Verification of authenticity and responsiveness of biometric evidence and/or other evidence
First Claim
1. A system configured to acquire evidence that is to be provided for validation of the authenticity and responsiveness of the evidence, the system comprising:
- a sensor;
a sample acquisition apparatus communicatively coupled with the sensor and configured to acquire one or more samples; and
one or more hardware processors communicatively coupled with sensor and configured by machine-readable instructions to;
receive a request for evidence from an external client computing platform, the evidence to include one or more samples or a representation of one or more samples, the request for evidence including a challenge;
obtain individual ones of the one or more samples acquired by the sample acquisition apparatus;
combine, at the sensor, the evidence and a response to the challenge into a signed or encrypted unit of data; and
effectuate transmission of the signed or encrypted unit of data from the sensor to a server by way of a client computing platform that is communicatively coupled with the sensor;
wherein combining the evidence and the response to the challenge into the signed or encrypted unit of data includes;
packing the evidence and the response to the challenge into two or more data blocks;
obtaining hashes of the two or more data blocks; and
obtaining another data block that includes the hashes of the two or more data blocks.
1 Assignment
0 Petitions
Accused Products
Abstract
Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that acquired the evidence. In some implementations, only a data block containing evidence that is (1) appended with a server-generated challenge (e.g., a nonce) and (2) signed or encrypted by the sensor may validate that the evidence is responsive to a current request and belongs to a current session. In some implementations, trust may be established and/or enhanced due to one or more security features (e.g., anti-spoofing, anti-tampering, and/or other security features) being collocated with the sensor at the actual sampling site.
-
Citations
35 Claims
-
1. A system configured to acquire evidence that is to be provided for validation of the authenticity and responsiveness of the evidence, the system comprising:
-
a sensor; a sample acquisition apparatus communicatively coupled with the sensor and configured to acquire one or more samples; and one or more hardware processors communicatively coupled with sensor and configured by machine-readable instructions to; receive a request for evidence from an external client computing platform, the evidence to include one or more samples or a representation of one or more samples, the request for evidence including a challenge; obtain individual ones of the one or more samples acquired by the sample acquisition apparatus; combine, at the sensor, the evidence and a response to the challenge into a signed or encrypted unit of data; and effectuate transmission of the signed or encrypted unit of data from the sensor to a server by way of a client computing platform that is communicatively coupled with the sensor; wherein combining the evidence and the response to the challenge into the signed or encrypted unit of data includes; packing the evidence and the response to the challenge into two or more data blocks; obtaining hashes of the two or more data blocks; and obtaining another data block that includes the hashes of the two or more data blocks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system configured to validate the authenticity and responsiveness of evidence acquired by, the system comprising:
-
one or more hardware processors configured by machine-readable instructions to; effectuate transmission of a request for evidence to a sensor by way of an external client computing platform that is communicatively coupled with the sensor, the evidence to include one or more samples or a representation of one or more samples obtained via the sensor, the request for evidence including a challenge; receive a signed or encrypted unit of data, wherein the signed or encrypted unit of data represents a combination of evidence responsive to the request and a response to the challenge included in the request; determine whether the evidence represented in the signed or encrypted unit of data is valid based on a comparison between the response to the challenge represented in the signed or encrypted unit of data and the challenge sent with the request for evidence; determine whether an authenticity of the evidence represented in the signed or encrypted unit of data is verifiable against an exemplar stored remotely from the sensor; and wherein data representing the evidence and data representing the response to the challenge were combined to form the signed or encrypted unit of data at the sensor by operations including; packing the data representing the evidence and the data representing the response to the challenge into two or more data blocks; obtaining hashes of the two or more data blocks; and obtaining another data block that includes the hashes of the two or more data blocks. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A hardware processor-implemented method for validating the authenticity and responsiveness of evidence acquired by a sensor, the method being performed by one or more processors configured by machine-readable instructions, the method comprising:
-
transmitting, using one or more processors, a request for evidence to a sensor, the evidence to include one or more samples or a representation of one or more samples obtained via the sensor, the request including a challenge; receiving, using one or more processors, a signed or encrypted unit of data, wherein the signed or encrypted unit of data represents a combination of evidence responsive to the request and a response to the challenge included in the request, determining, using one or more processors, whether the evidence represented in the signed or encrypted unit of data is valid based on a comparison between the response to the challenge represented in the signed or encrypted unit of data and the challenge sent with the request for evidence; determining, using one or more processors, whether an authenticity of the evidence included in the signed or encrypted unit of data is verifiable against an exemplar stored remotely from the sensor; and wherein the data representing the evidence and the data representing the response to the challenge were combined at the sensor by operations including; packing the data representing the evidence and the data representing the response to the challenge into two or more data blocks; obtaining hashes of the two or more data blocks; and obtaining another data block that includes the hashes of the two or more data blocks. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
Specification