G07C2209/12

BIOMETRIC SIGNATURE SYSTEM AND BIOMETRIC CERTIFICATE REGISTRATION METHOD
20190042716 · 2019-02-07 ·

This biometric signature system comprises: a biometric certificate storage module that stores a biometric certificate generated on the basis of a user's biometric information; a biometric information acquisition module that acquires new biometric information from the user; a biometric certificate generation module that generates a new biometric certificate on the basis of the new biometric information; a biometric signature generation module that assigns a biometric signature to the new biometric certificate on the basis of the new biometric information; a biometric signature verification module that verifies the biometric signature using the biometric certificate stored in the biometric certificate storage module; and a biometric certificate registration module that registers the new biometric certificate in the biometric certificate storage module if verification of the biometric signature was successful.

Information processing system, information processing method, and non-transitory computer-readable recording medium

An information processing system acquires biological information of a target and generates output information determined in correspondence with identification information using the identification information associated with the biological information. Then, the output information is output.

Biometric identification and identity data protection method
10102357 · 2018-10-16 · ·

The invention relates to a method for identifying a person to be identified having a certified data medium linking a primary identifier and a primary biometric characteristic of a holder of the data medium, acquiring, during a unique operation, the first biometric characteristic on the person to be identified and a second, distinct biometric characteristic, verifying that the person to be identified corresponds to the holder of the data medium by comparing the first acquired biometric characteristic to that of the data medium, storing the second acquired biometric characteristic and associating it with a secondary identifier and during a subsequent identification, acquiring the second biometric characteristic on the person to be identified and comparing it to the second biometric characteristic.

Personal Digital Key Initialization and Registration for Secure Transactions
20240311832 · 2024-09-19 ·

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes.

Two-Level Authentication for Secure Transactions
20180253731 · 2018-09-06 ·

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A Personal Digital Key stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory that is acquired in a secure trusted process. Biometric profiles comprise a representation of physical or behavioral characteristics that are uniquely associated with an individual that owns and carries the PDK. The PDK wirelessly transmits the biometric profile over a secure wireless transaction to a Reader for use in a biometric authentication process. The Reader compares the received biometric profile to a biometric input acquired at the point of transaction in order to determine if the transaction should be authorized.

Short-range device communications for secured resource access

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

Two-level authentication for secure transactions
09990628 · 2018-06-05 · ·

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A Personal Digital Key stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory that is acquired in a secure trusted process. Biometric profiles comprise a representation of physical or behavioral characteristics that are uniquely associated with an individual that owns and carries the PDK. The PDK wirelessly transmits the biometric profile over a secure wireless transaction to a Reader for use in a biometric authentication process. The Reader compares the received biometric profile to a biometric input acquired at the point of transaction in order to determine if the transaction should be authorized.

Short-range device communications for secured resource access

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

GRAPHIC DATA ALTERATION TO ENHANCE ONLINE PRIVACY
20170330024 · 2017-11-16 ·

A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.

Method of control of persons and application to the inspection of persons
09679428 · 2017-06-13 · ·

The invention relates to a method of control of persons, in which various control/inspection steps are implemented at various control points intended to be crossed by a person, characterized by the implementation of the following operations: when a person passes a first point: acquisition of biometric data of the person, generation of a secure identity token, on the basis of biometric and/or identification data of the person, the token being an encrypted biometric signature obtained on the basis of a biometric datum acquired on the person, generation of a public identifier associated with said token and storage of said identifier in a data base in association with the identity tokens or the data on the basis of which they are generated, when a person passes at least one other control point, acquisition of an identity datum and/or of a biometric datum about the same biometric trait or traits of those about which the biometric datum was acquired on passing the first control point, and on the basis of which the identity token (J) was generated, determination of the public identifier of the person, by implementing an authentication of said person on the basis of the datum or data acquired and of the data stored in the database. The invention also relates to a system for controlling and for inspection of persons for the implementation of the method.