Verification of authenticity and responsiveness of biometric evidence and/or other evidence
First Claim
1. A system configured to acquire evidence that is to be provided for validation of the authenticity and responsiveness of the evidence, the system comprising:
- a sensor configured to acquire one or more samples;
one or more hardware processors communicatively coupled with the sensor and configured by machine-readable instructions to;
receive a request for evidence from an external client computing platform, the evidence to include one or more samples or a representation of one or more samples, the request for evidence including a challenge;
obtain individual ones of the one or more samples acquired by the sensor;
combine the evidence and a response to the challenge into a signed or encrypted unit of data;
wherein combining the evidence and the response to the challenge into the signed or encrypted unit of data includes;
packing the evidence and the response to the challenge into two or more data blocks;
obtaining hashes of the two or more data blocks; and
obtaining another data block that includes the hashes of the two or more data blocks;
effectuate transmission of the signed or encrypted unit of data to a server by way of a client computing platform communicatively coupled with the sensor.
1 Assignment
0 Petitions
Accused Products
Abstract
Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that acquired the evidence. In some implementations, only a data block containing evidence that is (1) appended with a server-generated challenge (e.g., a nonce) and (2) signed or encrypted by the sensor may validate that the evidence is responsive to a current request and belongs to a current session. In some implementations, trust may be established and/or enhanced due to one or more security features (e.g., anti-spoofing, anti-tampering, and/or other security features) being collocated with the sensor at the actual sampling site.
41 Citations
20 Claims
-
1. A system configured to acquire evidence that is to be provided for validation of the authenticity and responsiveness of the evidence, the system comprising:
-
a sensor configured to acquire one or more samples; one or more hardware processors communicatively coupled with the sensor and configured by machine-readable instructions to; receive a request for evidence from an external client computing platform, the evidence to include one or more samples or a representation of one or more samples, the request for evidence including a challenge; obtain individual ones of the one or more samples acquired by the sensor; combine the evidence and a response to the challenge into a signed or encrypted unit of data;
wherein combining the evidence and the response to the challenge into the signed or encrypted unit of data includes;packing the evidence and the response to the challenge into two or more data blocks; obtaining hashes of the two or more data blocks; and obtaining another data block that includes the hashes of the two or more data blocks; effectuate transmission of the signed or encrypted unit of data to a server by way of a client computing platform communicatively coupled with the sensor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A hardware processor-implemented method, the method comprising:
-
receiving a request for evidence from an external client computing platform, the evidence to include one or more biometric samples or a representation of one or more biometric samples, the request for evidence including a challenge; obtaining individual ones of one or more biometric samples, the one or more biometric samples being acquired by a sensor, the sensor being communicatively coupled with a client computing platform, the client computing platform being configured to receive the request for evidence; combining the evidence and a response to the challenge into a signed or encrypted unit of data;
wherein combining the evidence and the response to the challenge into the signed or encrypted unit of data includes;packing the evidence and the response to the challenge into two or more data blocks; obtaining hashes of the two or more data blocks; and obtaining another data block that includes the hashes of the two or more data blocks; and effectuating transmission of the signed or encrypted unit of data to a server by way of the client computing platform. - View Dependent Claims (19, 20)
-
Specification