Protecting codes, keys and user credentials with identity and patterns
First Claim
1. A machine comprising:
- a processor system with at least one processor; and
a memory system with one or more machine readable media,the machine readable media storing thereon one or more instructions, which when executed cause the processor system to implement a method including at least acquiring two sets of user identifying data, via different acquisitions;
transforming, by the processor system, the user identifying data, the transforming including at least a mapping of one of the two sets of user identifying data onto another of the two sets of user identifying data,calculating, by the processor system, an invariant from one or more transformations of the user identifying data, the transforming of the user identifying data being a result of the one or more transformations, the invariant being a relationship between two objects that, within a tolerance determined prior to authentication, does not change under the one or more of the transformations between the two objects, andgenerating by the processor system, an authentication key based on the invariant.
0 Assignments
0 Petitions
Accused Products
Abstract
Machine and method of accessing information securely are disclosed. Two sets of user identifying data are acquired. A transformation is established by mapping of one set of data onto another set of data or onto itself. An invariant is generated from the transformation of the user identifying data. An authentication key is generated using the invariant. In an embodiment, the invariant is a relationship between two objects that remains static under transformations between the two objects. In an embodiment, the invariant is a cryptography key. In an embodiment, the transformation(s) help perform an authentication of the user and are executed by digital computer program instructions. In an embodiment, pattern transformation(s) are represented with colors, geometry, or frequencies.
-
Citations
70 Claims
-
1. A machine comprising:
-
a processor system with at least one processor; and a memory system with one or more machine readable media, the machine readable media storing thereon one or more instructions, which when executed cause the processor system to implement a method including at least acquiring two sets of user identifying data, via different acquisitions; transforming, by the processor system, the user identifying data, the transforming including at least a mapping of one of the two sets of user identifying data onto another of the two sets of user identifying data, calculating, by the processor system, an invariant from one or more transformations of the user identifying data, the transforming of the user identifying data being a result of the one or more transformations, the invariant being a relationship between two objects that, within a tolerance determined prior to authentication, does not change under the one or more of the transformations between the two objects, and generating by the processor system, an authentication key based on the invariant. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A machine-implemented method comprising:
-
acquiring two sets of user identifying data, each set of user identifying data being acquired at a different time, transforming, by a machine system, the user identifying data, the transforming including at least applying one or more transformations to the user identifying data, each transformation being a mapping of one set of user identifying data of the two sets of user identifying data onto another set of user identifying data of the two sets of user identifying data, the machine system including at least a processor system having one or more processors and a memory system, and calculating, by the processor system, an invariant from the one or more transformations the invariant being a relationship between two objects that, within a tolerance determined prior to authentication, does not change under transformations between the two objects, where one of the two objects is associated with one of the two sets of user identifying data and another of the two objects is associated with another of the two sets of user identifying data. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63)
-
-
64. A method comprising performing a biometric authentication by a machine system having a processor system and memory system including at least one processor, the authentication including at least
acquiring as part of the authentication a first set of biometric data including at least a first biometric print; -
determining, by a processor, a first set of one or more transformations that transforms the first biometric pattern of the first set of biometric data to a second biometric pattern of a second set of biometric data that is stored in the memory system; determining, by the processor, a second set of one or more transformations that transforms the first biometric pattern of the first set of biometric data to a third biometric print, the third biometric pattern being a biometric pattern of the second set of biometric data that is different than the second biometric print, the third biometric pattern being stored in the memory system; the second set of biometric data having been acquired during an enrollment process in which the user enrolls in the machine system; computing a transformation difference from the first set of one or more transformations and the second set of one or more transformations, therein generating the transformation difference from the biometric authentication, the transformation difference being a transformation that computes a difference between results of the first set of one or more transformations and results of the second set of one or more transformations; deriving, within a tolerance determined prior to authentication, an invariant from the transformation difference; applying a one way method or one-way function at least once to said invariant therein forming an authentication key that depends on the transformation difference generated from the biometric authentication;
the one way method being a method for which computing an inverse is intractable and the one way function being a function for which computing an inverse is intractable. - View Dependent Claims (70)
-
-
65. A method comprising performing a biometric authentication by a machine system having a processor system and memory system including at least one processor, the authentication including at least
determining, by the processor system, a first set of one or more transformations that transforms a first security pattern to a second security pattern; -
determining, by the machine system, a second set of one or more transformations that transforms the first security pattern to a third security pattern; determining, by the machine system, an inverse of the second set of one or more transformations; computing, by the machine system, a third transformation that transforms results from the first set of one or more transformations to results of the second set of one or more transformations; deriving, by the machine system, within a tolerance determined prior to authentication, an invariant from the third transformation; applying, by the machine system, a one way method or one-way function at least once to user data that includes at least the invariant therein forming a security code;
the one way method being a method for which computing an inverse is intractable and the one way function being a function for which computing an inverse is intractable. - View Dependent Claims (66, 67, 68, 69)
-
Specification