CA2592749C - Biometric identification device with smartcard capabilities - Google Patents
Biometric identification device with smartcard capabilities Download PDFInfo
- Publication number
- CA2592749C CA2592749C CA2592749A CA2592749A CA2592749C CA 2592749 C CA2592749 C CA 2592749C CA 2592749 A CA2592749 A CA 2592749A CA 2592749 A CA2592749 A CA 2592749A CA 2592749 C CA2592749 C CA 2592749C
- Authority
- CA
- Canada
- Prior art keywords
- smartcard
- biometric
- identification
- user
- integrated circuit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0013—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0013—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
- G06K7/0056—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers housing of the card connector
- G06K7/006—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers housing of the card connector the housing being a portable casing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0013—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
- G06K7/0086—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers the connector comprising a circuit for steering the operations of the card connector
- G06K7/0091—Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers the connector comprising a circuit for steering the operations of the card connector the circuit comprising an arrangement for avoiding intrusions and unwanted access to data inside of the connector
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/02—Access control comprising means for the enrolment of users
Abstract
A smartcard-enabled BPID Security Device integrates a smartcard reader with a biometric authentication component to provide secured access to electronic systems. The device allows for an individual to insert a smartcard into an aperture in the physical enclosure of the BPID Security Device, allowing the smartcard and the BPID Security Device to electronically communicate with each other. The smartcard-enabled BPID Security Device is based on a custom application specific integrated circuit that incorporates smartcard terminals, such that the BPID Security Device can communicate directly with an inserted smartcard. In an alternative embodiment of the invention, the smartcard-enabled BPID Security Device is based on a commercial off-the-shelf microprocessor, and may communicate with a commercial off-the-shelf microprocessor smartcard receiver using a serial, USB, or other type of communication protocol. The device allows for enrolling a user's credentials onto the smartcard-enabled BPID Security Device. The device also allows for authenticating an individual using the smartcard-enabled BPID Security Device.
Description
BIOMETRIC IDENTIFICATION DEVICE WITH SMARTCARD CAPABILITIES
BACKGROUND OF THE INVENTION:
Field of the Invention:
[1] This invention relates to the field of portable, electronic personal identification and authentication devices. This invention relates more specifically to electronic devices using biometric and/or smartcard authentication technologies.
Related Art:
BACKGROUND OF THE INVENTION:
Field of the Invention:
[1] This invention relates to the field of portable, electronic personal identification and authentication devices. This invention relates more specifically to electronic devices using biometric and/or smartcard authentication technologies.
Related Art:
[2] U.S. Patent No. 6,991,174 to Zuili discloses a method and apparatus for authenticating a shipping transaction. The disclosed apparatus, which is not covered by the claims of the patent, is a portable smartcard reader incorporating a number of different authentication mechanisms, including a personal identification number (PIN), asymmetric cryptographic keys, and/or biometrics. The apparatus may be used autonomously or in conjunction with other electronic devices, such as a personal digital assistant (PDA), cellular telephone, or remote control. The apparatus is designed for use in a variety of applications, including computer networks, televisions and cable access, and payment transactions. The patented invention is a method of specifically authenticating a shipping transaction by using a smartcard and a smartcard reader, acquiring biometric information and shipping information from a customer, encrypting the shipping information using the biometric information, storing the encrypted shipping infomiation on the smartcard and in a database, permitting the customer to access the database in order to change the shipping information, and requiring the customer to resubmit biometric information in order to authenticate the shipping transaction.
[04] U.S. Patent No. 6,016,476 to Maes, et al., discloses a portable PDA with biometric authentication capability. The PDA is further capable of reading and writing information to smartcards, magnetic stripe cards, optical cards and/or electronically alterable read-only memory (EAROM) cards. The PDA is intended for use in payment transactions, and can communicate with other electronic devices, such as a point of sale tenninal, through either wired or wireless transceivers.
[05] Research In Motion, Ltd. (RIM) produces and sells a device called "The BlackBerry Smart Card Reader," which is a portable smartcard reader that provides two-factor authentication, symmetric cryptographic keys and the smartcard, for users attempting to access or use BlackBerry devices. Once the smartcard and the cryptographic key has been processed on the device, the device communicates via Bluetooth wireless technology with the BlackBerry device, enabling users to transmit secure e-mail. The device does not include biometric authentication.
[06] Key Ovation produces the "Goldtouch ErgoSecure Smart Card and Biometric Keyboard SF2.4." This device is a standard ergonomic computer keyboard, which incorporates both a smartcard reader and an Authentec fingerprint sensor. It is not portable, nor does it appear to possess wireless technology.
2 , NECESSITY OF THE INVENTION:
[07] Companies, governments, and other organizations possess a variety of physical and digital resources, which are often valuable and must be protected. Some of these resources are physical, such as particular buildings, offices, or grounds, while others are more intangible, such as databases, computer files, or other digital data. As a natural consequence of wishing to protect the resource, organizations either implicitly or explicitly develop an associated security policy or structure that specifies rules for access to the resource. When an individual wants access to a protected resource, the organization's security policy will ¨ again implicitly or explicitly ¨ require the individual to identify himself in an acceptable manner, and will then authenticate the identified individual against the security policy. If the identified and authenticated individual has privileges to the resource he is peiinitted access.
[08] Both government agencies and private industry have developed a number of different technologies to implement these security policies. One such technology is the "proximity card," commonly used to secure physical access to commercial buildings and offices. The proximity card is typically the size of a credit card, and contains electronics sufficient to both store and wirelessly transmit a unique identifier to a receiver located at the access point. The proximity card gains its name from its characteristic type of wireless transmission, allowing the user to simply hold the card close (typically within a few inches) to the access point, without inserting the card into a reader. When a proximity card is issued to an individual, a centralized database associates the unique identifier on the card with that individual; when the individual provides the proximity card to gain access to the resource, the identifier is transmitted to the access point, and the association is verified. Once the unique identifier has been programmed onto the proximity card, it cannot be altered, nor can additional data be added to the card.
[04] U.S. Patent No. 6,016,476 to Maes, et al., discloses a portable PDA with biometric authentication capability. The PDA is further capable of reading and writing information to smartcards, magnetic stripe cards, optical cards and/or electronically alterable read-only memory (EAROM) cards. The PDA is intended for use in payment transactions, and can communicate with other electronic devices, such as a point of sale tenninal, through either wired or wireless transceivers.
[05] Research In Motion, Ltd. (RIM) produces and sells a device called "The BlackBerry Smart Card Reader," which is a portable smartcard reader that provides two-factor authentication, symmetric cryptographic keys and the smartcard, for users attempting to access or use BlackBerry devices. Once the smartcard and the cryptographic key has been processed on the device, the device communicates via Bluetooth wireless technology with the BlackBerry device, enabling users to transmit secure e-mail. The device does not include biometric authentication.
[06] Key Ovation produces the "Goldtouch ErgoSecure Smart Card and Biometric Keyboard SF2.4." This device is a standard ergonomic computer keyboard, which incorporates both a smartcard reader and an Authentec fingerprint sensor. It is not portable, nor does it appear to possess wireless technology.
2 , NECESSITY OF THE INVENTION:
[07] Companies, governments, and other organizations possess a variety of physical and digital resources, which are often valuable and must be protected. Some of these resources are physical, such as particular buildings, offices, or grounds, while others are more intangible, such as databases, computer files, or other digital data. As a natural consequence of wishing to protect the resource, organizations either implicitly or explicitly develop an associated security policy or structure that specifies rules for access to the resource. When an individual wants access to a protected resource, the organization's security policy will ¨ again implicitly or explicitly ¨ require the individual to identify himself in an acceptable manner, and will then authenticate the identified individual against the security policy. If the identified and authenticated individual has privileges to the resource he is peiinitted access.
[08] Both government agencies and private industry have developed a number of different technologies to implement these security policies. One such technology is the "proximity card," commonly used to secure physical access to commercial buildings and offices. The proximity card is typically the size of a credit card, and contains electronics sufficient to both store and wirelessly transmit a unique identifier to a receiver located at the access point. The proximity card gains its name from its characteristic type of wireless transmission, allowing the user to simply hold the card close (typically within a few inches) to the access point, without inserting the card into a reader. When a proximity card is issued to an individual, a centralized database associates the unique identifier on the card with that individual; when the individual provides the proximity card to gain access to the resource, the identifier is transmitted to the access point, and the association is verified. Once the unique identifier has been programmed onto the proximity card, it cannot be altered, nor can additional data be added to the card.
3 [09] Developers have been equally prolific in generating authenticating technologies for access to computers, networks, and other digital resources. The simplest examples are passphrases or personal identification numbers (PINs) that the individual must supply before being granted access to the resource. Virtually all e-mail systems are protected this way;
another common example is the Windows log-in process, which prompts the user to enter a username and password. In more advanced systems, individuals may be provided cryptographic keys, such as one half of a public key/private key pair, or a digital certificate.
These technologies similarly rest on an individual's previous association with the particular credential, such as the passplu-ase or cryptographic key.
[10] One technology frequently used to accomplish one or both objectives of physical and digital access is the "smartcard." Similar to the proximity card, the smartcard is in the form-factor of a credit card. The smartcard, however, generally contains a small integrated circuit with sufficient processing power to perform a number of different tasks, including cryptography and two-way transmission. The smartcard can store unique identifiers, such as cryptographic keys, passplu-ases, and other user data, as well as be transported and used to obtain access to physical resources. One smartcard can provide storage and authentication for a number of different resources, each of which may have a different identifier. Rather than wirelessly transmitting credentials, such as the proximity card, the smartcard uses contact-based transmission, and requires the user to insert the smartcard into a reader at the access point. Smartcard readers may be attached to electronic resources, such as a computer or network tenninal, or physical resources, such as doors, gates, etc. Because of the two-way transmission capability, the data stored on a smartcard may be altered or updated through the smartcard reader. Smartcards are extremely popular; for example, the Department of Defense (DoD) currently uses the smartcard-based Common Access Card (CAC) to grant access to its organizations and resources. The CAC retains all of the functions and features of the
another common example is the Windows log-in process, which prompts the user to enter a username and password. In more advanced systems, individuals may be provided cryptographic keys, such as one half of a public key/private key pair, or a digital certificate.
These technologies similarly rest on an individual's previous association with the particular credential, such as the passplu-ase or cryptographic key.
[10] One technology frequently used to accomplish one or both objectives of physical and digital access is the "smartcard." Similar to the proximity card, the smartcard is in the form-factor of a credit card. The smartcard, however, generally contains a small integrated circuit with sufficient processing power to perform a number of different tasks, including cryptography and two-way transmission. The smartcard can store unique identifiers, such as cryptographic keys, passplu-ases, and other user data, as well as be transported and used to obtain access to physical resources. One smartcard can provide storage and authentication for a number of different resources, each of which may have a different identifier. Rather than wirelessly transmitting credentials, such as the proximity card, the smartcard uses contact-based transmission, and requires the user to insert the smartcard into a reader at the access point. Smartcard readers may be attached to electronic resources, such as a computer or network tenninal, or physical resources, such as doors, gates, etc. Because of the two-way transmission capability, the data stored on a smartcard may be altered or updated through the smartcard reader. Smartcards are extremely popular; for example, the Department of Defense (DoD) currently uses the smartcard-based Common Access Card (CAC) to grant access to its organizations and resources. The CAC retains all of the functions and features of the
4
5 PCT/US2006/010910 traditional smartcard, and incorporates a photograph of the bearer on the outside of the card, to allow for both visual and electronic identification and authentication.
[11] Each of these security technologies, while very useful, is susceptible to use by an impostor. If an individual loses his proximity card or smartcard, anyone who picks it up may use it to access the resource. Biometric technology, which authenticates an individual by use of physical characteristics such as fingerprints, can largely eliminate this risk. In the case of fingerprint recognition, an individual's fingerprint is electronically scanned and stored as a numeric template. When the individual wishes to access the resource, the finger is rescanned and digitally compared to the stored fingerprint to determine a match.
Biometrics offer a clear advantage over previous technology ¨ while a smartcard may be easily stolen and used by an unauthorized individual, an electronic forgery of a fingerprint is much more difficult to achieve.
[12] The Privaris BPIIDTM Security Device is one type of authentication device based on biometric technology, and is much younger technology than the smartcard. The BPID
Security Device is a handheld, portable electronic device, containing a fingerprint scanner, two-way wireless communications, memory, and sufficient processing power to perfoini cryptographic functions and on-device fingerprint authentication algorithms.
Much like the smartcard, the BPID Security Device can store unique identifiers, including cryptographic keys and passphrases, and can be used to authenticate an individual to a number of different resources. The BPID Security Device, however, possesses significantly more processing power and memory than the traditional smartcard, in part because of the fingerprint template storage and comparisons done on-board the device. Furthermore, the BPID
Security Device is based on wireless technology, so it can use the same protocols as used in proximity cards, newer standards like the Bluetooth protocol, or both. Data on the BPID
Security Device can be transmitted or received without inserting the device into a reader, which, for example, allows individuals to authenticate faster at a physical access point than they could using a smartcard.
[13] Since the advent of the smartcard, a number of organizations have attempted to create an identification system common to multiple organizations that utilized common information contained on the smartcard, while at the same time increasing the security of this information, and insuring positive identification of the individual using the smartcard, prior to granting access to approved resources. Shortage of memory, limited range for contactless applications, the need for multiple cards to accommodate existing building access systems, the need for reliable biometric authentication, and the difficulties associated with updating the data on the card all became issues. While the BPID Security Device can largely address these concerns, it does not possess the fotin-factor of the smartcard, and therefore does not lend itself to the visual identification component of the CAC. Nor does the BPID Security Device contain a contact-based transmission mechanism allowing it to interact with systems currently using smartcard readers. What is needed is an apparatus and methods that combines the visual identification aspect of the smartcard with the biometric and wireless components of the BPID Security Device, which can allow reversion to a contact-based smartcard system when necessary.
SUMMARY OF THE INVENTION:
[14] The present invention discloses apparatuses and methods for integrating smartcard and BPID Security Device technology. The primary apparatus of the invention, hereinafter termed a "smartcard-enabled BPID Security Device," integrates a smartcard reader with the BPID Security Device such that an individual may insert the smartcard into an aperture in the physical enclosure of the BPID Security Device, allowing the smartcard and the BPID
Security Device to electronically communicate with each other. In one primary embodiment
[11] Each of these security technologies, while very useful, is susceptible to use by an impostor. If an individual loses his proximity card or smartcard, anyone who picks it up may use it to access the resource. Biometric technology, which authenticates an individual by use of physical characteristics such as fingerprints, can largely eliminate this risk. In the case of fingerprint recognition, an individual's fingerprint is electronically scanned and stored as a numeric template. When the individual wishes to access the resource, the finger is rescanned and digitally compared to the stored fingerprint to determine a match.
Biometrics offer a clear advantage over previous technology ¨ while a smartcard may be easily stolen and used by an unauthorized individual, an electronic forgery of a fingerprint is much more difficult to achieve.
[12] The Privaris BPIIDTM Security Device is one type of authentication device based on biometric technology, and is much younger technology than the smartcard. The BPID
Security Device is a handheld, portable electronic device, containing a fingerprint scanner, two-way wireless communications, memory, and sufficient processing power to perfoini cryptographic functions and on-device fingerprint authentication algorithms.
Much like the smartcard, the BPID Security Device can store unique identifiers, including cryptographic keys and passphrases, and can be used to authenticate an individual to a number of different resources. The BPID Security Device, however, possesses significantly more processing power and memory than the traditional smartcard, in part because of the fingerprint template storage and comparisons done on-board the device. Furthermore, the BPID
Security Device is based on wireless technology, so it can use the same protocols as used in proximity cards, newer standards like the Bluetooth protocol, or both. Data on the BPID
Security Device can be transmitted or received without inserting the device into a reader, which, for example, allows individuals to authenticate faster at a physical access point than they could using a smartcard.
[13] Since the advent of the smartcard, a number of organizations have attempted to create an identification system common to multiple organizations that utilized common information contained on the smartcard, while at the same time increasing the security of this information, and insuring positive identification of the individual using the smartcard, prior to granting access to approved resources. Shortage of memory, limited range for contactless applications, the need for multiple cards to accommodate existing building access systems, the need for reliable biometric authentication, and the difficulties associated with updating the data on the card all became issues. While the BPID Security Device can largely address these concerns, it does not possess the fotin-factor of the smartcard, and therefore does not lend itself to the visual identification component of the CAC. Nor does the BPID Security Device contain a contact-based transmission mechanism allowing it to interact with systems currently using smartcard readers. What is needed is an apparatus and methods that combines the visual identification aspect of the smartcard with the biometric and wireless components of the BPID Security Device, which can allow reversion to a contact-based smartcard system when necessary.
SUMMARY OF THE INVENTION:
[14] The present invention discloses apparatuses and methods for integrating smartcard and BPID Security Device technology. The primary apparatus of the invention, hereinafter termed a "smartcard-enabled BPID Security Device," integrates a smartcard reader with the BPID Security Device such that an individual may insert the smartcard into an aperture in the physical enclosure of the BPID Security Device, allowing the smartcard and the BPID
Security Device to electronically communicate with each other. In one primary embodiment
6 of the invention, the smartcard-enabled BPID Security Device is based on a custom application specific integrated circuit (ASIC) that incorporates smartcard terminals, such that the BPID Security Device can communicate directly with an inserted smartcard.
In an alternative embodiment of the invention, the smartcard-enabled BPID Security Device is based on a commercial off-the-shelf (COTS) microprocessor, and may communicate with a COTS smartcard receiver using a serial, USB, or other type of communication protocol. The first method of the invention is a process for enrolling a user's credentials onto the smartcard-enabled BPID Security Device. The second method of the invention is a process for authenticating an individual using the smartcard-enabled BPID Security Device.
[15] DETAILED DESCRIPTION OF THE DRAWINGS
Fig. 1 depicts the smartcard-enabled BPID Security Device 100 ¨ BPID Smartcard Security Device 101 ¨ physical enclosure 102 ¨ aperture for receiving a smartcard 110 ¨ strap 310¨ fingerprint sensor of the BPID Security Device Fig. 2 depicts a smartcard being inserted into the smartcard-enabled BPID
Security Device 100 ¨ BPID Smartcard Security Device 101 ¨ physical enclosure 102 ¨ aperture for receiving a smartcard 200 ¨ smartcard Fig. 3 depicts a smartcard inserted into the smartcard-enabled BPID Security Device 100¨ BPID Smartcard Security Device 101 ¨ physical enclosure 102¨ aperture for receiving a smartcard 200 ¨ smartcard Fig. 4 is a schematic representation of the smartcard-enabled BPID Security Device 100¨ BPID Smartcard Security Device 210 ¨ smartcard reader 211 ¨ smartcard terminal 212 ¨ external device terminal 300 ¨ biometric authentication component DETAILED DESCRIPTION OF THE INVENTION:
In an alternative embodiment of the invention, the smartcard-enabled BPID Security Device is based on a commercial off-the-shelf (COTS) microprocessor, and may communicate with a COTS smartcard receiver using a serial, USB, or other type of communication protocol. The first method of the invention is a process for enrolling a user's credentials onto the smartcard-enabled BPID Security Device. The second method of the invention is a process for authenticating an individual using the smartcard-enabled BPID Security Device.
[15] DETAILED DESCRIPTION OF THE DRAWINGS
Fig. 1 depicts the smartcard-enabled BPID Security Device 100 ¨ BPID Smartcard Security Device 101 ¨ physical enclosure 102 ¨ aperture for receiving a smartcard 110 ¨ strap 310¨ fingerprint sensor of the BPID Security Device Fig. 2 depicts a smartcard being inserted into the smartcard-enabled BPID
Security Device 100 ¨ BPID Smartcard Security Device 101 ¨ physical enclosure 102 ¨ aperture for receiving a smartcard 200 ¨ smartcard Fig. 3 depicts a smartcard inserted into the smartcard-enabled BPID Security Device 100¨ BPID Smartcard Security Device 101 ¨ physical enclosure 102¨ aperture for receiving a smartcard 200 ¨ smartcard Fig. 4 is a schematic representation of the smartcard-enabled BPID Security Device 100¨ BPID Smartcard Security Device 210 ¨ smartcard reader 211 ¨ smartcard terminal 212 ¨ external device terminal 300 ¨ biometric authentication component DETAILED DESCRIPTION OF THE INVENTION:
7 [16] The following detailed description is of the best presently contemplated mode of carrying out the invention. This description is not to be taken in a limiting sense, but is made merely for the purpose of illustrating general principles of embodiments of the invention.
[17] The primary apparatus of the invention is called a "smartcard-enabled BPID Security Device." As seen in Fig. 1, the BPID Smartcard Security Device 100 may be attachable to a strap 110, so that it may be worn around an individual's neck or used in some other convenient carrying method. The BPID Smartcard Security Device 100 comprises a physical enclosure 101 with an aperture 102 for receiving a smartcard, a biometric authentication component 300 (see Fig. 4), and a smartcard reader 210 (see Fig. 4). The fingerprint sensor 310 of the BPID Security Device is made externally available through the physical enclosure 101. As seen in Figs. 2 and 3, the aperture 102 may be oriented in the physical enclosure 101 such that a picture or photograph on the outside of a smartcard 200, such as the CAC, is easily visible to all approaching the individual.
[18] Fig. 4 is a schematic representation of the smartcard-enabled BPID
Security Device, without the physical enclosure and aperture. The smartcard reader 210 may be any existing technology that incorporates contact-based terminals 211 for receiving and transmitting electronic data smartcards (hereinafter "smartcard terminal"), and at least one additional terminal 212 for transmitting and receiving data to an external device (hereinafter "external device terminal"). The biometric authentication component 300 and the smartcard reader 210 are located within the physical enclosure 101, such that a smartcard 200 inserted into the aperture 102 will physically contact the smartcard terminal 211 and may use existing smartcard protocols to transmit information to and from the smartcard reader 210. The smartcard reader 210 is physically coupled to the biometric authentication component 300, such that the external device terminal 212 allows the smartcard reader 210 to communicate with the biometric authentication component 300.
[17] The primary apparatus of the invention is called a "smartcard-enabled BPID Security Device." As seen in Fig. 1, the BPID Smartcard Security Device 100 may be attachable to a strap 110, so that it may be worn around an individual's neck or used in some other convenient carrying method. The BPID Smartcard Security Device 100 comprises a physical enclosure 101 with an aperture 102 for receiving a smartcard, a biometric authentication component 300 (see Fig. 4), and a smartcard reader 210 (see Fig. 4). The fingerprint sensor 310 of the BPID Security Device is made externally available through the physical enclosure 101. As seen in Figs. 2 and 3, the aperture 102 may be oriented in the physical enclosure 101 such that a picture or photograph on the outside of a smartcard 200, such as the CAC, is easily visible to all approaching the individual.
[18] Fig. 4 is a schematic representation of the smartcard-enabled BPID
Security Device, without the physical enclosure and aperture. The smartcard reader 210 may be any existing technology that incorporates contact-based terminals 211 for receiving and transmitting electronic data smartcards (hereinafter "smartcard terminal"), and at least one additional terminal 212 for transmitting and receiving data to an external device (hereinafter "external device terminal"). The biometric authentication component 300 and the smartcard reader 210 are located within the physical enclosure 101, such that a smartcard 200 inserted into the aperture 102 will physically contact the smartcard terminal 211 and may use existing smartcard protocols to transmit information to and from the smartcard reader 210. The smartcard reader 210 is physically coupled to the biometric authentication component 300, such that the external device terminal 212 allows the smartcard reader 210 to communicate with the biometric authentication component 300.
8 [19] In the first embodiment of the apparatus, the biometric authentication component 300 may communicate with the external device terminal 212 over a standard communications protocol, such as, but not limited to, RS232 (now known as EIA232) or Universal Serial Bus (USB). In an alternative embodiment of the apparatus, the biometric authentication component 300 and the smartcard reader 210 will coexist on a secure microprocessor (hereinafter "BPID Security Device /reader"), such that communications between the external device terminal 212 and the biometric authentication component 300 will be physically and electronically located on the same ASIC. In this embodiment of the invention, the BPID
Security Device /reader will be located within the physical enclosure 101 such that a smartcard 200 inserted into the aperture 102 of the physical enclosure 101 will directly contact the smartcard terminal 211 of the BPID Security Device /reader. This creates enhanced security for the BPID Smartcard Security Device 100, as the ASIC may be physically and electronically secured.
[20] The first method of invention permits an individual with a smartcard to enroll himself into the BPID Smartcard Security Device 100. First, the individual places a smartcard 200 into the aperture 102 of the physical enclosure 101 such that the smartcard 200 contacts the smartcard terminal 211 of the reader 210. The individual then activates power to the smartcard-enabled BPID Security Device 101 and the smartcard reader 210 reads the smartcard's serial number. The smartcard reader 210 transmits the serial number to the biometric authentication component 300 using the external device terminals 212. The biometric authentication component 300 verifies that it has not previously been enrolled with the specific smartcard 200. The biometric authentication component 300 then connects to a BPID Security Device enrollment station and enrolls the individual pursuant to its regular procedure. During the enrollment procedure, the biometric authentication component 300 stores the individual's biometric data and a PIN, which are then associated in the memory of
Security Device /reader will be located within the physical enclosure 101 such that a smartcard 200 inserted into the aperture 102 of the physical enclosure 101 will directly contact the smartcard terminal 211 of the BPID Security Device /reader. This creates enhanced security for the BPID Smartcard Security Device 100, as the ASIC may be physically and electronically secured.
[20] The first method of invention permits an individual with a smartcard to enroll himself into the BPID Smartcard Security Device 100. First, the individual places a smartcard 200 into the aperture 102 of the physical enclosure 101 such that the smartcard 200 contacts the smartcard terminal 211 of the reader 210. The individual then activates power to the smartcard-enabled BPID Security Device 101 and the smartcard reader 210 reads the smartcard's serial number. The smartcard reader 210 transmits the serial number to the biometric authentication component 300 using the external device terminals 212. The biometric authentication component 300 verifies that it has not previously been enrolled with the specific smartcard 200. The biometric authentication component 300 then connects to a BPID Security Device enrollment station and enrolls the individual pursuant to its regular procedure. During the enrollment procedure, the biometric authentication component 300 stores the individual's biometric data and a PIN, which are then associated in the memory of
9 the biometric authentication component 300 with the smartcard's 200 serial number. The biometric authentication component 300 also transmits the individual's biometric data and the PIN to the smartcard reader 210 via the external device terminals 212, and the smartcard reader 210 writes the biometric data and the PIN to the smartcard 200 via the smartcard terminal 211. The BPID Smartcard Security Device 100 is now enrolled and the user may remove the smartcard from the aperture 102 of the physical enclosure 101.
[21] The second method of the invention permits an individual to authenticate himself to a BPID Smartcard Security Device 100 he has previously enrolled in. First, the individual places a smartcard 200 into the aperture 102 of the physical enclosure 101 such that the smartcard 200 contacts the smartcard terminal 211 of the reader 210. The individual then activates power to the smartcard-enabled BPID Security Device 101 and the smartcard reader 210 reads the smartcard's serial number. The smartcard reader 210 transmits the serial number to the biometric authentication component 300 using the external device terminals 212. The biometric authentication component 300 verifies that it has previously been enrolled with the specific smartcard 200 and requests the individual to authenticate himself to the biometric authentication component 300 according to its standard procedure. If the biometric authentication component 300 successfully authenticates the individual, the biometric authentication component 300 locates the PIN associated with the smartcard's 200 serial number and transmits the PIN via the external device 212 to the smartcard reader 210.
The smartcard reader 210 then transmits the PIN to the smartcard 200 via the smartcard terminal 211.
[22] If the smartcard 200 possesses "match-on-card" capabilities, i.e. the smartcard is capable of matching fingerprint templates to those stored on the card, the biometric authentication component 300 locates the fingerprint template associated with the smartcard's 200 serial number and transmits the template via the external device 212 to the smartcard reader 210. The smartcard reader 210 then transmits the template to the smartcard 200 via the smartcard terminal 211. If the smartcard 200 matches both the transmitted PIN and fingerprint template to its stored PIN and template, it 200 transmits its stored electronic data to the smartcard reader 210 via the smartcard terminal 211, which subsequently transmits the stored electronic data to the biometric authentication component 300 via the external device terminal 212. The biometric authentication component 300 may now use the electronic data stored on the smartcard 200 as necessary.
[23] If the smartcard 200 does not possess "match-on-card" capabilities, the smartcard 200 will only match the transmitted PIN to its stored PIN. It 200 will then transmit the stored fingerprint template to the smartcard reader 210 via the smartcard terminal 211, which in turn transmits the fingerprint template to the biometric authentication component 300 via the external device terminal 212. The biometric authentication component 300 locates the fingerprint template associated with the smartcard's 200 serial number and compares the stored template to the template transmitted from the smartcard 200. If the two match, the biometric authentication component 300 prompts the smartcard reader 210 to transmit its stored electronic data to the smartcard reader 210 via the smartcard terminal 211. The smartcard reader 210 then transmits the stored electronic data to the biometric authentication component 300 via the external device terminal 212. As above, the biometric authentication component 300 may now use the electronic data stored on the smartcard 200 as necessary.
[24] Those having ordinary skill in the art will recognize that the precise sequence of steps may be altered such that they result in the same functional outcome. Many improvements, modifications, and additions will be apparent to the skilled artisan without departing from the spirit and scope of the present invention as described herein and defined in the following claims.
[21] The second method of the invention permits an individual to authenticate himself to a BPID Smartcard Security Device 100 he has previously enrolled in. First, the individual places a smartcard 200 into the aperture 102 of the physical enclosure 101 such that the smartcard 200 contacts the smartcard terminal 211 of the reader 210. The individual then activates power to the smartcard-enabled BPID Security Device 101 and the smartcard reader 210 reads the smartcard's serial number. The smartcard reader 210 transmits the serial number to the biometric authentication component 300 using the external device terminals 212. The biometric authentication component 300 verifies that it has previously been enrolled with the specific smartcard 200 and requests the individual to authenticate himself to the biometric authentication component 300 according to its standard procedure. If the biometric authentication component 300 successfully authenticates the individual, the biometric authentication component 300 locates the PIN associated with the smartcard's 200 serial number and transmits the PIN via the external device 212 to the smartcard reader 210.
The smartcard reader 210 then transmits the PIN to the smartcard 200 via the smartcard terminal 211.
[22] If the smartcard 200 possesses "match-on-card" capabilities, i.e. the smartcard is capable of matching fingerprint templates to those stored on the card, the biometric authentication component 300 locates the fingerprint template associated with the smartcard's 200 serial number and transmits the template via the external device 212 to the smartcard reader 210. The smartcard reader 210 then transmits the template to the smartcard 200 via the smartcard terminal 211. If the smartcard 200 matches both the transmitted PIN and fingerprint template to its stored PIN and template, it 200 transmits its stored electronic data to the smartcard reader 210 via the smartcard terminal 211, which subsequently transmits the stored electronic data to the biometric authentication component 300 via the external device terminal 212. The biometric authentication component 300 may now use the electronic data stored on the smartcard 200 as necessary.
[23] If the smartcard 200 does not possess "match-on-card" capabilities, the smartcard 200 will only match the transmitted PIN to its stored PIN. It 200 will then transmit the stored fingerprint template to the smartcard reader 210 via the smartcard terminal 211, which in turn transmits the fingerprint template to the biometric authentication component 300 via the external device terminal 212. The biometric authentication component 300 locates the fingerprint template associated with the smartcard's 200 serial number and compares the stored template to the template transmitted from the smartcard 200. If the two match, the biometric authentication component 300 prompts the smartcard reader 210 to transmit its stored electronic data to the smartcard reader 210 via the smartcard terminal 211. The smartcard reader 210 then transmits the stored electronic data to the biometric authentication component 300 via the external device terminal 212. As above, the biometric authentication component 300 may now use the electronic data stored on the smartcard 200 as necessary.
[24] Those having ordinary skill in the art will recognize that the precise sequence of steps may be altered such that they result in the same functional outcome. Many improvements, modifications, and additions will be apparent to the skilled artisan without departing from the spirit and scope of the present invention as described herein and defined in the following claims.
Claims (57)
We claim,
1. An apparatus comprising:
a biometric sensor configured to receive a biometric input;
a physical enclosure with an aperture, the physical enclosure configured to receive a smartcard through the aperture;
a smartcard reader coupled to the physical enclosure, the smartcard reader being coupled to a smartcard when the smartcard is received in the physical enclosure through the aperture, the smartcard reader being configured to read information from and write information to the smartcard when the smartcard is coupled to the smartcard reader; and a processor disposed within the physical enclosure, the processor coupled to the biometric sensor and the smartcard reader, the processor configured to output a biometric template to the smartcard when the biometric input is authenticated by the processor based on the biometric template and when the smartcard is received in the physical enclosure through the aperture such that the biometric template is authenticated by the smartcard.
a biometric sensor configured to receive a biometric input;
a physical enclosure with an aperture, the physical enclosure configured to receive a smartcard through the aperture;
a smartcard reader coupled to the physical enclosure, the smartcard reader being coupled to a smartcard when the smartcard is received in the physical enclosure through the aperture, the smartcard reader being configured to read information from and write information to the smartcard when the smartcard is coupled to the smartcard reader; and a processor disposed within the physical enclosure, the processor coupled to the biometric sensor and the smartcard reader, the processor configured to output a biometric template to the smartcard when the biometric input is authenticated by the processor based on the biometric template and when the smartcard is received in the physical enclosure through the aperture such that the biometric template is authenticated by the smartcard.
2. The apparatus of claim 1, wherein the physical enclosure is tamper-evident.
3. The apparatus of claim 1, wherein the physical enclosure is tamper-resistant.
4. The apparatus of claim 1, wherein the aperture of the physical enclosure is oriented such that when the physical enclosure receives the smartcard through the aperture, an external surface of the smartcard is visible.
5. The apparatus of claim 1, wherein the smartcard reader and the processor are implemented on an application-specific integrated circuit, such that communications between the smartcard reader and the processor are secure and tamper-resistant.
6. The apparatus of claim 1, wherein the smartcard reader and the processor are configured to communicate using serial communications.
7. The apparatus of claim 1, wherein the smartcard reader and the processor are configured to communicate using a Universal Serial Bus.
8. A method for associating a user with an autonomous, portable apparatus for identifying and authenticating electronic user credentials, comprising the steps of:
a. providing the autonomous, portable apparatus which comprises:
i. a physical enclosure with an aperture for receiving a smartcard;
ii. a reading and writing means for reading and writing to the smartcard, such that when the smartcard is placed into said aperture of said physical enclosure, the smartcard connects to said reading and writing means such that the smartcard can be read or written; and iii. a personal authentication device comprising an authentication means for biometric authentication, a wireless transceiver, a communication means for communicating with said reading and writing means, and a processing means for electronic data processing and storage, located inside said enclosure and coupled to said reading and writing means;
b. placing the smartcard into said aperture formed in said physical enclosure of the autonomous, portable apparatus;
c. using said reading and writing means to read a serial number assigned to said smartcard;
d. transmitting said serial number to said personal authentication device;
e. verifying that said personal authentication device has not previously enrolled said smartcard using said serial number;
f. connecting said personal authentication device to an external enrollment station;
g. using said external enrollment station to acquire a biometric template and a personal identification number from the user;
h. transmitting said biometric template and said personal identification number to said personal authentication device;
i. storing said biometric template and said personal identification number to said personal authentication device;
j. associating said serial number with said biometric template and said personal identification number in said personal authentication device;
k. transmitting said biometric template and said personal identification number from said personal authentication device to said smartcard; and l. storing said user's biometric template and personal identification number on said smartcard.
a. providing the autonomous, portable apparatus which comprises:
i. a physical enclosure with an aperture for receiving a smartcard;
ii. a reading and writing means for reading and writing to the smartcard, such that when the smartcard is placed into said aperture of said physical enclosure, the smartcard connects to said reading and writing means such that the smartcard can be read or written; and iii. a personal authentication device comprising an authentication means for biometric authentication, a wireless transceiver, a communication means for communicating with said reading and writing means, and a processing means for electronic data processing and storage, located inside said enclosure and coupled to said reading and writing means;
b. placing the smartcard into said aperture formed in said physical enclosure of the autonomous, portable apparatus;
c. using said reading and writing means to read a serial number assigned to said smartcard;
d. transmitting said serial number to said personal authentication device;
e. verifying that said personal authentication device has not previously enrolled said smartcard using said serial number;
f. connecting said personal authentication device to an external enrollment station;
g. using said external enrollment station to acquire a biometric template and a personal identification number from the user;
h. transmitting said biometric template and said personal identification number to said personal authentication device;
i. storing said biometric template and said personal identification number to said personal authentication device;
j. associating said serial number with said biometric template and said personal identification number in said personal authentication device;
k. transmitting said biometric template and said personal identification number from said personal authentication device to said smartcard; and l. storing said user's biometric template and personal identification number on said smartcard.
9. A method for authenticating a user to a device using an autonomous, portable apparatus for identifying and authenticating electronic user credentials, comprising the steps of:
a. providing the autonomous, portable apparatus which comprises:
i. a physical enclosure with an aperture for receiving a smartcard;
ii. a reading and writing means for reading and writing to the smartcard, such that when the smartcard is placed into said aperture of said physical enclosure, the smartcard connects to said reading and writing means such that the smartcard can be read or written; and iii. a personal authentication device comprising an authentication means for biometric authentication, a wireless transceiver, a communication means for communicating with said reading and writing means, and a processing means for electronic data processing and storage, located inside said enclosure and coupled to said reading and writing means;
b. placing the smartcard into said aperture formed in said physical enclosure of the autonomous, portable apparatus;
c. acquiring a biometric sample and a personal identification number from the user using the personal authentication device;
d. comparing said acquired biometric sample and personal identification number to a previously stored biometric sample and personal identification number; and e. authenticating the user if said acquired biometric sample and personal identification number match said previously stored biometric sample and personal identification number.
a. providing the autonomous, portable apparatus which comprises:
i. a physical enclosure with an aperture for receiving a smartcard;
ii. a reading and writing means for reading and writing to the smartcard, such that when the smartcard is placed into said aperture of said physical enclosure, the smartcard connects to said reading and writing means such that the smartcard can be read or written; and iii. a personal authentication device comprising an authentication means for biometric authentication, a wireless transceiver, a communication means for communicating with said reading and writing means, and a processing means for electronic data processing and storage, located inside said enclosure and coupled to said reading and writing means;
b. placing the smartcard into said aperture formed in said physical enclosure of the autonomous, portable apparatus;
c. acquiring a biometric sample and a personal identification number from the user using the personal authentication device;
d. comparing said acquired biometric sample and personal identification number to a previously stored biometric sample and personal identification number; and e. authenticating the user if said acquired biometric sample and personal identification number match said previously stored biometric sample and personal identification number.
10. The method of claim 9 wherein the comparison step is performed on the smartcard.
11. The method of claim 9, wherein the comparison step is performed on the personal authentication device.
12. An apparatus, comprising:
a housing configured to receive at least a portion of a smartcard;
a biometric sensor coupled to the housing, the biometric sensor configured to receive a biometric input;
a memory coupled to the housing, the memory configured to store a biometric template; and a processor disposed within the housing, the processor coupled to the biometric sensor and the memory, the processor configured to send to the smartcard an identifier associated with the smartcard when the biometric input is authenticated by the processor based on the biometric template and when at least the portion of the smartcard is received within the housing such that the apparatus is authenticated by the smartcard based on the identifier.
a housing configured to receive at least a portion of a smartcard;
a biometric sensor coupled to the housing, the biometric sensor configured to receive a biometric input;
a memory coupled to the housing, the memory configured to store a biometric template; and a processor disposed within the housing, the processor coupled to the biometric sensor and the memory, the processor configured to send to the smartcard an identifier associated with the smartcard when the biometric input is authenticated by the processor based on the biometric template and when at least the portion of the smartcard is received within the housing such that the apparatus is authenticated by the smartcard based on the identifier.
13. The apparatus of claim 12, wherein the processor is configured to produce the identifier based on a serial number of the smartcard.
14. The apparatus of claim 12, wherein the processor is configured to inhibit communication with the smartcard when the smartcard has not been previously enrolled with the processor.
15. The apparatus of claim 12, wherein the processor is configured to send to the smartcard the biometric template such that the biometric template is authenticated by the smartcard based on a biometric template stored at the smartcard.
16. A method, comprising:
storing, at a personal identification device, a biometric template of a user such that the biometric template is inhibited from being output from the personal identification device;
receiving, at the personal identification device, a smartcard associated with the user;
authenticating, at the personal identification device, a biometric input of the user based on the biometric template of the user;
sending, from the personal identification device, to the smartcard an identifier associated with the smartcard when the biometric input of the user is authentic such that the smartcard is configured to authenticate the personal identification device based on the identifier; and outputting electronic data stored at the smartcard after the receiving, after the authenticating, and after the sending.
storing, at a personal identification device, a biometric template of a user such that the biometric template is inhibited from being output from the personal identification device;
receiving, at the personal identification device, a smartcard associated with the user;
authenticating, at the personal identification device, a biometric input of the user based on the biometric template of the user;
sending, from the personal identification device, to the smartcard an identifier associated with the smartcard when the biometric input of the user is authentic such that the smartcard is configured to authenticate the personal identification device based on the identifier; and outputting electronic data stored at the smartcard after the receiving, after the authenticating, and after the sending.
17. The method of claim 16, further comprising:
authenticating, at the personal identification device, the smartcard based on a serial number of the smartcard before the outputting.
authenticating, at the personal identification device, the smartcard based on a serial number of the smartcard before the outputting.
18. The method of claim 16, further comprising:
receiving from the smartcard a biometric template of the user; and authenticating the biometric template of the user received from the smartcard based on the biometric template of the user stored at the personal identification device.
receiving from the smartcard a biometric template of the user; and authenticating the biometric template of the user received from the smartcard based on the biometric template of the user stored at the personal identification device.
19. The method of claim 16, further comprising:
verifying that the smartcard has been previously enrolled with the personal identification device before the outputting.
verifying that the smartcard has been previously enrolled with the personal identification device before the outputting.
20. The method of claim 16, further comprising:
receiving from the smartcard electronic data of the user after the authenticating.
receiving from the smartcard electronic data of the user after the authenticating.
21. A method, comprising:
receiving, at a personal identification device, a smartcard;
receiving, at the personal identification device, from the smartcard, a biometric template of the user stored at the smartcard;
authenticating, at the personal identification device, the biometric template of the user stored at the smartcard based on a biometric template of the user stored at the personal identification device; and prompting the smartcard to transmit electronic data stored at the smartcard when the biometric template of the user is authentic, the stored biometric template being stored at the personal identification device.
receiving, at a personal identification device, a smartcard;
receiving, at the personal identification device, from the smartcard, a biometric template of the user stored at the smartcard;
authenticating, at the personal identification device, the biometric template of the user stored at the smartcard based on a biometric template of the user stored at the personal identification device; and prompting the smartcard to transmit electronic data stored at the smartcard when the biometric template of the user is authentic, the stored biometric template being stored at the personal identification device.
22. The method of claim 21, further comprising:
receiving, at the personal identification device, a biometric input of the user; and authenticating, at the personal identification device, the biometric input of the user received at the personal identification device based on one of the stored biometric template or the biometric template received from the smartcard before the authenticating the biometric template.
receiving, at the personal identification device, a biometric input of the user; and authenticating, at the personal identification device, the biometric input of the user received at the personal identification device based on one of the stored biometric template or the biometric template received from the smartcard before the authenticating the biometric template.
23. The method of claim 21, further comprising:
sending to the smartcard an identifier associated with a serial number associated with the smartcard such the identifier is authenticated by the smartcard.
sending to the smartcard an identifier associated with a serial number associated with the smartcard such the identifier is authenticated by the smartcard.
24. The method of claim 21, further comprising:
verifying, before the authenticating, the smartcard has been previously enrolled with the personal identification device based on a serial number associated with the smartcard.
verifying, before the authenticating, the smartcard has been previously enrolled with the personal identification device based on a serial number associated with the smartcard.
25. The apparatus of claim 1, wherein the biometric template is a first biometric template, the apparatus further comprising:
a memory coupled to the processor, the memory configured to store the first biometric template, the processor being configured to produce a second biometric template based on the biometric input and configured to authenticate the second biometric template based on the first biometric template, the processor configured to authenticate the biometric input when the second biometric template is authenticated.
a memory coupled to the processor, the memory configured to store the first biometric template, the processor being configured to produce a second biometric template based on the biometric input and configured to authenticate the second biometric template based on the first biometric template, the processor configured to authenticate the biometric input when the second biometric template is authenticated.
26. The apparatus of claim 12, wherein the processor is configured to produce a biometric template based on the biometric input.
27. The apparatus of claim 12, wherein the processor is configured to inhibit the biometric template from being output outside of the apparatus.
28. The apparatus of claim 12, wherein the processor is configured to produce the biometric template.
29. The method of claim 16, further comprising:
producing, at the personal identification device, the biometric template of the user.
producing, at the personal identification device, the biometric template of the user.
30. The method of claim 16, wherein the biometric template is a first biometric template, the authenticating includes:
producing, at the personal identification device, a second biometric template based on the biometric input; and authenticating, at the personal identification device, the second biometric template based on the first biometric template.
producing, at the personal identification device, a second biometric template based on the biometric input; and authenticating, at the personal identification device, the second biometric template based on the first biometric template.
31. The method of claim 21, further comprising:
producing, at the personal identification device, the stored biometric template before the authenticating.
producing, at the personal identification device, the stored biometric template before the authenticating.
32. An apparatus including:
a housing defining an aperture configured to receive therein a removable card having an integrated circuit, the integrated circuit storing electronic data including a first user identification credential;
a biometric sensor at least partially disposed in the housing, the biometric sensor configured to receive a biometric input;
a memory disposed in the housing, the memory configured to store a plurality of identification credentials;
a processor disposed within the housing, the processor configured to determine whether the first user identification credential of the integrated circuit matches a first identification credential from the plurality of identification credentials;
and a transceiver coupled to and at least partially disposed in the housing, the transceiver configured to wirelessly transmit the first identification credential from the plurality of identification credentials to an external device when (1) the card is received in the aperture of the housing, (2) the processor determined that the first user identification credential of the integrated circuit matches the first identification credential from the plurality of identification credentials, and (3) at least one of the card or the processor has determined that the biometric input matches a stored biometric input.
a housing defining an aperture configured to receive therein a removable card having an integrated circuit, the integrated circuit storing electronic data including a first user identification credential;
a biometric sensor at least partially disposed in the housing, the biometric sensor configured to receive a biometric input;
a memory disposed in the housing, the memory configured to store a plurality of identification credentials;
a processor disposed within the housing, the processor configured to determine whether the first user identification credential of the integrated circuit matches a first identification credential from the plurality of identification credentials;
and a transceiver coupled to and at least partially disposed in the housing, the transceiver configured to wirelessly transmit the first identification credential from the plurality of identification credentials to an external device when (1) the card is received in the aperture of the housing, (2) the processor determined that the first user identification credential of the integrated circuit matches the first identification credential from the plurality of identification credentials, and (3) at least one of the card or the processor has determined that the biometric input matches a stored biometric input.
33. The apparatus of claim 32, wherein the processor is configured to prevent transmission to the external device of the first identification credential from the plurality of identification credentials if at least one of (1) the processor determined that the first user identification credential of the integrated circuit does not match the first identification credential from the plurality of identification credentials, or (2) the at least one of the card or the processor determined that the received biometric input does not match the stored biometric input.
34. The apparatus of claim 32, further comprising:
a reader coupled to the housing such that at least a portion of the reader is operatively coupled with the integrated circuit when the card is received in the received portion of the housing.
a reader coupled to the housing such that at least a portion of the reader is operatively coupled with the integrated circuit when the card is received in the received portion of the housing.
35. The apparatus of claim 32, wherein the integrated circuit is a first integrated circuit, the apparatus further comprising:
a reader coupled to the housing and configured to read electronic data stored on the first integrated circuit, the reader configured to transmit the first user identification credential of the electronic data of the first integrated circuit to the memory such that the first user identification credential is stored in memory as the first identification credential of the plurality of identification credentials, the reader is configured to read electronic data stored on a second integrated circuit different than the first integrated circuit, the electronic data of the second integrated circuit including a second user identification credential, the reader is configured to transmit the second user identification credential to the memory such that the second user identification credential is stored in memory as a second stored identification credential of the plurality of identification credentials.
a reader coupled to the housing and configured to read electronic data stored on the first integrated circuit, the reader configured to transmit the first user identification credential of the electronic data of the first integrated circuit to the memory such that the first user identification credential is stored in memory as the first identification credential of the plurality of identification credentials, the reader is configured to read electronic data stored on a second integrated circuit different than the first integrated circuit, the electronic data of the second integrated circuit including a second user identification credential, the reader is configured to transmit the second user identification credential to the memory such that the second user identification credential is stored in memory as a second stored identification credential of the plurality of identification credentials.
36. The apparatus of claim 32, further comprising:
a reader disposed within the housing and configured to write at least one of the stored biometric input or the received biometric input to the integrated circuit when (1) the card is received in the aperture of the housing, and (2) the processor has determined that the first user identification credential of the integrated circuit matches the first identification credential of the plurality of identification credentials.
a reader disposed within the housing and configured to write at least one of the stored biometric input or the received biometric input to the integrated circuit when (1) the card is received in the aperture of the housing, and (2) the processor has determined that the first user identification credential of the integrated circuit matches the first identification credential of the plurality of identification credentials.
37. The apparatus of claim 32, further comprising:
a reader disposed within the housing and configured to transmit the first identification credential to the card when (1) the card is received in the aperture of the housing, and (2) the at least one of the card or the processor determined that the received biometric input matches the stored biometric input.
a reader disposed within the housing and configured to transmit the first identification credential to the card when (1) the card is received in the aperture of the housing, and (2) the at least one of the card or the processor determined that the received biometric input matches the stored biometric input.
38. The apparatus of claim 32, wherein the biometric input is stored in memory, the processor is configured to determine whether the received biometric input matches the stored biometric input.
39. The apparatus of claim 32, wherein the stored biometric input is received from the integrated circuit of the card.
40. The apparatus of claim 32, wherein the stored biometric input is received via the biometric sensor.
41. The apparatus of claim 32, wherein the first identification credential from the plurality of identification credentials is associated with at least one of a license, a passport, an identification card, a building or facility access code, a credit card, wireless payment information, a user name, or a password.
42. A method, comprising:
receiving at least a portion of a removable card in an aperture defined by a housing, the card having an integrated circuit including an identification credential associated with a user, the housing at least partially enclosing a biometric sensor, a reader, and a memory;
reading the identification credential of the integrated circuit using the reader;
storing the identification credential of the integrated circuit within the memory, the memory being configured to store a plurality of identification credentials, each identification credential from the plurality of identification credentials being associated with the user; and electronically associating a biometric input associated with the user with at least a portion of the identification credentials from the plurality of identification credentials, the portion of the identification credentials from the plurality of identification credentials including the identification credential of the integrated circuit.
receiving at least a portion of a removable card in an aperture defined by a housing, the card having an integrated circuit including an identification credential associated with a user, the housing at least partially enclosing a biometric sensor, a reader, and a memory;
reading the identification credential of the integrated circuit using the reader;
storing the identification credential of the integrated circuit within the memory, the memory being configured to store a plurality of identification credentials, each identification credential from the plurality of identification credentials being associated with the user; and electronically associating a biometric input associated with the user with at least a portion of the identification credentials from the plurality of identification credentials, the portion of the identification credentials from the plurality of identification credentials including the identification credential of the integrated circuit.
43. The method of claim 42, further comprising:
storing the biometric input associated with the user within the memory.
storing the biometric input associated with the user within the memory.
44. The method of claim 43, wherein the biometric input is received via the biometric sensor.
45. The method of claim 43, further comprising:
electronically associating at least two identification credentials from the plurality of identification credentials with the stored biometric input, the at least two identification credentials including the identification credential of the integrated circuit.
electronically associating at least two identification credentials from the plurality of identification credentials with the stored biometric input, the at least two identification credentials including the identification credential of the integrated circuit.
46. The method of claim 42, further comprising:
determining, before the storing and via a processor disposed within the housing, that the identification credential of the integrated circuit is not stored within the memory.
determining, before the storing and via a processor disposed within the housing, that the identification credential of the integrated circuit is not stored within the memory.
47. The method of claim 42, wherein the card is a first card, the integrated circuit is a first integrated circuit, and the identification credential of the first integrated circuit is a first identification credential, the method further comprising:
receiving at least a portion of a second card in the aperture defined by the housing, the second card having a second integrated circuit including a second identification credential associated with the user;
reading the second identification credential of the second integrated circuit using the reader; and storing the second identification credential within the memory, the plurality of identification credentials including the second identification credential.
receiving at least a portion of a second card in the aperture defined by the housing, the second card having a second integrated circuit including a second identification credential associated with the user;
reading the second identification credential of the second integrated circuit using the reader; and storing the second identification credential within the memory, the plurality of identification credentials including the second identification credential.
48. The method of claim 42, wherein the integrated circuit is operatively coupled with a portion of the reader when the portion of the card is received in the aperture defined by the housing.
49. The method of claim 42, wherein the biometric input is received using the biometric sensor.
50. The method of claim 42, wherein the identification credential is associated with at least one of a license, a passport, an identification card, a building or facility access code, a credit card, wireless payment information, a user name, or a password.
51. A method, comprising:
receiving at least a portion of a removable card in an aperture defined by a housing, the card having an integrated circuit including an identification credential associated with a user, the housing at least partially enclosing a biometric sensor, a reader, and a memory;
reading the identification credential of the integrated circuit using the reader;
determining via a processor disposed within the housing whether the identification credential of the integrated circuit was previously electronically associated with a biometric template;
receiving, via the biometric sensor, a biometric input from the user;
determining via the processor whether the biometric input matches the biometric template; and wirelessly transmitting, via a transceiver disposed within the housing, electronic data associated with the user to an external device if the biometric input is determined to match the biometric template.
receiving at least a portion of a removable card in an aperture defined by a housing, the card having an integrated circuit including an identification credential associated with a user, the housing at least partially enclosing a biometric sensor, a reader, and a memory;
reading the identification credential of the integrated circuit using the reader;
determining via a processor disposed within the housing whether the identification credential of the integrated circuit was previously electronically associated with a biometric template;
receiving, via the biometric sensor, a biometric input from the user;
determining via the processor whether the biometric input matches the biometric template; and wirelessly transmitting, via a transceiver disposed within the housing, electronic data associated with the user to an external device if the biometric input is determined to match the biometric template.
52. The method of claim 51, wherein:
the identification credential of the integrated circuit is a first identification credential of a first integrated circuit, and a plurality of identification credentials is stored within the memory, the plurality of identification credentials is associated with the user, the plurality of identification credentials includes the first identification credential of the first integrated circuit and a second identification credential of a second integrated circuit different than the first integrated circuit.
the identification credential of the integrated circuit is a first identification credential of a first integrated circuit, and a plurality of identification credentials is stored within the memory, the plurality of identification credentials is associated with the user, the plurality of identification credentials includes the first identification credential of the first integrated circuit and a second identification credential of a second integrated circuit different than the first integrated circuit.
53. The method of claim 51, wherein the electronic data includes the identification credential of the integrated circuit.
54. The method of claim 51, wherein the processor is configured to prevent transmission of electronic data associated with the user from at least one of the memory or the integrated circuit to the external device if the biometric input is determined to not match the biometric template
55. The method of claim 51, wherein the receiving the biometric input is subsequent to the determining whether the identification credential of the integrated circuit was previously electronically associated with the biometric template.
56. The method of claim 51, wherein the electronic data wirelessly transmitted to the external device includes electronic data associated with at least one of a license, a passport, an identification card, a building or facility access code, a credit card, wireless payment information, a user name, or a password.
57. The method of claim 51, wherein the biometric input is a fingerprint.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US66504305P | 2005-03-24 | 2005-03-24 | |
US60/665,043 | 2005-03-24 | ||
PCT/US2006/010910 WO2006102625A2 (en) | 2005-03-24 | 2006-03-24 | Biometric identification device with smartcard capabilities |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2592749A1 CA2592749A1 (en) | 2006-09-28 |
CA2592749C true CA2592749C (en) | 2015-02-24 |
Family
ID=37024700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2592749A Active CA2592749C (en) | 2005-03-24 | 2006-03-24 | Biometric identification device with smartcard capabilities |
Country Status (5)
Country | Link |
---|---|
US (9) | US7481364B2 (en) |
EP (1) | EP1861807B1 (en) |
JP (1) | JP4922288B2 (en) |
CA (1) | CA2592749C (en) |
WO (1) | WO2006102625A2 (en) |
Families Citing this family (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7748636B2 (en) * | 2004-11-16 | 2010-07-06 | Dpd Patent Trust Ltd. | Portable identity card reader system for physical and logical access |
CA2592749C (en) | 2005-03-24 | 2015-02-24 | Privaris, Inc. | Biometric identification device with smartcard capabilities |
WO2006118555A1 (en) * | 2005-03-31 | 2006-11-09 | Brian Scott Miller | Biometric control of equipment |
US7356539B2 (en) | 2005-04-04 | 2008-04-08 | Research In Motion Limited | Policy proxy |
US8341411B2 (en) | 2006-08-16 | 2012-12-25 | Research In Motion Limited | Enabling use of a certificate stored in a smart card |
US20080046739A1 (en) * | 2006-08-16 | 2008-02-21 | Research In Motion Limited | Hash of a Certificate Imported from a Smart Card |
US8628019B2 (en) * | 2007-01-03 | 2014-01-14 | Actividentity, Inc. | Configurable digital badge holder |
JP2010518789A (en) * | 2007-02-14 | 2010-05-27 | カバ・アクチェンゲゼルシャフト | System and portable device for transmission of identification signals |
US8674804B2 (en) | 2007-03-01 | 2014-03-18 | Deadman Technologies, Llc | Control of equipment using remote display |
US7946483B2 (en) * | 2007-03-01 | 2011-05-24 | Deadman Technologies, Llc | Biometric control of equipment |
US8362873B2 (en) * | 2007-03-01 | 2013-01-29 | Deadman Technologies, Llc | Control of equipment using remote display |
CA2695439A1 (en) | 2007-07-12 | 2009-01-15 | Innovation Investments, Llc | Identity authentication and secured access systems, components, and methods |
US10783514B2 (en) * | 2007-10-10 | 2020-09-22 | Mastercard International Incorporated | Method and apparatus for use in personalizing identification token |
JPWO2009128333A1 (en) * | 2008-04-14 | 2011-08-04 | 日本電気株式会社 | Wireless communication terminal |
US8522326B2 (en) * | 2008-05-30 | 2013-08-27 | Motorola Mobility Llc | System and method for authenticating a smart card using an authentication token transmitted to a smart card reader |
US8370640B2 (en) | 2008-12-01 | 2013-02-05 | Research In Motion Limited | Simplified multi-factor authentication |
EP2587400B1 (en) * | 2008-12-01 | 2017-02-15 | BlackBerry Limited | Simplified multi-factor authentication |
EP2199992A1 (en) * | 2008-12-19 | 2010-06-23 | Gemalto SA | Secure activation before contactless banking smart card transaction |
US7690032B1 (en) | 2009-05-22 | 2010-03-30 | Daon Holdings Limited | Method and system for confirming the identity of a user |
EP2731039A1 (en) | 2009-12-18 | 2014-05-14 | Uwe Peter Braun | External device, method for the verification of an access authorisation and computer system |
CA2690784A1 (en) * | 2010-01-22 | 2011-07-22 | Spqkumar Inc. | Network and method for data input, storage and retrieval |
US8819792B2 (en) | 2010-04-29 | 2014-08-26 | Blackberry Limited | Assignment and distribution of access credentials to mobile communication devices |
US9489669B2 (en) | 2010-12-27 | 2016-11-08 | The Western Union Company | Secure contactless payment systems and methods |
US8988187B2 (en) * | 2011-01-13 | 2015-03-24 | Hong Kong Applied Science And Technology Research Institute Co., Ltd. | Proximity based biometric identification systems and methods |
US8598981B2 (en) | 2011-02-18 | 2013-12-03 | Tore Etholm Idsøe | Key fob with protected biometric sensor |
WO2013002903A2 (en) * | 2011-06-29 | 2013-01-03 | Alclear, Llc | System and method for user enrollment in a secure biometric verification system |
TWI560616B (en) * | 2011-08-02 | 2016-12-01 | Corning Inc | Biometric-enabled smart card |
GB2501318A (en) * | 2012-04-20 | 2013-10-23 | Powa Technologies Ltd | Smart-card reader device with encrypted data transmission to a mobile device |
USD740797S1 (en) * | 2012-05-23 | 2015-10-13 | Isaac S. Daniel | Slideable cover with biometric verification means for a communication device |
US20140078303A1 (en) * | 2012-09-17 | 2014-03-20 | Jeremy Keith MATTERN | System and Method for Implementing Pass Control using an Automated Installation Entry Device |
US9094388B2 (en) | 2013-05-01 | 2015-07-28 | Dmitri Tkachev | Methods and systems for identifying, verifying, and authenticating an identity |
US9218473B2 (en) * | 2013-07-18 | 2015-12-22 | Suprema Inc. | Creation and authentication of biometric information |
CN104881667B (en) * | 2014-02-28 | 2019-08-09 | 阿里巴巴集团控股有限公司 | A kind of extracting method and device of characteristic information |
CN105278828A (en) * | 2014-06-17 | 2016-01-27 | 艾尔希格(开曼)股份有限公司 | Method of triggering authentication mode of an electronic device |
WO2016073202A1 (en) | 2014-11-04 | 2016-05-12 | Intelligent Technologies International, Inc. | Smartcard |
US10037528B2 (en) | 2015-01-14 | 2018-07-31 | Tactilis Sdn Bhd | Biometric device utilizing finger sequence for authentication |
US10395227B2 (en) | 2015-01-14 | 2019-08-27 | Tactilis Pte. Limited | System and method for reconciling electronic transaction records for enhanced security |
US9607189B2 (en) | 2015-01-14 | 2017-03-28 | Tactilis Sdn Bhd | Smart card system comprising a card and a carrier |
US20160364795A1 (en) * | 2015-06-10 | 2016-12-15 | Mastercard International Incorporated | Systems and methods for extending credit to small/medium-sized enterprises |
JP6682816B2 (en) * | 2015-11-16 | 2020-04-15 | 富士通株式会社 | Secret information storage method, information processing terminal, and secret information storage program |
US10044710B2 (en) | 2016-02-22 | 2018-08-07 | Bpip Limited Liability Company | Device and method for validating a user using an intelligent voice print |
WO2018007774A1 (en) * | 2016-07-06 | 2018-01-11 | EdgeConneX, Inc. | System for virtualizing and centralizing the security guard functions of authorization and authentication of entrants at unmanned sites |
US11074582B2 (en) | 2016-09-23 | 2021-07-27 | Apple Inc. | Secure element having multiple users |
US10516538B2 (en) | 2016-11-01 | 2019-12-24 | Netcomm Inc. | System and method for digitally signing documents using biometric data in a blockchain or PKI |
US10984304B2 (en) | 2017-02-02 | 2021-04-20 | Jonny B. Vu | Methods for placing an EMV chip onto a metal card |
US10282651B2 (en) * | 2017-03-23 | 2019-05-07 | Idex Asa | Sensor array system selectively configurable as a fingerprint sensor or data entry device |
CN110580102B (en) * | 2018-04-12 | 2021-09-24 | Oppo广东移动通信有限公司 | Screen lightening method and device, mobile terminal and storage medium |
CN112106392A (en) * | 2018-05-03 | 2020-12-18 | 瑞典爱立信有限公司 | Device registration using serialized applications |
EP3608813A4 (en) * | 2018-05-29 | 2020-07-22 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Verification system, electronic device, verification method, computer-readable storage medium, and computer apparatus |
GB2575087A (en) * | 2018-06-28 | 2020-01-01 | Zwipe As | Biometric Enrolment |
US11527107B1 (en) * | 2018-06-29 | 2022-12-13 | Apple Inc. | On the fly enrollment for facial recognition |
USD956760S1 (en) * | 2018-07-30 | 2022-07-05 | Lion Credit Card Inc. | Multi EMV chip card |
CN111292455B (en) * | 2020-03-05 | 2021-05-18 | 深圳市君利信达科技有限公司 | Customs gate detection system based on face and fingerprint identification |
CN116386187B (en) * | 2023-06-02 | 2023-08-29 | 星汉智能科技股份有限公司 | Access control method, intelligent access control system, server and storage medium |
Family Cites Families (114)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US652985A (en) * | 1900-01-02 | 1900-07-03 | John Herbert Walker | Syringe, injector, &c. |
AUPQ055999A0 (en) * | 1999-05-25 | 1999-06-17 | Silverbrook Research Pty Ltd | A method and apparatus (npage01) |
JP2664972B2 (en) * | 1987-10-02 | 1997-10-22 | ランジット セナナヤケ、ダヤ | Personal identification system |
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
US5131038A (en) * | 1990-11-07 | 1992-07-14 | Motorola, Inc. | Portable authentification system |
US6850252B1 (en) * | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US5526428A (en) * | 1993-12-29 | 1996-06-11 | International Business Machines Corporation | Access control apparatus and method |
US5469506A (en) * | 1994-06-27 | 1995-11-21 | Pitney Bowes Inc. | Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic |
US5805719A (en) * | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US6154879A (en) * | 1994-11-28 | 2000-11-28 | Smarttouch, Inc. | Tokenless biometric ATM access system |
US6950810B2 (en) * | 1994-11-28 | 2005-09-27 | Indivos Corporation | Tokenless biometric electronic financial transactions via a third party identicator |
US5615277A (en) * | 1994-11-28 | 1997-03-25 | Hoffman; Ned | Tokenless security system for authorizing access to a secured computer system |
US6366682B1 (en) * | 1994-11-28 | 2002-04-02 | Indivos Corporation | Tokenless electronic transaction system |
US6269348B1 (en) * | 1994-11-28 | 2001-07-31 | Veristar Corporation | Tokenless biometric electronic debit and credit transactions |
US5870723A (en) * | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
US5591949A (en) * | 1995-01-06 | 1997-01-07 | Bernstein; Robert J. | Automatic portable account controller for remotely arranging for payment of debt to a vendor |
US5594227A (en) * | 1995-03-28 | 1997-01-14 | Microsoft Corporation | System and method for protecting unauthorized access to data contents |
US6070796A (en) | 1995-08-21 | 2000-06-06 | Sirbu; Cornel | Conditional access method and device |
US5818029A (en) * | 1995-10-03 | 1998-10-06 | Intermart Systems | Method and apparatus for connecting PCMCIA cards to computer interfaces |
CH690048A5 (en) * | 1995-11-28 | 2000-03-31 | C Sam S A En Formation C O Jue | Safety device controlling access to a computer or a network terminal. |
US6219793B1 (en) * | 1996-09-11 | 2001-04-17 | Hush, Inc. | Method of using fingerprints to authenticate wireless communications |
US6181803B1 (en) * | 1996-09-30 | 2001-01-30 | Intel Corporation | Apparatus and method for securely processing biometric information to control access to a node |
US6268788B1 (en) * | 1996-11-07 | 2001-07-31 | Litronic Inc. | Apparatus and method for providing an authentication system based on biometrics |
US6367017B1 (en) * | 1996-11-07 | 2002-04-02 | Litronic Inc. | Apparatus and method for providing and authentication system |
US6598023B1 (en) * | 1996-11-27 | 2003-07-22 | Diebold, Incorporated | Automated banking machine system using internet address customer input |
US6901382B1 (en) * | 1996-11-27 | 2005-05-31 | Diebold, Incorporated | Automated banking machine and system |
US6901154B2 (en) * | 1997-04-16 | 2005-05-31 | Activcard Ireland Limited | Method of detecting authorised biometric information sensor |
US5991408A (en) * | 1997-05-16 | 1999-11-23 | Veridicom, Inc. | Identification and security using biometric measurements |
US5920640A (en) * | 1997-05-16 | 1999-07-06 | Harris Corporation | Fingerprint sensor and token reader and associated methods |
US6016476A (en) * | 1997-08-11 | 2000-01-18 | International Business Machines Corporation | Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security |
GB2329497B (en) * | 1997-09-19 | 2001-01-31 | Ibm | Method for controlling access to electronically provided services and system for implementing such method |
US6611681B2 (en) * | 1997-09-26 | 2003-08-26 | Daniel A. Henderson | Method and apparatus for an improved call interrupt feature in a cordless telephone answering device |
US6084968A (en) * | 1997-10-29 | 2000-07-04 | Motorola, Inc. | Security token and method for wireless applications |
DK0950229T3 (en) * | 1997-11-07 | 2001-04-09 | Swisscom Mobile Ag | Method, system and arrangement for determining the authenticity of persons |
US6185316B1 (en) * | 1997-11-12 | 2001-02-06 | Unisys Corporation | Self-authentication apparatus and method |
US6490680B1 (en) * | 1997-12-04 | 2002-12-03 | Tecsec Incorporated | Access control and authorization system |
US6041410A (en) * | 1997-12-22 | 2000-03-21 | Trw Inc. | Personal identification fob |
US6038666A (en) * | 1997-12-22 | 2000-03-14 | Trw Inc. | Remote identity verification technique using a personal identification device |
US6618806B1 (en) * | 1998-04-01 | 2003-09-09 | Saflink Corporation | System and method for authenticating users in a computer network |
US6167517A (en) * | 1998-04-09 | 2000-12-26 | Oracle Corporation | Trusted biometric client authentication |
US6880750B2 (en) * | 1998-04-17 | 2005-04-19 | Randolph M. Pentel | Remote ordering device |
EP1074158B1 (en) * | 1998-04-23 | 2008-09-10 | Siemens Home and Office Communication Devices GmbH & Co. KG | Radio equipment with enhanced user authentication possibilities |
US6484260B1 (en) * | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6353889B1 (en) * | 1998-05-13 | 2002-03-05 | Mytec Technologies Inc. | Portable device and method for accessing data key actuated devices |
WO1999060483A1 (en) * | 1998-05-21 | 1999-11-25 | Equifax Inc. | System and method for authentication of network users |
US6219439B1 (en) * | 1998-07-09 | 2001-04-17 | Paul M. Burger | Biometric authentication system |
US6870946B1 (en) * | 1998-08-06 | 2005-03-22 | Secugen Corporation | Compact optical fingerprint capturing and recognition system |
US6636973B1 (en) * | 1998-09-08 | 2003-10-21 | Hewlett-Packard Development Company, L.P. | Secure and dynamic biometrics-based token generation for access control and authentication |
EP0992953A3 (en) * | 1998-10-08 | 2004-06-02 | Canon Kabushiki Kaisha | A user programmable smart card interface system |
ATE292933T1 (en) * | 1998-10-12 | 2005-04-15 | St Microelectronics Nv | PROTECTIVE HOUSING FOR A FINGERPRINT SENSOR |
US6532298B1 (en) * | 1998-11-25 | 2003-03-11 | Iridian Technologies, Inc. | Portable authentication device and method using iris patterns |
GB2344670B (en) * | 1998-12-12 | 2003-09-03 | Ibm | System, apparatus and method for controlling access |
US6671808B1 (en) | 1999-01-15 | 2003-12-30 | Rainbow Technologies, Inc. | USB-compliant personal key |
US6317834B1 (en) * | 1999-01-29 | 2001-11-13 | International Business Machines Corporation | Biometric authentication system with encrypted models |
US6898577B1 (en) * | 1999-03-18 | 2005-05-24 | Oracle International Corporation | Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts |
US6529885B1 (en) | 1999-03-18 | 2003-03-04 | Oracle Corporation | Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts |
JP2000276445A (en) * | 1999-03-23 | 2000-10-06 | Nec Corp | Authentication method and device using biometrics discrimination, authentication execution device, and recording medium recorded with authentication program |
US6615264B1 (en) * | 1999-04-09 | 2003-09-02 | Sun Microsystems, Inc. | Method and apparatus for remotely administered authentication and access control |
US6282304B1 (en) * | 1999-05-14 | 2001-08-28 | Biolink Technologies International, Inc. | Biometric system for biometric input, comparison, authentication and access control and method therefor |
US6957768B1 (en) * | 1999-05-25 | 2005-10-25 | Silverbrook Research Pty Ltd | Computer system control via interface surface |
US6886104B1 (en) * | 1999-06-25 | 2005-04-26 | Cross Match Technologies | Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface |
US6681034B1 (en) * | 1999-07-15 | 2004-01-20 | Precise Biometrics | Method and system for fingerprint template matching |
US6609198B1 (en) * | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US6719200B1 (en) * | 1999-08-06 | 2004-04-13 | Precise Biometrics Ab | Checking of right to access |
US6728881B1 (en) * | 1999-10-01 | 2004-04-27 | The United States Of America As Represented By The Secretary Of The Army | Fingerprint and signature identification and authorization card and pen |
US6443359B1 (en) * | 1999-12-03 | 2002-09-03 | Diebold, Incorporated | Automated transaction system and method |
US6735695B1 (en) * | 1999-12-20 | 2004-05-11 | International Business Machines Corporation | Methods and apparatus for restricting access of a user using random partial biometrics |
US6901155B2 (en) * | 1999-12-23 | 2005-05-31 | National University Of Singapore | Wavelet-enhanced automated fingerprint identification system |
US6871287B1 (en) * | 2000-01-21 | 2005-03-22 | John F. Ellingson | System and method for verification of identity |
US6668332B1 (en) * | 2000-02-15 | 2003-12-23 | International Business Machines Corporation | Functional clock observation controlled by JTAG extensions |
JP2001236324A (en) * | 2000-02-24 | 2001-08-31 | Fujitsu Ltd | Portable electronic device with individual authenticating function by biometric information |
JP2003527906A (en) * | 2000-03-23 | 2003-09-24 | クロス マッチ テクノロジーズ, インコーポレイテッド | Piezoelectric identification device and its application |
US6775776B1 (en) * | 2000-06-27 | 2004-08-10 | Intel Corporation | Biometric-based authentication in a nonvolatile memory device |
JP2002063141A (en) * | 2000-08-23 | 2002-02-28 | Hitachi Ltd | Method for maintaining personal identification device by biological information |
US6766040B1 (en) * | 2000-10-02 | 2004-07-20 | Biometric Solutions, Llc | System and method for capturing, enrolling and verifying a fingerprint |
US6819219B1 (en) * | 2000-10-13 | 2004-11-16 | International Business Machines Corporation | Method for biometric-based authentication in wireless communication for access control |
WO2002057701A1 (en) * | 2000-11-09 | 2002-07-25 | Michaels Of Oregon Co. | Handgun holster |
US6871193B1 (en) * | 2000-11-29 | 2005-03-22 | Verizon Corporate Services Group | Method and system for partitioned service-enablement gateway with utility and consumer services |
DE60037898T2 (en) * | 2000-12-22 | 2009-01-22 | Ford Global Technologies, LLC, Dearborn | Remote control and communication system for use in vehicles and key fob unit therefor |
US6871784B2 (en) * | 2001-02-07 | 2005-03-29 | Trijay Technologies International Corporation | Security in mag-stripe card transactions |
US6959874B2 (en) * | 2001-02-23 | 2005-11-01 | Bardwell William E | Biometric identification system using biometric images and personal identification number stored on a magnetic stripe and associated methods |
US6848052B2 (en) * | 2001-03-21 | 2005-01-25 | Activcard Ireland Limited | High security personalized wireless portable biometric device |
US6877097B2 (en) * | 2001-03-21 | 2005-04-05 | Activcard, Inc. | Security access method and apparatus |
US6850147B2 (en) * | 2001-04-02 | 2005-02-01 | Mikos, Ltd. | Personal biometric key |
US20020145507A1 (en) * | 2001-04-04 | 2002-10-10 | Foster Ronald R. | Integrated biometric security system |
US20020158127A1 (en) * | 2001-04-30 | 2002-10-31 | Pulnix America, Inc. | Matrix code reader |
US6832317B1 (en) | 2001-05-10 | 2004-12-14 | Advanced Micro Devices, Inc. | Personal computer security mechanism |
AU2002318165A1 (en) * | 2001-05-25 | 2002-12-09 | Biometric Informatics Technology, Inc. | Fingerprint recognition system |
WO2003003295A1 (en) * | 2001-06-28 | 2003-01-09 | Trek 2000 International Ltd. | A portable device having biometrics-based authentication capabilities |
US6836843B2 (en) | 2001-06-29 | 2004-12-28 | Hewlett-Packard Development Company, L.P. | Access control through secure channel using personal identification system |
AU2002346107A1 (en) * | 2001-07-12 | 2003-01-29 | Icontrol Transactions, Inc. | Secure network and networked devices using biometrics |
US6758404B2 (en) * | 2001-08-03 | 2004-07-06 | General Instrument Corporation | Media cipher smart card |
US6757411B2 (en) * | 2001-08-16 | 2004-06-29 | Liska Biometry Inc. | Method and system for fingerprint encoding and authentication |
US6985502B2 (en) * | 2001-11-19 | 2006-01-10 | Hewlett-Packard Development Company, L.P. | Time-division multiplexed link for use in a service area network |
US6883709B2 (en) * | 2002-02-12 | 2005-04-26 | Famous Horse, Inc. | Biometric identification and security system associated with cash register |
US6879243B1 (en) * | 2002-02-14 | 2005-04-12 | Penco Products, Inc. | Electronically-controlled locker system |
JP2003317070A (en) * | 2002-04-23 | 2003-11-07 | Ntt Docomo Inc | Ic card, mobile terminal, and access control method |
US6853739B2 (en) * | 2002-05-15 | 2005-02-08 | Bio Com, Llc | Identity verification system |
US7083090B2 (en) | 2002-08-09 | 2006-08-01 | Patrick Zuili | Remote portable and universal smartcard authentication and authorization device |
US20040034784A1 (en) * | 2002-08-15 | 2004-02-19 | Fedronic Dominique Louis Joseph | System and method to facilitate separate cardholder and system access to resources controlled by a smart card |
US20040035939A1 (en) * | 2002-08-21 | 2004-02-26 | Jin-Min Lin | Multifunction memory card reading/writing device |
US6886101B2 (en) * | 2002-10-30 | 2005-04-26 | American Express Travel Related Services Company, Inc. | Privacy service |
US6886096B2 (en) * | 2002-11-14 | 2005-04-26 | Voltage Security, Inc. | Identity-based encryption system |
FR2849945B1 (en) * | 2003-01-10 | 2005-03-11 | Atmel Corp | MEANS FOR COMMUNICATING USB CARDS USING HIGH OR HIGH SPEED TRANSFERS |
US6983882B2 (en) | 2003-03-31 | 2006-01-10 | Kepler, Ltd. | Personal biometric authentication and authorization device |
US20040221174A1 (en) * | 2003-04-29 | 2004-11-04 | Eric Le Saint | Uniform modular framework for a host computer system |
US6888445B2 (en) * | 2003-05-20 | 2005-05-03 | Bradley L. Gotfried | Vehicle identification system |
US6997381B2 (en) * | 2003-12-24 | 2006-02-14 | Michael Arnouse | Dual-sided smart card reader |
US20060115134A1 (en) * | 2004-11-29 | 2006-06-01 | Douglas Kozlay | Protective cover for a biometric sensor |
CA2592749C (en) * | 2005-03-24 | 2015-02-24 | Privaris, Inc. | Biometric identification device with smartcard capabilities |
US7811101B2 (en) * | 2007-03-20 | 2010-10-12 | Kingston Technology Corporation | Retractable memory drive |
US7896247B2 (en) * | 2008-12-01 | 2011-03-01 | Research In Motion Limited | Secure use of externally stored data |
-
2006
- 2006-03-24 CA CA2592749A patent/CA2592749C/en active Active
- 2006-03-24 EP EP06748689A patent/EP1861807B1/en active Active
- 2006-03-24 JP JP2008503250A patent/JP4922288B2/en active Active
- 2006-03-24 WO PCT/US2006/010910 patent/WO2006102625A2/en active Application Filing
- 2006-03-24 US US11/389,387 patent/US7481364B2/en active Active
-
2008
- 2008-10-14 US US12/251,131 patent/US8186580B2/en active Active
-
2012
- 2012-05-29 US US13/482,206 patent/US8708230B2/en active Active
-
2014
- 2014-04-28 US US14/263,349 patent/US9349232B2/en active Active
-
2016
- 2016-05-23 US US15/162,063 patent/US9734317B2/en active Active
-
2017
- 2017-08-14 US US15/676,232 patent/US10296735B2/en active Active
-
2019
- 2019-05-20 US US16/416,924 patent/US20200019683A1/en not_active Abandoned
-
2020
- 2020-10-01 US US17/061,099 patent/US11397800B2/en active Active
-
2022
- 2022-07-25 US US17/872,389 patent/US20230195865A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US8186580B2 (en) | 2012-05-29 |
US20060213982A1 (en) | 2006-09-28 |
US20130026230A1 (en) | 2013-01-31 |
US9734317B2 (en) | 2017-08-15 |
US10296735B2 (en) | 2019-05-21 |
US20180121641A1 (en) | 2018-05-03 |
EP1861807A2 (en) | 2007-12-05 |
US20090095810A1 (en) | 2009-04-16 |
US20210165863A1 (en) | 2021-06-03 |
WO2006102625A3 (en) | 2009-04-09 |
US20230195865A1 (en) | 2023-06-22 |
US7481364B2 (en) | 2009-01-27 |
US9349232B2 (en) | 2016-05-24 |
JP4922288B2 (en) | 2012-04-25 |
CA2592749A1 (en) | 2006-09-28 |
US8708230B2 (en) | 2014-04-29 |
US20160267264A1 (en) | 2016-09-15 |
US20150076224A1 (en) | 2015-03-19 |
JP2008535061A (en) | 2008-08-28 |
EP1861807A4 (en) | 2009-11-18 |
US20200019683A1 (en) | 2020-01-16 |
WO2006102625A2 (en) | 2006-09-28 |
EP1861807B1 (en) | 2012-11-07 |
US11397800B2 (en) | 2022-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11397800B2 (en) | Biometric identification device and methods of use | |
US6325285B1 (en) | Smart card with integrated fingerprint reader | |
US7793109B2 (en) | Random biometric authentication apparatus | |
Pankanti et al. | Biometrics: The future of identification [guest eeditors' introduction] | |
KR100486062B1 (en) | Biometric certificates | |
US7953670B2 (en) | Biometrically secured identification authentication and card reader device | |
US7278025B2 (en) | Secure biometric verification of identity | |
US20050077348A1 (en) | Intelligent ID card holder | |
US20080028230A1 (en) | Biometric authentication proximity card | |
US20200195636A1 (en) | User authentication based on rfid-enabled identity document and gesture challenge-response protocol | |
JP2009543176A (en) | Traceless biometric identification system and method | |
AU2021351519A1 (en) | Biometric-based identity authentication | |
US20100135542A1 (en) | System and methods for biometric identification on smart devices using multos | |
US7287272B1 (en) | Method, data carrier and system for authentication of a user and a terminal | |
JP2018046330A (en) | Identification information generation device, identification information generation program, and identity confirmation support system | |
JP2023500641A (en) | Off-device biometric enrollment | |
JP2024056394A (en) | Method for updating PIN value of IC card with biometric authentication function | |
HUSSAIN et al. | MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts | |
JPH04315248A (en) | Personal identification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |