throbber
(12) United States Patent
`Giobbi
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,352,730 B2
`Jan. 8, 2013
`
`US00835273OB2
`
`(54) BIOMETRIC PERSONAL DATA KEY (PDK)
`AUTHENTICATION
`
`(75) Inventor: John J. Giobbi, Bend, OR (US)
`(73) Assignee: Proxense, LLC, Bend, OR (US)
`-
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 938 days.
`(21) Appl. No.: 11/314,199
`
`(*) Notice:
`
`(22) Filed:
`
`Dec. 20, 2005
`
`(65)
`
`Prior Publication Data
`US 2006/0143441 A1
`Jun. 29, 2006
`
`Related U.S. Application Data
`(60) Provisional application No. 60/637,538, filed on Dec.
`20, 2004, provisional application No. 60/652,765,
`filed on Feb. 14, 2005.
`
`(51) Int. Cl.
`(2006.01)
`G06G 2L/00
`(52) U.S. Cl. ......................... 713/155: 713/182; 713/186
`(58) Field of Classification Search .................... 380/23;
`713/155, 159, 176, 186: 726/27-30; 382/115;
`340/5.52 5.53
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`4,759,060 A
`7/1988 Hayashi et al.
`4,993,068 A
`2f1991 Piosenka et al.
`5,187,352 A
`2f1993 Blair et al.
`5,296,641 A
`3, 1994 Stelzel
`5,392.433 A
`2/1995 Hammersley et al.
`5,416,780 A
`5, 1995 Patel
`5,422,632 A
`6, 1995 Bucholtz et al.
`
`WO
`
`5:3. A
`5,629,980 A
`5,644,354 A
`5,666.412 A
`
`3. 3: E. et al
`urOIWa et al.
`5, 1997 Stefket al.
`7/1997 Thompson et al.
`9/1997 Handelman et al.
`Continued
`(Continued)
`FOREIGN PATENT DOCUMENTS
`WOOOf 62505 A1 10, 2000
`(Continued)
`OTHER PUBLICATIONS
`"Alliance Activities: Publications: Identity—Smart Card Alliance.”
`SmartCard Alliance, 1997-2007, online Retrieved on Jan. 7, 2007
`Retrieved from the Internet-URL:http://www.smartcardalliance.
`org/pages/publications-identity D.
`(Continued)
`
`Primary Examiner — Matthew Smithers
`Assistant Examiner — Phy Anh Vu
`(74) Attorney, Agent, or Firm — Patent Law Works LLP
`(57)
`ABSTRACT
`Systems and methods are provided for an integrated device
`that persistently (or permanently) stores biometric data for a
`user in a tamper-resistant format. Subsequently, Scan data
`collected from a user (e.g., a finger-print) can be compared
`against the biometric data. Once the user has been verified by
`the integrated device, a code can be wirelessly transmitted for
`authentication. The authentication module sends the code to a
`trusted key authority. The trusted key authority checks a list of
`enrolled integrated devices for a match. If there is a match, the
`authentication module sends a message to an application to
`allow access by the user. The trusted key authority also stores
`a profile associated with the code. The profile can contain user
`information Such as name, age, account numbers, prefer
`ences, etc. and can also describe the status of the integrated
`device.
`
`17 Claims, 6 Drawing Sheets
`
`Biometric Key
`100
`
`Authentication
`Mole
`
`Trusted Key
`Authority
`32
`
`|
`
`Register User And
`Biometric Key
`41
`
`Receive Bidetric
`Data
`Of The User
`42
`
`Biometrically verify
`User
`44
`
`Authentiation
`Nessed for Af
`Application?
`43
`YES
`
`Request
`Autheritication
`S.
`
`
`
`Allow Access to the
`Application
`
`Authenticats. The
`sometricksy
`s
`
`
`
`Petitioner's Exhibit 1001, Page 1
`
`

`

`US 8,352,730 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`Akiyama et al.
`7, 1998
`5,784,464
`10, 1998
`Peterson, Jr.
`5,825,876
`1, 1999
`Peterson, Jr.
`5,857,020
`Mages et al.
`4, 1999
`5,892,825
`Huggins et al.
`4, 1999
`5,894,551
`Ryu
`4, 1999
`5,898,880
`Wang
`6, 1999
`5,917,913
`Wang et al.
`7, 1999
`5,928,327
`11, 1999
`Graunke et al.
`5.991,399
`Morril, Jr.
`11, 1999
`5.991,749
`1, 2000
`Maes et al.
`6,016,476
`McCoy et al.
`1, 2000
`6,018,739
`Campinos et al.
`3, 2000
`6,035,038
`Mages et al.
`3, 2000
`6,035,329
`3, 2000
`Hamid
`6,038,334
`3, 2000
`Hsu et al. ...................... T13, 186
`6,041,410
`Van Tilburg et al.
`3, 2000
`6,042,006
`Spies et al.
`4, 2000
`6,055,314
`6, 2000
`Sirbu
`6,070,796
`T/2000
`Kato et al.
`6,088,730
`Allport
`8, 2000
`6,104,334
`Petsinger
`9, 2000
`6,121,544
`11, 2000
`Anderson
`6,148,142
`12, 2000
`Seidel
`6,161,179
`2, 2001
`Buffam.
`6,185.316
`3, 2001
`Selitrennikoff et al.
`6,209,089
`Raynesford et al.
`4, 2001
`6,219,109
`Burger
`4, 2001
`6,219,439
`6, 2001
`Fritsch
`6,247,130
`T/2001
`Bianco et al.
`6.256,737
`Campinos et al.
`T/2001
`6,266,415
`9, 2001
`Rosin et al.
`6,295,057
`Lyson et al.
`1, 2002
`6,336,121
`1, 2002
`Kato et al.
`6,336,142
`3, 2002
`Adams et al.
`6,363,485
`4, 2002
`Ansell et al.
`6,367,019
`4, 2002
`Wonfor et al.
`6,381,747
`5, 2002
`Wiser et al.
`6,385,596
`5, 2002
`White et al.
`6,392.664
`5, 2002
`Rosin et al.
`6,397,387
`6, 2002
`Shen et al.
`6,401,059
`6, 2002
`Rosin et al.
`6,411,307
`T/2002
`Saito
`6.424,715
`T/2002
`Rallis et al.
`6.425,084
`Kupka et al.
`8, 2002
`6,434,535
`Grapes
`9, 2002
`6,446,130
`Geiger et al.
`10, 2002
`6.463,534
`Horsley
`11, 2002
`6,480,188
`Freeny, Jr.
`12, 2002
`6,490.443
`1, 2003
`Steen et al.
`6,510,350
`Wehrenberg
`2, 2003
`6,523,113
`3, 2003
`Getsin et al.
`6,529,949
`4, 2003
`Schena et al.
`6,546,418
`Sims, III
`4, 2003
`6,550,011
`5/2003
`Ma et al.
`6,563,805
`Murphy
`5/2003
`6,564,380
`9, 2003
`White et al.
`6,628.302
`Hasegawa
`10, 2003
`6,632,992
`11, 2003
`Hunter et al.
`6,647,417
`Waggamon et al.
`12, 2003
`6,667,684
`1, 2004
`Searle
`6,683.954
`2, 2004
`Jones et al.
`6,697.944
`3, 2004
`Bradford et al.
`6,709,333
`Yap et al.
`3, 2004
`6,711,464
`8, 2004
`Peinado et al.
`6,775,655
`10, 2004
`White et al.
`6,804,825
`10, 2004
`Chernock et al.
`6,806,887
`2, 2005
`Prokoski et al.
`6,850,147
`Hatakeyama et al.
`3, 2005
`6,873,975
`9, 2005
`Lee et al.
`6,950,941
`12, 2005
`Giobbi
`6,973,576
`Rodriguez et al.
`12, 2005
`6,975,202
`1, 2006
`6,983,882
`Cassone
`3, 2006
`Nielsen
`7,012,503
`Kelly et al.
`8, 2006
`7,090,126
`9, 2006
`Hedricket al.
`7,112,138
`Kamibayashi et al.
`11, 2006
`7,137,012
`3, 2007
`Hamid et al.
`7, 191466
`
`5/2007 Cromer et al.
`7,218,944 B2
`7, 2007 Miller
`7,249,177 B1
`7,305,560 B2 12/2007 Giobbi
`7,529,944 B2
`5, 2009 Hamid
`7,574,734 B2
`8, 2009 Fedronic et al.
`7,644,443 B2
`1/2010 Matsuyama et al.
`7,715,593 B1
`5/2010 Adams et al.
`7,883,417 B2
`2/2011 Bruzzese et al.
`2001/0044337 A1 11/2001 Rowe et al.
`2002fOOO7456 A1
`1/2002 Peinado et al.
`2002fOO 13772 A1
`1/2002 Peinado
`2002fOO 14954 A1
`2/2002 Fitzgibbon et al.
`2002fOO15494 A1
`2/2002 Nagai et al.
`2002fOO23032 A1
`2/2002 Pearson et al.
`2002fOO26424 A1
`2/2002 Akashi
`2002fOO73042 A1
`6/2002 Maritzen et al.
`2002/0098888 A1
`7/2002 Rowe et al.
`2002/0103027 A1
`8, 2002 Rowe et al.
`2002/0104.006 A1
`8, 2002 Boate et al.
`2002/0109580 A1
`8, 2002 Shreve et al.
`2002/10.10804
`8, 2002 Xu et al.
`2002/0138767 A1
`9, 2002 Hamid et al.
`2002fO140542 A1 10, 2002 Prokoski et al.
`2002/01441 17 A1 10/2002 Faigle
`2002/0150282 A1* 10, 2002 Kinsella ........................ 382,124
`2002fO158750 A1 10, 2002 Almalik
`2002/0178063 A1 11/2002 Gravelle et al.
`2002/019 1816 A1 12/2002 Maritzen et al.
`2003.0036425 A1
`2/2003 Kaminkow et al.
`2003/0046552 A1
`3/2003 Hamid
`2003.0054868 A1
`3/2003 Paulsen et al.
`2003.0054881 A1
`3/2003 Hedricket al.
`2003/0055689 A1
`3/2003 Blocket al.
`2003/OO79.133 A1
`4/2003 Breiter et al.
`2003/O127511 A1
`7/2003 Kelly et al.
`2003. O139190 A1
`7/2003 Steelberg et al.
`2003. O172037 A1
`9/2003 Jung et al.
`2003/0176218 A1
`9/2003 LeMay et al.
`2003/0186739 A1 10, 2003 Paulsen et al.
`2004/O127 277 A1
`7/2004 Walker et al.
`2004/0129.787 A1* 7/2004 Saito et al. .................... 235/492
`2004/0209690 A1 10, 2004 Bruzzese et al.
`2004/02096.92 A1 10, 2004 Schober et al.
`2004/0215615 A1 10, 2004 Larsson et al.
`2004/0230488 A1* 11/2004 Beenau ........................... 705/18
`2005/0074126 A1* 4/2005 Stanko .......................... 380,279
`2005/0229.007 A1 10, 2005 Bole et al.
`2005/025 1688 A1 11/2005 Nanawati et al.
`2006/0022046 A1
`2/2006 Iwamura
`2007/0220272 A1* 9/2007 Campisi et al. ............... T13, 186
`2008. O1883O8 A1
`8/2008 Shepherd et al.
`2009/0328.182 Al 12/2009 Malakapalliet al.
`2010.0117794 A1
`5, 2010 Adams
`2011/O126188 A1
`5/2011 Bernstein et al.
`
`FOREIGN PATENT DOCUMENTS
`WOO1/22724 A1
`3, 2001
`WO
`WOO1,75876 A1 10, 2001
`WO
`WOO 1/77790 A1 10, 2001
`WO
`WO WO 2005/050450 A1
`6, 2005
`WO WO 2005/0868O2 A2
`9, 2005
`OTHER PUBLICATIONS
`"Applying Biometrics to Door Access.” Security Magazine, Sep. 26.
`2002 online Retrieved on Jan. 7, 2007 Retrieved from the
`Internet-URL:http://www.securitymagazine.com/CDA/Articles/
`Technologies/3ae610eaa34d8010VgnVCM100000ft)32a8cO >.
`“Frequently Asked Questions (FAQs) About BioPay,” BioPay, LLC,
`2007, online Retrieved on Jan. 7, 2007 Retrieved from the
`Internet-URL:http://www.biopay.com/faqs-lowes.asp.
`Mciver, R. et al., “Identification and Verification Working Together.”
`Bioscrypt TM, Aug. 27, 2004, online Retrieved on Jan. 7, 2007
`Retrieved
`from
`the
`Internet
`<URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf/15/
`Identification%20and%20Verification% 20Working%20Together.
`pdf>.
`Nilsson, J. et al., “Match-On-Card for Java Cards.” Precise
`Biometrics, White Paper, Apr. 2004, online Retrieved on Jan. 7.
`
`Petitioner's Exhibit 1001, Page 2
`
`

`

`US 8,352,730 B2
`Page 3
`
`2007 Retrieved from the Internet-URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf 17/Precise%20Match-on
`Card%20for%20Java'620Cards.pdf>.
`Nordin, B., “Match-On-Card Technology.” PreciseTM Biometrics,
`White Paper, Apr. 2004, online Retrieved on Jan. 7, 2007
`Retrieved
`from
`the
`Internet-URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf 17/Precise%20Match-on
`Card%20technology.pdf>.
`“SAFModuleTM: A Look Into Strong Authentication.” saflink Corpo
`ration, online Retrieved on Jan. 7, 2007 Retrieved from the
`Internet-URL:http://www.ibia.org/membersadmin/whitepapers/
`pdf.6/SAFmod WP.pdf>.
`“Smart Cards and Biometrics White Paper.” Smart Card Alliance,
`May 2002, online Retrieved on Jan. 7, 2007 Retrieved from the
`Internet-URL:http://www.securitymanagement.com/library/
`Smartcard facqtech0802.pdf>.
`Wade, W. “Using Fingerprints to Make Payments at POS Slowly
`Gaining Popularity.” Credit Union Journal, International Biometric
`Group, Apr. 21, 2003, online Retrieved on Jan. 7, 2007 Retrieved
`from the Internet-URL:http://www.biometricgroup.com/in the
`news/04.21.03.html>.
`Antonoff, Michael, “Visiting Video Valley.” Sound & Vision, pp. 116
`and 118-119, Nov. 2001.
`Article, “In the Age of Napster, Protecting Copyright is a Digital
`Arms Race. Wall Street Journal, Jul. 25, 2000.
`Article, “Sound Waves Could Help Ease Web-Fraud Woes.” Wall
`Street Journal, Aug. 14, 2000.
`Blum, Jonathan, “Digital Rights Management May Solver the
`Napster “Problem’.” Technology Investor Industrysector, (Oct.
`2000), 24-27.
`Debow, Credit/Debit Debuts in Midwest SmartCard Test, Computers
`in Banking, v6, n11, p10, Nov. 1989.
`Dennis, Digital Passports Need Not Infringe Civil Liberties,
`Newsbytes, Dec. 2, 1999, 2 pages.
`Fasca, Chad, “The Circuit.” Electronic News, 45(45) (Nov. 8, 1999),
`20.
`Firecrest Shows How Truly Commercially-Minded Companies Will
`Exploit the Internet, Computergram International, Jan. 18, 1996.
`Lake, Matt, “Downloading for Dollars.” Sound & Vision, (Nov.
`2000), 137-138.
`Lewis, Sony and Visa in On-Line Entertainment Venture, New York
`Times, v 145, Nov. 16, 1995.
`Notification of the International Search Report and Written Opinion,
`PCT/US04/38124, Apr. 7, 2005, 10 pages.
`Paget, Paul, “The Security Behind Secure Extranets.” Enterprise
`Systems Journal, (Dec. 1999), 4pgs.
`Press Release, “Micronas and Thomson Multimedia Showcase a
`New Copy Protection System that Will Drive the Future of Digital
`Television,” www.micronas.com, Jan. 8, 2002.
`
`Press Release, “Content Protection Plan Targets Wireless HomeNet
`works. www.eetimes.com, Jan. 11, 2002.
`Press Release, “Thompson Bets on Smart Cards for Video Encryp
`tion,” www.informationweek.com, Jun. 7, 2001.
`Press Release, “Thompson Multimedia Unveils Copy Protection Pro
`posal Designed to Provide Additional Layer of Digital Content Secu
`rity,” www.thompson-multimedia.com, May 30, 2001.
`“Say Hello to Bluetooth.” Bluetooth Web site, 4 pages.
`Sapsford, Jathon, "E-Business: Sound Waves Could Help Ease Web
`Fraud Woes.” Wall Street Journal. (Aug. 14, 2000), B1.
`Van Winkle, William, “Bluetooth, the King of Connectivity.” Laptop
`Buyer's Guide and Handbook, (Jan. 2000), 148-153.
`Wallace, Bob, "The Internet Unplugged.” InformationWeek,
`765(22), (Dec. 13, 1999), 22-24.
`Weber, Thomas E., “In the Age of Napster, Protecting Copyright is a
`Digital Arms Race.” Wall Street Journal, (Jul. 24, 2000), B1.
`PCT International Search Report and Written Opinion, PCT/US05/
`43447, Feb. 22, 2007, 7 pages.
`PCT International Search Report and Written Opinion, PCT/US05/
`46843, Mar. 1, 2007, 10 pages.
`Non-Final Office Action, U.S. Appl. No. 1 1/292,330, Dated: Sep. 16,
`2010, 23 pages.
`United States Office Action, U.S. Appl. No. 11.744,831, Sep. 3, 2010,
`27 pages.
`International Search Report, PCT/U507/11103, Apr. 23, 2008, 9
`pageS.
`International Search Report, PCT/US07/11104, Jun. 26, 2008, 9
`pageS.
`International Search Report, PCT/US07/11102, Oct. 3, 2008, 11
`pageS.
`International Search Report, PCT/US07/11105, Oct. 20, 2008, 10
`pageS.
`“What is a File?”, Apr. 30, 1998, URL: http://unixhelp.ed.ac.uk/
`editors whatisafile.html, accessed Mar. 11, 2010 via http://
`waybackmachine.org/19980615000000* /http://unixhelp.ed.ac.uk/
`editors whatisafile.html.
`United States Office Action, U.S. Appl. No. 1 1/292,330, Dec. 2,
`2011, 25 pages.
`United States Office Action, U.S. Appl. No. 1 1/744,831, Dec. 16,
`2011, 38 pages.
`United States Office Action, U.S. Appl. No. 1 1/744,832, Feb. 7, 2012,
`32 pages.
`United States Office Action, U.S. Appl. No. 1 1/745,249, Feb. 2, 2012,
`36 pages.
`United States Office Action, U.S. Appl. No. 1 1/292,330, Apr. 6, 2012,
`22 pages.
`Pope, Oasis Digital Signature Services: Digital Signing without the
`Headaches, Internet Computing-IEEE, vol. 10, 2006, pp. 81-84.
`
`* cited by examiner
`
`Petitioner's Exhibit 1001, Page 3
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 1 of 6
`
`US 8,352,730 B2
`
`
`
`Biometric Key 100
`Biometric Portion
`220
`Enrollment
`Module
`222
`
`Validation
`Module
`224
`
`Persistent
`Storage
`226
`
`FIG. 1
`
`Control
`Module
`210
`
`FG. 2
`
`RF Communication
`Module
`230
`
`Petitioner's Exhibit 1001, Page 4
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 2 of 6
`
`US 8,352,730 B2
`
`
`
`
`
`Biometric Key
`100
`
`
`
`311
`
`Application
`330
`
`Authentication
`Module
`310
`
`
`
`
`
`Trusted Key
`Authority
`320
`
`F.G. 3
`
`Petitioner's Exhibit 1001, Page 5
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 3 of 6
`
`US 8,352,730 B2
`
`Biometric Key
`100
`
`Authentication
`Module
`310
`
`Trusted Key
`Authority
`320
`
`
`
`Register User And
`Biometric Key
`410
`
`Receive Biometric
`Data
`Of The User
`420
`
`
`
`Biometrically Verify
`User
`440
`
`
`
`
`
`
`
`
`
`
`
`Authentication
`Needed For An
`Application?
`430
`YES
`
`Request
`Authentication
`450
`
`Allow Access To The
`Application
`470
`
`FIG. 4
`
`
`
`Authenticate The
`Biometric Key
`460
`
`Petitioner's Exhibit 1001, Page 6
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 4 of 6
`
`US 8,352,730 B2
`
`OO
`
`
`
`Check identification and Establish Profile
`510
`
`Persistently Store Biometric Data
`From The User
`520
`
`Obtain Code
`530
`
`Associate Profile
`With Code
`540
`
`F.G. 5
`
`Petitioner's Exhibit 1001, Page 7
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 5 of 6
`
`US 8,352,730 B2
`
`OO
`
`START
`605
`
`Request User Scan
`610
`
`Receive Scan Data From A Subject
`620
`
`Scan Data Match Biometric Data?
`630
`
`
`
`YES
`
`The Subject is Verified
`As The Registered User
`640
`
`Wirelessly Send Code Indicating
`Successful Verification of User
`650
`
`F.G. 6
`
`Verification
`Failed
`650
`
`Petitioner's Exhibit 1001, Page 8
`
`

`

`U.S. Patent
`
`Jan. 8, 2013
`
`Sheet 6 of 6
`
`US 8,352,730 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Wirelessly Receive The Code
`710
`
`Request Authentication
`Of The Code
`720
`
`Code Authenticated?
`730
`
`Send Access Message To The Application
`740
`
`Authentication
`Failed
`750
`
`FIG. 7
`
`Petitioner's Exhibit 1001, Page 9
`
`

`

`1.
`BIOMETRIC PERSONAL DATA KEY (PDK)
`AUTHENTICATION
`
`US 8,352,730 B2
`
`2
`In one embodiment, an authentication module sends the
`code to a trusted key authority. The trusted key authority
`checks a list of enrolled biometric keys to determine whether
`the code is valid. If the code is valid, the authentication
`module allows the user to access an application.
`In another embodiment, the trusted key authority can store
`a profile associated with the biometric key having the code.
`The profile can contain user information Such as name, age,
`account numbers, preferences, and the like. In addition, the
`profile can describe the status of the key, identify the trusted
`key authority, and/or contain other information. The profile
`can also be sent to the authentication module for use by the
`application (e.g., an age of user sent to a casino machine).
`Advantageously, user authentication is bolstered with
`highly reliable biometric verification of the user in a single
`key. Furthermore, a keyless environment relieves authorized
`users from having to memorize credentials, and of having to
`physically enter credentials or keys. In addition, the key can
`be authenticated for an application that is open to the public
`(i.e., in an open loop system).
`The features and advantages described in the specification
`are not all inclusive and, in particular, many additional fea
`tures and advantages will be apparent to one of ordinary skill
`in the art in view of the drawings, specifications, and claims.
`Moreover, it should be noted that the language used in the
`specification has been principally selected for readability and
`instructional purposes and may not have been selected to
`delineate or circumscribe the inventive matter.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The teachings of the present invention can be readily
`understood by considering the following detailed description
`in conjunction with the accompanying drawings.
`FIG. 1 is a schematic diagram illustrating a biometric key
`for providing authentication information for a biometrically
`Verified user according to one embodiment of the present
`invention.
`FIG. 2 is a block diagram illustrating functional modules
`within the biometric key according to one embodiment of the
`present invention.
`FIG. 3 is a block diagram illustrating a system for provid
`ing authentication information for a biometrically verified
`USC.
`FIG. 4 is a flow chart illustrating a method for providing
`authentication information for a biometrically verified user.
`FIG. 5 is a flow chart illustrating a method for enrolling
`biometric data of the user with the biometric key.
`FIG. 6 is a flow chart illustrating a method for verifying a
`Subject presenting the biometric key according to one
`embodiment of the present invention.
`FIG. 7 is a flow chart illustrating a method for authenticat
`ing a verified user of the biometric key according to one
`embodiment of the present invention.
`
`DETAILED DESCRIPTION
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`The present application claims the benefit of U.S. Provi
`sional Application No. 60/637,538, filed on Dec. 20, 2004,
`and of U.S. Provisional Application No. 60/652,765, filed on
`Feb. 14, 2005, the entire contents of both applications being
`herein incorporated by reference.
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to computerized
`authentication, and more specifically, to an authentication
`responsive to biometric verification of a user being authenti
`cated.
`
`10
`
`15
`
`BACKGROUND
`
`Conventional user authentication techniques are designed
`to prevent access by unauthorized users. One technique is to
`require a user being authenticated to provide secret creden
`tials, such as a password, before allowing access. Similarly, a
`PIN number can be required by an ATM machine before
`allowing a person to perform automated bank transactions. A
`difficulty with this technique is that it requires the user to
`memorize or otherwise keep track of the credentials. A user
`often has multiple sets of credentials (e.g., passwords and
`PINs) and it can be quite difficult to keep track of them all.
`Another technique that does not require the user to memo
`rize credentials is to provide the user with an access object
`Such as a key (e.g., an electronic key) that the user can present
`to obtain access. For example, a user can be provided with a
`Small electronic key fob that allows access to a building or
`other secured location. A difficulty with using access objects
`is that authentication merely proves that the access object
`itself is valid; it does not verify that the legitimate user is using
`the access object. That is, illegitimate user can use a stolen
`access object to enter a secured location because the user's
`identity is never checked.
`Some hybrid authentication techniques require the user to
`provide both an access object and credentials. The user is
`authenticated only upon providing both items. Of course, this
`Solution does not resolve the problem of making the user
`memorize credentials.
`Therefore, there is a need for systems and methods for
`Verifying a user that is being authenticated that does not suffer
`from the limitations described above. Moreover, the solution
`should ease authentications by wirelessly providing an iden
`tification of the user.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`SUMMARY
`
`55
`
`The present invention addresses the above needs by pro
`viding systems and methods for authentication responsive to
`biometric verification of a user being authenticated. In one
`embodiment, a biometric key persistently (or permanently)
`stores a code such as a device identifier (ID) and biometric
`data for a user in a tamper-resistant format. Subsequently,
`scan data collected from a user (e.g., a fingerprint or retinal
`scan) can be compared against the biometric data. Once the
`user has been verified by the integrated device, the code can
`be wirelessly transmitted to indicate that the user has been
`successfully verified.
`
`60
`
`65
`
`Systems and methods for authentication responsive to bio
`metric verification of a user being authenticated are
`described. Generally, biometric verification uses biometric
`data to ensure that the user of, for example, a biometrickey, is
`the person registered as an owner. Biometric data is a digital
`or analog representation of characteristics unique to the
`user's body. For example, a finger-print of a subject can be
`compared against previously-recorded biometric data for
`
`Petitioner's Exhibit 1001, Page 10
`
`

`

`3
`verification that the subject is the registered owner of the
`biometric key. Then, the biometric key itself can be authen
`ticated.
`Although the embodiments below are described using the
`example of biometric verification using a fingerprint, other
`embodiments within the spirit of the present invention can
`perform biometric verification using other types of biometric
`data. For example, the biometric data can include a palm
`print, a retinal scan, an iris Scan, hand geometry recognition,
`facial recognition, signature recognition, or voice recogni
`tion.
`FIG. 1 is a schematic diagram illustrating an example of a
`biometric key 100 for providing authentication information
`for a biometrically verified user according to one embodi
`ment of the present invention. Biometric key 100 comprise a
`frame 110, a scan pad 120, and an LED 130. In one embodi
`ment, biometrickey 100 has a small form factor (e.g., the size
`of a automobile remote control) such that it can be unobtru
`sively carried by a user.
`Frame 110 can be formed by plastic, metal or another
`suitable material. Frame 110 is shaped to secure scan pad 120,
`and includes a perforation for attachment to, for example a
`key chain or clip. In one embodiment, frame 110 is formed
`from a unitary molding to protect biometric data. Accord
`ingly, frame 110 cannot be opened to expose the underlying
`components unless it is broken.
`Scan pad 120 can be, for example, an optical scanner using
`a charge coupled device, or a capacitive scanner. Scan pad
`120 can be sized to fit a thumb or other finger. Biometric key
`100 of the present embodiment includes LED 130 that lights
`up to request a fingerprint scan from a user. In one embodi
`ment, LED 130 can also confirm that user verification and/or
`authentication has completed.
`Biometric key 100 can authenticate a user for various pur
`poses. For example, biometric key 100 can allow keyless
`entry into homes and autos. In another example, biometric
`key 100 can logauser onto a computer system or point of sale
`register without typing in credentials. In still another
`example, biometric key 100 can verify that an enrolled user is
`above a certain age (e.g., before allowing access to a slot
`machine in a casino). In some embodiments, biometric key
`100 operates without biometric verification, and request a
`fingerprint Scan from a user only when biometric verification
`is needed for the particular use.
`FIG. 2 is a block diagram illustrating biometric key 100
`according to one embodiment of the present invention. Bio
`metric key 100 comprises control module 210, biometric
`portion 220, RF communication module 230, persistent stor
`age 226, and battery 250. Biometric key 100 can be formed
`from a combination of hardware and Software components as
`described above. In one embodiment, biometric key 100 com
`prises a modified key fob.
`Control module 210 coordinates between several functions
`of biometric key 100. In one embodiment, control module
`210 provides a verification code upon successful verification
`of the user. More specifically, once biometric portion 220
`indicates that a fingerprint scan matches biometric data that
`was collected during enrollment, control module 210 can
`trigger RF communication module 230 for sending a code
`indicating that the user was verified. In another embodiment,
`control module 210 can work in the opposite direction by
`detecting a request for verification from RF communication
`module 230, and then requesting verification of the user from
`biometric portion 220. Note that control module 210 of FIG.
`2 is merely a grouping of control functions in a central archi
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 8,352,730 B2
`
`10
`
`15
`
`4
`tecture, and in other embodiments, the control functions can
`be distributed between several modules around biometrickey
`1OO.
`Biometric portion 220 comprises enrollment module 222,
`validation module 224, and biometric database 226. In one
`embodiment, enrollment module 222 registers a user with
`biometrickey 100 by persistently storing biometric data asso
`ciated with the user. Further, enrollment module 222 registers
`biometric key 100 with a trusted authority by providing the
`code (e.g., device ID) to the trusted authority. Or conversely,
`the trusted authority can provide the code to biometric key
`100 to be stored therein.
`Validation module 224 can comprise scan pad 120 (FIG. 1)
`to capture scan data from a user's fingerprint (e.g., a digital or
`analog representation of the fingerprint). Using the scan data,
`validation module 224 determines whether the user's finger
`print matches the stored biometric data from enrollment.
`Conventional techniques for comparing fingerprints can be
`used. For example, the unique pattern of ridges and Valleys of
`the fingerprints can be compared. A statistical model can be
`used to determine comparison results. Validation module 224
`can send comparison results to control module 210.
`In other embodiments, validation module 224 can be con
`figured to capture biometric data for other human character
`istics. For example, a digital image of a retina, iris, and/or
`handwriting sample can be captured. In another example, a
`microphone can capture a voice sample.
`Persistent storage 226 persistently stores biometric data
`from one or more users which can be provided according to
`specific implementations. In one embodiment, at least some
`of persistent storage 226 is a memory element that can be
`written to once but cannot subsequently be altered. Persistent
`storage 226 can include, for example, a ROM element, a flash
`memory element, or any other type of non-volatile storage
`element. Persistent storage 226 is itself, and stores data in, a
`tamper-proof format to prevent any changes to the stored
`data. Tamper-proofing increases reliability of authentication
`because it does not allow any changes to biometric data (i.e.,
`allows reads of stored data, but not writes to store new data or
`modify existing data). Furthermore, data can be stored in an
`encrypted form.
`In one embodiment, persistent storage 226 also stores the
`code that is provided by the key 100 responsive to successful
`verification of the user. As described above, in one embodi
`ment the code is a device ID or other value that uniquely
`identifies biometric key 100. In one embodiment, the code is
`providing during the manufacturing process and the biomet
`ric data are provided during an enrollment of the user. In other
`embodiments, the code is provided during enrollment and/or
`the biometric data are provided during manufacturing. Fur
`ther, in Some embodiments persistent storage 226 stores other
`data utilized during the operation of biometric key 100. For
`example, persistent storage 226 can store encryption/decryp
`tion keys utilized to establish secure communications links.
`Radio frequency (RF) communication module 230 is, for
`example, a transceiver or other mechanism for wireless com
`munication. RF communication module 230 can send and
`receive data (e.g., the code) as modulated electromagnetic
`signals. In one embodiment, RF communication 230 can be
`optimized for low-power usage by, for example, using short
`range transceivers. RF communication module 230 can
`actively send out connection requests, or passively detect
`connection requests.
`Battery 260 can be a conventional power source suitable
`for the components of biometric key 100. Battery 260 can be
`either replaceable or rechargeable. Alternatively, battery 260
`
`Petitioner's Exhibit 1001, Page 11
`
`

`

`5
`can be embedded within key 100 such that the key must be
`discarded or recycled upon expiration of the battery.
`FIG. 3 is a block diagram illustrating a system 300 for
`providing authentication information for a biometrically veri
`fied user. System 300 comprises an authentication module
`310 in communication with biometric key 100, a trusted key
`authority 320, and an application 330.
`Authentication module 310 is coupled in communication
`with biometric key via line 311 (i.e., a wireless medium such
`as EM signals), and with trusted key authority 320 via line
`312 (e.g., a secure data network Such as the Internet, or a cell
`network). Authentication module 310 can include one or
`more of for example, a computerized device, Software
`executing on a computerized device, and/or a reader/decoder
`circuit. In one embodiment, authentication module 310
`serves as a gatekeeper to application 330 by requiring the
`code indicating Successful biometric verification of the user
`prior to allowing access to the application. Further, in one
`embodiment, authentication module 310 provides the code to
`trusted key authority 320 in order to verify that it belongs to a
`legitimate key (e.g., when application 330 is security-criti
`cal). Authentication module 310 can send a message to appli
`cation 330, or otherwise allow access to the application,
`responsive to a Successful authentication by trusted key
`authority 320.
`Application 330 is a resource that can be accessed by a
`verified and authenticated user. Application 330 can be, for
`example, a casino machine, a keyless lock, a garage door
`opener, an ATM machine, a hard drive, computer software, a
`web site, a file, and the like. Application 330 can execute on
`the same system as authentication module 310 or on another
`system in communication with the system of the authentica
`tion module. In one embodiment, application module 330
`allows access by a user after receiving a message from
`authentication module 310. At that point, application 330 can
`allow direct use by the user, or require that communications
`continue to pass through authentication module 310 for con
`tinued authentication.
`Trusted key authority 320 is a third-party authority that is
`present in some embodiments in order to provide enhanced
`security. In one embodiment, trusted key authority 320 veri
`fies that a code from a biometric key is legitimate. To do so,
`the trusted key authority 320 stor

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket