Proximity based biometric identification systems and methods

作者: Jack Sik Ching Poon , Tak Shing Peter Yum , Shek Duncan Wong

DOI:

关键词: Computer networkResource (project management)Host (network)Multi-factor authenticationAuthenticationComputer scienceTracingIdentification (information)Mutual authenticationComputer securityBiometrics

摘要: Systems and methods which provide identification of a user in combination with mutual authentication between host are shown. Embodiments further the resource for access is controlled, thereby providing three-party (e.g., user, host, resource). Although utilizing biometric data identification, embodiments store such information within devices remain control users. Protocols implemented according to facilitate decentralized approach allow interact any number hosts authorization. Auditing tracing and/or provided embodiments.

参考文章(15)
Blayn Beenau, David Bonalle, Peter Saunders, Joshua Montgomery, William Gray, Seth Fields, Carl Larkin, Method for biometric security using a transponder-reader ,(2004)
Ram Swaminathan, Philip Douglas Mackenzie, Secure mutual network authentication protocol ,(2000)
Dean Seifert, Paul Blair, Joseph Cachey, Michael J. Michelsen, Systems and methods for verifying identities in transactions ,(2004)
Vinay Deo, Robert B. Seidensticker, Daniel R. Simon, Authentication system and method for smart card transactions ,(1995)
Patrick Hazel, Paul Elbridge Catinella, Clay Von Mueller, Scott Yale, Blake Joseph Wood, Metrics systems and methods for token transactions ,(2007)
John Kenneth Bona, Mark Allan Cox, Secure smart card system ,(2009)
Veronica Mikos Prokoski, Francine J. Prokoski, Personal biometric key ,(2002)
Gayle Nix, Daniel Mellen, Paul Kolebuck, Smart identity system ,(2008)