The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
May. 31, 2005
Filed:
Feb. 10, 2000
Philip L. Bohannon, Piscataway, NJ (US);
Bjorn Markus Jakobsson, Hoboken, NJ (US);
Fabian Monrose, New York, NY (US);
Michael Kendrick Reiter, Raritan, NJ (US);
Susanne Gudrun Wetzel, New Providence, NJ (US);
Philip L. Bohannon, Piscataway, NJ (US);
Bjorn Markus Jakobsson, Hoboken, NJ (US);
Fabian Monrose, New York, NY (US);
Michael Kendrick Reiter, Raritan, NJ (US);
Susanne Gudrun Wetzel, New Providence, NJ (US);
Lucent Technologies Inc., Murray Hill, NJ (US);
Abstract
A repeatable cryptographic key is generated based on varying parameters which represent physical measurements. Locations within a share table, which locations store valid and invalid cryptographic shares, are identified as a function of received varying parameters. The share table is configured such that locations which are expected to be identified by legitimate access attempts contain valid cryptographic shares, and locations which are not expected to be identified by legitimate access attempts contain invalid cryptographic shares. The share table configuration may be modified based on prior history of legitimate access attempts. In various embodiments, the stored shares may be encrypted or compressed. A keystroke feature authentication embodiment uses the inventive techniques to implement an authentication system which authenticates based on an entered password and the manner in which (e.g. keystroke dynamics) the keystroke is entered. Another embodiment uses the inventive techniques to protect sensitive database information which is accessible using DNA measurements.