Biometric personal data key (PDK) authentication
First Claim
1. A method comprising:
- detecting a computing device of a user in proximity of a reader device;
establishing a secure communication link between the reader device and the computing device;
responsive to a successful biometric verification of the user based on comparing scan data from a biometric scan performed by a biometric scanner of the computing device to biometric data of a legitimate user stored in a storage element of the computing device, receiving from the computing device over the secure communication link an identifier code stored in the storage element of the computing device, the identifier code uniquely identifying the computing device;
sending the identifier code to a trusted authority server for authenticating the identifier code;
receiving a message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code; and
responsive to receiving the message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code, allowing the reader device to complete a transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an authentication unit. The integrated device stores biometric data of a user and a plurality of codes and other data values comprising a device ID code uniquely identifying the integrated device and a secret decryption value in a tamper proof format, and when scan data is verified by comparing the scan data to the biometric data, wirelessly sends one or more codes and other data values including the device ID code. The authentication unit receives and sends the one or more codes and the other data values to an agent for authentication, and receives an access message from the agent indicating that the agent successfully authenticated the one or more codes and other data values and allows the user to access an application.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting a computing device of a user in proximity of a reader device; establishing a secure communication link between the reader device and the computing device; responsive to a successful biometric verification of the user based on comparing scan data from a biometric scan performed by a biometric scanner of the computing device to biometric data of a legitimate user stored in a storage element of the computing device, receiving from the computing device over the secure communication link an identifier code stored in the storage element of the computing device, the identifier code uniquely identifying the computing device; sending the identifier code to a trusted authority server for authenticating the identifier code; receiving a message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code; and responsive to receiving the message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code, allowing the reader device to complete a transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
a computerized device including a reader device and a memory including instructions that, when executed by the computerized device, causes the system to; detect a computing device of a user in proximity of the reader device; establish a secure communication link between the reader device and the computing device; responsive to a successful biometric verification of the user based on comparing scan data from a biometric scan performed by a biometric scanner of the computing device to biometric data of a legitimate user stored in a storage element of the computing device, receive from the computing device over the secure communication link an identifier code stored in the storage element of the computing device, the identifier code uniquely identifying the computing device; send the identifier code to a trusted authority server for authenticating the identifier code; receive a message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code; and responsive to receiving the message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code, allow the reader device to complete a transaction. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A computer program product comprising a computer-readable storage device including a computer readable program, wherein the computer readable program when executed on a computerized device including a reader device causes the computerized device to:
- detect a computing device of a user in proximity of the reader device;
establish a secure communication link between the reader device and the computing device;
responsive to a successful biometric verification of the user based on comparing scan data from a biometric scan performed by a biometric scanner of the computing device to biometric data of a legitimate user stored in a storage element of the computing device, receive from the computing device over the secure communication link an identifier code stored in the storage element of the computing device, the identifier code uniquely identifying the computing device;
send the identifier code to a trusted authority server for authenticating the identifier code;
receive a message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code; and
responsive to receiving the message from the trusted authority server indicating that the trusted authority server successfully authenticated the identifier code, allow the reader device to complete a transaction. - View Dependent Claims (18, 19, 20)
- detect a computing device of a user in proximity of the reader device;
Specification