InvestorsHub Logo

awk

Followers 88
Posts 7081
Boards Moderated 2
Alias Born 07/21/2003

awk

Re: awk post# 171918

Wednesday, 10/15/2008 10:02:46 AM

Wednesday, October 15, 2008 10:02:46 AM

Post# of 249121
The BIO-Key patent...

http://tinyurl.com/4srmy3

BACKGROUND OF THE INVENTION

The present invention generally pertains to biometric security systems. More specifically, the present invention pertains to biometric security systems that provide an enhanced defense against unlawful hackers and other system attackers.

Within a typical biometric security system, there are at least two operations, enrollment and authentication. The operation of enrollment encompasses the original sampling of a person's biometric information, and the creation and storage of a match template (a.k.a., an enrollment template) that is a data representation of the original sampling. The operation of authentication includes an invocation of a biometric sample for the identification or verification of a system user through comparison of a data representation of the biometric sample with one or more stored match templates.

Biometric information is, by nature, reasonably public knowledge. A person's biometric data is often casually left behind or is easily seen and captured. This is true for all forms of biometric data including, but not limited to, fingerprints, iris features, facial features, and voice information. As an example, consider two friends meeting. The one friend recognizes the other by their face and other visible key characteristics. That information is public knowledge. However, a photo of that same person `is` not that person. This issue similarly applies, electronically, to computer-based biometric authentication wherein a copy of authorized biometric information is susceptible to being submitted as a representation of the corresponding original information. In the context of biometric security applications, what is important, what enables a secure authentication, is a unique and trusted invocation of an authorized biometric.

A key issue confronting biometric authentication for security applications is providing some sort of assurance that the biometric sample being processed during authentication is a true and trusted sample. Numerous known biometric security systems are susceptible to being duped because a data representation received by a security processor during authentication is actually a fraudulent invocation of biometric information. For example, an individual in possession of a copy of authorized biometric information can submit the copy during authentication to gain unauthorized access. In a particularly dangerous scenario, an individual in possession of an electronic copy of authorized biometric information can fraudulently bypass the physical collection of biometric information and directly submit the copy to an electronic security processor during the operation of authentication to gain unauthorized access.

To ensure a trusted invocation of biometric information, data integrity should be maintained during each stage or level of the authentication process. The integrity of any transfers of information between a capture device and a processor, and between a processor and any subsequent applications, should be maintained. In particular, the processor responsible for receiving and processing biometric information submitted by a user should be able to `trust` the biometric data it receives. In other words, there should be a trusted relationship between a device that gathers a user's biometric information (i.e., a fingerprint scanner) and a security processor responsible for processing that biometric information.

Ensuring that access is granted only upon unique and trusted invocations of authorized biometric information is a challenge relevant to most all biometric security systems.


SUMMARY OF THE INVENTION

One embodiment pertains to a method for regulating user access in the context of a biometric security system. The method includes receiving a remotely transmitted data packet containing an encryption key, utilizing a decryption component to decrypt the data packet, and utilizing the encryption component to encrypt biometric data.

Another embodiment includes providing, within a client computing device, a processor that is implemented as part of a trusted computing environment, and utilizing the processor to perform an encryption function within the biometric security system, wherein the encryption function is incorporated into an authentication process that involves a transfer of biometric information between the client computing device and a remotely implemented server

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.