Claims
- 1. A method for a user to obtain access to a remotely located and protected computer, the method including the steps of:placing a finger on a fingerprint sensor in a personal identification device located remotely with respect to a protected computer; actuating the device to sense and record a fingerprint of the user; comparing, in the personal identification device, the sensed fingerprint with reference fingerprint data previously stored in the device; upon a successful comparison, generating a numerical value that uniquely identifies the sensed fingerprint matched with the reference fingerprint, and transmitting the numerical value as an identity confirmation code from the device and over a communication network to the protected computer; comparing, at the protected computer, the numeric value transmitted from the device with a numeric code previously stored in the computer during a registration mode of operation; and providing requested access to the protected computer upon successful comparison in the preceding step.
- 2. A method as defined in claim 1, wherein the step of transmitting the identity confirmation code includes:encrypting the identity confirmation code in the device; and decrypting the identity confirmation code at the protected computer.
- 3. A method as defined in claim 2, wherein:the step of encrypting includes doubly encrypting; and the step of decrypting includes doubly decrypting.
- 4. A method as defined in claim 3, wherein:the step of doubly encrypting includes first encrypting the identity confirmation using a public encryption key generated in and received from the protected computer and then further encrypting using a private device encryption key stored in the device; and the step of doubly decrypting includes first decrypting using a public device encryption key provided by the user on prior registration at the computer and then decrypting using a private encryption key generated in the computer.
- 5. Apparatus for automatically verifying the identity of a person seeking remote access to a protected property, the apparatus comprising:a personal identification device having a sensor, for reading biometric data identifying a person seeking access to a protected property, storage means, for storing reference biometric data identifying a person authorized to have access to the protected property, and a correlator, for comparing the stored reference biometric data with the biometric data of the person seeking access and determining whether they match, wherein the sensor, the storage means and the correlator are all contained in a portable device; means operative upon determination of a match of biometrc data, for securely communicating an identity confirmation code through a communication network to a door, wherein the door provides access to the protected property upon receipt of the identity confirmation code; and a user interface having a first switch to initiate operation of the apparatus in a verification mode, and a second switch, actuation of which places the apparatus in an enroll mode of operation, wherein biometric data from the sensor are stored in the storage means for subsequent retrieval in the verification mode of operation, and a numerical value that uniquely identifies the stored biometric data is transmitted to the door for registration; and wherein the means for securely communicating an identity confirmation code includes means for generating a numerical value that uniquely identifies the stored reference biometric data matching the data of the person seeking access, encryption logic, for encrypting the numerical value, and a communication interface for sending the encrypted numerical value to the door, together with identification data for the person seeking access; wherein the door provides the desired access to the protected property upon confirming that the transmitted numerical value is the same as the one previously transmitted for the same person for registration.
- 6. Apparatus as defined in claim 5, wherein:the portable device is integrated into a portable communication device.
- 7. Apparatus as defined in claim 5, wherein:the portable device is connectable to a communication device.
- 8. Apparatus as defined in claim 5, wherein:the protected property is a computer file stored in a computer that is remotely located with respect to the personal identification device.
- 9. Apparatus as defined in claim 5, and further comprising:a receiver, for receiving an encryption key generated by and transmitted from the door; and means for storing a private encryption key in the personal identification device; and wherein the encryption logic includes means for doubly encrypting the numerical value using the encryption key received from the door and the private encryption key.
- 10. A personal identification device for automatically verifying the identity of a user seeking to use the device for access to a remotely located protected property, the device comprising:a sensor, for reading fingerprint data identifying a user seeking access to a protected property; a memory for storing a reference fingerprint image of the user during an enrollment procedure and for holding the reference image for future use; an image correlator, operable in a verification mode, for comparing the stored reference image with a fingerprint image of the user seeking access, as obtained from the sensor, and for determining whether the two images match; means operable in an enrollment mode, for transmitting to a door a numerical value that uniquely identifies stored reference image of a user being enrolled; and means operable in the verification mode, for securely communicating an identity confirmation code to a door through a communication network, wherein the door provides access to the protected property upon receipt of the identity confirmation code, wherein the means for securely communicating the identity confirmation code includes means for generating a numerical value that uniquely identifies the stored reference fingerprint image matching the image of the user seeking access, encryption logic, for encrypting the numerical value, and a transmitter for sending the encrypted numerical value to the door, together with user identification data; wherein the door provides the desired access to the protected property upon confirming that the transmitted numerical value is the same as one previously provided by the user during enrollment.
- 11. A personal identification device as defined in claim 10, and further comprising:a receiver, for receiving an encryption key generated by and transmitted from the door through the communication network; and means for storing a private encryption key in the device; and wherein the encryption logic includes means for doubly encrypting the numerical value using the encryption key received from the door and the private encryption key.
- 12. A method for automatically verifying the identity of a user seeking access to a remotely located, protected computer, the method comprising the steps of:sensing biometric data of a user, through a sensor that is part of a personal identification device carried by the user; initiating verification operation of the personal identification device by means of a manual switch; comparing the sensed biometric data with reference biometric data previously stored in the personal identification device; determining whether the sensed biometric data match the reference biometric data; if there is a match, securely communicating, through a communication network, an identity confirmation code to a door that controls access to the protected computer; wherein the step of securely communicating an identity confirmation code includes generating a numerical value from the stored reference biometric data, encrypting the numerical value, transmitting the encrypted numerical value over the communication network to the door, transmitting user identification data over the communication network to the door, and receiving and decrypting the encrypted numerical value, at the door; comparing the decrypted numerical value with one previously stored at the door by the user during a registration process, to confirm the identity of the user; and if the identity of the user is confirmed, activating a desired function to provide the desired access to the protected computer.
- 13. A method as defined in claim 12, wherein the step of securely communicating further comprises:generating at the door a random pair of door public and private encryption keys; transmitting the door public key to the personal identification device; selecting for the personal identification device a pair of public and private encryption keys for all subsequent uses of the device; providing the personal identification device public key to the door as part of the door registration process; and storing the personal identification device private key secretly in the device; and wherein the encrypting step includes doubly encrypting the numerical value with the door public key and the personal identification device private key.
- 14. A method as defined in claim 13, wherein door performs the additional step of:decrypting the doubly encrypted numerical value using the personal identification device public key and the door private key.
BACKGROUND OF THE INVENTION
This application is a continuation of U.S. application Ser. No. 08/995,565, filed Dec. 22, 1997, now U.S. Pat. No. 6,038,666.
US Referenced Citations (5)
| Number |
Name |
Date |
Kind |
|
5363448 |
Koopman, Jr. et al. |
Nov 1994 |
|
|
5541994 |
Tomko et al. |
Jul 1996 |
|
|
5852665 |
Gressel et al. |
Dec 1998 |
|
|
6016476 |
Maes et al. |
Jan 2000 |
|
|
6041410 |
Hsu et al. |
Mar 2000 |
|
Non-Patent Literature Citations (1)
| Entry |
| Schneier, B., “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” John Wiley & Sons, Oct. 18, 1995, pp. 41-44. |
Continuations (1)
|
Number |
Date |
Country |
| Parent |
08/995565 |
Dec 1997 |
US |
| Child |
09/422919 |
|
US |