Revocable biometrics with robust distance metrics
First Claim
Patent Images
1. A method for secure revocable identity tokens, comprising the steps of:
- a) capturing a biometric signature having a plurality of feature vectors;
b) transforming each of the plurality of feature vectors into a stable portion and a residual partc) cryptographically encoding the stable portion to form a secured part and simply transforming the residual portion to be the residual part.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques, systems and methods relating to cryptographically secure revocable biometric signatures and identification computed with robust distance metrics are described. Various biometric cryptographically secure revocable transformation approaches are described that support a robust pseudo-distance computation in encoded form, thereby supporting confidence in verification, and which can provide for verification without identification.
54 Citations
21 Claims
-
1. A method for secure revocable identity tokens, comprising the steps of:
-
a) capturing a biometric signature having a plurality of feature vectors; b) transforming each of the plurality of feature vectors into a stable portion and a residual part c) cryptographically encoding the stable portion to form a secured part and simply transforming the residual portion to be the residual part. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for secure revocable identity tokens, comprising the steps of:
-
a) receiving a biometric signature having a plurality of feature vectors; b) transforming each of the plurality of feature vectors and splitting each into a probe secured part and a probe residual part; and c) comparing the probe secured part of one of the plurality of feature vector to a gallery secured part of an associated gallery feature vector. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for secure revocable identification, comprising the steps of:
-
a) receiving a probe biometric signature having a plurality of probe feature vectors; b) transforming each of the plurality of probe vectors into a secured part and a residual part to form a probe identity token; and c) determining a closeness measure between the probe identity token and a gallery identity token. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A secure revocable identification method, comprising the steps of:
-
a) creating a first identity token having a secure part form a biometric signature; and b) creating a second identity token derived from the first identity token without use of the biometric signature, wherein the second identity token is not identical to the first identity token and a transformation from the first identity token increases a potential space associated with the second identity token.
-
Specification