Method for identification

A technology of identification and statistics, applied in the field of transaction processing, can solve problems such as identity abuse

Active Publication Date: 2006-11-08
CISCO SYST INT R L
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Additionally, capturing the required DC and private key often involves entering a personal code or password, which is subject to "sniffing" and hacking, and when that password or code gets into the hands of a plagiarist, the private key can be captured by others , the corresponding identity may be abused

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identification
  • Method for identification
  • Method for identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention is discussed below by describing preferred embodiments and referring to the accompanying drawings. However, a person skilled in the art will realize other applications and modifications within the scope of the invention as defined in the appended independent claims.

[0020] According to a preferred embodiment of the present invention, biometric uniqueness and PKI robustness and reliability are combined for conferencing applications.

[0021] The field of biometrics includes all human patterns that are individually unique and identifiable. The most common patterns used for identification are fingerprints, face patterns and irises. The great advantage of biometrics is that unique patterns are always carried and attached to the body and remain constant throughout life.

[0022] According to one aspect of the invention, iris recognition is used to identify participants in a video conference. Iris recognition itself combines computer vision, pattern...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to conferencing and data recording, in particular to providing secured and verified transactions by means of biometrics. The uniqueness of biometrics is combined with the robustness and reliability of PKI for use in conference applications. The invention is about identifying an individual from a biometric pattern, like the iris of the individual's eye, by means of an iris recognition system. The recognition system then provides the identity of the individual, which is further used to provide secure and reliable digital actions or verifications like authentication, signing and encryption.

Description

technical field [0001] The present invention relates to conferencing and data recording, and more particularly to providing secure and authenticated transactions through biometrics. Background technique [0002] Video conferencing systems are now widely used as an alternative to personal communication and meetings. As a result, more information that was previously kept in closed rooms now needs to be exchanged between distant locations. This introduces greater challenges involving security and personal identification. However, as more meetings and talks are captured and presented as multimedia data streams (as in video conferencing), this opens up the possibility of verbal communication and verbal agreements for documentation techniques. [0003] However, for such a document to be legally valid, there must be a trusted authentication system connected to the meeting. The most commonly used trusted system in digital communication is the PKI (Private Key Infrastructure) syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/32H04L29/06
CPCG06F21/32H04L63/0823H04L63/0861H04L63/12H04L9/321H04L9/3231H04L9/3263H04L2209/56
Inventor H·萨根
Owner CISCO SYST INT R L
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products