CA2467911A1 - Portable device and method for accessing data key actuated devices - Google Patents
Portable device and method for accessing data key actuated devices Download PDFInfo
- Publication number
- CA2467911A1 CA2467911A1 CA002467911A CA2467911A CA2467911A1 CA 2467911 A1 CA2467911 A1 CA 2467911A1 CA 002467911 A CA002467911 A CA 002467911A CA 2467911 A CA2467911 A CA 2467911A CA 2467911 A1 CA2467911 A1 CA 2467911A1
- Authority
- CA
- Canada
- Prior art keywords
- key
- biometric
- access
- actuated device
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/105—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Abstract
Data key actuated devices such as high security doors are modified so that they periodically transmit an identity pattern. An authorized user is provided with a portable access device storing keys for a number of such key actuated devices, with each key associated with an identity pattern for that device.
The portable access device has a stored template comprising a fingerprint of the authorized user combined with a verification code. When the authorized user applies their fingerprint to the portable access device, the verification code is returned which allows verification of the user. If the access device then receives a key actuated device identifier matching one in storage, the associated access key is retrieved and transmitted to the key actuated device to allow access to the user.
The portable access device has a stored template comprising a fingerprint of the authorized user combined with a verification code. When the authorized user applies their fingerprint to the portable access device, the verification code is returned which allows verification of the user. If the access device then receives a key actuated device identifier matching one in storage, the associated access key is retrieved and transmitted to the key actuated device to allow access to the user.
Claims (26)
1. A method for accessing data key actuated devices, comprising:
receiving a key actuated device identifier from a key actuated device;
receiving a biometrics determining whether said received biometric is an authorized biometrics comparing said received key actuated device identifier with stored key actuated device identifiers and, on finding a matching stored key actuated device identifier and where said received biometric is an authorized biometric, retrieving a stored access key associated with said matching stored key actuated device identifier; and transmitting said retrieved access key.
receiving a key actuated device identifier from a key actuated device;
receiving a biometrics determining whether said received biometric is an authorized biometrics comparing said received key actuated device identifier with stored key actuated device identifiers and, on finding a matching stored key actuated device identifier and where said received biometric is an authorized biometric, retrieving a stored access key associated with said matching stored key actuated device identifier; and transmitting said retrieved access key.
2. The method of claim 1 further comprising:
receiving a temporary key; and encrypting said retrieved access key with said temporary key prior to transmission of said retrieved access key.
receiving a temporary key; and encrypting said retrieved access key with said temporary key prior to transmission of said retrieved access key.
3. The method of claim 2 further comprising:
responsive to determining said received biometric is an authorized biometric, initially transmitting a valid user indication.
responsive to determining said received biometric is an authorized biometric, initially transmitting a valid user indication.
4. The method of claim 3 wherein said temporary key is received subsequent to transmitting said valid user indication.
5. The method of claim 3 or claim 4 wherein said initially transmitting a valid user indication is dependent upon finding a stored key actuated device identifier matching said received key actuated device identifier.
6. The method of any of claims 2 to 5 wherein each said stored access key is encrypted and including performing a decryption operation on a retrieved access key prior to encrypting said retrieved access key with said temporary key.
7. The method of claim 6 wherein each said stored access key is encrypted with a special key and wherein said performing a decryption operation comprises retrieving a template and attempting to recover said special key from said template utilizing said received biometric.
8. The method of any of claims 1 to 6 further comprising retrieving a template and attempting to recover a special key from said template utilizing said biometric, said special key for use in performing a cryptographic operation.
9. The method claim 8 wherein said cryptographic operation involves at least one said access key.
10. The method of any of claims 3 to 5 wherein said initially transmitting a valid user indication is dependent upon finding a stored key actuated device identifier matching said received key actuated device identifier.
11. The method of any of claims 1 to 10 wherein said determining whether said received biometric is an authorized biometric comprises utilizing a template comprising said authorized biometric and a verification code such that presence of said biometric allows recovery of said verification code.
12. A portable electronic access device comprising:
a biometric input;
a verifier responsive to said biometric input for verifying that a biometric which is input to said biometric input matches an authorized biometric and providing a verification indication;
a memory storing a plurality of access keys, each for use in accessing a key actuated device and a plurality of key actuated device identifiers, each associated with one of said plurality of access keys;
a receiver for receiving a key actuated device identifier;
a comparator for, responsive to a verification indication from said verifier, comparing a key actuated device identifier received from a key actuated device with said stored key actuated device identifiers and, on finding a matching stored key actuated device identifier, retrieving a stored access key associated with said matching stored key actuated device identifier; and a transmitter for transmitting a retrieved access key.
a biometric input;
a verifier responsive to said biometric input for verifying that a biometric which is input to said biometric input matches an authorized biometric and providing a verification indication;
a memory storing a plurality of access keys, each for use in accessing a key actuated device and a plurality of key actuated device identifiers, each associated with one of said plurality of access keys;
a receiver for receiving a key actuated device identifier;
a comparator for, responsive to a verification indication from said verifier, comparing a key actuated device identifier received from a key actuated device with said stored key actuated device identifiers and, on finding a matching stored key actuated device identifier, retrieving a stored access key associated with said matching stored key actuated device identifier; and a transmitter for transmitting a retrieved access key.
13. The device of claim 12 wherein said stored access keys are encrypted and including a decrypter for decrypting a retrieved access key prior to said access key being transmitted by said transmitter.
14. The device of claim 12 wherein said memory is also for storing a special key template, said access keys are encrypted with a special key and said decrypter is responsive to said biometric input to perform a special key recovery operation on said special key template utilizing said input biometric and a subsequent decrypting operation on said retrieved access key utilizing a recovered special access key.
15. The device of claim 12 or claim 13 wherein said memory is also for storing a special key template comprising said authorized biometric and a special key, said special key for use in performing a cryptographic operation.
16. The device of any of claims 12 to 15 wherein said verifier is for accessing a stored template comprising said authorized biometric and a verification code, for attempting to recover said verification code from an input biometric and for using said verification code to obtain said verification indication.
17. The device of any claims 12 to 16 wherein said receiver is also for receiving a temporary key and including an encrypter for encrypting said retrieved access key with said temporary key prior to transmission of said retrieved access key by said transmitter.
18. The device of any of claims 12 to 17 wherein said transmitter is also for initially transmitting a valid user indication in response to said verifier providing said verification indication.
19. The device of claim 17 wherein said transmitter is also for initially transmitting a valid user indication in response to said verifier providing said verification indication and wherein said temporary key is received after said transmitter has transmitted said valid user indication.
20. The device of any of claims 12 to 19 wherein said receiver comprises one of a radio receiver and an infrared receiver and said transmitter comprises one of a radio transmitter and an infrared transmitter.
21. A secure access system, comprising:
a data key actuated device for periodically transmitting a key actuated device identifier;
a portable access device comprising:
a biometric input;
a verifier responsive to said biometric input for verifying that a biometric which is input to said biometric input matches an authorized biometric and providing a verification indication;
a memory storing a plurality of access keys, each for use in accessing a key actuated device and a plurality of key actuated device identifiers, each associated with one of said plurality of access keys;
a receiver for receiving said key actuated device identifier;
a comparator for, responsive to a verification indication from said verifier, comparing a key actuated device identifier received from said key actuated device with said stored key actuated device identifiers and, on a match, retrieving an access key associated with said matching stored key actuated device identifier; and a transmitter for transmitting a retrieved access key to said key actuated device.
a data key actuated device for periodically transmitting a key actuated device identifier;
a portable access device comprising:
a biometric input;
a verifier responsive to said biometric input for verifying that a biometric which is input to said biometric input matches an authorized biometric and providing a verification indication;
a memory storing a plurality of access keys, each for use in accessing a key actuated device and a plurality of key actuated device identifiers, each associated with one of said plurality of access keys;
a receiver for receiving said key actuated device identifier;
a comparator for, responsive to a verification indication from said verifier, comparing a key actuated device identifier received from said key actuated device with said stored key actuated device identifiers and, on a match, retrieving an access key associated with said matching stored key actuated device identifier; and a transmitter for transmitting a retrieved access key to said key actuated device.
22. The system of claim 21 wherein said receiver is for receiving a temporary key and wherein said access device includes an encrypter for encrypting said retrieved access key with said temporary key prior to transmission of said retrieved access key by said transmitter.
23. The system of claim 21 or 22 wherein said transmitter is also for initially transmitting a valid user indication in response to said verifier providing said verification indication to said access device and wherein said key actuated device is also for, responsive to receiving said valid user indication, transmitting said temporary key.
24. The system of any of claims 21 to 23 wherein said memory is also for storing a template and wherein said verifier is also for attempting to recover a special key from said template utilizing said biometric, said special key for use in performing a cryptographic operation.
25. The system of any of claims 21 to 24 wherein wherein said transmitter is a radio transmitter and said receiver is a radio receiver.
26. The system of any of claims 21 to 25 wherein said verifier is for accessing a stored template comprising said authorized biometric and a verification code, for attempting to recover said verification code from an input biometric and for using said verification code to obtain said verification indication.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/078,396 US6353889B1 (en) | 1998-05-13 | 1998-05-13 | Portable device and method for accessing data key actuated devices |
PCT/CA2001/001736 WO2003049042A1 (en) | 1998-05-13 | 2001-12-06 | Portable device and method for accessing data key actuated devices |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2467911A1 true CA2467911A1 (en) | 2003-06-12 |
CA2467911C CA2467911C (en) | 2010-02-23 |
Family
ID=22143783
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2467911A Expired - Fee Related CA2467911C (en) | 1998-05-13 | 2001-12-06 | Portable device and method for accessing data key actuated devices |
Country Status (11)
Country | Link |
---|---|
US (2) | US6353889B1 (en) |
EP (1) | EP1454303B9 (en) |
JP (1) | JP2005512204A (en) |
CN (1) | CN1561506A (en) |
AT (1) | ATE551680T1 (en) |
CA (1) | CA2467911C (en) |
ES (1) | ES2385215T3 (en) |
IL (1) | IL161943A0 (en) |
MX (1) | MXPA04005460A (en) |
NZ (1) | NZ533232A (en) |
WO (1) | WO2003049042A1 (en) |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6353889B1 (en) * | 1998-05-13 | 2002-03-05 | Mytec Technologies Inc. | Portable device and method for accessing data key actuated devices |
EP2525316A3 (en) * | 1999-11-30 | 2013-08-14 | David Russell | Methods, systems and apparatuses for secure interactions |
US6496691B1 (en) | 1999-12-23 | 2002-12-17 | Bellsouth Intellectual Property Corporation | Enhanced call return in a wireless telephone network |
US6695207B1 (en) * | 2000-02-04 | 2004-02-24 | Carroll Boyd Norris, Jr. | System for secure, identity authenticated, and immediate financial transactions as well as activation of varied instrumentalities |
US7284266B1 (en) * | 2000-03-21 | 2007-10-16 | Broadcom Corporation | System and method for secure biometric identification |
US7310734B2 (en) * | 2001-02-01 | 2007-12-18 | 3M Innovative Properties Company | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US20030131114A1 (en) * | 2001-10-12 | 2003-07-10 | Scheidt Edward M. | Portable electronic authenticator cryptographic module |
JP3967914B2 (en) * | 2001-12-14 | 2007-08-29 | 富士通株式会社 | Biometrics authentication system and method |
US20070220272A1 (en) * | 2002-06-25 | 2007-09-20 | Campisi Steven E | Transaction authentication card |
US7543156B2 (en) * | 2002-06-25 | 2009-06-02 | Resilent, Llc | Transaction authentication card |
US20070234052A1 (en) * | 2002-06-25 | 2007-10-04 | Campisi Steven E | Electromechanical lock system |
JP4519645B2 (en) * | 2002-07-12 | 2010-08-04 | プリヴァリス・インコーポレーテッド | Personal authentication software and system for travel privilege assignment and verification |
CA2820986C (en) | 2002-08-06 | 2016-09-06 | Privaris, Inc. | Methods for secure enrollment and backup of personal identity credentials into electronic devices |
US20040039909A1 (en) * | 2002-08-22 | 2004-02-26 | David Cheng | Flexible authentication with multiple levels and factors |
US7529372B2 (en) * | 2002-09-25 | 2009-05-05 | Intellon Corporation | Method for setting an encryption key for logical network separation |
US20040117636A1 (en) * | 2002-09-25 | 2004-06-17 | David Cheng | System, method and apparatus for secure two-tier backup and retrieval of authentication information |
US7587611B2 (en) | 2003-05-30 | 2009-09-08 | Privaris, Inc. | In-circuit security system and methods for controlling access to and use of sensitive data |
US6992562B2 (en) * | 2003-06-10 | 2006-01-31 | Visteon Global Technologies, Inc. | Biometric keyless entry system |
AU2003904317A0 (en) | 2003-08-13 | 2003-08-28 | Securicom (Nsw) Pty Ltd | Remote entry system |
US20050044388A1 (en) * | 2003-08-19 | 2005-02-24 | Brant Gary E. | Reprise encryption system for digital data |
WO2005098650A1 (en) * | 2004-04-07 | 2005-10-20 | Phillip Ryan | Player controls |
US20070243932A1 (en) * | 2004-05-13 | 2007-10-18 | Rothschild Wayne H | Wagering Game System Secure Identification Module |
US8232862B2 (en) * | 2004-05-17 | 2012-07-31 | Assa Abloy Ab | Biometrically authenticated portable access device |
US8545030B2 (en) | 2004-07-12 | 2013-10-01 | Gentex Corporation | Rearview mirror assemblies with anisotropic polymer laminates |
GB2417116A (en) * | 2004-08-10 | 2006-02-15 | Gw Pharmaceuticals Plc | Secure dispensing system |
US7849329B2 (en) * | 2004-09-01 | 2010-12-07 | Microsoft Corporation | Licensing the use of a particular feature of software |
CN1272519C (en) * | 2004-09-22 | 2006-08-30 | 王锐勋 | Instant clearing electronic lock system after key cipher use and realizing method |
US7481364B2 (en) | 2005-03-24 | 2009-01-27 | Privaris, Inc. | Biometric identification device with smartcard capabilities |
US20060282680A1 (en) * | 2005-06-14 | 2006-12-14 | Kuhlman Douglas A | Method and apparatus for accessing digital data using biometric information |
US20070033414A1 (en) * | 2005-08-02 | 2007-02-08 | Sony Ericsson Mobile Communications Ab | Methods, systems, and computer program products for sharing digital rights management-protected multimedia content using biometric data |
AU2006278422B2 (en) * | 2005-08-03 | 2011-10-06 | Intercomputer Corporation | System and method for user identification and authentication |
TWI330032B (en) * | 2006-11-24 | 2010-09-01 | Mstar Semiconductor Inc | Method for authorized-user verification and related apparatus |
US8868922B2 (en) * | 2006-12-27 | 2014-10-21 | Texas Instruments Incorporated | Wireless authorization mechanism for mobile devices and data thereon |
US20080162943A1 (en) * | 2006-12-28 | 2008-07-03 | Ali Valiuddin Y | Biometric security system and method |
ATE447304T1 (en) * | 2007-02-27 | 2009-11-15 | Lucent Technologies Inc | WIRELESS COMMUNICATION METHOD FOR CONTROLLING ACCESS GRANTED BY A SECURITY DEVICE |
US8011593B2 (en) * | 2007-03-15 | 2011-09-06 | Joseph Frank Preta | Smart apparatus for making secure transactions |
US8820638B1 (en) * | 2007-07-27 | 2014-09-02 | United Services Automobile Association (Usaa) | System and methods related to an available balance debit/credit card |
US20090037742A1 (en) * | 2007-07-31 | 2009-02-05 | International Business Machines Corporation | Biometric authentication device, system and method of biometric authentication |
US8181031B2 (en) * | 2007-08-01 | 2012-05-15 | International Business Machines Corporation | Biometric authentication device and system |
CN104200145B (en) | 2007-09-24 | 2020-10-27 | 苹果公司 | Embedded verification system in electronic device |
WO2009100230A1 (en) * | 2008-02-07 | 2009-08-13 | Inflexis Corporation | Mobile electronic security apparatus and method |
US8225106B2 (en) * | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
US8238217B2 (en) * | 2008-12-16 | 2012-08-07 | General Electric Company | Method and system for detection enhancement for optical data storage |
JP2011022785A (en) * | 2009-07-15 | 2011-02-03 | Sony Corp | Key storage device, biometric authentication device, biometric authentication system, key management method, biometric authentication method, and program |
JP5682237B2 (en) * | 2010-11-05 | 2015-03-11 | 富士ゼロックス株式会社 | Information processing apparatus and program |
WO2012162270A2 (en) | 2011-05-20 | 2012-11-29 | Vivotech, Inc. | Methods, systems, and computer-readable storage media for managing risk using location, mobile, and user participating - based identity verification |
US8686829B2 (en) * | 2011-06-10 | 2014-04-01 | GM Global Technology Operations LLC | Lock code recovery system |
JP6023879B2 (en) | 2012-05-18 | 2016-11-09 | アップル インコーポレイテッド | Apparatus, method and graphical user interface for operating a user interface based on fingerprint sensor input |
KR101520247B1 (en) * | 2013-02-27 | 2015-05-15 | 주식회사 케이티 | Method And System For Biometric Data Management |
CN103353997A (en) * | 2013-07-24 | 2013-10-16 | 江苏晓山信息产业股份有限公司 | Intelligent mobile terminal control electronic lock system |
TWI658717B (en) | 2013-10-01 | 2019-05-01 | 瑞士商伊文修股份有限公司 | Access control method, access control system and computer-readable storage medium |
EP3078157B1 (en) * | 2013-12-05 | 2020-04-08 | Sony Corporation | A wearable device and a method for storing credentials associated with an electronic device in said wearable device |
US10430599B1 (en) * | 2014-06-30 | 2019-10-01 | EMC IP Holding Company LLC | Filekey access to data |
CN107004076A (en) * | 2014-09-05 | 2017-08-01 | Utc 消防及保安公司 | System and method for access registrar |
CN105488869A (en) * | 2014-09-16 | 2016-04-13 | 深圳富泰宏精密工业有限公司 | Code lock unlocking system and code lock unlocking method |
DE102014223368A1 (en) * | 2014-11-17 | 2016-05-19 | Robert Bosch Gmbh | A method for recipient-side identification of a user by means of a mobile transmitter and a mobile receiver |
US10868672B1 (en) | 2015-06-05 | 2020-12-15 | Apple Inc. | Establishing and verifying identity using biometrics while protecting user privacy |
US11140171B1 (en) | 2015-06-05 | 2021-10-05 | Apple Inc. | Establishing and verifying identity using action sequences while protecting user privacy |
KR102460069B1 (en) | 2015-09-30 | 2022-10-28 | 삼성전자주식회사 | Security certification apparatus using biometric information and security certification method |
CN113489667B (en) * | 2020-04-09 | 2023-08-18 | 济南诚方网络科技有限公司 | Verification method, device and medium based on living body detection |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE425704B (en) | 1981-03-18 | 1982-10-25 | Loefberg Bo | DATABERARE |
GB8525161D0 (en) * | 1985-10-11 | 1985-11-13 | Blackwell V C | Personalised identification device |
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
US5131038A (en) * | 1990-11-07 | 1992-07-14 | Motorola, Inc. | Portable authentification system |
US5483595A (en) * | 1993-09-20 | 1996-01-09 | Seiko Communications Holding N.V. | Paging device including password accessed stored cryptographic keys |
WO1995016238A1 (en) * | 1993-12-06 | 1995-06-15 | Telequip Corporation | Secure computer memory card |
US5481610A (en) * | 1994-02-28 | 1996-01-02 | Ericsson Inc. | Digital radio transceiver with encrypted key storage |
US5680460A (en) * | 1994-09-07 | 1997-10-21 | Mytec Technologies, Inc. | Biometric controlled key generation |
US6038551A (en) * | 1996-03-11 | 2000-03-14 | Microsoft Corporation | System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer |
US6011858A (en) * | 1996-05-10 | 2000-01-04 | Biometric Tracking, L.L.C. | Memory card having a biometric template stored thereon and system for using same |
AU4196497A (en) * | 1996-09-18 | 1998-04-14 | Dew Engineering And Development Limited | Biometric identification system for providing secure access |
US6600823B1 (en) * | 1996-10-22 | 2003-07-29 | Unisys Corporation | Apparatus and method for enhancing check security |
US6131090A (en) * | 1997-03-04 | 2000-10-10 | Pitney Bowes Inc. | Method and system for providing controlled access to information stored on a portable recording medium |
US5937065A (en) * | 1997-04-07 | 1999-08-10 | Eaton Corporation | Keyless motor vehicle entry and ignition system |
US6016476A (en) * | 1997-08-11 | 2000-01-18 | International Business Machines Corporation | Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security |
US6035398A (en) * | 1997-11-14 | 2000-03-07 | Digitalpersona, Inc. | Cryptographic key generation using biometric data |
US6038666A (en) | 1997-12-22 | 2000-03-14 | Trw Inc. | Remote identity verification technique using a personal identification device |
US6484260B1 (en) * | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6353889B1 (en) * | 1998-05-13 | 2002-03-05 | Mytec Technologies Inc. | Portable device and method for accessing data key actuated devices |
US6867683B2 (en) * | 2000-12-28 | 2005-03-15 | Unisys Corporation | High security identification system for entry to multiple zones |
US7310734B2 (en) * | 2001-02-01 | 2007-12-18 | 3M Innovative Properties Company | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US6983882B2 (en) * | 2003-03-31 | 2006-01-10 | Kepler, Ltd. | Personal biometric authentication and authorization device |
-
1998
- 1998-05-13 US US09/078,396 patent/US6353889B1/en not_active Expired - Fee Related
-
2001
- 2001-12-06 ES ES01274860T patent/ES2385215T3/en not_active Expired - Lifetime
- 2001-12-06 US US10/497,560 patent/US7437567B2/en not_active Expired - Fee Related
- 2001-12-06 EP EP01274860A patent/EP1454303B9/en not_active Expired - Lifetime
- 2001-12-06 MX MXPA04005460A patent/MXPA04005460A/en unknown
- 2001-12-06 AT AT01274860T patent/ATE551680T1/en active
- 2001-12-06 JP JP2003550161A patent/JP2005512204A/en active Pending
- 2001-12-06 CA CA2467911A patent/CA2467911C/en not_active Expired - Fee Related
- 2001-12-06 IL IL16194301A patent/IL161943A0/en unknown
- 2001-12-06 CN CNA018238602A patent/CN1561506A/en active Pending
- 2001-12-06 WO PCT/CA2001/001736 patent/WO2003049042A1/en active IP Right Grant
- 2001-12-06 NZ NZ533232A patent/NZ533232A/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
MXPA04005460A (en) | 2005-03-23 |
US20050071646A1 (en) | 2005-03-31 |
EP1454303B1 (en) | 2012-03-28 |
CA2467911C (en) | 2010-02-23 |
US7437567B2 (en) | 2008-10-14 |
CN1561506A (en) | 2005-01-05 |
ES2385215T3 (en) | 2012-07-19 |
US6353889B1 (en) | 2002-03-05 |
NZ533232A (en) | 2005-05-27 |
ATE551680T1 (en) | 2012-04-15 |
EP1454303B9 (en) | 2012-09-12 |
IL161943A0 (en) | 2005-11-20 |
EP1454303A1 (en) | 2004-09-08 |
AU2002221418A1 (en) | 2003-06-17 |
WO2003049042A1 (en) | 2003-06-12 |
JP2005512204A (en) | 2005-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2467911A1 (en) | Portable device and method for accessing data key actuated devices | |
US6041410A (en) | Personal identification fob | |
EP0924657B2 (en) | Remote idendity verification technique using a personal identification device | |
JP2860527B2 (en) | Vehicle security device whose usage rights are encoded electronically | |
US20070001805A1 (en) | Multiple vehicle authentication for entry and starting systems | |
US7529944B2 (en) | Support for multiple login method | |
US20060226951A1 (en) | Method and system for providing fingerprint enabled wireless add-on for personal identification number (PIN) accessible smartcards | |
JPH086520B2 (en) | Remote access system | |
KR20060107315A (en) | Host device, authentication system, authentication method, and entrance/exit management system | |
JP3807943B2 (en) | Biometric information verification security device | |
CN117837121A (en) | System and method for a secure keyless system | |
RU2274899C2 (en) | Portable device and method for accessing device activated by key data | |
JP2008266907A (en) | Wireless lock system using biometrics authentication | |
JPH1030367A (en) | Identification signal checking device and identification signal checking method | |
AU2002221418B2 (en) | Portable device and method for accessing data key actuated devices | |
JPH10190651A (en) | Remote control system | |
ZA200404033B (en) | Portable device and method for accessing data key actuated devices. | |
KR20040075869A (en) | Portable device and method for accessing data key actuated devices | |
JP2003036245A (en) | Personal authentication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20210831 |
|
MKLA | Lapsed |
Effective date: 20191206 |