The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 13, 2022

Filed:

Mar. 24, 2020
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Ehud Aharoni, Kfar Saba, IL;

Allon Adir, Kiryat Tivon, IL;

Dov Murik, Haifa, IL;

Ariel Farkash, Shimshit, IL;

Omri Soceanu, Haifa, IL;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); G06F 17/18 (2006.01); G06F 21/32 (2013.01);
U.S. Cl.
CPC ...
H04L 9/0866 (2013.01); G06F 17/18 (2013.01); G06F 21/32 (2013.01);
Abstract

An example system includes a processor to receive, at a setup or sign-up, a first cipher including a biometric template transformed using a first transformation and encrypted using a secret key, a second cipher including a security vector encrypted using the secret key, a third cipher including the biometric template transformed using a second transformation and encrypted, and a fourth cipher including an encrypted second security vector. The processor can receive, at a runtime or sign-in, a fifth cipher and a sixth cipher. The processor can verify that the fifth cipher includes a second biometric template transformed using the first transformation and encrypted using the secret key and that the sixth cipher includes the second biometric template transformed using the second transformation by testing a format attribute of the transformation functions using comparisons of inner products. The processor can authenticate a user based on the Euclidean distance between the first cipher and the sixth cipher not exceeding a threshold in response to detecting that the transformations are verified.


Find Patent Forward Citations

Loading…