BIOMETRY WITH CHALLENGE RESPONSE PAIR MECHANISM

    公开(公告)号:US20240348436A1

    公开(公告)日:2024-10-17

    申请号:US18638412

    申请日:2024-04-17

    CPC classification number: H04L9/0869 H04L9/3231 H04L9/3271

    Abstract: Methods for the encoding an encryption key for secure storage are disclosed. The methods rely on the use of unclonable, one-way functions, such as images of biological objects that may be measured according to challenges to result in responses. A biometric print of a biological object is measured with a set of n challenges resulting in n responses. The responses are an ordered sequence, with each response having a fixed position in the sequence. A key is generated of bit length n. A subset of m responses in the full set of n responses is selected, where the selected responses correspond to positions of is in the key. The response subset is stored. The key is then used, and deleted. A party wishing to re-generate the key generates the same set of challenges, measures the same biological object with the challenges a second time, and generates a second set of n responses. Responses in the stored subset of m responses will match responses in the second set of n responses at certain positions in second set of n responses. These matching positions correspond to is in the key. The non-matching positions correspond to Os. Thus, comparison between the response sets recovers the key.

    PSEUDO-HOMOMORPHIC AUTHENTICATION OF USERS WITH BIOMETRY

    公开(公告)号:US20240214224A1

    公开(公告)日:2024-06-27

    申请号:US18397975

    申请日:2023-12-27

    CPC classification number: H04L9/3278 H04L9/3231 H04L9/3239

    Abstract: Methods for the generation and use of session keys for authentication of a user of a server device are disclosed. The methods use a biological objects of the user to generate responses to challenges. During enrollment, the server device receives a password, hashes it a first number of times, and sends the hash to the user. The user interprets the hash as a set of challenges for the biological object, applies the challenges, and stores the responses. During authentication, the server hashes the password a second number of times, less than the first number, and sends the hash to the user. The user iteratively applies second hash to the biological object, compares the responses to the stored responses, and if there is not a match, hashes the challenges again until there is a match. The number of hashes needed for a match is a session key or subkey.

Patent Agency Ranking