The expanding popularity of electronic commerce has increased the desire for secure electronic transactions and communications between remote parties. In particular, for most computer transactions and electronic contracts, there is no face-to-face acknowledgement of the identity of participating individuals and/or parties. With this in mind, institutions and persons desiring to utilize electronic commerce are faced with an issue of whether the person or party making a communication is truly who they claim to be.
In an attempt to receive some verification or indication of the identity of the person involved in the communication, the host system, such as financial business, or other electronic business, utilizes a method of authenticating a user. Generally, the identity of a user is authenticated with a password or similar access code. In particular, a user who wishes to make an electronic communication selects a password that preferably only he or she knows and registers the selected password with the host system or service provider. In other instances, the user is provided with a password by the host system. Typically, the password is a string of several numbers and/or letters.
When the user desires to communicate with the host system, the user provides the password to the host system over the communication network. The host system compares the password transmitted to the previously registered password, and if the two passwords match, the host system authorizes a user. If the passwords do not match, the user is not authorized and the transaction or communication is not completed or is cancelled. Once authorized, the user is free to make a financial transaction or electronic communication with the host system, and the host system generally assumes the user is the previously registered user.
The password, however, is often generated with several numbers and/or letters based on personal information, such as a telephone number, birth date, an ID number, etc. which may easily be discovered by others. In addition, if the user records the password to enable the user to later look up the password, the recorded password may be exposed to others. In still other situations, keystroke logging devices can be attached to a computer or communication device and are configured to record passwords and other information input to the computer by the user. An individual or party with access to the keystroke logging device subsequently accesses the device to determine passwords, transaction information, etc. Moreover, when the user submits his or her own password to the remote network server through a telephone line connection or other network communication connection for authentication, the password is also exposed to theft over the network communication lines. A stolen password can easily be used in future identity theft or other fraud. Namely, a non-user can utilize the user password to wrongfully pose as the user to complete transactions and/or communications with the host system.
In some instances, digital signatures have been used with electronic messages to provide a way for the sender of the message (i.e. the user) to electronically “sign” the message or transaction as a way of providing proof of the identity of the user and the authentication of the message. The digital signature system typically includes generation of a user private/public key pair including a user private key and a user public key. A user sends a message or requests a transaction using the private key. The sent message is only decryptable using the corresponding user public key from the user private/public key pair. As such, even if the public key is available to a wide number of individuals, a host system able to decrypt a message with the public key is generally provided with assurance that the message originated with the user associated with the corresponding private key.
However, use of a private key has problems similar to those associated with passwords described above. In particular, private key information can be stolen through keystroke logging devices, through network communication lines, or by theft of the private key information from a notepad, database, or other user object storing the private key. Once an individual other than the user has access to the private key, the individual is able to wrongfully pose as the user utilizing the private key to communicate or transact with the host system.
Some authentication systems have attempted to decrease theft or other misuse of passwords or private keys by utilizing biometrics in place of or in addition to passwords or private keys. However, in such systems, an initiated biometric signature or template is typically stored for later comparison to a biometric input of a user or other individual wishing to complete an electronic transaction or electronic communication. The biometrics are compared in a manner similar to passwords and if a match is found, the electronic transaction or communication is permitted.
However, storage of the biometric characteristic provides an opportunity for the electronic representation of the biometric characteristic to be stolen and for the particular user to be impersonated by an individual having a stolen electronic representation of the particular biometric characteristic. In such cases, this step is particularly troublesome as a user cannot simply cancel a previous biometric characteristic and replace it with another biometric characteristic. For example, if a particular fingerprint of a user is registered with a host system, and the electronic representation of that fingerprint is stolen, the user cannot simply cancel use of that fingerprint with the host system and create a new fingerprint for future communications since the fingerprint data is permanently associated with the fingers of the user and, thus, cannot be changed. In such cases, the repercussions of theft of the authentication data provides additional problems further frustrating a user whose identity has been compromised and the host systems attempting to verify the user's identity.
With the above in mind, a need exists for an identity verification device that provides additional safeguards against the theft or other wrongful discovery and misuse of passwords, private keys, biometric characteristics and/or other identifying information.
One aspect of the present invention provides a biometric identification device including a biometric sensor, an encryption factor, and a microprocessor. The biometric sensor is operable to sense a biometric characteristic from a user and to generate data representing the biometric characteristic. The microprocessor is coupled to the biometric sensor and is operable to generate a user key based on the data representing the biometric characteristic and the encryption factor.
Embodiments of the invention are better understood with reference to the following drawings. Elements of the drawings are not necessarily to scale relative to each other. Like reference numerals designate corresponding similar parts.
In the following Detailed Description, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. In this regard, any directional terminology is used with reference to the orientation of the Figure(s) being described. Because components of embodiments of the present invention can be positioned in a number of different orientations, the directional terminology is used for purposes of illustration and is in no way limiting. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. The following Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims.
In one embodiment, a biometric identification device includes a biometric sensor and an encryption factor. During registration of the biometric identification device, the biometric sensor senses a biometric characteristic of a particular user. The biometric characteristic is employed in combination with the encryption factor to generate a private/public key pair. The public key, which is generated by the biometric identification device and a device identification code, is sent to the host system for use in future communications.
Communications made after registration of the biometric identification device involve utilizing the biometric sensor to collect a biometric characteristic from the bearer of the biometric identification device. The collected biometric characteristic is used in combination with the encryption factor to regenerate at least the user private key. The user private key is used to encrypt communications sent from the biometric identification device to the host system. If the user public key can be used to decrypt the verification or other message, then the user is verified (i.e., authenticated) as the user registered with the biometric identification device. The communication between the user and the host system can then be completed in a relatively secure manner. Additionally, the host system is provided with a more reliable method of verifying the identity of the user.
In one embodiment, the private key and data representing the biometric characteristic are not generally stored in a memory of the biometric identification device or other system component once a session of use is completed. Therefore, the private key or the data representing the biometric characteristic cannot easily be pirated or otherwise abused by third parties, such as thieves. Moreover, a lost or stolen biometric identification device can be replaced, where the new biometric identification device is registered with the host system to use the same user biometric characteristic with a different encryption factor to produce a different private/public key pair.
Communication System
Turning to the figures,
In one embodiment, during use, biometric identification device 6 sends an encrypted verification message to host system 8, which is configured to attempt to decrypt the received verification message using a user public key. If the attempt is successful, the bearer of biometric identification device 6 is verified as a registered user and subsequent communications occur between the user and host system 8 within the current communication session. For each future communication session completed between the user and host system 8, the user is re-verified with a different verification message. In one embodiment, the verification message is a symmetrical key and communications occurring after user verification are encrypted using the symmetrical key, as will be further described below.
In one embodiment, the verification message is encrypted using a user private/public key pair (i.e., an asymmetrical key pair). The biometric identification device 6 is configured to repeatedly generate the same user private/public key pair based upon a single biometric characteristic of the user. In contrast, different biometric characteristics, such as biometric characteristics of other individuals, will generate different user private/public key pairs. In one embodiment, the user private/public key pair generation and subsequent use are performed using the RSA algorithm method originated by Rivest, Shamir, and Adleman in 1977, for example in a manner consistent with the RSA Cryptology Standard (Jun. 14, 2002), provided by RSA Security, Inc. Other suitable cryptology algorithms can be employed to generate and utilize the user private/public key pair. In one embodiment, other encryption schemes are used as an alternative to the user private/public key pair encryption.
In one embodiment, the user public key is stored in host system 8. However, neither the user private key nor data representing the user biometric characteristic is generally stored in any portion of communication system 4 after being used in a communication session. In such embodiments, theft of data representing the biometric characteristic and the user private key is decreased, thereby providing additional assurances to host system 8 that the subsequent communication is with a verified user. In one embodiment, the verification message is a symmetrical key, and a different symmetrical key is utilized in each communication session. The use of different symmetrical keys for each communication session also decreases the incentive for theft of the symmetrical key used in one session for unauthorized use in a subsequent session to impersonate the rightful user.
Device interface 14 is configured to communicate with biometric identification device 12 and host system 16. More specifically, device interface 14 is configured to either wirelessly or directly connect with biometric identification device 12. In the case of a wireless connection between biometric identification device 12 and device interface 14, any wireless communication between biometric identification device 12 and device interface 14 may be further encrypted to enhance security of such communication. In exemplary wired and wireless embodiments, device interface 14 includes at least one of a conductive micromodule, a universal serial bus (USB) port, a serial RS-232 port, a parallel port, an infrared (IR) port, a radio frequency (RF) port such as Bluetooth, an IEEE-1394 port, a network port such as a wired Ethernet or wireless Ethernet connector, and any other suitable connector. In one embodiment, device interface 14 additionally includes an input mechanism and/or display to communicate directly with user 18 rather than via biometric identification device 12.
In one embodiment, device interface 14 is in communication with host system 16 via a communication link. In this embodiment, device interface 14 functions as a conduit for communication between user 18 and host system 16. In one example, the communication link includes a network 20. Network 20 as used herein is used to define and include any network connection such as an Internet communication link, an intranet communication link, or similar high-speed communication link. While the following description may generally refer to network 20 as being or including an Internet network, it is understood that the use of other network communication links is within the scope of the present invention. In addition, network 20 may be accessed wirelessly or via a direct wired contact. In another example, device interface 14 is part of host system 16.
Host system 16 is configured to securely communicate with user 18 via device interface 14 and biometric identification device 12. In one example, host system 16 is one of a financial institution, such as a bank, credit bureau, credit service, etc., a contract system, a system securing or facilitating secure communication between multiple users, an e-commerce server, an e-business, etc. In one embodiment, host system 16 includes a processor 22 and a memory 24. Processor 22 is configured to further process, encrypt, and decrypt communications being sent to or received from biometric identification device 12. In one embodiment, processor 22 is configured to be in at least periodic communication with memory 24 to access items in memory 24 to facilitate encryption and decryption of messages received from biometric identification device 12. In other embodiments, processor 22 is configured to autonomously perform encryption and decryption.
In this respect, data used in user registration (for example, a user public key) is stored in memory 24. In an exemplary embodiment, memory 24 includes a type of random access memory (RAM), a type of read-only memory (ROM), a type of non-volatile memory, and/or other suitable memory type. In one embodiment, memory 24 stores one or more user public keys 26 and a host system private key 28. The user public keys 26 stored in host system 16 are each part of a user private/public key pair. Each user public key 26 is configured to facilitate decryption of messages encrypted with the corresponding user private key. In one embodiment, each user public key 26 is stored in host system 16 to correspond with an identification code of the respective biometric identification device 12.
In one embodiment, which utilizes double encryption (i.e. encryption to verify the identity of both user 18 and host system 16), a host system private key 28 is also stored in memory 24. Host system private key 28 is assigned to a particular host system 16 and corresponds to a host system private/public key pair. The host system public key is accessible by biometric identification device 12, and therefore, biometric identification device 12 can use the host system public key to decrypt received communications that host system 16 previously encrypted using host system private key 28. Similarly, host system 16 can use host system private key 28 to decrypt communications that biometric identification device 12 previously encrypted using the host system public key.
Biometric Identification Device
In one embodiment, biometric identification device includes a biometric sensor 30, a microprocessor 32, an encryption factor 34, and a communication interface 36 configured to interface with device interface 14 (illustrated in
Biometric sensor 30 is any sensor configured to capture a biometric characteristic from the user. For example, in one embodiment, biometric sensor 30 is configured to capture a biometric characteristic, such as a fingerprint, an iris image, a retina image, a voice print, a facial image, a DNA sample, a palm print, etc., from the user. The biometric characteristic is a characteristic that differentiates one individual from the next. Embodiments of biometric sensor 30 include a fingerprint scanner, a retina scanner, an audio recorder, a camera, or other suitable biometric sensor.
One example of biometric sensor 30 is an array of MEMS switches or any other suitable fingerprint sensor operable to capture a fingerprint of the user. In one embodiment, the array of switches includes 256×256 switches configured to sense the ridges of the user fingerprint. The fingerprint sensor outputs a binary signal for each of the switches indicating whether each switch was pressed by contact with a ridge of the user's fingertip. The binary output is forwarded to microprocessor 32 for processing into a form useable as a biometric characteristic. Other fingerprint sensors may also be used.
Another embodiment of a biometric sensor 30 is a camera that captures image data representing an eye of the user. More particularly, biometric sensor 30 captures image data representing the iris and/or the retina of the eye. The image data is forwarded to microprocessor 32 for processing into a form useable as a biometric characteristic. Other examples of suitable biometric sensors 30 are audio recorders, retinal or iris scanners, facial recognition sensors, etc.
Biometric sensor 30 is coupled to microprocessor 32. Microprocessor 32 is additionally configured to access encryption factor 34. In one embodiment, microprocessor 32 is configured to further process the sensed biometric characteristic into a corresponding representation in a form useable as a biometric characteristic, such as a digital representation, an electronic representation, etc. Microprocessor 32 may apply one or more of any number of algorithms to convert data representing a fingerprint, retinal or iris scan, etc. into a simplified digital representation of the biometric characteristic. For example, in one embodiment, microprocessor 32 is configured to detect points of bifurcation and/or trifurcation in a user fingerprint captured by biometric sensor 30 and to generate data representing the pattern formed between the detected points as the biometric characteristic. The pattern data is simplified as compared to the data from which it is generated.
Encryption factor 34 is accessible by microprocessor 32 and is configured to be processed with data representing the biometric characteristic to generate a user key, such as a user private key. In exemplary embodiments, encryption factor 34 is stored in a memory of biometric identification device 12 that includes a type of RAM, a type of ROM, at type of a non-volatile memory, and/or other suitable memory type. In one embodiment, the memory additionally stores software, firmware, or other information needed for the general functioning of biometric identification device 12.
Communication interface 36 is coupled with microprocessor 32 and is configured to facilitate communications between biometric identification device 12 and device interface 14. In particular, communication interface 36 is operable to forward data from microprocessor to device interface 14 and vice versa.
At 40,
Communication interface 36 is configured to communicate with device interface 14 (illustrated in
In one embodiment, memory 46 stores at least one host system public key 52, encryption factor 34, and a device identification code 56. Host system public keys 52 are generally publicly available keys. Each host system public key 52 is associated with a particular host system and being part of a host system private/public key pair. For example, in one embodiment in which biometric identification device 12 is configured for communication with at least one financial institution host system 16 (i.e., one or more banks, credit unions, credit institutions, credit bureaus, etc.), a host system public key 52 is stored in memory 46 for each financial institution. As such, biometric identification device 12 identifies which institution it is communicating with and uses the host system public key 52 corresponding to the identified institution. In one embodiment where biometric identification device 12 is configured for communicating with a single host system 16, only one host system public key 52 is stored in memory 46.
Memory 46 additionally stores an encryption factor 34, which is similar to encryption factor 34 described above with respect to
In one embodiment, once encryption factor 34 is assigned to or created within biometric identification device 12, encryption factor 34 is static for the life of biometric identification device 12. In another embodiment, encryption factor 34 of biometric identification device 12 is time dependent. One example of a time dependent encryption factor 34 is a pseudo-random encryption factor generated using a predetermined algorithm stored in biometric identification device 12 and a time value. In this example, the same predetermined algorithm is stored in host system 16, and biometric identification device 12 includes a clock synchronized with a clock in communication with host system 16.
In one embodiment, device identification code 56 is a code, such as a number, assigned to biometric identification device 12 during manufacturing. Device identification code 56 is configured to differentiate the biometric identification device 12 from other biometric identification devices. Accordingly, no two biometric identification devices 12 have the same device identification code 56. In one example, device identification code 56 is systematically assigned to biometric device 12 as a serial number of biometric device 12. In another example, device identification code 56 is randomly assigned to biometric device 12 during manufacturing.
In one embodiment, biometric identification device 12 additionally includes a symmetrical key generator 50. In one example, symmetrical key generator 50 is any device capable of generating symmetrical keys for individual communication sessions between biometric identification device 12 and host system 16. Typically, symmetrical key generator 50 is a software routine run by microprocessor 32 to generate symmetrical keys for communication sessions with host system 16.
A symmetrical key is generally any key that can be used to both encrypt and decrypt information during an encrypted communication session between parties. In particular, a message to be sent from a sender to the recipient is processed with the symmetrical key to provide an encrypted message that is sent to the recipient. The recipient uses the same symmetrical key to decrypt the message. In particular, the recipient processes the message with the symmetrical key to produce a decrypted message. In general, symmetrical keys are considerably less computationally intensive than private/public key encryption. In one embodiment, symmetrical key generator 50 is a random number generator.
In one example, fingerprint sensor 62 is positioned upon the surface of biometric identification smartcard 60 spaced from the position of communication interface 36. During use, user 18 (illustrated in
General Communication Method
Referring to
Following registration at 82, routine communication subsequently occurs beginning at 84. At 84, the host system receives an encrypted verification message and the identification code from the user. At 86, the host system uses the received identification code to determine the user key based on the previously-registered linked pair. The host system uses the user key to decrypt the encrypted verification message. Then at 88, the host system determines whether the decryption performed at 86 was successful in decrypting the encrypted verification message. If decryption is determined to have been successful, the user is authenticated as the registered user. Once the user is authenticated, the host system continues to communicate with the user.
User Key Pair Generation
As generally described above with respect to method 70 illustrated in
For a given encryption factor 34, only the particular biometric characteristic 90 produces a particular user key pair 91. Conversely, different biometric characteristics, such as the fingerprint of a first user and the fingerprint of a second user, each produce a different user private/public key pair 91. Moreover, user private/public key pair 91 is generated without subjecting data representing the biometric characteristic 90 to long term storage within any memory. In this manner, no representation of biometric characteristic 90 is stored in a long term memory, thereby decreasing the possibility of theft and wrongful use of such representation of biometric characteristic 90.
User private/public key pair 91 includes a user private key 92 and a user public key 26. Messages encrypted with user private key 92 can generally only be decrypted with user public key 26 and vice versa. In general, user private key 92 is kept secret while user public key 26 may be published or otherwise disseminated to one or more parties. In one embodiment, user public key 26 and a corresponding device identification code 56 (illustrated in
During subsequent use, biometric identification device 12 sends an encrypted message with the device identification code 56 to a recipient. The message recipient uses the device identification code 56 to look up the corresponding user public key 26, which was previously registered with biometric identification code 56. A received message that can be decrypted with user public key 26 provides the message recipient with assurance that the message was sent by the user corresponding with user public key 26 (i.e., only by the user with access to a corresponding user private key 92). Similarly, a host system sending a message encrypted with user public key 26 is provided with assurances that the message will only be readable by a user corresponding with user public key 26.
In one embodiment, a host system, such as host system 16 (illustrated in
Messages can be doubly-encrypted using the private key of the sender (i.e., one of the user and the host system) and the public key of the recipient (i.e., the other of the user and the host system). Doubly-encrypted messages can be decrypted using the corresponding public key of the sender and the private key of the recipient. Such doubly-encrypted messages provide the sender with the assurance that only the recipient corresponding with the recipient private/public key pair will be able to decrypt the message and also provide the recipient with the assurance that only the sender corresponding to the sender private/public key pair could have sent the message.
Establishing a Symmetrical Key for a Communication Session
In one embodiment, biometric identification device 40 (illustrated in
Data representing biometric characteristic 90 of the user and encryption factor 34 stored in memory 46 of biometric identification device 40 are processed together to generate user private key 92 in a manner similar to that described above with reference to
In the example illustrated in
Once symmetrical key 93 is decrypted by host system 16, host system 16 and biometric identification device 40 can communicate in an encrypted manner using only symmetrical key 93. Using the symmetrical key instead of the private/public user and host key pairs decreases the computational intensity of the communication, thereby increasing the speed of the communication and/or decreasing the resources needed for biometric identification device 12 and/or host system 16.
Method of Communication
During subsequent routine use, at 104, biometric identification device 12 is used to communicate with a host system 16. More specifically, the identity of user 18 is verified by host system 16, and biometric identification device 12 generates a symmetrical key. Biometric identification device 12 securely sends the symmetrical key to host system 16 for use during the current communication session.
At 106, the symmetrical key is used for encryption and decryption during a single communication session between user 18 and host system 16. At 108, the communication session closes and the symmetrical key is deleted from the memories of all participating parties. In one embodiment, during a subsequent communication session involving routine use of biometric identification device 12, operations 104, 106, and 108 are repeated while operation 102 is not generally repeated after the initial registration of user 18.
Registration
Data is collected and generated in operations 112, 114, and 116 for subsequent forwarding to host system 16. More particularly, at 112, device interface 14 reads a device identification code from biometric identification device 12. At 114, user 18 interacts with a biometric sensor 30 of biometric identification device 12, and biometric sensor 30 senses the biometric characteristic of user 18. The biometric characteristic is processed to produce data representing the biometric characteristic. At 116, microprocessor 32 of biometric identification device 12 encrypts the data representing the biometric characteristic with the encryption factor 34 to generate a user private/public key pair in a manner similar to that described above with reference to
In one embodiment, at 118, the user public key generated at 116 and the device identification code read at 112 are transmitted from biometric identification device 12 to host system 16 via device interface 14 and network 20. At 120, host system 16 stores the user public key linked to the corresponding device identification code 56 in memory 24 for later use as a linked user public key/device identification code pair for the user.
In another embodiment, at 118, the user public key and the corresponding device identification code are published and/or otherwise made available to host system 16 and, in some instances, other host systems or entities. In one example, the registered user public key/device identification code pair is printed in one of a book, magazine, e-mail, etc. that is distributed to at least one host system 16. Host system 16 accesses the published information and stores the registered user public key/device identification code pair in memory 24. Any host system 16 having the registered public key/device identification code pair will be able to at least singly decrypt transmissions received from a particular user using biometric identification device 12.
User Verification During Routine Use
More specifically, at 130, biometric identification device 12 is placed in communication with device interface 14 as described above. At 134, biometric identification device 12 senses a biometric characteristic of user 18 and captures data representing the sensed biometric characteristic. At 136, biometric identification device 12 encrypts the data representing the biometric characteristic with an encryption factor to generate, or more precisely, to regenerate, a user private key as described above with reference to
At 138, biometric identification device 12 generates a symmetrical key for use in encrypting communications between user 18 and host system 16 during the up-coming communication session. Process components 134 and 136 can be performed any one of before, after, or simultaneously with process component 138. At 140, biometric identification device 12 uses the user private key to encrypt the symmetrical key.
At 142, biometric identification device 12 imports host system identity information from host system 16. The host system identity information informs biometric identification device 12 as to the identity of the host system communicating with biometric identification device 12. Once host system 16 is identified to biometric identification device 12, biometric identification device 12 determines which host system public key corresponds to the particular host system 16 with which biometric identification device 12 is currently communicating. In one embodiment in which biometric identification device 12 is only configured to communicate with a single host system 16, operation 142 may be eliminated.
At 144, biometric identification device 12 encrypts the symmetric key a second time with the host system public key 52 identified in response to the host system identity information received at 142. This produces a doubly-encrypted symmetrical key. The order in which operations 134, 136, 138, 140, 142, and 144 are completed may be varied in any suitable manner capable of producing the doubly-encrypted symmetrical key. In one embodiment, the order of performing operations 134, 136, 138, 140, 142, and 144 may be partially determined based on the process represented by the schematic illustrations of
At 146, the doubly-encrypted symmetrical key and a device identification code are sent from biometric identification device 12 to device interface 14. At 148, device interface 14 forwards the doubly-encrypted symmetrical key and an encrypted device identification code 56 to host system 16 via network 20.
In an optional embodiment, the clear symmetrical key is also provided to device interface 14 for use in encrypted communication between device interface 14 and host system 16. This occurs in embodiments in which user 18 can input data directly to device interface 14 to be sent to host system 16. In this manner, all communications do not need to be routed through biometric identification device 12 for encryption before being sent to host system 16. In another embodiment, device interface 14 is not generally able to encrypt and/or decrypt messages using the symmetrical key, and all communications from the device interface 14 to host system 16 are routed through biometric identification device 12 for encryption/decryption.
At 150, host system 16 partially decrypts the doubly-encrypted symmetrical key with the host system private key 28 read from memory 24. At 152, processor 22 of host system 16 decrypts the now singly-encrypted symmetrical key with the stored user public key 26 linked in memory 24 to the device identification code 56 received at 148. If at 154, the decryption of singly-encrypted symmetrical key with the stored user public key 26 is determined to be successful, then at 158, the communication session between user 18 and host system 16 is continued at 106 (illustrated in
In one embodiment, host system 16 may not know whether decryption the message was successful at 154 until an attempt is made to send a first reply message back to biometric identification device 12. For example, in one embodiment, host system 16 receives a doubly-encrypted symmetrical key sent by a user via biometric identification device 12 where the communicating user is not the user originally registered with the device identification code of biometric identification device 12. Host system 16 decrypts the doubly-encrypted symmetrical key with the user public key registered with the device identification code. Since a non-registered user encrypted the message, the registered user public key will improperly decrypt the encrypted message to produce an incorrect symmetrical key.
The incorrect symmetrical key does not match the symmetrical key generated by biometric identification device 12 for the current communication session. Without knowledge that the incorrect symmetrical key is not the symmetrical key of the current communication session, host system 16 sends a reply message to the communicating user encrypted with the incorrect symmetrical key. Since the host system 16 is not using the same symmetrical key as biometric identification device 12, biometric identification device 12 will not be able to decrypt the reply message and will therefore disable the communication session. In one example, host system 16 will only realize that the user was not verified when the biometric identification device disables the communication session. In one embodiment, host system 16 receives at least a preliminary indication of successful decryption before sending any reply message to biometric identification device 12. In one embodiment, when, at 154, it is determined that the decryption of the singly-encrypted symmetrical key was unsuccessful, biometric identification device 12 notifies host system 16 that the communication session is being disabled.
When a communication session is disabled host system 16 assumes that the user private key used by biometric identification device 12 to encrypt the symmetrical key likely was not the user private key linked to the user public key stored during registration. Following that logic, an incorrect user private key is likely to be the result of the biometric identification device 12 using a sensed biometric characteristic to generate the user private key that is not the same biometric characteristic sensed during registration. Therefore, host system 16 determines that the current bearer of biometric identification device 12 is not the rightful owner of biometric identification device 12. Consequently, at 156, host system 16 terminates the communication session with the current bearer of biometric identification device 12 and does not allow the current bearer of biometric identification device 12 to make any further communications with host system 16.
Although the method is described above as doubly-encrypting a symmetrical key for use throughout the remainder of the communication session between user 18 and host system 16, in other embodiments, no symmetrical key is generated. In these embodiments, the messages sent between user 18 and host system 16 are doubly-encrypted using the user private/public key pair and the host system private/public key pair in a similar manner as described above for doubly-encrypting a symmetrical key. Host system 16 is configured to send messages to biometric identification device 12 that are doubly-encrypted using the host system private key and the user public key, and the biometric identification device is configured to receive and decrypt received doubly-encrypted messages using the host system public key and the user private key. In one example, the symmetrical key or other messages are only singly-encrypted.
Another Embodiment of a Communication System
In one embodiment, ATM 202 includes an output device 206, device interface 14, a processor 208, a memory 210, an input device 212, and a dispenser 214. Output device 206 is any suitable device for conveying audio, visual, and/or audiovisual messages to user 18. In one example, display 206 includes a display screen, a speaker, etc. Device interface 14 is as described above. In one embodiment, in which biometric identification device 12 is a smart card, device interface 14 (illustrated in
Processor 208 is any processor suitable for processing data to facilitate communication and transactions between user 18 and financial institution 204. Processor 208 is coupled to each of the other components of ATM 202 and facilitates interactions between the other components as well as generally controlling the operation of each of the other components. Input device 212 is any device providing a user interface facilitating user 18 communication with ATM 202.
Financial institution 204 is a particular host system 16. In one embodiment, financial institution 204 is any host system having a financial basis such as a bank, credit bureau, etc. In one embodiment, financial institution 204 is replaced with any other host system 16. Financial institution 204 includes processor 22 and memory 24 that stores a financial institution private key 216, which is similar to host system private key 28 (illustrated in
Communication system 200 functions in much the same way as communication system 10. However, communication system 200 is specifically adapted for use in remote financial transactions or financial account access by user 18. In particular, once user 18 is verified as the true user of biometric identification device 12, communications regarding the financial transaction or financial account are transmitted in an encrypted format using the symmetrical key. In another embodiment, communications regarding the financial transaction or financial account are transmitted in a double encrypted format using the user private/public key pair and the host system private/public key pair.
Since alternate and/or equivalent implementations may be substituted for the embodiments described herein without departing from the scope of the present invention, it is intended that this invention be limited only by the claims and the equivalents thereof.