SYSTEMS AND METHODS FOR READING A SECURITY CLEARANCE CARD
First Claim
1. A method for restricting access to a data portion stored on a security clearance card, the method comprising:
- at a card reader, reading at least two data portions from the security clearance card, wherein each data portion is encrypted using a different encryption key;
at a computing system, communicating with the card reader, wherein the computing system has an associated security level indicative of data portions that the computing system is authorized to access from among the at least two data portions;
attempting to decode the at least two data portions via at least one associated security key, wherein data portions that were encrypted with the associated security key are decoded and read by the computing system, while other data portions encrypted using another security key not accessible by the computing system are not decoded by the computing system,wherein access by the computing system is restricted to some data portions read from the security clearance card.
0 Assignments
0 Petitions
Accused Products
Abstract
The security clearance card, system, and method include a card that stores data to verify the identity of an owner of the card. In addition to other types of information, the card stores biometric data of the owner and other identity data. Different portions of the data may be encrypted with different encryption techniques based upon a predetermined level of security assigned to the portions of the stored data. Reader elements are then capable of reading at least a portion of the encrypted data stored on the security clearance card, and receiving at least one biometric from an individual. The biometric stored in the card is then compared with the biometric of the individual presenting the security clearance card to verify that the holder of the card is the owner of the card.
-
Citations
18 Claims
-
1. A method for restricting access to a data portion stored on a security clearance card, the method comprising:
-
at a card reader, reading at least two data portions from the security clearance card, wherein each data portion is encrypted using a different encryption key; at a computing system, communicating with the card reader, wherein the computing system has an associated security level indicative of data portions that the computing system is authorized to access from among the at least two data portions; attempting to decode the at least two data portions via at least one associated security key, wherein data portions that were encrypted with the associated security key are decoded and read by the computing system, while other data portions encrypted using another security key not accessible by the computing system are not decoded by the computing system, wherein access by the computing system is restricted to some data portions read from the security clearance card. - View Dependent Claims (2, 3)
-
-
4. A method for restricting access to a data portion stored on a security clearance card, the method comprising:
-
reading data portions from at least one security clearance card, wherein each security clearance card has data portions including at least a first data portion and a second data portion, and wherein the first data portion is encrypted using a first encryption key, and the second data portion is encrypted using a second encryption key; associating a first computing system with a first security clearance value indicative of data portions the first computing system is authorized to access on the at least one security clearance card, wherein the first computing system has a first security key corresponding to the first encryption key; associating a second computing system with a second security clearance value indicative of data portions the second computing system is authorized to access on the at least one security clearance card, wherein the second computing system has a second security key corresponding to the second encryption key; at the first computing system, attempting to decode the data portions via the first security key, wherein the first computing system decodes the first data portion; and at the second computing system, attempting to decode the data portions via the second security key, wherein the second computing system decodes the second data portion. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for restricting access to a data portion stored on a security clearance card, the method comprising:
-
storing data within the security clearance card, wherein the security clearance card includes at least a first data portion and a second data portion; encoding the first data portion within a data storage medium within the security clearance card, wherein the first data portion has an associated first security level accessible when decoded and read by a corresponding first reading device; and encoding the second data portion within the data storage medium within the security clearance card, wherein the second data portion has an associated second security level accessible when decoded and read by a corresponding second reading device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification