×

IDENTITY AUTHENTICATION AND SECURED ACCESS SYSTEMS, COMPONENTS, AND METHODS

  • US 20120066507A1
  • Filed: 11/23/2011
  • Published: 03/15/2012
  • Est. Priority Date: 07/12/2007
  • Status: Active Grant
First Claim
Patent Images

1. An identity authentication system for one or more users, the system comprising:

  • at least one credential issued to one of the users, wherein the credential includes a security token comprising data encrypted by encryption software with a cryptographic algorithm and encrypted based on a biometric key that is generated from a biometric identifier of the user; and

    at least one decoder including a token interface device, a biometric input device, and a network interface device, and having access to encryption software with the cryptographic algorithm, wherein the biometric input device receives the biometric identifier from the user, the token interface device receives the token from the user credential, the network interface device requests and receives an OTK, the encryption software applies the cryptographic algorithm and the OTK to encrypt the token and the biometric key into a package, and the network interface device transmits the encrypted package; and

    an authentication server including a network interface device, OTK generation software, conversion software, and decryption software with the cryptographic algorithm, wherein the network interface device receives the OTK request, the OTK generation software generates the OTK, the network interface device sends the OTK to the decoder and receives the encrypted package from the decoder, the conversion software converts the biometric identifier to the biometric key, and the decryption software applies the cryptographic algorithm and the biometric key to the token to decrypt and thereby open the token, wherein the token is only openable upon the user presenting the biometric identifier used to encrypt the token so that opening the token authenticates the user, and wherein the token is only openable upon the simultaneous presence of the token, the biometric identifier used to encrypt the token, and the authentication server with the decryption software including the cryptographic algorithm.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×