System and method for authenticated and privacy preserving biometric identification systems
First Claim
1. A method for uniquely identifying a human or non-human object via biometric analysis, comprising:
- generating a first user biometric (UB) from a plurality of data bits of information stored on a first server on an biometric system including one or more servers and one or more biometric scanners used to collect physical biometric information from a human or non-human object, wherein the physical biometric information collected from the human or non-human object is stored as the plurality of data bits of information on the one or more servers on the biometric system;
encoding authorization information defining a set of privileges previously granted to the human or non-human objects for a security infrastructure into the generated first UB via an application;
generating an Identification and Verification Template (IVT) from the generated first UB via the application;
generating a dependency vector from the IVT via the application, wherein the dependency vector is generated with a lossy transformation of information stored in the generated first UB, wherein the IVT does not include complete information from the generated first UB but does allow for verification of the human or non-human object when the dependency vector generated from the IVT is accessed a later time.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for the identification of users and objects using biometric techniques is disclosed. This invention describes a biometric based identification and authorization systems which do not require the incorporation of an on-line database of stored complete biometrics for the security infrastructure. In order to remove the connectivity requirements, an off-line biometric system is achieved by incorporating an identity verification template (IVT) on a storage device/token (e g, magnetic strip or smart-card) during the user'"'"'s registration which provides for a reliable storage medium; however, there are no security requirements required of the token even to protect the privacy of the stored biometric. The IVT does not contain complete information of the user'"'"'s biometric but allows for the verification of the user when that user later provides a biometric reading. To deal with errors that may be introduced into later scans of the biometric (for example at the time of verification) error correcting techniques, well known in the art of communication and error control systems, are incorporated into the system. The system is also usable in the online model. Moreover, it may also be used to enable cryptographic operations by being used to partially compose or encrypt private keys for cryptographic operation.
-
Citations
6 Claims
-
1. A method for uniquely identifying a human or non-human object via biometric analysis, comprising:
-
generating a first user biometric (UB) from a plurality of data bits of information stored on a first server on an biometric system including one or more servers and one or more biometric scanners used to collect physical biometric information from a human or non-human object, wherein the physical biometric information collected from the human or non-human object is stored as the plurality of data bits of information on the one or more servers on the biometric system; encoding authorization information defining a set of privileges previously granted to the human or non-human objects for a security infrastructure into the generated first UB via an application; generating an Identification and Verification Template (IVT) from the generated first UB via the application; generating a dependency vector from the IVT via the application, wherein the dependency vector is generated with a lossy transformation of information stored in the generated first UB, wherein the IVT does not include complete information from the generated first UB but does allow for verification of the human or non-human object when the dependency vector generated from the IVT is accessed a later time. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification