System for biometric signal processing with hardware and software acceleration
First Claim
Patent Images
1. A secure system for biometric signal processing, comprising:
- a secure communication protocol configured to localize biometric data, wherein said protocol provides authentication without transmission of said biometric data; and
a key generation function based on a dynamic key generator and static biometric components.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure embedded system that uses cryptographic and biometric signal processing acceleration is described. In one embodiment, the secure embedded system is configured as a wireless pay-point protocol for brick-and-mortar and e-commerce applications in which biometric information is localized and does not require transmission of biometric data for authentication. In one embodiment, a key-generation function uses a dynamic key generator and static biometric components. In one embodiment, an embedded system design methodology provides hardware and software acceleration transparency.
-
Citations
19 Claims
-
1. A secure system for biometric signal processing, comprising:
-
a secure communication protocol configured to localize biometric data, wherein said protocol provides authentication without transmission of said biometric data; and
a key generation function based on a dynamic key generator and static biometric components.
-
-
2. A secure system for biometric signal processing, comprising:
-
a fingerprint image sensor;
a cryptographic module configured to encrypt and decrypt data using a secret key known to said cryptographic hardware accelerator and to an authentication server; and
a communication protocol module configured to receive an authentication vector from said authentication server, verify an identity of said authentication server, and to provide authentication of a user to said authentication server without transmission of biometric data. - View Dependent Claims (3, 4, 5, 6)
-
-
7. A method for providing secure communications, comprising
sending an identification code to a transaction terminal; -
forwarding said identification code and transaction data from said transaction terminal to an authentication server;
generating a first authorization vector;
encrypting at least a portion of said first authorization vector using a first secret key to produce a first encrypted authorization vector;
sending said first encrypted authorization vector to said transaction terminal;
forwarding said first encrypted authorization vector from said transaction terminal to a biometric identification device comprising a biometric identification sensor;
decrypting said first encrypted authorization vector to create a first decrypted authorization vector;
verifying an identity of said authorization server using at least portion of said first decrypted authorization vector;
sensing biometric data using said biometric identification sensor;
examining said biometric data to verify an identity of a user of said biometric identification device;
generating a second authorization vector;
encrypting at least a portion of said second authorization vector using a second secret key to produce a second encrypted authorization vector;
sending said second encrypted authorization vector to said transaction terminal;
forwarding said first encrypted authorization vector from said transaction terminal to said authentication server;
decrypting said first encrypted authorization vector to create a second decrypted authorization vector; and
verifying an identity of said user using at least a portion of said second decrypted authorization vector. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification