[go: up one dir, main page]

ES2572159T3 - Un método de asignación de un secreto a un testigo de seguridad, un método de operación de un testigo de seguridad, un medio de almacenamiento y un testigo de seguridad - Google Patents

Un método de asignación de un secreto a un testigo de seguridad, un método de operación de un testigo de seguridad, un medio de almacenamiento y un testigo de seguridad

Info

Publication number
ES2572159T3
ES2572159T3 ES09175755T ES09175755T ES2572159T3 ES 2572159 T3 ES2572159 T3 ES 2572159T3 ES 09175755 T ES09175755 T ES 09175755T ES 09175755 T ES09175755 T ES 09175755T ES 2572159 T3 ES2572159 T3 ES 2572159T3
Authority
ES
Spain
Prior art keywords
security token
secret
biometric data
assigning
storage medium
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES09175755T
Other languages
English (en)
Inventor
Thomas Dr Hübner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia Germany GmbH
Original Assignee
Morpho Cards GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Morpho Cards GmbH filed Critical Morpho Cards GmbH
Application granted granted Critical
Publication of ES2572159T3 publication Critical patent/ES2572159T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1091Use of an encrypted form of the PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Un método de operación de un testigo de seguridad para realizar una operación criptográfica, el testigo de seguridad (100) que tiene asignado al mismo un secreto cifrado biométricamente, el método de operación del testigo de seguridad que comprende: - recibir unos segundos datos biométricos (108') del rasgo biométrico de la persona y una pseudo identidad (PI) mediante el testigo de seguridad, - almacenar los segundos datos biométricos (108') en el testigo de seguridad, - leer el secreto cifrado biométricamente desde una memoria (112) del testigo de seguridad (100), - descifrar biométricamente el secreto usando los segundos datos biométricos (108') mediante el testigo de seguridad (100), - comparar la pseudo identidad (PI) con un valor de comprobación aleatoria (114) del secreto no cifrado, - usar el secreto para realizar la operación criptográfica en caso de que la pseudo identidad (PI) sea idéntica con el valor de comprobación aleatoria (114) del secreto no cifrado, - borrar el secreto descifrado y los segundos datos biométricos (108').
ES09175755T 2009-11-12 2009-11-12 Un método de asignación de un secreto a un testigo de seguridad, un método de operación de un testigo de seguridad, un medio de almacenamiento y un testigo de seguridad Active ES2572159T3 (es)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP09175755.9A EP2323308B1 (en) 2009-11-12 2009-11-12 A method of assigning a secret to a security token, a method of operating a security token, storage medium and security token

Publications (1)

Publication Number Publication Date
ES2572159T3 true ES2572159T3 (es) 2016-05-30

Family

ID=42026738

Family Applications (1)

Application Number Title Priority Date Filing Date
ES09175755T Active ES2572159T3 (es) 2009-11-12 2009-11-12 Un método de asignación de un secreto a un testigo de seguridad, un método de operación de un testigo de seguridad, un medio de almacenamiento y un testigo de seguridad

Country Status (8)

Country Link
US (1) US20120303966A1 (es)
EP (1) EP2323308B1 (es)
CN (1) CN102640450B (es)
AU (1) AU2010318058B2 (es)
BR (1) BR112012009933A2 (es)
CA (1) CA2780717C (es)
ES (1) ES2572159T3 (es)
WO (1) WO2011057983A1 (es)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2987529B1 (fr) * 2012-02-27 2014-03-14 Morpho Procede de verification d'identite d'un utilisateur d'un terminal communiquant et systeme associe
FR2988196B1 (fr) * 2012-03-19 2014-03-28 Morpho Procede d'authentification d'un individu porteur d'un objet d'identification
US9710664B2 (en) * 2012-09-07 2017-07-18 Amrita Vishwa Vidyapeetham Security layer and methods for protecting tenant data in a cloud-mediated computing network
CN103152157A (zh) * 2013-02-04 2013-06-12 快车科技有限公司 一种安全密保方法及相关装置
CN103178961B (zh) * 2013-02-04 2017-05-17 快车科技有限公司 一种安全信息交互方法及相关装置
CN103200009A (zh) * 2013-04-11 2013-07-10 迪士恩信息科技(上海)有限公司 一种指纹加解密系统及方法
CN105471575B (zh) 2014-09-05 2020-11-03 创新先进技术有限公司 一种信息加密、解密方法及装置
US9967101B2 (en) * 2014-12-04 2018-05-08 Fujitsu Limited Privacy preserving set-based biometric authentication
CN105099712B (zh) * 2015-09-17 2018-11-20 深圳三元色数码科技有限公司 一种基于双码验证的数据加密方法
US9916432B2 (en) 2015-10-16 2018-03-13 Nokia Technologies Oy Storing and retrieving cryptographic keys from biometric data
JP6682816B2 (ja) * 2015-11-16 2020-04-15 富士通株式会社 秘匿情報記憶方法、情報処理端末、及び秘匿情報記憶プログラム
JP6507115B2 (ja) * 2016-03-22 2019-04-24 株式会社日立製作所 1:n生体認証・暗号・署名システム
US10505733B2 (en) * 2017-09-25 2019-12-10 Citrix Systems, Inc. Generating and managing a composite identity token for multi-service use
US20190349363A1 (en) * 2018-05-14 2019-11-14 GM Global Technology Operations LLC Biometric authentication with enhanced biometric data protection
FR3092923B1 (fr) * 2019-02-19 2021-05-21 Sangle Ferriere Bruno Méthode cryptographique de vérification des données
AU2019204711B2 (en) * 2019-03-29 2020-07-02 Advanced New Technologies Co., Ltd. Securely performing cryptographic operations
EP3616360B1 (en) 2019-03-29 2021-07-07 Advanced New Technologies Co., Ltd. Managing cryptographic keys based on identity information
CN111316596B (zh) 2019-03-29 2024-03-01 创新先进技术有限公司 具有身份验证的加密芯片
SG11201908931TA (en) 2019-03-29 2019-10-30 Alibaba Group Holding Ltd Cryptographic key management based on identity information
US10757574B1 (en) * 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
CN118842657B (zh) * 2024-09-20 2024-12-24 北京九章云极科技有限公司 一种智能计算中心的算力资源访问方法及装置

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020124176A1 (en) 1998-12-14 2002-09-05 Michael Epstein Biometric identification mechanism that preserves the integrity of the biometric information
DE19923807A1 (de) * 1999-05-19 2000-11-23 Deutsche Telekom Ag Verfahren zur Erhöhung der Sicherheit bei digitalen Unterschriften
DE19940341A1 (de) * 1999-08-25 2001-03-01 Kolja Vogel Verfahren zum Schutz von Daten
US20030219121A1 (en) * 2002-05-24 2003-11-27 Ncipher Corporation, Ltd Biometric key generation for secure storage
US7882363B2 (en) * 2002-05-31 2011-02-01 Fountain Venture As Biometric authentication system
US20040034784A1 (en) * 2002-08-15 2004-02-19 Fedronic Dominique Louis Joseph System and method to facilitate separate cardholder and system access to resources controlled by a smart card
WO2004055757A1 (en) * 2002-12-18 2004-07-01 Koninklijke Philips Electronics N.V. Key synchronization in a visual cryptographic system
EP1759484A1 (en) * 2004-06-09 2007-03-07 Koninklijke Philips Electronics N.V. Biometric template protection and feature handling
US20060242423A1 (en) * 2005-04-22 2006-10-26 Kussmaul John W Isolated authentication device and associated methods
KR100714303B1 (ko) * 2005-12-09 2007-05-07 한국전자통신연구원 특징점을 은닉하는 지문 인식 방법 및 그 장치
EP1811421A1 (en) * 2005-12-29 2007-07-25 AXSionics AG Security token and method for authentication of a user with the security token
SG139580A1 (en) * 2006-07-20 2008-02-29 Privylink Pte Ltd Method for generating cryptographic key from biometric data
US7930543B2 (en) * 2006-08-18 2011-04-19 Medtronic, Inc. Secure telemetric link
WO2009009788A1 (en) * 2007-07-12 2009-01-15 Jobmann Brian C Identity authentication and secured access systems, components, and methods
US8479013B2 (en) * 2008-01-18 2013-07-02 Photonic Data Security, Llc Secure portable data transport and storage system

Also Published As

Publication number Publication date
CA2780717A1 (en) 2011-05-19
WO2011057983A1 (en) 2011-05-19
CA2780717C (en) 2015-08-11
AU2010318058B2 (en) 2015-07-23
EP2323308A1 (en) 2011-05-18
CN102640450A (zh) 2012-08-15
AU2010318058A1 (en) 2012-05-03
EP2323308B1 (en) 2016-03-23
US20120303966A1 (en) 2012-11-29
BR112012009933A2 (pt) 2016-03-08
CN102640450B (zh) 2015-11-25

Similar Documents

Publication Publication Date Title
ES2572159T3 (es) Un método de asignación de un secreto a un testigo de seguridad, un método de operación de un testigo de seguridad, un medio de almacenamiento y un testigo de seguridad
BR112017002747A2 (pt) método implementado por computador, e, sistema de computador.
AR072975A1 (es) Modulo integrado de seguridad criptografica para un nodo de red
EA201891822A1 (ru) Безопасность персональных устройств с использованием криптографии на основе эллиптических кривых для разделения секрета
BR112018004741A2 (pt) método, e, dispositivo de acesso
MY176966A (en) Biometric template security and key generation
MX2018007696A (es) Metodo y sistema para mejorar la seguridad de una transaccion.
WO2015028772A8 (en) Data encryption and smartcard storing encrypted data
RU2013127641A (ru) Устройство и способ обработки уязвимых данных
BRPI0700267A (pt) método de comunicação entre um roteador e um hospedeiro, roteador para comunicação com um hospedeiro, e, hospedeiro para comunicação com um roteador
BR112018071634A2 (pt) utilização de região isolada de segurança baseada em hardware para impedir pirataria e fraude em dispositivos eletrônicos
EP4236203A3 (en) Data security using request-supplied keys
PE20070934A1 (es) Sistema en un chip seguro
WO2008148784A3 (fr) Procedes et dispositifs cryptographiques de generation pseudo-aleatoire de chiffrement de donnees et de hachage cryptographique d'un message
WO2015157735A3 (en) Content encryption and decryption
JP2013531436A5 (es)
BR112016012359A2 (pt) Método e sistema para transmissão segura de mensagens de serviço de notificação remota para dispositivos móveis sem elementos seguros
WO2014083335A3 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
RU2016137831A (ru) Портативное устройство биометрической идентификации
WO2008105779A3 (en) Secure id checking
SA517381726B1 (ar) إخفاء المعلومات في التشويش
GB201210004D0 (en) Random number distruibution
BR112018013306A2 (pt) ?método e sistema de proteção por senha de cartão bancário?
Wang et al. CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
GB201221469D0 (en) Airport security check system and method therefor