WO1999026188A1 - A remotely accessible private space using a fingerprint - Google Patents

A remotely accessible private space using a fingerprint Download PDF

Info

Publication number
WO1999026188A1
WO1999026188A1 PCT/US1998/023802 US9823802W WO9926188A1 WO 1999026188 A1 WO1999026188 A1 WO 1999026188A1 US 9823802 W US9823802 W US 9823802W WO 9926188 A1 WO9926188 A1 WO 9926188A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
fingerprint
private space
private
access
Prior art date
Application number
PCT/US1998/023802
Other languages
French (fr)
Inventor
Vance Bjorn
Fabio Righi
Original Assignee
Digital Persona, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US97034197A priority Critical
Priority to US08/970,341 priority
Application filed by Digital Persona, Inc. filed Critical Digital Persona, Inc.
Publication of WO1999026188A1 publication Critical patent/WO1999026188A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

A method and apparatus for remote access to a private space (140) is provided. A private space (140) is set up in a remote system (140) accessible through a network (130). A user identification based on the user's fingerprint is associated with the private space. Fingerprint information is received from the user (420) to access the space, and compared to the user identification stored in the remote system (440). The private space is only accessible if the fingerprint information matches the user identification (450).

Description

A REMOTELY ACCESSIBLE PRIVATE SPACE USING A FINGERPRINT

FIELD OF THE INVENTION

The present invention relates to biometrics, and more specifically, to accessing remote networks using biometric verification of identity.

BACKGROUND OF THE INVENTION

Remote access to networks is becoming more common as employees telecommute, travelers wish to access a home network, and users generally wish to access a non-local hard drive. One prior art method of accessing a remote hard drive is using a virtual private network. A virtual private network is constructed by using public wires, such as the Internet, to connect nodes. These systems use encryption to ensure that only authorized users can access the network and that the data cannot be intercepted. However, encryption is only as safe as the storage of the keys.

Existing password and cryptographic techniques ensure that the set of digital identification keys associated with an individual person can safely carry on electronic transactions and information exchanges. Little, however, has been done to ensure that such identification keys can only be used by their legitimate owners. This is a critical link that needs to be made secure if remote computer access is to become truly secure.

BRIEF SUMMARY OF THE INVENTION

The method and apparatus for remote access to a private space is provided. A private space is set up in a remote system accessible through a network. A user identification based on the user's fingerprint is associated with the private space. Fingerprint information is received from the user to access the space, and compared to the user identification stored in the remote system. The private space is only accessible if the fingerprint information matches the user identification.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:

Figure 1 is an illustration of the network on which the present invention may be implemented.

Figure 2 illustrates the remote system including the private area that may be accessed.

Figure 3 illustrates the local system that is used to access the private area.

Figure 4 is a flowchart illustrating the process of creating the private space.

Figure 5 is a flowchart illustrating the process of logging into the private space.

Figure 6 is a flowchart illustrating another embodiment of the registration process.

Figure 7 is a flowchart illustrating another embodiment of the process of logging into a private space.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

A method and apparatus for remote access to a private space is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.

Figure 1 illustrates a network in which the present invention may be utilized. Sensor 130 is coupled to local system 120. Local system 120 is enabled to connect to a network 130, which couples a plurality of systems 140, 150, 160 together. For one embodiment, the network 130 is the Internet.

A remote system 140 contains the private area that the local system 120 is trying to connect to. Other systems 150, 160 may be accessed through the network as well. Because the network 130 is not secure, the security mechanism described below is used to restrict access to the private area.

Figure 2 illustrates the remote system including the private area that may be accessed. The remote system 140 includes a system area 210, which may store the operating system, various application programs, and other files. The remote system 140 further includes a network access unit 220. For one embodiment, the remote system 140 has a semi-permanent network connection, such as Ethernet, ISDN, Tl, or similar connection. Alternatively, the remote system 140 may be connected to the network 130 via a modem.

The remote system 140 further may include a fingerprint recognition unit 230. The fingerprint recognition unit matches a template stored within the remote system 140 to a fingerprint received from a user. The matching may use any matching algorithm known in the art. For an alternate embodiment, no fingerprint recognition unit is included in the remote system 140.

The remote system may further include an encryption unit 240. The encryption unit 240 encrypts and decrypts using public and private keys. For one embodiment, the encryption unit 240 retrieves a public key stored with the user data 260, in order to verify the identity of the user by decrypting a file encrypted with the user's private key. For another embodiment, the encryption unit further includes the private and public keys of the remote system 140.

The remote system further includes an access control unit 250. The access control unit 250 controls access to the user data 260. For one embodiment, the access control unit 250 receives indication from the fingerprint recognition unit 230 whether the template matched the fingerprint sent by the user. For another embodiment, the identity verification unit 250 receives indication from the encryption unit 240 whether the public key decrypted the file sent by the user encrypted with the user's fingerprint based private key. The access control unit 250 only permits access to the user data 260 when a match was found.

The user data 260 may be actual data, various application programs, or anything that the user may have access to. For one embodiment, the user data 260 may include the operating system of the computer. That is, the user may remotely adjust the operation of the remote system 140. For one embodiment, multiple users may have private areas within the same user data block 260. Each user is permitted access only to his or her private area.

Figure 3 illustrates the local system that is used to access the private area. The local system 110 includes a system area 310, which may store the operating system, various application programs, and other files. The local system 110 further includes a network access unit 320. For one embodiment, the network access unit 320 provides a network connection such as Ethernet, ISDN, Tl, etc. Alternatively, the network access unit 320 may provide a network connection via a modem. The local system 110 may further include a scanner interface 330. The scanner 120 is coupled to the local system 110. The scanner interface 330 receives a digitized fingerprint image from the scanner. The scanner interface 330 may further extract a template from the digitized fingerprint image.

The local system may further include an encryption unit 340. The encryption unit 340 encrypts and decrypts using public and private keys. For one embodiment, the encryption unit generates the private and public keys of the user from the fingerprint data received by the scanner interface 330. For another embodiment, the encryption unit 340 generates a fingerprint template from the fingerprint data received by the scanner interface 330. This fingerprint template is sent to the remote system 140.

Figure 4 is a flowchart illustrating the process of creating the private space. At block 410, the remote access system is set up. For one embodiment, this includes adding server software to the remote system.

At block 420, the remote system receives a fingerprint template from the user. For one embodiment, the remote system receives an actual digital image of the fingerprint. For another embodiment, the remote system receives a template including extracted features of the fingerprint. For yet another embodiment, the remote system receives other data representing various characteristics of the fingerprint. This fingerprint template is received either locally, or remotely with validation. For one embodiment, the user may set up the private space locally, for remote access. For one embodiment, validation may be a digital certificate, or an encryption verification method. Since the private space at this point does not contain any data, the security of this step is not vital.

At block 430, private space is allocated to the user. For one embodiment, actual space is allocated to the user. For another embodiment, flexible allocation may be made, permitting the user to store varied amounts of data, and reallocating space as needed. However, this establishes an area for the user's data.

At block 440, the fingerprint template is stored within the remote system to control access to the private space. For one embodiment, the template is stored in the access control unit 250 of the remote system.

At block 450, the access control unit 250 is enabled, and access to the private space is routed through the access control unit 250. At this point, the user needs to be validated in order to access the private space.

Figure 5 is a flowchart illustrating the process of logging into the private space At block 510, the remote system receives an access request. For one embodiment, the user may request access by entering the remote system's IP address into a web browser.

At block 520, the remote system responds with a request for validation. For one embodiment, the request for validation may specifically request a fingerprint. The user now has to place his or her finger on the fingerprint scanner 120 attached to the user's local system. This fingerprint information is transmitted to the remote system.

At block 530, the fingerprint information is received by the remote system. For one embodiment, the fingerprint information is a digital image of the fingerprint. Alternatively, the fingerprint information may be a list of extracted features of the fingerprint, or other data. Some of the processing for creating this information may occur in the user's local system.

At block 540, the fingerprint information is compared with the fingerprint template associated with the private space. For one embodiment, if there are multiple private spaces within the remote system, the user requests his or her own private space by entering a handle or name. For another embodiment, the user merely attempts to access the remote system, and the matching is to all fingerprint templates within the remote system.

At block 550, it is determined whether the fingerprint information matches the fingerprint template. For one embodiment, the fingerprint recognition unit 230 of the remote system manipulates the data of the fingerprint image and the fingerprint template to be in the same format. If the information does not match the template, the process continues to block 560, and the user is denied access to the private space. If the information matches the template, the process continues to block 570, and the user is allowed access to the private space. For one embodiment, after the user is allowed access, a one-time session key is exchanged with the user for further verification during the access period. For another embodiment, the remote system periodically challenges the user's local system for re-verification.

Figure 6 illustrates another embodiment of the registration process. At block 610, the remote access system is set up.

At block 620, the remote system receives a digital certificate of the user. Digital certificates are known in the art. They are used to verify the identity of a user. The digital certificate includes the public key of the user. This public key is generated based on the fingerprint of the user. The concurrently filed application entitled "Cryptographic Key

Generation Using Biometric Data", Serial No. , filed November 14,

1997, which teaches a method of generating a cryptographic key based on a fingerprint, is incorporated herein by reference. Alternative methods of generating a cryptographic key based on the fingerprint of the user may be used. At block 630, the public key of the user is extracted from the digital certificate. For one embodiment, this involves decrypting the digital certificate with the certifying authority's public key.

At block 640, the public key of the user is verified. For one embodiment, this is done by receiving a file encrypted with the private key that corresponds to the public key of the user. Decrypting this file with the user's public key verifies that the user is in fact associated with the public key included in the digital certificate. Because the private key is generated based on an actual fingerprint image of the user, the user's identity is also verified.

At block 650, the user's public key is stored in the system. And at block 660, space is allocated for the user.

Figure 7 is a flowchart illustrating the process of logging into the private space. At block 710, the remote system receives a request for access to the private space.

At block 720, the remote system sends a request for a file encrypted the user's private key. The private key is fingerprint based, and therefore also verifies that the actual user associated with the private key is sitting in front of the computer system.

At block 730, the remote system receives the file encrypted with the fingerprint based private key.

At block 740, the remote system retrieves the public key associated with the user, and attempts to decrypt the file sent by the user.

At block 750, it is determined whether the public key decrypts the file. If the public key decrypts the file, and therefore the user is the owner of the private space, the process continues to block 760, and the user is allowed access to the private space. If the public key does not decrypt the file, the process continues to block 770, and the user is denied access to the private space.

In the foregoing specification, the invention has been described with reference to specific exemplary embodiments. It will, however, be evident that various modifications and changes may be made without departing from the broader spirit and scope of the invention as set forth in the claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims

CLAIMSWhat is claimed is:
1. A method comprising the steps of: setting up a private space in a system accessible through a network; storing a template of a fingerprint associated with the private space; requesting a fingerprint from a user to access the private space; and comparing the fingerprint to the template associated with the private space, and only allowing access to the private space if the fingerprint matches the template.
2. The method of claim 1, wherein said step of storing a template comprises: receiving a digital certificate from the user; and extracting the template of the fingerprint from the digital certificate.
3. The method of claim 2, further comprising: decrypting the digital certificate with a certifying authority's public key; extracting the user's public key from the digital certificate; verifying that the user is the owner of the certificate.
4. The method of claim 3, wherein said step of verifying that the user is the owner of the certificate comprises the steps of: receiving a file encrypted with the user's private key; decrypting the file with the user's public key extracted from the digital certificate.
5. A method comprising the steps of: setting up a private space associated with a user, the step of setting up the private space including the steps of: allocating the private space to the user; and storing an associated fingerprint template with the private space; requesting a fingerprint from the user to access the private space; permitting access to the private space only if the fingerprint of the user matches the fingerprint template associated with the private space.
6. A method comprising the step of setting up a private space associated with a user, the step of setting up the private space including the steps of: allocating the private space to the user; and storing a public key derived from a fingerprint of the user with the private space, the public key for identifying the user.
7. The method of claim 6, further comprising: receiving a digital certificate from the user; extracting the user's public key from the digital certificate.
8. The method of claim 7, further comprising verifying the ownership of the user's public key by: receiving a file encrypted with the user's private key derived from the user's fingerprint; and decrypting the file with the user's public key extracted from the digital certificate.
9. The method of claim 6 further comprising the step of accessing the private space, the step including the steps of: receiving a request for access to the private space; sending a request for a file encrypted with the fingerprint based private key that corresponds to the public key stored with the private space; receiving the file encrypted with the fingerprint based private key; and decrypting the file using the public key stored with the private space and associated with a user of the private space.
PCT/US1998/023802 1997-11-14 1998-11-10 A remotely accessible private space using a fingerprint WO1999026188A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US97034197A true 1997-11-14 1997-11-14
US08/970,341 1997-11-14

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
AU21968/99A AU2196899A (en) 1997-11-14 1998-11-10 A remotely accessible private space using a fingerprint
EP19980965955 EP1036372A1 (en) 1997-11-14 1998-11-10 A remotely accessible private space using a fingerprint
JP2000521477A JP2001523903A (en) 1997-11-14 1998-11-10 Accessible private space remotely using a fingerprint
KR1020007005234A KR20010052103A (en) 1997-11-14 1998-11-10 A remotely accessible private space using a fingerprint

Publications (1)

Publication Number Publication Date
WO1999026188A1 true WO1999026188A1 (en) 1999-05-27

Family

ID=25516800

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/023802 WO1999026188A1 (en) 1997-11-14 1998-11-10 A remotely accessible private space using a fingerprint

Country Status (6)

Country Link
EP (1) EP1036372A1 (en)
JP (1) JP2001523903A (en)
KR (1) KR20010052103A (en)
CN (1) CN1291313A (en)
AU (1) AU2196899A (en)
WO (1) WO1999026188A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002073566A (en) * 2000-08-31 2002-03-12 Sony Corp System and method for processing data applied to personal identification, information processor and program supply medium
JP2002073568A (en) * 2000-08-31 2002-03-12 Sony Corp System and method for personal identification and program supply medium
JP2002073569A (en) * 2000-08-31 2002-03-12 Sony Corp Personal identification system, personal identification method, information processor and program providing medium
WO2002037403A1 (en) * 2000-11-01 2002-05-10 Nitgen Co., Ltd. User authenticating system and method using one-time fingerprint template
JP2002175279A (en) * 2000-08-31 2002-06-21 Sony Corp Personal authentication system, personal authentication method, and information processing device, and program providing medium
US7181627B2 (en) * 2002-08-01 2007-02-20 Freescale Semiconductor, Inc. Biometric system for replacing password or pin terminals
US7409543B1 (en) 2000-03-30 2008-08-05 Digitalpersona, Inc. Method and apparatus for using a third party authentication server
KR100899471B1 (en) 2001-02-01 2009-05-27 쓰리엠 이노베이티브 프로퍼티즈 컴파니 Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US7676439B2 (en) 2001-06-18 2010-03-09 Daon Holdings Limited Electronic data vault providing biometrically protected electronic signatures
US7698565B1 (en) 2000-03-30 2010-04-13 Digitalpersona, Inc. Crypto-proxy server and method of using the same
US8046589B2 (en) 2004-06-25 2011-10-25 Koninklijke Philips Electronics N.V. Renewable and private biometrics
CN102799956A (en) * 2011-05-23 2012-11-28 方良卫 System for applying fingerprint analysis to talent seeking, job hunting, friend making, life planning and career planning

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100772292B1 (en) * 2003-09-22 2007-11-01 김형윤 Sensors and systems for structural health monitoring
FR2946209A1 (en) * 2009-06-02 2010-12-03 Alcatel Lucent A method of protecting a network of telecommunication and secure router implementing a such a process.

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5497422A (en) * 1993-09-30 1996-03-05 Apple Computer, Inc. Message protection mechanism and graphical user interface therefor
US5534855A (en) * 1992-07-20 1996-07-09 Digital Equipment Corporation Method and system for certificate based alias detection
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5534855A (en) * 1992-07-20 1996-07-09 Digital Equipment Corporation Method and system for certificate based alias detection
US5497422A (en) * 1993-09-30 1996-03-05 Apple Computer, Inc. Message protection mechanism and graphical user interface therefor
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
STOCKEL A: "SECURING DATA AND FINANCIAL TRANSACTIONS", PROCEEDINGS OF THE 29TH. ANNUAL INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY. SANDERSTEAD, GB, OCT. 18 - 20, 1995., NEW YORK, IEEE., US, vol. CONF. 29, 18 October 1995 (1995-10-18), US, pages 397 - 401, XP002918744, ISBN: 978-0-7803-2628-6 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7895432B2 (en) 2000-03-30 2011-02-22 Digitalpersona, Inc. Method and apparatus for using a third party authentication server
US7409543B1 (en) 2000-03-30 2008-08-05 Digitalpersona, Inc. Method and apparatus for using a third party authentication server
US7698565B1 (en) 2000-03-30 2010-04-13 Digitalpersona, Inc. Crypto-proxy server and method of using the same
JP2002073569A (en) * 2000-08-31 2002-03-12 Sony Corp Personal identification system, personal identification method, information processor and program providing medium
JP2002073566A (en) * 2000-08-31 2002-03-12 Sony Corp System and method for processing data applied to personal identification, information processor and program supply medium
JP4654498B2 (en) * 2000-08-31 2011-03-23 ソニー株式会社 Personal authentication system, personal authentication method, and an information processing apparatus, and program providing medium
JP4654497B2 (en) * 2000-08-31 2011-03-23 ソニー株式会社 Personal authentication system, personal authentication method, and an information processing apparatus, and program providing medium
JP2002073568A (en) * 2000-08-31 2002-03-12 Sony Corp System and method for personal identification and program supply medium
JP2002175279A (en) * 2000-08-31 2002-06-21 Sony Corp Personal authentication system, personal authentication method, and information processing device, and program providing medium
WO2002037403A1 (en) * 2000-11-01 2002-05-10 Nitgen Co., Ltd. User authenticating system and method using one-time fingerprint template
US7035442B2 (en) 2000-11-01 2006-04-25 Secugen Corporation User authenticating system and method using one-time fingerprint template
KR100899471B1 (en) 2001-02-01 2009-05-27 쓰리엠 이노베이티브 프로퍼티즈 컴파니 Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US7676439B2 (en) 2001-06-18 2010-03-09 Daon Holdings Limited Electronic data vault providing biometrically protected electronic signatures
US7865449B2 (en) 2001-06-18 2011-01-04 Daon Holdings Limited Electronic data vault providing biometrically protected electronic signatures
US7941380B2 (en) 2001-06-18 2011-05-10 Daon Holdings Limited Electronic data vault providing biometrically protected electronic signatures
US7181627B2 (en) * 2002-08-01 2007-02-20 Freescale Semiconductor, Inc. Biometric system for replacing password or pin terminals
US8046589B2 (en) 2004-06-25 2011-10-25 Koninklijke Philips Electronics N.V. Renewable and private biometrics
CN102799956A (en) * 2011-05-23 2012-11-28 方良卫 System for applying fingerprint analysis to talent seeking, job hunting, friend making, life planning and career planning

Also Published As

Publication number Publication date
JP2001523903A (en) 2001-11-27
AU2196899A (en) 1999-06-07
EP1036372A1 (en) 2000-09-20
CN1291313A (en) 2001-04-11
KR20010052103A (en) 2001-06-25

Similar Documents

Publication Publication Date Title
US6167517A (en) Trusted biometric client authentication
US7725710B2 (en) Authentication system for networked computer applications
US7100054B2 (en) Computer network security system
US7590861B2 (en) Methods for secure enrollment and backup of personal identity credentials into electronic devices
US5999711A (en) Method and system for providing certificates holding authentication and authorization information for users/machines
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
US9563757B1 (en) Secure digital credential sharing arrangement
CN1307819C (en) Method and apparatus for secure distribution of public/private key pairs
US6553494B1 (en) Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document
ES2701873T3 (en) Distributed single sign-on service
US8644516B1 (en) Universal secure messaging for cryptographic modules
US7266695B2 (en) Data updating method and data updating system
JP4746266B2 (en) User authentication method and system for sub-location of the network location
US7231526B2 (en) System and method for validating a network session
US7346779B2 (en) System and method for authenticating electronic documents
US5768373A (en) Method for providing a secure non-reusable one-time password
JP4790731B2 (en) Derived seed
US6480958B1 (en) Single-use passwords for smart paper interfaces
US7185194B2 (en) System and method for distributed group management
EP1249983A2 (en) Methods and arrangements for protecting information in forwarded authentication messages
CN1972189B (en) Biometrics authentication system
US5818936A (en) System and method for automically authenticating a user in a distributed network system
JP4350549B2 (en) Information processing apparatus for digital rights management
EP1162807B1 (en) System and method for secure legacy enclaves in a public key infrastructure
CN101202753B (en) Method and device for accessing plug-in connector applied system by client terminal

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 98812160.3

Country of ref document: CN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AT AU AZ BA BB BG BR BY CA CH CN CU CZ CZ DE DE DK DK EE EE ES FI FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT UA UG US UZ VN YU ZW

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 1998965955

Country of ref document: EP

ENP Entry into the national phase in:

Ref document number: 2000 521477

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1020007005234

Country of ref document: KR

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1998965955

Country of ref document: EP

NENP Non-entry into the national phase in:

Ref country code: CA

WWP Wipo information: published in national office

Ref document number: 1020007005234

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1998965955

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1020007005234

Country of ref document: KR