US9231924B2 - Gesture-initiated encryption using error correction coding - Google Patents
Gesture-initiated encryption using error correction coding Download PDFInfo
- Publication number
- US9231924B2 US9231924B2 US14/185,018 US201414185018A US9231924B2 US 9231924 B2 US9231924 B2 US 9231924B2 US 201414185018 A US201414185018 A US 201414185018A US 9231924 B2 US9231924 B2 US 9231924B2
- Authority
- US
- United States
- Prior art keywords
- metric
- template
- create
- entries
- human gestures
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Definitions
- a password is a commonly used starting point for an encryption key. Since a password is typically familiar to a user and will not change in the immediate future, it can be hashed and stored on a medium to essentially hide it in plain sight. The amount of entropy in a password can be very low if the password is not of significant complexity and length. While one can simply increase the length and complexity of a password to increase its entropy, the tradeoff is that longer and more complex passwords are harder to remember. Hence, people typically choose simpler passwords which are easily cracked.
- a method for establishing secure communications includes receiving one or more human gestures using a sensor on a first device, quantizing the one or more human gestures so as to create a metric of the one or more human gestures, performing an error correction operation on the metric using error correction information derived from a template of the metric to create a corrected metric, performing a hashing operation on the corrected metric to create a metric hash, and comparing the metric hash to a hash of the template to verify that the one or more human gestures sufficiently conform to the template.
- a method for creating a password includes receiving a set of one or more human gestures using a sensor on a first device a plurality of times to create a plurality of entries, wherein for each entry the one or more human gestures generally conform with one another, quantizing each entry to create a plurality of metric entries, and deriving a template using the plurality of metric entries such that the template is a statistical amalgam of the plurality of metric entries.
- a device for establishing secure communications includes quantizing circuitry configured to quantize one or more human gestures so as to create a metric of the one or more human gestures, error correction circuitry configured to perform an error correction operation on the metric using error correction information derived from a template of the metric to create a corrected metric, hashing circuitry configured to perform a hashing operation on the corrected metric to create a metric hash, and verification circuitry configured to compare the metric hash to a hash of the template to verify that the one or more human gestures sufficiently conform to the template.
- a device for creating a password includes a sensor capable of deriving a set of one or more human gestures a plurality of times to create a plurality of entries, wherein for each entry the one or more human gestures generally conform with one another, quantizing circuitry configured to quantize each entry so as to create a plurality of metric entries, and template circuitry configured to derive a template using the plurality of metric entries such that the template is a statistical amalgam of the plurality of metric entries.
- FIG. 1 is a wireless system capable of providing a secure log-in using a graphic-based password system.
- FIGS. 2A and 2B depict different hashes that result from minor variances of similar hand-drawn gestures.
- FIG. 3 is a block diagram of a user terminal capable of deriving a gesture-based password, and for securely logging onto a system using human-based gestures.
- FIG. 4 is a block diagram of a server capable of receiving and verifying a gesture-based password.
- FIG. 5 is a flowchart for creating an invariant password from variant gestures.
- FIG. 6 is a flowchart for securing access to a system using a gesture-based password.
- FIG. 7 depicts an analysis of false positives using gesture-based passwords.
- FIG. 8 depicts an analysis of false negatives using gesture-based passwords.
- FIG. 9 depicts a performance analysis of gesture-based passwords.
- FIG. 1 depicts a communication system 100 usable to provide secure communications using a gesture-based password.
- the communication system 100 includes a user terminal 110 coupled to a server 130 via an electronic communications link 120 .
- the user terminal 110 depicted in FIG. 1 is a tablet computer having a wireless interface
- the communication device 110 can take a large number of forms, including any of a large number of smart phones, tablets, laptop computers and other computers as long as such forms include an appropriate set of sensors, such as a touch screen, capable of sensing/measuring human gestures.
- While the communication system 100 of FIG. 1 is depicted as a two-part system, in various embodiments the techniques described below can be applied so as to provide passwords for the user terminal 110 alone such that a user can secure access to his tablet computer, smart phone or other device.
- FIGS. 2A and 2B depict different hashes that result from minor variances of similar hand-drawn gestures.
- Hashing is a well-known technique for storing passwords while minimizing the probability that individual passwords will be exposed to theft.
- a hand-drawn letter “A” is provided with small differences between the two.
- quantizing and hashing each entry of the letter “A” results in completely different hash values, thereby making hand-drawn gestures an unlikely candidate for passwords given that humans can rarely, if ever, exactly reproduce a drawn gesture.
- the information extracted from the gesture must be 100% exact.
- a Forward Error Correction (FEC) algorithm can be used to correct small amounts of error in feature vectors extracted from a gesture to produce an invariant key/password that can be used for encryption and/or access.
- FEC Forward Error Correction
- FIG. 3 is a block diagram of the user terminal 110 of FIG. 1 capable of securely accessing data using human-drawn gestures.
- the user terminal 110 includes a processor 310 , a memory 320 , a sensor 330 , quantizing circuitry 340 , training circuitry 350 , template circuitry 360 , error coding circuitry 370 , error correction circuitry 380 , hashing circuitry 382 , verification circuitry 384 and input/output circuitry 390 .
- the various components 310 - 390 can take the form of separate electronic components coupled together via a series of separate busses. Still further, in other embodiments, one or more of the various components 310 - 390 can take form of separate processing systems coupled together via one or more networks. Additionally, it should be appreciated that each of components 310 - 390 advantageously can be realized using multiple computing devices employed in a cooperative fashion.
- some of the above-listed components 340 - 380 can take the form of software/firmware routines residing in memory 320 and be capable of being executed by the processor 310 , or even software/firmware routines residing in separate memories in separate computing systems being executed by different controllers. Still further, it is to be appreciated that some of the above-listed components 340 - 380 can reside on a completely different platform, such as the server 130 of FIG. 1 or some other device.
- the user terminal 110 can be used to create a gesture-based password than can be variant from user-entry to user-entry, yet for each user entry an invariant password and hash will be created.
- the sensor 330 can measure/receive one or more hand-drawn gestures of a user. Since a gesture's coordinates will likely vary slightly each time the user draws it, the gesture must first be quantized into discrete components to be manipulated.
- the quantizing circuitry 340 is used to quantize gestures measured/received by the sensor 330 .
- One possible approach to characterizing a gesture which involves interpolation and discrete angle quantization, is provided below.
- the example below is just one of many possible quantization approaches, and therefore to be considered a non-limiting example.
- a given gesture can be interpolated to have a very large constant number of points, M>>N.
- the angle ⁇ k,m between two points ⁇ m,m+1 ⁇ in sections k is determined according to Eq. (6) below:
- the training circuitry 350 first determines whether the pictogram created by a user is a suitable candidate for a password or encryption key.
- the criteria for such a determination can vary, but such criteria may include, for example, whether there pictogram is too simple, e.g., a single vertical line; whether the pictogram is too complex; and so on.
- the user can re-enter the pictogram N times so that the training circuitry can determine whether the pictogram can be reliably re-created by the user.
- the particular criteria for determining consistency can include, for example, whether angles between points consistently fall within an acceptable error range, whether a total angular error for all points is acceptable, and so on.
- the template circuitry 360 creates a template of the metrics of the gestures used to create the desired pictogram.
- the training circuitry 350 can employ some statistical amalgam of the metrics, such as use average angles between points, use median angles between points, or use any other statistical data capable of embodying a likely representation of some idealized or likely metric of the gestures.
- the compilation all of the average angle metrics forms the template, which may be used as the basis of a password or encryption key.
- the hashing circuitry 382 can perform a hashing operation on the template to create a template hash.
- the template hash can then be stored in the memory 320 or the memory of another device, such as the server 130 of FIG. 1 .
- the error coding circuitry 370 encodes the template using any number of error coding techniques, such as Reed-Solomon block coding, which will create a set of error detection and correction bits that, when applied to gestures that resemble the template, will enable a device to transform individual gesture entries into the template.
- error coding techniques such as Reed-Solomon block coding
- the template is considered an error-free message.
- the error-free message is sent through a channel (e.g., the touch screen of a tablet)
- the error-free message is subjected to error/distortion.
- Error coding allows a designer to redundantly encode data so that the error-free data can be reproduced.
- the Reed-Solomon technique which is commonly used to correct errors in scanning bar codes, as well as reading CD and DVD media, provides one non-limiting example of redundant coding.
- Reed-Solomon uses block codes; meaning, the message to be transmitted is divided up into separate blocks of data. Each block then has error correction information added to it to form a self-contained code word. For each two bits of error correction information added, one symbol can be corrected in the template.
- the error correction information can then be stored in the memory 320 or within some other device for later use.
- this error correction information is applied to a gesture closely resembling the template, the gesture will be transformed to resemble the template.
- the amount of difference between a given gesture and a template that can be tolerated depends on the number of error correction bits. The more error correction bits allocated, the greater the variation among gestures that can be tolerated.
- the user can then employ the user terminal 110 to recognize gesture-based passwords and encryption keys.
- the sensor 330 measures/receives a hand-drawn set of one or more gestures from a user, which are then quantized by the quantizing circuitry 340 .
- the error coding circuitry 370 can create data blocks using the quantized gestures and the error correction information previously derived using the template. The data blocks can then be transmitted to a remote device if desired, or the error-correction circuitry 380 can then perform an error correction operation on the quantized gesture data in order to attempt to re-create the template.
- the hashing circuitry 382 can them perform a hashing operation on the “corrected” data to create a hash of the gesture.
- the verification circuitry 384 can compare the gesture hash to the template hash. If there is a match, then the verification circuitry 384 can provide the appropriate access to the user.
- FIG. 4 is a block diagram of the server 130 of FIG. 1 capable of providing securely access based on human-based gestures.
- FIG. 4 demonstrates that servers and like devices need only minor modifications to hardware or software in order to accommodate the disclosed security techniques.
- the server 130 includes a processor 410 , a memory 420 , error correction circuitry 430 , hashing circuitry 440 , verification circuitry 45 and input/output circuitry 990 .
- the memory 420 contains a template hash 422 for a user-drawn set of gestures.
- the server 130 of FIG. 4 may be constructed using a large variety of architectures, and some or all of the components 430 - 450 may take the form of software/firmware routines residing in memory 420 .
- one or more blocks of data containing quantized gesture-based data and error correction information/bits from a respective template are received by the input/output circuitry 490 and delivered to the error correction circuitry 430 .
- the error correction circuitry 430 then performs the appropriate error correction operations, e.g., a Reed-Solomon type error correction, to produce corrected gesture data.
- appropriate error correction operations e.g., a Reed-Solomon type error correction
- the hashing circuitry 440 can them perform a hashing operation on the corrected data to create a hash of the gesture where after the verification circuitry 450 can compare the gesture hash to the template hash 422 in the memory 420 . If there is a match, then the verification circuitry 450 can provide the appropriate access to the user.
- FIG. 5 is a flowchart outlining a set of exemplary operations usable for creating an invariant password from human-variant gestures. While the below-described operations are described as occurring in a particular sequence for convenience, it is noted that the order of various operations may be changed from embodiment to embodiment. It is further noted that various operations may occur simultaneously or may be made to occur in an overlapping fashion.
- the process starts in at S 502 where a human-drawn trial gesture is measured/received using a sensor, and quantized.
- gestures can be quantized according to the equations (1)-(6) outlined above so as to embody angular information, other quantization techniques/approaches may be used in other embodiments.
- S 510 a determination is made as to whether the received gesture is suitable as a password, e.g., it has an appropriate complexity and not previously used. If the received gesture is not suitable, control jumps back to S 502 where another trial gesture may be entered; otherwise, control continues to S 512 .
- the trial gesture of S 502 is repeatedly received and quantized for user training to determine whether the user can reliably recreate the gesture.
- control jumps back to S 512 where the gesture may be re-entered; otherwise, control continues to S 522 .
- a template of the gestures is created, along with the appropriate error correction information usable to transform variant gestures to resemble the invariant template.
- a hash of the template is created and stored. Control continues to S 526 .
- the trial gesture is re-entered by the user M times, and at S 528 each gesture entry is quantized and encoded using the error correction information of S 522 .
- error correction and hashing is performed for each of the M entries, and at S 540 a determination is made as to whether each gesture hash matches the template hash of S 524 . If each of the gesture hashes match the template hash, then it is determined that a suitable gesture-based password/key has been found; otherwise, control jumps back to S 502 .
- FIG. 6 is a flowchart outlining a set of exemplary operations usable for securing access to a system using a gesture-based password.
- FIG. 5 while the below-described operations are described as occurring in a particular sequence for convenience, it is noted that the order of various operations may be changed from embodiment to embodiment. It is further noted that various operations may occur simultaneously or may be made to occur in an overlapping fashion.
- the process starts in at S 602 where a human-drawn gesture is received and quantized. Again, as discussed above, while gestures can be quantized according to the equations (1)-(6) outlined above so as to embody angular information, other quantization techniques/approaches may be used in other embodiments.
- the quantized gesture is error-coded using the appropriate error correction information derived from a respective template. Control continues to S 606 .
- the encoded gesture is sent to a server or other remote device, and at S 610 the encoded gesture is received.
- operations S 606 and S 610 may be eliminated assuming that the desired access may be had on the device used to receive and quantize the gestures. Control continues to S 612 .
- error correction and hashing is performed on the gesture to produce a gesture hash.
- the gesture hash is compared to a hash of the template, and at S 620 a determination is made as to whether the gesture hash matches the template hash. If the gesture hashes match the template hash, then control continues to S 622 where access is provided to the user; otherwise, control jumps back to S 602 .
- FIGS. 7 and 8 depict an error analysis using gesture-based passwords.
- a group of users drew custom, personalized symbols using a tablet computer.
- the users then trained the system by drawing their symbol ten times, and gesture templates were created and error-coded. After this, subsequent gestures were quantized and error-coded using the error-correction information for the appropriate template.
- the distribution of error values were analyzed under two classes.
- the first class shown in graph 700 of FIG. 7 , represents the condition that two gesture were drawn by the same person, p(e
- the second class shown in graph 800 of FIG. 8 , represents the condition that two gestures were drawn by different people, p(e
- FIG. 9 depicts a receiver operating characteristic (ROC) curve of gesture-based passwords, which depicts how the false rejection rate (FRR) changes given a false acceptance rate (FAR), i.e., the percent of incorrect outcomes that were mistakenly labeled correct.
- FRR false rejection rate
- FAR false acceptance rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Biodiversity & Conservation Biology (AREA)
- General Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computing Systems (AREA)
- Collating Specific Patterns (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
G=[x i ,y i ,t i ], i=[0,1,2, . . . N−1]; Eq. (1)
where xi and yi are Cartesian coordinates for a point I, and ti is a relative time occurrence for point i.
Ĝ=[{circumflex over (x)}j,ŷ j ,{circumflex over (t)} j ]j=[0,1,2, . . . M−1]; Eq. (2)
Ŝ k =[{circumflex over (x)} m ,ŷ m ,{circumflex over (t)} m] Eq. (3)
m=[kM/D,kM/D+1,kM/D+2,kM/D+n . . . ,kM/D+M/D−1] Eq. (4)
k=[0,1,2, . . . ,D−1]
n=[0,1,2, . . . ,M/D−1] Eq. (5)
where ŷj, {circumflex over (x)}j, {circumflex over (t)}j are averages of yj, xj and tj for a plurality of gesture entries.
{circumflex over (Θ)}=floor([θ2 ]/L) Eq. (8)
Claims (23)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/185,018 US9231924B2 (en) | 2013-03-11 | 2014-02-20 | Gesture-initiated encryption using error correction coding |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361776551P | 2013-03-11 | 2013-03-11 | |
US14/185,018 US9231924B2 (en) | 2013-03-11 | 2014-02-20 | Gesture-initiated encryption using error correction coding |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140258706A1 US20140258706A1 (en) | 2014-09-11 |
US9231924B2 true US9231924B2 (en) | 2016-01-05 |
Family
ID=50236323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/185,018 Expired - Fee Related US9231924B2 (en) | 2013-03-11 | 2014-02-20 | Gesture-initiated encryption using error correction coding |
Country Status (5)
Country | Link |
---|---|
US (1) | US9231924B2 (en) |
AU (1) | AU2014249969B2 (en) |
CA (1) | CA2905554A1 (en) |
GB (1) | GB2534258A (en) |
WO (1) | WO2014163819A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150006405A1 (en) * | 2013-06-28 | 2015-01-01 | James Roy Palmer | System and methods for secure entry of a personal identification number (pin) using multi-touch trackpad technologies |
US9634833B2 (en) * | 2014-06-20 | 2017-04-25 | Google Inc. | Gesture-based password entry to unlock an encrypted device |
GB202204096D0 (en) * | 2022-03-23 | 2022-05-04 | British Telecomm | A secure authentication token |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6307956B1 (en) * | 1998-04-07 | 2001-10-23 | Gerald R. Black | Writing implement for identity verification system |
US20020025062A1 (en) * | 1998-04-07 | 2002-02-28 | Black Gerald R. | Method for identity verification |
US20030220876A1 (en) * | 1999-09-28 | 2003-11-27 | Burger Todd O. | Portable electronic authorization system and method |
US20070022289A1 (en) * | 2005-07-20 | 2007-01-25 | Mci, Inc. | Method and system for providing secure credential storage to support interdomain traversal |
US7609862B2 (en) * | 2000-01-24 | 2009-10-27 | Pen-One Inc. | Method for identity verification |
US20090271634A1 (en) * | 2008-04-25 | 2009-10-29 | The Regents Of The University Of Colorado & Securics, Inc. | Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens |
US7619618B2 (en) * | 1998-01-26 | 2009-11-17 | Apple Inc. | Identifying contacts on a touch surface |
US20110090541A1 (en) * | 2009-10-15 | 2011-04-21 | Jack Harper | Fingerprint scanning systems and methods |
US20110231667A1 (en) * | 2008-12-08 | 2011-09-22 | Morpho | Method of Identification or Authorization, and Associated System and Secure Module |
US20120039469A1 (en) * | 2006-10-17 | 2012-02-16 | Clay Von Mueller | System and method for variable length encryption |
US8228299B1 (en) * | 2005-01-27 | 2012-07-24 | Singleton Technology, Llc | Transaction automation and archival system using electronic contract and disclosure units |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4146939A (en) * | 1977-12-02 | 1979-04-03 | Izzi Lewis B | Drain fitting for pre-formed or pre-assembled showers, etc. |
US5103698A (en) * | 1991-07-05 | 1992-04-14 | Edwin Delaney | Tool for installing basin drain basket |
US6276242B1 (en) * | 2000-05-25 | 2001-08-21 | Michael S. Wiggins | Drain compression ring wrench |
ES2387412T3 (en) * | 2007-05-04 | 2012-09-21 | Dlp Limited | Shower drain system with a flat waste duct device |
US20130061388A1 (en) * | 2011-08-10 | 2013-03-14 | Maax Bath Inc. | Shower base for a space-limited room |
-
2014
- 2014-02-20 AU AU2014249969A patent/AU2014249969B2/en not_active Ceased
- 2014-02-20 GB GB1516108.6A patent/GB2534258A/en not_active Withdrawn
- 2014-02-20 CA CA2905554A patent/CA2905554A1/en not_active Abandoned
- 2014-02-20 US US14/185,018 patent/US9231924B2/en not_active Expired - Fee Related
- 2014-02-20 WO PCT/US2014/017314 patent/WO2014163819A1/en active Application Filing
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7619618B2 (en) * | 1998-01-26 | 2009-11-17 | Apple Inc. | Identifying contacts on a touch surface |
US6307956B1 (en) * | 1998-04-07 | 2001-10-23 | Gerald R. Black | Writing implement for identity verification system |
US20020025062A1 (en) * | 1998-04-07 | 2002-02-28 | Black Gerald R. | Method for identity verification |
US20030220876A1 (en) * | 1999-09-28 | 2003-11-27 | Burger Todd O. | Portable electronic authorization system and method |
US7609862B2 (en) * | 2000-01-24 | 2009-10-27 | Pen-One Inc. | Method for identity verification |
US8228299B1 (en) * | 2005-01-27 | 2012-07-24 | Singleton Technology, Llc | Transaction automation and archival system using electronic contract and disclosure units |
US20070022289A1 (en) * | 2005-07-20 | 2007-01-25 | Mci, Inc. | Method and system for providing secure credential storage to support interdomain traversal |
US20120039469A1 (en) * | 2006-10-17 | 2012-02-16 | Clay Von Mueller | System and method for variable length encryption |
US20090271634A1 (en) * | 2008-04-25 | 2009-10-29 | The Regents Of The University Of Colorado & Securics, Inc. | Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens |
US20110231667A1 (en) * | 2008-12-08 | 2011-09-22 | Morpho | Method of Identification or Authorization, and Associated System and Secure Module |
US20110090541A1 (en) * | 2009-10-15 | 2011-04-21 | Jack Harper | Fingerprint scanning systems and methods |
Non-Patent Citations (8)
Title |
---|
Chiara Ercole, et al., "Iris-based authentication system with template protection and renewability", Optics and Photonics for Counterterrorism and Crime Fighting III, Proc. of SPIE, vol. 6741, 67410H, XP-040246931, 2007, 8 Pages. |
David González Martínez, et al., "Secure crypto-biometric system for cloud computing", 1st International Workshop on Securing Services on the Cloud (IWSSC), IEEE, XP-032063713, 2011, pp. 38-45. |
Emanuele Maiorana, et al., "User adaptive fuzzy commitment for signature template protection and renewability", Journal of Electronic Imaging, vol. 17, No. 1, XP-055129893, Jan.-Mar. 2008, pp. 011011-1-011011-12. |
Feng, Tao; Liu, Ziyi; Kwon, Kyeong-An; Shi, Weidong; Carbunar, Bogdan, Jian, Yifei; Nguyen, Nhung. Continuous Mobile Authentication Using Touchscreen Gestures. 2012 IEEE Conference on Technologies for Homeland Security (HST). pp. 451-456. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6459891. * |
International Search Report and Written Opinion issued Jul. 28, 2014 in PCT/US2014/017314. |
Matyas, Vashek; Riha, Zdenek. Security of Biometric Authentication Systems. 2010 International Conference on Computer Information Systems and Industrial Managment Applications (CISIM). pp. 19-28. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5643698. * |
Nonaka, Takako. Uesugi, Yuta; Hase, Tomohiro. Secure Personal Authentication System for Home Network. 2010 10th International Conference on Intellilgent Systems Design and Applications (ISDA). pp. 1361-1364. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5687099. * |
Sandnes, Frode Eika; Zhang, Xiaoli. User Identification based on Touch Dynamics. 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Automatic & Trusted Computing (UIC/ATC). pp. 256-263. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6332006. * |
Also Published As
Publication number | Publication date |
---|---|
AU2014249969B2 (en) | 2018-02-15 |
GB201516108D0 (en) | 2015-10-28 |
WO2014163819A1 (en) | 2014-10-09 |
CA2905554A1 (en) | 2014-10-09 |
US20140258706A1 (en) | 2014-09-11 |
GB2534258A (en) | 2016-07-20 |
AU2014249969A1 (en) | 2015-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8433983B2 (en) | Secure protection of biometric templates | |
US8375218B2 (en) | Pre-processing biometric parameters before encoding and decoding | |
US7779268B2 (en) | Biometric based user authentication and data encryption | |
EP1920554B1 (en) | Computer implemented method for storing data in computer readable media and using biometrics | |
US7797606B2 (en) | Method for coding biometric data, method for controlling identity and devices for carrying out said methods | |
WO2005122467A1 (en) | Biometric template protection and feature handling | |
JP5288935B2 (en) | Preprocessing method for biometric parameters before encoding and decoding | |
US8433920B2 (en) | Method and system for authenticating reliable biometric data | |
CN102223233A (en) | Biological code authentication system and biological code authentication method | |
US9231924B2 (en) | Gesture-initiated encryption using error correction coding | |
US11507690B2 (en) | Method of enrolling data to control an identity, and identity-control method | |
CN114117383A (en) | Registration method, authentication method and device | |
US11706032B2 (en) | Method and apparatus for user authentication | |
Lozhnikov et al. | Methods of generating key sequences based on keystroke dynamics | |
WO2010028517A1 (en) | System and method for generating/ identifying cipher code via artificial neural network | |
US20190349363A1 (en) | Biometric authentication with enhanced biometric data protection | |
EP2159759B1 (en) | Shaping classification boundaries in template protection systems | |
EP3142292B1 (en) | Encrypted-data processing method, system, apparatus, and program | |
CN118395406A (en) | Method, system and non-transitory computer readable medium for behavior retraining | |
JP5289388B2 (en) | Method for authenticating reliable biometric data | |
Pane et al. | Biometric Cryptography | |
Velciu et al. | An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms | |
Assanovich et al. | Information Encoding for Flow Watermarking and Binding Keys to Biometric Data | |
Sayed | Grobner Bases Method for Biometric Traits Identification and Encryption | |
Melo et al. | User identification and key regeneration system employing rotated reference images of the iris |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LOCKHEED MARTIN CORPORATION, MARYLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HRYBYK, ALEXANDER GREGORY;COCKRUM, CHRIS K;REEL/FRAME:032255/0507 Effective date: 20140218 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240105 |