throbber
United States Patent
`
`[19]
`
`Gullman et a1.
`
`[54]
`
`[75]
`
`BIOMETRIC TOKEN FOR AUTHORIZING
`ACCESS TO A HOST SYSTEM
`
`Inventors: Lawrence S. Gullman, Lahonda; Eric
`Edwards, Menlo Park, both of Calif.;
`Norman Fast, Newton, Mass.
`
`[73]
`
`Assignee: Kamahira Safe Co., Inc., Hiroshima,
`Japan
`
`[211
`
`App]. No.: 868,167
`
`[22]
`,,[5 1]
`[52]
`[58]
`
`[56]
`
`Apr. 14, 1992
`Filed:
`Int. Cl.5 ............................................... H04K 1/00
`
`US. Cl. ................
`380/23; 380/25
`Field of Search .................................... 380/23, 25
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`.
`
`9/1983 Rivest et al.
`4,405,829
`9/1986 Cargile .
`4,609,777
`4,720,860 1/ 1988 Weiss .
`4,819,267 4/1989 Cargile et a].
`4,856,062
`8/1989 Weiss .
`4,885,778 12/1989 Weiss .
`4,926,480 5/1990 Chaum .................................. 380/23
`..
`...... 380/25
`4,941,173 10/1990 Boule et al.
`
`.. 380/25
`4,972,476 11/1990 Nathans .......
`2/1991 Piosenka et a .
`...... 380/23
`4,993,068
`
`4,998,279 3/ 1991 Weiss
`
`.
`
`U8005280527A
`
`[11] Patent Number:
`
`5,280,527
`
`[45]
`
`Date of Patent:
`
`Jan. 18, 1994
`
`5/1991 Rosen et al.
`5,020,105
`.......................... 380/23
`
`5,056,141 10/1991 Dyke .............. 380/25
`
`5,065,429 11/1991 Lang .............. 330/25
`7/1992 Puhletal. ............................. 330/23
`5,131,038
`
`Primary Examiner—David C. Cain
`Attorney, Agent, or Firm—J. E. Brunton
`
`ABSTRACT
`[57]
`A security apparatus receives a biometric input from a
`user, which then is compared to a template to determine
`a correlation factor. The correlation factor, a fixed code
`and either a time-varying code or a challenge code then
`are combined to generate a token. The token is dis-
`played to the user, who then enters the token at an
`access device. The access device is coupled to a secure
`host system. The access device forwards the token to
`the host, which processes the token to determine
`whether access is permitted. In one embodiment, the
`host is an electronic banking system. If access to such
`system is permitted the user is allowed to perform an
`electronic funds transfer. The security apparatus in one
`embodiment is an integrated circuit card. Each appara-
`tus includes a sensor for detecting the holder’s biomet-
`ric information (i.e., voice, signature, fingerprint), along
`with a processor and display. The processor generates
`the token which then is displayed to the holder.
`
`10 Claims, 2 Drawing Sheets
`
`14 -\
`
`20
`
`
`TIME-
`
`VARYING
`
`CODE GEN .
`
`
`PROCESSOR
`WITH RAM
`
`DISPLAY
`
`
`
`15
`
`16
`
`
`
`
`
` BIGAETRIC
`SENSOR(S)
`
`18
`
`TO ALL ELECTRONIC
`
`C(NPONENTS
`
`Apple 1014
`
`

`

`US. Patent
`
`aJ
`
`49918,1
`
`2
`
`5,280,527
`
`“-‘II\II\\J
`
`a./NW
`
`N.W\|\V\
`
`tBmIllwdam”.8885.
`.m-sq.1magmaas.ES2meth
`
`nus:scm
`
`hm
`
`m“
`
`SEES
`
`Emomzmm
`
`onozpumgm44<ah
`
`mhzmzogo
`
`So:
`
`555
`
`mmmuo<
`
`magma
`
`8.213%CEnuum
`
`325.58
`
`w“
`
`
`
`
`
`
`
`

`

`US. Patent
`
`Jan. 18, 1994
`
`Sheet 2 of 2
`
`5,280,527
`
`
`
`
`\ MULTI—CHIP
`\
`
`32
`
`’3
`
`

`

`1
`
`5,280,527
`
`BIOMETRIC TOKEN FOR AUTHORIZING
`ACCESS TO A HOST SYSTEM
`
`BACKGROUND OF THE INVENTION
`
`_
`
`This invention relates to identification and security
`systems which protect access to electronic host systems,
`such as computers and the like. More particularly this
`invention relates to an apparatus for accepting a biomet-
`ric measurement which is then used as a seed for deriv-
`ing a security token. Such token is communicated to a
`host system for determining whether access to such
`host is to be authorized.
`With the increase in private information potentially
`accessible to anyone using electronic communication
`systems, there is a corresponding increase in the need to
`provide security measures for safeguarding access to
`such information. Automatic teller machines for bank-
`ing transactions allow anyone in possession of a select
`bank card and knowledge of a corresponding personal
`identification number (PIN) to access a corresponding
`bank account to withdraw or transfer money. Persons
`can even pay their bills or shop by computer. The in-
`creasing opportunity to implement electronic transac-
`tions is accompanied by an increasing danger of elec-
`tronic theft. Thus, there is a need for increasingly effec-
`tive security mechanisms.
`Common security mechanisms include use of a per-
`sonal identification number (PIN) and use of a security
`token. A PIN is used to identify an individual and au-
`thorize access to a host system (e.g., banking transaction
`system). A security token is a non-predictable code
`derived from a private key, e.g. a unique fixed value,
`and a public key, e.g. a time varying value. For exam-
`ple, a password (fixed key) is encoded based upon time-
`variant information. Such token then is forwarded to
`the host which decodes the token back to a password.
`The token thus provides security during transmission to
`prevent the unique fixed value from being identified.
`Even if a perpetrator intercepts a token during transmis-
`sion, reapplication of the intercepted token will not
`enable access to the host system because the time-vary-
`ing “public key” will have changed. Thus, a PIN pro-
`vides user identification, while a token provides trans-
`mission security.
`A problem with personal identification numbers and
`tokens is that the legitimate user must remember the
`number or password. For users having many numbers
`or passwords; the task of remembering can be burden-
`some. Further, some cards, such as long distance calling
`cards, even print the private access code directly on the
`card. Thus, if the card is lost or stolen, the finder may
`access the system at the legitimate user’s expense. Ac-
`cordingly, there is a need for an improved security
`mechanism enabling convenient use, while providing
`security safeguards.
`One known use of biometric information with secret
`codes and tokens is described in US. Pat. No. 4,998,279
`issued Mar. 5, 1991 for METHOD AND APPARA-
`TUS FOR PERSONAL VERIFICATION UTILIZ-
`ING NONPREDICTABLE CODES AND BIO-
`CHARACTERISTICS (“Weiss”), the full disclosure of
`which is hereby incorporated herein by reference. Ac-
`cording to such disclosure, a credit card sized computer
`generates a token from a secret “fixed” code (i.e., PIN)
`and a public “time-varying” code (i.e., time of day).
`Such token is displayed on the card so the user can enter
`the token to an access machine. The entry is done so as
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`to combine the token with biocharacteristic informa-
`tion. For example, the token may be entered by having
`the user write the token numbers on‘a pressure-sensing
`pad or speak the token numbers into a telephone. The
`access verification system then compares the token to
`see if valid and compares the bio-input (e.g., voice or
`signature) to see if from the authorized user. Thus, the
`biocharacteristic information is used to identify an au-
`thorized user.
`‘
`
`Another common security mechanism that uses a
`personal identification number PIN and security token
`is a challenge/response token. It produces a dynamic
`security password not from a time varying value gener-
`ated internally, but from a challenge number provided
`by the host system and manually input to the token. One
`such example is the SafeWord ® AccessCard produced
`by Enigma Logic, Inc., of Concord, Calif.
`SUMMARY OF THE INVENTION
`
`According to the invention, biometric information is
`input to a biometric security device which generates in
`response a security token. The biometric information is
`used as part of the “seed” for generating the token.
`Such token is then communicated to a host system or
`access device to determine whether access to the host is
`permitted.
`According to one aspect of the invention, the biomet-
`ric security mechanism stores a template of user biomet-
`ric information (i.e., signature,
`finger-print, voice-
`print). To access the host system, the user enters the
`corresponding biometric information to the security
`mechanism. The mechanism verifies the input against
`the template, then generates and displays a token based
`on the verification. The user then communicates the
`token to the host system which decodes the token and
`determines whether access is authorized. More specifi-
`‘cally, the token is derived from the results of the bio-
`metric comparison, plus a time-varying value.
`According to another embodiment of the invention,
`the token is derived from the results of the above de-
`scribed biometric comparison, plus a user input chal-
`lenge code from the host, rather than a time varying
`value. In a further embodiment, the biometric informa-
`tion is collected from the operation of the user of input-
`ting the challenge to the device, either using a keypad,
`writing tablet or by voice.
`In an exemplary embodiment of the invention, the
`biometric security mechanism is an integrated circuit
`card including a processing unit, memory and a biomet-
`ric sensor. The memory stores a template of the autho-
`rized user’s biometric information, along with a verifi-
`cation algorithm. Upon entry of the cardholder’s bio—
`metric information, the processor executes the verifica-
`tion algorithm. The verification algorithm uses the tem-
`plate data, the biometric input, a fixed code (i.e., PIN,
`embedded serial number, account number) and time-
`varying self-generated information to derive a token
`output. The token output is displayed on the card where
`the cardholder can view the token and manually enter
`the token to an access device coupled to the host sys-
`tem. In an alternative embodiment, the token output is
`transmitted directly to the host system through a direct
`data communication line, eliminating the need for man-
`ual entry by the user.
`A host system may be any electronic system requiring
`or providing security access. For example,
`the host
`system may be an automatic teller machine, a bank’s
`
`

`

`4
`then compared to a stored template to derive a correla-
`tion factor, as described above.
`For a successful biometric entry or where the user is
`not informed of a failed biometric entry, the correlation
`factor is combined with a fixed code (i.e., PIN, embed-
`ded serial number, account number) and in one embodi-
`ment, a time-varying code (i.e. the time of day) to gen-
`erate the security token. In the challenge code embodi-
`ment, the correlation factor is combined with a fixed
`code and the challenge code to generate the security
`token. The token is displayed on a display panel of the
`security apparatus 14. The user then enters such token
`at the access device 12. The access device 12 sends the
`token to the host 10 which decodes the token to identify
`5 the embedded fixed code and correlation factor. In an
`alternative embodiment, the security apparatus 14 is
`coupled directly to the host system 10, such that the
`token output is transmitted directly to the host without
`the need for displaying the token or manual entry by the
`user. The coupling can be accomplished using, for ex-
`ample, standard data communication cable or any other
`known data transmission technique.
`To properly decode the token, the security apparatus
`14 is synchronized with the host system 10 so that the
`time varying code is identical at both the security mech—
`anism 14 and the host system 10. In the challenge code
`embodiment,
`the host system, having generated the
`challenge code, retains the challenge code in memory to
`decode the token. The host 10 identifies the user with
`the fixed code and verifies the identification based on
`the correlation factor. The host system 10 permits full
`or limited entry based upon the level of authorization
`assigned to a given user (as identified by the fixed code).
`For example, a given user may be allowed to perform
`an electronic funds transfer only from a prescribed
`account.
`
`10
`
`20
`
`25
`
`30
`
`35
`
`5,280,527
`
`3
`computer system or even an electronic gate for access-
`ing a secured area.
`The invention will be better understood by reference
`to the following detailed description taken in conjunc-
`tion with the accompanying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a block diagram of a security system includ-
`ing a biometric security apparatus for generating a
`token according to an embodiment of this invention.
`FIG. 2 is an electronics block diagram of the biomet-
`ric security apparatus.
`FIG. 3 is an integrated circuit card embodiment of
`the biometric security apparatus of FIG. 1.
`
`DESCRIPTION OF SPECIFIC EMBODIMENTS
`Overview
`
`Security safeguards for accessing a host system 10 are
`provided by an access device 12 and a biometric secu-
`rity apparatus 14. Typically, the host system 10 is a
`computer system, on-line bank system or even a secured
`area. The host system 10 (or host area) is presumed to
`contain confidential or valuable information which
`must be secured against unauthorized access. To safe-
`guard access to such information, access is limited by an
`access device 12. Such access device 12 communicates
`with the host system to verify authorized personnel and
`transfer information. The access device may be a termi-
`nal in communication with a host computer, an auto-
`mated teller machine in communication with a banking
`network having a host database management system, a
`telephone linked to a computer system or even an elec-
`tronic lock restricting access to a secured area. The
`biometric security mechanism 14 adds another level of
`security to the access process.
`.
`According to the invention, the biometric security
`mechanism 14 generates a security token which the user
`inputs to the access device 12 Such security token is
`formed from biometric information, a fixed code and, in
`one embodiment, a time-varying code or, in a second
`embodiment, a host-generated challenge code. The
`biometric information may be a fingerprint, voiceprint
`or writing sample. The security apparatus 14 receives
`the biometric input, then compares the biometric input
`to a stored template to derive a correlation factor. If the
`correlation factor is below a prescribed threshold level,
`the correlation is unsuccessful. In some embodiments,
`the security apparatus may then display that the biomet-
`ric entry is invalid. In other embodiments, the security
`apparatus need not notify the user that the biometric
`entry was invalid. Instead an invalid token is displayed,
`so that upon input to the access device 12 access to the
`host system 10 is denied and the host is informed of an
`access attempt.
`In an embodiment of the invention using the chal-
`lenge code, in addition to providing biometric input to
`the security apparatus, the user inputs a challenge code
`by, for example, handwriting, voice, or typing, which
`will usually be generated by the host system and dis-
`played to the user. In another exemplary embodiment of
`the invention using the challenge code, the biometric
`information is obtained from the very operation of in-
`putting the challenge code by the user. For example, as
`the user inputs the challenge code by voice, handwrit-
`ing, or typing on a keypad, the security apparatus makes
`biometric measurements of the input to generate the
`necessary biometric information. This information is
`
`Biometric Securitv Apparatus
`
`FIG. 2 shows an electronic block diagram of the
`biometric security apparatus 14. The apparatus 14 in-
`cludes a power source 15, on/ofl" switch 16, biometric
`sensor 18, display 20, processor 22 with on-chip random
`access memory, biometric input section 33 for receiving
`biometric information from the biometric sensor a read
`only memory (ROM) 24 (which may be a PROM,
`EPROM or the like), time-varying code generator 26
`and display drivers 30. Preferably, the processor 22,
`ROM 24, generator 26 and drivers 30 are formed as a
`multi-chip module 32, or a single ASIC.
`In one embodiment the processor 22 is an 8-bit micro-
`processor with 156 bytes of random access memory
`available on-chip, such as a type 8051 microprocessor
`manufactured by Intel Corporation of Santa Clara,
`Calif. An amount of random access memory, e.g., 16
`kbytes of RAM, may be located apart from the 8051
`microprocessor off-chip. A nonvolatile memory ele-
`ment, e.g., ROM 24 is for example a 32 kbyte memory.
`Each security apparatus 14 comes with an embedded
`“fixed” code stored in PROM 24. Such fixed code is
`used to form a token and is thus available to the host
`system 10 to identify a person requesting access The
`display 20 is a 7-l0 character LCD panel, although the
`number of characters may vary according to the em-
`bodiment. Conventional LCD driver circuits 30 are
`coupled between the processor 22 and LCD display 20.
`The time-varying code generator 26 may be a time-
`based generator available from Security Dynamics
`Technologies of Cambridge, Mass. and described in
`
`45
`
`50
`
`55
`
`60
`
`65
`
`

`

`5,280,527
`
`5
`the complete disclosure of
`Us. Pat. No. 4,720,860,
`which is hereby incorporated herein by reference. The
`generator 26 utilizes a real time clock 25 to generate a
`time—varying code for use in deriving a token. The time-
`varying code is based on the time of day. The US. Pat.
`No. 4,720,860 describes a method for keeping the time
`of day the same as in a host system without interconnec-
`tion between the generator 26 and host system such that
`biometric security apparatus 14 and host system 10 can
`generate the same token for a given input at a given
`time. Processor 22 generates a security token based on
`the time-varying code, fixed code and biometric input
`from biometric sensor 18, and outputs the token to dis—
`play 20.
`Alternatively, processor 20 may include a standard
`encryption module which applies an encryption algo-
`rithm to the time of day from real time clock 25, the
`fixed code and a biometric correlation factor, generat-
`ing an encrypted security token. Such an encryption
`module is described in US. Pat. No. 4,819,267 and US.
`Pat. No. 4,405,829, the complete disclosures of both
`patents hereby being incorporated herein by reference.
`The security token is output to display 20. In this em-
`bodiment, the host system 10 includes a decryption
`module, capable of decrypting the encrypted code gen-
`erated by the encryption module of biometric security
`apparatus 14. The capability to decrypt the token at the
`host system allows the token input by the user to be
`broken down into its biometric, time-varying and fixed
`code components. In some applications, this has distinct
`advantages over systems which are capable only of
`comparing the input token to a stored or time-generated
`value.
`
`FIG. 3 shows an integrated circuit card 14' embodi-
`ment of the security apparatus 14. The card 14’ serves as
`a convenient accessible security device kept in the pos-
`session of a person seeking access to the host system 10.
`The card may be the length, width and thickness of a
`conventional credit card.
`
`Biometric Sensor Embodiments
`
`The biometric sensor 18 detects biometric input from
`a user (i.e., card-holder, pen-holder), the exact nature of
`which is not critical to the invention, so long as it senses
`information which is basically personal and substan-
`tially invariant in characteristics which are detected.
`According to various embodiments, the sensor 18 may
`detect a fingerprint, a signature, a voice or other like
`information. For the card embodiment 14’, the sensor 18
`may be a scanning device which detects a fingerprint or
`pressure sensing device which detects a signature. Al-
`ternatively, a CCD imaging device could be used to
`capture a picture of the fingerprint or signature. The
`sensor 18 also could be a voice detector.
`
`Enroll Mode
`
`The security apparatus 14 initially is configured in an
`“enroll” mode. During the enroll mode, one or more,
`preferably several, biometric samples are obtained and
`permanently stored as templates. In alternate embodi-
`ments, multiple templates for multiple users are stored.
`During normal operations, a biometric input sample is
`compared to one or more of the templates to identify
`whether the person entering the sample is a person
`whose templates are stored.
`To permanently store the templates and prevent reen-
`try into enroll mode, the enroll software is normally
`inaccessible after the first use. For multi-user embodi-
`
`6
`ments, the enroll mode can be re-entered or reset only
`by an authorized user after valid biometric input is en-
`tered. If such input has the priority level authorizing
`re-entry or resetting to the enroll mode, then the enroll
`mode is entered.
`
`Normal Mode
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`Once enrollment is complete, the security apparatus
`14 permanently enters normal mode. In normal mode a
`user turns on the apparatus 14 using switch 16, then
`enters biometric input based on the type of biometric
`sensor 18 installed. The biometric input is received from
`the biometric sensor 18 into input section 33. Regardless
`of whether a fingerprint, signature or voice entry, the
`biometric input is compared to one or more stored tem-
`plates. A correlation factor is calculated for each tem-
`plate. If the correlation factor indicates correlation
`closer than a prescribed threshold level (i.e., 90 on a.
`scale of 0 to 100) for any template, then the biometric
`verification is successful. If none of the correlation
`factors satisfy the prescribed level, then the biometric
`verification is unsuccessful. In one embodiment, a mes-
`sage is displayed to indicate an invalid biometric input.
`In another embodiment, where it may be undesirable to
`notify the holder that the entry is invalid, an invalid
`token is displayed, which when entered at the access
`device 12 does not enable access to the host system 10,
`but which allows the host system to record the unsuc-
`cessful attempt.
`Each security apparatus includes a unique embedded
`code (e.g., fixed code) as previously described. The
`correlation factor, fixed code and a time-varying code
`from the time code generator 26 together are used to
`derive a security token.
`The derived token is then displayed. The user then
`reads the token from the display 20 and enters the token
`at the access device 12. The access device 12 transmits
`the token to the host 10 which decrypts or decodes the
`token to derive the fixed code and correlation factor. If
`the fixed code identifies a valid user and the correlation
`factor is above the threshold level, then access is per-
`mitted. If not, then access is denied. With a fixed code to
`identify a particular person or group of persons, the
`host can be programmed to control the type of access or
`transactions allowed for such fixed code.
`The method and apparatus of the present invention
`have significant advantages over known security sys-
`tems. Reliable and secure identification is provided
`which eliminates the need for the user to memorize a
`code or carry a printed memorandum of the code.
`Transmission security is provided which is convenient,
`secure and useful on existing access devices of host
`systems in current use. In particular, the method and
`apparatus obviate the need for specially-designed hard-
`ware additions or modifications to existing access de-
`vices. The security token generated by the present in-
`vention may be input in the same manner as PINS or
`other security codes in common use. The security token
`could even be input from a telephone or computer at a
`remote location via electronic transmission to an access
`device.
`
`65
`
`Although a preferred embodiment of the invention
`has been illustrated and described, various alternatives,
`modifications and equivalents may be used. Therefore,
`the foregoing description should not be taken as limiting
`the scope of the inventions which are defined by the
`appended claims.
`What is claimed is:
`
`

`

`5,280,527
`
`7
`l. A user verification apparatus for use in verifying
`the identify of a user of a remote host system as that of
`an authorized user, comprising:
`'
`(a) means for receiving biometric information from
`the user;
`(b) memory means for storing acceptance threshold
`level data along with previously obtained biomet—
`ric information of the authorized user and a fixed
`code;
`(c) comparison means for comparing said biometric
`information from the user with said previously
`obtained biometric information and for generating
`a correlation factor;
`(d) signal generating means for comparing said corre-
`lation factor with said acceptance threshold level
`data to generate a transmittable code, including an
`authentication code; and
`(e) transmission means for receiving said transmitta-
`ble code from said signal generating means and for
`transmitting said transmittable code, including said
`authentication code, to the host system for a deter-
`mination by the host system of whether to grant to
`the user access to the host system.
`2. An apparatus as defined in claim 1 in which said
`signal generating means is further adapted to combine
`said first authentication code and said fixed code to
`generate a transmittable code adapted to be transmitted
`to said transmission means for subsequent transmission
`to the host system for a determination by the host sys-
`tem of whether to grant to the user access to the host
`system.
`3. An apparatus as defined in claim 2 further includ-
`ing means for inputting a time varying code into said
`memory means and in which said signal generating
`means is adapted to combine said first authentication
`code with said time varying code to generate a transmit-
`table code adapted to be transmitted to said transmis-
`sion means for subsequent transmission to the host sys-
`tem for a determination by the host system of whether
`to grant to the user access to the host system.
`4. An apparatus as defined in claim 2 further includ-
`ing means for inputting a challenge code to said signal
`generating means and in which said signal generating
`means is adapted to combine said authentication code
`and said challenge code to generate a transmittable code
`and in which said transmission means is adapted to
`transmit said transmittable code to the host system for a
`determination by the host system of whether to grant
`the user access to the host system.
`5. An apparatus as defined in claim 4 in which said
`transmittable code is numerical.
`
`6. An apparatus for use in verifying the identity of a
`user of a host system as that of the authorized user,
`comprising:
`
`8
`(a) input means for receiving biometric input from the
`user and for generating an input signal in response
`thereof;
`(b) memory means for storing biometric information
`of the authorized user and for storing acceptance
`level data;
`(c) data processing means communicating with said
`input means and said memory means for:
`(i) receiving said input signal
`from said input
`means;
`(ii) receiving said biometric information of the
`authorized user from said memory means;
`(iii) comparing said input signal and said biometric
`information of the authorized user, and
`(iv) generating a similarity signal.
`(d) signal generating means for comparing said
`threshold acceptance level data with said similarity
`signal to generate a transmittable code including an
`authentication code; and
`(e) transmission means for receiving said transmitta-
`ble code from said signal generating means and for
`transmitting said transmittable code, including said
`authentication code to the host system for a deter-
`mination by the host system whether to grant to the
`user access to the host system.
`7. An apparatus as defined in claim 6 further includ-
`ing means for generating a time code signal and for
`inputting said time code signal into said memory means,
`said signal generating means being adapted to combine
`said time code signal and said authentication code to
`generate a transmittable code for transmission to said
`transmission means.
`8. A method for authenticating a user’s identity as
`being that of an authorized user and securing access to
`a host system, comprising the steps of:
`(a) receiving a user’s biometric input;
`(b) comparing the biometric input with a stored tem-
`plate to generate a correlation factor;
`(c) comparing said correlation factor with predeter-
`mined acceptance threshold level data to generate
`a transmittable code;
`(d) transmitting said transmittable code to the host
`system; and
`(e)'determining at the host system from the received
`transmittable code whether to grant access to the
`host system.
`9. A method as defined in claim 8 in which said corre-
`lation factor is combined with said acceptance thresh-
`old level data to generate an authentication code which
`is then combined with a time varying code to generate
`a transmittable code for transmitting to the host system
`for use in determining whether to grant access.
`10. A method as defined in claim 9 in which said
`transmittable code thus generated is further combined
`with a challenge code to generate a numerical code for
`transmitting to the host system to determine at the host
`system whether access is authorized.
`t
`t
`t
`t
`it
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`55
`
`65
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket