductor Corporation Programmable distributed personal security
GB9416040D0 (en) * 1994-08-09 1994-09-28 Philips Electronics Uk Ltd Method of and system for transferring secure data
US5659626A (en) * 1994-10-20 1997-08-19 Calspan Corporation Fingerprint identification system
US5715403A (en) 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5870723A (en) 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US7152045B2 (en) * 1994-11-28 2006-12-19 Indivos Corporation Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5805719A (en) 1994-11-28 1998-09-08 Smarttouch Tokenless identification of individuals
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US6950810B2 (en) 1994-11-28 2005-09-27 Indivos Corporation Tokenless biometric electronic financial transactions via a third party identicator
US6154879A (en) 1994-11-28 2000-11-28 Smarttouch, Inc. Tokenless biometric ATM access system
US6269348B1 (en) 1994-11-28 2001-07-31 Veristar Corporation Tokenless biometric electronic debit and credit transactions
US5615277A (en) 1994-11-28 1997-03-25 Hoffman; Ned Tokenless security system for authorizing access to a secured computer system
US6366682B1 (en) 1994-11-28 2002-04-02 Indivos Corporation Tokenless electronic transaction system
US5721777A (en) * 1994-12-29 1998-02-24 Lucent Technologies Inc. Escrow key management system for accessing encrypted data with portable cryptographic modules
US5591949A (en) 1995-01-06 1997-01-07 Bernstein; Robert J. Automatic portable account controller for remotely arranging for payment of debt to a vendor
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US7069451B1 (en) * 1995-02-13 2006-06-27 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6252964B1 (en) 1995-04-03 2001-06-26 Scientific-Atlanta, Inc. Authorization of services in a conditional access system
US5838306A (en) 1995-05-05 1998-11-17 Dell U.S.A., L.P. Mouse with security feature
US5900867A (en) 1995-07-17 1999-05-04 Gateway 2000, Inc. Self identifying remote control device having a television receiver for use in a computer
US5995155A (en) 1995-07-17 1999-11-30 Gateway 2000, Inc. Database navigation system for a home entertainment system
WO1997004376A1 (en) 1995-07-20 1997-02-06 Dallas Semiconductor Corporation Secure module with microprocessor and co-processor
JP3720878B2 (en) * 1995-08-10 2005-11-30 大日本印刷株式会社 IC card
JP3272213B2 (en) * 1995-10-02 2002-04-08 インターナショナル・ビジネス・マシーンズ・コーポレーション Authentication method for IC card and information processing device
JPH09146708A (en) * 1995-11-09 1997-06-06 Internatl Business Mach Corp <Ibm> Driving method for touch panel and touch input method
US5828751A (en) * 1996-04-08 1998-10-27 Walker Asset Management Limited Partnership Method and apparatus for secure measurement certification
US5721583A (en) * 1995-11-27 1998-02-24 Matsushita Electric Industrial Co., Ltd. Interactive television system for implementing electronic polling or providing user-requested services based on identification of users or of remote control apparatuses which are employed by respective users to communicate with the system
CH690048A5 (en) 1995-11-28 2000-03-31 C Sam S A En Formation C O Jue Safety device controlling access to a computer or a network terminal.
US5825352A (en) 1996-01-04 1998-10-20 Logitech, Inc. Multiple fingers contact sensing method for emulating mouse buttons and mouse operations on a touch sensor pad
US5857028A (en) * 1996-01-11 1999-01-05 Frieling; Edward Computer access control by finger anatomy and comprehension testing
FR2743910B1 (en) 1996-01-19 1998-02-27 Solaic Sa METHOD FOR IMPLEMENTING A SECURE PROGRAM IN A MICROPROCESSOR CARD AND MICROPROCESSOR CARD COMPRISING A SECURE PROGRAM
US5828773A (en) * 1996-01-26 1998-10-27 Harris Corporation Fingerprint sensing method with finger position indication
US5963679A (en) * 1996-01-26 1999-10-05 Harris Corporation Electric field fingerprint sensor apparatus and related methods
GB2312040A (en) 1996-04-13 1997-10-15 Xerox Corp A computer mouse
US5835079A (en) 1996-06-13 1998-11-10 International Business Machines Corporation Virtual pointing device for touchscreens
US5933134A (en) * 1996-06-25 1999-08-03 International Business Machines Corporation Touch screen virtual pointing device which goes into a translucent hibernation state when not in use
US5856824A (en) * 1996-06-25 1999-01-05 International Business Machines Corp. Reshapable pointing device for touchscreens
JP3711633B2 (en) * 1996-06-27 2005-11-02 カシオ計算機株式会社 Touch panel control device
US6219793B1 (en) 1996-09-11 2001-04-17 Hush, Inc. Method of using fingerprints to authenticate wireless communications
US5825878A (en) 1996-09-20 1998-10-20 Vlsi Technology, Inc. Secure memory management unit for microprocessor
US6181803B1 (en) 1996-09-30 2001-01-30 Intel Corporation Apparatus and method for securely processing biometric information to control access to a node
US6268788B1 (en) 1996-11-07 2001-07-31 Litronic Inc. Apparatus and method for providing an authentication system based on biometrics
US6367017B1 (en) 1996-11-07 2002-04-02 Litronic Inc. Apparatus and method for providing and authentication system
US6470326B1 (en) 1996-11-27 2002-10-22 Diebold Incorporated Automated banking machine apparatus and system
US6901382B1 (en) 1996-11-27 2005-05-31 Diebold, Incorporated Automated banking machine and system
US6498861B1 (en) * 1996-12-04 2002-12-24 Activcard Ireland Limited Biometric security encryption system
US5903882A (en) * 1996-12-13 1999-05-11 Certco, Llc Reliance server for electronic transaction system
US20030054879A1 (en) * 1996-12-31 2003-03-20 Bruce Schneier System and method for securing electronic games
US5952998A (en) * 1997-01-15 1999-09-14 Compaq Computer Corporation Transparent touchpad with flat panel display for personal computers
CN1149523C (en) * 1997-01-31 2004-05-12 汤姆森消费电子有限公司 Communications system for remote control systems
JP3787431B2 (en) * 1997-04-11 2006-06-21 株式会社日立製作所 Abuse detection method
US6901154B2 (en) 1997-04-16 2005-05-31 Activcard Ireland Limited Method of detecting authorised biometric information sensor
US6193153B1 (en) * 1997-04-16 2001-02-27 Francis Lambert Method and apparatus for non-intrusive biometric capture
JP3822707B2 (en) * 1997-05-08 2006-09-20 株式会社ルネサステクノロジ IC card
US5991408A (en) 1997-05-16 1999-11-23 Veridicom, Inc. Identification and security using biometric measurements
US5920640A (en) 1997-05-16 1999-07-06 Harris Corporation Fingerprint sensor and token reader and associated methods
CA2208179A1 (en) 1997-06-18 1998-12-18 Roland S. Walch Pointing device with optical fingerprint recognition and tracking capability
KR19990009965A (en) 1997-07-14 1999-02-05 정명식 User authentication method using typing pattern
US6119096A (en) * 1997-07-31 2000-09-12 Eyeticket Corporation System and method for aircraft passenger check-in and boarding using iris recognition
GB2329497B (en) 1997-09-19 2001-01-31 Ibm Method for controlling access to electronically provided services and system for implementing such method
US6611681B2 (en) 1997-09-26 2003-08-26 Daniel A. Henderson Method and apparatus for an improved call interrupt feature in a cordless telephone answering device
US6037882A (en) * 1997-09-30 2000-03-14 Levy; David H. Method and apparatus for inputting data to an electronic system
US6084968A (en) 1997-10-29 2000-07-04 Motorola, Inc. Security token and method for wireless applications
ATE198944T1 (en) 1997-11-07 2001-02-15 Swisscom Ag METHOD, SYSTEM AND DEVICES FOR DETERMINING THE AUTHENTICITY OF PERSONS
US6185316B1 (en) 1997-11-12 2001-02-06 Unisys Corporation Self-authentication apparatus and method
US6501846B1 (en) 1997-11-25 2002-12-31 Ethentica, Inc. Method and system for computer access and cursor control using a relief object image generator
GB9725571D0 (en) * 1997-12-04 1998-02-04 Philips Electronics Nv Electronic apparatus comprising fingerprint sensing devices
US6490680B1 (en) 1997-12-04 2002-12-03 Tecsec Incorporated Access control and authorization system
US6310610B1 (en) 1997-12-04 2001-10-30 Nortel Networks Limited Intelligent touch display
JPH11175478A (en) 1997-12-10 1999-07-02 Nec Corp System for authenticating the person himself
US6041410A (en) 1997-12-22 2000-03-21 Trw Inc. Personal identification fob
US6038666A (en) 1997-12-22 2000-03-14 Trw Inc. Remote identity verification technique using a personal identification device
JPH11185016A (en) 1997-12-24 1999-07-09 Sharp Corp Information processor
US6101477A (en) * 1998-01-23 2000-08-08 American Express Travel Related Services Company, Inc. Methods and apparatus for a travel-related multi-function smartcard
US8479122B2 (en) 2004-07-30 2013-07-02 Apple Inc. Gestures for touch sensitive input devices
IL137478A (en) 1998-01-26 2005-11-20 Westerman Wayne Method and apparatus for integrating manual input
US7663607B2 (en) 2004-05-06 2010-02-16 Apple Inc. Multipoint touchscreen
US6181328B1 (en) * 1998-03-02 2001-01-30 International Business Machines Corporation Method and system for calibrating touch screen sensitivities according to particular physical characteristics associated with a user
US6618806B1 (en) 1998-04-01 2003-09-09 Saflink Corporation System and method for authenticating users in a computer network
US6167517A (en) 1998-04-09 2000-12-26 Oracle Corporation Trusted biometric client authentication
US6880750B2 (en) 1998-04-17 2005-04-19 Randolph M. Pentel Remote ordering device
US20010044906A1 (en) 1998-04-21 2001-11-22 Dimitri Kanevsky Random visual patterns used to obtain secured access
DE59914867D1 (en) 1998-04-23 2008-10-23 Siemens Home & Office Comm RADIO DEVICE WITH ADVANCED USER AUTHENTICATION FEATURES
US6484260B1 (en) 1998-04-24 2002-11-19 Identix, Inc. Personal identification system
US6353889B1 (en) 1998-05-13 2002-03-05 Mytec Technologies Inc. Portable device and method for accessing data key actuated devices
US6400836B2 (en) 1998-05-15 2002-06-04 International Business Machines Corporation Combined fingerprint acquisition and control device
US6421453B1 (en) 1998-05-15 2002-07-16 International Business Machines Corporation Apparatus and methods for user recognition employing behavioral passwords
EP1080415B1 (en) 1998-05-21 2017-01-18 Equifax Inc. System and method for authentication of network users
US6199044B1 (en) 1998-05-27 2001-03-06 Intermec Ip Corp. Universal data input and processing device, such as universal point-of-sale device for inputting and processing bar code symbols, document images, and other data
US6256393B1 (en) 1998-06-23 2001-07-03 General Instrument Corporation Authorization and access control of software object residing in set-top terminals
US6573883B1 (en) 1998-06-24 2003-06-03 Hewlett Packard Development Company, L.P. Method and apparatus for controlling a computing device with gestures
US6188391B1 (en) 1998-07-09 2001-02-13 Synaptics, Inc. Two-layer capacitive touchpad and method of making same
US6289445B2 (en) 1998-07-21 2001-09-11 Lsi Logic Corporation Circuit and method for initiating exception routines using implicit exception checking
US6173400B1 (en) 1998-07-31 2001-01-09 Sun Microsystems, Inc. Methods and systems for establishing a shared secret using an authentication token
US6870946B1 (en) 1998-08-06 2005-03-22 Secugen Corporation Compact optical fingerprint capturing and recognition system
US6327622B1 (en) 1998-09-03 2001-12-04 Sun Microsystems, Inc. Load balancing in a network environment
JP2000083019A (en) * 1998-09-07 2000-03-21 Hitachi Ltd Cryptograph processor
US6636973B1 (en) 1998-09-08 2003-10-21 Hewlett-Packard Development Company, L.P. Secure and dynamic biometrics-based token generation for access control and authentication
JP2000090052A (en) * 1998-09-10 2000-03-31 Toshiba Corp Computer system
US6292173B1 (en) * 1998-09-11 2001-09-18 Stmicroelectronics S.R.L. Touchpad computer input system and method
US6950539B2 (en) * 1998-09-16 2005-09-27 Digital Persona Configurable multi-function touchpad device
JP2000090273A (en) 1998-09-16 2000-03-31 Nec Corp Device and method for processing information while using fingerprint identification
US6256022B1 (en) * 1998-11-06 2001-07-03 Stmicroelectronics S.R.L. Low-cost semiconductor user input device
KR100322277B1 (en) 1998-11-20 2002-03-08 권 기 홍 Central processing unit having expansion instruction
US6532298B1 (en) 1998-11-25 2003-03-11 Iridian Technologies, Inc. Portable authentication device and method using iris patterns
JP4542637B2 (en) 1998-11-25 2010-09-15 セイコーエプソン株式会社 Portable information device and information storage medium
GB2344670B (en) 1998-12-12 2003-09-03 Ibm System, apparatus and method for controlling access
US6560612B1 (en) 1998-12-16 2003-05-06 Sony Corporation Information processing apparatus, controlling method and program medium
JP2000339097A (en) * 1998-12-16 2000-12-08 Sony Corp Information processor, its controlling method and recording medium
JP3992863B2 (en) 1998-12-17 2007-10-17 日立機材株式会社 Free access floor
US6317835B1 (en) 1998-12-23 2001-11-13 Radiant Systems, Inc. Method and system for entry of encrypted and non-encrypted information on a touch screen
FR2787900B1 (en) * 1998-12-28 2001-02-09 Bull Cp8 INTELLIGENT INTEGRATED CIRCUIT
US6671808B1 (en) 1999-01-15 2003-12-30 Rainbow Technologies, Inc. USB-compliant personal key
US6317834B1 (en) 1999-01-29 2001-11-13 International Business Machines Corporation Biometric authentication system with encrypted models
US6028950A (en) * 1999-02-10 2000-02-22 The National Registry, Inc. Fingerprint controlled set-top box
JP2000250862A (en) 1999-03-03 2000-09-14 Toshiba Corp Process supervisory and control system
US6356905B1 (en) 1999-03-05 2002-03-12 Accenture Llp System, method and article of manufacture for mobile communication utilizing an interface support framework
US6401085B1 (en) 1999-03-05 2002-06-04 Accenture Llp Mobile communication and computing system and method
US6199099B1 (en) 1999-03-05 2001-03-06 Ac Properties B.V. System, method and article of manufacture for a mobile communication network utilizing a distributed communication network
US6898577B1 (en) 1999-03-18 2005-05-24 Oracle International Corporation Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts
US6529885B1 (en) 1999-03-18 2003-03-04 Oracle Corporation Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts
JP2000276245A (en) 1999-03-23 2000-10-06 Matsushita Electric Ind Co Ltd Method and device for automatically discriminating and recognizing operator of terminal device
JP2000276445A (en) 1999-03-23 2000-10-06 Nec Corp Authentication method and device using biometrics discrimination, authentication execution device, and recording medium recorded with authentication program
JP3663075B2 (en) * 1999-04-05 2005-06-22 シャープ株式会社 Information processing device
US6615264B1 (en) 1999-04-09 2003-09-02 Sun Microsystems, Inc. Method and apparatus for remotely administered authentication and access control
US6337919B1 (en) 1999-04-28 2002-01-08 Intel Corporation Fingerprint detecting mouse
SE514105C2 (en) * 1999-05-07 2001-01-08 Ericsson Telefon Ab L M Secure distribution and protection of encryption key information
US6282304B1 (en) * 1999-05-14 2001-08-28 Biolink Technologies International, Inc. Biometric system for biometric input, comparison, authentication and access control and method therefor
JP2000331166A (en) * 1999-05-24 2000-11-30 Nec Yonezawa Ltd Finger print authenticating system
US6957768B1 (en) 1999-05-25 2005-10-25 Silverbrook Research Pty Ltd Computer system control via interface surface
JP2000341662A (en) * 1999-05-28 2000-12-08 Toshiba Corp Limited receiving method for digital broadcasting system and set-top box
US6886104B1 (en) 1999-06-25 2005-04-26 Cross Match Technologies Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface
US6681034B1 (en) 1999-07-15 2004-01-20 Precise Biometrics Method and system for fingerprint template matching
US6609198B1 (en) 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
US6719200B1 (en) 1999-08-06 2004-04-13 Precise Biometrics Ab Checking of right to access
JP2001067795A (en) * 1999-08-27 2001-03-16 Sony Corp Information receiving system and information receiver
JP2001067324A (en) * 1999-08-27 2001-03-16 Sony Corp Information transmitting system, information transmitter and information receiver
JP2001094550A (en) * 1999-09-17 2001-04-06 Toshiba Corp Signal processor
US6335688B1 (en) 1999-09-28 2002-01-01 Clifford Sweatte Method and system for airport security
JP2001103048A (en) 1999-09-28 2001-04-13 Fujitsu Ltd Method and device for managing information and information management program storage medium
JP4518217B2 (en) * 1999-09-30 2010-08-04 ソニー株式会社 COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD
US6728881B1 (en) 1999-10-01 2004-04-27 The United States Of America As Represented By The Secretary Of The Army Fingerprint and signature identification and authorization card and pen
EP2264896A3 (en) 1999-10-27 2012-05-02 Systems Ltd Keyless Integrated keypad system
KR200184982Y1 (en) 1999-11-08 2000-06-15 삼성전자주식회사 Fingerprint recognition having a display apparatus
CA2392264C (en) * 1999-11-19 2010-08-10 Accenture Gmbh System and method for automatically controlling the crossing of a border
EP1238355A4 (en) 1999-11-30 2006-08-16 David Russell Methods, systems, and apparatuses for secure interactions
US6443359B1 (en) 1999-12-03 2002-09-03 Diebold, Incorporated Automated transaction system and method
US6735695B1 (en) 1999-12-20 2004-05-11 International Business Machines Corporation Methods and apparatus for restricting access of a user using random partial biometrics
GB9930145D0 (en) * 1999-12-22 2000-02-09 Kean Thomas A Method and apparatus for secure configuration of a field programmable gate array
AU3071001A (en) 1999-12-23 2001-07-09 National University Of Singapore, The Wavelet-enhanced automated fingerprint identification system
US6871287B1 (en) 2000-01-21 2005-03-22 John F. Ellingson System and method for verification of identity
US6721738B2 (en) 2000-02-01 2004-04-13 Gaveo Technology, Llc. Motion password control system
US6414884B1 (en) * 2000-02-04 2002-07-02 Lucent Technologies Inc. Method and apparatus for securing electronic circuits
KR100325381B1 (en) * 2000-02-11 2002-03-06 안준영 A method of implementing touch pad using fingerprint reader and a touch pad apparatus for functioning as fingerprint scan
US6668332B1 (en) 2000-02-15 2003-12-23 International Business Machines Corporation Functional clock observation controlled by JTAG extensions
US7426750B2 (en) 2000-02-18 2008-09-16 Verimatrix, Inc. Network-based content distribution system
GB0004287D0 (en) * 2000-02-23 2000-04-12 Leeper Kim System and method for authenticating electronic documents
US6766456B1 (en) 2000-02-23 2004-07-20 Micron Technology, Inc. Method and system for authenticating a user of a computer system
JP2001236324A (en) 2000-02-24 2001-08-31 Fujitsu Ltd Portable electronic device with individual authenticating function by biometric information
CN1263324A (en) 2000-03-20 2000-08-16 后健慈 Fingerprint identification keyboard device and its identification method
JP3868701B2 (en) * 2000-03-21 2007-01-17 三菱電機株式会社 Vehicle key system
WO2001071462A2 (en) * 2000-03-21 2001-09-27 Widcomm, Inc. System and method for secure biometric identification
US6720712B2 (en) 2000-03-23 2004-04-13 Cross Match Technologies, Inc. Piezoelectric identification device and applications thereof
AU2001249968A1 (en) 2000-04-18 2001-10-30 Bioconx, Inc. System for logging into multiple network systems
JP2002014929A (en) 2000-04-26 2002-01-18 Sony Corp Access control system, access control method, device, access control server, access control server, access control server registration server, data processor and program storage medium
JP2001312284A (en) 2000-04-27 2001-11-09 Nec Corp Method and system for content distribution
US6775776B1 (en) 2000-06-27 2004-08-10 Intel Corporation Biometric-based authentication in a nonvolatile memory device
US6720860B1 (en) 2000-06-30 2004-04-13 International Business Machines Corporation Password protection using spatial and temporal variation in a high-resolution touch sensitive display
US6535871B1 (en) 2000-07-24 2003-03-18 Pitney Bowes Inc. Method for searching a digital rights management package
AU2001271039A1 (en) 2000-07-24 2002-02-05 Kabushiki Kaisha Dds Fingerprint collation apparatus, fingerprint collation method, and fingerprint collation program
US20040053654A1 (en) 2000-07-25 2004-03-18 Hitoshi Kokumai Secret information record medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
JP2002140541A (en) * 2000-08-22 2002-05-17 Adc Technology Kk Contents data storage system and program
JP2002073571A (en) * 2000-08-31 2002-03-12 Sony Corp Personal identification system, personal identification method and program providing medium
US6725303B1 (en) * 2000-08-31 2004-04-20 At&T Corp. Method and apparatus for establishing a personalized connection with a network
JP2002094473A (en) * 2000-09-11 2002-03-29 Victor Co Of Japan Ltd Terminal for purchasing program, decoding key storage device, and program-purchasing system
US6766040B1 (en) 2000-10-02 2004-07-20 Biometric Solutions, Llc System and method for capturing, enrolling and verifying a fingerprint
JP3535868B2 (en) 2000-10-05 2004-06-07 松下電器産業株式会社 Determination level setting method and data receiving device
US20050060232A1 (en) * 2000-10-12 2005-03-17 Maggio Frank S. Method and system for interacting with a writing
US6819219B1 (en) 2000-10-13 2004-11-16 International Business Machines Corporation Method for biometric-based authentication in wireless communication for access control
AU2002219860A1 (en) 2000-11-10 2002-06-11 Full Audio Corporation Digital content distribution and subscription system
JP2002159052A (en) * 2000-11-17 2002-05-31 Nec Kofu Ltd Mobile terminal with finger print authentication function
US7346778B1 (en) 2000-11-29 2008-03-18 Palmsource, Inc. Security method and apparatus for controlling the data exchange on handheld computers
US6871193B1 (en) 2000-11-29 2005-03-22 Verizon Corporate Services Group Method and system for partitioned service-enablement gateway with utility and consumer services
US7305092B2 (en) * 2000-12-19 2007-12-04 Qualcomm Incorporated Method and system to accelerate cryptographic functions for secure e-commerce applications
EP1216900B1 (en) 2000-12-22 2008-01-23 Ford Global Technologies, LLC Remote communication system for use with a vehicle and fob unit therefore
US20020091937A1 (en) 2001-01-10 2002-07-11 Ortiz Luis M. Random biometric authentication methods and systems
US7921297B2 (en) 2001-01-10 2011-04-05 Luis Melisendro Ortiz Random biometric authentication utilizing unique biometric signatures
US20020095588A1 (en) 2001-01-12 2002-07-18 Satoshi Shigematsu Authentication token and authentication system
US7124300B1 (en) 2001-01-24 2006-10-17 Palm, Inc. Handheld computer system configured to authenticate a user and power-up in response to a single action by the user
US7310734B2 (en) * 2001-02-01 2007-12-18 3M Innovative Properties Company Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US7363372B2 (en) * 2001-02-06 2008-04-22 Mtvn Online Partners I Llc System and method for managing content delivered to a user over a network
US6871784B2 (en) 2001-02-07 2005-03-29 Trijay Technologies International Corporation Security in mag-stripe card transactions
US20020122026A1 (en) 2001-03-01 2002-09-05 Bergstrom Dean Warren Fingerprint sensor and position controller
US20020124190A1 (en) * 2001-03-01 2002-09-05 Brian Siegel Method and system for restricted biometric access to content of packaged media
WO2002073877A2 (en) * 2001-03-09 2002-09-19 Pascal Brandys System and method of user and data verification
US7302634B2 (en) * 2001-03-14 2007-11-27 Microsoft Corporation Schema-based services for identity-based data access
US6603462B2 (en) * 2001-03-21 2003-08-05 Multidigit, Inc. System and method for selecting functions based on a finger feature such as a fingerprint
US6848052B2 (en) 2001-03-21 2005-01-25 Activcard Ireland Limited High security personalized wireless portable biometric device
US6877097B2 (en) 2001-03-21 2005-04-05 Activcard, Inc. Security access method and apparatus
US20020141586A1 (en) 2001-03-29 2002-10-03 Aladdin Knowledge Systems Ltd. Authentication employing the bluetooth communication protocol
US6850147B2 (en) 2001-04-02 2005-02-01 Mikos, Ltd. Personal biometric key
US20020146157A1 (en) 2001-04-09 2002-10-10 Goodman Mitchell E. Fingerprint acquisition assembly using prism and camera
US6724370B2 (en) 2001-04-12 2004-04-20 International Business Machines Corporation Touchscreen user interface
US20030236977A1 (en) * 2001-04-25 2003-12-25 Levas Robert George Method and system for providing secure access to applications
US20030172299A1 (en) * 2002-03-05 2003-09-11 Gunter Carl A. Method and system for maintaining secure access to web server services using permissions
US20030172297A1 (en) * 2002-03-05 2003-09-11 Gunter Carl A. Method and system for maintaining secure access to web server services using public keys
US7079652B1 (en) * 2001-05-01 2006-07-18 Harris Scott C Login renewal based on device surroundings
EP1257106B1 (en) 2001-05-08 2005-03-23 Telefonaktiebolaget LM Ericsson (publ) Secure remote subscription module access
EP1257111A1 (en) * 2001-05-08 2002-11-13 Siemens Schweiz AG Mobile terminal with an input device on its back side
US6973565B2 (en) * 2001-05-09 2005-12-06 Safenet Canada, Inc. Biometrically secured memory IC
US6832317B1 (en) 2001-05-10 2004-12-14 Advanced Micro Devices, Inc. Personal computer security mechanism
KR20020087665A (en) 2001-05-15 2002-11-23 엘지전자 주식회사 Method for conducting in a PDA
US20050024341A1 (en) 2001-05-16 2005-02-03 Synaptics, Inc. Touch screen with user interface enhancement
US7730401B2 (en) * 2001-05-16 2010-06-01 Synaptics Incorporated Touch screen with user interface enhancement
JP3800984B2 (en) 2001-05-21 2006-07-26 ソニー株式会社 User input device
US6876757B2 (en) 2001-05-25 2005-04-05 Geometric Informatics, Inc. Fingerprint recognition system
JP2002358162A (en) * 2001-06-01 2002-12-13 Sony Corp Picture display device
US20020190960A1 (en) 2001-06-15 2002-12-19 Shyh-Ren Kuo Method for controlling computer cursor based on identification of user fingerprint
US7203347B2 (en) 2001-06-27 2007-04-10 Activcard Ireland Limited Method and system for extracting an area of interest from within a swipe image of a biological surface
US6836843B2 (en) 2001-06-29 2004-12-28 Hewlett-Packard Development Company, L.P. Access control through secure channel using personal identification system
JP2003091613A (en) * 2001-07-10 2003-03-28 Systemneeds Inc Licensing method and licensing system
US20030115475A1 (en) 2001-07-12 2003-06-19 Russo Anthony P. Biometrically enhanced digital certificates and system and method for making and using
CN1547688A (en) 2001-07-27 2004-11-17 ����л����Үά�桤ŬŬ���޷� Method and device for entering computer database password
JP2003058657A (en) * 2001-08-09 2003-02-28 Matsushita Electric Ind Co Ltd Server and method for license management
FR2828755B1 (en) * 2001-08-14 2004-03-19 Atmel Nantes Sa DEVICE AND METHOD FOR RECOGNIZING AT LEAST ONE PERSON, CORRESPONDING ACCESS CONTROL DEVICE AND SYSTEM AND APPLICATION
JP4149150B2 (en) 2001-08-15 2008-09-10 富士通株式会社 Transmission distribution system and transmission distribution method under license offline environment
US6757411B2 (en) 2001-08-16 2004-06-29 Liska Biometry Inc. Method and system for fingerprint encoding and authentication
JP2003067343A (en) 2001-08-23 2003-03-07 Toshiba Tec Corp Business terminal unit
US7093298B2 (en) * 2001-08-30 2006-08-15 International Business Machines Corporation Apparatus and method for security object enhancement and management
US8266451B2 (en) * 2001-08-31 2012-09-11 Gemalto Sa Voice activated smart card
US20030048173A1 (en) 2001-09-06 2003-03-13 Satoshi Shigematsu Authentication method, authentication system, and authentication token
JP2003085540A (en) 2001-09-11 2003-03-20 Sony Corp User interface, authenticating device, device, and portable information terminal
JP2003108473A (en) * 2001-09-28 2003-04-11 Victor Co Of Japan Ltd Home network system
JP2003173237A (en) 2001-09-28 2003-06-20 Ricoh Co Ltd Information input-output system, program and storage medium
US20060095369A1 (en) 2001-10-15 2006-05-04 Eyal Hofi Device, method and system for authorizing transactions
JP2003143290A (en) 2001-10-30 2003-05-16 Sanyo Electric Co Ltd Portable telephone set
JP2003143123A (en) * 2001-10-31 2003-05-16 Telecommunication Advancement Organization Of Japan Cable television network system
DE10153591A1 (en) 2001-11-02 2003-05-22 Rene Baltus Recognizing person by detecting and comparing joystick operating dynamics involves
JP2003141267A (en) * 2001-11-05 2003-05-16 Sony Corp System and method for correspondence education
US7076663B2 (en) * 2001-11-06 2006-07-11 International Business Machines Corporation Integrated system security method
US6735287B2 (en) 2001-11-16 2004-05-11 Sbc Technology Resources, Inc. Method and system for multimodal presence detection
US6985502B2 (en) 2001-11-19 2006-01-10 Hewlett-Packard Development Company, L.P. Time-division multiplexed link for use in a service area network
US8266212B2 (en) 2001-11-23 2012-09-11 Igt Game talk service bus
US6690387B2 (en) 2001-12-28 2004-02-10 Koninklijke Philips Electronics N.V. Touch-screen image scrolling system and method
US7137553B2 (en) 2001-12-31 2006-11-21 Digital Data Research Company Security clearance card, system and method of reading a security clearance card
US7394346B2 (en) 2002-01-15 2008-07-01 International Business Machines Corporation Free-space gesture recognition for transaction security and command processing
US20030140232A1 (en) * 2002-01-21 2003-07-24 De Lanauze Pierre Method and apparatus for secure encryption of data
EP1333350A1 (en) * 2002-01-30 2003-08-06 STMicroelectronics Limited Memory security device
US6883709B2 (en) 2002-02-12 2005-04-26 Famous Horse, Inc. Biometric identification and security system associated with cash register
US6879243B1 (en) 2002-02-14 2005-04-12 Penco Products, Inc. Electronically-controlled locker system
US7204425B2 (en) * 2002-03-18 2007-04-17 Precision Dynamics Corporation Enhanced identification appliance
JP2003298689A (en) 2002-04-02 2003-10-17 Canon Inc Cellular telephone
JP4022861B2 (en) 2002-04-10 2007-12-19 日本電気株式会社 Fingerprint authentication system, fingerprint authentication method, and fingerprint authentication program
US7089419B2 (en) * 2002-04-18 2006-08-08 International Business Machines Corporation Control function with multiple security states for facilitating secure operation of an integrated system
US6980081B2 (en) 2002-05-10 2005-12-27 Hewlett-Packard Development Company, L.P. System and method for user authentication
US6853739B2 (en) 2002-05-15 2005-02-08 Bio Com, Llc Identity verification system
US7543156B2 (en) 2002-06-25 2009-06-02 Resilent, Llc Transaction authentication card
KR20040000954A (en) 2002-06-26 2004-01-07 삼성전자주식회사 Method for nevigation key using sensor of fingerprint identification in mobile phone
US7243239B2 (en) 2002-06-28 2007-07-10 Microsoft Corporation Click passwords
US11275405B2 (en) 2005-03-04 2022-03-15 Apple Inc. Multi-functional hand-held device
JP4159818B2 (en) * 2002-07-15 2008-10-01 東日本電信電話株式会社 Content distribution apparatus, content distribution method, content distribution program, and recording medium
US20040104268A1 (en) * 2002-07-30 2004-06-03 Bailey Kenneth Stephen Plug in credit card reader module for wireless cellular phone verifications
US20040032400A1 (en) * 2002-08-14 2004-02-19 Freeman Mark T. Method and systems for managing the display of digital content
US7185199B2 (en) * 2002-08-30 2007-02-27 Xerox Corporation Apparatus and methods for providing secured communication
US20040049686A1 (en) * 2002-09-05 2004-03-11 Chun-Yu Chen Fingerprint identification applied data storage system and method
KR20040025004A (en) 2002-09-18 2004-03-24 주식회사 현대오토넷 Certification system to certify password combined fingerprints
FI20021682A (en) 2002-09-20 2004-03-21 Nokia Corp Procedure for opening an appliance's locking position and electronic appliance
HK1062117A2 (en) 2002-09-25 2004-09-17 Univ Hong Kong Polytechnic Method of palm print identification using geometry, line and/or texture features
US20040229560A1 (en) 2002-10-10 2004-11-18 Maloney William C. Methods of tracking and verifying human assets
US6886101B2 (en) 2002-10-30 2005-04-26 American Express Travel Related Services Company, Inc. Privacy service
JP2004157821A (en) 2002-11-07 2004-06-03 Nec Fielding Ltd Identification system
US6886096B2 (en) 2002-11-14 2005-04-26 Voltage Security, Inc. Identity-based encryption system
JP2004172851A (en) 2002-11-19 2004-06-17 Mitsubishi Electric Corp Program for allowing computer to execute control method of communication terminal and photographing magnification
US20040123113A1 (en) * 2002-12-18 2004-06-24 Svein Mathiassen Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks
US7102617B2 (en) 2002-12-30 2006-09-05 Motorola, Inc. Compact optical pointing apparatus and method
US7076802B2 (en) * 2002-12-31 2006-07-11 Intel Corporation Trusted system clock
TWI241101B (en) 2003-01-02 2005-10-01 Tatung Co Ltd Method for generating key data of successful communication upon proceeding network connection
US7116805B2 (en) 2003-01-07 2006-10-03 Avagotechnologies Ecbu Ip (Singapore) Pte. Ltd. Fingerprint verification device
US7542945B2 (en) 2003-01-15 2009-06-02 Sanmina-Sci Corporation Authentication device, system and methods
US7404086B2 (en) * 2003-01-24 2008-07-22 Ac Technology, Inc. Method and apparatus for biometric authentication
KR20040076639A (en) 2003-02-26 2004-09-03 에스케이텔레텍주식회사 Mobile phone and method for quick dialing using fingerprint recognition
US20040172562A1 (en) 2003-03-01 2004-09-02 Vladimir Berger System and method for identity recognition of an individual for enabling an access to a secured system
US20040179692A1 (en) * 2003-03-11 2004-09-16 David Cheng Personal data entry and authentication device
US20040196400A1 (en) 2003-04-07 2004-10-07 Stavely Donald J. Digital camera user interface using hand gestures
US20040201595A1 (en) 2003-04-11 2004-10-14 Microsoft Corporation Self-orienting display
US20040250138A1 (en) 2003-04-18 2004-12-09 Jonathan Schneider Graphical event-based password system
US6888445B2 (en) 2003-05-20 2005-05-03 Bradley L. Gotfried Vehicle identification system
US7738916B2 (en) 2003-05-21 2010-06-15 Hitachi High-Technologies Corporation Portable terminal device with built-in fingerprint sensor
JP2007503797A (en) 2003-05-30 2007-02-22 プリヴァリス・インコーポレーテッド In-circuit security system and method for controlling access and use of sensitive data
JP2005004490A (en) 2003-06-12 2005-01-06 Murata Mach Ltd Document processor and its program
US7057607B2 (en) 2003-06-30 2006-06-06 Motorola, Inc. Application-independent text entry for touch-sensitive display
JP4551635B2 (en) 2003-07-31 2010-09-29 ソニー株式会社 Pipeline processing system and information processing apparatus
JP2005056152A (en) 2003-08-05 2005-03-03 Ricoh Co Ltd Electronic voting system, method, program, and recording medium
US20050044387A1 (en) 2003-08-18 2005-02-24 Ozolins Helmars E. Portable access device
US20040230843A1 (en) 2003-08-20 2004-11-18 Wayne Jansen System and method for authenticating users using image selection
JP4633347B2 (en) 2003-08-27 2011-02-16 ソニー株式会社 Electronics
AU2003259396A1 (en) 2003-08-29 2005-03-16 Nokia Corporation Method and device for customized picture-based user identification and authentication
JP4495545B2 (en) 2003-09-25 2010-07-07 パナソニック株式会社 Unauthorized use prevention apparatus and method
EP1521161A3 (en) 2003-09-25 2006-03-15 Matsushita Electric Industrial Co., Ltd. An apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use
US7492472B2 (en) 2003-10-30 2009-02-17 Xerox Corporation Multimedia communications/collaboration hub
JP4448000B2 (en) 2003-11-05 2010-04-07 キヤノン株式会社 Information transmission apparatus, information transmission destination designation method, storage medium, and program
TW200517975A (en) 2003-11-20 2005-06-01 Lightuning Tech Inc Sweep-type fingerprint sensor device capable of guiding a finger in a fixed sweeping direction
US20050114686A1 (en) 2003-11-21 2005-05-26 International Business Machines Corporation System and method for multiple users to securely access encrypted data on computer system
JP2005175555A (en) 2003-12-08 2005-06-30 Hitachi Ltd Mobile communication apparatus
JP4468896B2 (en) 2004-01-13 2010-05-26 富士通株式会社 Authentication device using biometric information
US7697729B2 (en) 2004-01-29 2010-04-13 Authentec, Inc. System for and method of finger initiated actions
JP2005219630A (en) 2004-02-05 2005-08-18 Pioneer Electronic Corp Operation control device, processing control device, operation controlling method, its program, and recording medium recording the program
TWI231689B (en) 2004-02-27 2005-04-21 Htc Corp Handheld electronic device
KR100652624B1 (en) 2004-03-02 2006-12-06 엘지전자 주식회사 Waiting screen display method for mobile communication terminal
US7378939B2 (en) 2004-03-30 2008-05-27 Sengupta Uttam K Method and apparatus for providing proximity based authentication, security, and notification in a wireless system
JP2005324450A (en) 2004-05-14 2005-11-24 Canon Inc Image forming apparatus, information processing apparatus, job displaying and controlling method, storage medium storing computer-readable program and program
US8684839B2 (en) 2004-06-18 2014-04-01 Igt Control of wager-based game using gesture recognition
US20060021003A1 (en) 2004-06-23 2006-01-26 Janus Software, Inc Biometric authentication system
KR20060003689A (en) 2004-07-07 2006-01-11 엘지전자 주식회사 Apparatus and method for selecting menu of fingerprint identification communication terminal
US8190907B2 (en) 2004-08-11 2012-05-29 Sony Computer Entertainment Inc. Process and apparatus for automatically identifying user of consumer electronics
US7328850B2 (en) 2004-08-12 2008-02-12 Codecard, Inc. Financial and similar identification cards and methods relating thereto
KR20060022001A (en) 2004-09-06 2006-03-09 현대모비스 주식회사 Button mounting structure for a car audio
JP2006072872A (en) 2004-09-06 2006-03-16 Matsushita Electric Ind Co Ltd Portable information processing apparatus, method for rotating screen of information processing apparatus, and synthesis data rotation method
JP2006085559A (en) 2004-09-17 2006-03-30 Canon Inc Personal identification system, personal authentication method and storage medium
US20060075250A1 (en) 2004-09-24 2006-04-06 Chung-Wen Liao Touch panel lock and unlock function and hand-held device
JP2006107366A (en) 2004-10-08 2006-04-20 Fujitsu Ltd Living body information input device, living body authentication device, living body information processing method, living body information processing program and computer readable recording medium with the program recorded thereon
JP2006121334A (en) 2004-10-20 2006-05-11 Vodafone Kk Information communication terminal and communication management system
US20060093192A1 (en) 2004-11-03 2006-05-04 Bechtel J S Finger guide device
CN100568250C (en) 2004-11-12 2009-12-09 皇家飞利浦电子股份有限公司 Be used to provide the user interface and the method thereof of User Recognition and authentication
JP2006146579A (en) 2004-11-19 2006-06-08 Olympus Corp Data retrieving/reproducing apparatus, information inputting/recording apparatus, and operation apparatus
JP2006157154A (en) 2004-11-25 2006-06-15 Canon Inc Information input apparatus and camera
US20060115130A1 (en) 2004-11-29 2006-06-01 Douglas Kozlay Eyewear with biometrics to protect displayed data
TW200642408A (en) 2004-12-07 2006-12-01 Farsheed Atef System and method for identity verification and management
US20060136734A1 (en) 2004-12-21 2006-06-22 Eastman Kodak Company Identification display device
JP2006189999A (en) 2005-01-04 2006-07-20 Fujitsu Ltd Security management method, program, and information apparatus
US8438400B2 (en) 2005-01-11 2013-05-07 Indigo Identityware, Inc. Multiple user desktop graphical identification and authentication
US8700729B2 (en) * 2005-01-21 2014-04-15 Robin Dua Method and apparatus for managing credentials through a wireless network
JP2006215705A (en) 2005-02-02 2006-08-17 Sony Ericsson Mobilecommunications Japan Inc Information communication apparatus, information communication system, information recording device, and information reproducing device
US8145912B2 (en) 2005-03-01 2012-03-27 Qualcomm Incorporated System and method for using a visual password scheme
JP4696608B2 (en) 2005-03-15 2011-06-08 オムロン株式会社 Subject authentication device, mobile phone, and subject authentication program
US7725511B2 (en) 2005-03-31 2010-05-25 Intel Corporation Bio-metric input mechanism
JP2006301201A (en) 2005-04-19 2006-11-02 Canon Inc Optical device and camera system
US7590269B2 (en) 2005-04-22 2009-09-15 Microsoft Corporation Integrated control for navigation, authentication, power on and rotation
TWI267791B (en) 2005-05-13 2006-12-01 Lite On Semiconductor Corp Handheld device for acquiring fingerprint information
WO2006126310A1 (en) 2005-05-27 2006-11-30 Sharp Kabushiki Kaisha Display device
US20060284853A1 (en) 2005-06-16 2006-12-21 Xm Satellite Radio, Inc. Context sensitive data input using finger or fingerprint recognition
KR100713494B1 (en) 2005-06-20 2007-04-30 삼성전자주식회사 Method for authenticating user using camera module and mobile communication terminal therefor
US20060289638A1 (en) 2005-06-27 2006-12-28 Schilling Donald L Voting verification system and method
JP2007011420A (en) 2005-06-28 2007-01-18 Konami Co Ltd Authentication device and game device provided therewith
JP4774245B2 (en) 2005-07-15 2011-09-14 日立オムロンターミナルソリューションズ株式会社 Automatic transaction device for biometric authentication
JP2007036928A (en) 2005-07-29 2007-02-08 Sharp Corp Mobile information terminal device
US20070061126A1 (en) 2005-09-01 2007-03-15 Anthony Russo System for and method of emulating electronic input devices
US8090945B2 (en) 2005-09-16 2012-01-03 Tara Chand Singhal Systems and methods for multi-factor remote user authentication
US7633076B2 (en) 2005-09-30 2009-12-15 Apple Inc. Automated response to and sensing of user activity in portable devices
JP2007097820A (en) 2005-10-04 2007-04-19 Sumitomo Electric Ind Ltd Biological inspection system and biological inspection method
KR100663437B1 (en) 2005-11-01 2007-01-02 삼성전자주식회사 Remote inputting method using finger print sensor
JP2007128288A (en) 2005-11-04 2007-05-24 Fuji Xerox Co Ltd Information display system
US7868874B2 (en) 2005-11-15 2011-01-11 Synaptics Incorporated Methods and systems for detecting a position-based attribute of an object using digital codes
GB0523995D0 (en) 2005-11-25 2006-01-04 Ibm Method,system and computer program product for access control
SG133415A1 (en) 2005-12-12 2007-07-30 Syed Mahtab Uddin Mahmood Antiphishing login techniques
EP1966739B1 (en) 2005-12-21 2012-06-06 Koninklijke Philips Electronics N.V. Biometric information detection using sweep-type imager
US7657849B2 (en) 2005-12-23 2010-02-02 Apple Inc. Unlocking a device by performing gestures on an unlock image
JP4252994B2 (en) 2005-12-26 2009-04-08 株式会社日立製作所 Mobile phone
US8018440B2 (en) 2005-12-30 2011-09-13 Microsoft Corporation Unintentional touch rejection
US7860536B2 (en) 2006-01-05 2010-12-28 Apple Inc. Telephone interface for a portable communication device
CN100999961A (en) 2006-01-14 2007-07-18 姜仁忠 New Sci & Tech. cipher lock and design method of key thereof
US20070204037A1 (en) 2006-02-27 2007-08-30 Microsoft Corporation Multiuser Web Service Sign-In
US7630522B2 (en) 2006-03-08 2009-12-08 Microsoft Corporation Biometric measurement using interactive display systems
WO2008008101A2 (en) 2006-03-20 2008-01-17 Black Gerald R Mobile communication device
US20070226778A1 (en) 2006-03-22 2007-09-27 Jorg Pietruszka Bluetooth theft protection
US9195428B2 (en) 2006-04-05 2015-11-24 Nvidia Corporation Method and system for displaying data from auxiliary display subsystem of a notebook on a main display of the notebook
US9395905B2 (en) 2006-04-05 2016-07-19 Synaptics Incorporated Graphical scroll wheel
KR100847532B1 (en) 2006-04-06 2008-07-21 재단법인서울대학교산학협력재단 User terminal and authenticating apparatus used for user authentication using information of user's behavior pattern
JPWO2007119818A1 (en) 2006-04-14 2009-08-27 日本電気株式会社 Function unlocking system, function unlocking method, and function unlocking program
JP2007293628A (en) 2006-04-25 2007-11-08 Toshiba Corp Information processing apparatus
JP4177858B2 (en) 2006-05-18 2008-11-05 株式会社カシオ日立モバイルコミュニケーションズ Portable terminal device with fingerprint authentication function and program
US20070277224A1 (en) 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication
US20070273658A1 (en) 2006-05-26 2007-11-29 Nokia Corporation Cursor actuation with fingerprint recognition
US8970502B2 (en) 2006-05-26 2015-03-03 Touchtable Ab User identification for multi-user touch screens
JP4185533B2 (en) 2006-06-15 2008-11-26 株式会社カシオ日立モバイルコミュニケーションズ Portable terminal device with authentication function and program
KR100856203B1 (en) 2006-06-27 2008-09-03 삼성전자주식회사 User inputting apparatus and method using finger mark recognition sensor
US7978091B2 (en) 2006-08-24 2011-07-12 Navisense Method and device for a touchless interface
US8395658B2 (en) 2006-09-07 2013-03-12 Sony Computer Entertainment Inc. Touch screen-like user interface that does not require actual touching
US8452978B2 (en) 2006-09-15 2013-05-28 Identity Metrics, LLC System and method for user authentication and dynamic usability of touch-screen devices
US20080069412A1 (en) 2006-09-15 2008-03-20 Champagne Katrina S Contoured biometric sensor
TWM317045U (en) 2006-10-20 2007-08-11 Techine Technology Co Ltd Mobile apparatus using human face features identification as access control
WO2008062544A1 (en) 2006-11-21 2008-05-29 Hitachi, Ltd. Biometrics authentication device and portable terminal
JP4946383B2 (en) 2006-11-22 2012-06-06 富士通株式会社 Information processing apparatus, abnormality detection method for information processing apparatus, and control program
US8970503B2 (en) 2007-01-05 2015-03-03 Apple Inc. Gestures for devices having one or more touch sensitive surfaces
US8607359B2 (en) 2007-01-22 2013-12-10 Dell Products L.P. Removable hard disk with front panel input
US7941834B2 (en) 2007-04-05 2011-05-10 Microsoft Corporation Secure web-based user authentication
US8471689B2 (en) 2007-05-11 2013-06-25 Philippe Stanislas Zaborowski Touch-sensitive motion device
US8681104B2 (en) 2007-06-13 2014-03-25 Apple Inc. Pinch-throw and translation gestures
US8733632B2 (en) 2007-06-22 2014-05-27 Visa U.S.A. Inc. Mobile subscriber device for financial transaction tokens
US8027518B2 (en) 2007-06-25 2011-09-27 Microsoft Corporation Automatic configuration of devices based on biometric data
US7835999B2 (en) 2007-06-27 2010-11-16 Microsoft Corporation Recognizing input gestures using a multi-touch input device, calculated graphs, and a neural network with link weights
US20090006846A1 (en) 2007-06-27 2009-01-01 Apple Inc. Bluetooth device as security access key
US9772751B2 (en) 2007-06-29 2017-09-26 Apple Inc. Using gestures to slide between user interfaces
US8127254B2 (en) 2007-06-29 2012-02-28 Nokia Corporation Unlocking a touch screen device
US20090037742A1 (en) 2007-07-31 2009-02-05 International Business Machines Corporation Biometric authentication device, system and method of biometric authentication
US20090043180A1 (en) 2007-08-08 2009-02-12 Nonin Medical, Inc. Sensor and system providing physiologic data and biometric identification
US20080042979A1 (en) 2007-08-19 2008-02-21 Navid Nikbin Method and apparatus for executing commands or inputting data based on finger's characteristics and Multi-Finger key
US20090063352A1 (en) 2007-08-29 2009-03-05 Lance Kaufman Methods and systems for monetary exchange and transfer
WO2009031215A1 (en) 2007-09-05 2009-03-12 Panasonic Corporation Electronic device, password control method, and program
KR101615461B1 (en) 2007-09-24 2016-04-25 애플 인크. Embedded authentication systems in an electronic device
US20090169070A1 (en) 2007-12-28 2009-07-02 Apple Inc. Control of electronic device by using a person's fingerprints
KR100817767B1 (en) 2008-01-14 2008-03-31 알서포트 주식회사 Authentication method using icon password
JP2009171234A (en) 2008-01-16 2009-07-30 Sony Ericsson Mobilecommunications Japan Inc Communication terminal, communication system, and communication method
US9552155B2 (en) 2008-02-04 2017-01-24 Microsoft Technology Liecsnsing, LLC Dynamic soft keyboard
US7486810B1 (en) 2008-04-24 2009-02-03 International Business Machines Corporation On-type biometrics fingerprint soft keyboard
JP5317590B2 (en) 2008-09-01 2013-10-16 キヤノン株式会社 Job processing apparatus, control method therefor, storage medium, and program
KR101571723B1 (en) 2008-09-02 2015-11-25 엘지전자 주식회사 Mobile terminal and Method for controlling in thereof
US20100076823A1 (en) 2008-09-24 2010-03-25 Yasha Feldman Voting system and method of voting
EP2626805B1 (en) 2008-12-01 2017-10-25 BlackBerry Limited Simplified biometric character sequence entry
US20100208953A1 (en) 2009-02-17 2010-08-19 Validity Sensors, Inc. Illuminated Fingerprint Sensor and Method
KR101549556B1 (en) 2009-03-06 2015-09-03 엘지전자 주식회사 Mobile terminal and control method thereof
KR101549557B1 (en) 2009-03-10 2015-09-03 엘지전자 주식회사 Mobile terminal and control method thereof
US20100237991A1 (en) * 2009-03-17 2010-09-23 Prabhu Krishnanand Biometric scanning arrangement and methods thereof
US8605961B2 (en) 2009-03-30 2013-12-10 Motorola Mobility Llc Method and apparatus for determining a physiological parameter using a fingerprint sensor on a portable electronic device
KR20100111121A (en) 2009-04-06 2010-10-14 뮤텔테크놀러지 주식회사 Wireless home network system and installing method thereof
US8300023B2 (en) 2009-04-10 2012-10-30 Qualcomm Incorporated Virtual keypad generator with learning capabilities
JP2011022687A (en) 2009-07-14 2011-02-03 Fujitsu Ltd Electronic device having authentication function and authentication method
JP2011048523A (en) 2009-08-26 2011-03-10 Kyocera Corp Portable radio terminal
JP5589326B2 (en) 2009-09-08 2014-09-17 ヤマハ株式会社 Program for realizing electronic music apparatus and control method thereof
KR101649638B1 (en) 2009-11-26 2016-08-19 엘지전자 주식회사 Mobile terminal and control method thereof
US8433110B2 (en) 2009-12-11 2013-04-30 Sonavation, Inc. Pulse-rate detection using a fingerprint sensor
US20110285648A1 (en) 2010-01-22 2011-11-24 Lester Ludwig Use of fingerprint scanning sensor data to detect finger roll and pitch angles
KR20110103598A (en) 2010-03-15 2011-09-21 주식회사 엘지유플러스 Terminal unlock system and terminal unlock method
EP2388734A1 (en) 2010-05-21 2011-11-23 Research In Motion Limited Fingerprint scanning with a camera
KR20120018685A (en) 2010-08-23 2012-03-05 주식회사 팬택 Termianl for recogniging multi user input and control method thereof
US8311514B2 (en) 2010-09-16 2012-11-13 Microsoft Corporation Prevention of accidental device activation
KR101741519B1 (en) 2010-09-30 2017-06-01 삼성전자주식회사 3D Glasses and Method for Controlling thereof
KR20120042684A (en) 2010-10-23 2012-05-03 김남현 Data transfer/receive method and system using finger printinformation

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030177347A1 (en) * 1995-11-22 2003-09-18 Bruce Schneier Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US10108939B1 (en) * 1999-12-23 2018-10-23 Swisscom Ag Payment transaction method and payment transaction system
US20020002683A1 (en) * 2000-02-14 2002-01-03 Benson Justin H. Security module system, apparatus and process
US20020073416A1 (en) * 2000-12-12 2002-06-13 Philips Electronics North America Corporation Remote control account authorization system
US20020112183A1 (en) * 2001-02-12 2002-08-15 Baird Leemon C. Apparatus and method for authenticating access to a network resource
US20020178446A1 (en) * 2001-04-23 2002-11-28 Svod Llc Program guide environment
US20030005336A1 (en) * 2001-06-28 2003-01-02 Poo Teng Pin Portable device having biometrics-based authentication capabilities
US20030046228A1 (en) * 2001-08-28 2003-03-06 Jean-Marc Berney User-wearable functional jewelry with biometrics and smartcard to remotely sign and/or authenticate to e-services
US20030073065A1 (en) * 2001-10-12 2003-04-17 Lee Riggs Methods and systems for providing training through an electronic network to remote electronic devices
US20040085188A1 (en) * 2002-03-15 2004-05-06 Atsushi Minemura Individual authentication device and cellular terminal apparatus
US20040019564A1 (en) * 2002-07-26 2004-01-29 Scott Goldthwaite System and method for payment transaction authentication
US20040073432A1 (en) * 2002-10-15 2004-04-15 Stone Christopher J. Webpad for the disabled

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11494470B2 (en) 2016-10-24 2022-11-08 Sony Corporation Information processing apparatus and information processing method

Also Published As

Publication number Publication date
US7783892B2 (en) 2010-08-24
WO2005001611A3 (en) 2005-06-16
CA2857208A1 (en) 2004-12-16
US9923884B2 (en) 2018-03-20
US20100182125A1 (en) 2010-07-22
DK1629624T3 (en) 2013-06-24
CA2527829A1 (en) 2004-12-16
EP1629624A2 (en) 2006-03-01
CA2527836A1 (en) 2004-12-16
US20090213087A1 (en) 2009-08-27
US7688314B2 (en) 2010-03-30
US20040239648A1 (en) 2004-12-02
US20050093834A1 (en) 2005-05-05
US8327152B2 (en) 2012-12-04
US20050081040A1 (en) 2005-04-14
CA3012154A1 (en) 2004-12-16
EP1629408A4 (en) 2009-02-25
JP6306493B2 (en) 2018-04-04
CA2527836C (en) 2011-02-15
US20100005314A1 (en) 2010-01-07
US9124930B2 (en) 2015-09-01
US8495382B2 (en) 2013-07-23
WO2005001611A2 (en) 2005-01-06
WO2004109454A3 (en) 2005-01-27
WO2004109455A8 (en) 2005-03-31
US9319405B2 (en) 2016-04-19
US8788813B2 (en) 2014-07-22
US20130305056A1 (en) 2013-11-14
EP1629624A4 (en) 2009-02-25
CA2724292C (en) 2014-09-30
EP1629460B1 (en) 2015-05-13
CA2724292A1 (en) 2004-12-16
JP2015084236A (en) 2015-04-30
EP1629460A4 (en) 2010-03-24
US20080317302A1 (en) 2008-12-25
US20140298371A1 (en) 2014-10-02
US20150347727A1 (en) 2015-12-03
US7587611B2 (en) 2009-09-08
CA2527826C (en) 2011-07-26
WO2004109455A2 (en) 2004-12-16
EP1629460A2 (en) 2006-03-01
US20100318803A1 (en) 2010-12-16
EP1629624B1 (en) 2013-03-20
JP5248548B2 (en) 2013-07-31
US20130111575A1 (en) 2013-05-02
CA2737868A1 (en) 2005-01-06
JP2007503797A (en) 2007-02-22
CA2527826A1 (en) 2005-01-06
EP1629408A2 (en) 2006-03-01
JP2011040082A (en) 2011-02-24
US9342674B2 (en) 2016-05-17
CA2737868C (en) 2015-11-24
JP5763872B2 (en) 2015-08-12
USRE42038E1 (en) 2011-01-18
WO2004109455A3 (en) 2005-02-03
JP2007516507A (en) 2007-06-21
JP5227381B2 (en) 2013-07-03
EP1629408B1 (en) 2015-01-28
US7420546B2 (en) 2008-09-02
WO2004109454A2 (en) 2004-12-16
US20150178548A1 (en) 2015-06-25
US7525537B2 (en) 2009-04-28
JP2006528815A (en) 2006-12-21
JP2013257885A (en) 2013-12-26
US20160308854A1 (en) 2016-10-20
US20170359335A1 (en) 2017-12-14
JP4680918B2 (en) 2011-05-11
JP2010250837A (en) 2010-11-04
US20050160042A1 (en) 2005-07-21
CA2527829C (en) 2016-09-27
CA2857208C (en) 2018-09-04

Similar Documents

Publication Publication Date Title
US20180309750A1 (en) In-circuit security system and methods for controlling access to and use of sensitive data
AU2002226231B2 (en) Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US20070223685A1 (en) Secure system and method of providing same
US20140013113A1 (en) Secure non-invasive method and system for distribution of digital assets
AU2002226231A1 (en) Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US20130173913A1 (en) Secure mechanisms to enable mobile device communication with a security panel
KR102401920B1 (en) System for authenticating a user of drone
WO2007092429A2 (en) Secure system and method for providing same

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION