Patent application number | Description | Published |
20090231096 | Processing Biometric Data in a Multidimensional Coordinate System - The invention concerns a biometric system provided with a set of reference biometric data (B′i) resulting from the application of a disjunction between a first set of biometric data (Bi) and a first encoded key (Ki), and from an information concerning the first key. A second set of biometric data (B | 09-17-2009 |
20090274344 | METHOD OF INDENTIFYING AN INDIVIDUAL - A method of identifying an individual in which captured images are encrypted by a transformation function and superimposed over previously recorded encrypted images. The superimposition image thus formed is used for identity verification. If the verification is negative a looping step repeats the process until positive verification is achieved. | 11-05-2009 |
20100110170 | Method and Equipment for the Identification of an Individual by Optical Capture of a Body Imprint Image - The invention relates to equipment for the identification of an individual by capture of body imprint images and of the underlying venous network, comprising: a prismatic optical element having: a large side for apposition of a body zone; a first inclined lateral side receiving a first radiation having a first wave length emitted by a first lighting means to light the large side with total reflection; a second inclined lateral side facing a first sensor receiving the first reflected radiation carrying an image of the body imprint; and a small side receiving a second radiation having a second wave length emitted by second lighting means, perpendicularly reaching the apposition zone and penetrating the body zone, and which faces a second sensor receiving the second reflected radiation carrying an image of the underlying venous network. | 05-06-2010 |
20100281269 | Identification Based on Encrypted Biometric Data - A database comprising biometric data stored in encrypted form is managed by a management unit. It comprises a set of filters respectively associated with filter identifiers. A biometric data item is received at a management unit; next, said biometric data item is stored in an encrypted form at a given address in the database. Then keywords are obtained on the basis of a first set of hash functions and of the biometric data item. A subset of indexing filters is associated with each keyword by selecting, for each keyword, filters as a function of the respectively associated filter identifiers, of said keywords, and of a second set of hash functions; and the given address is associated with each of the filters of the subset of filters. | 11-04-2010 |
20100284538 | Control of an Entity to be Controlled by a Control Entity - A control entity communicates with an entity to be controlled so as to effect a control, a secret key being associated with the control entity. These entities share public parameters, a second public parameter being a combination of a first public parameter of the said plurality with the secret key. At the level of the entity to be controlled, a random value is generated, a first message is transmitted to the control entity, this first message comprising at least one value obtained by combining the first public parameter with the random value; and a second message is transmitted to the control entity, this second message comprising at least one value obtained by combining the first random value, a secret key of the entity to be controlled and a value received from the control entity. One of the values included in the first or the second message is based on the second public parameter. | 11-11-2010 |
20100310070 | Generation and Use of a Biometric Key - In a control system comprising control device adapted for, on the one hand, receiving signal indicating a first biometric datum (W), and, on the other hand, obtaining a second biometric datum captured (w′), at the level of the control device, the first and second biometric date are compared. Next, it is decided whether the first and second biometric data correspond on the basis of the comparison. Thereafter, at least a secret cryptographic key part (H(w)) is generated by applying cryptographic function to the first biometric datum. | 12-09-2010 |
20110158486 | Method of Determining a Pseudo-Identity on the Basis of Characteristics of Minutiae and Associated Device - Additional information regarding a fingerprint is estimated, with a given level of confidence, on the basis of characteristics of a set of minutiae corresponding to this print. Local descriptors are determined around some at least of the minutiae, so that they comprise, in relation to zones comprising additional information estimated with the given confidence level, values calculated on the basis of said information and, in relation to zones not comprising such information, erasures. The local descriptors determined are quantized according to a given number of integer values, a value being reserved for erasures. The quantized local descriptors are coded with the aid of an error-tolerant coding algorithm associated with a decoding algorithm devised to take account of errors and erasures. And a pseudo-identity is determined on the basis of some at least of the coded quantized local descriptors. | 06-30-2011 |
20110213972 | METHOD OF EXECUTING A CRYPTOGRAPHIC CALCULATION - A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an intrusion into the electronic component. The one-way function is based on a first affine operation corresponding to a first secret key. The one-way function is applied, by obtaining ( | 09-01-2011 |
20120131051 | METHOD FOR SEARCHING FOR AN ENTITY USING A VERIFIER DEVICE, AND RELATED DEVICES - In a method for searching for an entity belonging to a set of entities, a verifier device and the entities are arranged so as to exchange information via at least one communication channel. Each entity has a first respective identifier from which a plurality of representatives can be obtained. According to the method, a first identification word (m | 05-24-2012 |
20120239940 | IDENTIFICATION BY MEANS OF CHECKING A USER'S BIOMETRIC DATA - The invention relates to a database ( | 09-20-2012 |
20120284284 | BIOMETRIC CODING - A database stores a number N of biometric data representatives which correspond to a set of characteristics of said biometric data. Acquired biometric data is obtained. Then, transformed biometric data is obtained by transforming the acquired biometric data according to said set of characteristics. Next, N deviation values are obtained by applying a comparison between the transformed biometric data and the N representatives in the database. Finally, a vector representing the acquired biometric data is obtained, the representation vector having a number of components less than or equal to N, said components being determined in relation to said N deviation values. | 11-08-2012 |
Patent application number | Description | Published |
20130230170 | PROTECTION AGAINST PASSIVE SNIFFING - The invention relates in particular to a method for securing the execution of a cryptographic algorithm (ALG) against passive sniffing, the method implementing masking (MSK) of data processed by the cryptographic algorithm. The masking (MSK) of said data includes a linear encoding step such as x′=x.L+c, in which x is the data to be masked, x′ is the corresponding masked data, c is a code word included in a linear code C, and L is a matrix made up of linearly independent vectors not included in the linear code C. The invention also relates to a device (SC) implementing such a method. | 09-05-2013 |
20140095885 | METHODS FOR BIOMETRIC REGISTRATION AND VERIFICATION, AND RELATED SYSTEMS AND DEVICES - The invention relates to a registration method for future biometric verification purposes, including the following steps for one person (I): obtaining first biometric data ( | 04-03-2014 |
20140181932 | METHOD FOR MANAGING AND CHECKING DATA FROM DIFFERENT IDENTITY DOMAINS ORGANIZED INTO A STRUCTURED SET - The invention relates to a method and system for managing and checking different identity data relating to a person. According to the invention, a derived-identity management server generates for the person at least part of the identity data with which said person can be authenticated in relation to a service provider for the derived-identity domain, on the basis of information derived from identity data from parent domains. The identity data generation processing ensures that no link can be established from two authentications in two separate domains in the absence of link information. If necessary, said link information is transmitted by a parent domain to a derived-identity server so that the latter establishes the link between the identity data of the derived-identity domain and the identity data of the parent domain, e.g. for the cascade revocation of a person from various domains. | 06-26-2014 |
20150039899 | METHOD FOR ENCRYPTING A PLURALITY OF DATA IN A SECURE SET - A server-implemented method encrypting at least two pieces of indexed data as lists of elements, each element belonging to a finite set of indexed symbols on an alphabet. The data is encrypted to form a protected set, including: the server randomly generates, for each datum, a corresponding encoding function; if at least one element that constitutes a datum is the symbol of the alphabet, the server determines the image of the symbol of the alphabet via the encoding function corresponding to the datum to obtain a codeword coordinate and adds the codeword coordinate to an indexed set corresponding to the element of the alphabet; then the server completes the indexed set with error-inducing points; the server randomly reindexes the elements of the indexed set corresponding to the symbol of the alphabet; and the server adds the indexed set to the protected set. The method can identify an individual. | 02-05-2015 |
20150098519 | METHOD AND DEVICE FOR TRANSMITTING A MESSAGE - An embedded system and, in particular, a communication protocol suitable for a data transmission using auxiliary physical channels of such an embedded system. A transmission method suitable for such a channel includes the transmission of a data signal based on the encoding of three symbols. The message consists of a preamble allowing recognition of the symbols used, followed by the significant part of the message. The decoding of the message comprises a first step of learning the symbols used, prior to the decoding of the significant part of the message. | 04-09-2015 |
20150180667 | SECONDARY ELEMENTS IN A FUZZY VAULT ENCODING SCHEME - The description relates in particular to a method for encoding information represented in the form of a function P, and to a corresponding method for decoding information. The encoding comprises the encoding of secondary information. These methods may be implemented within a context of biometric enrollment and (respectively) biometric authentication. The description also relates to an electronic device, a computer program, and a storage medium for the implementation of such methods. | 06-25-2015 |
20150180882 | METHOD FOR PROTECTING A CHIP CARD AGAINST A PHYSICAL ATTACK INTENDED TO MODIFY THE LOGICAL BEHAVIOUR OF A FUNCTIONAL PROGRAM - A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behaviour of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program. | 06-25-2015 |
20150269394 | METHOD FOR ENROLLING DATA IN A BASE TO PROTECT SAID DATA - The invention relates to an enrolment method for enrolling biometric data in a database, each data item comprising an information vector on a biometric feature, and a mask vector, determining those bits of the information vector to be taken into account for data comparison, | 09-24-2015 |
20150270977 | ELECTRONIC SIGNATURE METHOD WITH EPHEMERAL SIGNATURE - The invention concerns a method for generating an electronic signature key and an associated public key certificate, implemented by a client unit and a server unit, the method comprising a step during which the client unit and/or the server unit generate(s) a signature key comprising a private key and a public key, and a public key certificate comprising said public key, the method being characterised in that the client unit acquires an item of biometric data of an individual, and in that the signature key and/or the public key certificate are generated from at least a portion of said biometric data, and in that the portion of biometric metric data from which the signature key and/or the public key certificate have been generated is ephemeral and is not memorised after the signature key and the public key certificate have been generated. The invention also concerns a method for transferring a message and a system designed to implement the method for generating a signature key. | 09-24-2015 |