[go: up one dir, main page]

WO2018231713A1 - Dispositifs sécurisés pouvant être portés par l'utilisateur assurant l'authentification et la validation de stockage et de transmission de données - Google Patents

Dispositifs sécurisés pouvant être portés par l'utilisateur assurant l'authentification et la validation de stockage et de transmission de données Download PDF

Info

Publication number
WO2018231713A1
WO2018231713A1 PCT/US2018/036927 US2018036927W WO2018231713A1 WO 2018231713 A1 WO2018231713 A1 WO 2018231713A1 US 2018036927 W US2018036927 W US 2018036927W WO 2018231713 A1 WO2018231713 A1 WO 2018231713A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
wearable devices
data
authentication
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2018/036927
Other languages
English (en)
Inventor
Daniel Maurice Lerner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2018231713A1 publication Critical patent/WO2018231713A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G04HOROLOGY
    • G04GELECTRONIC TIME-PIECES
    • G04G21/00Input or output devices integrated in time-pieces
    • G04G21/02Detectors of external physical values, e.g. temperature
    • G04G21/025Detectors of external physical values, e.g. temperature for measuring physiological data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/321Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3226Use of secure elements separate from M-devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the technical field comprises cyber security.
  • the present disclosure further relates to functional, user-wearable devices that transmit, receive, store, and may temporarily contain data using securitization techniques to protect as well as detect and allow only the proper user(s) of the data. Users of these devices are provided with authentication and validation security, even when the devices are not in use.
  • the present invention describes devices, methods, and systems for authenticating not only the identity of one or more users, but the ability to obfuscate data that is sent to, from, and held within these user-wearable devices.
  • smartwatches which are elaborate computer enabled electronic devices designed to be worn on a wrist. Their ubiquitous use today most likely has its initial roots in military and espionage needs. Although they generally incorporate timekeeping functions, this has become only a small fraction of current smartwatch capabilities. In addition to timekeeping, the user now has the ability to perform consumer purchases and with the invention of credit and debit cards, is able to transact business on an electronic basis as never before.
  • Debit cards draw from a positive account balance maintained by the user and require verification of identification, usually a personal identification number (PIN) to complete a purchase.
  • PIN personal identification number
  • Smart Cards are another recent transaction device that also requires a personal
  • Smart Cards like debit cards, execute purchases from a positive account balance but the balance is maintained in the card itself. Additions to the card balance must be properly purchased and, typically, Smart Cards have safeguards against an illicit account increase.
  • a reliable means of determining the identity of a potential user of a Smart Card, and thus whether that person is an authorized user, is by the use of biometric data identification.
  • Biometric data is data taken from the measurement of some characteristic peculiar to an individual.
  • a digitized thumbprint is an example of biometric data.
  • Iris scans, speech pattern scans or various body temperatures, pH or even electrical characteristics are biometric data that can be used for validating the authenticity of an individual or groups of individuals.
  • a device that reads biometric data scans the relevant measurement of the candidate for identification.
  • the attached system compares the scanned data with data stored in the Smart Card. A match of data sets is then sufficient for identification.
  • a more recent implementation of such a scheme is the use of a thumbprint scanner which can read the user's thumbprint and determine whether it compares favorably with a stored thumbprint. If the user's data does not compare favorably, the system to which the identifying device is connected refuses to allow access to either on-board data or a network or, in some cases, a purchase.
  • An iris scanner or a speech pattern reader functions similarly, though may be somewhat more difficult to implement. Systems using biometrics often still require physical contact between a user and a system and the system can be bulky and
  • user-wearable electronic devices utilizing wireless transactions.
  • These devices include devices that comprises a housing that houses a wireless communication device, one or more electronic circuits, a power source, a display device and a biometric data reading device. While enabled as a timepiece or performing other functions suitable to a user-wearable device (apparatus), the device can establish wireless communication with a counterpart communication apparatus in order to conduct a transaction.
  • the biometric data reading device can read the user's applicable biometric data and then transmit a user identity validation and the wireless communication device can transmit user authorization for the transaction.
  • the present invention provides one or more devices, methods, and systems for a user to enable and authorize an encrypted transaction by having user-wearable devices provide enhanced security for at least four vital functional needs; a) secured and uncompromised bio-identification of the user of the devices
  • the user-wearable devices must be capable of receiving and sending both encryption and decryption of each and every transaction associated with (in some cases continuous) bio-identification of the user as well as any transaction that the user determines should be carried out with the user-wearable devices.
  • These transactions can include but are not limited to electronic, optical, radiative and other forms of signal generating energies. Most often these signals will be transmitted in a wireless fashion.
  • one or more user-wearable transaction secured devices comprising: a housing; a computer driven communication processor containing a microprocessor and data storage encryption capacity fixedly mounted in the housing; one or more circuits fixedly mounted in the housing and communicatively coupled with the computer driven communication processor ; a power source coupled with the circuits; at least one transceiver and a biometric data transceiver portion coupled with the housing and coupled with the circuits and with the communication processor such that one or more sensors are held within or on one or more surfaces of the user wearable devices;
  • the devices transmit and receive encrypted signals that form specific transmissions determined by one or more users, to the transceiver; wherein the transceiver determines, via authentication and validation, identification of the users and confirms if the users are wearing the devices via utilization of the computer driven communication processor; wherein the communication processor provides, processes, and analyzes bio-identification, continuous bio-confirmation, and authentication of the users, wherein the authentication includes either high security or low security authentication requests.
  • the circuits are connected to sensors or themselves function as sensors. The circuits are selected from the group consisting of;
  • One or more display portions are communicatively coupled with the circuits.
  • the housing can be in a shape of a wristwatch, wherein the wristwatch incorporates features that provide functions for one or more devices selected from the group consisting of; a camera, a smartphone, a calculator, a global positioning system (GPS), a radio, a television, a door opener, or other remote energy switching device, and a transceiver, wherein the transceiver is capable of acting as an IP protocol data unit.
  • the housing is in a shape selected from the group consisting of; necklaces, broaches, rings, earrings, badges, belt buckles, assorted jewelry, and articles of clothing.
  • the encrypted signals carry data that is transmitted and received by the at least one transceiver and wherein at least one transceiver analyzes and acts upon instructions contained within the data.
  • the sensors are biometric sensors that provide biometric data that comprises information used to confirm or deny access to said user-wearable devices.
  • Bio-identification initiates a process that requires user action to bio-identify users of user wearable devices followed by initial bio-confirmation and then authentication of said users to enable one or more transactions.
  • Bio-identification is continuously confirmed by authentication requests such that if bio- confirmation is not confirmed, a de-authenticate procedure is initiated that requires bio- identification confirmation to be re-initiated.
  • Authentication requests are high security requests that require users actively re-bio-identify themselves in order for the authentication requests to proceed and such that a test for bio- confirmation is maintained that results in a confirmation that allows for completion of authentication.
  • the authentication requests are low security requests that do not require re-bio-identification, and such that a test for bio-confirmation is maintained that results in a confirmation that allows for completion of authentication.
  • the authentication requests can be communicated to user-wearable devices from external sources the authentication requests can be user initiated originating from the user-wearable devices.
  • the users are notified when encryption is initiated, in process, or completed.
  • the encryption is provided for transmissions during transmission of a credential identifier to control a server.
  • the display portions display timepiece data.
  • the display portions display transaction data.
  • the biometric data transceiver portion is adapted to read information from one or more of a group consisting of: a user's fingerprints, voice patterns, a body's electrical, chemical, physical, and biological characteristics, biotags, facial characteristics, skin pH, thermal characteristics, ocular characteristics, kinesthetics, and genetic make-up and wherein the users can include any member of a genus of an animal or plant kingdom.
  • the power is obtained via a battery, a solar cell, and/or electromagnetic and/or radiative coupling from an external source.
  • the transmissions sent or received by the transceiver and the biometric data transceiver portion of the transceiver provide internal and external user identity validation for the user- wearable devices that validate authentication via utilization of at least one distributed auto- synchronous array (DASA) database, wherein the DASA database contains and provides at least one authentication and encryption application.
  • DASA distributed auto- synchronous array
  • the internal user identity validation occurs within the user-wearable devices and wherein the external user identity validation occurs external to the user-wearable devices.
  • the transmissions access and transmit a portion of data contained within the DASA database to user-wearable devices, validates data transmitted from the user-wearable devices with a portion of data within the DASA database, and further establishes validity of data according to a set of computational operations provides a set of rules residing in the DASA database that also can contain a portion or all of the data, such that all transmissions incoming to, held within, and outgoing from the sensors or any transceivers of the user-wearable devices, function securely and singularly for a specific, designated set of users.
  • the DASA database also provides one or more transmittable codes, wherein the codes originate within the at least one authentication and validation applications and wherein the user-wearable devices communicate internal and external by transmission and reception of data signals such that the internal transmission and reception is within the user-wearable devices and external transmission and receptions is external to the user-wearable devices.
  • the codes are securitized in that the codes are not readily accessible from an external source or within the user-wearable devices without passing through a security check to ensure that proper access occurs, wherein proper access is access that is provided for only validated data transmissions from validated sources that also validates individuals or groups of individuals.
  • the codes are encrypted.
  • the codes utilize either individually or collectively authentication, validation, and encryption applications that either individually or collectively authenticate, validate, and encrypt signals between detecting devices capable of searching, retrieving, analyzing, and validating the codes.
  • the codes are generated after installation of the authentication, validation, and encryption applications is complete.
  • the codes are either recognizable or not recognizable by the user- wearable devices during attempted authentication and validation.
  • the codes are selected from one or more of a group consisting of; a QR code, a bar code, a digital code, a temporal code, a binary code, an analogue code, and a 7-bit binary code.
  • the DASA database is accessed, manipulated, and arranged by the computer driven communication processor residing within said user-wearable devices.
  • transmissions are wireless and wherein the transmissions provide communications that are transmitted and received via oral, verbal, text, video, and data messaging and wherein the communications are displayed on the user-wearable devices.
  • one authentication comprises a challenge response computing operation utilizing transmissions wherein transmissions lead to one or more transactions.
  • a challenge response system utilizes communications that contain implicit or explicit logic.
  • implicit logic requires pre-arranged sets of data variables in a form of communications with one or more transceivers, so that authentication can proceed.
  • the explicit logic requires creation and analysis of different sets of data variables in the form of communications with one or more of transceivers, so that authentication can proceed.
  • At least one form of communications defines a credential identifier.
  • the credential identifier comprises at least some form of data such as meta data combined with at least one authentication.
  • the credential identifier comprises at least some form of data such as meta data combined with additional authentication requests.
  • the communications includes at least one of the group consisting of meta data, authentication, and authentication requests are encrypted.
  • the meta data includes an acknowledgement/nonacknowledgement portion that provides a path to determine access controlled by a server or user-wearable devices or both, the server and the user- wearable devices can become one or more transactions.
  • the communication processor can also include an authentication processor that performs a challenge response for the credential identifier by initially sending meta data to a server.
  • the authentication processor is an input/output processor module that sends and receives transmission signals to and from the server in response to reception of the credential identifier.
  • the communication processor is configured to transmit the credential identifier to access control of the server via a wireless communication link.
  • the communication processor includes an interface to data residing on the server and wherein a form of the data can be displayed on the user-wearable devices.
  • the server is configured to authenticate the credential identifier during comparison against entries of one or more keys within a set of data configuration tables residing in one or more DASA databases.
  • the least one authentication and encryption application is secured in a secured DASA database within a secured cloud or other secured storage device utilizing the encryption application.
  • the at least one authentication and encryption application employs a process as follows; a user of one or more user-wearable devices invokes secured transmission as attempts to acquire a key using one or more tolerance techniques that provide for a number of attempts to retrieve keys from a configuration table, wherein at least one authentication and encryption application possesses a get next key computational operation that is invoked locally on or in proximity to user- wearable devices.
  • application provides generation of encryption keys as well as a new master key, and simultaneous attempts are made to match one or more user identification (ID) encryption keys within a user ID encryption key database.
  • ID user identification
  • the at least one authentication and encryption application provides more layers of security in that now at least two authentication and encryption applications as well as encryption keys are required for the user-wearable devices so that a proper match is determined and establishes whether a user of the user-wearable devices is allowed access privileges.
  • a user's user- wearable device provides via oral, visual, text, or data signal transmission, a display that provides at least a derivation of a match so that the user is notified and allowed access.
  • the keys can be removed from a configuration table either before, during, or after a match, such that a key management system ensures that the keys themselves are neither discoverable nor compromised, wherein the keys cannot be found or if the keys are found they cannot be acted upon.
  • the user's user-wearable device provides via oral, visual, text, or data signal transmission a display that provides denial of a match. Lack of matching causes at least one authentication and encryption application that resides with the user's user- wearable device is removed and wherein to further ensure that master keys in the configuration table are protected and secured, a new master table key is generated either via a signal from the user devices to one or more secured DASA database or via a signal from a key management system.
  • the communication processor invokes use of at least one of the group of interface consisting of a serial interface, a transmission control protocol (TCP) and the Internet Protocol (IP).
  • TCP/IP transmission control protocol
  • IEEE Institute of Electrical and Electronic Engineers
  • HTTP Hypertext Transfer Protocol
  • a method for transmitting and receiving data signals from one or more user-wearable secured transaction devices comprising: establishing communications with a transaction counterpart; selecting a transaction; reading and authenticating encrypted biometric data of a user of the devices; validating the user's biometric data; and transmitting an encrypted user identity validation upon successful validating of said user's biometric data, wherein transmissions sent or received by a transmissions transceiver portion of the devices is providing user identity validation for the devices via utilization of at least one DASA database that possesses an authentication and encryption application is provided.
  • the transmissions are accessing and transmitting a portion of data contained within the at least one DASA database to the user-wearable devices, validating data transmitted from the user-wearable devices with a portion of data held within the DASA database, and further establishing validity of data according to a set of rules for such data residing in the at least one DASA database such that all transmissions incoming to, being held within, and outgoing from circuits or transceivers of the devices, are functioning in a secure manner for a specific, designated set of users.
  • the DASA database is providing one or more transmissible, securitized, and encrypted codes, wherein the codes originate within the authentication and encryption application, and wherein the user-wearable devices communicate internally and externally by transmission and reception of data signals that utilize the authentication and encryption application and wherein transmissions transceiver portions function as detecting devices that search, retrieve, and analyze a code generated after installation of the authentication and encryption application is complete.
  • the codes are either recognizable or is not recognizable by the user-wearable devices during attempted authentication and validation.
  • the communications can be enabled with Bluetooth technology and/or with infrared technology.
  • the transaction can be a purchase, a command, and/or control of a switch, and the transaction is selected from one or more of a group consisting of data, voice, and video transmissions that control hardware.
  • a user's biometric data is electronically stored within one or more memory storage systems selected from any one or more of a group consisting of; memory chips, internal or external servers, and a cloud data storage medium, that exist internally to or externally from the devices.
  • the communications are disabled until the user's data is authenticated and validated and/or re-authenticated and revalidated.
  • the present disclosure also includes a system that employs one or more user-wearable transaction secured devices for transmitting to and receiving data from one or more user-wearable secured transaction devices to another, comprising: establishing communications with a transaction counterpart; selecting a transaction; reading and authenticating encrypted biometric data of one or more users of the devices; validating the users' biometric data; and transmitting users' identity validation upon successfully validating the users' biometric data, wherein transmissions sent or received by a transmissions transceiver portion of the devices is providing users identity validation for the devices via utilization of at least one DASA database that possesses an authentication and encryption application.
  • the transmissions are accessing and transmitting a portion of data contained within at least one DASA database to the user-wearable devices, validating data transmitted from the user- wearable devices with a portion of data held within the at least one DASA database, and further establishing validity of such data according to a set of rules for data residing in the auto-synchronized database such that all transmissions incoming to, being held within, and outgoing from circuits or transceivers of the devices, are functioning in a secure manner for a specific, designated set of users.
  • At least one DASA database provides one or more transmissible, securitized, and encrypted codes, wherein the codes originate within the authentication and encryption application, and wherein the user-wearable devices communicate internally and externally by transmission and reception of data signals that utilize the authentication and encryption application and wherein a transmissions transceiver portion functions as detecting devices that search, retrieve, and analyze a code generated after installation of the authentication and encryption application is complete.
  • the codes are either recognizable or not recognizable by the user- wearable devices during attempted authentication and validation.
  • FIG. 1 A illustrates one embodiment of a user- wearable device in the form of a wristwatch with a display for displaying data including time, date, and year.
  • FIG. IB illustrates a second embodiment of a user-wearable device in the form of a wristwatch indicating two back panels of the same display which contact the user's wrist.
  • FIG. 2A is a flowchart indicating one technique by which a user is bio-identified and authenticated allowing and enabling the user to access and work with one or user-wearable devices.
  • FIG.2B is a flowchart and subsection the flowchart of FIG 2A, indicating one technique by which transmissions to and from one or more user-wearable devices are provided with encryption technology.
  • the hierarchy associated with the user-wearable devices is a bottom up list as follows (meaning the hierarchy is a pyramid that begins at its pinnacle with circuits and ends at its base with transactions);
  • Circuits that connect to devices and carry signals.
  • the circuits can carry signals in one or more directions and the circuits may also be connected to sensors.
  • establishing,” “selecting,” “reading,” “validating,” “transmitting,” or the like refer to the action and processes of a computer system or similar intelligent electronic computing device, that manipulates and transforms data represented as physical (electronic/magnetic/optical) quantities within the computer system's registers and memories into other data similarly represented as physical quantities that is recognized by the same or other computer system memories or registers or other such information storage, transmission or display devices.
  • FIG 1 A illustrates one embodiment of a user- wearable device in the form of a wristwatch with a display for displaying data including time, date, and year.
  • a user- wearable device in the form of a wristwatch that benefits from high security of the transmission of data as well as biometric authentication and verification while remaining convenient for detailed transactions. The security aspect is detailed below as it pertains to FIGS 2A and 2B.
  • a user- wearable device (100) in the form of a wristwatch is shown with a wristband (110) which holds a panel and panel display portion (120).
  • the user- wearable device in the form of a "smart watch” also provides for two additional features on the side of the panel and panel display portion (120) with a biometric transceiver shown as a sensor, including a mechanism for controlling power (125) to and from the device (100), as well as a scrolling mechanism (127) that allows for viewing information as necessary by the user.
  • the back portion of the device indicates two biometric transceivers shown as sensors (130 and 140) which can also act as sensor-scanners capable of transmitting, receiving, storing, and analyzing biometric data.
  • This data from the user includes, for example a user's one or more fingerprints, voice patterns, body electrical characteristics, skin pH, thermal characteristics as well as all aspects of ocular characteristics.
  • the devices (100) have a housing with a computer driven communication processor fixedly mounted in the housing; one or more circuits fixedly mounted in the housing and communicatively coupled with the computer driven
  • a power source electronically coupled with circuits; a display portion communicatively coupled with the circuits; at least one transmissions transceiver, and one or more biometric data transceivers (120, 130 and 140) in this case coupled with the back side of the display and electronically coupled with the circuits, transmissions transceiver, and with the communication module, wherein transmissions sent or received by the transmissions transceiver and the biometric data transceivers provide internal and external user identity validation for the devices. Validation is performed via utilization of at least one auto- synchronous database that possesses an authentication and encryption application.
  • the transmissions access and transmit a portion of data contained within the auto-synchronized database to the user-wearable devices, validates data transmitted from the user-wearable devices with a portion of data within an auto-synchronous database, and further establishes validity of data according to a set of rules for data residing in the auto-synchronized database such that all transmissions incoming to, held within, and outgoing from the circuits or any of the transceivers of the devices (including 130 and 140), function securely and singularly for a specific, designated set of users.
  • the DASA database provides one or more transmissible, securitized, and encrypted codes such that the codes originate within the authentication and encryption application.
  • the user-wearable devices communicate internally and externally by transmission and reception of data signals that utilize the authentication and encryption application so that the transceivers can function as detecting devices that search, retrieve, and analyze a code generated after installation of the authentication and encryption application is complete.
  • the code is either recognizable or is not recognizable by the user-wearable devices during attempted authentication and validation.
  • the code is selected from the group consisting of; a QR code, a bar code, a digital code, an analogue code, and a 7-bit binary code.
  • the auto-synchronous database is manipulated by the computer driven communication processor residing within the user-wearable devices.
  • the process (200) is outlined in the flowchart of Figure 2, whereby as the user puts the device on (210) to make it wearable. This initiates a bio-identification (220) process described above that requires user action to bio-identify themselves, followed by initial bio-confirmation (230), and then authentication of the user-wearer (240). If after this initial process, the bio-identity is continuously confirmed (250) then if there are authentication requests (260), the process for these requests is initiated. It is important to note that authentication requests can be communicated to the user devices from external sources, or that the authentication requests can be user initiated from the user devices. If the bio- confirmation is not still confirmed, a de-authenticate procedure (290) begins which requires that a bio-identification (220) process must be re-initiated.
  • the re-bio-identification step (275) is not required. It is possible, based on the present embodiment to keep the ease of simple transactions unencumbered so that after the authentication request allowance (260) is performed, transmission to a lower security request occurs (280) and the transmission is allowed assuming that bio-confirmation (285) is maintained (290) resulting in transmission confirmation (300). Other security levels allowing for other authentication methods could also be invoked.
  • the choice here, regarding the encryption via the encryption application previously described will be according to the designer(s) of the user- wearable devices. Most likely encryption will be kept to a minimum for these lower security requests.
  • This encryption application (307) utilizes the DASA database (310) and includes features (315, 320,325,330, 335, and 340) and guarantees a secure and specific connection with an authentic user is perfected (310).
  • the authenticated user device (315) and the authenticated access device (320) are guaranteed by the synchronicity of keys within the DASA database.
  • the DASA database encryption also guarantees fully encrypted data and transmission (325) of the data.
  • the synchronicity of the keys within the DASA database is what blocks the ability to replay any transaction (330).
  • wearable-user devices can include a wearable piece of functional jewelry or other wearable accessories in addition to that of a smart watch. This implementation, not only houses the electronics and transceiver devices, it also provides both biometric and transmissions encryption applications to remove any security threat known. Note that, while this discussion focuses on the implementation of this embodiment as a smart watch which can function as a timepiece, many other
  • wearable broaches including wearable broaches, tie pins, cufflinks, belt buckles or even writing pens or PDA styli.
  • the use of the user-wearable devices allows for the possible implementation of a proximity check that could be enabled by RF communications such as Bluetooth or use with GPS coordinates where it might be necessary to allow only very specific groups of users to access these transmissions and/or forms of communications.
  • RF communications such as Bluetooth
  • GPS coordinates where it might be necessary to allow only very specific groups of users to access these transmissions and/or forms of communications.
  • military applications are also envisioned for essentially any war or peacetime activity where only certain individuals will be allowed access to the transmissions.
  • Use of biometrics for each of these individuals could be based on various implantable wearable devices that emit signals specific only to that group.
  • the embodiments of the present invention discussed herein present various implementations of a user-wearable electronic wireless communication transaction device. These embodiments provide different ways to achieve an easy -to-incorporate form factor and convenience of operation in accomplishing transactions wirelessly and without physical contact between the user-wearable device and any applicable counterpart device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physiology (AREA)
  • Biophysics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne des dispositifs pouvant être portés par l'utilisateur utilisant des techniques d'authentification de chiffrement pour assurer la sécurité de toute transmission de données vers et depuis lesdits dispositifs. Afin de garantir la confidentialité et la sécurité des signaux de dispositif pouvant être porté par l'utilisateur, une technologie de chiffrement unique est utilisée conjointement avec l'utilisation de données biométriques associées à chaque utilisateur. Les dispositifs pouvant être portés par l'utilisateur peuvent être électroniques et peuvent comprendre un(e) ou plusieurs circuits, sources d'alimentation, dispositifs d'affichage et émetteurs-récepteurs avec des parties d'émetteur-récepteur de données biométriques. Les dispositifs peuvent établir des communications avec un dispositif ou un système de communication homologue afin de fournir la possibilité d'effectuer des transactions sécurisées spécifiques. Les émetteurs-récepteurs de données biométriques sont capables de lire des données biométriques chiffrées d'un utilisateur, puis de transmettre les données chiffrées à une base de données de réseau auto-synchrone distribué de validation d'identité d'utilisateur (DASA), ce qui permet le déchiffrement, l'identification et l'authentification à la fois du ou des utilisateurs et de la ou des transactions.
PCT/US2018/036927 2017-06-12 2018-06-11 Dispositifs sécurisés pouvant être portés par l'utilisateur assurant l'authentification et la validation de stockage et de transmission de données Ceased WO2018231713A1 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US201762518281P 2017-06-12 2017-06-12
US201762518371P 2017-06-12 2017-06-12
US201762518337P 2017-06-12 2017-06-12
US62/518,337 2017-06-12
US62/518,371 2017-06-12
US62/518,281 2017-06-12

Publications (1)

Publication Number Publication Date
WO2018231713A1 true WO2018231713A1 (fr) 2018-12-20

Family

ID=64660893

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/036927 Ceased WO2018231713A1 (fr) 2017-06-12 2018-06-11 Dispositifs sécurisés pouvant être portés par l'utilisateur assurant l'authentification et la validation de stockage et de transmission de données

Country Status (1)

Country Link
WO (1) WO2018231713A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266793A (zh) * 2019-06-19 2019-09-20 长沙理工大学 一种配电网泛在分布式能源边缘计算交易平台
EP3832406A1 (fr) * 2019-12-06 2021-06-09 Tissot S.A. Procédé de gestion de l'utilisation de données dans une montre
EP3832405A1 (fr) * 2019-12-06 2021-06-09 Tissot S.A. Montre comportant un système de contrôle d'accès biometrique à une donnée confidentielle

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140085050A1 (en) * 2012-09-25 2014-03-27 Aliphcom Validation of biometric identification used to authenticate identity of a user of wearable sensors
US20140279528A1 (en) * 2013-03-15 2014-09-18 Motorola Mobility Llc Wearable Authentication Device
WO2016069052A1 (fr) * 2014-10-29 2016-05-06 Ebay Inc. Dispositif vestimentaire disposant d'une interface d'authentification d'utilisateur
EP3037999A1 (fr) * 2014-12-24 2016-06-29 Samsung Electronics Co., Ltd Dispositif électronique ayant une fonction d'identification d'utilisateur et procédé d'authentification d'utilisateur

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140085050A1 (en) * 2012-09-25 2014-03-27 Aliphcom Validation of biometric identification used to authenticate identity of a user of wearable sensors
US20140279528A1 (en) * 2013-03-15 2014-09-18 Motorola Mobility Llc Wearable Authentication Device
WO2016069052A1 (fr) * 2014-10-29 2016-05-06 Ebay Inc. Dispositif vestimentaire disposant d'une interface d'authentification d'utilisateur
EP3037999A1 (fr) * 2014-12-24 2016-06-29 Samsung Electronics Co., Ltd Dispositif électronique ayant une fonction d'identification d'utilisateur et procédé d'authentification d'utilisateur

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266793B (zh) * 2019-06-19 2021-11-02 长沙理工大学 一种配电网泛在分布式能源边缘计算交易平台
CN110266793A (zh) * 2019-06-19 2019-09-20 长沙理工大学 一种配电网泛在分布式能源边缘计算交易平台
KR20220086676A (ko) * 2019-12-06 2022-06-23 띠쏘 에스.에이 기밀 데이터에 대한 생체인식 액세스를 제어하기 위한 시스템을 포함하는 시계
WO2021110470A1 (fr) * 2019-12-06 2021-06-10 Tissot Sa Procédé de gestion de l'utilisation de données dans une montre
WO2021110427A1 (fr) * 2019-12-06 2021-06-10 Tissot Sa Montre comportant un système de contrôle d'accès biometrique à une donnée confidentielle
EP3832405A1 (fr) * 2019-12-06 2021-06-09 Tissot S.A. Montre comportant un système de contrôle d'accès biometrique à une donnée confidentielle
EP3832406A1 (fr) * 2019-12-06 2021-06-09 Tissot S.A. Procédé de gestion de l'utilisation de données dans une montre
KR20220088784A (ko) * 2019-12-06 2022-06-28 띠쏘 에스.에이 시계에서 데이터의 사용을 관리하기 위한 방법
CN114730160A (zh) * 2019-12-06 2022-07-08 天梭股份有限公司 包括用于控制对机密数据的生物鉴别访问的系统的手表
CN114787724A (zh) * 2019-12-06 2022-07-22 天梭股份有限公司 手表中的数据的使用管理方法
US12141309B2 (en) 2019-12-06 2024-11-12 Tissot Sa Method for managing the use of data in a watch
US12141258B2 (en) 2019-12-06 2024-11-12 Tissot Sa Watch including a system for controlling biometric access to confidential data
KR102743521B1 (ko) 2019-12-06 2024-12-16 띠쏘 에스.에이 기밀 데이터에 대한 생체인식 액세스를 제어하기 위한 시스템을 포함하는 시계
KR102744008B1 (ko) 2019-12-06 2024-12-17 띠쏘 에스.에이 시계에서 데이터의 사용을 관리하기 위한 방법

Similar Documents

Publication Publication Date Title
US10637854B2 (en) User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US10154031B1 (en) User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US10616198B2 (en) Apparatus, system and method employing a wireless user-device
US10560444B2 (en) Methods, apparatuses and systems for providing user authentication
US9898879B2 (en) System and device for authenticating a user
US20170063549A1 (en) Portable Biometric-based Identity Device
WO2019195821A1 (fr) Authentification et validation de mémoire de données et transmission à l'aide d'une chaîne de blocs
WO2018231713A1 (fr) Dispositifs sécurisés pouvant être portés par l'utilisateur assurant l'authentification et la validation de stockage et de transmission de données
US10764282B2 (en) Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers
US10771970B2 (en) Method of authenticating communication of an authentication device and at least one authentication server using local factor
US20190028470A1 (en) Method For Verifying The Identity Of A Person
WO2019133329A1 (fr) Dispositifs protégés et fiabilisés pouvant être portés par un utilisateur qui emploient des conteneurs sécurisés
KR100720316B1 (ko) 출력제어기능을 갖는 무선통신단말기
WO2004079639A1 (fr) Procede d'authentification pour paiement electronique utilisant une carte a circuit integre exclusivement a mot de passe
US20140032923A1 (en) System and device for authenticating a user
TWI388185B (zh) Use the certification system and method of carry items
HK1208928B (en) System and device for authenticating a user

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18818894

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18818894

Country of ref document: EP

Kind code of ref document: A1