`
`(12) United States Patent
`Giobbi
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9.298,905 B1
`*Mar. 29, 2016
`
`(54) BIOMETRIC PERSONAL DATA KEY (PDK)
`AUTHENTICATION
`
`(71) Applicant: Proxense, LLC, Bend, OR (US)
`(72) Inventor: John J. Giobbi, Bend, OR (US)
`
`(73) Assignee: Proxense, LLC, Bend, OR (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis-
`claimer.
`(21) Appl. No.: 14/521,982
`(22) Filed:
`Oct. 23, 2014
`
`5,187,352 A
`5,296,641 A
`5,392.433 A
`
`2f1993 Blair et al.
`3, 1994 Stelzl
`2/1995 Hammersley et al.
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`
`10, 2000
`WOOOf 62.505
`3, 2001
`WOO1/22724
`(Continued)
`
`OTHER PUBLICATIONS
`"Alliance Activities: Publications: Identity—Smart Card Alliance.”
`Smart Card Alliance, 1997-2007, Retrieved on Jan. 7, 2007 from
`<URL:http://www.smartcardalliance.org/pages/publications-iden
`tity), 3 pgs.
`
`(Continued)
`
`Primary Examiner — Taghi Arani
`Assistant Examiner — Phy Anh Vu
`(74) Att
`Agent, or Fi
`Patent Law Works LLP
`Orney, Agent, or Firm — Palent Law works
`
`Related U.S. Application Data
`(63) Continuation of application No. 13/710,109, filed O
`Dec. 10, 2012, now Pat. No. 8,886,954, which is a
`continuation of application No. 1 1/314,199, filed on
`Dec. 20, 2005, now Pat. No. 8,352,730.
`ABSTRACT
`(57)
`(60) Provisional application No. 60/652,765, filed on Feb.
`Systems and methods verifying a user during authentication
`f o, py
`application No. 60/637,538,
`of an integrated device. In one embodiment, the system
`ed. On Dec. ZU,
`includes an integrated device and an authentication unit. The
`9.
`(51) Int. Cl.
`integrated device stores biometric data of a user and a plural
`G06F2L/35
`ity of codes and other data values comprising a device ID code
`G06F2L/32
`uniquely identifying the integrated device and a secret
`(52) U.S. Cl
`decryption value in a tamper proof format, and when scan
`AV e. we
`CPC ................ G06F 21/35 (2013.01); Geiti data is verified by comparing the scan data to the biometric
`(
`.01)
`data, wirelessly sends one or more codes and other data values
`including the device ID code. The authentication unit receives
`and sends the one or more codes and the other data values to
`an agent for authentication, and receives an access message
`from the agent indicating that the agent successfully authen
`ticated the one or more codes and other data values and allows
`the user to access an application.
`
`(2013.01)
`(2013. 01)
`
`(58) Field of State Sch
`CPC com ination set(s) only.
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,759,060 A
`4,993,068 A
`
`7/1988 Hayashi et al.
`2f1991 Piosenka et al.
`
`18 Claims, 6 Drawing Sheets
`
`START
`65
`
`Request User Scan
`60
`
`Receive Scan DataFrom A Subject
`520
`
`s
`Scan DataMatch Biometric Data?
`63
`
`N
`
`YES
`
`The subjects werified
`As the Registered User
`34
`
`Wirelessly Send Code indicating
`Successful Werification of User
`
`Wrification
`Failed
`
`H
`
`EN)
`695
`
`Petitioner's Exhibit 1001, Page 1
`
`
`
`US 9,298.905 B1
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5, 1995 Patel
`5,416,780 A
`6, 1995 Bucholtz et al.
`5,422,632 A
`9, 1995 Ostrover et al.
`5,450,489 A
`4/1997 Kuroiwa et al.
`5,619.251 A
`5/1997 Stefket al.
`5,629,980 A
`7/1997 Thompson et al.
`5,644,354 A
`9, 1997 Handelman et al.
`5,666.412 A
`7/1998 Akiyama et al.
`5,784,464 A
`5,825,876 A 10/1998 Peterson, Jr.
`5,857,020 A
`1/1999 Peterson, Jr.
`5892.825 A
`4, 1999 Mages et al.
`5,894,551 A
`4, 1999 Huggins et al.
`5,898,880 A
`4/1999 Ryu
`5,917,913 A
`6/1999 Wang
`5,928,327 A
`7/1999 Wang et al.
`5.991,399 A 1 1/1999 Graunke et al.
`5.991,749 A 11, 1999 Morril, Jr.
`6,016,476 A
`1/2000 Maes et al.
`6,018,739 A
`1/2000 McCoy et al.
`6,035,038 A
`3/2000 Campinos et al.
`6,035,329 A
`3/2000 Mages et al.
`6,038,334 A
`3, 2000 Hamid
`6,041,410 A
`3/2000 Hsu et al. ...................... T13, 186
`6,042,006 A
`3/2000 Van Tilburg et al.
`6,055.314 A
`4/2000 Spies et al.
`6,070,796 A
`6, 2000 Sirbu
`6,088,730 A
`7/2000 Kato et al.
`6.104,334 A
`8/2000 Allport
`6,121,544. A
`9/2000 Petsinger
`6,148,142 A 11/2000 Anderson
`6,679 A
`12/2000 Seidel
`6,185.316 B1
`2/2001 Buffam.
`6,209,089 B1
`3/2001 Selitrennikoff et al.
`6,219,109 B1
`4/2001 Raynesford et al.
`6,219,439 B1
`4/2001 Burger
`6,247,130 B1
`6, 2001 Fritsch
`6.256,737 B1 * 7/2001 Bianco ............... GO7C 9/OO158
`T13, 186
`
`7/2001 Campinos et al.
`6,266.415 B1
`9, 2001 Rosin et al.
`6.295,057 B1
`1/2002 Tysonetal.
`6,336,121 B1
`1/2002 Kato et al.
`6.336,142 B1
`3/2002 Adams et al.
`6,363.485 B1
`4/2002 Ansell et al.
`6367.019 B1
`4/2002 Wonforet al.
`6,381747 B1
`52002 Wiser et al.
`6,385,596 Bi
`5/2002 Whitect al.
`6,392.664 B1
`5/2002 Rosinet al.
`6,397.387 B1
`6/2002 Shenet al.
`6,401.059 B1
`62002 Rosinet al.
`64 1307 B1
`72002 Saito
`6.424.715 B
`7/2002 Rallis et al.
`6.425,084 B1
`82002 Kupka et al.
`6,434,535 B
`9/2002 Grapes
`6,446,130 B1
`10/2002 Geiger et al.
`6.463,534 B1
`1 1/2002 Horsley
`6,480,188 B1
`12/2002 Freeny, Jr.
`6,490.443 B1
`1/2003 Steen III et al.
`6.510,350 B1
`2/2003 Wehrenberg
`6,523,113 B1
`3/2003 Getsin et al.
`6,529.949 B1
`4/2003 Schenaetal.
`6.546,418 B2
`4/2003 Sims. In
`65500 li B1
`52003 Maetal
`6563,805 Bi
`5/2003 Murphy
`6564.380 B
`9, 2003 White et al.
`6,628.302 B2
`6,632,992 B2 10/2003 Hasegawa
`6,647.417 B1
`1 1/2003 Hunter et al.
`6,657,538 B1* 12/2003 Ritter ...................... G06F 21.32
`340, 5.8
`
`6,667,684 B1
`6,683,954 B1
`6,697.944 B1
`6,709,333 B1
`6,711,464 B1
`6,775,655 B1
`
`12/2003 Waggamon et al.
`1/2004 Searle
`2/2004 Jones et al.
`3/2004 Bradford et al.
`3/2004 Yap et al.
`8/2004 Peinado et al.
`
`2002fOO71559 A1
`2002fOO73042 A1
`2002fO091646 A1
`
`6/2002 Christensen et al.
`6/2002 Maritzen et al.
`7/2002 Lake ...................... G06Q 20/04
`705/67
`
`10/2004 White et al.
`6,804.825 B1
`6,806,887 B2 10/2004 Chernocket al.
`6,850,147 B2
`2/2005 Prokoski et al.
`6,853.988 B1* 2/2005 Dickinson ............... G06F 21.32
`38O,277
`
`3/2005 Hatakeyama et al.
`6,873,975 B1
`9/2005 Lee et al.
`6,950,941 B1
`1 1/2005 Bush et al.
`6,963,971 B1
`6,973,576 B2 12/2005 Giobbi
`6,975,202 B1
`12/2005 Rodriguez et al.
`6,983,882 B2
`1/2006 Cassone
`7,012,503 B2
`3/2006 Nielsen
`7,090,126 B2
`8/2006 Kelly et al.
`7,112,138 B2
`9, 2006 Hedricket al.
`7,137,012 B1
`1 1/2006 Kamibayashi et al.
`7, 191466 B1
`3/2007 Hamid et al.
`7,218,944 B2
`5/2007 Cromer et al.
`7,249,177 B1
`7, 2007 Miller
`7,305,560 B2 122007 Giobbi
`7,529,944 B2
`5 2009 Hamid
`7,574,734 B2
`8, 2009 Fedronic et al.
`7.587,611 B2
`9, 2009 Johnson et al.
`7,617,523 B2 11/2009 Das et al.
`7,644,443 B2
`1/2010 Matsuyama et al.
`7,715,593 B1
`5/2010 Adams et al.
`7,883,417 B2
`2/2011 Bruzzese et al.
`7,904,718 B2
`3/2011 Giobbiet al.
`2001/0026.619 A1 10, 2001 Howard et al.
`2001/0044337 A1 11/2001 Rowe et al.
`2002fOOO7456 A1
`1/2002 Peinado et al.
`2002fOO 13772 A1
`1/2002 Peinado
`2002/00 14954 A1
`2/2002 Fitzgibbon et al.
`2002fOO15494 A1
`2/2002 Nagai et al.
`2002fOO23032 A1
`2/2002 Pearson et al.
`2002/0026424 A1
`2/2002 Akashi
`2002.0056.043 A1
`5/2002 Glass ...................... G06F 21.32
`T13, 179
`
`7, 2002 Rowe et al.
`2002/0098888 A1
`8, 2002 Rowe et al.
`2002/0103027 A1
`8, 2002 Boate et al.
`2002/0104.006 A1
`8, 2002 Xu et al.
`2002/0108049 A1
`8, 2002 Shreve et al.
`2002/0109580 A1
`8/2002 Nguyen et al.
`2002/0116615 A1
`9/2002 Kutaragi et al.
`2002/0129262 A1
`9, 2002 Hamid et al.
`2002/0138767 A1
`2002fO140542 A1 10, 2002 Prokoski et al.
`2002/01441 17 A1 10/2002 Faigle
`2002fO150282 A1 10, 2002 Kinsella
`2002fO152391 A1 10, 2002 Willins et al.
`2002fO158750 A1 10, 2002 Almalik
`2002/0174348 A1 1 1/2002 Ting
`2002/0178063 A1 11/2002 Gravelle et al.
`2002/019 1816 A1 12/2002 Maritzen et al.
`2003.0036425 A1
`2/2003 Kaminkow et al.
`2003/0046552 A1
`3, 2003 Hamid
`2003.0054868 A1
`3/2003 Paulsen et al.
`2003.0054881 A1
`3/2003 Hedricket al.
`2003/0055689 A1
`3/2003 Blocket al.
`2003, OO79133 A1
`4, 2003 Breiter et al.
`2003.01.15474 A1
`6/2003 Khan et al.
`2003/0127511 A1
`7/2003 Kelly et al.
`2003/0139190 A1
`7/2003 Steelberg et al.
`2003/0.149744 A1
`8/2003 Bierre et al.
`2003/0172037 A1
`9/2003 Jung et al.
`2003/0176218 A1
`9/2003 LeMay et al.
`2003/0186739 A1 10, 2003 Paulsen et al.
`2004/O123127 A1
`6/2004 Teicher et al.
`2004/O127277 A1
`7, 2004 Walker et al.
`2004/O128162 A1* 7/2004 Schlotterbeck et al. .......... 705/2
`2004/0129.787 A1
`7, 2004 Saito et al.
`2004/0209690 A1 10, 2004 Bruzzese et al.
`2004/02096.92 A1 10, 2004 Schober et al.
`2004/0215615 A1 10, 2004 Larsson et al.
`2004/0230488 A1 11/2004 Beenau et al.
`2005.0054431 A1
`3, 2005 Walker et al.
`
`Petitioner's Exhibit 1001, Page 2
`
`
`
`US 9,298.905 B1
`Page 3
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2005/OO74126 A1*
`2005/0081040 A1
`2005, 0109836 A1
`2005/0229.007 A1
`2005/025 1688 A1
`2005/0253683 A1
`2006/0022046 A1
`2006, OO58102 A1
`2006, OO63575 A1
`2006/0076401 A1
`2006, O113381 A1
`2006, O156O27 A1
`2007, OO32288 A1
`2007, OO60319 A1
`2007/O159301 A1
`2007/0213048 A1
`2007/0219926 A1
`2007/022O272 A1
`2008, 0008359 A1
`2008, OO19578 A1
`2008. O1883O8 A1
`2009/0328.182 A1
`2010.0117794 A1
`2011/O126188 A1
`2013, OO19295 A1
`
`4/2005 Stanko .......................... 380,279
`4/2005 Johnson et al.
`5, 2005 Ben-Aissa
`10/2005 Bolle et al.
`11/2005 Nanavati et al.
`11/2005 Lowe
`2, 2006 Iwamura
`3/2006 Nguyen et al.
`3, 2006 Gatto et al.
`4/2006 Frerking
`6, 2006 Hochstein et al.
`7, 2006 Blake
`2/2007 Nelson et al.
`3/2007 Blocket al.
`7, 2007 Hirt et al.
`9/2007 Trauberg
`9, 2007 Korn
`9/2007 Campisi et al.
`1/2008 Beenau et al.
`1/2008 Saito et al.
`8/2008 Shepherd et al.
`12/2009 Malakapalliet al.
`5/2010 Adams et al.
`5/2011 Bernstein et al.
`1/2013 Park ...................... HO4L 9,3213
`726/7
`2013/01 11543 A1* 5, 2013 Brown ................ HO4L 63.0884
`T26.1
`2013/0276140 A1* 10/2013 Coffing ............... HO4L 12,5895
`726/27
`2013/0331063 A1* 12/2013 Cormier .............. HO4L 63,0272
`455,411
`
`FOREIGN PATENT DOCUMENTS
`
`WOO 1/75876
`WO
`WOO 1/77790
`WO
`WO WO 2005/050450
`WO WO 2005/0868O2
`
`10, 2001
`10, 2001
`6, 2005
`9, 2005
`
`OTHER PUBLICATIONS
`
`Amr Farouk, Ahmed A. Abdelhafez, "Authentication Mechanisms in
`GridComputing Environment: Comparative Study.” IEEE, 2012, pp.
`1-6.
`Antonoff, Michael, “Visiting Video Valley.” Sound & Vision, Nov.
`2001, pp. 116, 118-119.
`"Applying Biometrics to Door Access.” Security Magazine, Sep. 26.
`2002, Retrieved on Jan. 7, 2007, from <URL:http://www.
`Securitymagazine.com/CDA/Articles/technologies/
`3ae610eaa34d8010VgnVCM100000ft)32a8cO >, 5 pgs.
`BioPay, LLC, “Frequently Asked Questions (FAQs) About BioPay.”
`BioPay, LLC, 2007, Retrieved on Jan. 7, 2007, from <URL:http://
`www.biopay.com/facqs-lowes.asp., 5 pgs.
`Blum, Jonathan, “Digital Rights Management May Solver the
`Napster “Problem’.” Technology Investor Industrysector, Oct. 2000,
`pp. 24-27.
`Debow, Yvette, “Credit/Debit Debuts in Midwest Smart Card Test.”
`Computers in Banking, v6, n11, Nov. 1989, 4pgs.
`Dennis, Sylvia, "Digital Passports Need Not Infringe Civil Liber
`ties.” Newsbytes, Dec. 2, 1999, 2 pgs.
`Fasca, Chad, “The Circuit.” Electronic News, vol. 45 Iss. 45, Nov. 8,
`1999, 2 pgs.
`“Firecrest Shows How Truly Commercially-Minded Companies Will
`Exploit the Internet.” Computergram International, Jan. 18, 1996, 2
`pg.S.
`Kontzer, Tony, “Thomson Bets on Smart Cards for Video Encryp
`tion.” www.informationweek.com, Jun. 7, 2001, 1 pg.
`Lake, Matt, “Downloading for Dollars.” Sound & Vision, Nov. 2000,
`pp. 137-138.
`Lewis, Peter H. "Sony and Visa in On-Line Entertainment Venture.”
`New York Times, v 145, Nov. 16, 1995, 1 pg.
`
`McIver, R. et al., “Identification and Verification Working Together.”
`Bioscrypt, Aug. 27, 2004. Retrieved on Jan. 7, 2007, from
`<URL:http://www.ibia.org/membersadmin/whitepapers/pdf 15/
`Identification%20and%20 Verification%20Working%20Together.
`pdf>. 5 pgs.
`“Micronas and Thomson Multimedia Showcase a New Copy Protec
`tion System that Will Drive the Future of Digital Television.” www.
`micronas.com, Jan. 8, 2002, 3 pgs.
`Nilsson, J. et al., “Match-On-Card for Java Cards.” Precise
`Biometrics, White Paper, Apr. 2004, Retrieved on Jan. 7, 2007, from
`<URL:http://www.ibia.org/membersadmin/whitepapers/pdf 17/
`Precise%20Match-on-Card%20for%20Java%20Cards.pdf>. 5 pgs.
`Nordin, B., “Match-On-Card Technology.” Precise Biometrics,
`White Paper, Apr. 2004, Retrieved on Jan. 7, 2007, from <URL:http://
`www.ibia.org/membersadmin/whitepapers/pdf 17/Precise%Match
`on-Card%20technology.pdf>. 7 pgs.
`Paget, Paul, “The Security Behind Secure Extranets.” Enterprise
`Systems Journal, Dec. 1999, 4pgs.
`PCT International Search Report, PCT/US04/38124, Apr. 7, 2005, 10
`pg.S.
`PCT International Search Report, PCT/US05/43447, Feb. 22, 2007,
`7 pgs.
`PCT International Search Report, PCT/US05/46843, Mar. 1, 2007,
`10 pgs.
`PCT International Search Report, PCT/US07/11102, Oct. 3, 2008, 11
`pg.S.
`PCT International Search Report, PCT/US07/11103, Apr. 23, 2008, 9
`pg.S.
`PCT International Search Report, PCT/US07/11104, Jun. 26, 2008, 9
`pg.S.
`PCT International Search Report, PCT/US07/11105, Oct. 20, 2008,
`10 pgs.
`Pope, "Oasis Digital Signature Services: Digital Signing without the
`Headaches.” Internet Computing IEEE, Vol. 10, Oct. 2006, pp.
`81-84.
`“SAFModuleTM: A Look Into Strong Authentication.” saflink Cor
`poration, Retrieved on Jan. 7, 2007, from <URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf/6/SAFmod WP.pdf>. 8 pgs.
`Sapsford, Jathon, "E-Business: Sound Waves Could Help Ease Web
`Fraud Woes.” Wall Street Journal, Aug. 14, 2000, 2 pgs.
`“Say Hello to Bluetooth.” Bluetooth Web site, Jun. 2000, 4pgs.
`“Smart Cards and Biometrics White Paper.” Smart Card Alliance,
`May 2002, Retrieved on Jan. 7, 2007, from <URL: http://www.
`Securitymanagement.com/library/smartcard facqtech0802.pdf>. 7
`pg.S.
`“Thomson Multimedia Unveils Copy Protection Proposal Designed
`to Provide Additional Layer of Digital Content Security,” www.
`thompson-multimedia.com, May 30, 2001, 2 pgs.
`Van Winkle, William, “Bluetooth, the King of Connectivity.” Laptop
`Buyer's Guide and Handbook, Jan. 2000, pp. 148-153.
`Wade, Will. “Using Fingerprints to Make Payments at POS Slowly
`Gaining Popularity.” Credit Union Journal, International Biometric
`Group, Apr. 21, 2003, Retrieved on Jan. 7, 2007, from <URL:http://
`www.biometricgroup.com/in the news/04.21.03.html>, 3 pgs.
`Wallace, Bob, "The Internet Unplugged.” InformationWeek.com,
`Dec. 13, 1999, pp. 22-24.
`Weber, Thomas E., “In the Age of Napster, Protecting Copyright is a
`Digital Arms Race.” Wall Street Journal, Jul. 24, 2000, 3 pgs.
`“What is a File?” Apr. 30, 1998, URL: http://unixhelp.ed.ac.uk/
`editors whatisafile.html, accessed Mar. 11, 2010 via http://
`waybackmachine.org/1998061500000* /http://unixhelp.ed.ac.uk/
`editors whatisafile.html, 1 pg.
`Yoshida, Junko, "Content Protection Plan Targets Wireless Home
`Networks,” www.eetimes.com, Jan. 11, 2002, 2 pgs.
`Simon Liu and Mark Silverman. 2001. "A Practical Guide to
`Biometric Security Technology”. IT Professional 3, 1 (Jan. 2001).
`27-32. DOI=10. 1109/6294.899930 http://dx.doi.org/10.1109/6294.
`899930.
`Smart Card Alliance Report, “Contactless Technology for Secure
`Physical Access: Technology and Standards Choices'. Smart Card
`Alliance, Oct. 2002, p. 1-48.
`* cited by examiner
`
`Petitioner's Exhibit 1001, Page 3
`
`
`
`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 1 of 6
`
`US 9,298.905 B1
`
`FIG. 1
`
`
`
`Biometric Key 100
`
`Biometric Portion
`220
`Enrollment
`Module
`222
`
`Validation
`Module
`224
`
`Control
`Module
`210
`
`Persistent
`Storage
`226
`
`FIG 2
`
`RF Communication
`Module
`230
`
`Petitioner's Exhibit 1001, Page 4
`
`
`
`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 2 of 6
`
`US 9,298.905 B1
`
`
`
`Biometric Key
`100
`
`Application
`330
`
`Authentication
`Module
`310
`
`Trusted Key
`Authority
`320
`
`FIG. 3
`
`Petitioner's Exhibit 1001, Page 5
`
`
`
`U.S. Patent
`
`Mar
`. 29, 2016
`
`Sheet 3 of 6
`
`US 9,298.905 B1
`
`Biometric
`Key
`100
`
`Authentication
`Module
`310
`
`Trusted Key
`Authority
`320
`
`Register User And
`Biometric Key
`410
`
`Receive Biometric
`Data
`Of The User
`420
`
`
`
`Biometrically Verify
`User
`440
`
`Authentication
`Needed For An
`Application?
`430
`YES
`
`Request
`Authentication
`450
`
`Allow Access To
`The Application
`470
`
`FIG. 4
`
`Authenticate The
`Biometric Key
`460
`
`Petitioner's Exhibit 1001, Page 6
`
`
`
`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 4 of 6
`
`US 9,298.905 B1
`
`
`
`5 O O
`
`Check dentification and Establish Profile
`510
`
`Persistently Store Biometric Data
`From The User
`520
`
`Obtain Code
`530
`
`ASSociate Profile
`With Code
`540
`
`FIG. 5
`
`Petitioner's Exhibit 1001, Page 7
`
`
`
`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 5 of 6
`
`US 9,298.905 B1
`
`START
`
`Request User Scan
`610
`
`Receive Scan Data From A Subject
`620
`
`SCan Data Match Biometric Data?
`630
`
`
`
`YES
`
`The Subject is Verified
`As The Registered User
`640
`
`Wirelessly Send Code indicating
`Successful Verification of User
`650
`
`FIG. 6
`
`Verification
`Failed
`650
`
`Petitioner's Exhibit 1001, Page 8
`
`
`
`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 6 of 6
`
`US 9,298.905 B1
`
`
`
`Wirelessly Receive The Code
`710
`
`Request Authentication
`Of The Code
`720
`
`Code Authenticated?
`730
`
`Send Access Message To The Application
`740
`
`Authentication
`Failed
`750
`
`FIG. 7
`
`Petitioner's Exhibit 1001, Page 9
`
`
`
`US 9,298.905 B1
`
`1.
`BIOMETRIC PERSONAL DATA KEY (PDK)
`AUTHENTICATION
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`The present application claims priority, under 35 U.S.C.
`S120, to U.S. patent application Ser. No. 13/710,109 filed
`Dec. 10, 2012 and entitled “Biometric Personal Data Key
`(PDK) Authentication” which claims priority to U.S. patent
`application Ser. No. 1 1/314,199, filed Dec. 20, 2005 and
`entitled “Biometric Personal Data Key (PDK) Authentica
`tion.” which claims the benefit of U.S. Provisional Applica
`tion No. 60/637,538, filed on Dec. 20, 2004, and of U.S.
`Provisional Application No. 60/652,765, filed on Feb. 14,
`2005, the entire contents of which are hereby incorporated by
`reference.
`
`10
`
`15
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to computerized
`authentication, and more specifically, to an authentication
`responsive to biometric verification of a user being authenti
`cated.
`
`BACKGROUND
`
`25
`
`2
`and a verification module, in communication with the persis
`tent storage, to receive scan data from a biometric scan for
`comparison against the biometric data, and if the scan data
`matches the biometric data, wirelessly sending a code for
`authentication.
`In one embodiment, a method for Verifying a user during
`authentication of an integrated device, includes persistently
`storing biometric data for the user in a tamper-resistant for
`mat; responsive to receiving a request for biometric verifica
`tion of the user, receiving scan data from a biometric scan;
`comparing the scan data to the biometric data to determine
`whether the data match; and responsive to a determination
`that the scan data matches the biometric data, wirelessly
`sending a code for authentication.
`Other embodiments include corresponding systems, appa
`ratus, and computer programming products, configured to
`perform the actions of the methods, encoded on computer
`storage devices. These and other embodiments may each
`optionally include one or more of the following features. For
`instance the operations further include registering an age
`verification for the user in association with the code. For
`instance the operations further include establishing a secure
`communication channel prior to sending the code for authen
`tication. For instance the operations further include receiving
`a request for the code without a request for biometric verifi
`cation, and responsive to receiving the request for the code
`without a request for biometric verification, sending the code
`without requesting the scan data. For instance, the features
`include: the code is registered with a trusted authority, and the
`code can be authenticated to a third party by the trusted
`authority; the code uniquely identifies the integrated device;
`the code indicates that the biometric verification was success
`ful; persistently storing biometric data includes permanently
`storing biometric data; the biometric data and the scan data
`are both based on a fingerprint scan by the user, an LED to be
`activated for requesting the biometric scan.
`In one embodiment, a method for authenticating a verified
`user, includes receiving a code associated with a biometri
`cally verified user, requesting authentication of the code:
`receiving an authentication result; and in response to the
`authentication result being positive, providing access to an
`application.
`In one embodiment, a system includes an integrated device
`(e.g. a biometric key) to store biometric data for a user in a
`tamper resistant format, and if scan data can be verified as
`being from the user by comparing the scan data to the bio
`metric data, wirelessly sending a code; and an authentication
`module to receive the code and send the code to a trusted
`authority for authentication, and responsive to the code being
`authenticated, allowing the user to access an application.
`Other embodiments include corresponding systems, appa
`ratus, and computer programming products, configured to
`perform the actions of the methods, encoded on computer
`storage devices. These and other embodiments may each
`optionally include one or more of the following features. For
`instance, the operations further include registering the code
`with a trusted authority, wherein requesting authentication of
`the code includes providing the code to the trusted authority
`and wherein receiving an authentication result comprises
`receiving the authentication result from the trusted authority.
`For instance the operations further include registering a date
`of birth or age with the trusted authority. For instance the
`operations further include establishing a secure communica
`tions channel with an integrated device, wherein the code
`associated with the biometrically verified user is received
`from the integrated device. For instance the features include:
`the integrated device receives an authentication request from
`
`Conventional user authentication techniques are designed
`to prevent access by unauthorized users. One technique is to
`require a user being authenticated to provide secret creden
`tials, such as a password, before allowing access. Similarly, a
`PIN number can be required by an ATM machine before
`allowing a person to perform automated bank transactions. A
`difficulty with this technique is that it requires the user to
`memorize or otherwise keep track of the credentials. A uses
`often has multiple sets of credentials (e.g., passwords and
`PINs) and it can be quite difficult to keep track of them all.
`Another technique that does not require the user to memo
`rize credentials is to provide the user with an access object
`Such as a key (e.g., an electronic key) that the user can present
`to obtain access. For example, a user can be provided with a
`Small electronic key fob that allows access to a building or
`other secured location. A difficulty with using access objects
`is that authentication merely proves that the access object
`itself is valid; it does not verify that the legitimate user is using
`the access object. That is, illegitimate user can use a stolen
`access object to enter a secured location because the user's
`identity is never checked.
`Some hybrid authentication techniques require the user to
`provide both an access object and credentials. The user is
`authenticated only upon providing both items. Of course, this
`Solution does not resolve the problem of making the user
`memorize credentials.
`Therefore, there is a need for systems and methods for
`Verifying a user that is being authenticated that does not suffer
`from the limitations described above. Moreover, the solution
`should ease authentications by wirelessly providing an iden
`tification of the user.
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`SUMMARY
`
`The present invention addresses the above needs by pro
`viding systems and methods for authentication responsive to
`biometric verification of a user being authenticated. In one
`embodiment, an integrated device includes a persistent Stor
`age to persistently stores a code such as a device identifier
`(ID) and biometric data for a userina tamper-resistant format,
`
`60
`
`65
`
`Petitioner's Exhibit 1001, Page 10
`
`
`
`3
`the authentication module, and in response, requests a bio
`metric scan from the user to generate the scan data; when the
`integrated device cannot verify the scan data as being from the
`user, it does not send the code.
`Advantageously, user authentication is bolstered with
`highly reliable biometric verification of the user in an inte
`grated device. Furthermore, a keyless environment relieves
`authorized users from having to memorize credentials, and of
`having to physically enter credentials or keys. In addition, the
`integrated device can be authenticated for an application that
`is open to the public (i.e., in an open loop system).
`The features and advantages described in the specification
`are not all inclusive and, in particular, many additional fea
`tures and advantages will be apparent to one of ordinary skill
`in the art in view of the drawings, specifications, and claims.
`Moreover, it should be noted that the language used in the
`specification has been principally selected for readability and
`instructional purposes and may not have been selected to
`delineate or circumscribe the inventive matter.
`
`5
`
`10
`
`15
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The teachings of the present invention can be readily
`understood by considering the following detailed description
`in conjunction with the accompanying drawings.
`FIG. 1 is a schematic diagram illustrating a biometric key
`for providing authentication information for a biometrically
`Verified user according to one embodiment of the present
`invention.
`FIG. 2 is a block diagram illustrating functional modules
`within the biometric key according to one embodiment of the
`present invention.
`FIG. 3 is a block diagram illustrating a system for provid
`ing authentication information for a biometrically verified
`USC.
`FIG. 4 is a flow chart illustrating a method for providing
`authentication information for a biometrically verified user.
`FIG. 5 is a flow chart illustrating a method for enrolling
`biometric data of the user with the biometric key.
`FIG. 6 is a flow chart illustrating a method for verifying a
`Subject presenting the biometric key according to one
`embodiment of the present invention.
`FIG. 7 is a flow chart illustrating a method for authenticat
`ing a verified user of the biometric key according to one
`embodiment of the present invention.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`DETAILED DESCRIPTION
`
`Systems and methods for authentication responsive to bio
`metric verification of a user being authenticated are
`described. Generally, biometric verification uses biometric
`data to ensure that the user of, for example, a biometrickey, is
`the person registered as an owner. Biometric data is a digital
`or analog representation of characteristics unique to the
`user's body. For example, a fingerprint of a subject can be
`compared against previously-recorded biometric data for
`verification that the subject is the registered owner of the
`biometric key. Then, the biometric key itself can be authen
`ticated.
`Although the embodiments below are described using the
`example of biometric verification using a fingerprint, other
`embodiments within the spirit of the present invention can
`perform biometric verification using other types of biometric
`data. For example, the biometric data can include a palm
`print, a retinal scan, an iris Scan, hand geometry recognition,
`facial recognition, signature recognition, or voice recogni
`tion.
`
`50
`
`55
`
`60
`
`65
`
`US 9,298.905 B1
`
`4
`FIG. 1 is a schematic diagram illustrating an example of a
`biometric key 100 for providing authentication information
`for a biometrically verified user according to one embodi
`ment of the present invention. In one embodiment, the bio
`metrickey 100 comprises a frame 110, a scan pad 120, and an
`LED 130. In one embodiment, biometric key 100 has a small
`form factor (e.g., the size of an automobile remote control)
`such that it can be unobtrusively carried by a user. In one
`embodiment, the biometric key 100 is integrated into another
`object or device. A device having an integrated biometrickey
`100 is occasionally referred to herein as an “integrated
`device.” For example, in one embodiment, the biometric key
`100 is integrated into a mobile phone (e.g. a cellular phone or
`Smartphone), tablet, laptop, mp3 player, mobile gaming
`device, watch, key fob or other mobile device, thereby mak
`ing the biometric key 100 unobtrusive to carry.
`Frame 110 can be formed by plastic, metal or another
`suitable material. Frame 110 is shaped to secure scan pad 120,
`and includes a perforation for attachment to, for example a
`key chain or clip. In one embodiment, frame 110 is formed
`from a unitary molding to protect biometric data. Accord
`ingly, frame 110 cannot be opened to expose the underlying
`components unless it is broken.
`Scan pad 120 can be, for example, an optical scanner using
`a charge coupled device, or a capacitive scanner. Scan pad
`120 can be sized to fit a thumb or other finger. Biometric key
`100 of the present embodiment includes LED 130 that lights
`up to request a fingerprint Scan from a user. In one embodi
`ment, LED 130 can also confirm that user verification and/or
`authentication has completed.
`Biometric key 100 can authenticate a user for various pur
`poses. For example, biometric key 100 can allow keyless
`entry into homes and autos. In another example, biometric
`key 100 can logauser onto a computer system or point of sale
`register without typing in credentials. In still another
`example, biometric key 100 can verify that an enrolled user is
`above a certain age (e.g., before allowing access to a slot
`machine in a casino). In some embodiments, biometric key
`100 operates without biometric verification, and request a
`fingerprint Scan from a user only when biometric verification
`is needed for the particular use.
`FIG. 2 is a block diagram illustrating biometric key 100
`according to one embodiment of the present invention. Bio
`metric key 100 comprises control module 210, biometric
`portion 220, RF communication module 230, persistent stor
`age 240, and battery 250. Biometric key 100 can be formed
`from a combination of hardware and Software components as
`described above. In one embodiment, biometrickey 100 com
`prises a modified key fob.
`Control module 210 coordinates between several functions
`of biometric key 100. In one embodiment, control module
`210 provides a verification code upon successful verification
`of the user. More specifically, once biometric portion 220
`indicates that a fingerprint scan matches biometric data that
`was collected during enrollment, control module 210 can
`trigger RF communication module 230 for sending a code
`indicating that the user was verified. In another embodiment,
`control module 210 can work in the opposite direction by
`detecting a request for verification from RF communication
`module 230, and then requesting verification of the user from
`biometric portion 210. Note that control module 210 of FIG.
`2 is merely a grouping of control functions in a central archi
`tecture, and in other embodiments, the control functions can
`be distributed between several modules around biometrickey
`1OO.
`Biometric portion 220 comprises enrollment module 222,
`validation module 224, and biometric database 226. In one
`
`Petitioner's Exhibit 1001, Page 11
`
`
`
`5
`embodiment, enrollment module 222 registers a user with
`biometric key 100 by persistently storing biometric data asso
`ciated with the user. Further, enrollment module 222 registers
`biometric key 100 with a trusted authority by providing the
`code (e.g., device ID) to the trusted authority. Or conversely,
`the trusted authority can provide the code to biometric key
`100 to be stored therein.
`Validation module 224 can comprise scan pad 120 (FIG. 1)
`to capture scan data from a user's fingerprint (e.g., a digital or
`analog representation of the fingerprint). Using the scan data,
`validation module 214 determines whether the user's finger
`print match