Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Biometric private key infrastructure

A biometric, private key technology, applied in the field of network communication and transactions, can solve security threats, tampering, theft and other problems

Inactive Publication Date: 2005-12-07
AURORA WIRELESS TECH
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in today's network environment, these tags may be accidentally controlled by users, or directly stolen or passwords have been tampered with, and security is easily threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric private key infrastructure
  • Biometric private key infrastructure
  • Biometric private key infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]The present invention will now be described in detail with reference to the accompanying drawings, which are provided as illustrative examples of the invention to enable those skilled in the art to practice the invention. Obviously, the following figures and examples are not meant to limit the scope of the present invention. In addition, some elements of the present invention can be realized partially or entirely using known components, and only those known component parts necessary for understanding the present invention will be described, and detailed descriptions of other parts of these known components will be omitted for the sake of highlight the invention. Furthermore, implementation using certain components in hardware versus other components in software is considered by those skilled in the art to be a design choice, and their combinations described here are by way of example, not limitation. Additionally, the invention includes equivalents to currently and futu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In accordance with an aspect of providing trust and authentication for network communications and transactions, a network infrastructure is provided that employs biometric private keys (BioPKI). Generally, Bio PKI is a unique combination of two software solutions that validate electronic user authentication: a state-of-the-art biometric signature system, and a digital signature for data integrity. The combined solution allows networked businesses and merchants such as financial institutions to ensure that user authentication is conducted in a trusted, secure fashion within standard network environments. In one example implementation, a biometric signature augments standard digital signatures by adding an automated, non-reputable user authentication capability to the existing digital signature process. In contrast to simple verification in a pure biometric-based system or digital signature / certificate environment, BioPKI uses a combination of biometric technology to access private keys in order to create digital signatures based on biometric authentication and industry-standard PKI technologies. In one example, BioPKI utilizes public key cryptography technology to encrypt the biometric signature information for transmission to the BioPKI server. The encryption packet contains several layers of internal information to ensure that the biometric signature is secured and validated prior to accessing the individual's private key.

Description

[0001] Cross-comparison of related applications [0002] This application claims the benefit of U.S. Provisional Patent Application Serial No. 60 / 393,606, filed July 3, 2002, which application is hereby incorporated by reference. technical field [0003] The present invention relates generally to network communications and transactions, and more particularly to trust and authentication of network communications and transactions using a private key infrastructure employing biometric authentication. Background technique [0004] The Internet is increasingly becoming the fundamental platform for commerce and communication on a global scale. This is now a networked world filled with countless computers and electronic networks. In the business world, head office offices, financial institutions, etc. communicate and share sensitive information, resulting in a boom in Internet usage. Businesses, governments, and individuals rely heavily on new technologies to conduct their daily ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/00G06F21/00G06F21/20H04L9/08H04L9/32H04L29/06
CPCH04L63/0861H04L63/12H04L9/3247G06F21/32H04L2209/56H04L9/0866H04L9/3231G06F21/33G06F15/00G06F1/00G06F15/16
Inventor 鲁兹·M.·索托迈克尔·L.·汉金森罗杰·皮尔基
Owner AURORA WIRELESS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products