Rolling biometric key exchange
First Claim
Patent Images
1. A system comprising:
- at least a first computing device comprising;
a first memory to store instructions; and
first processing circuitry, coupled with the first memory, operable to execute the instructions, that when executed, cause the first processing circuitry to;
receive biological information corresponding to a user via at least one input device;
perform analysis on the biological information;
determine one or more biological characteristics uniquely associated with the user based on the performed analysis;
generate a character string based at least in part on the one or more biological characteristics, wherein the character string comprises a plurality of alphanumeric characters, the alphanumeric characters being space delimited and character delimited such that the space delimitation and the character delimitation uniquely relates to the user;
provide the character string for generating a biometric key;
at least a second computing device comprising;
a second memory to store instructions; and
second processing circuitry, coupled with the second memory, operable to execute the instructions, that when executed, cause the second processing circuitry to;
access or receive the character string;
generate, using the character string, the biometric key based on a cryptographic algorithm;
apply at least one hash function to the biometric key to generate a hashed biometric key;
apply salt to the hashed biometric key to generate a salted and hashed biometric key;
store the salted and hashed biometric key in one or more storage devices; and
change the applied at least one hash function at a predetermined interval in order to rotate, update, or roll the biometric key.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments are generally directed to techniques of generating a unique biometric key, hashing and salting the key, and storing it. Embodiments include techniques to analyze biological information associated with a user and determine one or more biological characteristics from the analyzed information. The biological characteristics may be used to generate a character string unique to the user, which may be used to generate the biometric key based on a cryptographic algorithm. The hash values, salt values, or the hash function may be changed at a predetermined interval.
-
Citations
18 Claims
-
1. A system comprising:
-
at least a first computing device comprising; a first memory to store instructions; and first processing circuitry, coupled with the first memory, operable to execute the instructions, that when executed, cause the first processing circuitry to; receive biological information corresponding to a user via at least one input device; perform analysis on the biological information; determine one or more biological characteristics uniquely associated with the user based on the performed analysis; generate a character string based at least in part on the one or more biological characteristics, wherein the character string comprises a plurality of alphanumeric characters, the alphanumeric characters being space delimited and character delimited such that the space delimitation and the character delimitation uniquely relates to the user; provide the character string for generating a biometric key; at least a second computing device comprising; a second memory to store instructions; and second processing circuitry, coupled with the second memory, operable to execute the instructions, that when executed, cause the second processing circuitry to; access or receive the character string; generate, using the character string, the biometric key based on a cryptographic algorithm; apply at least one hash function to the biometric key to generate a hashed biometric key; apply salt to the hashed biometric key to generate a salted and hashed biometric key; store the salted and hashed biometric key in one or more storage devices; and change the applied at least one hash function at a predetermined interval in order to rotate, update, or roll the biometric key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
generating, via at least a first computing device, a character string based at least in part on one or more biological characteristics of a user, wherein the character string comprises a plurality of alphanumeric characters, the alphanumeric characters being space delimited and character delimited such that the space delimitation and the character delimitation uniquely relates to the user; accessing or receiving, via at least a second computing device, the character string from at least the first computing device; generating, via at least the second computing device, using the character string, the biometric key based on a cryptographic algorithm; applying, via at least the second computing device, at least one hash function to the biometric key to generate a hashed biometric key; applying, via at least the second computing device, salt to the hashed biometric key to generate a salted and hashed biometric key; and changing, via at least the second computing device, the applied at least one hash function at a predetermined interval in order to rotate, update, or roll the biometric key. - View Dependent Claims (12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing computer-readable program code executable by a processor to:
-
access or receive a character string from at least a first computing device, wherein the character string comprises a plurality of alphanumeric characters and is generated by the first computing device based at least in part on one or more biological characteristics of a user, the alphanumeric characters being space delimited and character delimited such that the space delimitation and the character delimitation uniquely relates to the user; generate, using the character string, a biometric key based on a cryptographic algorithm; apply at least one hash function to the biometric key to generate a hashed biometric key; apply salt to the hashed biometric key to generate a salted and hashed biometric key; and change the applied at least one hash function at a predetermined interval in order to rotate, update, or roll the biometric key. - View Dependent Claims (16, 17, 18)
-
Specification