WO2013066928A3 - Verification of authenticity and responsiveness of biometric evidence and/or other evidence - Google Patents
Verification of authenticity and responsiveness of biometric evidence and/or other evidence Download PDFInfo
- Publication number
- WO2013066928A3 WO2013066928A3 PCT/US2012/062671 US2012062671W WO2013066928A3 WO 2013066928 A3 WO2013066928 A3 WO 2013066928A3 US 2012062671 W US2012062671 W US 2012062671W WO 2013066928 A3 WO2013066928 A3 WO 2013066928A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- evidence
- sensor
- authenticity
- responsiveness
- biometric
- Prior art date
Links
- 230000004043 responsiveness Effects 0.000 title abstract 2
- 238000012795 verification Methods 0.000 title 1
- 238000005070 sampling Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Collating Specific Patterns (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that acquired the evidence. In some implementations, only a data block containing evidence that is (1 ) appended with a server-generated challenge (e.g., a nonce) and (2) signed or encrypted by the sensor may validate that the evidence is responsive to a current request and belongs to a current session. In some implementations, trust may be established and/or enhanced due to one or more security features (e.g., anti-spoofing, anti-tampering, and/or other security features) being collocated with the sensor at the actual sampling site.
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/286,119 US9832023B2 (en) | 2011-10-31 | 2011-10-31 | Verification of authenticity and responsiveness of biometric evidence and/or other evidence |
| US13/286,119 | 2011-10-31 | ||
| US13/308,462 | 2011-11-30 | ||
| US13/308,462 US9160536B2 (en) | 2011-11-30 | 2011-11-30 | Verification of authenticity and responsiveness of biometric evidence and/or other evidence |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2013066928A2 WO2013066928A2 (en) | 2013-05-10 |
| WO2013066928A3 true WO2013066928A3 (en) | 2015-06-11 |
Family
ID=48193016
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2012/062671 WO2013066928A2 (en) | 2011-10-31 | 2012-10-31 | Verification of authenticity and responsiveness of biometric evidence and/or other evidence |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2013066928A2 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040250085A1 (en) * | 2001-07-18 | 2004-12-09 | Oliver Tattan | Distributed network system using biometric authentication access |
| US20050240779A1 (en) * | 2004-04-26 | 2005-10-27 | Aull Kenneth W | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) |
| US20080209226A1 (en) * | 2007-02-28 | 2008-08-28 | Microsoft Corporation | User Authentication Via Biometric Hashing |
| US20080310619A1 (en) * | 2005-04-25 | 2008-12-18 | Scheidt Edward M | Process of Encryption and Operational Control of Tagged Data Elements |
-
2012
- 2012-10-31 WO PCT/US2012/062671 patent/WO2013066928A2/en active Application Filing
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040250085A1 (en) * | 2001-07-18 | 2004-12-09 | Oliver Tattan | Distributed network system using biometric authentication access |
| US20050240779A1 (en) * | 2004-04-26 | 2005-10-27 | Aull Kenneth W | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) |
| US20080310619A1 (en) * | 2005-04-25 | 2008-12-18 | Scheidt Edward M | Process of Encryption and Operational Control of Tagged Data Elements |
| US20080209226A1 (en) * | 2007-02-28 | 2008-08-28 | Microsoft Corporation | User Authentication Via Biometric Hashing |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2013066928A2 (en) | 2013-05-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CA2884005C (en) | Method and system for verifying an access request | |
| WO2010093636A3 (en) | Devices, systems and methods for secure verification of user identity | |
| WO2012023122A3 (en) | Authentication device and system | |
| MX2013001603A (en) | Role-based content rendering. | |
| WO2013126217A3 (en) | Network assisted fraud detection apparatus and methods | |
| IN2014MN01517A (en) | ||
| WO2015056010A3 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
| WO2010011919A3 (en) | Http authentication and authorization management | |
| WO2007116355A3 (en) | Challenge-response authentication of token by means physical uncloneable function | |
| WO2008042871A3 (en) | Methods and apparatus for securely signing on to a website via a security website | |
| WO2012097231A3 (en) | System and method for tamper-resistant booting | |
| MX355189B (en) | User authentication. | |
| WO2012096791A3 (en) | Methods and systems for distributing cryptographic data to authenticated recipients | |
| GB201010546D0 (en) | Method of indentity verification | |
| EP2817757A4 (en) | CONTENT ACTIVATION VIA AUTHENTICATION BASED ON INTERACTION, SYSTEMS AND METHOD | |
| WO2013106688A3 (en) | Authenticating cloud computing enabling secure services | |
| WO2010030516A3 (en) | Ticket-based spectrum authorization and access control | |
| WO2010030515A3 (en) | Ticket-based configuration parameters validation | |
| WO2008146667A1 (en) | Anonymous authenticating system and anonymous authenticating method | |
| EP2565862A4 (en) | Encryption processing system, key generation device, encryption device, decryption device, signature processing system, signature device and verification device | |
| WO2011146305A3 (en) | Extending an integrity measurement | |
| WO2011002189A3 (en) | Fingerprint authentication apparatus having a plurality of fingerprint sensors and method for same | |
| WO2015071770A3 (en) | Systems and methods for fuel dispenser security | |
| WO2013105877A3 (en) | Electronic signature security algorithms | |
| EP2195963A4 (en) | SAFETY MEASURES TO PREVENT UNAUTHORIZED DECRYPTION |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12845283 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12845283 Country of ref document: EP Kind code of ref document: A2 |