The present disclosure relates generally to virtualization techniques. In particular, this disclosure relates to providing authentication of a user using a virtual machine integrated with a centralized repository.
Traditional biometric techniques do not scale well to multi-party industries, such as airlines. Such industries involve a plurality of machines (e.g., provided by an airline, by an airport, by security vendors, by government agencies, and others), and these machines are often configured according to a variety of proprietary formats.
Moreover, although the machines may be updated to use the proprietary formats of other machines, many of the actors involved (e.g., provided by an airline, by an airport, by security vendors, by government agencies, and others) do not desire to share documentation on their proprietary formats. Indeed, releasing details of the proprietary formats may involve security risks. For example, if an unauthorized party intercepts details of the proprietary format used for airline ticket information, the unauthorized party may counterfeit airline tickets.
A need therefore exists for a system that can integrate these machines without the need for custom-built solutions, and can perform integration while preserving security of any proprietary formats involved. As disclosed herein, systems and methods for machine virtualization can provide techniques for integration and authentication that overcome the deficiencies of existing approaches.
Embodiments of the present disclosure describe systems and methods for providing a virtual machine with connectivity to an authentication or identity verification service. This virtual machine may provide a secure mechanism for integration of different machines using different formats in an industry, such as airlines. In addition, the virtual machine may allow for actors to keep the details of their formats confidential.
According to particular modes of realization:
In some examples, the input comprises at least one biometric indicator of a user.
In some examples, the output comprises a verification of the at least one biometric indicator.
In some examples, the verification further includes data regarding a scheduled flight associated with the user.
In some examples, the verification further includes data regarding a scheduled event associated with the user.
In some examples, the verification further includes data regarding a scheduled academic examination associated with the user.
In some examples, the output is formatted in accordance with a format associated with the workstation.
In some examples, the format associated with the workstation comprises an Aircraft Electronics Association format.
In some examples, the workstation comprises a server associated with an airline.
In some examples, the output is provided to the workstation by passing the output to the electronic device that forwards the output to the workstation.
In some examples, providing output further comprises: transmitting the input to a remotely hosted identity service, wherein the identity service is configured to compare the input with stored data; in response, receiving an output from the identity service, wherein the output is based on the comparison; and reformatting the output from the identity service for output to the workstation using the virtual machine.
In some examples, the input comprises at least one biometric indicator of a user, and the at least one processor is configured to reformat the input before transmitting in accordance with a format associated with the identity service.
According to an embodiment, the following is provided:
In some examples, the at least one sensor comprises a camera and the biometric indicator comprises at least one image of a portion of a face of the user.
In some examples, the at least one sensor comprises a fingerprint scanner and the biometric indicator comprises at least a portion of a fingerprint of the user.
In some examples, the at least one sensor comprises an eye tracker and the biometric indicator comprises at least a portion of a scan of an eye of the user.
In some examples, the at least one sensor comprises a barcode scanner and the biometric indicator comprises information related to the user encoded in a barcode.
In some examples, the at least one network comprises a private computer network.
In some examples, the defined format comprises an Aircraft Electronics Association format.
In some examples, the workstation comprises a server associated with an airline.
The attached drawings illustrate the invention:
A variety of peripheral devices may be involved in authenticating a user. For example, in an airport or other transportation hub, one peripheral, such as a biometric device or other device linked to a government repository, may verify a person against a customs database, a national security database, or the like. Moreover, a different peripheral, such as a barcode scanner or other device linked to an airline database or the like, may verify a person against an airline passenger list or the like. Other peripherals may verify information related the person against one or more databases.
However, such devices are generally not integrated with each other or even with the database against which the person is being verified and they are not integrated with other verification systems, resulting in numerous redundancies and an inability to use an integrated verification system, e.g., using biometrics. Moreover, these devices often communicate using proprietary formats and verify against confidential information in the databases. Thus, integration is not readily achievable.
The envisioned systems and methods can provide integration of such devices into an integrated system, e.g., based on biometrics or other authenticating information. Moreover, embodiments of the present disclosure may also cooperate using the proprietary formats and the confidential databases without compromising security thereof. For example, the envisioned systems and methods can provide a virtual machine. The systems and methods can provide an application programming interface (API) to an electronic device and boot a virtual machine configured to emulate a type of electronic device (e.g., a fingerprint reader, a barcode scanner, a camera, or the like) based on a workstation to which the electronic device is connected (e.g., a server associated with an airline). The systems and methods may further receive input (e.g., at least one biometric indicator of a user), using the API, from the electronic device and provide output (e.g., a verification of the at least one biometric indicator) to the workstation using the virtual machine. In addition, the envisioned systems and methods can use a virtual machine for providing connectivity to a user authentication or identity verification service. For example, the envisioned systems may connect to a remotely hosted identity-as-a-service (IDaaS). The systems and methods can connect, via at least one network and through an application programming interface (API), to a remote server and provide to the remote server, via the at least one network and through the API, a captured biometric indicator (e.g., from a camera, a fingerprint scanner, an eye tracker, a barcode scanner, or the like). The systems and methods may further receive, from a virtual machine executed on the remote server, at least one packet in a defined format based on the biometric indicator and forward the received at least one packet to a workstation communicably connected to the electronic device.
The envisioned systems and methods improve upon existing authentication systems, e.g., those used in airports or other transportation hubs. For example, the envisioned systems and methods can provide integration of different systems, such as those provided by a government, those provided by an airline, those provided by an airport, and the like, into a single, seamless system. Also, the integration does not require actors to reveal proprietary data formats or confidential databases. In contrast, existing systems lack this security provided by the envisioned systems and methods. These improvements are enabled, at least in part, by the specific architecture disclosed herein.
As used herein, the term “biometric” may refer to any information inherently unique (or quasi-unique) to a person. For example, a biometric may include a fingerprint, an eye scan, a facial recognition signature, a handwriting analysis, or the like. A “biometric” may be contrasted with any information artificially unique (or quasi-unique) to a person, e.g., a national identification number, a reservation number, or the like.
Electronic device 111 can be configured to connect to an application programming interface (API) provided by remote server 101. For example, virtual machine 105b may create the API and provide the same through network server 105a. Virtual machine 105b may be configured to emulate a driver for electronic device 111.
Electronic device 111 may provide a biometric indicator or other input data to virtual machine 105b. In response, virtual machine 105b can be configured to communicate with customs server 107 to verify the received biometric indicator. Customs server 107 may comprise any computing device storing or accessing a database against which biometric or other authenticating information may be verified, e.g., device 600 of
Customs server 107 can then return confirmation to virtual machine 105b, which can in turn return confirmation to electronic device 111. Additionally or alternatively, customs server 107 may communicate the confirmation to a workstation associated either directly or indirectly with electronic device 111. For example, the workstation may comprise a server (e.g., device 600 of
Virtual machine 105b may use a closed-source library to convert the received biometric indicator to an appropriate format for use with customs server 107. For example, customs server 107 may require requests for confirmation in a proprietary format and, accordingly, by using a closed-source black-box, virtual machine 105b may ensure that the proprietary format is not revealed to the operator of virtual machine 105b. Additionally or alternatively, the operator of virtual machine 105b may receive specifications for the proprietary form and use the specifications to convert the received biometric indicator to an appropriate format for use with customs server 107.
As depicted in
As further depicted in
In one example, the cloud platform may transmit input (e.g., from biometric devices or any other electronic device) to a remotely hosted identity service (e.g., an IDaaS), wherein the identity service is configured to compare the input with stored data. For example, the identity service may compare the input with stored biometric data or with any other identification data. In response, the cloud platform may receive an output from the identity service, wherein the output is based on the comparison. For example, the identity service may use an exact match for comparison or a fuzzy match. In using a fuzzy match, the identity service may require a matching percentage or other matching score between the input and the stored data to exceed a threshold (e.g., at least 60% similar, 70% similar, or the like). Accordingly, the output may indicate if a match was confirmed. Additionally, in some embodiments, the output may indicate the degree of match, as described above. Moreover, as discussed above, the cloud platform may reformat the output from the identity service for output to the workstation using the virtual machine.
In
As further depicted in
The departure control system may therefore register the passenger on a customs list, e.g., using an Advanced Passenger Information System (APIS) quick query (AQQ). The list may be accessible using a virtual private client (VPC) that may securely access the customs list.
Second, a passenger may verify her identity during travel by provided biometric information to a camera, boarding gate biometric reader, or other biometric peripheral. The peripheral may communicate the information to an API of an application server (e.g., operating a virtual machine as described above with respect to remote server 101 of
In response, the virtual machine on the application server may verify the biometric information against the customs list, e.g., by securely sending the information to a VPC having access to the customs list. Accordingly, the biometric information may be verified without directly exposing either the information or an access port to the customs list. Moreover, as explained with respect to virtual machine 105b of
The system can be configured to provide an application programming interface (API) to an electronic device in step 401. For example, as explained above with respect to
In some embodiments, the electronic device may comprise a biometric peripheral. For example, the electronic device may comprise a camera, a fingerprint reader, an eye tracker, or the like. Additionally or alternatively, the electronic device may comprise a barcode reader, a QR code scanner, or the like.
After step 401, the system can be configured to boot a virtual machine configured to emulate a type of electronic device based on a workstation to which the electronic device is connected in step 403. For example, the workstation may comprise a server associated with an airline. The type of electronic device may comprise a particular model or the like of an electronic device. Accordingly, the virtual machine may emulate a particular model of a fingerprint reader or the like but open an API to a fingerprint reader that is a different model. Accordingly, the fingerprint reader may operate as usual but appear to any device connected to the virtual machine as a different fingerprint reader.
After step 403, the system can be configured to receive input, using the API, from the electronic device in step 405. For example, the input may comprise at least one biometric indicator of a user.
After step 405, the system can be configured to provide output to the workstation using the virtual machine in step 407. For example, the output may comprise a verification of the at least one biometric indicator. Furthermore, the output may be formatted in accordance with a format associated with the workstation, e.g., an Aircraft Electronics Association format.
In some embodiments, the verification may further include data regarding a scheduled flight associated with the user. For example, a flight number, a time of departure, a gate of departure, or the like may be encoded into the output based on the format. Additionally or alternatively, the verification may further include data regarding a scheduled event associated with the user. For example, an event time, an event location, or the like may be encoded into the output based on the format. Additionally or alternatively, the verification may further include data regarding a scheduled academic examination (“exam”) associated with the user. For example, an exam time, an exam location, or the like may be encoded into the output based on the format. Accordingly, although described with reference to airports, any other system relying on biometric information to verify a user, such as an exam system, an event registration (or ticketing) system, or the like, may employ the virtualization systems herein to seamlessly integrate different peripherals.
Method 400 may further include additional steps not shown in
The system can be configured to connect, via at least one network and through an application programming interface (API), to a remote server in step 501. For example, as explained above with reference to
After step 501, the system can be configured to provide to the remote server, via the at least one network and through the API, an indicator from at least one sensor configured to capture a biometric indicator of the user in step 503. For example, as explained with respect to
In some embodiments, the electronic device may comprise a biometric peripheral. For example, the electronic device may comprise a camera, a fingerprint reader, an eye tracker, or the like. Additionally or alternatively, the electronic device may comprise a barcode reader, a QR code scanner, or the like.
After step 503, the system can be configured to receive, from a virtual machine executed on the remote server, at least one packet in a defined format based on the biometric indicator in step 505. For example, the defined format may comprise an Aircraft Electronics Association format. Moreover, the system may use a proprietary library to perform the formatting, thus preserving confidentiality of the format itself.
After step 505, the system can be configured to forward the received at least one packet to a workstation communicably connected to the electronic device in step 507. For example, the workstation may comprise a server associated with an airline.
Method 500 may omit step 507 in embodiments where the virtual machine communicates directly with the workstation.
In some embodiments, method 400 can be provided by a remote sever (e.g., remote server 101 of
The preceding disclosure describes embodiments of a system for providing a virtual machine and authenticating a user using a remote authentication or identity verification service via a virtual machine. Such a system can generally be used to integrate database services with biometric devices in an airport environment as described in
As further shown in
Moreover, the remote server may manage a virtual machine for the electronic device. Accordingly, as depicted in
To properly handle the response from the remote identity service, the virtual workstation may forward the message from the remote identity service to a boarding service (“board pax”). Accordingly, another service that uses the electronic device (such as a departure control system (DCS), a reservation system (RES), or the like) may receive the message from the remote identity service. The virtual workstation may re-encode the message for proper processing by the service using the electronic device and/or for correct synchronization (such as passenger name record (PNR) synchronization) across relevant services.
Finally, once any services using the Erding_DC_private data structure have updated to reflect the message from the AWS_public data structure, the virtual machine may receive a notification confirming the same. In some embodiments, as further depicted in
In some embodiments, as further shown in
Number | Date | Country | Kind |
---|---|---|---|
1911299 | Oct 2019 | FR | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2020/077942 | 10/6/2020 | WO |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2021/069411 | 4/15/2021 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
8793117 | Varshney | Jul 2014 | B1 |
10360051 | Authement | Jul 2019 | B2 |
20030208748 | Levin | Nov 2003 | A1 |
20050246453 | Erlingsson | Nov 2005 | A1 |
20080302870 | Berini | Dec 2008 | A1 |
20120013547 | Tsirkin et al. | Jan 2012 | A1 |
20120314018 | Wengrovitz et al. | Dec 2012 | A1 |
20150066342 | Garzella | Mar 2015 | A1 |
20160300414 | Lambert et al. | Oct 2016 | A1 |
20170039037 | Howett | Feb 2017 | A1 |
20180314563 | Shimura et al. | Nov 2018 | A1 |
20180337907 | Bhansali | Nov 2018 | A1 |
20190102407 | Young | Apr 2019 | A1 |
20190197220 | Anderson | Jun 2019 | A1 |
20190362398 | Greenberger | Nov 2019 | A1 |
20200250571 | Almasan | Aug 2020 | A1 |
20210014683 | Obaidi | Jan 2021 | A1 |
20210117524 | McKell-Redwood | Apr 2021 | A1 |
20220067147 | Schmid | Mar 2022 | A1 |
Number | Date | Country |
---|---|---|
2011215688 | Oct 2011 | JP |
2017535833 | Nov 2017 | JP |
2018185676 | Nov 2018 | JP |
2015071325 | May 2015 | WO |
Entry |
---|
PCT International Search Report, Jan. 11, 2021 re PCT International Patent Application No. PCT/EP2020/077942. |
PCT Written Opinion of the International Searching Authority, Jan. 11, 2021 re PCT International Patent Application No. PCT/EP2020/077942. |
Number | Date | Country | |
---|---|---|---|
20220121733 A1 | Apr 2022 | US |