Method, system, personal security device and computer program product for cryptographically secured biometric authentication
First Claim
1. A method for authorizing access to a Personal Security Device, wherein said Personal Security Device is in functional communication with another device, comprising:
- said Personal Security Device transferring identification information retrieval data to said other device in response to an identified match between biometric data sent by said other device and a predetermined biometric reference, said other device transferring to said Personal Security Device an Identification Information retrieved thanks to at least said identification information retrieval data, and said Personal Security Device authorizing access in response to an identified match between said transferred retrieved Identification Information and a predetermined Identification Information stored in said Personal Security Device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system is used for authorizing access to a Personal Security Device. This system comprises a Personal Security Device 75 and another device 105 which is in functional communication with said Personal Security Device. Said Personal Security Device comprises identification information retrieval data and a biometric authentication application 200 which transfers said identification information retrieval data to said other device 105 in response to an identified match between biometric data sent by said other device and a predetermined biometric reference. Said other device 105 comprises a security executive application 230 for retrieving an Identification Information with at least said identification information retrieval data, thus generating a retrieved Identification Information, and transferring said retrieved Identification Information to said Personal Security Device 75. Said Personal Security Device comprises a security executive application 215 for authorizing access in response to an identified match between said transferred retrieved Identification Information and a predetermined Identification Information stored in said Personal Security Device.
29 Citations
22 Claims
-
1. A method for authorizing access to a Personal Security Device, wherein said Personal Security Device is in functional communication with another device, comprising:
-
said Personal Security Device transferring identification information retrieval data to said other device in response to an identified match between biometric data sent by said other device and a predetermined biometric reference, said other device transferring to said Personal Security Device an Identification Information retrieved thanks to at least said identification information retrieval data, and said Personal Security Device authorizing access in response to an identified match between said transferred retrieved Identification Information and a predetermined Identification Information stored in said Personal Security Device. - View Dependent Claims (2, 3, 7, 8, 9, 11, 12, 13)
-
-
4. A method for authorizing access to a Personal Security Device, wherein said Personal Security Device is in functional communication with another device connected to a biometric device, the method comprising:
-
said biometric device recording biometric data, said other device transferring said biometric data to a biometric authentication application of said Personal Security Device, said biometric authentication application comparing said transferred biometric data with a predetermined biometric reference, said Personal Security Device transferring identification information retrieval data to said other device in response to an identified match between said biometric data and said predetermined biometric reference, said other device retrieving an Identification Information using at least said identification information retrieval data, thus generating a retrieved Identification Information, and transferring said retrieved Identification Information to a security executive application of said Personal Security Device, said security executive application comparing said transferred retrieved Identification Information with a predetermined Identification Information, said security executive application authorizing access to said Personal Security Device in response to an identified match between said transferred retrieved Identification Information and said predetermined Identification Information. - View Dependent Claims (5, 6, 10)
-
-
14. A system for authorizing access to a Personal Security Device, comprising a Personal Security Device and another device which is in functional communication with said Personal Security Device, wherein:
-
said Personal Security Device comprises identification information retrieval data and a biometric authentication application which transfers said identification information retrieval data to said other device in response to an identified match between biometric data sent by said other device and a predetermined biometric reference, said other device comprises a security executive application for retrieving an Identification Information with at least said identification information retrieval data, thus generating a retrieved Identification Information, and transferring said retrieved Identification Information to said Personal Security Device, and said Personal Security Device comprises a security executive application for authorizing access in response to an identified match between said transferred retrieved Identification Information and a predetermined Identification Information stored in said Personal Security Device. - View Dependent Claims (15, 16)
-
-
17. A Personal Security Device comprising:
-
identification information retrieval data, a biometric authentication application which transfers said identification information retrieval data to another device which is in functional communication with said Personal Security Device, in response to an identified match between biometric data sent by said other device and a predetermined biometric reference, an input port for receiving from said other device an Identification Information retrieved by said other device with at least said identification information retrieval data, and a security executive application for authorizing access in response to an identified match between said transferred retrieved Identification Information and a predetermined Identification Information stored in said Personal Security Device. - View Dependent Claims (18, 19)
-
-
20. A computer program product for implementing a method for authorizing access to a Personal Security Device, wherein said Personal Security Device is in functional communication with another device, the computer program product comprising a computer readable medium carrying computer executable instructions that implement the method, wherein the method comprises:
-
said Personal Security Device transferring identification information retrieval data to said other device in response to an identified match between biometric data sent by said other device and a predetermined biometric reference, said Personal Security Device receiving from said other device an Identification Information retrieved thanks to said identification information retrieval data, and said Personal Security Device authorizing access in response to an identified match between said transferred retrieved Identification Information and a predetermined Identification Information stored in said Personal Security Device. - View Dependent Claims (21, 22)
-
Specification