Patent for Sale:
Secure Storage, Retrieval and Authorization of Biometric Information.
A secure biometric based identification and authorization system for a collected physical biometric for a security infrastructure.
The biometric identification and authorization is achieved with an identity verification template (IVT) generated from a User Biometric (UB) collected from a human or non-human object (e.g., service animal, etc.) and stored on an biometric storage device (e.g., a magnetic strip card, smart card, Universal Serial Bus (USB) flash drive or a Radio Frequency Identifier (RFID) device, etc.). The original UB generated by the physical scan is discarded. The IVT does not contain complete information from the UB but allows for accurate verification of the human or non-human object when another UB is generated for the human or non-human object at a later time via offline or online verification. UB patterns are derived from physical features (such as fingerprints or iris patterns or facial scan patterns) or emissions (such as voices) of the human body or an animal body. The techonlogy was developed by a university professor who is a biometric, security and encryption expert. The technology is covered by 4 issued U.S. patents with an earliest priority date of 1999.
Primary Application of the Technology
biometrics, security, biometric scans including iris scans, face scans, fingerprint scans, voice recognition, secure human identification in the workplace, at airports, at government facilities, military facilites, etc., anti-terrorist activities.
The Problem Solved by the Technology
How to securely identify a person or animal or object from a new physcial biometric scan (e.g., iris, voice, face, fingerprint, bark, RFID, etc.) without storing all of the information from a previous biometric scan on a magnetic card, smart card, RFID tag, etc. that can be hacked or otherwise compromised. The secure identification can be completed offline and does not require access to a network connection. Potential security weaknesses at the biometric scan level, identification card level and network level are eliminated by this technology.
How the Technology Solves the Problem
Selected information is obtained from a first User Biometric (UB) collected from a human or non-human object and secure stored on an dentity verification template (IVT). The whole UB is not used and is discarded. The IVT does not include complete UB information but includes enough secure information that allows the IVT for a user to be used along with some complex mathematical information to reconstruct a biometrtic identity for the user to posivitively identify the user at a later time when a second biometric scan is collected for the user. The technology can be used offline without a network connection and simplifies the storage and use of biometric information that is used to securely identify a user and provides some sort of authorization to the user based on their biometric information. However, the system can be used on-line via a secure network as well.
The biometric identification and authorization is achieved with an identity verification template (IVT) generated with complex secure mathemetical algorithms from a User Biometric (UB) collected from a human, animal or non-human object such as a package, etc. Only the IVT is stored on an biometric storage device (e.g., a magnetic strip card, smart card, Universal Serial Bus (USB) flash drive or a Radio Frequency Identifier (RFID) device, etc.). The collected UB is discarded. The IVT does not contain complete information from the collected UB but allows for accurate verification of the human or non-human object when another UB is generated for the human or non-human object at a later time. This technology can be used offline and does not require a network connection for verification and authorization of users. However, the same technology can be used on-line via a secure network connection.
The seller may consider selling these patents individually.
Class 382: Image Analysis
This is the generic class for apparatus and corresponding methods for the automated analysis of an image or recognition of a pattern. Included herein are systems that transform an image for the purpose of (a) enhancing its visual quality prior to recognition, (b) locating and registering the image relative to a sensor or stored prototype, or reducing the amount of image data by discarding irrelevant data, and (c) measuring significant characteristics of the image.Subclass 115
: Personnel identification (e.g., biometrics) Subclass 116
: Using a combination of features (e.g., signature and fingerprint) Subclass 117
: Using a characteristic of the eye Subclass 118
: Using a facial characteristic Subclass 124
: Using a fingerprint
Class 340: Communications: Electrical
Communications - the handling of information or intelligence, restricted to the conveying of said information or intelligence between geographically spaced points. Information or intelligence is defined as being, matter which is handled by signaling systems or signaling devices (such as telegraph systems) or by that portion of nonsignaling systems or nonsignaling devices (such as power supply systems) which is designated in the arts as having a control function (such as the supervisory circuits which control the circuit breakers of an electric power network). Handling, as used above, is defined as being the active coaction between the tangible communication system or device and the intangible information or intelligence, and such coaction may assume various forms, such as transmission, storage, exhibiting, etc.Subclass 5.53
: Image (e.g., fingerprint, face) Subclass 5.83
: Image (Fingerprint, Face)
Class 713: Electrical Computers And Digital Processing Systems: SupportSubclass 186
: Biometric acquisition
View this listing on the Tynax website: www.tynax.com/listing/6350