WO2009096767A1 - Method of secure pin entry and operation mode setting - Google Patents
Method of secure pin entry and operation mode setting Download PDFInfo
- Publication number
- WO2009096767A1 WO2009096767A1 PCT/MY2008/000005 MY2008000005W WO2009096767A1 WO 2009096767 A1 WO2009096767 A1 WO 2009096767A1 MY 2008000005 W MY2008000005 W MY 2008000005W WO 2009096767 A1 WO2009096767 A1 WO 2009096767A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- finger
- fingerprint
- sensor
- pin
- entry
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 12
- 238000001514 detection method Methods 0.000 claims abstract description 10
- 238000012545 processing Methods 0.000 claims abstract description 6
- 230000006870 function Effects 0.000 claims abstract description 3
- ATJFFYVFTNAWJD-UHFFFAOYSA-N Tin Chemical compound [Sn] ATJFFYVFTNAWJD-UHFFFAOYSA-N 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 210000004905 finger nail Anatomy 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
- G06F3/0233—Character input methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3572—Multiple accounts on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0853—On-card keyboard means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
Definitions
- the BLUE LED is ON as long as the Finger is present on the sensor. [STEP 58].
Abstract
This invention describes a method of a secure PIN (Personal Identification Number) entry and operation mode setting using a fingerprint sensor integrated in a portable device, which comprises of at least a fingerprint biometrics processing unit. The fingerprint biometrics processing unit retrieves the fingerprint data, external to the device, performs signal processing, authenticates the signal retrieved against identity parameters stored within the device, independent from a PC Host. The result of the authentication is used to enable secured portable device functions e.g. flash memory, security token, smart card etc. In the present invention, the fingerprint sensor is not only used to capture the fingerprint image but also to detect if a fingerprint or finger is present or absent. The finger detection together with the detection time and duration or together with the direction of movement of finger on the sensor defines a method of a secure PIN entry and operation mode setting.
Description
Description
Method of Secure PIN Entry and Operation Mode Setting
Description of the Art
Typically, a fingerprint sensor is used to scan a fingerprint image. The fingerprint image retrieved is then processed to generate a fingerprint template or identity parameter. This identity parameter is then authenticated against identity parameters that are stored within the portable device.
If the fingerprint is found to be valid, the device is enabled. These devices are present in the market place, particularly as biometrics flash disks, biometrics tokens, biometrics smart cards etc.
Typically there are features built in for recovery in situations where the fingerprint identity parameters are to be erased and the authentication of the fingerprint identity parameter needs to be bypassed. In addition, there may be other requirements of adding an additional authentication factor. In both cases a password or PIN input is used where the password or PIN is entered from the PC or a tactile switch, built into the portable device, to operate without any special software on the PC.
In the prior art devices, the PIN entry is done by keying the PIN in through a computer terminal and transmit it via computer serial ports such as RS232 or USB, or a wireless interface. This allows a hacker to use known attacks like a keystroke logger to retrieve the PIN numbers.
In addition, the application software that enables the PIN entry may work in one operating systems such as Windows but may not work on in another operating systems such as Mac OS or Linux. Therefore, the use of a password entry via a PC is quite limited. In another type of prior art devices, a tactile switch is used. The use of a tactile switch is easily subjected to hacking too. Atypical tactile switch circuitry is shown in Figure 1. It is an input line to the device central processing unit. The input line is connected to a pull up resistor. The line is typically HIGH. When a tactile switch is pressed the LINE becomes LOW. Usually the small tactile switch is pressed by a finger nail or a pencil tip. However, since it is only an input line, a potential hacker, who gets hold of the device and knows how the device works, could tap the line and send HIGH and LOW signals -representing the PIN -to get unauthorized access. Another disadvantage with the use of tactile switch is that it is made of small mechanical parts. It is an additional component and potentially subjected to fail due to wear and tear.
In the present invention, the fingerprint sensor is used to detect the presence of a finger and the time and duration of its presence. The LED indicators are used to indicate if time and sufficient duration have been achieved, as required. The mechanisms of a PIN input for both, tactile switch and finger detection, appear to be
similar . However, the approach by finger detection is for more secure as it depends on detection algorithms to detect a finger instead of a low/high signal PIN input from a tactile switch.
In addition, the biometrics fingerprint sensor is for more accessible and durable compared with a tactile switch.
Figure 2 provides an overview diagram of the current method of secure PIN entry in a portable biometrics device. The device has 3 LEDs as shown in Figure 2. The device 10 may be connected to the host PC via a communication interface connector 14. The LED indicators 08 are visible and the biometrics sensor 12 is accessible on the top surface of the device. The biometrics fingerprint sensor 12 in the current description can be either a swipe sensor or an areal sensor.
The internal building block of device 10 is shown in Figure 3. It consists of a USB connector 14, a flash memory 22, LED indicators 08, a biometric fingerprint sensor 12 and a micro-controller 50. The micro-controller 50 consists of a biometric fingerprint processing unit and a USB flash controller unit. Device 10 is a biometric flash disk.
The user's fingerprint data is captured via the fingerprint sensor 12. Once the fingerprint is authenticated against the stored identity parameters, the micro-controller 50 will activate its USB flash controller and the user will then be able to access to flash memory 22. The micro-controller 50 can be set into 'PIN entry mode' to allow the sequential entry of each PIN digit. When TIN entry mode' is detected, the micro-controller within the device will set a digital control parameter for the PIN entry to 0, to indicate that this is the first digit of the PIN entry. The value of the digit is also set to zero. User guidance is done by LED indicators 08 which consist of a BLUE LED, a RED LED and a GREEN LED. The BLUE LED indicates that the sensor has sensed the presence of a finger. GREEN LED indicates a DIGIT entry and indicates also ON when the entered PIN matches with a previously stored PIN. The RED LED indicates that the PIN entered does not match with a previously stored PIN or PIN entry time has expired. If the finger presence at the sensor is short, let say less that 1 second, it is considered as an increment of current digit. If the finger presence at the sensor is longer than 1 second, it means the current DIGIT is complete and has to be stored. Now the next digit to be entered is initialized to ZERO. If the finger is present at the sensor for more than 3 seconds, it means the PIN entry is complete. Here is an example of the sequence of entering PIN 5034 in the PIN entry mode,
1. briefly touch the sensor 5 times (each less than 1 second). The BLUE LED confirms each time that the finger presence has been sensed and therefore the digit value is incremented by one to a total of 5.
2. touch the sensor continuously for 1 second to complete the first digit entry. There is a short blink of the GREEN LED to indicate the digit entry is complete. The BLUE LED is ON indicating that finger presence at the sensor.
3. to enter the next digit, the zero, just touch the sensor for 1 second until the GREEN LED is on in order to complete the second digit entry. (Note: each new digit is zero by default and for a zero no increment entry is needed)
4. briefly touch the sensor 3 times. Each digit increment is confirmed by a short blink of the Blue LED.
5. touch the sensor for 1 second to complete the third digit entry. There is a short blink of the GREEN LED to indicate the digit entry is complete.
6. briefly touch the sensor 4 times. Each digit increment is confirmed by a short blink of the Blue LED.
7. touch the sensor for 3 seconds to complete the PIN entry. If the PIN matches, then GREEN LED will be ON; otherwise, the RED LED will be ON briefly. In another method, a PIN entry can be made by finger detect together with the direction of movement of the fingerprint on the sensor. For example, swiping of a finger from left to right is considered as an increment of current digit. If the finger swipes on the sensor from right to left on the sensor, it means the current DIGIT is complete and has to be stored. The next digit to be entered is initialized to ZERO. Here is an example of entering PIN 5034
1. swipe the finger from left to right on the sensor 5 times, The BLUE LED confirms each time that the finger swiping has been sensed and therefore the digit value is incremented by one to a total of 5.
2. swipe the finger from right to left on the sensor. There is a short blink of the GREEN LED to indicate the digit entry is complete.
3. to enter the next digit, the zero, just swipe the finger from right to left on the sensor, the GREEN LED turns on to indicate the second digit entry is complete. (Note: each new digit is zero by default and for a zero no increment entry is needed) 4. swipe the finger on the sensor from left to right on the sensor 3 times. Each digit increment is confirmed by a short blink of the Blue LED. 5. swipe the finger on the sensor from right to left on the sensor to complete the third digit entry. There is a short blink of the GREEN LED to indicate the digit entry is complete. 6. swipe the finger from left to right on the sensor 4 times. Each digit increment is confirmed by a short blink of the Blue LED.
7. touch the sensor for 3 seconds to complete the PIN entry. If the PIN matches, then GREEN LED will be ON; otherwise, the RED LED will be ON briefly.
One advantage of using the fingerprint sensor instead of a tactile switch is that it is easier to use, compared with a small little tactile switch.
Additionally, the fingerprint sensor can be used without help of a pen or paper-clip, compared with a hidden small tactile switch and it is more durable against hard pressure which may damage a small tactile switch easily.
Another significant advantage of the finger detect input is that it is independent of any operating system. It does not leave any software traces in a PC with the PIN entry and can not be traced by any malicious program on a PC. (Note: To enter a PIN from a PC you need to run a program in that PC before you can key in your PIN. A PC program that runs on a Windows operating systems environment may not run on Linux or Mac OS).
Additionally, the finger detect allows for a 2-factor authentication. In order to enable the device, the user has to provide both, a valid fingerprint AND a valid PIN entry, using the finger detection. The described method of detecting the presence of a finger, including it's time and duration, allows for setting the device in different modes of operation. An example is provided in Figure 4. It shows various options of how a 2-factor authentication, the re- enrollment of fingerprints and a method of bypassing fingerprint authentication by PIN input can be achieved by simply detecting the absence and presence of a finger by analyzing time and duration of its presence.
Compared with the tactile switch, the described method of using the biometric sensor allows to add another layer of security for the PIN entry or enablement of a specific operation mode by checking if a real finger is present, using the biometric sensing features functionalities of the sensor. When the portable biometric fingerprint device is inserted into a USB port, the device checks if there is a finger present on the sensor [STEP 50]. If it is not, it proceeds with the BLUE LED blinking to invite the user to scan the finger for authentication [STEP 64].
If there is a finger present on the sensor, the BLUE LED is ON until the finger is removed. When the finger is removed and then placed back again on the sensor within
3 seconds [STEP 52 & 54], this is to confirm to operate in other modes than the normal authentication mode.
A finger detect timer, FDTimer, is then set to check the duration of the finger presence and to light up the GREEN LED when 3 seconds duration is achieved and to light up the RED LED when the 8 seconds duration has been reached. [STEP 56]
The BLUE LED is ON as long as the Finger is present on the sensor. [STEP 58].
When the finger is lifted, and the duration was more than 8 seconds [STEP 60], then the user is prompted to enter the PIN number to enable the secured functions (like
access to the flash memory) [STEP 66]. In this mode of operation, the user bypasses the fingerprint authentication.
If the finger is present for more than 3 seconds [STEP 62], it will proceed to re- enrollment of fingerprint [STEP 68]. The user is prompted to authenticate the re- enrollment with a valid fingerprint. Once a valid fingerprint is authenticated, all the fingerprint identity parameters are erased.
Alternately, the user has to enter a PIN as the first factor of authentication [STEP 70]. Once the PIN entry is validated, the user will be prompted for the second factor of authentication which is an entry of a valid fingerprint [STEP 64]. Similarly, after the unit has been authenticated by a fingerprint and/or PIN entry, the user can
1. place the finger on the sensor for 3 seconds continuously and then set the PIN number to delete the fingerprint identity parameters
2. place the finger on the sensor for 6 seconds continuously and then set the PIN for bypassing the fingerprint authentication
3. place the finger on the sensor for 9 seconds continuously and then set the PIN ;for deleting the fingerprint identity parameters.
While the present invention is described by means of specific embodiments, it will be understood that modifications may be made without departing from the spirit of the invention. The scope of the invention is not to be considered as limited by the description of the invention set forth in this description, but rather defined by the following claims:
Claims
[ 1 ] A portable device which comprises of at least a fingerprint biometrics processing unit whereby the fingerprint biometrics sensor is not only used to retrieve the user fingerprint image but is also used to detect the presence and absence of the finger and also the direction of movement of the finger.
[2] The finger detection of claim one of the said portable device together with the timing and sequence of detection of presence and absence of a finger on the surface of the fingerprint sensor or together with the direction of movement of the finger, are used as method of PIN input to the said device
[3] The finger detection of claim one of the said portable device together with the timing and sequence of detection of presence and absence of a finger on the surface of the fingerprint sensor, are used as method of enabling different modes of operations of the said device, specifically to enable specific secured operations
[4] The method of PIN entry together with the biometric fingerprint authentication of the said device are used as two factor authentication of the device.
[5] The claims 1-5 of a portable device apply also to components which may be embedded and integrated into other electronic devices to secure specific functions like notebooks, smart card readers, phones, cameras, desktop boxes, TV-sets, cars etc. to allow for an independence from the existing operating system or bus structure
[6] A portable or embedded device of claim 1 -5 using the biometric sensor to add another layer of security for the PIN entry or enablement of a specific operation mode checking if a real finger is present before or when the commands/PIN are entered, using the biometric sensing features and functionalities of the sensor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/MY2008/000005 WO2009096767A1 (en) | 2008-01-30 | 2008-01-30 | Method of secure pin entry and operation mode setting |
PCT/EP2009/000632 WO2009095263A1 (en) | 2008-01-30 | 2009-01-30 | Method of secure pin entry and operation mode setting in a personal portable device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/MY2008/000005 WO2009096767A1 (en) | 2008-01-30 | 2008-01-30 | Method of secure pin entry and operation mode setting |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009096767A1 true WO2009096767A1 (en) | 2009-08-06 |
Family
ID=40551252
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/MY2008/000005 WO2009096767A1 (en) | 2008-01-30 | 2008-01-30 | Method of secure pin entry and operation mode setting |
PCT/EP2009/000632 WO2009095263A1 (en) | 2008-01-30 | 2009-01-30 | Method of secure pin entry and operation mode setting in a personal portable device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2009/000632 WO2009095263A1 (en) | 2008-01-30 | 2009-01-30 | Method of secure pin entry and operation mode setting in a personal portable device |
Country Status (1)
Country | Link |
---|---|
WO (2) | WO2009096767A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102012219504A1 (en) | 2011-11-08 | 2013-05-08 | International Business Machines Corporation | Passive mobile article with passcode touch sensor array |
CN103167138A (en) * | 2012-09-14 | 2013-06-19 | 深圳市金立通信设备有限公司 | Achieving system and achieving method of mobile phone arbitrary system mixed cryptogram |
WO2015063474A1 (en) * | 2013-10-29 | 2015-05-07 | Cryptomathic Ltd | Secure mobile user interface and mobile device case |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8572394B2 (en) | 2009-09-04 | 2013-10-29 | Computer Associates Think, Inc. | OTP generation using a camouflaged key |
US8533460B2 (en) | 2009-11-06 | 2013-09-10 | Computer Associates Think, Inc. | Key camouflaging method using a machine identifier |
US8843757B2 (en) | 2009-11-12 | 2014-09-23 | Ca, Inc. | One time PIN generation |
US8582778B2 (en) | 2011-06-01 | 2013-11-12 | International Business Machines Corporation | Integrated key server |
EP2575084A1 (en) * | 2011-09-30 | 2013-04-03 | Nxp B.V. | Security token and authentication system |
DE102012100797A1 (en) * | 2012-01-31 | 2013-08-01 | Authentidate International Ag | authentication device |
US8955746B2 (en) | 2012-09-27 | 2015-02-17 | Intel Corporation | Providing a locking technique for electronic displays |
CN102902903B (en) * | 2012-10-10 | 2016-03-30 | 中孚信息股份有限公司 | A kind of ecommerce intelligent code key with button and its implementation |
EP2782074B1 (en) * | 2013-03-19 | 2019-06-26 | Nxp B.V. | Control system with security token and control method |
EP2782073B1 (en) * | 2013-03-19 | 2019-11-20 | Nxp B.V. | Smart card comprising tactile sensing user interface |
NO336008B1 (en) | 2013-06-26 | 2015-04-20 | Steinar Pedersen | Easy and reliable authentication of fingerprints |
EP3213242B1 (en) * | 2014-10-30 | 2021-09-15 | Hewlett-Packard Development Company, L.P. | Transaction medium |
DE102015112891A1 (en) * | 2015-08-05 | 2017-02-09 | Iseconsult | Device and method for secure storage, management and provision of authentication information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6484260B1 (en) * | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6766040B1 (en) * | 2000-10-02 | 2004-07-20 | Biometric Solutions, Llc | System and method for capturing, enrolling and verifying a fingerprint |
US6836554B1 (en) * | 2000-06-16 | 2004-12-28 | International Business Machines Corporation | System and method for distorting a biometric for transactions with enhanced security and privacy |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7272723B1 (en) * | 1999-01-15 | 2007-09-18 | Safenet, Inc. | USB-compliant personal key with integral input and output devices |
US6509847B1 (en) * | 1999-09-01 | 2003-01-21 | Gateway, Inc. | Pressure password input device and method |
KR100641434B1 (en) * | 2004-03-22 | 2006-10-31 | 엘지전자 주식회사 | Mobile station having fingerprint recognition means and operating method thereof |
US8090945B2 (en) * | 2005-09-16 | 2012-01-03 | Tara Chand Singhal | Systems and methods for multi-factor remote user authentication |
-
2008
- 2008-01-30 WO PCT/MY2008/000005 patent/WO2009096767A1/en active Application Filing
-
2009
- 2009-01-30 WO PCT/EP2009/000632 patent/WO2009095263A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6484260B1 (en) * | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6836554B1 (en) * | 2000-06-16 | 2004-12-28 | International Business Machines Corporation | System and method for distorting a biometric for transactions with enhanced security and privacy |
US6766040B1 (en) * | 2000-10-02 | 2004-07-20 | Biometric Solutions, Llc | System and method for capturing, enrolling and verifying a fingerprint |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102012219504A1 (en) | 2011-11-08 | 2013-05-08 | International Business Machines Corporation | Passive mobile article with passcode touch sensor array |
DE102012219504B4 (en) | 2011-11-08 | 2021-08-05 | International Business Machines Corporation | Passive mobile article with identification code touch sensor array |
CN103167138A (en) * | 2012-09-14 | 2013-06-19 | 深圳市金立通信设备有限公司 | Achieving system and achieving method of mobile phone arbitrary system mixed cryptogram |
CN103167138B (en) * | 2012-09-14 | 2015-10-07 | 深圳市金立通信设备有限公司 | A kind of system that realizes of mobile phone arbitrary carry system combination pin and implementation method |
WO2015063474A1 (en) * | 2013-10-29 | 2015-05-07 | Cryptomathic Ltd | Secure mobile user interface and mobile device case |
KR20160077096A (en) * | 2013-10-29 | 2016-07-01 | 크립토매틱 엘티디 | Secure Mobile User Interface |
JP2017502549A (en) * | 2013-10-29 | 2017-01-19 | クリプトマティック リミテッドCryptomathic Ltd | Secure mobile user interface and mobile device case |
US9760888B2 (en) | 2013-10-29 | 2017-09-12 | Cryptomathic Ltd. | Secure mobile user interface |
US10719831B2 (en) | 2013-10-29 | 2020-07-21 | Cryptomathic Ltd. | Secure mobile user interface |
KR102278236B1 (en) * | 2013-10-29 | 2021-07-15 | 크립토매틱 엘티디 | Secure Mobile User Interface |
Also Published As
Publication number | Publication date |
---|---|
WO2009095263A1 (en) | 2009-08-06 |
WO2009095263A8 (en) | 2010-03-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009096767A1 (en) | Method of secure pin entry and operation mode setting | |
TWI474263B (en) | Method of executing software functions using biometric detection and related electronic device | |
EP1990734A1 (en) | Portable and independent system for storage and display of passwords and pins | |
US20140210589A1 (en) | Smart card and smart system with enhanced security features | |
US20140028439A1 (en) | Sensor-embedded door handle with fingerprint identification function | |
US20170228631A1 (en) | Smartcard and method for controlling a smartcard | |
US20170286789A1 (en) | Biometric authorised smartcard and method for controlling a biometric authorised smartcard | |
WO2010030157A1 (en) | A method of authentication of computer id for portable data storage devices | |
US9268928B2 (en) | Smart pen system to restrict access to security sensitive devices while continuously authenticating the user | |
KR101853270B1 (en) | Authentication method for portable secure authentication apparatus using fingerprint | |
JP4734088B2 (en) | User authentication apparatus and control method thereof | |
US10262165B2 (en) | Authentication of a smart pen and computing device | |
US9824219B2 (en) | Electronic device having wake up verification and electronic system having the electronic device | |
US10762182B2 (en) | Detection system, fingerprint sensor, and method of finger touch authentication thereof | |
JP2002074365A (en) | Identity authentication system | |
CN101646262A (en) | Wireless data card and identity certification method thereof | |
KR101853266B1 (en) | Portable secure authentication apparatus using fingerprint | |
US11409853B2 (en) | System and method for authenticating before waking an information handling system | |
CN109583168B (en) | Unlocking control method and electronic device | |
WO2004055738A1 (en) | Devices for combined access and input | |
KR20050034506A (en) | Stand alone usb storage device using finger printing cognition | |
KR20070109488A (en) | The mouse of finger drive ring with nand flash memory | |
US11113376B2 (en) | Detection system, fingerprint sensor, and method of finger touch authentication thereof | |
TW201445358A (en) | Navigation device and method of triggering security setting | |
US20070181697A1 (en) | Method of a USB interface device with a discrimination function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08712568 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 02/11/10) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08712568 Country of ref document: EP Kind code of ref document: A1 |