Biometric identification network security
First Claim
1. A method for regulating user access in the context of a biometric security system, the method comprising:
- receiving a remotely transmitted data packet, the data packet containing an encryption key;
utilizing a decryption component to decrypt the data packet; and
utilizing the encryption key to encrypt biometric data.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for regulating user access in the context of a biometric security system are disclosed. One method disclosed includes receiving a remotely transmitted data packet containing an encryption key, utilizing a decryption component to decrypt the data packet, and utilizing the encryption component to encrypt biometric data. Another method disclosed includes utilizing a processor, within a client computing device, to perform an encryption function within a biometric security system, wherein the encryption function is incorporated into an authentication process that involves a transfer of biometric information between the client computing device and a remotely implemented server.
-
Citations
21 Claims
-
1. A method for regulating user access in the context of a biometric security system, the method comprising:
-
receiving a remotely transmitted data packet, the data packet containing an encryption key;
utilizing a decryption component to decrypt the data packet; and
utilizing the encryption key to encrypt biometric data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for regulating user access in the context of a biometric security system, the method comprising:
-
receiving a remotely transmitted data packet; and
encrypting a second data packet utilizing an encryption key contained in the first data packet. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method for regulating user access in the context of a biometric security system, the method comprising:
-
providing, within a client computing device, a processor that is implemented as part of a trusted computing environment; and
utilizing the processor to perform an encryption function within the biometric security system, wherein the encryption function is incorporated into an authentication process that involves a transfer of biometric information between the client computing device and a remotely implemented server. - View Dependent Claims (19, 20, 21)
-
Specification