×

Trusted biometric device

  • US 7,502,938 B2
  • Filed: 07/24/2003
  • Issued: 03/10/2009
  • Est. Priority Date: 07/25/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for enhancing the security of informational interactions with a biometric device, comprising:

  • pre-establishing an encryption relationship between a computing device and the biometric device, wherein the computing device and biometric device include separate but related encryption components and the biometric device encryption component is implemented as firmware and decrypts information encrypted by the computing device encryption component;

    generating a session packet, wherein generating a session packet comprises generating a session number, generating a session time stamp, obtaining a session key, and storing the session number, the session time stamp, and the session key in the session packet;

    maintaining a record of the session number, the session time stamp, and the session key in a database associated with the computing device;

    encrypting the session packet utilizing the computing device encryption component and transmitting it to the biometric device;

    receiving a biometric information packet from the biometric device, decrypting it with an encryption key that is complimentarily related to the session key, and making a determination as to whether or not to utilize a collection of biometric data contained in the decrypted biometric information packet, wherein making a determination comprises comparing a session number received with or as part of the biometric information packet to the record of the session number and evaluating the session time stamp to determine whether the biometric information packet was received within a predetermined time period;

    wherein pre-establishing, generating, maintaining, encrypting, and receiving enhance the security of informational interactions between the biometric device that collects the collection of biometric data and the computing device that selectively utilizes the collection of biometric data; and

    wherein the method is performed in the consecutive order of pre-establishing, generating, maintaining, encrypting, and receiving.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×