throbber
US009298905B1
`
`(12) United States Patent
`Giobbi
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9.298,905 B1
`*Mar. 29, 2016
`
`(54) BIOMETRIC PERSONAL DATA KEY (PDK)
`AUTHENTICATION
`
`(71) Applicant: Proxense, LLC, Bend, OR (US)
`(72) Inventor: John J. Giobbi, Bend, OR (US)
`
`(73) Assignee: Proxense, LLC, Bend, OR (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis-
`claimer.
`(21) Appl. No.: 14/521,982
`(22) Filed:
`Oct. 23, 2014
`
`5,187,352 A
`5,296,641 A
`5,392.433 A
`
`2f1993 Blair et al.
`3, 1994 Stelzl
`2/1995 Hammersley et al.
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`
`10, 2000
`WOOOf 62.505
`3, 2001
`WOO1/22724
`(Continued)
`
`OTHER PUBLICATIONS
`"Alliance Activities: Publications: Identity—Smart Card Alliance.”
`Smart Card Alliance, 1997-2007, Retrieved on Jan. 7, 2007 from
`<URL:http://www.smartcardalliance.org/pages/publications-iden
`tity), 3 pgs.
`
`(Continued)
`
`Primary Examiner — Taghi Arani
`Assistant Examiner — Phy Anh Vu
`(74) Att
`Agent, or Fi
`Patent Law Works LLP
`Orney, Agent, or Firm — Palent Law works
`
`Related U.S. Application Data
`(63) Continuation of application No. 13/710,109, filed O
`Dec. 10, 2012, now Pat. No. 8,886,954, which is a
`continuation of application No. 1 1/314,199, filed on
`Dec. 20, 2005, now Pat. No. 8,352,730.
`ABSTRACT
`(57)
`(60) Provisional application No. 60/652,765, filed on Feb.
`Systems and methods verifying a user during authentication
`f o, py
`application No. 60/637,538,
`of an integrated device. In one embodiment, the system
`ed. On Dec. ZU,
`includes an integrated device and an authentication unit. The
`9.
`(51) Int. Cl.
`integrated device stores biometric data of a user and a plural
`G06F2L/35
`ity of codes and other data values comprising a device ID code
`G06F2L/32
`uniquely identifying the integrated device and a secret
`(52) U.S. Cl
`decryption value in a tamper proof format, and when scan
`AV e. we
`CPC ................ G06F 21/35 (2013.01); Geiti data is verified by comparing the scan data to the biometric
`(
`.01)
`data, wirelessly sends one or more codes and other data values
`including the device ID code. The authentication unit receives
`and sends the one or more codes and the other data values to
`an agent for authentication, and receives an access message
`from the agent indicating that the agent successfully authen
`ticated the one or more codes and other data values and allows
`the user to access an application.
`
`(2013.01)
`(2013. 01)
`
`(58) Field of State Sch
`CPC com ination set(s) only.
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,759,060 A
`4,993,068 A
`
`7/1988 Hayashi et al.
`2f1991 Piosenka et al.
`
`18 Claims, 6 Drawing Sheets
`
`START
`65
`
`Request User Scan
`60
`
`Receive Scan DataFrom A Subject
`520
`
`s
`Scan DataMatch Biometric Data?
`63
`
`N
`
`YES
`
`The subjects werified
`As the Registered User
`34
`
`Wirelessly Send Code indicating
`Successful Werification of User
`
`Wrification
`Failed
`
`H
`
`EN)
`695
`
`Petitioner's Exhibit 1001, Page 1
`
`

`

`US 9,298.905 B1
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5, 1995 Patel
`5,416,780 A
`6, 1995 Bucholtz et al.
`5,422,632 A
`9, 1995 Ostrover et al.
`5,450,489 A
`4/1997 Kuroiwa et al.
`5,619.251 A
`5/1997 Stefket al.
`5,629,980 A
`7/1997 Thompson et al.
`5,644,354 A
`9, 1997 Handelman et al.
`5,666.412 A
`7/1998 Akiyama et al.
`5,784,464 A
`5,825,876 A 10/1998 Peterson, Jr.
`5,857,020 A
`1/1999 Peterson, Jr.
`5892.825 A
`4, 1999 Mages et al.
`5,894,551 A
`4, 1999 Huggins et al.
`5,898,880 A
`4/1999 Ryu
`5,917,913 A
`6/1999 Wang
`5,928,327 A
`7/1999 Wang et al.
`5.991,399 A 1 1/1999 Graunke et al.
`5.991,749 A 11, 1999 Morril, Jr.
`6,016,476 A
`1/2000 Maes et al.
`6,018,739 A
`1/2000 McCoy et al.
`6,035,038 A
`3/2000 Campinos et al.
`6,035,329 A
`3/2000 Mages et al.
`6,038,334 A
`3, 2000 Hamid
`6,041,410 A
`3/2000 Hsu et al. ...................... T13, 186
`6,042,006 A
`3/2000 Van Tilburg et al.
`6,055.314 A
`4/2000 Spies et al.
`6,070,796 A
`6, 2000 Sirbu
`6,088,730 A
`7/2000 Kato et al.
`6.104,334 A
`8/2000 Allport
`6,121,544. A
`9/2000 Petsinger
`6,148,142 A 11/2000 Anderson
`6,679 A
`12/2000 Seidel
`6,185.316 B1
`2/2001 Buffam.
`6,209,089 B1
`3/2001 Selitrennikoff et al.
`6,219,109 B1
`4/2001 Raynesford et al.
`6,219,439 B1
`4/2001 Burger
`6,247,130 B1
`6, 2001 Fritsch
`6.256,737 B1 * 7/2001 Bianco ............... GO7C 9/OO158
`T13, 186
`
`7/2001 Campinos et al.
`6,266.415 B1
`9, 2001 Rosin et al.
`6.295,057 B1
`1/2002 Tysonetal.
`6,336,121 B1
`1/2002 Kato et al.
`6.336,142 B1
`3/2002 Adams et al.
`6,363.485 B1
`4/2002 Ansell et al.
`6367.019 B1
`4/2002 Wonforet al.
`6,381747 B1
`52002 Wiser et al.
`6,385,596 Bi
`5/2002 Whitect al.
`6,392.664 B1
`5/2002 Rosinet al.
`6,397.387 B1
`6/2002 Shenet al.
`6,401.059 B1
`62002 Rosinet al.
`64 1307 B1
`72002 Saito
`6.424.715 B
`7/2002 Rallis et al.
`6.425,084 B1
`82002 Kupka et al.
`6,434,535 B
`9/2002 Grapes
`6,446,130 B1
`10/2002 Geiger et al.
`6.463,534 B1
`1 1/2002 Horsley
`6,480,188 B1
`12/2002 Freeny, Jr.
`6,490.443 B1
`1/2003 Steen III et al.
`6.510,350 B1
`2/2003 Wehrenberg
`6,523,113 B1
`3/2003 Getsin et al.
`6,529.949 B1
`4/2003 Schenaetal.
`6.546,418 B2
`4/2003 Sims. In
`65500 li B1
`52003 Maetal
`6563,805 Bi
`5/2003 Murphy
`6564.380 B
`9, 2003 White et al.
`6,628.302 B2
`6,632,992 B2 10/2003 Hasegawa
`6,647.417 B1
`1 1/2003 Hunter et al.
`6,657,538 B1* 12/2003 Ritter ...................... G06F 21.32
`340, 5.8
`
`6,667,684 B1
`6,683,954 B1
`6,697.944 B1
`6,709,333 B1
`6,711,464 B1
`6,775,655 B1
`
`12/2003 Waggamon et al.
`1/2004 Searle
`2/2004 Jones et al.
`3/2004 Bradford et al.
`3/2004 Yap et al.
`8/2004 Peinado et al.
`
`2002fOO71559 A1
`2002fOO73042 A1
`2002fO091646 A1
`
`6/2002 Christensen et al.
`6/2002 Maritzen et al.
`7/2002 Lake ...................... G06Q 20/04
`705/67
`
`10/2004 White et al.
`6,804.825 B1
`6,806,887 B2 10/2004 Chernocket al.
`6,850,147 B2
`2/2005 Prokoski et al.
`6,853.988 B1* 2/2005 Dickinson ............... G06F 21.32
`38O,277
`
`3/2005 Hatakeyama et al.
`6,873,975 B1
`9/2005 Lee et al.
`6,950,941 B1
`1 1/2005 Bush et al.
`6,963,971 B1
`6,973,576 B2 12/2005 Giobbi
`6,975,202 B1
`12/2005 Rodriguez et al.
`6,983,882 B2
`1/2006 Cassone
`7,012,503 B2
`3/2006 Nielsen
`7,090,126 B2
`8/2006 Kelly et al.
`7,112,138 B2
`9, 2006 Hedricket al.
`7,137,012 B1
`1 1/2006 Kamibayashi et al.
`7, 191466 B1
`3/2007 Hamid et al.
`7,218,944 B2
`5/2007 Cromer et al.
`7,249,177 B1
`7, 2007 Miller
`7,305,560 B2 122007 Giobbi
`7,529,944 B2
`5 2009 Hamid
`7,574,734 B2
`8, 2009 Fedronic et al.
`7.587,611 B2
`9, 2009 Johnson et al.
`7,617,523 B2 11/2009 Das et al.
`7,644,443 B2
`1/2010 Matsuyama et al.
`7,715,593 B1
`5/2010 Adams et al.
`7,883,417 B2
`2/2011 Bruzzese et al.
`7,904,718 B2
`3/2011 Giobbiet al.
`2001/0026.619 A1 10, 2001 Howard et al.
`2001/0044337 A1 11/2001 Rowe et al.
`2002fOOO7456 A1
`1/2002 Peinado et al.
`2002fOO 13772 A1
`1/2002 Peinado
`2002/00 14954 A1
`2/2002 Fitzgibbon et al.
`2002fOO15494 A1
`2/2002 Nagai et al.
`2002fOO23032 A1
`2/2002 Pearson et al.
`2002/0026424 A1
`2/2002 Akashi
`2002.0056.043 A1
`5/2002 Glass ...................... G06F 21.32
`T13, 179
`
`7, 2002 Rowe et al.
`2002/0098888 A1
`8, 2002 Rowe et al.
`2002/0103027 A1
`8, 2002 Boate et al.
`2002/0104.006 A1
`8, 2002 Xu et al.
`2002/0108049 A1
`8, 2002 Shreve et al.
`2002/0109580 A1
`8/2002 Nguyen et al.
`2002/0116615 A1
`9/2002 Kutaragi et al.
`2002/0129262 A1
`9, 2002 Hamid et al.
`2002/0138767 A1
`2002fO140542 A1 10, 2002 Prokoski et al.
`2002/01441 17 A1 10/2002 Faigle
`2002fO150282 A1 10, 2002 Kinsella
`2002fO152391 A1 10, 2002 Willins et al.
`2002fO158750 A1 10, 2002 Almalik
`2002/0174348 A1 1 1/2002 Ting
`2002/0178063 A1 11/2002 Gravelle et al.
`2002/019 1816 A1 12/2002 Maritzen et al.
`2003.0036425 A1
`2/2003 Kaminkow et al.
`2003/0046552 A1
`3, 2003 Hamid
`2003.0054868 A1
`3/2003 Paulsen et al.
`2003.0054881 A1
`3/2003 Hedricket al.
`2003/0055689 A1
`3/2003 Blocket al.
`2003, OO79133 A1
`4, 2003 Breiter et al.
`2003.01.15474 A1
`6/2003 Khan et al.
`2003/0127511 A1
`7/2003 Kelly et al.
`2003/0139190 A1
`7/2003 Steelberg et al.
`2003/0.149744 A1
`8/2003 Bierre et al.
`2003/0172037 A1
`9/2003 Jung et al.
`2003/0176218 A1
`9/2003 LeMay et al.
`2003/0186739 A1 10, 2003 Paulsen et al.
`2004/O123127 A1
`6/2004 Teicher et al.
`2004/O127277 A1
`7, 2004 Walker et al.
`2004/O128162 A1* 7/2004 Schlotterbeck et al. .......... 705/2
`2004/0129.787 A1
`7, 2004 Saito et al.
`2004/0209690 A1 10, 2004 Bruzzese et al.
`2004/02096.92 A1 10, 2004 Schober et al.
`2004/0215615 A1 10, 2004 Larsson et al.
`2004/0230488 A1 11/2004 Beenau et al.
`2005.0054431 A1
`3, 2005 Walker et al.
`
`Petitioner's Exhibit 1001, Page 2
`
`

`

`US 9,298.905 B1
`Page 3
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2005/OO74126 A1*
`2005/0081040 A1
`2005, 0109836 A1
`2005/0229.007 A1
`2005/025 1688 A1
`2005/0253683 A1
`2006/0022046 A1
`2006, OO58102 A1
`2006, OO63575 A1
`2006/0076401 A1
`2006, O113381 A1
`2006, O156O27 A1
`2007, OO32288 A1
`2007, OO60319 A1
`2007/O159301 A1
`2007/0213048 A1
`2007/0219926 A1
`2007/022O272 A1
`2008, 0008359 A1
`2008, OO19578 A1
`2008. O1883O8 A1
`2009/0328.182 A1
`2010.0117794 A1
`2011/O126188 A1
`2013, OO19295 A1
`
`4/2005 Stanko .......................... 380,279
`4/2005 Johnson et al.
`5, 2005 Ben-Aissa
`10/2005 Bolle et al.
`11/2005 Nanavati et al.
`11/2005 Lowe
`2, 2006 Iwamura
`3/2006 Nguyen et al.
`3, 2006 Gatto et al.
`4/2006 Frerking
`6, 2006 Hochstein et al.
`7, 2006 Blake
`2/2007 Nelson et al.
`3/2007 Blocket al.
`7, 2007 Hirt et al.
`9/2007 Trauberg
`9, 2007 Korn
`9/2007 Campisi et al.
`1/2008 Beenau et al.
`1/2008 Saito et al.
`8/2008 Shepherd et al.
`12/2009 Malakapalliet al.
`5/2010 Adams et al.
`5/2011 Bernstein et al.
`1/2013 Park ...................... HO4L 9,3213
`726/7
`2013/01 11543 A1* 5, 2013 Brown ................ HO4L 63.0884
`T26.1
`2013/0276140 A1* 10/2013 Coffing ............... HO4L 12,5895
`726/27
`2013/0331063 A1* 12/2013 Cormier .............. HO4L 63,0272
`455,411
`
`FOREIGN PATENT DOCUMENTS
`
`WOO 1/75876
`WO
`WOO 1/77790
`WO
`WO WO 2005/050450
`WO WO 2005/0868O2
`
`10, 2001
`10, 2001
`6, 2005
`9, 2005
`
`OTHER PUBLICATIONS
`
`Amr Farouk, Ahmed A. Abdelhafez, "Authentication Mechanisms in
`GridComputing Environment: Comparative Study.” IEEE, 2012, pp.
`1-6.
`Antonoff, Michael, “Visiting Video Valley.” Sound & Vision, Nov.
`2001, pp. 116, 118-119.
`"Applying Biometrics to Door Access.” Security Magazine, Sep. 26.
`2002, Retrieved on Jan. 7, 2007, from <URL:http://www.
`Securitymagazine.com/CDA/Articles/technologies/
`3ae610eaa34d8010VgnVCM100000ft)32a8cO >, 5 pgs.
`BioPay, LLC, “Frequently Asked Questions (FAQs) About BioPay.”
`BioPay, LLC, 2007, Retrieved on Jan. 7, 2007, from <URL:http://
`www.biopay.com/facqs-lowes.asp., 5 pgs.
`Blum, Jonathan, “Digital Rights Management May Solver the
`Napster “Problem’.” Technology Investor Industrysector, Oct. 2000,
`pp. 24-27.
`Debow, Yvette, “Credit/Debit Debuts in Midwest Smart Card Test.”
`Computers in Banking, v6, n11, Nov. 1989, 4pgs.
`Dennis, Sylvia, "Digital Passports Need Not Infringe Civil Liber
`ties.” Newsbytes, Dec. 2, 1999, 2 pgs.
`Fasca, Chad, “The Circuit.” Electronic News, vol. 45 Iss. 45, Nov. 8,
`1999, 2 pgs.
`“Firecrest Shows How Truly Commercially-Minded Companies Will
`Exploit the Internet.” Computergram International, Jan. 18, 1996, 2
`pg.S.
`Kontzer, Tony, “Thomson Bets on Smart Cards for Video Encryp
`tion.” www.informationweek.com, Jun. 7, 2001, 1 pg.
`Lake, Matt, “Downloading for Dollars.” Sound & Vision, Nov. 2000,
`pp. 137-138.
`Lewis, Peter H. "Sony and Visa in On-Line Entertainment Venture.”
`New York Times, v 145, Nov. 16, 1995, 1 pg.
`
`McIver, R. et al., “Identification and Verification Working Together.”
`Bioscrypt, Aug. 27, 2004. Retrieved on Jan. 7, 2007, from
`<URL:http://www.ibia.org/membersadmin/whitepapers/pdf 15/
`Identification%20and%20 Verification%20Working%20Together.
`pdf>. 5 pgs.
`“Micronas and Thomson Multimedia Showcase a New Copy Protec
`tion System that Will Drive the Future of Digital Television.” www.
`micronas.com, Jan. 8, 2002, 3 pgs.
`Nilsson, J. et al., “Match-On-Card for Java Cards.” Precise
`Biometrics, White Paper, Apr. 2004, Retrieved on Jan. 7, 2007, from
`<URL:http://www.ibia.org/membersadmin/whitepapers/pdf 17/
`Precise%20Match-on-Card%20for%20Java%20Cards.pdf>. 5 pgs.
`Nordin, B., “Match-On-Card Technology.” Precise Biometrics,
`White Paper, Apr. 2004, Retrieved on Jan. 7, 2007, from <URL:http://
`www.ibia.org/membersadmin/whitepapers/pdf 17/Precise%Match
`on-Card%20technology.pdf>. 7 pgs.
`Paget, Paul, “The Security Behind Secure Extranets.” Enterprise
`Systems Journal, Dec. 1999, 4pgs.
`PCT International Search Report, PCT/US04/38124, Apr. 7, 2005, 10
`pg.S.
`PCT International Search Report, PCT/US05/43447, Feb. 22, 2007,
`7 pgs.
`PCT International Search Report, PCT/US05/46843, Mar. 1, 2007,
`10 pgs.
`PCT International Search Report, PCT/US07/11102, Oct. 3, 2008, 11
`pg.S.
`PCT International Search Report, PCT/US07/11103, Apr. 23, 2008, 9
`pg.S.
`PCT International Search Report, PCT/US07/11104, Jun. 26, 2008, 9
`pg.S.
`PCT International Search Report, PCT/US07/11105, Oct. 20, 2008,
`10 pgs.
`Pope, "Oasis Digital Signature Services: Digital Signing without the
`Headaches.” Internet Computing IEEE, Vol. 10, Oct. 2006, pp.
`81-84.
`“SAFModuleTM: A Look Into Strong Authentication.” saflink Cor
`poration, Retrieved on Jan. 7, 2007, from <URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf/6/SAFmod WP.pdf>. 8 pgs.
`Sapsford, Jathon, "E-Business: Sound Waves Could Help Ease Web
`Fraud Woes.” Wall Street Journal, Aug. 14, 2000, 2 pgs.
`“Say Hello to Bluetooth.” Bluetooth Web site, Jun. 2000, 4pgs.
`“Smart Cards and Biometrics White Paper.” Smart Card Alliance,
`May 2002, Retrieved on Jan. 7, 2007, from <URL: http://www.
`Securitymanagement.com/library/smartcard facqtech0802.pdf>. 7
`pg.S.
`“Thomson Multimedia Unveils Copy Protection Proposal Designed
`to Provide Additional Layer of Digital Content Security,” www.
`thompson-multimedia.com, May 30, 2001, 2 pgs.
`Van Winkle, William, “Bluetooth, the King of Connectivity.” Laptop
`Buyer's Guide and Handbook, Jan. 2000, pp. 148-153.
`Wade, Will. “Using Fingerprints to Make Payments at POS Slowly
`Gaining Popularity.” Credit Union Journal, International Biometric
`Group, Apr. 21, 2003, Retrieved on Jan. 7, 2007, from <URL:http://
`www.biometricgroup.com/in the news/04.21.03.html>, 3 pgs.
`Wallace, Bob, "The Internet Unplugged.” InformationWeek.com,
`Dec. 13, 1999, pp. 22-24.
`Weber, Thomas E., “In the Age of Napster, Protecting Copyright is a
`Digital Arms Race.” Wall Street Journal, Jul. 24, 2000, 3 pgs.
`“What is a File?” Apr. 30, 1998, URL: http://unixhelp.ed.ac.uk/
`editors whatisafile.html, accessed Mar. 11, 2010 via http://
`waybackmachine.org/1998061500000* /http://unixhelp.ed.ac.uk/
`editors whatisafile.html, 1 pg.
`Yoshida, Junko, "Content Protection Plan Targets Wireless Home
`Networks,” www.eetimes.com, Jan. 11, 2002, 2 pgs.
`Simon Liu and Mark Silverman. 2001. "A Practical Guide to
`Biometric Security Technology”. IT Professional 3, 1 (Jan. 2001).
`27-32. DOI=10. 1109/6294.899930 http://dx.doi.org/10.1109/6294.
`899930.
`Smart Card Alliance Report, “Contactless Technology for Secure
`Physical Access: Technology and Standards Choices'. Smart Card
`Alliance, Oct. 2002, p. 1-48.
`* cited by examiner
`
`Petitioner's Exhibit 1001, Page 3
`
`

`

`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 1 of 6
`
`US 9,298.905 B1
`
`FIG. 1
`
`
`
`Biometric Key 100
`
`Biometric Portion
`220
`Enrollment
`Module
`222
`
`Validation
`Module
`224
`
`Control
`Module
`210
`
`Persistent
`Storage
`226
`
`FIG 2
`
`RF Communication
`Module
`230
`
`Petitioner's Exhibit 1001, Page 4
`
`

`

`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 2 of 6
`
`US 9,298.905 B1
`
`
`
`Biometric Key
`100
`
`Application
`330
`
`Authentication
`Module
`310
`
`Trusted Key
`Authority
`320
`
`FIG. 3
`
`Petitioner's Exhibit 1001, Page 5
`
`

`

`U.S. Patent
`
`Mar
`. 29, 2016
`
`Sheet 3 of 6
`
`US 9,298.905 B1
`
`Biometric
`Key
`100
`
`Authentication
`Module
`310
`
`Trusted Key
`Authority
`320
`
`Register User And
`Biometric Key
`410
`
`Receive Biometric
`Data
`Of The User
`420
`
`
`
`Biometrically Verify
`User
`440
`
`Authentication
`Needed For An
`Application?
`430
`YES
`
`Request
`Authentication
`450
`
`Allow Access To
`The Application
`470
`
`FIG. 4
`
`Authenticate The
`Biometric Key
`460
`
`Petitioner's Exhibit 1001, Page 6
`
`

`

`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 4 of 6
`
`US 9,298.905 B1
`
`
`
`5 O O
`
`Check dentification and Establish Profile
`510
`
`Persistently Store Biometric Data
`From The User
`520
`
`Obtain Code
`530
`
`ASSociate Profile
`With Code
`540
`
`FIG. 5
`
`Petitioner's Exhibit 1001, Page 7
`
`

`

`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 5 of 6
`
`US 9,298.905 B1
`
`START
`
`Request User Scan
`610
`
`Receive Scan Data From A Subject
`620
`
`SCan Data Match Biometric Data?
`630
`
`
`
`YES
`
`The Subject is Verified
`As The Registered User
`640
`
`Wirelessly Send Code indicating
`Successful Verification of User
`650
`
`FIG. 6
`
`Verification
`Failed
`650
`
`Petitioner's Exhibit 1001, Page 8
`
`

`

`U.S. Patent
`
`Mar. 29, 2016
`
`Sheet 6 of 6
`
`US 9,298.905 B1
`
`
`
`Wirelessly Receive The Code
`710
`
`Request Authentication
`Of The Code
`720
`
`Code Authenticated?
`730
`
`Send Access Message To The Application
`740
`
`Authentication
`Failed
`750
`
`FIG. 7
`
`Petitioner's Exhibit 1001, Page 9
`
`

`

`US 9,298.905 B1
`
`1.
`BIOMETRIC PERSONAL DATA KEY (PDK)
`AUTHENTICATION
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`The present application claims priority, under 35 U.S.C.
`S120, to U.S. patent application Ser. No. 13/710,109 filed
`Dec. 10, 2012 and entitled “Biometric Personal Data Key
`(PDK) Authentication” which claims priority to U.S. patent
`application Ser. No. 1 1/314,199, filed Dec. 20, 2005 and
`entitled “Biometric Personal Data Key (PDK) Authentica
`tion.” which claims the benefit of U.S. Provisional Applica
`tion No. 60/637,538, filed on Dec. 20, 2004, and of U.S.
`Provisional Application No. 60/652,765, filed on Feb. 14,
`2005, the entire contents of which are hereby incorporated by
`reference.
`
`10
`
`15
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to computerized
`authentication, and more specifically, to an authentication
`responsive to biometric verification of a user being authenti
`cated.
`
`BACKGROUND
`
`25
`
`2
`and a verification module, in communication with the persis
`tent storage, to receive scan data from a biometric scan for
`comparison against the biometric data, and if the scan data
`matches the biometric data, wirelessly sending a code for
`authentication.
`In one embodiment, a method for Verifying a user during
`authentication of an integrated device, includes persistently
`storing biometric data for the user in a tamper-resistant for
`mat; responsive to receiving a request for biometric verifica
`tion of the user, receiving scan data from a biometric scan;
`comparing the scan data to the biometric data to determine
`whether the data match; and responsive to a determination
`that the scan data matches the biometric data, wirelessly
`sending a code for authentication.
`Other embodiments include corresponding systems, appa
`ratus, and computer programming products, configured to
`perform the actions of the methods, encoded on computer
`storage devices. These and other embodiments may each
`optionally include one or more of the following features. For
`instance the operations further include registering an age
`verification for the user in association with the code. For
`instance the operations further include establishing a secure
`communication channel prior to sending the code for authen
`tication. For instance the operations further include receiving
`a request for the code without a request for biometric verifi
`cation, and responsive to receiving the request for the code
`without a request for biometric verification, sending the code
`without requesting the scan data. For instance, the features
`include: the code is registered with a trusted authority, and the
`code can be authenticated to a third party by the trusted
`authority; the code uniquely identifies the integrated device;
`the code indicates that the biometric verification was success
`ful; persistently storing biometric data includes permanently
`storing biometric data; the biometric data and the scan data
`are both based on a fingerprint scan by the user, an LED to be
`activated for requesting the biometric scan.
`In one embodiment, a method for authenticating a verified
`user, includes receiving a code associated with a biometri
`cally verified user, requesting authentication of the code:
`receiving an authentication result; and in response to the
`authentication result being positive, providing access to an
`application.
`In one embodiment, a system includes an integrated device
`(e.g. a biometric key) to store biometric data for a user in a
`tamper resistant format, and if scan data can be verified as
`being from the user by comparing the scan data to the bio
`metric data, wirelessly sending a code; and an authentication
`module to receive the code and send the code to a trusted
`authority for authentication, and responsive to the code being
`authenticated, allowing the user to access an application.
`Other embodiments include corresponding systems, appa
`ratus, and computer programming products, configured to
`perform the actions of the methods, encoded on computer
`storage devices. These and other embodiments may each
`optionally include one or more of the following features. For
`instance, the operations further include registering the code
`with a trusted authority, wherein requesting authentication of
`the code includes providing the code to the trusted authority
`and wherein receiving an authentication result comprises
`receiving the authentication result from the trusted authority.
`For instance the operations further include registering a date
`of birth or age with the trusted authority. For instance the
`operations further include establishing a secure communica
`tions channel with an integrated device, wherein the code
`associated with the biometrically verified user is received
`from the integrated device. For instance the features include:
`the integrated device receives an authentication request from
`
`Conventional user authentication techniques are designed
`to prevent access by unauthorized users. One technique is to
`require a user being authenticated to provide secret creden
`tials, such as a password, before allowing access. Similarly, a
`PIN number can be required by an ATM machine before
`allowing a person to perform automated bank transactions. A
`difficulty with this technique is that it requires the user to
`memorize or otherwise keep track of the credentials. A uses
`often has multiple sets of credentials (e.g., passwords and
`PINs) and it can be quite difficult to keep track of them all.
`Another technique that does not require the user to memo
`rize credentials is to provide the user with an access object
`Such as a key (e.g., an electronic key) that the user can present
`to obtain access. For example, a user can be provided with a
`Small electronic key fob that allows access to a building or
`other secured location. A difficulty with using access objects
`is that authentication merely proves that the access object
`itself is valid; it does not verify that the legitimate user is using
`the access object. That is, illegitimate user can use a stolen
`access object to enter a secured location because the user's
`identity is never checked.
`Some hybrid authentication techniques require the user to
`provide both an access object and credentials. The user is
`authenticated only upon providing both items. Of course, this
`Solution does not resolve the problem of making the user
`memorize credentials.
`Therefore, there is a need for systems and methods for
`Verifying a user that is being authenticated that does not suffer
`from the limitations described above. Moreover, the solution
`should ease authentications by wirelessly providing an iden
`tification of the user.
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`SUMMARY
`
`The present invention addresses the above needs by pro
`viding systems and methods for authentication responsive to
`biometric verification of a user being authenticated. In one
`embodiment, an integrated device includes a persistent Stor
`age to persistently stores a code such as a device identifier
`(ID) and biometric data for a userina tamper-resistant format,
`
`60
`
`65
`
`Petitioner's Exhibit 1001, Page 10
`
`

`

`3
`the authentication module, and in response, requests a bio
`metric scan from the user to generate the scan data; when the
`integrated device cannot verify the scan data as being from the
`user, it does not send the code.
`Advantageously, user authentication is bolstered with
`highly reliable biometric verification of the user in an inte
`grated device. Furthermore, a keyless environment relieves
`authorized users from having to memorize credentials, and of
`having to physically enter credentials or keys. In addition, the
`integrated device can be authenticated for an application that
`is open to the public (i.e., in an open loop system).
`The features and advantages described in the specification
`are not all inclusive and, in particular, many additional fea
`tures and advantages will be apparent to one of ordinary skill
`in the art in view of the drawings, specifications, and claims.
`Moreover, it should be noted that the language used in the
`specification has been principally selected for readability and
`instructional purposes and may not have been selected to
`delineate or circumscribe the inventive matter.
`
`5
`
`10
`
`15
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The teachings of the present invention can be readily
`understood by considering the following detailed description
`in conjunction with the accompanying drawings.
`FIG. 1 is a schematic diagram illustrating a biometric key
`for providing authentication information for a biometrically
`Verified user according to one embodiment of the present
`invention.
`FIG. 2 is a block diagram illustrating functional modules
`within the biometric key according to one embodiment of the
`present invention.
`FIG. 3 is a block diagram illustrating a system for provid
`ing authentication information for a biometrically verified
`USC.
`FIG. 4 is a flow chart illustrating a method for providing
`authentication information for a biometrically verified user.
`FIG. 5 is a flow chart illustrating a method for enrolling
`biometric data of the user with the biometric key.
`FIG. 6 is a flow chart illustrating a method for verifying a
`Subject presenting the biometric key according to one
`embodiment of the present invention.
`FIG. 7 is a flow chart illustrating a method for authenticat
`ing a verified user of the biometric key according to one
`embodiment of the present invention.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`DETAILED DESCRIPTION
`
`Systems and methods for authentication responsive to bio
`metric verification of a user being authenticated are
`described. Generally, biometric verification uses biometric
`data to ensure that the user of, for example, a biometrickey, is
`the person registered as an owner. Biometric data is a digital
`or analog representation of characteristics unique to the
`user's body. For example, a fingerprint of a subject can be
`compared against previously-recorded biometric data for
`verification that the subject is the registered owner of the
`biometric key. Then, the biometric key itself can be authen
`ticated.
`Although the embodiments below are described using the
`example of biometric verification using a fingerprint, other
`embodiments within the spirit of the present invention can
`perform biometric verification using other types of biometric
`data. For example, the biometric data can include a palm
`print, a retinal scan, an iris Scan, hand geometry recognition,
`facial recognition, signature recognition, or voice recogni
`tion.
`
`50
`
`55
`
`60
`
`65
`
`US 9,298.905 B1
`
`4
`FIG. 1 is a schematic diagram illustrating an example of a
`biometric key 100 for providing authentication information
`for a biometrically verified user according to one embodi
`ment of the present invention. In one embodiment, the bio
`metrickey 100 comprises a frame 110, a scan pad 120, and an
`LED 130. In one embodiment, biometric key 100 has a small
`form factor (e.g., the size of an automobile remote control)
`such that it can be unobtrusively carried by a user. In one
`embodiment, the biometric key 100 is integrated into another
`object or device. A device having an integrated biometrickey
`100 is occasionally referred to herein as an “integrated
`device.” For example, in one embodiment, the biometric key
`100 is integrated into a mobile phone (e.g. a cellular phone or
`Smartphone), tablet, laptop, mp3 player, mobile gaming
`device, watch, key fob or other mobile device, thereby mak
`ing the biometric key 100 unobtrusive to carry.
`Frame 110 can be formed by plastic, metal or another
`suitable material. Frame 110 is shaped to secure scan pad 120,
`and includes a perforation for attachment to, for example a
`key chain or clip. In one embodiment, frame 110 is formed
`from a unitary molding to protect biometric data. Accord
`ingly, frame 110 cannot be opened to expose the underlying
`components unless it is broken.
`Scan pad 120 can be, for example, an optical scanner using
`a charge coupled device, or a capacitive scanner. Scan pad
`120 can be sized to fit a thumb or other finger. Biometric key
`100 of the present embodiment includes LED 130 that lights
`up to request a fingerprint Scan from a user. In one embodi
`ment, LED 130 can also confirm that user verification and/or
`authentication has completed.
`Biometric key 100 can authenticate a user for various pur
`poses. For example, biometric key 100 can allow keyless
`entry into homes and autos. In another example, biometric
`key 100 can logauser onto a computer system or point of sale
`register without typing in credentials. In still another
`example, biometric key 100 can verify that an enrolled user is
`above a certain age (e.g., before allowing access to a slot
`machine in a casino). In some embodiments, biometric key
`100 operates without biometric verification, and request a
`fingerprint Scan from a user only when biometric verification
`is needed for the particular use.
`FIG. 2 is a block diagram illustrating biometric key 100
`according to one embodiment of the present invention. Bio
`metric key 100 comprises control module 210, biometric
`portion 220, RF communication module 230, persistent stor
`age 240, and battery 250. Biometric key 100 can be formed
`from a combination of hardware and Software components as
`described above. In one embodiment, biometrickey 100 com
`prises a modified key fob.
`Control module 210 coordinates between several functions
`of biometric key 100. In one embodiment, control module
`210 provides a verification code upon successful verification
`of the user. More specifically, once biometric portion 220
`indicates that a fingerprint scan matches biometric data that
`was collected during enrollment, control module 210 can
`trigger RF communication module 230 for sending a code
`indicating that the user was verified. In another embodiment,
`control module 210 can work in the opposite direction by
`detecting a request for verification from RF communication
`module 230, and then requesting verification of the user from
`biometric portion 210. Note that control module 210 of FIG.
`2 is merely a grouping of control functions in a central archi
`tecture, and in other embodiments, the control functions can
`be distributed between several modules around biometrickey
`1OO.
`Biometric portion 220 comprises enrollment module 222,
`validation module 224, and biometric database 226. In one
`
`Petitioner's Exhibit 1001, Page 11
`
`

`

`5
`embodiment, enrollment module 222 registers a user with
`biometric key 100 by persistently storing biometric data asso
`ciated with the user. Further, enrollment module 222 registers
`biometric key 100 with a trusted authority by providing the
`code (e.g., device ID) to the trusted authority. Or conversely,
`the trusted authority can provide the code to biometric key
`100 to be stored therein.
`Validation module 224 can comprise scan pad 120 (FIG. 1)
`to capture scan data from a user's fingerprint (e.g., a digital or
`analog representation of the fingerprint). Using the scan data,
`validation module 214 determines whether the user's finger
`print match

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket