WO2006056683A1 - Procede d'identification d'un utilisateur au moyen de caracteristiques biometriques modifiees et base de donnees pour la mise en oeuvre de ce procede - Google Patents
Procede d'identification d'un utilisateur au moyen de caracteristiques biometriques modifiees et base de donnees pour la mise en oeuvre de ce procede Download PDFInfo
- Publication number
- WO2006056683A1 WO2006056683A1 PCT/FR2005/002894 FR2005002894W WO2006056683A1 WO 2006056683 A1 WO2006056683 A1 WO 2006056683A1 FR 2005002894 W FR2005002894 W FR 2005002894W WO 2006056683 A1 WO2006056683 A1 WO 2006056683A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- biometric characteristic
- database
- modified
- code
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- a method of identifying a user by means of modified biometric characteristics and database for carrying out this method is a method of identifying a user by means of modified biometric characteristics and database for carrying out this method.
- the present invention relates to a method of identifying a user by means of a modified biometric characteristic, and a database for the implementation of this method.
- biometric characteristic is meant here a set of characteristic points, including a fingerprint, an iris or a face, which is specific to each individual and allows to distinguish this individual from other individuals.
- Such a method is used for example to verify the identity of a user or to allow access to a particular place, information or computer service.
- EP-AI 126 419 an authentication method implemented by means of a memory, which makes it possible to prevent a third party who has access to this memory from using the information it contains to distort 1 'authentication.
- the memory contains a modified biometric characteristic obtained by performing a combination of modifications identified by codes on a fingerprint of the user, these modifications being for example geometrical transformations associated with the addition of decoys.
- the combination of these codes forms the authentication code.
- the method comprises the steps of reading the fingerprint on the user and operating on it the possible modifications by comparing after each modification or combination of modifications the modified biometric characteristic thus obtained and the modified biometric characteristic that is stored.
- the coincidence of the modified and stored biometric characteristics makes it possible to deduce the code from the combination of modifications made, which code constitutes the authentication code.
- the simple memory access does not allow the hacker to discover the digital fingerprint of the user, or the code 1 corresponding authentication.
- Such a method is difficult to transpose to the identification of users by means of a database containing the biometric characteristics and the personal data of several users. Indeed, this would involve making the user's fingerprint possible modifications and comparing the result obtained with each modified biometric characteristics modified in the database. This would result in a particularly long and greedy operation in computing resources. Unless particularly important computer resources are available, the process is therefore all the less usable with a database as the number of users referenced in this database is large.
- a method for identifying a user implemented by means of a personal user database, containing for each user at least a first unmodified biometric characteristic, at least a second biometric characteristic modified by at least one a modification and accessible from the first unmodified biometric characteristic, and at least one identification data item accessible from a code identifying the modification made on the second biometric characteristic.
- the method comprises the steps of: 'reading from the user a first biometric characteristic • and compared to the first unmodified biometric characteristics of the database to identify the unmodified first biometric characteristic corresponding to the user, read on user a second biometric characteristic and compare it to the second modified biometric characteristic corresponding to the first unmodified biometric characteristic of the user to determine the modified performed and deduce the code identifying the latter,
- the first biometric feature allows by a quick examination, on the one hand, to determine if the user is referenced in the database and, on the other hand, to find the second modified biometric characteristic that is stored in the database of data and which corresponds to the user.
- the second biometric characteristic read on the user makes it possible to find the modification made on the second modified biometric characteristic and to deduce the code identifying this change. From this code, it is possible to access the personal data of the user. In this way, a third party who accesses the database could not establish a link between the biometric characteristics and the personal data of the users.
- the invention also relates to a personal database of users for the implementation of the method above.
- the database contains for each user at least one first unmodified biometric characteristic, at least one second biometric characteristic modified by at least one modification and accessible from the first unmodified biometric characteristic, and at least one data item. identification accessible from a code identifying the modification made on the second biometric characteristic.
- FIG. 1 is a schematic view of the organization of a database in accordance with FIG.
- FIGS. 2 and 3 show steps for modifying biometric characteristics
- FIG. 4 is a block diagram illustrating the identification method according to the invention.
- the identification method according to the invention is implemented by means of a personal database of users, generally designated 1, containing personal data of n users i.
- the database contains for each user i a first unmodified fingerprint E 1, i, a second modified fingerprint E ' 2 , i and identification data D.
- the first unmodified biometric characteristic E 1 , i groups the characteristic points of a first fingerprint e x , i of the user i such as the fingerprint of his left thumb.
- the second modified biometric characteristic E ' 2 , i is obtained from a second unmodified biometric characteristic E 2 , i (see Figure 2).
- the second unmodified biometric characteristic E 2, i groups the characteristic points of a second fingerprint e 2 , i of the user i, such as the fingerprint of his left index finger.
- the second unmodified biometric characteristic E 2 , i is divided into subsets A, B, C, D, E, F which are subject to modifications. These modifications are here transformations T1, T2, T3 carried out as described in document EP-AI 126 419.
- the transformations are geometric transformations of the type permutation, rotation, homotmatie ...
- Each transformation T1, T2, T3 is identified by a code here respectively 1, 2, 3.
- the subset A is subjected to the transformation T1 to form the subset A '
- the subset B is subjected to the transformation T2 to form the sub-set -etall B '
- the subset C is subjected to the transformation T3 to form the subset C
- the subset D is subjected to the transformation T1 to form the subset D'
- the subset E is subject to transformation T2 to form the subset E '
- the subset F is subjected to the transformation T3 to form the subset F'.
- the second modified biometric characteristic E ' 2 i therefore results from a combination of the transformations T1, T2, T3 and comprises the subsets A', B ', C, D', E 1 , F 1 .
- the combination of the transformations carried out to obtain the second modified biometric characteristic E ' 2 therefore for code 1 2 3 1 2 3.
- the combination of modifications made to obtain the second modified biometric characteristic E ' 2 , 2 could have the code 2 3 1 2 3 1.
- the identification data D comprise, for example, the user's name, his marital status, his address, the authorizations or rights he has ...
- the database 1 is organized in such a way that the second modified biometric characteristic E ' 2 , i is accessible from the first unmodified biometric characteristic E 1 ,! .
- a reference to the field containing the second modified biometric characteristic E ' 2 , i may for example be contained in the field containing the first unmodified biometric characteristic Ei, i.
- the identification data D of each user i can be accessed from the code identifying the combination of modifications made on the second modified biometric characteristic E ' 2 , i corresponding to the user i.
- the code identifying the combination of modifications is here a location information of the corresponding identification data D in the database.
- the identification method starts with step 1 of reading on the user a first fingerprint e ⁇ , i and extract the first biometric characteristic E 1; 1 .
- This reading step is performed in a conventional manner by means of a cavity detector and a recognition device known in themselves.
- the first biometric characteristic E i, i of the user is compared with the first characteristics E i, i to verify that the user 1 is referenced in the database.
- the second modified biometric characteristic E ' 2 , i stored corresponding to the first stored biometric characteristic E x , i is also identified (step 3).
- a second fingerprint e 2 / i is read on the user and the second biometric characteristic E 2 , i is extracted.
- the possible modifications here the geometric transformations T1, T2, T3, are then systematically tested according to the different possible combinations on the second biometric characteristic E 2 ( i and the result of these combinations is compared with the second modified biometric characteristic E ' 2 , i when the result of a combination and the second modified biometric characteristic E ' 2 , i stored coincide, the code 1 2 3 1 2 3 corresponding to the combination made is deduced and used to locate the data of identification D (I 2 3 1 2 3) corresponding to the user 1 which is then identified (step 6).
- the invention is applicable to other biometric characteristics and in particular to any set of characteristic points, in particular of a fingerprint, an iris or a face, which is specific to each individual and which makes it possible to distinguish this individual from other individuals.
- the lure is here the false subset containing imaginary characteristic points.
- the changes can consist only of adding decoys, without making any transformations on the starting subsets. The number of transformations may also be different from that described.
- the identification data D can be stored in the database in encrypted form.
- the code identifying the combination of transformations is then a key that can be used for the decryption of the identification data D: the code used to decrypt the data or to decrypt an encrypted key for decrypting the data.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/791,694 US9286454B2 (en) | 2004-11-29 | 2005-11-02 | Method of identifying a user by means of modified biometric characteristics, and a database for implementing the method |
DE602005006612T DE602005006612D1 (de) | 2004-11-29 | 2005-11-22 | Verfahren zur benutzeridentifizierung mittels veränderter biometrischer eigenschaften und datenbank zur ausführung dieses verfahrens |
CA2589223A CA2589223C (fr) | 2004-11-29 | 2005-11-22 | Procede d'identification d'un utilisateur au moyen de caracteristiques biometriques modifiees et base de donnees pour la mise en oeuvre de ce procede |
JP2007542041A JP4733142B2 (ja) | 2004-11-29 | 2005-11-22 | 変更済バイオメトリック特徴によってユーザを識別する方法およびその方法を実現するためのデータベース |
AU2005308697A AU2005308697B2 (en) | 2004-11-29 | 2005-11-22 | Method for identifying a user by means of modified biometric characteristics and a database for carrying out said method |
EP05818162A EP1817713B1 (fr) | 2004-11-29 | 2005-11-22 | Procede d'identification d'un utilisateur au moyen de caracteristiques biometriques modifiees et base de donnees pour la mise en oeuvre de ce procede |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0412618A FR2878631B1 (fr) | 2004-11-29 | 2004-11-29 | Procede d'identification d'un utilisateur au moyen de caracteristiques biometriques modifiees et base de donnees pour la mise en oeuvre de ce procede |
FR0412618 | 2004-11-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006056683A1 true WO2006056683A1 (fr) | 2006-06-01 |
Family
ID=34952270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2005/002894 WO2006056683A1 (fr) | 2004-11-29 | 2005-11-22 | Procede d'identification d'un utilisateur au moyen de caracteristiques biometriques modifiees et base de donnees pour la mise en oeuvre de ce procede |
Country Status (11)
Country | Link |
---|---|
US (1) | US9286454B2 (fr) |
EP (1) | EP1817713B1 (fr) |
JP (1) | JP4733142B2 (fr) |
CN (1) | CN100507932C (fr) |
AT (1) | ATE394749T1 (fr) |
AU (1) | AU2005308697B2 (fr) |
CA (1) | CA2589223C (fr) |
DE (1) | DE602005006612D1 (fr) |
ES (1) | ES2306262T3 (fr) |
FR (1) | FR2878631B1 (fr) |
WO (1) | WO2006056683A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2934748A1 (fr) * | 2008-07-30 | 2010-02-05 | Bouygues Telecom Sa | Procede et systeme d'authentification d'image |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011140605A1 (fr) * | 2010-05-13 | 2011-11-17 | National Ict Australia Limited | Enregistrement automatique d'identités |
FR2960331B1 (fr) * | 2010-05-18 | 2012-07-20 | Sagem Securite | Procedes d'enrolement et de verification biometrique, systemes et dispositifs associes. |
FR2974924B1 (fr) * | 2011-05-06 | 2013-06-14 | Morpho | Procedes d'enrolement et de verification biometrique, systemes et dispositifs associes. |
CA2932623A1 (fr) * | 2013-12-02 | 2015-06-11 | Identity Authentication Management | Procedes et systemes pour authentification d'identite biometrique veritable a plusieurs cles |
US10826686B1 (en) * | 2017-11-08 | 2020-11-03 | Hrl Laboratories, Llc | Reusable fuzzy vault system |
US11144620B2 (en) * | 2018-06-26 | 2021-10-12 | Counseling and Development, Inc. | Systems and methods for establishing connections in a network following secure verification of interested parties |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4972476A (en) * | 1989-05-11 | 1990-11-20 | Nathans Robert L | Counterfeit proof ID card having a scrambled facial image |
EP1126419A1 (fr) * | 2000-02-15 | 2001-08-22 | Sagem Sa | Procédé de codage d'une image détectée d'une caractéristique biométrique d'une personne, procédé d'authentification sécurisé pour une autorisation d'accès en faisant application, dispositifs de mise en oeuvre correspondants |
US20030156011A1 (en) * | 2000-05-09 | 2003-08-21 | Albert Modl | Method and system for generating a key data record |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4973476B1 (en) * | 1989-12-18 | 1995-07-18 | Dow Corning | Leave-in hair conditioners |
US5790668A (en) * | 1995-12-19 | 1998-08-04 | Mytec Technologies Inc. | Method and apparatus for securely handling data in a database of biometrics and associated data |
US5991408A (en) * | 1997-05-16 | 1999-11-23 | Veridicom, Inc. | Identification and security using biometric measurements |
US6317834B1 (en) * | 1999-01-29 | 2001-11-13 | International Business Machines Corporation | Biometric authentication system with encrypted models |
US7761715B1 (en) * | 1999-12-10 | 2010-07-20 | International Business Machines Corporation | Semiotic system and method with privacy protection |
US6735695B1 (en) * | 1999-12-20 | 2004-05-11 | International Business Machines Corporation | Methods and apparatus for restricting access of a user using random partial biometrics |
JP2002140708A (ja) * | 2000-11-01 | 2002-05-17 | Nec Soft Ltd | 指紋による個人認証システムおよび方法 |
US7921297B2 (en) * | 2001-01-10 | 2011-04-05 | Luis Melisendro Ortiz | Random biometric authentication utilizing unique biometric signatures |
US20020091937A1 (en) * | 2001-01-10 | 2002-07-11 | Ortiz Luis M. | Random biometric authentication methods and systems |
US7269737B2 (en) * | 2001-09-21 | 2007-09-11 | Pay By Touch Checking Resources, Inc. | System and method for biometric authorization for financial transactions |
SE522615C2 (sv) * | 2002-07-09 | 2004-02-24 | Martin Tiberg Med Tiberg Techn | En metod och ett system för biometrisk identifiering eller verifiering. |
GB0309182D0 (en) * | 2003-04-23 | 2003-05-28 | Hewlett Packard Development Co | Security method and apparatus using biometric data |
US7278028B1 (en) * | 2003-11-05 | 2007-10-02 | Evercom Systems, Inc. | Systems and methods for cross-hatching biometrics with other identifying data |
US7690032B1 (en) * | 2009-05-22 | 2010-03-30 | Daon Holdings Limited | Method and system for confirming the identity of a user |
-
2004
- 2004-11-29 FR FR0412618A patent/FR2878631B1/fr not_active Expired - Fee Related
-
2005
- 2005-11-02 US US11/791,694 patent/US9286454B2/en not_active Expired - Fee Related
- 2005-11-22 AU AU2005308697A patent/AU2005308697B2/en not_active Ceased
- 2005-11-22 ES ES05818162T patent/ES2306262T3/es active Active
- 2005-11-22 CA CA2589223A patent/CA2589223C/fr not_active Expired - Fee Related
- 2005-11-22 DE DE602005006612T patent/DE602005006612D1/de active Active
- 2005-11-22 JP JP2007542041A patent/JP4733142B2/ja not_active Expired - Fee Related
- 2005-11-22 CN CNB200580040752XA patent/CN100507932C/zh not_active Expired - Fee Related
- 2005-11-22 EP EP05818162A patent/EP1817713B1/fr not_active Not-in-force
- 2005-11-22 AT AT05818162T patent/ATE394749T1/de not_active IP Right Cessation
- 2005-11-22 WO PCT/FR2005/002894 patent/WO2006056683A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4972476A (en) * | 1989-05-11 | 1990-11-20 | Nathans Robert L | Counterfeit proof ID card having a scrambled facial image |
EP1126419A1 (fr) * | 2000-02-15 | 2001-08-22 | Sagem Sa | Procédé de codage d'une image détectée d'une caractéristique biométrique d'une personne, procédé d'authentification sécurisé pour une autorisation d'accès en faisant application, dispositifs de mise en oeuvre correspondants |
US20030156011A1 (en) * | 2000-05-09 | 2003-08-21 | Albert Modl | Method and system for generating a key data record |
Non-Patent Citations (1)
Title |
---|
BOLLE R M ET AL: "Biometric perils and patches", PATTERN RECOGNITION, ELSEVIER, KIDLINGTON, GB, vol. 35, no. 12, December 2002 (2002-12-01), pages 2727 - 2738, XP004379643, ISSN: 0031-3203 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2934748A1 (fr) * | 2008-07-30 | 2010-02-05 | Bouygues Telecom Sa | Procede et systeme d'authentification d'image |
Also Published As
Publication number | Publication date |
---|---|
ES2306262T3 (es) | 2008-11-01 |
DE602005006612D1 (de) | 2008-06-19 |
FR2878631B1 (fr) | 2007-01-12 |
EP1817713A1 (fr) | 2007-08-15 |
CN100507932C (zh) | 2009-07-01 |
AU2005308697A1 (en) | 2006-06-01 |
JP4733142B2 (ja) | 2011-07-27 |
CA2589223A1 (fr) | 2006-06-01 |
AU2005308697B2 (en) | 2008-11-06 |
FR2878631A1 (fr) | 2006-06-02 |
US9286454B2 (en) | 2016-03-15 |
ATE394749T1 (de) | 2008-05-15 |
EP1817713B1 (fr) | 2008-05-07 |
US20090106559A1 (en) | 2009-04-23 |
CA2589223C (fr) | 2013-09-17 |
CN101065757A (zh) | 2007-10-31 |
JP2008522271A (ja) | 2008-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7797549B2 (en) | Secure method and system for biometric verification | |
EP1817713B1 (fr) | Procede d'identification d'un utilisateur au moyen de caracteristiques biometriques modifiees et base de donnees pour la mise en oeuvre de ce procede | |
EP2494491B1 (fr) | Identification par controle de donnees biometriques d'utilisateur | |
WO2019233951A1 (fr) | Une application logicielle et un serveur informatique pour authentifier l'identité d'un créateur de contenu numérique et l'intégrité du contenu du créateur publié | |
EP0606792B1 (fr) | Procédé d'authentification d'un ensemble informatique par un autre ensemble informatique | |
WO2009083517A1 (fr) | Identification basee sur des donnees biometriques chiffrees. | |
FR3112626A1 (fr) | Procédé et système de collecte de preuves de contrat électronique sur la base du mode de transaction | |
EP2973210B1 (fr) | Procede de traitement securise de donnees et application a la biometrie | |
US7565545B2 (en) | Method, system and program product for auditing electronic transactions based on biometric readings | |
FR3112624A1 (fr) | Procédé et système de collecte de preuves de contrat électronique sur la base du contrat intelligent | |
WO2017207998A1 (fr) | Procédé d'association d'une personne à un objet numérique | |
Vijayarajan et al. | Bio-key based AES for personalized image cryptography | |
FR2925730A1 (fr) | Procede et systeme pour authentifier des individus a partir de donnees biometriques | |
FR3020888A1 (fr) | Chiffrement d'une cle de protection de secrets protegeant au moins un element sensible d'une application | |
EP0855652B1 (fr) | Procédé de préservation de l'intégrité de données logiciel | |
FR2861482A1 (fr) | Procede de securisation d'une donnee biometrique d'authentification et procede d'authentification d'un utilisateur a partir d'une donnee biometrique d'authentification | |
FR2898423A1 (fr) | Procede securise de configuration d'un dispositif de generation de signature electronique. | |
FR2867002A1 (fr) | Procede, support d'authentification, et dispositif perfectionnes pour la securisation d'un acces a un equipement | |
FR3093836A1 (fr) | Identité numérique | |
EP1172775A1 (fr) | Procédé de protection d'un accès à un domaine sécurisé | |
EP2413260A1 (fr) | Téléphone mobile muni d'un système sécurisé d'identification | |
WO2005124503A1 (fr) | Procede d'authentification universelle de documents | |
CA2451617A1 (fr) | Procede et systeme de verification biometrique fiables | |
FR2890509A1 (fr) | Procede d'authentification d'un utilisateur et dispositif de mise en oeuvre | |
FR2982052A1 (fr) | Procede et dispostif pour le stockage en base de donnees et la consultation de donnees confidentielles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005308697 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2589223 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005818162 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007542041 Country of ref document: JP Ref document number: 200580040752.X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2309/CHENP/2007 Country of ref document: IN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2005308697 Country of ref document: AU Date of ref document: 20051122 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005308697 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2005818162 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2005818162 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11791694 Country of ref document: US |