WO2024015034A1 - Scrollable and time sensitive six biometric key password generation and authentication machine - Google Patents

Scrollable and time sensitive six biometric key password generation and authentication machine Download PDF

Info

Publication number
WO2024015034A1
WO2024015034A1 PCT/TR2022/050753 TR2022050753W WO2024015034A1 WO 2024015034 A1 WO2024015034 A1 WO 2024015034A1 TR 2022050753 W TR2022050753 W TR 2022050753W WO 2024015034 A1 WO2024015034 A1 WO 2024015034A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
encryption
biometric
keys
time
Prior art date
Application number
PCT/TR2022/050753
Other languages
French (fr)
Inventor
Mohammadjavad TOURDEH
Original Assignee
Novayen Enerji̇ Yazilim Üreti̇m Dağitim Pazarlama Li̇mi̇ted Şi̇rketi̇
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Novayen Enerji̇ Yazilim Üreti̇m Dağitim Pazarlama Li̇mi̇ted Şi̇rketi̇ filed Critical Novayen Enerji̇ Yazilim Üreti̇m Dağitim Pazarlama Li̇mi̇ted Şi̇rketi̇
Priority to PCT/TR2022/050753 priority Critical patent/WO2024015034A1/en
Publication of WO2024015034A1 publication Critical patent/WO2024015034A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/206Software aspects at ATMs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Definitions

  • This invention relates to an encryption device based on a combination of several encryption components such as six time sensitive biometric keys and a swipe code in all protected systems such as ATMs, door locks and public transport systems (subway, bus, bicycle).
  • This device which can be used to both create and enter passwords, can be used to verify the identity and passwords of individuals.
  • Devices with biometric encryption usually have biometric sensors that scan a finger or all fingers or the inner surface of a hand. For these sensors, usually a single fingerprint is used as a password, depending on the available memory of the sensor, in order to perform an easier processing activity. Another reason is to reduce the production cost of the device. In existing devices that work through the biometric fingerprint sensor, the generated password is the fingerprint stored in memory. This can cause serious problems. Because the fingerprint has a structure that can be copied even with capacitive sensors.
  • e-signature When we evaluate the hardware of the electronic signature, e-signature can be used if it is connected to a device with a USB port and certain applications are installed on that device. In addition, the e-signature device containing an encryption must always be carried with the password holder. Advanced devices such as dongles and electronic signatures can only be used by literate people. It is difficult for illiterate or elderly individuals to use existing encryption methods. A simpler and more convenient method is needed.
  • encryption is carried out by determining a pattern.
  • the predictability of the determined pattern causes third parties to access the system easily and without permission.
  • Each of the password generator devices is designed for a specific feature.
  • ATMs are used to access bank accounts
  • transportation cards are used to get on the bus or subway. Both the fact that transportation cards are different in each city and that each bank has their own card is a burden for people.
  • the invention in the patent document titled "An Encryption System” with application number 2019/19726, is used by sending encrypted messages containing OTP-One Time Password, which is transmitted after the authentication process in the double authentication process used during the access of client devices to digital platforms. It is about a system where security problems are eliminated. However, this technique cannot provide all-round protection since it is related to the encryption of a one-time password.
  • the invention is provided to the user in areas where the device is used by ensuring the authentication of the user with multi-factor layers in electronic and computer systems. It is about authentication and data encryption with an in-ear biological data encrypting with biological data that provides the trust authority necessary to process, manage and change the assets belonging to it. In this invention, biological data is converted into digital data and encryption and authentication are performed.
  • the aim of the present invention is to obtain a more secure password protection with a single multi-stage encryption device, to ensure that multiple applications used every day are protected with a single encryption device, and to create a secure encryption by making life easier and saving time.
  • the invention is designed to be encrypted with the measurement of the keypress time, a swipe code and push keys suitable for each finger.
  • Fingers alone are sufficient to use this invention. With this device any service will be performed with a few simple actions (within two or three seconds). Thus, without the need to carry anything else, only services integrated with hand coordination will be used.
  • the password created with this invention is stored with a unique code for next use. Only the person who owns the password can use the password, which is created by using the invention and includes biometric data, and can easily access the desired services. For example, if this invention is found in a bank branch, you can set and customize your personal password as you wish, and even then, all banking services in other banks connected to the encryption network of this invention can be used completely securely with the same password.
  • biometric codes such as fingerprint sensor, iris sensor and image processing, and even capacitive fingerprint sensors can be modeled and hacked based on temperature.
  • Biometric fingerprints can be cracked with a simple encryption code using industrial adhesives.
  • the fingerprint is only the primary biometric input.
  • the most important feature of the present invention is that, in addition to the biometric data in the generated password, the duration of each keypress and the pressing force are an important factor in the creation of that password.
  • the password created with this invention is created in a multi-step manner such as pressing keys, swiping, detecting biometric fingerprints, using both hands, placing in a preselected position. This means that even if the fingerprint of the password owner is somehow accessed, other factors must be applied to confirm and allow access at the final stage of encryption.
  • This invention can be used even in mobile applications by launching a national protocol and portal in the future. You don't even need to own the device itself for use in the mobile app. For use in the mobile application, it will be sufficient to first create a password on one of the available devices. After that, the determined password can be used in the mobile application. This means that the password created with the invention can also be used in software areas (online shopping, mobile banking, digital identity verification).
  • this invention is connected to the global network, other countries can benefit from municipal services, banking, urban transportation. In this way, the problems that may be encountered while traveling to different countries are minimized and there will be no need to carry any encryption hardware. With this invention, it will be possible to easily benefit from services such as transportation and banking in any country by making a simple registration. [0029] Thanks to the simplicity and usefulness of this invention, people of all ages and even illiterate people will be able to use these electronic systems.
  • Figure- 1 is top view of the invention
  • Figure-2 is side view of the invention
  • Figure-3 is perspective view of invention
  • Figure-4 is facing view of the invention substructure(key operation mechanism)
  • Figure-5 is side view of the invention substructure (key operation mechanism)
  • Figure-6 is overview of the invention substructure (mechanism of operation of switches and micro-switches)
  • Figure-7 is side view of the invention substructure (mechanism of operation of keys, micro-switches and sliders)
  • Figure-8 is top view of the invention substructure (position of the top level micro switches of the device)
  • Figure-9 is schematic of the electronic board of the invention (biometric fingerprint sensors)
  • Figure- 10 is schematic of the electronic board of the invention(switches)
  • Figure- 11 is schematic of the electronic board of the invention(multiplexers)
  • Figure- 12 is schematic of the electronic board of the invention board (PISO Shift
  • Figure- 13 is schematic of the electronic board of the invention(Arduino)
  • Figure- 14 is schematic of the electronic board of the invention(USB - B - Micro)
  • Figure- 15 is schematic of the electronic board of the invention(Unused Pins)
  • Figure- 16 is schematic of the electronic board of the invention (Slider)
  • unique password can be generated using fingers of both hands, key pressure, measurement of the keypress time and a swipe.
  • the invention consists of six biometric fingerprint sensors (1), interface Springs between fingerprint biometric sensor and micro-switch (2), the micro-switches (3), the slider (4).
  • This invention generally includes the following parts:
  • This device can be integrated into all hardware devices that require a password for credit cards, RFID cards, dongles, encrypted keys and e-signatures. Thus, with this invention, security can be provided without the need to carry any card or device.
  • This invention allows the fingers of both hands to be used while generating or using the generated password.
  • ergonomic principles were taken into account to ensure the use of both right and left fingers.
  • this invention can be installed in the smallest possible space (eg ATMs).
  • the biometric sensors (1) used in this invention are capacitive and detect the temperature of living tissue (such as the R301T sensor).
  • Each biometric fingerprint sensor (1) is embedded in a microswitch (3) to take into account the keypress component of each finger. This is part of the code generated by the device. The time that each finger is held on the device is important and this time is used for cryptography. Changing the position of the slider (4) is used to form one of the components of cryptography.
  • Biometric fingerprint modules are connected to the electronic board indicated by Figure 9, from Finger-0 to Finger-5 with cables.
  • the slider (4) is connected to RV 1 ( Figure- 16).
  • microswitches (3) are placed between SW0 and SW5 according to which finger they belong to ( Figure 10).
  • a Shift Register Parallel to the PISO series is used to register the pins for microswitches (3) and their positions. In this case, instead of using six pins, four pins are used with scroll control of the Shift Register. At the same time, more digital inputs can be controlled with these four pins.
  • each module can hold 1700 people in its own memory.
  • a Micro SD module ( Figure 14) was used to increase this number.
  • Micro SD module ( Figure 14) works with SPI serial connection.
  • SPI connection pins can be used on PC ( Figure 13), which includes MISO, MOSI, SCK pins.
  • This invention can transfer storage capacity to servers by connecting to wide internal networks.
  • both the usage capacity of the invention will increase and this device will become available at the national level and will provide savings in production.
  • this invention is designed so that in the future various modules and application equipment can be connected to it. (For example, GSM and NFC modules, graphic monitors, cosmetic, comfort and time saving applications that can be used depending on the markets)
  • a password can be created and used with one or six fingers (even a combination of right and left fingers).
  • a strong, impenetrable password can be created by combining keypress duration, applied pressure and slider (4).
  • This invention can be used on any system and platform that requires a password.
  • the present invention can be used for authentication as it generates a unique password with a combination of several encryption components. Since the password created with this invention is difficult to forge, this invention can be used in all industries, especially in industries that have sensitive data and systems.
  • This invention can be integrated into all hardware devices that require passwords for credit cards, transportation cards, RFID cards, dongles, encrypted keys, e-signatures. With the introduction of the present invention, such cards will no longer be required to be printed. Thus, with this invention, security can be provided without the need to carry any card or device.

Abstract

This invention relates to an encryption device used for password generation and authentication based on a combination of encryption components in the form of six time and pressure sensitive biometric keys and a swipe feature in all systems such as password protected ATM, authentication and transportation systems. In this invention, a versatile unique password can be generated using the fingers of both hands. Thus, thanks to this invention, system security can be ensured without the need to carry any card or device. In this invention, the password entry and password processing time is shorter than the access time to an encrypted security system such as an ATM. Thus, the time-saving invention can be used in many encrypted security systems

Description

Title of Invention: Scrollable and Time Sensitive Six Biometric Key Password Generation and Authentication Machine
Technical Field
[0001] This invention relates to an encryption device based on a combination of several encryption components such as six time sensitive biometric keys and a swipe code in all protected systems such as ATMs, door locks and public transport systems (subway, bus, bicycle). This device, which can be used to both create and enter passwords, can be used to verify the identity and passwords of individuals.
[0002] 1. Background Art
[0003] Different password generation methods are used in each industry. Among them, biometric devices are more important and valuable to create a secure password. Devices using fingerprint sensors are easier to manufacture than other biometric devices. For this reason, it is seen that they are used more widely in the market.
[0004] Devices that use a fingerprint sensor only use a biometric sensor. This means that the password created with these devices is created with only one fingerprint. In this invention, although there is a separate sensor for each finger, pressing the key, holding the key and moving the slide lock connected to the device (slide lock) features have not been seen before in the known art, and for the first time it is a part of an encryption.
[0005] In some ATMs, authentication systems with biometric data in the form of fingerprints or palm scans have begun to be used. However, current fingerprint or palm scanning devices use low-capacity memory. For this reason, many biometric passwords have been difficult to store with devices using fingerprint or palm scanning sensors, and this authentication method is disabled in most ATMs. In this invention, a MICRO SD memory is used that can store a large number of passwords (leaving a few Arduino pins blank). Besides, with this invention, a suitable space has been created for installing and upgrading other devices that can be connected to this invention in the future.
[0006] Today, encrypted security devices such as ATMs are accessed via a keyboard and numeric data. However, numeric passwords are easy to guess. In systems such as ATMs, the process of entering the password and confirming the entered password can cause long queues. In addition, the fact that such devices are in a public area and the passwords can be guessed according to the direction of the keys pressed by the user during the password entry stage may cause unauthorized access by third parties to these accounts, which are also protected by one-step encryption. [0007] With the developing technological methods, stealing passwords has become easier.
In addition to the theft or forgetting of passwords, the problem of loss of hardware devices such as credit cards is also frequently encountered. Apart from this, for example, methods such as two-step password and one-time password are used in the banking sector. These passwords are designed to be secure. However, third parties who have seized the account holder's mobile phone can shop on behalf of the account holder or make money transfers via mobile banking without being noticed. Since the purchase is made over the credit or debit card holder's own mobile phone, it is not possible to obtain a result in case of a complaint. It is an important problem to remember digital passwords and to have devices such as credit cards, dongles and e- signatures with us at all times. For example, in order to benefit from banking services (transfer, payment, shopping, ATM use), we must always have all cards with us. For each bank, you must have a credit or debit card specific to that bank. These cards can be lost, stolen or lose their magnetic properties. Even forgetting card passwords can lead to wasted time and stress. If the card password is learned by third parties, the account protected by that password can be accessed without permission. Therefore, the negativities encountered in terms of payment and electronic services can also make our daily life difficult.
[0008] Other methods used in encryption devices other than numeric passwords are one-step encryption such as RFID password, biometric password, electronic signature, and two- step encryption used in mobile/internet banking. In addition, it is obligatory to carry any card or device (such as e-signature) in order to enter some encrypted systems.
[0009] Devices with biometric encryption usually have biometric sensors that scan a finger or all fingers or the inner surface of a hand. For these sensors, usually a single fingerprint is used as a password, depending on the available memory of the sensor, in order to perform an easier processing activity. Another reason is to reduce the production cost of the device. In existing devices that work through the biometric fingerprint sensor, the generated password is the fingerprint stored in memory. This can cause serious problems. Because the fingerprint has a structure that can be copied even with capacitive sensors.
[0010] When we evaluate the hardware of the electronic signature, e-signature can be used if it is connected to a device with a USB port and certain applications are installed on that device. In addition, the e-signature device containing an encryption must always be carried with the password holder. Advanced devices such as dongles and electronic signatures can only be used by literate people. It is difficult for illiterate or elderly individuals to use existing encryption methods. A simpler and more convenient method is needed.
[0011] On some security devices, encryption is carried out by determining a pattern. The predictability of the determined pattern causes third parties to access the system easily and without permission.
[0012] Another of the technologies available in the market is the contactless (Touch) payment system in debit and credit cards. With this method, the payment process is completed by showing the card to the payment devices without the need to enter the card password. This means that bank or credit card holders may be paying more without realizing it. This is an indication of a serious security issue.
[0013] Each of the password generator devices is designed for a specific feature. For example, ATMs are used to access bank accounts, transportation cards are used to get on the bus or subway. Both the fact that transportation cards are different in each city and that each bank has their own card is a burden for people. We need to set a separate password for each of the cards that we need to carry with us in every area of our lives. For example, instead of having to have all these cards, such as identity cards, bank cards, transportation cards, and employee cards if we work in a workplace with a turnstile, there is a need for an encryption method that will make our daily life easier and that we can perform all our uses with a single device.
[0014] Existing encryption devices and methods can never generate a unique password. For example, in shopping malls and public places, even a person with a positive PCR test with a simple QR or HES code photo will be able to enter the shopping mall. This situation causes serious problems, especially in public health. Any numeric code and password like this can be copied and exploited. With the progress of society and the electronicization of social services, there is a need for an integrated secure device without a card, dongle or password protection devices that we must constantly carry. Only one device is required, which can be used in all applications. With a device that can be used in all banks and institutions, transportation services and all municipal services, people should be able to access all kinds of services in a completely safe way. Thus, an interconnected system can be established for each activity, for example, without the need to manufacture expensive systems and switch to a separate system for the bank or a separate system for transportation.
[0015] By far the most secure encryption and locking devices in the current market are dongles and electronic signatures, but there are also some issues with them. Because these devices are portable, which means that anyone can get them. As a matter of fact, since these devices cannot identify the owner, authentication and easy access to the system will be possible with a numeric password. On the other hand, the production cost of devices such as ID cards, debit and credit cards, transportation service cards, residence ID cards and e-signatures is very high. The production of these cards and hardware causes an increase in air and environmental pollution. In addition, instead of these high costs, it will be more beneficial to produce and use a device in which the cost of the devices is reduced and the country's economy and social services are improved. Another problem is that with devices installed in office buildings, long queues are caused when entering ID card information or other personal information, which leads to loss of time.
[0016] In the prior art, the invention, in the patent document titled "An Encryption System" with application number 2019/19726, is used by sending encrypted messages containing OTP-One Time Password, which is transmitted after the authentication process in the double authentication process used during the access of client devices to digital platforms. It is about a system where security problems are eliminated. However, this technique cannot provide all-round protection since it is related to the encryption of a one-time password.
[0017] Again, in the prior art, in the patent document titled "A Headset Authenticating With In-Ear Biological Data And Data Encryption With This Headset", application number 2016/13735, the invention is provided to the user in areas where the device is used by ensuring the authentication of the user with multi-factor layers in electronic and computer systems. It is about authentication and data encryption with an in-ear biological data encrypting with biological data that provides the trust authority necessary to process, manage and change the assets belonging to it. In this invention, biological data is converted into digital data and encryption and authentication are performed.
[0018] When all existing and encryption and authentication systems in the prior art are examined; it has been understood that there is no mention of an encryption system in which more than one encryption feature coexisting, different combinations of each finger are used, the pressure and time of holding the key are effective, and in addition to these, a slide lock is used. An encryption and authentication device using a combination of these features has been found to be unprecedented in the prior art. These features are part of an encryption for the first time.
[0019] As a result, the existence of the above-mentioned problems and the absence of an existing solution necessitated a development in the relevant technical field.
[0020] 1. Purpose of The Invention
[0021] The aim of the present invention is to obtain a more secure password protection with a single multi-stage encryption device, to ensure that multiple applications used every day are protected with a single encryption device, and to create a secure encryption by making life easier and saving time.
[0022] In addition to the biometric fingerprint sensor, the invention is designed to be encrypted with the measurement of the keypress time, a swipe code and push keys suitable for each finger.
[0023] Fingers alone are sufficient to use this invention. With this device any service will be performed with a few simple actions (within two or three seconds). Thus, without the need to carry anything else, only services integrated with hand coordination will be used.
[0024] The password created with this invention is stored with a unique code for next use. Only the person who owns the password can use the password, which is created by using the invention and includes biometric data, and can easily access the desired services. For example, if this invention is found in a bank branch, you can set and customize your personal password as you wish, and even then, all banking services in other banks connected to the encryption network of this invention can be used completely securely with the same password.
[0025] The primary reason for needing this invention is that biometric codes such as fingerprint sensor, iris sensor and image processing, and even capacitive fingerprint sensors can be modeled and hacked based on temperature. Biometric fingerprints can be cracked with a simple encryption code using industrial adhesives. In this invention, the fingerprint is only the primary biometric input. The most important feature of the present invention is that, in addition to the biometric data in the generated password, the duration of each keypress and the pressing force are an important factor in the creation of that password. The password created with this invention is created in a multi-step manner such as pressing keys, swiping, detecting biometric fingerprints, using both hands, placing in a preselected position. This means that even if the fingerprint of the password owner is somehow accessed, other factors must be applied to confirm and allow access at the final stage of encryption.
[0026] This invention can be used even in mobile applications by launching a national protocol and portal in the future. You don't even need to own the device itself for use in the mobile app. For use in the mobile application, it will be sufficient to first create a password on one of the available devices. After that, the determined password can be used in the mobile application. This means that the password created with the invention can also be used in software areas (online shopping, mobile banking, digital identity verification).
[0027] The printing cost of cards such as ID and bank cards is very high. With the introduction of this invention, such cards will no longer be required to be printed. According to the needs of the organizations where this invention will be used, the output information of this device can be stored with a server for later use.
[0028] If this invention is connected to the global network, other countries can benefit from municipal services, banking, urban transportation. In this way, the problems that may be encountered while traveling to different countries are minimized and there will be no need to carry any encryption hardware. With this invention, it will be possible to easily benefit from services such as transportation and banking in any country by making a simple registration. [0029] Thanks to the simplicity and usefulness of this invention, people of all ages and even illiterate people will be able to use these electronic systems.
[0030] 1. Description of The Drawings Reference Signs List
[0031] Figure- 1 is top view of the invention
[0032] Figure-2 is side view of the invention
[0033] Figure-3 is perspective view of invention
[0034] Figure-4 is facing view of the invention substructure(key operation mechanism)
[0035] Figure-5 is side view of the invention substructure (key operation mechanism)
[0036] Figure-6 is overview of the invention substructure (mechanism of operation of switches and micro-switches)
[0037] Figure-7 is side view of the invention substructure (mechanism of operation of keys, micro-switches and sliders)
[0038] Figure-8 is top view of the invention substructure (position of the top level micro switches of the device)
[0039] Figure-9 is schematic of the electronic board of the invention (biometric fingerprint sensors)
[0040] Figure- 10 is schematic of the electronic board of the invention(switches)
[0041] Figure- 11 is schematic of the electronic board of the invention(multiplexers)
[0042] Figure- 12 is schematic of the electronic board of the invention board (PISO Shift
Register For Switches)
[0043] Figure- 13 is schematic of the electronic board of the invention(Arduino)
[0044] Figure- 14 is schematic of the electronic board of the invention(USB - B - Micro)
[0045] Figure- 15 is schematic of the electronic board of the invention(Unused Pins)
[0046] Figure- 16 is schematic of the electronic board of the invention (Slider)
[0047] 1. Reference Signs List
[0048] Description of reference numbers in figures:
[0049] Biometric fingerprint sensor (1)
[0050] interface Springs between fingerprint biometric sensor and micro-switch (2)
[0051] Micro-switches (3)
[0052] Slider (4)
[0053] 1. Detailed Description
[0054] With this invention, unique password can be generated using fingers of both hands, key pressure, measurement of the keypress time and a swipe.
[0055] The invention consists of six biometric fingerprint sensors (1), interface Springs between fingerprint biometric sensor and micro-switch (2), the micro-switches (3), the slider (4). This invention generally includes the following parts:
[0056] six number of capacitive fingerprint modules R301T(Figure 9)
[0057] • six number of microswitches (Figure 10) • two number of Multiplexer 74LS251 (Figure 11)
• Shift register parallel to serial 74HC165 (Figure 12)
• Arduino Nano 328 (Figure 13)
• Micro USB b (Figure 14)
• 100 microfarad electrolytic capacitor (Figure 14)
• 5V microUSB adapter (Figure 14)
• Unused pins (Figure 15)
• Slider (Variable Resistance) (Figure 16)
• Six number of resistors 10 kOhm
• six number of springs (2).
[0058] This device; It can be integrated into all hardware devices that require a password for credit cards, RFID cards, dongles, encrypted keys and e-signatures. Thus, with this invention, security can be provided without the need to carry any card or device.
[0059] This invention allows the fingers of both hands to be used while generating or using the generated password. In the design of the invention, ergonomic principles were taken into account to ensure the use of both right and left fingers. Thus, this invention can be installed in the smallest possible space (eg ATMs).
[0060] The biometric sensors (1) used in this invention are capacitive and detect the temperature of living tissue (such as the R301T sensor). Each biometric fingerprint sensor (1) is embedded in a microswitch (3) to take into account the keypress component of each finger. This is part of the code generated by the device. The time that each finger is held on the device is important and this time is used for cryptography. Changing the position of the slider (4) is used to form one of the components of cryptography.
[0061] Different electronic cards are placed inside in order to use the invention in software sense. One of these electronic boards is Arduino Nano 328 and the schematic view of this board is shown in Figure 13. All modules and components are connected to this board and perform their functions according to the program on the Arduino.
[0062] Biometric fingerprint modules are connected to the electronic board indicated by Figure 9, from Finger-0 to Finger-5 with cables. The slider (4) is connected to RV 1 (Figure- 16). In addition, microswitches (3) are placed between SW0 and SW5 according to which finger they belong to (Figure 10). A Shift Register paralel to the PISO series is used to register the pins for microswitches (3) and their positions. In this case, instead of using six pins, four pins are used with scroll control of the Shift Register. At the same time, more digital inputs can be controlled with these four pins.
[0063] Since the electronic board prepared for fingerprint sensors (Figure 9) uses serial communication and Arduino (Figure 13) can communicate with only one module at the same time, there are two multiplexers to save on the use of Arduino pins (Figure 11). Multiplexers with only eight inputs use 6 inputs. One of these multiplexers is used for the TX line and the other for the RX line (Figure-11). In this case, instead of using twelve pins (two for each of the six modules), two output pins and three selector pins are used for a total of five pins.
[0064] Normally, each module can hold 1700 people in its own memory. A Micro SD module (Figure 14) was used to increase this number. Micro SD module (Figure 14) works with SPI serial connection. SPI connection pins can be used on Arduino (Figure 13), which includes MISO, MOSI, SCK pins.
[0065] This invention can transfer storage capacity to servers by connecting to wide internal networks. In this case, both the usage capacity of the invention will increase and this device will become available at the national level and will provide savings in production. For example, you can use this invention to use the nationwide transportation service instead of carrying cards and tickets. You can connect your password to your own banks or withdraw money from bank without having a credit card in your pocket. Because the password pattern created with this invention can also be stored in the memory of banks. Moreover, this invention is designed so that in the future various modules and application equipment can be connected to it. (For example, GSM and NFC modules, graphic monitors, cosmetic, comfort and time saving applications that can be used depending on the markets)
[0066] How this invention works?
[0067] Normally the device is in standby mode. According to the design of the present invention, a password can be created and used with one or six fingers (even a combination of right and left fingers). A strong, impenetrable password can be created by combining keypress duration, applied pressure and slider (4).
[0068] With the pressure applied to the key or the time of pressing the key, separate encryption can be made for each finger. For example, suppose three fingers are placed on the device for encryption. The third party will not be able to know the time factor (press duration) and the position of the slider, which finger the password owner chose as the password and which finger the press factor used (None of these factors may be selected). It is not mandatory to set the time by holding down the key or to create a password by pressing both the key and the slider (4). These combinations can be created according to the user's desire.
[0069] Software and platforms (such as ATMs); Even if the keypress duration, key pressure and the slider (4) factors are all selected, it will receive an encryption model from this device in which all factors are controlled as soon as possible. In addition, even the fact that no selection is made from any of the mentioned features is part of the encryption. Therefore, the password will never be guessed.
[0070] 1. Industrial Applicability
[0071] This invention can be used on any system and platform that requires a password. The present invention can be used for authentication as it generates a unique password with a combination of several encryption components. Since the password created with this invention is difficult to forge, this invention can be used in all industries, especially in industries that have sensitive data and systems.
[0072] This invention can be integrated into all hardware devices that require passwords for credit cards, transportation cards, RFID cards, dongles, encrypted keys, e-signatures. With the introduction of the present invention, such cards will no longer be required to be printed. Thus, with this invention, security can be provided without the need to carry any card or device.
[0073] There is no limit to the number of users of this invention. There is no limitation in the method of use of this invention, and a design has been made in such a way that various software can be integrated into the invention in the future. Thus, this invention will continue to provide a secure encryption system for any service that may be used in the future.

Claims

Claims
[Claim 1] This invention is an encryption device based on a combination of several encryption components such as 6 time sensitive biometric keys and a single swipe code; encryption device is comprising;
• A cubic body
• Six fingerprint sensors (1),
• A total of six keys, on the upper surface and on the sides,
• To measure the holding time of the key,
• Slider (4)
[Claim 2] The encryption device according to claim 1 ; its feature is that it contains four keys on the upper surface and a total of 6 keys, one on the right and one on the left as a continuation of these keys.
[Claim 3] The encryption device according to claim 2, wherein each key and each biometric fingerprint sensor (1) are characterized in connection.
[Claim 4] The encryption device according to claim 1 ; its feature is that each of the biometric fingerprint sensors (1) can be a part of the password created with the device.
[Claim 5] The encryption device according to claim 1; its feature is that pressing any of the keys can be a part of the password created with the device.
[Claim 6] The encryption device according to claim 1 ; its feature is that when any of the keys are pressed, the duration of holding the key can be a part of the generated password.
[Claim 7] The encryption device according to claim 1; its feature is that the position of the slider (4) can be part of the generated password.
PCT/TR2022/050753 2022-07-14 2022-07-14 Scrollable and time sensitive six biometric key password generation and authentication machine WO2024015034A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/TR2022/050753 WO2024015034A1 (en) 2022-07-14 2022-07-14 Scrollable and time sensitive six biometric key password generation and authentication machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/TR2022/050753 WO2024015034A1 (en) 2022-07-14 2022-07-14 Scrollable and time sensitive six biometric key password generation and authentication machine

Publications (1)

Publication Number Publication Date
WO2024015034A1 true WO2024015034A1 (en) 2024-01-18

Family

ID=89537223

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/TR2022/050753 WO2024015034A1 (en) 2022-07-14 2022-07-14 Scrollable and time sensitive six biometric key password generation and authentication machine

Country Status (1)

Country Link
WO (1) WO2024015034A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140273961A1 (en) * 2013-03-15 2014-09-18 Tyfone, Inc. Personal digital identity device with fingerprint sensor
IN2014MU03895A (en) * 2014-12-04 2015-10-16 Ishan Bhardwaj
CN107015741A (en) * 2017-03-30 2017-08-04 联想(北京)有限公司 User equipment and its operating method with finger print identifying function
US20180276439A1 (en) * 2017-03-24 2018-09-27 Qualcomm Incorporated Biometric sensor with finger-force navigation
CN109117616A (en) * 2018-08-02 2019-01-01 Oppo广东移动通信有限公司 Verification method and device, electronic equipment, computer readable storage medium
US20200257874A1 (en) * 2017-08-09 2020-08-13 The Board Of Trustees Of The Leland Stanford Junior University Interactive biometric touch scanner

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140273961A1 (en) * 2013-03-15 2014-09-18 Tyfone, Inc. Personal digital identity device with fingerprint sensor
IN2014MU03895A (en) * 2014-12-04 2015-10-16 Ishan Bhardwaj
US20180276439A1 (en) * 2017-03-24 2018-09-27 Qualcomm Incorporated Biometric sensor with finger-force navigation
CN107015741A (en) * 2017-03-30 2017-08-04 联想(北京)有限公司 User equipment and its operating method with finger print identifying function
US20200257874A1 (en) * 2017-08-09 2020-08-13 The Board Of Trustees Of The Leland Stanford Junior University Interactive biometric touch scanner
CN109117616A (en) * 2018-08-02 2019-01-01 Oppo广东移动通信有限公司 Verification method and device, electronic equipment, computer readable storage medium

Similar Documents

Publication Publication Date Title
CA2935807C (en) Systems and methods for multi-factor remote user authentication
US20080028230A1 (en) Biometric authentication proximity card
US9286461B2 (en) Multiface document
EP2648163B1 (en) A personalized biometric identification and non-repudiation system
JP4607455B2 (en) System and portable terminal
US20130244615A1 (en) Mobile device authentication
EP1004980A2 (en) Smart card PIN system, card, and reader
WO2001042938A1 (en) Personal authentication system and portable electronic device having personal authentication function using body information
CN102752113A (en) Authentication device and authentication method for portable information terminal
WO2001022351A1 (en) Identity authentication system and method
CN100578558C (en) Transaction processing system
US8474026B2 (en) Realization of access control conditions as boolean expressions in credential authentications
US10367798B2 (en) Communications device, system and method
EP1480107A2 (en) Method for authentication of a user with an authorizing device, and a security apparatus for carrying out the method
JP2006268570A (en) Security card and security card system
WO2024015034A1 (en) Scrollable and time sensitive six biometric key password generation and authentication machine
JP2005115786A (en) System and method for personal identification, and identification tag
CN201097315Y (en) Computer fingerprint keyboard
WO2008032374A1 (en) Portable telephone and unlock method for portable telephone
CN205230051U (en) Password input device is bound to biology
KR20130117371A (en) Method to unlock screen and perform secret task by finger tapping for touch screen devices
WO2002069281A2 (en) Chip reader and identification method for verifying the user authorisation of a chip user
JP2002099515A (en) Fingerprint authentication system and fingerprint authentication device
CN101770668B (en) Mobile phone capable of transacting with electronic transaction device
AU2021106789A4 (en) A money transfer methodology using coloured input plate and body heat fluctuation.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22951306

Country of ref document: EP

Kind code of ref document: A1