Fingerprint recognition system
First Claim
Patent Images
1. A method of recognizing a fingerprint comprising:
- detecting the fingerprint on a sensor;
receiving a nonce from a host system coupled to the sensor;
generating a hash including the fingerprint and the nonce;
encrypting the hash and the fingerprint using a key;
sending the hash and the fingerprint to the host system;
decrypting the hash and the fingerprint and validating the hash; and
identifying the fingerprint, if the hash was successfully validated.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for fingerprint recognition is provided. A fingerprint is detected on a sensor. The fingerprint is digitized. A digitized background is subtracted from the fingerprint, resulting in a difference print. The difference print is matched with a database of fingerprint templates.
252 Citations
51 Claims
-
1. A method of recognizing a fingerprint comprising:
-
detecting the fingerprint on a sensor;
receiving a nonce from a host system coupled to the sensor;
generating a hash including the fingerprint and the nonce;
encrypting the hash and the fingerprint using a key;
sending the hash and the fingerprint to the host system;
decrypting the hash and the fingerprint and validating the hash; and
identifying the fingerprint, if the hash was successfully validated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
an interface to receive the nonce from the host system;
a decryption logic to decrypt the nonce, the nonce encrypted with a public key of the sensor, and decrypted by a private key of the sensor.
-
-
6. The method of claim 5, wherein the decrypted nonce is used by the host system to authenticate the sensor, and to prevent replay attacks.
-
7. The method of claim 1, wherein the key is one of a plurality of keys.
-
8. The method of claim 7, further comprising:
identifying which of the plurality of keys to use to encrypt the hash and the fingerprint, based on data provided by the host system.
-
9. The method of claim 7, wherein each key may be associated with a service being accessed.
-
10. The method of claim 7, wherein each key may be associated with a particular project or file.
-
11. The method of claim 7, wherein each key may be associated with a particular user.
-
12. The method of claim 11, wherein the fingerprint of the user triggers a selection of the key.
-
13. The method of claim 11, further comprising:
-
receiving a new key;
associating the new key with a particular use; and
when the particular use is invoked, encrypting the hash and the fingerprint with the new key.
-
-
14. The method of claim 13, wherein the particular use is one of the following:
- a particular project, access to a particular file, access to a particular host system.
-
15. The method of claim 14, wherein the particular host system may be remote from the sensor.
-
16. The method of claim 1, wherein the key is a changeable key.
-
17. The method of claim 16, further comprising:
-
requesting authentication from a user; and
receiving a new key from the user after successful authentication.
-
-
18. The method of claim 17, further comprising discarding a previous key after successfully receiving the new key.
-
19. The method of claim 16, wherein the key is changed by an individual.
-
20. The method of claim 16, wherein the key is changed by an organization.
-
21. The method of claim 16, wherein an ability to set the key may be adjusted by an administrator.
-
22. The method of claim 16, further comprising:
prior to using the key, verifying that the key has not yet expired.
-
23. The method of claim 22, further comprising:
prior to the expiration of the key, notifying an appropriate authority that a replacement key should be installed.
-
24. The method of claim 16, wherein the key is a PKI compliant private key public key set.
-
25. A method of claim 1, further comprising:
auto-launching a file, program, or application associated with the fingerprint, after the fingerprint has been successfully validated.
-
26. The method of claim 25, wherein the application is a menu providing options based on the fingerprint.
-
27. The method of claim 26, wherein the menu is an administrative menu providing access to various administrative options.
-
28. The method of claim 25, wherein the application is any software application previously associated with the fingerprint.
-
29. The method of claim 25, wherein the file, program, or application is on a remote device.
-
30. The method of claim 25, wherein the file is a web page remotely accessed.
-
31. The method of claim 25, wherein auto-launching the program comprises auto-launching a password replacement program comprising:
-
recognizing an area available for authentication;
identifying authentication information associated with the area; and
automatically inserting the authentication information into the area, when the fingerprint is validated.
-
-
32. The method of claim 31, wherein the authentication information comprises one or more of the following:
- a name, a handle, a password, a pass phrase, and a code.
-
33. A method of capturing a fingerprint comprising:
-
detecting a finger near a sensor;
turning on the sensor in response to detecting the finger;
capturing the fingerprint;
receiving a nonce from a host system coupled to the sensor;
generating a hash including the fingerprint and the nonce;
sending the hash and the fingerprint to the host system;
validating the hash; and
identifying the fingerprint, if the hash was successfully validated. - View Dependent Claims (34, 36)
detecting infra-red scattering.
-
-
36. The method of claim 33, wherein detecting a finger comprises:
turning on the sensor in response to detecting a finger crossing a beam.
-
35. The method of 33, wherein detecting a finger comprises:
sensing a finger through a capacitive sensor.
-
37. An apparatus comprising:
-
a biometric sensor comprising;
a sensing unit to detect a fingerprint;
an interface to receive a nonce from a host system coupled to the sensor;
a security unit to decrypt the nonce using a key;
a hash generation logic to generate a hash including the fingerprint and the nonce;
the interface to send the hash and the fingerprint to the host system;
the host system comprising;
a security unit to decrypt the hash and the fingerprint and validating the hash; and
a comparator to identify the fingerprint, if the hash was successfully validated. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
an auto-launch logic to automatically launch a program, file, or application upon validating the fingerprint.
-
-
46. The apparatus of claim 45, wherein the application may be a menu providing administrative access to a program.
-
47. The apparatus of claim 45, wherein the application may be an authentication application to automatically place authentication data into an appropriate area, in response to validating the fingerprint.
-
48. A biometric sensor comprising:
-
a sensing unit to detect a fingerprint;
an interface to receive a nonce from a host system coupled to the sensor;
a hash generation logic to generate a hash including the fingerprint and the nonce;
an encryption logic to encrypt the hash and the fingerprint using a key;
the interface to send the encrypted hash and the fingerprint to the host system, the host system to decrypt the hash and the fingerprint, validate the hash, and identify the fingerprint, if the hash was successfully validated. - View Dependent Claims (49, 50, 51)
-
Specification