Authorized anonymous authentication
First Claim
1. A method for processing data comprising:
- receiving a first biometric data and a first personal key;
processing the first biometric data and the first personal key through an irreversible cryptographic algorithm to form a first processed data;
receiving a second biometric data and a second personal key;
processing the second biometric data and the second personal key through the irreversible cryptographic algorithm to form a second processed data;
comparing the second processed data to the first processed data; and
generating a signal pertaining to the comparison of the second processed data to the first processed data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, program and system for processing data is disclosed. The method, program and system comprising the steps of: (a) receiving (e.g., during an enrollment process) a first biometric data and a first personal key, (b) processing the first biometric data and the first personal key through an irreversible cryptographic algorithm, sometimes after: (i) generating one or more variants from the first biometric data, (ii) processing the first personal key through a reversible cryptographic algorithm, and (iii) adding salt to the first biometric data or first personal key, (c) receiving (e.g., during an authentication process) a second biometric data and a second personal key, (d) processing the second biometric data and the second personal key through the irreversible cryptographic algorithm, (e) comparing the second processed data to the first processed data, and (f) generating a signal pertaining to the comparison of the second processed data to the first processed data, such as: (i) a confirmation reflecting authentication when the second processed data matches the first processed data (sometimes allowing access to a facility or system) or (ii) a denial reflecting no confirmation when the second processed data does not match the first processed data.
-
Citations
58 Claims
-
1. A method for processing data comprising:
-
receiving a first biometric data and a first personal key;
processing the first biometric data and the first personal key through an irreversible cryptographic algorithm to form a first processed data;
receiving a second biometric data and a second personal key;
processing the second biometric data and the second personal key through the irreversible cryptographic algorithm to form a second processed data;
comparing the second processed data to the first processed data; and
generating a signal pertaining to the comparison of the second processed data to the first processed data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for processing data comprising:
-
receiving biometric data and a personal key;
processing the biometric data and the personal key through an irreversible cryptographic algorithm to form a processed data; and
comparing the processed data to secondary data. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. For a system for processing data and a computer readable medium containing program instructions for execution by a computer for performing the method for processing data comprising:
-
receiving a first biometric data and a first personal key;
processing the first biometric data and the first personal key through an irreversible cryptographic algorithm to form a first processed data;
receiving a second biometric data and a second personal key;
processing the second biometric data and the second personal key through the irreversible cryptographic algorithm to form a second processed data;
comparing the second processed data to the first processed data; and
generating a signal pertaining to the comparison of the second processed data to the first processed data. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. For a system for processing data and a computer readable medium containing program instructions for execution by a computer for performing the method for processing data comprising:
-
receiving biometric data and a personal key;
processing the biometric data and the personal key through an irreversible cryptographic algorithm to form a processed data; and
comparing the processed data to secondary data. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
Specification