New! View global litigation for patent families

WO2002001328A2 - Biometric-based authentication in a nonvolatile memory device - Google Patents

Biometric-based authentication in a nonvolatile memory device

Info

Publication number
WO2002001328A2
WO2002001328A2 PCT/US2001/018692 US0118692W WO2002001328A2 WO 2002001328 A2 WO2002001328 A2 WO 2002001328A2 US 0118692 W US0118692 W US 0118692W WO 2002001328 A2 WO2002001328 A2 WO 2002001328A2
Authority
WO
Grant status
Application
Patent type
Prior art keywords
processor
data
memory
circuit
biometric
Prior art date
Application number
PCT/US2001/018692
Other languages
French (fr)
Other versions
WO2002001328A3 (en )
Inventor
Robert Hasbun
James Vogt
John Brizek
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/00158Access control not involving the use of a pass in combination with an identity-check by means of a personal physical data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00973Hardware and software architectures for pattern recognition, e.g. modular organisation

Abstract

A biometric-based security circuit in which the user database, processor, and biometric map generation functions are all located on the same integrated circuit whose secure contents are inaccessible from external to the integrated circuit. Biometric data, such as a fingerprint, retina scan, or voiceprint, is taken from a user requesting access to restricted resources. The biometric data is transferred into integrated circuit, where it is converted to a biometric map and compared with a database of biometric maps stored in a non-volatile memory in the integrated circuit. The stored maps represents pre-authorized users, and a match triggers the security circuit to send a signal to a host processor authorizing the host processor to permit the requesting user access to the restricted resources. The integrated circuit essentially serves as a write-only memory for the secure data, because the secure data and security functions in the integrated circuit are not directly accessible through any pin or port, and therefore cannot be read or monitored through a dedicated security attack. A second non-volatile memory, accessible from external to the integrated circuit, can also be provided in the integrated circuit for holding non-secure data. This second memory has its own interface port, and is isolated from the security-related functions and memory so that secure and non-secure functions are physically isolated from each other and cannot be modified to overcome that isolation.

Description

BIOMETRIC-BASED AUTHENTICATION IN A NONVOLATILE

MEMORY DEVICE

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention pertains generally to security systems. In particular, it pertains to an improved security device based on biometric characteristics of the user.

2. Description of the Related Art

Improvements in circuit miniaturization, radio technology, and battery power have led to widespread use of portable devices that access the resources of much larger distributed systems. An example is the use of cellular telephones, which allow subscribers to access the resources of national and global telephone systems with a device they can carry on their person. The typical cell phone allows access to these resources to anyone possessing the cell phone. With larger devices, such as desktop computers that are located in secure areas, basing security on possession is not an issue. But with small, portable devices that are easily lost or stolen, this level of security is inadequate.

A conventional way to address this problem is through the use of passwords. However, password-based security is based entirely on protecting the password.

Passwords can be illicitly obtained by unauthorized persons in various ways, such as by observing a person entering the password, electronic monitoring of password entry, or intercepting a new password as it is being delivered to the intended user. Since the user still has the password, the security breach may not be detected until some time after it has been improperly used by the unauthorized person. Another problem is that passwords are sometimes forgotten by the legitimate user, leading to frustration, inconvenience, and taking steps to avoid this problem in ways that may compromise the security of the password.

Another approach is the subscriber interface module (SIM), which combines a password with an artifact such as a machine-readable plastic card containing both secure data and processing capability. Since both the card and the password are necessary for access, this provides an improved level of security over a password-only approach, but it still suffers from many of the same problems.

Problems with these conventional approaches are that passwords can be stolen or forgotten, while artifacts can be lost, stolen, copied, or forged. An improved approach to access control uses biometric data to identify a specific user without the need for passwords or artifacts. Biometric data is data that describes a unique physical characteristic of the user, and which is read directly from the user's person at the time access is requested. Some of the known biometric approaches identify users through fingerprints, retina scans, and voice prints. Each has its own strengths and weaknesses, but all are based on unique physical characteristics of the user that are difficult to duplicate and do not require the user to memorize anything. However, biometric-based security systems also have a weakness. If the biometric data can be obtained, the fingerprint, retina image, voice, etc. can be forged or duplicated and used illicitly to obtain access to the system.

Fig. 1 shows a conventional biometric security system 1. A host system 11 contains a host processor 12, a memory 13, a reader interface 14 to a biometric reader 16, and a general purpose interface 18 to other parts of the system. Memory 13 can include various types of memory, such as random access memory (RAM), read-only memory (ROM), and flash memory. The flash memory is typically used to store valid biometric data on approved users, and can be updated as users are added, removed, or need to have their data modified. This biometric data might be in raw form, such as a digitized image of a fingerprint, but is more likely in a reduced form, representing a coded 'map' of the image that defines the pertinent points of the image in a predefined digital format. At the time access is requested, biometric reader 16 takes the appropriate biometric inputs from the user. For example, reader 16 might be a fingerprint reader, a retina scanner, or a voice print identification device. Biometric reader 16 converts the raw biometric data into a digitized map and sends the map through reader interface 14 to host processor 12, which compares it with the reference map in flash memory. If there is a match, processor 12 will initiate access to the requested resources, typically through general purpose interface 18. This design has at least three major weaknesses. 1) The link between reader 16 and interface 14 can expose the biometric map to monitoring and copying. The illicitly copied map can later be presented to reader interface 14 directly, without the need to duplicate the actual biometric image or data, thereby tricking system 11 into believing it is reading valid data from an authorized user. 2) Host processor 12 typically handles non-secure functions, such as the operational functions of a cell phone. Host processor 12 is therefore subject to hacking and other invasive tampering. It can be falsely directed to provide secure user data through general purpose interface 18, or to store false user data in the flash memory. Either act can permit an unauthorized person to later use the system in the normal manner through reader 16. 3) Flash memory (and therefore secure data) is accessible from outside system 11 through a common bus 15 tying together processor 12, memory 13 and interfaces 14, 18. These weaknesses also expose the system to destructive tampering, whose goal is to disrupt normal operations rather than obtain unauthorized use of those operations.

BRIEF DESCRIPTION OF THE DRAWINGS

Fig. 1 shows a device of the prior art. Fig. 2 shows a device of the invention. Fig. 3 shows a more detailed view of the device of Fig. 2. Fig. 4 shows a system of the invention.

DETAILED DESCRIPTION OF THE INVENTION

The invention provides a self-contained security circuit that maintains secure data in a memory that is inaccessible from outside the security circuit, but which can be used to verify data provided from outside the security circuit. Fig. 2 shows one embodiment of a system 2 of the invention. Host processor 20 can be a non-secure processor, such as the processor in a cell phone that controls overall cell phone operations. Secure circuit 21 is a single integrated circuit that provides a self-contained security environment within system 2, and which cannot be accessed externally without its permission. Any transfer of data into or out of circuit 21 can be controlled by circuit 21. Circuit 21 includes its own embedded processor 22, so called because it is embedded within the perimeters of secure circuit 21. Processor 22 can also control a host interface 28 to host processor 20, and a reader interface 24 to biometric reader 23. Embedded processor 22 can operate with memories 25, 26 and 27 over internal bus 29. Program memory 26 can be programmable read-only memory (PROM) or other non-volatile memory that contains the instructions for operating processor 22. RAM 25 can be used as working space while the processor is in operation, but should not be used to store permanent data, since RAM 25 will lose it contents if device 2's battery become discharged or disconnected. Flash memory 27 can be used for data that will change periodically, but must survive a power loss. Flash memory 27 is where the user-specific data can be stored, such as reference biometric data for each user authorized to use the system. Although RAM 25, program memory 26 and flash memory 27 are shown as three separate types of memory, two or more of them can be consolidated into a single memory type. For example, flash memory can be used in place of RAM 25 and/or program memory 26. Although this disclosure uniformly describes the use of flash memory, other types of writeable non-volatile memory may also be used without departing from the scope of the invention.

Main flash array 29 can provide a separate writeable non-volatile memory that can be used for non-secure data, and is accessible by host processor 20 through flash host interface 30. Although host interface 28 and flash host interface 30 are shown as sharing a common bus, they can also be implemented with completely separate connections. In one embodiment, main flash array 29 can be functionally separate from the security functions in integrated circuit 21. In another embodiment, embedded processor 22 may be able to enable all or part of main flash array 29 when a user is authenticated, and disable all or part of main flash array 29 under other conditions.

Secure circuit 21 is a single integrated circuit that provides a secure boundary surrounding the security functions because the operation of those functions are not accessible from outside circuit 21, and the secure data contained therein cannot be read or written except under specific, limited conditions that it controls. However, for the system to be useful, some type of initial user information must be written into circuit 21. To provide a staring point for entering user information, in one embodiment relevant user data can be initially stored in flash memory 27 under controlled conditions, before device 2 has been placed into operation. For example, this initial setup can establish the biometric map and functionality for a system administrator, who would then be the only one who could subsequently authorize the entry of new user data. Alternately, the first user to input biometric information could automatically be established as the system administrator. Methods of entering initial user information in a security system are well known in the art. Once user data has been entered into the system, when a potential user tries to use the system by inputting his or her biometric data through reader interface 24, secure circuit 21 can simply give a verified/ not verified indication (and possibly an indication of approved privileges) for that user to host 20 through interface 28. The stored reference data for the user is therefore not exposed, and cannot be read from circuit 21 by any device external to it.

This has significant advantages over the prior art system of Fig. 1. In Fig. 1, some form of secret data, such as a fingerprint map, is stored in flash memory, which may be accessible to other devices through interface 18. In addition, host processor 12 is not secure, and can be tampered with. It can be directed to expose the secret data to external devices through interface 18, and can also be directed to store a forged user file in flash memory. If the control circuits of the flash memory are accessible over the shared bus, forged data can be written directly into the flash memory without the knowledge or participation of host processor 12 By comparison, in the system of Fig. 2, secure data is stored in hidden flash memory 27, which does not share a bus with any external interface and therefore cannot be read by any external device. In addition, embedded processor 22 can be devoted entirely to providing the security functions performed by security circuit 21. Embedded processor 22 can therefore be controlled by non-modifiable code, which is not susceptible to hacking or other tampering with the security functions. All non-secure functions can be performed by host processor 20, which has no access to any security functions or secure data in security circuit 21.

Among its other functions, circuit 21 essentially provides a write-only storage device for security information. After the initial data is written into circuit 21 under controlled conditions, circuit 21 does not permit any of the security data to be read out by external devices, and does not permit further entry of security data except under the control of circuit 21. Since all of circuit 21 is contained in a single integrated circuit, there are no accessible pins or interface connections that would expose the secure data or enable it to be read or modified by an external device. This makes device 2 virtually impervious to security attacks. Not only is the secure data protected, but proper checks on input data can prevent destructive data from being entered into circuit 21.

Fig. 3 shows a more detailed view of security circuit 21. Embedded processor 22 interfaces with hidden flash memory 27, program memory 26, RAM 25, random number generator (RNG) 38, multiplier/accumulator 39, algorithm accelerator 37, biometric accelerator 41, monotonic counter 40, and watchdog timer 36 over a common internal bus that is not accessible to external devices. The first three devices are the same as those shown in Fig. 2; the remainder are used to perform security-related functions and are described in more detail below. Also as shown in Fig. 2, processor 22 is coupled to reader interface 24 and host interface 28.

Base clock 31 provides a clock source for circuit 21. One embodiment provides a 70 megahertz (MHz) clock to processor 22. Clock divide circuit 33 can divide the base clock down to a slower rate, to be used as a source clock for watchdog timer 36 and other functions, such as alarm logic 34. Clock detector 32 can determine if base clock 31 is active and within predetermined frequency limits, while undervoltage/overvoltage (UV/OV) detector 35 can monitor the voltage levels in circuit 21. Alarm logic 34 can receive various types of alarm signals from other parts of circuit 21 and provide a consolidated alarm indication to processor 22 and to other circuits.

The functions of circuit 21 are described in more detail below:

Processor

Embedded processor 22 can process commands and perform flash memory management. In one embodiment, processor 22 processes standard SIM commands so that existing legacy software can be used in the system, processor 22 may also perform some of the cryptographic related processing, such as a hashing algorithm or a crypto algorithm. The processor can have enough performance to execute these algorithms in real time without impacting performance. Processor 22 can also incorporate a Memory Management Unit (MMU). The MMU is a highly desirable component in security designs. It can enforce separation of code from data, and can separate the data for one processing context from that of another processing context. This separation can be used to assure that no private data inadvertently becomes mixed with non-private data that is subsequently transmitted out of secure circuit 21. Host Interface

Host interface 28 can provide an interface to host processor 20 of Fig. 2. This interface can be of various types, such as parallel or serial, high or low speed, etc. To preserve compatibility with existing host devices, host interface 28 can duplicate the interface currently used in existing host systems.

In one embodiment, transfers between host processor 20 and embedded processor 22 can be performed one byte (or other unit of data) at a time with appropriate handshaking signals. In another embodiment, a first-in first-out buffer (FIFO) can be used in interface 28 to buffer multiple bytes, thus allowing either or both processors to operate efficiently in a burst mode.

Host interface 28 can also include other signals, such as one or more pins to transfer alarm information from alarm logic 34, and to receive an external clock signal (not shown) into circuit 21. The operation of host interface 28 can be under the control of embedded processor 22, which may be able to enable or disable all or part of host interface 28 to control the flow of data and other signals being transferred to or from host processor 20.

Program Memory Program memory 26 contains the instructions for performing the functions that processor 22 performs. To protect the security of the system, program memory 26 can be made non-modifiable while in the system. It can be permanent memory such as PROM, or semi-permanent such as EPROM or flash memory. Flash Memory

Flash memory 27 is used to store data that may change from time to time, but must survive a power loss. Flash memory is well suited for this purpose in portable devices, since it operates at voltages that are commonly available in portable devices. Flash memory can only be erased in blocks, so sufficient amounts of flash memory are used to assure that when data is changed, the entire block containing the change can be copied into a blank block. The old block is then erased to provide a blank block for the next change.

Although uniformly described as flash memory in this disclosure, other types of non-volatile memory that are programmable in-circuit can also be used and are included within the scope of the invention.

Main flash array 29 can be used for non-secure information, and can be accessible by host processor 20 through flash host interface 30. Although main flash array 29 and its interface 30 are functionally separated from the remainder of circuit 21, placing it on the same integrated circuit as hidden flash 27 can make efficient use of integrated circuit real estate, as well as reduce overall chip count and improve manufacturing efficiencies.

Interface 30 may be the same type of interface as host interface 28, and may even connect to a common bus, as shown in Fig. 2. Interfaces 28 and 30 may also be of different types, and/or may have no common connections in the system.

RAM Memory

Random access memory 25 is used as workspace memory while the system is operating. Since the contents of RAM memory are lost when power is removed from the RAM circuits, the data placed in RAM should not include anything that cannot be lost, or that cannot be recovered upon resumption of power. Random Number Generator

Encryption may be used for communications between secure circuit 21 and other devices. Many types of encryption require the generation of truly random numbers. A hardware generator such as RNG 38 can provide greatly superior performance over software RNG's. Hardware RNG's are known in the art. Some standards require the randomness of the RNG results to be tested in-circuit. This can require approximately 2500 bits of RAM (or alternatively, flash) memory be devoted to the analysis function.

Multiplier/Accumulator

To perform encryption functions, multiplier/accumulator (M/A) 39 can support fast exponentiation and modulo reduction, and can be optimized for those functions. It need not be used for general purpose arithmetic operations, which can be performed in processor 22. Design of the M/A function is closely related to the design of the embedded processor. If processor 22 is a digital signal processor (DSP), then the M/A of the DSP can be used and a separate M/A 39 on the bus may not be necessary.

Algorithm Accelerator

Algorithm accelerator 37 is specific to the cryptographic algorithm being used. This dedicated hardware requires much less processing time to perform the algorithm than will a processor. Algorithm accelerator 37 is separate in function and implementation from M/A 39. The M/A can be used to accelerate multiplication and exponentiation operations that are used in asymmetrical algorithms such as public key encryption. The algorithm accelerator speeds up symmetrical algorithms that are frequently employed to provide message privacy. Both the need for, and the specific design of, M/A 39 and accelerator 37 will depend on the particular cryptographic algorithm(s) to be employed in the circuit. RNG 38, M/A 39, and algorithm accelerator 37 can also be used to authenticate and encrypt data traveling between circuit 21 and biometric reader 23 in either direction.

Biometric Accelerator

Biometric accelerator 41 can be similar in function to algorithm accelerator 37, except its purpose is to accelerate processing of the biometric data. Conversion of raw biometric data into a biometric map may involve intensive, repetitive processing, which can best be performed by a hardware accelerator specifically designed for the particular processing required.

Undervoltage/Overvoltage Detection Undervoltage/Overvoltage (UV/OV) detector 35 can protect the system from a class of cryptographic attacks based on varying the voltage inputs. These attacks drive the supply voltage outside the specified operating range for the device in an attempt to force the subject under attack to mis-operate so that plain text or keys are exposed. UV/OV 35 can detect these out-of-range voltage conditions and alert processor 22, which can take action to stop operating before the secret information can be exposed. This also protects the system against an uncontrolled crash in the event the power supplies degrade or fail. In one embodiment, comparators are used to monitor the input voltage against reference voltages. The reference voltages are set using precision resistors as a voltage divider to bias an op amp. Clock

Base clock 31 can provide a clock source for circuit 21. In one embodiment, base clock 31 is an internal clock operating at 70 MHz. It can be fed directly to processor 22 as a processor clock. It can also be divided down to lower frequencies by clock divide circuit 33 to operate such things as watchdog timer 36 and alarm logic 34. The use of an internal clock rather than an external clock prevents a dedicated attacker from manipulating the circuit by controlling the clock.

Clock Detector

Clock detector 32 can monitor the frequency of the clock signal. If the clock frequency is outside a preset range, an alarm can be generated so that the processor can take appropriate action to shut down or otherwise protect private information. This detector is useful primarily when an external clock source is used.

Watchdog Timer

Watchdog timer 36 can monitor program execution and data transfers. The program can be designed to pre-load the timer with predetermined values, either at periodic intervals or at the start of a particular routine. If the program operates as expected, the timer will always be reloaded or stopped before time expires. If the timer expires, it indicates that an unexpected change has occurred in program execution and an alarm can be generated. Watchdog timer 36 can also be used to monitor events that depend on external operations, such as data transfers between circuit 21 and another device. Because watchdog timers normally measure time in milliseconds rather than microseconds or nanoseconds, base clock 31 can be reduced to a lower frequency clock to provide a more useful time base for the watchdog timer.

Alarm Logic An alarm system is critical to any security design because it protects against failures or malicious attacks by alerting the system to take additional protective measures. Alarm logic 34 provides a consolidation point for the various alarms that can be generated, and sends appropriate signals to processor 22 so that it can take action to prevent loss of private information or other data. As shown in Fig. 3, alarm signals can also be sent to host interface 28, and from there to the host system, and can also be provided directly to external devices.

In addition to the alarms described in the previous paragraphs, alarm logic 34 can also process the following alarms:

1) Bad key alarm - This monitors cryptographic keys and generates an alarm when a bad key is encountered. The specific identification of bad keys is unique for each algorithm.

2) Manual key entry alarm - The monitors the veracity of keys that are manually loaded. Manually loaded keys should have an error detection code, such as a parity code, or should use duplicate entries in order to verify the accuracy of the entered keys. 3) Randomizer alarm - This tests the output of RNG 38 and verifies that the output is statistically random. Various known tests can be used to perform this verification, both at power up and at various points during operation. 4) Software/firmware alarm - On power up, the program can be tested to verify that it has not been corrupted. This can be done by an Error Detection Code (EDC) or by a digital signature applied to the program contents.

5) Self Tests - Various system self tests can be performed on power up, after a reset, or when commanded by the host. Self tests can include an instruction set test, a flash memory test, a RAM test, and known-answer test with M/A 39.

Monotonic Counter

Monotonic counter 40 is shown connected to the internal bus, but can also be implemented with other connections, or can be implemented in software or firmware. A monotonic counter is a counter that can only increment (or only decrement) and never repeats a number, implying that it must never be allowed to reset or cycle back to its starting count. Monotonic counter 40 can be used to provide a unique identification number for every communication to/from circuit 21. This prevents a communication from being recorded and later played back to simulate a legitimate communication. Since the counter value used with the recorded communication would no longer match the current counter value, this type of security attack can be detected as soon as the recorded communication is transmitted to circuit 21. Additional security can be achieved by having the counter increment in a non-linear fashion, so that the current counter value cannot be guessed simply by counting the number of communications that have taken place since the recorded transmission.

Although the security contents of circuit 21 are generally inaccessible and unmodifiable from external to the circuit, in one embodiment the program of embedded CPU 22 can be modified or replaced by downloading a new program into secure circuit 21. The downloaded program can be authenticated by embedded CPU 22 before being accepted and used, to prevent an illicit program from being inserted to compromise the security of the system. The downloading can take place through host interface 28, or can take place through a separate security interface (not shown). In one embodiment, an authorized user may be granted direct access to the contents of hidden flash memory 27, if that user is first authenticated.

System Operation

Flash memory 27 can be used to store the secure biometric map that identifies each authorized user. Whenever a user requests access to the system, his or her biometric data can be read by biometric reader 23 and provided through reader interface 24. This biometric data can be compared to the stored biometric data of all authorized users in the system. If a match is found, a 'user verified' message can be sent to host processor 20 through host interface 28, permitting host processor 20 to initiate the requested operation. In one embodiment, the host is also told which functions or resources this particular user is authorized to use.

Once secure user data is placed in a file in hidden flash memory 27, that user data is inaccessible to any device outside the perimeters of secure circuit 21. Bus 29 that connects to hidden flash memory 27 does not have an external port. Embedded processor 22 is the only device that is coupled to both hidden flash memory 27 and the external world, and the operation of processor 22 can be restricted by placing its operating code in PROM so that the code cannot be modified to redirect processor 22's operations. Alternatively, processor 22 can permit new operating code to be downloaded, provided processor 22 authenticates the new code before accepting it or using it. Most biometric readers do not transmit the raw biometric data for comparison purposes, but rather convert it into data that focuses on the most relevant parameters. For example, the digitized image of a fingerprint may require several thousand bytes of data. But fingerprint technology focuses on the location, orientation and nature of specific features of a fingerprint, which can be reduced down to a few hundred bytes. These few hundred bytes define a fingerprint 'map', and it is this map that is stored and later used as a reference for comparison purposes. When a user requests access to the system, his recently-input fingerprint is also converted to a map, which is then compared with the maps currently stored in hidden flash memory 47 to determine if the user is authorized. In conventional systems, the user's fingerprint map is generated in biometric reader 23. However, public policy concerning privacy issues treats this data as extremely sensitive information, and generation of the map should take place only in a secure environment. Depending on the construction of the system, the link between biometric reader 23 and reader interface 24 may be subject to monitoring, and the fingerprint map should not appear on this link. For that reason, one embodiment of the invention generates biometric maps within circuit 21, using processor 22 and the memories on bus 29 as needed. The resulting map is therefore never exposed to any external interface of secure circuit 21, and cannot be read by any external device.

Other types of biometric data can be treated similarly. Voice data can be converted into relevant frequency, amplitude, and time components, which can then be processed through an algorithm to produce a voice map of the speaker's voice. A retina scan can produce an image of the user's eye, which is then processed to generate a retina map that describes the characteristics of the user's retina. Although each technology has its own identifying characteristics, each can be processed by a system of the invention by following the steps of: 1) registering a user by reading the relevant biometric data, converting that data to a map, and storing the map in non-volatile memory, 2) identifying an authorized user by reading the requestor's relevant biometric data, converting it to a map, and comparing the map with the previously-stored maps, 3) if a match is found, sending a message to a host system designating the requestor as an authorized user, and in some embodiments identifying the scope of that user's access to the system, 4) if a match is not found, sending a message to the host system that the requestor is not an authorized user.

Fig. 4 shows a specific system-level embodiment, in which the aforementioned security system is placed into a cellular telephone 4 having a fingerprint reader 23 integrated into cell phone 4 to identify the user. The reader can be conveniently placed on the cell phone to read the fingerprint of a person holding the phone. The user can initially be registered in the phone by a pre-authorized system administrator, who directs the system to enter the new user's thumbprint data into its database of authorized users. The first person to enter their print into the phone might be automatically designated as a system administrator. Alternately, a separate facility can be provided to create the fingerprint map, which is then downloaded into the system through a designated channel. Regardless of how the database is loaded, a user requesting access can place their thumbprint over fingerprint reader 23, which will digitize the image and send it through user interface 24 to processor 22. Processor 22 can then generate the fingerprint map for that image, and compare it with the one or more maps stored in non-volatile memory 27. Each stored map can also have an associated list of resources that that user is authorized to use. If the comparison is successful (i.e., if the map matches one stored in memory), processor 22 can send a signal to host processor 20 indicating the requestor is an authorized user, and indicating which resources that user is permitted to use. Host processor 20 can then enable the requested services, such as accepting a telephone number from the cell phone keypad 45 and using communications circuits 46 to transmit that number over the cell phone network. In a system designed for voice print identification, the existing microphone in the cell phone can be used for the biometric reader. Some form of random word prompting might be necessary to avoid the problem of a recorded voice being used to improperly gain access to the system.

The invention can be implemented in hardware and/or as a method. The invention can also be implemented as instructions stored on a machine-readable medium, which can be read and executed by at least one processor to perform the functions described herein. A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine- readable medium can include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others.

The foregoing description is intended to be illustrative and not limiting. Variations will occur to those of skill in the art. Those variations are intended to be included in the invention, which is limited only by the spirit and scope of the appended claims.

Claims

We claim:
1. An apparatus, comprising: an integrated circuit including: a first processor; a first interface coupled to the first processor to communicate with a second processor external to the integrated circuit; a first non-volatile memory decoupled from the first interface and coupled to the first processor to store first biometric data identifying at least one authorized user, and having contents that are unreadable external to the integrated circuit; and a second interface coupled to the first processor to input second biometric data from a biometric reader.
2. The apparatus of claim 1, wherein the integrated circuit further includes a second non-volatile memory coupled to a third interface and decoupled from the first processor, first interface, second interface, and first non- volatile memory, and having contents that are accessible external to the apparatus through the third interface
3. The apparatus of claim 1, wherein the first non- volatile memory is a flash memory.
4. The apparatus of claim 1, wherein the second non-volatile memory is a flash memory.
5. The apparatus of claim 1, wherein the biometric reader is a fingerprint reader.
6. The apparatus of claim 1, wherein: the first biometric data includes a first biometric map; and the integrated circuit contains code to cause the first processor to convert the second biometric data to a second biometric map.
7. The apparatus of claim 6, wherein the integrated circuit contains code to cause the first processor to perform a comparison between the second biometric map and the first biometric map.
8. The apparatus of claim 7, wherein: the integrated circuit contains code to cause the first processor to send a verification signal through the first interface if a match is found in the comparison; and the integrated circuit contains code to cause the first processor to send a non- verification signal through the first interface if a match is not found in the comparison.
9. The apparatus of claim 1, wherein the integrated circuit contains code to cause the first processor to authenticate a program downloaded into the integrated circuit.
10. A system, comprising: a host processor; a biometric reader; an integrated circuit coupled to the biometric reader and host processor and including: a first processor; a first interface coupled to the first processor and the host processor; a first non-volatile memory decoupled from the first interface and coupled to the first processor to store first biometric data identifying at least one authorized user, and having contents that are unreadable external to the integrated circuit; and a second interface coupled to the first processor and the biometric reader to input second biometric data.
11. The system of claim 10, wherein the integrated circuit further includes a second non-volatile memory coupled to the host processor through a third interface and decoupled from the first processor, first interface, second interface, and first non-volatile memory, and having contents that are accessible external to the apparatus through the third interface.
12. The system of claim 10, wherein: the first biometric data includes a first biometric map; and the integrated circuit contains code to cause the first processor to convert the second biometric data to a second biometric map.
13. The system of claim 12, wherein the integrated circuit contains code to cause the first processor to perform a comparison between the second biometric map and the first biometric map.
14. The system of claim 13, wherein: the integrated circuit contains code to cause the first processor to send a verification signal through the first interface if a match is found in the comparison; and the integrated circuit contains code to cause the first processor to send a non- verification signal through the first interface if a match is not found in the comparison.
15. The system of claim 10, wherein the integrated circuit contains code to cause the first processor to authenticate a program downloaded into the integrated circuit.
16. A method, comprising: inputting a user's biometric data into an integrated circuit; reading a database of previously stored biometric data from a non- volatile memory in the integrated circuit, wherein contents of the non- volatile memory are non-readable external to the integrated circuit; comparing the user's biometric data with at least a portion of the database, using a processor disposed on the integrated circuit; sending a verification signal to an external device if comparing produces a match; and sending a non-verification signal to the external device if comparing does not produce a match.
17. The method of claim 16, wherein: the stored biometric data includes a stored biometric map; and comparing includes converting the user's biometric data into a user's biometric map and comparing the user's biometric map with the stored biometric map.
18. The method of claim 16, wherein the non-volatile memory is a flash memory.
19. The method of claim 16, wherein sending a verification signal includes sending an indication of resources the user is authorized to access.
20. A machine-readable medium having stored thereon instructions, which when executed by at least one processor cause said at least one processor to perform: inputting a user's biometric data into an integrated circuit; reading a database of previously stored biometric data from a non- volatile memory in the integrated circuit, wherein contents of the non-volatile memory are non-readable external to the integrated circuit; comparing the user's biometric data with at least a portion of the database, using a processor disposed on the integrated circuit; sending a verification signal to an external device if comparing produces a match; and sending a non-verification signal to the external device if comparing does not produce a match.
21. The medium of claim 20, wherein: the stored biometric data includes a stored biometric map; and comparing includes converting the user's biometric data into a user's biometric map and comparing the user's biometric map with the stored biometric map.
22. The medium of claim 20, wherein the non-volatile memory is a flash memory.
PCT/US2001/018692 2000-06-27 2001-06-07 Biometric-based authentication in a nonvolatile memory device WO2002001328A3 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US09/604,682 2000-06-27
US09604682 US6775776B1 (en) 2000-06-27 2000-06-27 Biometric-based authentication in a nonvolatile memory device

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE2001629967 DE60129967T2 (en) 2000-06-27 2001-06-07 In biometrics-based Data Certification in a nonvolatile memory device
DE2001629967 DE60129967D1 (en) 2000-06-27 2001-06-07 In biometrics-based Data Certification in a nonvolatile memory device
EP20010942144 EP1295261B1 (en) 2000-06-27 2001-06-07 Biometric-based authentication in a non-volatile memory device

Publications (2)

Publication Number Publication Date
WO2002001328A2 true true WO2002001328A2 (en) 2002-01-03
WO2002001328A3 true WO2002001328A3 (en) 2002-06-06

Family

ID=24420577

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/018692 WO2002001328A3 (en) 2000-06-27 2001-06-07 Biometric-based authentication in a nonvolatile memory device

Country Status (5)

Country Link
US (2) US6775776B1 (en)
EP (1) EP1295261B1 (en)
CN (1) CN1229705C (en)
DE (2) DE60129967T2 (en)
WO (1) WO2002001328A3 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2828755A1 (en) * 2001-08-14 2003-02-21 Atmel Nantes Sa Device and method of recognizing at least one individual, corresponding device and access control system and Application
GB2387933A (en) * 2002-04-25 2003-10-29 Ritech Internat Ltd Storage device comprising an embedded fingerprint sensor
GB2390705A (en) * 2002-07-11 2004-01-14 Ritech Internat Ltd Portable biodata protected data storage unit
EP1387323A1 (en) * 2002-07-30 2004-02-04 Omega Electronics S.A. Authentication by biometric sensing of the carrier of an identification device and/or portable identification access system and/or electronic access
WO2004055738A1 (en) * 2002-12-18 2004-07-01 Svein Mathiassen Devices for combined access and input
WO2004055737A1 (en) * 2002-12-18 2004-07-01 Svein Mathiassen Apparatus and method forming a bridge between biometrics and conventional means of secure communication
US6775776B1 (en) 2000-06-27 2004-08-10 Intel Corporation Biometric-based authentication in a nonvolatile memory device
EP1447740A1 (en) * 2003-02-11 2004-08-18 IP-First LLC Microprocessor with selectively available random number generator based on self-test result
US6871206B2 (en) 2001-11-20 2005-03-22 Ip-First, Llc Continuous multi-buffering random number generator
WO2005091109A1 (en) * 2004-03-19 2005-09-29 Nokia Corporation Device with a cryptographic coprocessor
US6965254B2 (en) 2002-12-10 2005-11-15 Ip-First, Llc Dynamic logic register
GB2423672A (en) * 2005-02-23 2006-08-30 Hewlett Packard Development Co Authenticating a memory tag
US7136991B2 (en) 2001-11-20 2006-11-14 Henry G Glenn Microprocessor including random number generator supporting operating system-independent multitasking operation
US7139785B2 (en) 2003-02-11 2006-11-21 Ip-First, Llc Apparatus and method for reducing sequential bit correlation in a random number generator
US7149764B2 (en) 2002-11-21 2006-12-12 Ip-First, Llc Random number generator bit string filter
US7165084B2 (en) 2002-11-20 2007-01-16 Ip-First, Llc. Microprocessor with selectivity available random number generator based on self-test result
US7173456B2 (en) 2002-12-10 2007-02-06 Ip-First, Llc Dynamic logic return-to-zero latching mechanism
EP1811460A1 (en) * 2005-12-22 2007-07-25 Pitney Bowes, Inc. Secure software system and method for a printer
US7278025B2 (en) 2002-09-10 2007-10-02 Ivi Smart Technologies, Inc. Secure biometric verification of identity
WO2008041286A1 (en) * 2006-09-29 2008-04-10 Fujitsu Limited Information processor and information management method
KR101069793B1 (en) 2006-09-29 2011-10-04 후지쯔 가부시끼가이샤 Information processor, information management method, and computer readable storage medium storing information management program
JP4833294B2 (en) * 2006-09-20 2011-12-07 富士通株式会社 Information processing apparatus and how to start
CN103837985A (en) * 2012-11-20 2014-06-04 精工爱普生株式会社 Virtual image display apparatus
US8918900B2 (en) 2004-04-26 2014-12-23 Ivi Holdings Ltd. Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport
US20150235057A1 (en) * 2013-03-14 2015-08-20 Michael Simmons Programmable Device Personalization
EP2998781A1 (en) 2005-09-08 2016-03-23 Swisscom AG Communication device, system and method

Families Citing this family (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100695509B1 (en) * 1999-11-08 2007-03-15 삼성전자주식회사 Display system possible of fingerprint recognition and operating method thereof
EP1238355A4 (en) * 1999-11-30 2006-08-16 David Russell Methods, systems, and apparatuses for secure interactions
US7958359B2 (en) * 2001-04-30 2011-06-07 Digimarc Corporation Access control systems
WO2002021760A1 (en) * 2000-09-07 2002-03-14 Ivan Vesely Cascaded stream cipher
US7254619B2 (en) * 2000-10-13 2007-08-07 Matsushita Electric Industrial Co., Ltd. Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network
US7003676B1 (en) * 2001-05-10 2006-02-21 Advanced Micro Devices, Inc. Locking mechanism override and disable for personal computer ROM access protection
US7065654B1 (en) * 2001-05-10 2006-06-20 Advanced Micro Devices, Inc. Secure execution box
US20030023882A1 (en) * 2001-07-26 2003-01-30 Charlie Udom Biometric characteristic security system
US7103180B1 (en) * 2001-10-25 2006-09-05 Hewlett-Packard Development Company, L.P. Method of implementing the data encryption standard with reduced computation
US7162475B2 (en) * 2002-04-17 2007-01-09 Ackerman David M Method for user verification and authentication and multimedia processing for interactive database management and method for viewing the multimedia
CA2491662C (en) * 2002-07-12 2015-11-24 Privaris, Inc. Personal authentication software and systems for travel privilege assignation and verification
EP1529367A4 (en) 2002-08-06 2011-08-03 Privaris Inc Methods for secure enrollment and backup of personal identity credentials into electronic devices
US7043649B2 (en) * 2002-11-20 2006-05-09 Portalplayer, Inc. System clock power management for chips with multiple processing modules
EP1629624B1 (en) 2003-05-30 2013-03-20 Privaris, Inc. An in-curcuit security system and methods for controlling access to and use of sensitive data
US7447911B2 (en) * 2003-11-28 2008-11-04 Lightuning Tech. Inc. Electronic identification key with portable application programs and identified by biometrics authentication
JP2005166049A (en) * 2003-12-02 2005-06-23 ▲きん▼創科技股▲ふん▼有限公司 Memory storage device having fingerprint sensor, and method for protecting data stored therein
US7530113B2 (en) 2004-07-29 2009-05-05 Rockwell Automation Technologies, Inc. Security system and method for an industrial automation system
US7461266B2 (en) * 2005-01-19 2008-12-02 Egis Technology Inc. Storage device and method for protecting data stored therein
US8000502B2 (en) 2005-03-09 2011-08-16 Sandisk Technologies Inc. Portable memory storage device with biometric identification security
EP1861807B1 (en) * 2005-03-24 2012-11-07 Privaris, Inc. Biometric identification device with smartcard capabilities
WO2006105092A3 (en) 2005-03-26 2009-04-09 Privasys Inc Electronic financial transaction cards and methods
US8684267B2 (en) 2005-03-26 2014-04-01 Privasys Method for broadcasting a magnetic stripe data packet from an electronic smart card
EP1882229B1 (en) 2005-04-27 2014-07-23 Privasys, Inc. Electronic cards and methods for making same
WO2006114891A1 (en) * 2005-04-25 2006-11-02 Fujitsu Limited File management method
US20060282395A1 (en) * 2005-05-30 2006-12-14 Joe Leibowitz Methods for using a mobile communications device in consumer, medical and law enforcement transactions
US7519829B2 (en) * 2005-06-17 2009-04-14 Egis Technology Inc. Storage device and method for protecting data stored therein
US20060287696A1 (en) * 2005-06-21 2006-12-21 Wright David W Heat and light therapy treatment device and method
US8639946B2 (en) * 2005-06-24 2014-01-28 Sigmatel, Inc. System and method of using a protected non-volatile memory
US7961914B1 (en) * 2005-07-12 2011-06-14 Smith Robert J D Portable storage apparatus with integral biometric-based access control system
CN100428108C (en) 2005-09-30 2008-10-22 联想(北京)有限公司 Data encryption storage method
US8112632B2 (en) * 2005-11-30 2012-02-07 At&T Intellectual Property I, L.P. Security devices, systems and computer program products
US7698490B2 (en) * 2005-12-21 2010-04-13 Nvidia Corporation Passive USB power configuration switching
US20070208867A1 (en) * 2006-02-17 2007-09-06 Kun-Lang Yu Portable voiceprint-lock remote transmitting system and operation method thereof
US20070234065A1 (en) * 2006-04-04 2007-10-04 Labcal Technologies Inc. Biometric identification device providing format conversion functionality and method for implementing said functionality
US20070234066A1 (en) * 2006-04-04 2007-10-04 Labcal Technologies, Inc. Biometric identification device providing format conversion functionality and method for implementing said functionality
US7962755B2 (en) * 2006-04-28 2011-06-14 Ceelox, Inc. System and method for biometrically secured, transparent encryption and decryption
US7414550B1 (en) 2006-06-30 2008-08-19 Nvidia Corporation Methods and systems for sample rate conversion and sample clock synchronization
US9304675B2 (en) 2006-09-06 2016-04-05 Apple Inc. Portable electronic device for instant messaging
JP4301275B2 (en) * 2006-09-28 2009-07-22 ソニー株式会社 Electronic equipment, and information processing method
US7818395B2 (en) * 2006-10-13 2010-10-19 Ceelox, Inc. Method and apparatus for interfacing with a restricted access computer system
US8356361B2 (en) * 2006-11-07 2013-01-15 Spansion Llc Secure co-processing memory controller integrated into an embedded memory subsystem
US8261091B2 (en) * 2006-12-21 2012-09-04 Spansion Llc Solid-state memory-based generation and handling of security authentication tokens
US8316414B2 (en) * 2006-12-29 2012-11-20 Intel Corporation Reconfiguring a secure system
US8019383B2 (en) * 2007-01-17 2011-09-13 Nokia Corporation Techniques to increase coverage of push-to-talk wireless networks
US8522043B2 (en) * 2007-06-21 2013-08-27 Microsoft Corporation Hardware-based computer theft deterrence
US9209792B1 (en) 2007-08-15 2015-12-08 Nvidia Corporation Clock selection system and method
JP2010541046A (en) 2007-09-24 2010-12-24 アップル インコーポレイテッド An authentication system that was incorporated in an electronic device
US8327173B2 (en) * 2007-12-17 2012-12-04 Nvidia Corporation Integrated circuit device core power down independent of peripheral device operation
US8327272B2 (en) 2008-01-06 2012-12-04 Apple Inc. Portable multifunction device, method, and graphical user interface for viewing and managing electronic calendars
US20090191846A1 (en) 2008-01-25 2009-07-30 Guangming Shi Biometric smart card for mobile devices
US9411390B2 (en) 2008-02-11 2016-08-09 Nvidia Corporation Integrated circuit device having power domains and partitions based on use case power optimization
US9423846B2 (en) 2008-04-10 2016-08-23 Nvidia Corporation Powered ring to maintain IO state independent of the core of an integrated circuit device
US8762759B2 (en) 2008-04-10 2014-06-24 Nvidia Corporation Responding to interrupts while in a reduced power state
US8195973B2 (en) 2008-04-14 2012-06-05 Dell Products, Lp Method to implement a monotonic counter with reduced flash part wear
US20090327741A1 (en) * 2008-06-30 2009-12-31 Zimmer Vincent J System and method to secure boot uefi firmware and uefi-aware operating systems on a mobile internet device (mid)
US20100235646A1 (en) * 2009-03-13 2010-09-16 Egis Technology Inc. Verification method and system thereof
US8317103B1 (en) 2010-06-23 2012-11-27 FiTeq Method for broadcasting a magnetic stripe data packet from an electronic smart card
US8226001B1 (en) 2010-06-23 2012-07-24 Fiteq, Inc. Method for broadcasting a magnetic stripe data packet from an electronic smart card
US9141150B1 (en) 2010-09-15 2015-09-22 Alarm.Com Incorporated Authentication and control interface of a security system
US20120253810A1 (en) * 2011-03-29 2012-10-04 Sutton Timothy S Computer program, method, and system for voice authentication of a user to access a secure resource
US9395799B2 (en) 2012-08-09 2016-07-19 Nvidia Corporation Power management techniques for USB interfaces
US9471395B2 (en) 2012-08-23 2016-10-18 Nvidia Corporation Processor cluster migration techniques
US20140062561A1 (en) 2012-09-05 2014-03-06 Nvidia Corporation Schmitt receiver systems and methods for high-voltage input signals
US8938796B2 (en) 2012-09-20 2015-01-20 Paul Case, SR. Case secure computer architecture
US9323499B2 (en) 2012-11-15 2016-04-26 Elwha Llc Random number generator functions in memory
US9442854B2 (en) 2012-11-15 2016-09-13 Elwha Llc Memory circuitry including computational circuitry for performing supplemental functions
US9026719B2 (en) 2012-11-15 2015-05-05 Elwha, Llc Intelligent monitoring for computation in memory
US8996951B2 (en) 2012-11-15 2015-03-31 Elwha, Llc Error correction with non-volatile memory on an integrated circuit
US9582465B2 (en) * 2012-11-15 2017-02-28 Elwha Llc Flexible processors and flexible memory
US8925098B2 (en) 2012-11-15 2014-12-30 Elwha Llc Data security and access tracking in memory
US8966310B2 (en) 2012-11-15 2015-02-24 Elwha Llc Redundancy for loss-tolerant data in non-volatile memory
CN103218888A (en) * 2013-03-25 2013-07-24 苏州德鲁克供应链管理有限公司 Household security system
US20170039368A1 (en) * 2013-09-27 2017-02-09 Mcafee, Inc. Trusted execution of an executable object on a local device
US9818000B2 (en) 2014-03-23 2017-11-14 Southern Methodist University Protecting hidden content in integrated circuits
US20170091434A1 (en) * 2015-09-25 2017-03-30 Mcafee, Inc. Secure communication between a virtual smartcard enclave and a trusted i/o enclave

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5155680A (en) * 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software
US5448045A (en) * 1992-02-26 1995-09-05 Clark; Paul C. System for protecting computers via intelligent tokens or smart cards
WO1998011750A2 (en) * 1996-09-11 1998-03-19 Yang Li Method of using fingerprints to authenticate wireless communications
WO1999047989A1 (en) * 1998-03-17 1999-09-23 Veridicom, Inc. Integrated biometric authentication for access to computers
US6070796A (en) * 1995-08-21 2000-06-06 Sirbu; Cornel Conditional access method and device
WO2000065770A1 (en) * 1999-04-22 2000-11-02 Veridicom, Inc. High security biometric authentication using a public key/private key encryption pairs

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4593384A (en) * 1984-12-21 1986-06-03 Ncr Corporation Security device for the secure storage of sensitive data
FR2700402B1 (en) * 1993-01-13 1995-04-07 Sgs Thomson Microelectronics multimode electrically programmable memory microcontroller.
US6003135A (en) * 1997-06-04 1999-12-14 Spyrus, Inc. Modular security device
US6041410A (en) * 1997-12-22 2000-03-21 Trw Inc. Personal identification fob
US6141756A (en) * 1998-04-27 2000-10-31 Motorola, Inc. Apparatus and method of reading a program into a processor
US6441482B1 (en) * 2000-04-11 2002-08-27 Omnivision Technologies, Inc. Biometric device with integrated CMOS image sensor
US6775776B1 (en) 2000-06-27 2004-08-10 Intel Corporation Biometric-based authentication in a nonvolatile memory device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5155680A (en) * 1986-10-24 1992-10-13 Signal Security Technologies Billing system for computing software
US5448045A (en) * 1992-02-26 1995-09-05 Clark; Paul C. System for protecting computers via intelligent tokens or smart cards
US6070796A (en) * 1995-08-21 2000-06-06 Sirbu; Cornel Conditional access method and device
WO1998011750A2 (en) * 1996-09-11 1998-03-19 Yang Li Method of using fingerprints to authenticate wireless communications
WO1999047989A1 (en) * 1998-03-17 1999-09-23 Veridicom, Inc. Integrated biometric authentication for access to computers
WO2000065770A1 (en) * 1999-04-22 2000-11-02 Veridicom, Inc. High security biometric authentication using a public key/private key encryption pairs

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6775776B1 (en) 2000-06-27 2004-08-10 Intel Corporation Biometric-based authentication in a nonvolatile memory device
US7255269B2 (en) 2001-08-14 2007-08-14 Atmel Nantes Sa Device and method of recognizing at least one individual, the corresponding access control device and system and applications thereof
FR2828755A1 (en) * 2001-08-14 2003-02-21 Atmel Nantes Sa Device and method of recognizing at least one individual, corresponding device and access control system and Application
WO2003017210A1 (en) * 2001-08-14 2003-02-27 Atmel Nantes Sa Device and method of recognising at least one individual, the corresponding access control device and system and applications thereof
US7849120B2 (en) 2001-11-20 2010-12-07 Ip-First, Llc Microprocessor with random number generator and instruction for storing random data
US8296345B2 (en) 2001-11-20 2012-10-23 Ip-First, Llc Microprocessor with selectively available random number generator based on self-test result
US7334009B2 (en) 2001-11-20 2008-02-19 Ip-First, Llc Microprocessor with random number generator and instruction for storing random data
US7712105B2 (en) 2001-11-20 2010-05-04 Ip-First, Llc. Microprocessor including random number generator supporting operating system-independent multitasking operation
US6871206B2 (en) 2001-11-20 2005-03-22 Ip-First, Llc Continuous multi-buffering random number generator
US7219112B2 (en) 2001-11-20 2007-05-15 Ip-First, Llc Microprocessor with instruction translator for translating an instruction for storing random data bytes
US7136991B2 (en) 2001-11-20 2006-11-14 Henry G Glenn Microprocessor including random number generator supporting operating system-independent multitasking operation
US7818358B2 (en) 2001-11-20 2010-10-19 Ip-First, Llc Microprocessor with random number generator and instruction for storing random data
GB2387933B (en) * 2002-04-25 2005-08-03 Ritech Internat Ltd A biometrics parameters protected computer serial bus interface portable data storage device and method of proprietary biometrics enrollment
GB2387933A (en) * 2002-04-25 2003-10-29 Ritech Internat Ltd Storage device comprising an embedded fingerprint sensor
GB2390705A (en) * 2002-07-11 2004-01-14 Ritech Internat Ltd Portable biodata protected data storage unit
GB2390705B (en) * 2002-07-11 2004-12-29 Ritech Internat Ltd Portable biodata protected data storage unit
EP1387323A1 (en) * 2002-07-30 2004-02-04 Omega Electronics S.A. Authentication by biometric sensing of the carrier of an identification device and/or portable identification access system and/or electronic access
US7278025B2 (en) 2002-09-10 2007-10-02 Ivi Smart Technologies, Inc. Secure biometric verification of identity
US8904187B2 (en) 2002-09-10 2014-12-02 Ivi Holdings Ltd. Secure biometric verification of identity
US7174355B2 (en) 2002-11-20 2007-02-06 Ip-First, Llc. Random number generator with selectable dual random bit string engines
US7165084B2 (en) 2002-11-20 2007-01-16 Ip-First, Llc. Microprocessor with selectivity available random number generator based on self-test result
US7149764B2 (en) 2002-11-21 2006-12-12 Ip-First, Llc Random number generator bit string filter
US6965254B2 (en) 2002-12-10 2005-11-15 Ip-First, Llc Dynamic logic register
US7173456B2 (en) 2002-12-10 2007-02-06 Ip-First, Llc Dynamic logic return-to-zero latching mechanism
WO2004055737A1 (en) * 2002-12-18 2004-07-01 Svein Mathiassen Apparatus and method forming a bridge between biometrics and conventional means of secure communication
WO2004055738A1 (en) * 2002-12-18 2004-07-01 Svein Mathiassen Devices for combined access and input
EP1447740A1 (en) * 2003-02-11 2004-08-18 IP-First LLC Microprocessor with selectively available random number generator based on self-test result
US7139785B2 (en) 2003-02-11 2006-11-21 Ip-First, Llc Apparatus and method for reducing sequential bit correlation in a random number generator
WO2005091109A1 (en) * 2004-03-19 2005-09-29 Nokia Corporation Device with a cryptographic coprocessor
CN100435063C (en) 2004-03-19 2008-11-19 诺基亚有限公司 Device with a cryptographic coprocessor
US8918900B2 (en) 2004-04-26 2014-12-23 Ivi Holdings Ltd. Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport
US8610538B2 (en) 2005-02-23 2013-12-17 Hewlett-Packard Development Company, L.P. Memory-tag data authentication
GB2423672B (en) * 2005-02-23 2009-09-16 Hewlett Packard Development Co Memory tag
GB2423672A (en) * 2005-02-23 2006-08-30 Hewlett Packard Development Co Authenticating a memory tag
EP2998781A1 (en) 2005-09-08 2016-03-23 Swisscom AG Communication device, system and method
EP1811460A1 (en) * 2005-12-22 2007-07-25 Pitney Bowes, Inc. Secure software system and method for a printer
JP4833294B2 (en) * 2006-09-20 2011-12-07 富士通株式会社 Information processing apparatus and how to start
JPWO2008041286A1 (en) * 2006-09-29 2010-01-28 富士通株式会社 Information processing apparatus and information management method
KR101069793B1 (en) 2006-09-29 2011-10-04 후지쯔 가부시끼가이샤 Information processor, information management method, and computer readable storage medium storing information management program
WO2008041286A1 (en) * 2006-09-29 2008-04-10 Fujitsu Limited Information processor and information management method
JP4900392B2 (en) * 2006-09-29 2012-03-21 富士通株式会社 Information processing apparatus and information management method
CN103837985A (en) * 2012-11-20 2014-06-04 精工爱普生株式会社 Virtual image display apparatus
US20150235057A1 (en) * 2013-03-14 2015-08-20 Michael Simmons Programmable Device Personalization
US9754133B2 (en) * 2013-03-14 2017-09-05 Microchip Technology Incorporated Programmable device personalization

Also Published As

Publication number Publication date Type
WO2002001328A3 (en) 2002-06-06 application
CN1443343A (en) 2003-09-17 application
DE60129967T2 (en) 2008-04-30 grant
EP1295261B1 (en) 2007-08-15 grant
EP1295261A2 (en) 2003-03-26 application
DE60129967D1 (en) 2007-09-27 grant
CN1229705C (en) 2005-11-30 grant
US7389425B2 (en) 2008-06-17 grant
US20040236954A1 (en) 2004-11-25 application
US6775776B1 (en) 2004-08-10 grant

Similar Documents

Publication Publication Date Title
US7272723B1 (en) USB-compliant personal key with integral input and output devices
US6108785A (en) Method and apparatus for preventing unauthorized usage of a computer system
US6460138B1 (en) User authentication for portable electronic devices using asymmetrical cryptography
US5272754A (en) Secure computer interface
US6986050B2 (en) Computer security method and apparatus
US6367017B1 (en) Apparatus and method for providing and authentication system
US7797549B2 (en) Secure method and system for biometric verification
US6185316B1 (en) Self-authentication apparatus and method
US6385727B1 (en) Apparatus for providing a secure processing environment
US20020104006A1 (en) Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US5623637A (en) Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US6268788B1 (en) Apparatus and method for providing an authentication system based on biometrics
Schneier Cryptographic design vulnerabilities
US20090164800A1 (en) Secure End-of-Life Handling of Electronic Devices
US5956408A (en) Apparatus and method for secure distribution of data
US6957338B1 (en) Individual authentication system performing authentication in multiple steps
US6181803B1 (en) Apparatus and method for securely processing biometric information to control access to a node
US6438666B2 (en) Method and apparatus for controlling access to confidential data by analyzing property inherent in data
US20030229791A1 (en) Method for private personal identification number management
US20040199769A1 (en) Provision of commands to computing apparatus
US20060133612A1 (en) System and method of preventing alteration of data on a wireless device
US20070028118A1 (en) System and method for encrypted smart card pin entry
US20040066274A1 (en) Tamper detection and secure power failure recovery circuit
US7526654B2 (en) Method and system for detecting a secure state of a computer system
US7500098B2 (en) Secure mode controlled memory

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 018119840

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2001942144

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2001942144

Country of ref document: EP

NENP Non-entry into the national phase in:

Ref country code: JP

WWG Wipo information: grant in national office

Ref document number: 2001942144

Country of ref document: EP