Using biometrics as an encryption key
First Claim
Patent Images
1. A method of accessing files on a computer, comprising:
- scanning a human body part to obtain information of said human body part that is indicative of at least one characteristic of the human body part;
receiving information indicative of a value known to the user, wherein said value has been entered by a user into the computer, and wherein said value identifies a portion of said scanned human body part among the whole scanned human body part;
based on both said information indicative of said body part, and also on said value, using said computer for obtaining a cryptographic key, by using only said portion of said scanned human body part identified by said received value to carry out at least a portion of said obtaining, and wherein said cryptographic key is used to enable a cryptographic operation which includes at least one of encryption or decryption of at least one file, on the computer; and
using said cryptographic key to carry out at least one of encryption and/or decryption of at least one file on the computer.
5 Assignments
0 Petitions
Accused Products
Abstract
An image of an biometric part is used as encryption or decryption key. The biometric part image is obtained, and items within the biometric part are analyzed. Relationships between those parts are determined, e.g. ratios between different parameters of different parts. Those ratios are then used to form the key. A sequence of biometric information can used in which case both the information itself and the sequence are used to form to the key.
-
Citations
25 Claims
-
1. A method of accessing files on a computer, comprising:
-
scanning a human body part to obtain information of said human body part that is indicative of at least one characteristic of the human body part; receiving information indicative of a value known to the user, wherein said value has been entered by a user into the computer, and wherein said value identifies a portion of said scanned human body part among the whole scanned human body part; based on both said information indicative of said body part, and also on said value, using said computer for obtaining a cryptographic key, by using only said portion of said scanned human body part identified by said received value to carry out at least a portion of said obtaining, and wherein said cryptographic key is used to enable a cryptographic operation which includes at least one of encryption or decryption of at least one file, on the computer; and using said cryptographic key to carry out at least one of encryption and/or decryption of at least one file on the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising;
-
a first scanning part that operates to scan a human body part and obtain information indicative of characteristics of said human body part; a computer, including an input device, receiving information indicative of a value entered by a user into the computer and said computer also storing plural files therein, said computer running a routine that operates based on said information indicative of said body part, and also on said value to obtain a cryptographic key which is used to carry out an a cryptographic operation, wherein said value that is entered by said user identifies only a portion of said scanned human body part, and said routine carries out said encryption only if said value properly identifies said portion of said scanned human body part, including at least one of encryption or decryption of at least one of said files on the computer, and to use said cryptographic key to carry out at least one of encryption and/or decryption of said at least one file on the computer. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method, comprising:
-
scanning a human body part to obtain first information therefrom that uniquely represents the scanned body part; receiving second information indicative of a value known to the user; forming third information from one portion of said first information, said one portion being along a different reference than said first information, and forming fourth information from another portion of said first information, said another portion being along a different reference than said first information; and obtaining a cryptographic key based on all of said second information, said third information, and said fourth information; and using said cryptographic key to carry out one of an encryption of information or a decryption of information on a computer. - View Dependent Claims (24, 25)
-
Specification