Unlock instant, AI-driven research and patent intelligence for your innovation.

Biometric-based device and system and associated safety system

A biometric and security system technology, applied in the field of improved security equipment, can solve problems such as system tampering and sabotage operations

Inactive Publication Date: 2005-11-30
INTEL CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] these vulnerabilities also expose the system to destructive tampering aimed at disrupting normal operations rather than gaining unauthorized use of those operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric-based device and system and associated safety system
  • Biometric-based device and system and associated safety system
  • Biometric-based device and system and associated safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention provides an autonomous security circuit which maintains secure data in memory which cannot be accessed from outside the security circuit but which can be used to verify data supplied from outside the security circuit. figure 2 One embodiment of the system 2 of the present invention is shown. Host processor 20 may be a non-secure processor, such as the processor in a cell phone that controls the overall cell phone operation. The security circuit 21 is a single integrated circuit providing an autonomous security environment in the system 2 and cannot be accessed from the outside without its permission. Circuitry 21 is capable of controlling any data transmitted to or from circuit 21 . The circuit 21 includes its own embedded processor 22 , so called because this processor is embedded within the perimeter of the security circuit 21 . Processor 22 can also control host interface 28 to host processor 20 and reader interface 24 to biometric reader 23 ....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A biometric-based security circuit in which the user database, processor, and biometric map generation functions are all located on the same integrated circuit whose secure contents are inaccessible from external to the integrated circuit. Biometric data, such as a fingerprint, retina scan, or voiceprint, is taken from a user requesting access to restricted resources. The biometric data is transferred into the integrated circuit, where it is converted to a biometric map and compared with a database of biometric maps stored in a non-volatile memory in the integrated circuit. The stored maps represent pre-authorized users, and a match triggers the security circuit to send a signal to a host processor authorizing the host processor to permit the requesting user access to the restricted resources. The integrated circuit essentially serves as a write-only memory for the secure data, because the secure data and security functions in the integrated circuit are not directly accessible through any pin or port, and therefore cannot be read or monitored through a dedicated security attack. A second non-volatile memory, accessible from external to the integrated circuit, can also be provided in the integrated circuit for holding non-secure data. This second memory has its own interface port, and is isolated from the security-related functions and memory so that secure and non-secure functions are physically isolated from each other and cannot be modified to overcome that isolation.

Description

technical field [0001] The present invention generally pertains to security systems. In particular, it belongs to the category of improved security devices based on the user's biometric characteristics. Background technique [0002] Advances in circuit miniaturization, wireless technology, and battery power have led to the widespread use of portable devices that can access the resources of a large number of distributed systems. One example is the use of cellular telephones, which allow subscribers to access the resources of national and global telephone systems with a device that they can carry with them personally. A typical cell phone allows anyone with the cell phone access to these resources. For larger devices like desktops in a secure domain, making security based on ownership is not a problem. But for small portable devices that are prone to loss or theft, this level of security is not enough. [0003] The normal way to solve this problem is to use a password. Bu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F21/00G06K9/00G07C9/00
CPCG06K9/00973G06F21/86G07C9/00158G06F21/32G07C9/37G06V10/94
Inventor R·哈斯邦J·沃格特J·布里泽克
Owner INTEL CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More