US20130081145A1 - Anonymous association system utilizing biometrics - Google Patents
Anonymous association system utilizing biometrics Download PDFInfo
- Publication number
- US20130081145A1 US20130081145A1 US13/667,109 US201213667109A US2013081145A1 US 20130081145 A1 US20130081145 A1 US 20130081145A1 US 201213667109 A US201213667109 A US 201213667109A US 2013081145 A1 US2013081145 A1 US 2013081145A1
- Authority
- US
- United States
- Prior art keywords
- biometric
- data
- node
- database
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 128
- 238000013475 authorization Methods 0.000 claims abstract description 56
- 230000009471 action Effects 0.000 claims abstract description 27
- 238000004891 communication Methods 0.000 claims abstract description 10
- 230000008569 process Effects 0.000 claims description 17
- 230000004931 aggregating effect Effects 0.000 claims description 2
- 230000002776 aggregation Effects 0.000 description 7
- 238000004220 aggregation Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 239000003086 colorant Substances 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 210000003811 finger Anatomy 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 210000003813 thumb Anatomy 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 210000004209 hair Anatomy 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 229910044991 metal oxide Inorganic materials 0.000 description 1
- 150000004706 metal oxides Chemical class 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 210000003296 saliva Anatomy 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Definitions
- This invention relates generally to a device and related systems and methods for anonymously storing and accessing data utilizing biometrics.
- Identity management systems typically serve two fundamental purposes, authentication and authorization.
- Authentication refers to the process used to verify a person's identity. In other words, verifying that a person is who they claim to be.
- Authorization refers to the process of establishing access privileges granted to the authenticated individual. Authentication and authorization form the cornerstones of traditional identity management.
- the financial institution and the individual are reassured that funds are transferred to the correct account belonging to the authenticated individual.
- the financial institution must verify that the individual is authorized to conduct a transaction. More specifically, although the individual is verified to be the person he or she claims to be, the institution must make sure that the specific transaction to be conducted is allowed. For example, the individual would have to be authorized to make a withdrawal from an account. As another example, the bank may place a predetermined cap on withdrawals, such that the individual is not authorized to make a withdrawal from the account greater than the cap.
- Classic database models used for authentication and authorization utilize a spoke and hub data arrangement, in which the individual identity rests at the center with associated ancillary data linked to that individual identity. Consequently, the relationships among ancillary or spoke-level data are managed via the central or hub-level individual identity. While occasional relationships among ancillary or spoke level data may exist or be created, these relationships remain localized. Therefore, in order to make the data stored at the ancillary or spoke level useful, it must be combined with data via the central or hub-level database. More particularly, the central or hub-level database contains information identifying individuals used to enable combination of data from multiple localized databases. Thus, successfully combining ancillary data depends on the ability to uniquely identify the individual at the center of the hub.
- an anonymous association system utilizing biometrics provides the ability to aggregate and associate data about individuals without knowing or being able to deduce who they are.
- biometrics can be tied back to a unique individual with a very high degree of certainty, biometrics do not, by themselves, identify the individual without other individually identifiable information being associated with those biometrics.
- various exemplary embodiments operate on the premise that a biometric marker, such as a finger print, may be used in an indirect fashion to create a matrix of associations among an individual's ancillary data elements. In this manner, identifying information is not associated with the biometric marker or identifying information held at the central hub.
- a device for interaction with an anonymous database system comprises: a biometric input that receives biometric data from a user; a communicator configured to retrieve, using the biometric data, a key stored in a first enrollment process, retrieve, using the key, an institution identifier and a user identifier stored in a second enrollment process, and retrieve user data from an institution database corresponding to the institution identifier; and a display that displays the retrieved user data.
- a method of enrolling a user in an anonymous database system comprises: performing a first enrollment process by interacting with a user, the first enrollment process comprising: receiving first biometric data from the user, and storing, in a first database, the first biometric data in association with a key; and performing a second enrollment process by interacting with an institution, the second enrollment process comprising: verifying the identity of the user at the institution, receiving second biometric data from the user, retrieving the key from the first database using the second biometric data, and storing, in a second database, the key, an identifier uniquely identifying the institution, and an identifier uniquely identifying the user at the institution.
- an anonymous database system comprises: a plurality of biometric nodes in communication with one another, each of the plurality of biometric nodes comprising a biometric input that receives biometric data from a user; at least one central database in communication with the plurality of biometric nodes; and a plurality of institution databases in communication with the plurality of biometric nodes, wherein a first node of the plurality of biometric nodes is configured to receive a message from a second node of the plurality of biometric nodes, the message requesting authorization of data access by the second node.
- a method for performing an action requiring multiple levels of authentication comprises: receiving a request to perform an action from a first user operating a first biometric node; receiving biometric data from the user; determining, using the biometric data, whether additional authorization is required to allow the requested action to proceed; sending a request for additional authorization to a second biometric node when additional authorization is required; receiving authorization data at the second biometric node; and allowing the requested action to proceed.
- FIG. 1 is a perspective view of an exemplary embodiment of a biometric node
- FIG. 2 is a schematic diagram of an exemplary embodiment of an anonymous association system using biometrics
- FIG. 3 is a flowchart of an exemplary embodiment of a method for person-level enrollment executed at a biometric node
- FIG. 4 is a flowchart of an exemplary embodiment of a method for person-level enrollment executed at a first database
- FIG. 5 is a flowchart of an exemplary embodiment of a method for person-level enrollment executed at a second database
- FIG. 6 is a flowchart of an exemplary embodiment of a method for institution-level enrollment executed at a biometric node
- FIG. 7 is a flowchart of an exemplary embodiment of a method for institution-level enrollment executed at a database
- FIG. 8 is a flowchart of an exemplary embodiment of a method for data aggregation executed at a biometric node
- FIG. 9 is a flowchart of an exemplary embodiment of a method for data aggregation executed at a database
- FIG. 10 is a schematic diagram of an exemplary embodiment of an anonymous association system including multiple biometric nodes.
- FIG. 11 is a flowchart of an exemplary embodiment of a method for performing an action requiring multiple levels of authorization.
- FIG. 1 is a perspective view of an exemplary embodiment of a biometric node 100 .
- Biometric node 100 includes biometric input 110 , biometric indicator 120 , communicator 130 , connection indicator 140 , display 150 , alphanumeric input 160 , power connector 170 , computer interface 180 , and card slot 190 .
- biometric input 110 is a component configured to obtain a biometric reading to uniquely identify an individual.
- biometric input 110 is a fingerprint reader. Accordingly, when an individual presses a thumb or finger against biometric input 110 , biometric input 110 scans the thumb or finger and encodes the reading into a digital representation of the biometric. It should be apparent that any encoding method known to those of ordinary skill in the art may be utilized to encode the biometric data. Furthermore, the encoding algorithm utilized by biometric input 110 may be updated using a software or firmware upgrade.
- biometric input 110 may be any device capable of analyzing one or more physiological or behavioral characteristics that uniquely identify an individual.
- biometric input 110 is instead a palm print reader, retina scanner, iris scanner, face recognition device, or any other device that reads unique physical characteristics of an individual.
- biometric input 110 may be a device that analyzes a DNA-containing sample, such as blood, hair, or saliva.
- biometric input 110 is a microphone that receives a voice sample, which may in turn be used to identify the individual.
- two or more biometrics may be used in combination.
- biometric input 110 is a separate device connected to biometric node 100 using any interface including, but not limited to, Universal Serial Bus (USB), FireWire, and Wi-Fi.
- biometric input 110 may be a replaceable module that integrates directly into biometric node 100 . Accordingly, in these embodiments, biometric input 110 may be replaced in the event of damage or other failure.
- biometric indicator 120 displays the current status of biometric input 110 .
- biometric indicator 120 may be a Light Emitting Diode (LED) that changes colors to indicate the status of a biometric scan.
- biometric indicator 120 may be unlit when biometric input 110 is inactive, yellow when biometric input 110 is obtaining a biometric reading, green when biometric input 110 successfully obtains a biometric reading, and red when an attempted biometric reading fails.
- biometric indicator 120 is an icon, text, or other information field displayed on display 150 .
- communicator 130 exchanges data with one or more databases, described in further detail below with reference to FIG. 2 .
- communicator 130 is an antenna capable of sending and receiving data via a wireless connection over a Transmission Control Protocol/Internet Protocol (TCP/IP) network.
- TCP/IP Transmission Control Protocol/Internet Protocol
- communicator 130 is an Ethernet jack or any other interface, wired or wireless, that allows biometric node 100 to communicate with an external database. It should be apparent that any protocol may be used for communication between communicator 130 and the external database.
- connection indicator 140 displays the current status of the connection between biometric node 100 and one or more external databases.
- connection indicator 140 may be an LED that changes colors to indicate the status of the connection.
- biometric indicator 120 may be yellow when communicator 130 is attempting to establish a connection with the external database, green when communicator 130 has successfully established a connection, and red when communicator 130 has failed to establish a connection.
- connection indicator 140 may be an icon, text, or other information field displayed on display 150 .
- display 150 is used to convey information to the user of biometric node 100 .
- display 150 displays data received by communicator 130 from one or more external databases.
- display 150 is a Liquid Crystal Display (LCD). It should be apparent, however, that any technology suitable for displaying information to a user may be used. Furthermore, it should be apparent that, in various exemplary embodiments, display 150 may instead be an external display connected to a biometric node 100 without a display.
- LCD Liquid Crystal Display
- display 150 is a touch screen display that enables a user to input commands by touching the surface of display 150 .
- display 150 may output buttons or objects that may be pressed by the user to execute a command.
- display 150 may output a button labeled, “Show Data,” which allows a user to retrieve data based on a biometric entered into biometric input 110 .
- alphanumeric input 160 is used to receive data and commands from a user of biometric node 100 . Accordingly, alphanumeric input 160 may receive a personal identification number (PIN), other optional data, and commands to transfer and/or display data.
- PIN personal identification number
- alphanumeric input 160 is an array of buttons arranged in a telephone-style layout, such that each button is used for a number and multiple letters.
- alphanumeric input 160 is an array of buttons arranged in a QWERTY layout. Although illustrated as separate from display 150 , it should be apparent that alphanumeric input 160 may instead be integrated into display 150 using touch screen technology.
- power connector 170 provides an interface for connecting biometric node 100 to a power source.
- power connector 170 is a male pin that receives a female connector of an AC adapter. Accordingly, biometric node 100 may be connected to a power source via power connector 170 to charge a battery (not shown) of biometric node 100 .
- computer interface 180 provides a connection between biometric node 100 and a personal computer (PC) of the user (not shown).
- PC personal computer
- computer interface 180 may be a USB slot, FireWire input, serial input, wireless interface, or any other interface that may be used to connect an external device to a PC.
- biometric node 100 may operate as a standalone device, biometric node 100 may also be connected to a PC to allow data exchange with the PC. Accordingly, it should be apparent that, in various exemplary embodiments, biometric node 100 does not directly communicate with the external databases, but instead exchanges data with the external databases using a PC as a conduit.
- card slot 190 provides an interface for receiving a smart card, flash memory device, or any other external device that may store information.
- card slot 190 enables a user to insert a smart card or other device to assist in authorization.
- biometric node 100 may determine that a higher level authorization is necessary to allow access to the data and require the user to insert a smart card prior to aggregating the data.
- a smart card or other device may be inserted into card slot 190 to indicate the data the user desires to retrieve. For example, a user may insert a card associated with a bank to retrieve financial records, while inserting a card associated with a hospital to retrieve medical records.
- biometric node 100 includes a complementary metal oxide semiconductor (CMOS) chip, which may include embedded logic for controlling the operation of the components of biometric node 100 .
- CMOS complementary metal oxide semiconductor
- the operation of biometric node 100 may be updated utilizing a firmware update.
- exchange of data of biometric node 100 is controlled by a customized software installation on a PC or using a web portal to transfer data in conjunction with the data obtained by the biometric device.
- the operation of biometric node 100 may be updated utilizing a software and/or firmware update.
- FIG. 2 is a schematic diagram of an exemplary embodiment of an anonymous association system 200 .
- Anonymous association system 200 includes biometric node 210 , database 1 220 , database 2 230 , database 3 240 , database 4 250 , institution database 1 260 , and institution database 2 270 .
- biometric node 210 is a standalone device including features described above with reference to biometric node 100 .
- biometric node 210 may be a PC operated in conjunction with biometric node 100 .
- biometric node 210 communicates with each of the databases 220 , 230 , 240 , 250 , 260 , 270 .
- the address of each of the databases 220 , 230 , 240 , 250 may be preconfigured via a URL alias encoded in the firmware of biometric node 210 . Accordingly, the URL alias may be modified by firmware update of biometric node 210 , preferably utilizing public key encryption to prevent unauthorized firmware upgrades.
- biometric node 210 is a device operated by a user.
- biometric node 210 may be operated by a user to perform a person-level enrollment process, as described in further detail below with reference to FIGS. 3-5 .
- biometric node 210 may be operated by a user to retrieve and aggregate data, as described in further detail below with reference to FIGS. 8 and 9 .
- biometric node 210 is instead a device operated by an institution.
- biometric node 210 may be utilized by an institution to perform an institution-level enrollment process, as described in further detail below with reference to FIGS. 6 and 7 . It should be apparent, however, that both person-level enrollment and institution-level enrollment may be performed utilizing a user device.
- database 1 220 , database 2 230 , database 3 240 , and database 4 250 are centrally located databases used to provide association and aggregation services.
- databases 220 , 230 , 240 , 250 do not store openly identifiable individual information.
- databases 220 , 230 , 240 , 250 are not directly connected to institution databases 260 , 270 . Thus, even in the event of a security compromise at one or more of the databases 220 , 230 , 240 , 250 , the identities of individuals using anonymous association system 200 remain concealed.
- database 1 220 stores raw biometric data provided by a user in association with a biometric random key.
- the raw biometric data may be a fingerprint data set, retinal scan data set, or any other biometric data obtained by biometric input 110 .
- biometric random key may be a globally unique identifier associated with the raw biometric data. Accordingly, in various exemplary embodiments, there is a one-to-one correspondence between raw biometric data and biometric random keys, such that the biometric random key for a particular user may be obtained by performing a search using the biometric data.
- database 2 230 stores the biometric random key in association with a PIN random key and other optional data.
- database 2 230 when a user provides a PIN along with the biometric data, database 2 230 generates a hash-encrypted PIN random key and stores the PIN random key in association with the biometric random key. It should be apparent, however, that any suitable encryption algorithm may be utilized to generate the encrypted random key.
- database 3 240 stores the biometric random key in association with several pieces of data.
- This data may include an institution ID, which uniquely identifies an institution participating in anonymous association system 200 .
- each institution ID may identify an institution that stores records in a database, such as institution database 1 260 or institution database 2 270 .
- the institution ID could identify a bank, hospital, government agency, or any other entity that provides access to data through anonymous association system 200 .
- the data stored in database 3 240 may include a unique ID, which may uniquely identify, within the institution, the individual associated with the biometric random key.
- the unique ID may be an account number, random number, or any other alphanumeric value that uniquely identifies the individual at the institution.
- the data stored in database 3 240 may include security clearance information or additional authorization information.
- the security clearance information could indicate that the data stored in the institution for an individual identified by the unique ID may only be accessed when accompanied by an additional biometric or other piece of information.
- the security clearance information may indicate that a biometric from a second person, such as a manager or employee, is required to permit access to the data.
- the security clearance information may indicate that a smart card must be inserted into card slot 190 or that a password or other alphanumeric value must be entered.
- database 4 250 is an institutional dictionary that stores information used to access the data stored in institutional databases 260 , 270 .
- database 4 250 may store an institution ID identifying a participating institution, the name of the institution, and a digital address identifying the location of the associated institutional database.
- the digital address may include a URL, IP address, and any other information necessary to connect to the database, including port numbers, passwords, and the like.
- the URL, IP address, and other information may be pre-registered for each institution, manually configured, or automatically configured.
- institution database 1 260 and institution database 2 270 are databases operated by institutions.
- databases 260 , 270 store one or more fields of data in association with a value uniquely identifying an individual.
- Databases 260 , 270 may store any type of data including, but not limited to, medical records, bank records, credit scores, educational information, and criminal histories.
- databases 220 , 230 , 240 , 250 are each stored on a separate server to provide maximal security.
- each of the databases 220 , 230 , 240 , 250 are located on a single, centralized server.
- anonymous association system 200 includes any number of institutional databases.
- anonymous association system 200 may include additional databases or data fields omitted from FIG. 2 for the sake of simplicity.
- FIG. 3 is a flowchart of an exemplary embodiment of a method 300 for person-level enrollment executed at a biometric node 210 .
- Exemplary method 300 starts in step 310 and proceeds to step 320 , where biometric node 210 receives biometric data from a user.
- biometric node 210 obtains a biometric reading from the user via biometric input 110 .
- biometric input 110 receives raw biometric data and encodes the raw data into a digital representation.
- exemplary method 300 proceeds to step 330 , where biometric node 210 sends the biometric data to a centralized database of anonymous association system 200 , such as database 1 220 .
- database 1 220 The processing performed by this database is described in further detail below with reference to FIG. 4 .
- biometric node 210 optionally receives additional data from the user. More particularly, in various exemplary embodiments, biometric node 210 acquires a PIN, password, or other alphanumeric key from user via alphanumeric input 160 , an attached keyboard, or some other input device.
- step 350 biometric node 210 sends the optional data to a centralized database of anonymous association system 200 , such as database 2 230 .
- database 2 230 The processing performed by this database is described in further detail below with reference to FIG. 5 .
- Exemplary method 300 then proceeds to step 360 , where biometric node 210 receives one or more keys from the corresponding databases.
- biometric node 210 receives a biometric random key from database 1 220 .
- biometric node 210 sends optional data to database 2 230
- biometric node 210 receives a PIN random key from database 2 230 . Generation of these keys is described in further detail below with reference to FIGS. 4 and 5 .
- exemplary method 300 proceeds to step 370 , where exemplary method 300 stops.
- FIG. 4 is a flowchart of an exemplary embodiment of a method 400 for person-level enrollment executed at a first database, such as database 1 220 .
- Exemplary method 400 starts in step 410 and proceeds to step 420 , where database 1 220 receives biometric data from biometric node 210 .
- Exemplary method 400 then proceeds to step 430 , where database 1 220 performs a query to determine whether the received biometric data is associated with a new user.
- exemplary method 400 proceeds to step 440 , where database 1 220 stores the biometric data.
- exemplary method 400 then proceeds to step 450 , where database 1 220 generates a biometric random key.
- biometric random key may be a globally unique identifier associated with the biometric data.
- exemplary method 400 proceeds to step 460 , where database 1 220 stores the biometric random key in association with the biometric data.
- step 430 when, in step 430 , it is determined that the user has already performed person-level enrollment and is therefore not a new user, exemplary method 400 proceeds to step 470 .
- step 470 database 1 220 performs a query to look up the corresponding biometric random key 210 using the biometric data received from biometric node 210 .
- exemplary method 400 After storing the biometric random key in step 460 or looking up the biometric random key in step 470 , exemplary method 400 proceeds to step 480 , where database 1 220 returns the biometric random key to biometric node 210 . Exemplary method 400 then proceeds to step 490 , where exemplary method 400 stops.
- FIG. 5 is a flowchart of an exemplary embodiment of a method 500 for person-level enrollment executed at a database, such as database 2 230 .
- Exemplary method 500 starts in step 510 and proceeds to step 520 , where database 2 230 receives optional data from biometric node 210 , such as a PIN or password.
- Exemplary method 500 then proceeds to step 530 , where database 2 230 receives the biometric random key.
- the biometric random key may be sent from database 1 220 to database 2 230 when the biometric random key is generated.
- the biometric random key may be sent from biometric node 210 to database 2 230 after database 1 220 returns the key to biometric node 210 .
- exemplary method 500 After receiving the biometric random key in step 530 , exemplary method 500 proceeds to step 540 , where database 2 230 stores the biometric random key. Exemplary method 500 then proceeds to step 550 , where database 2 230 optionally encrypts, then stores the optional data in association with the biometric random key.
- exemplary method 500 proceeds to step 560 , where database 2 230 generates a PIN random key.
- PIN random key may be a globally unique identifier associated with the PIN or password.
- exemplary method 500 proceeds to step 570 , where database 2 230 stores the PIN random key in association with the biometric random key and other data.
- exemplary method 500 After generating and storing the PIN random key, exemplary method 500 proceeds to step 580 , where database 2 230 optionally returns the PIN random key to biometric node 210 . Exemplary method 500 then proceeds to step 590 , where exemplary method 500 stops.
- FIG. 6 is a flowchart of an exemplary embodiment of a method 600 for institution-level enrollment executed at biometric node 210 .
- Exemplary method 600 starts in step 610 and proceeds to step 620 , where the user's identity is verified.
- biometric node 210 is operated by an institution, such that the user seeking to initiate institution-level enrollment is physically present at one of the institution's locations.
- the institution may perform a procedure to verify that the user is the person he or she purports to be.
- an employee of the institution may verify the user's identity by performing a process including, but not limited to, examining a photo ID, requiring the person to provide personal information, and/or obtaining a signature.
- the operator of anonymous association system 200 may establish minimum standards an institution must observe in verifying the identity of the user.
- biometric node 210 is operated by a user seeking to initiate institution-level enrollment at an institution for which there is no readily-accessible physical location.
- a user may desire to access his or her data stored at a web-based institution, such as a credit agency or online bank.
- a web-based institution such as a credit agency or online bank.
- several methods of verifying the user's identity may be used.
- the user opens or logs into an account at the institution using biometric node 210 , a personal computer, or any other web-enabled device.
- the institution may be reasonably certain that the actual user is the registered owner of the account.
- the institution may instead rely on in-person identity verification conducted at a proxy institution.
- a user may perform institution-level enrollment in person at a bank and simultaneously perform institution-level enrollment for the web-based institution.
- biometric node 210 After verifying the user's identity in step 620 , exemplary method 600 proceeds to step 630 , where biometric node 210 obtains a biometric reading from the user via a biometric input. More particularly, in various exemplary embodiments, the biometric input receives raw biometric data and encodes the raw data into a digital representation.
- biometric node 210 retrieves the biometric random key.
- biometric node 210 sends the biometric data to database 1 220 , which searches for a biometric random key associated with the biometric data.
- database 1 220 enrolls the user, as described in further detail above with reference to steps 440 , 450 , and 460 of FIG. 4 .
- database 1 220 simply looks up the biometric random key, as described in further detail above with reference to step 470 of FIG. 4 . In either case, database 1 220 returns the biometric random key to biometric node 210 .
- exemplary method 600 proceeds to step 650 , where biometric node 210 sends the retrieved biometric random key to database 3 240 .
- Exemplary method 600 then proceeds to step 660 , where biometric node 210 sends, to database 3 240 , the institution ID of the institution at which the user is registering. More particularly, in various exemplary embodiments, the on-chip software of biometric node 210 is embedded with the institution ID, such that the institution ID can be retrieved from biometric node 210 . Alternatively, in various exemplary embodiments, an employee or other agent of the institution enters the institution ID into biometric node 210 .
- biometric node 210 retrieves the institution ID from a computer system located at or connected to the institution.
- biometric node 210 retrieves the institution ID from a smart card inserted into biometric node 210 .
- Exemplary method 600 then proceeds to step 670 , where biometric node 210 sends, to database 3 240 , the unique ID assigned by the institution to identify the user. Exemplary method then proceeds to step 680 , where exemplary method 600 stops.
- FIG. 7 is a flowchart of an exemplary embodiment of a method 700 for institution-level enrollment executed at a database, such as database 3 240 .
- Exemplary method 700 starts in step 710 and proceeds to step 720 , where database 3 240 receives the biometric random key from biometric node 210 .
- Exemplary method 700 then proceeds to step 730 , where database 3 240 receives the institution ID from biometric node 210 , and then to step 740 , where database 3 240 receives the unique ID identifying the user from biometric node 210 .
- exemplary method 700 After receiving the data in steps 720 , 730 , and 740 , exemplary method 700 proceeds to step 750 .
- database 3 240 stores the biometric random key.
- Exemplary method 700 then proceeds to step 760 , where database 3 240 stores the institution ID.
- exemplary method 700 proceeds to step 770 , where database 3 240 stores the unique ID.
- Exemplary method 700 then proceeds to step 780 , where exemplary method 700 stops.
- FIG. 8 is a flowchart of an exemplary embodiment of a method 800 for data aggregation executed at biometric node 210 . More particularly, in various exemplary embodiments, exemplary method 800 is executed by a user at a biometric node 210 to retrieve data from disparate sources and display the data on the biometric node 210 .
- Exemplary method 800 starts in step 805 and proceeds to step 810 , where biometric node 810 obtains a biometric reading from the user via a biometric input. More particularly, in various exemplary embodiments, the biometric input receives raw biometric data and encodes the raw data into a digital representation.
- Exemplary method 800 then proceeds to step 815 , where biometric node 210 retrieves the biometric random key using the raw biometric data. More particularly, in various exemplary embodiments, biometric node 210 sends the biometric data to database 1 220 , which searches for and returns the corresponding biometric random key.
- exemplary method 800 proceeds to step 820 , where biometric node 210 sends a request to a database, such as database 3 240 , for information required to access the data stored on institution databases 260 , 270 .
- this request includes the category of data required, such as banking or medical records.
- the request includes the name of a single institution or indicates that the institution information should be retrieved for all institutions.
- the data desired to be retrieved may be set via user input through a menu system on display 150 or using alphanumeric input 160 .
- the data desired to be retrieved may be set by inserting a smart card or other device into card slot 190 .
- exemplary method 800 After sending the request for institution information in step 820 , exemplary method 800 proceeds to step 825 , where biometric node 110 receives institution information from database 3 240 .
- the institution information is received from the database in response to processing performed by the database, as described in further detail below in connection with FIG. 9 .
- the information received from database 3 240 may include a list of institution IDs and the unique ID of the user at each of the institutions.
- exemplary method 800 proceeds to step 830 .
- step 830 When, in step 830 , it is determined that there are additional institution IDs contained in the institution information, exemplary method 800 proceeds to step 835 .
- biometric node 210 extracts the next institution ID and unique ID contained in the institution information.
- Exemplary method 800 then proceeds to step 840 , where biometric node 210 retrieves the institution name and digital address using the institution ID. More particularly, in various exemplary embodiments, biometric node 210 queries a database, such as database 4 250 , by sending the institution ID to the database. The database, in turn, looks up the institution name and digital address corresponding to the institution ID, then returns the institution name and digital address to biometric node 210 .
- Exemplary method 800 then proceeds to step 845 , where biometric node 210 retrieves the desired data from an institution database, such as institution database 1 260 or institution database 2 270 . More particularly, in various exemplary embodiments, biometric node 210 sends a request for data to the digital address of the institution database including the unique ID and, optionally, details regarding the desired data. The institution database, in turn, looks up the desired data and returns the data to biometric node.
- an institution database such as institution database 1 260 or institution database 2 270 . More particularly, in various exemplary embodiments, biometric node 210 sends a request for data to the digital address of the institution database including the unique ID and, optionally, details regarding the desired data. The institution database, in turn, looks up the desired data and returns the data to biometric node.
- exemplary method 800 After receiving the data in step 845 , exemplary method 800 proceeds to step 850 , where biometric node 210 adds the received data to a temporary data structure for later display. Alternatively, in various exemplary embodiments, biometric node 210 immediately displays the data as it is received and does not perform steps 850 and 855 . Exemplary method 800 then returns to step 830 , where biometric node 210 determines whether additional institution IDs were included in the institution information.
- step 830 When, in step 830 , it is determined that there are no more institution IDs contained in the data received from the database, exemplary method 830 proceeds to step 850 .
- biometric node 210 accesses the data structure containing the aggregated data and displays this data to the user.
- biometric node 210 displays the data to the user via display 150 or via a display connected to biometric node 210 .
- biometric node 210 then clears the temporary data structure containing the aggregated data from memory.
- Exemplary method 800 then proceeds to step 860 , where exemplary method 800 stops.
- FIG. 9 is a flowchart of an exemplary embodiment of a method 900 for data aggregation executed at a database.
- exemplary method 900 is executed at database 3 240 upon receipt of an institution information request from a biometric node 210 .
- Exemplary method 900 starts in step 910 and proceeds to step 920 , where database 3 240 receives a user request for institution information from biometric node 210 , the request including a biometric random key of the user. Exemplary method 900 then proceeds to step 930 , where database 3 240 parses the request. More particularly, in various exemplary embodiments, database 3 240 processes the request to determine what information the user has requested. Thus, database 3 240 may parse the request to determine the category of data, type of institutions, or any other parameters specified by the user.
- exemplary method 900 proceeds to step 940 , where database 3 240 retrieves one or more institution IDs and corresponding unique IDs. More particularly, in various exemplary embodiments, database 3 240 accesses the data corresponding to the biometric random key received with the request. Based on the parsed request, database 3 240 retrieves, from this data, the institution IDs and unique IDs requested by the user.
- exemplary method 900 proceeds to step 950 , where database 3 240 sends the retrieved data to biometric node 210 .
- Exemplary method 900 then proceeds to step 960 , where exemplary method 900 stops.
- FIG. 10 is a schematic diagram of an exemplary embodiment of an anonymous association system 1000 including multiple biometric nodes.
- anonymous association system 1000 includes biometric node 1 1010 , biometric node 2 1020 , biometric node 3 1030 , biometric node 4 1040 , anonymous association databases 1050 , institution database 1 1060 , and institution database 2 1070 .
- biometric nodes 1010 , 1020 , 1030 , 1040 are centrally located devices that communicate with each of the databases 1050 , 1060 , 1070 .
- one or more of biometric nodes 1010 , 1020 , 1030 , 1040 is a standalone device including features described above with reference to biometric node 100 .
- one or more of biometric nodes 1010 , 1020 , 1030 , 1040 is a PC connected to a biometric node 100 .
- each of biometric nodes 1010 , 1020 , 1030 , 1040 may exchange data and messages with all other biometric nodes via TCP/IP, Bluetooth, or any other protocol.
- TAS databases 1050 are a collection of one or more databases that store data implementing the functionality of anonymous association system 1000 .
- TAS databases 1050 correspond to database 1 220 , database 2 230 , database 3 240 , and database 4 250 , described in further detail above with reference to FIG. 2 .
- institution database 1 1060 and institution database 2 1070 are databases operated by institutions.
- databases 1060 , 1070 store one or more fields of data in association with a value uniquely identifying an individual.
- anonymous association system 200 includes any number of biometric nodes or institutional databases.
- FIG. 11 is a flowchart of an exemplary embodiment of a method 1100 for performing an action requiring multiple levels of authorization.
- method 1100 is executed at a biometric node such as biometric node 1 1010 , biometric node 2 1020 , biometric node 3 1030 , or biometric node 4 1040 .
- Exemplary method 1100 starts in step 1100 and proceeds to step 1110 , where the biometric node receives a request for an action from a user.
- the requested action is the display of aggregated data at the biometric node.
- the requested action may be any other action requiring multiple levels of authorization, including, but not limited to, conducting large financial transactions, gaining entrance to a high security area, and negotiating child custody authorization.
- exemplary method 1100 proceeds to step 1120 , where the biometric node obtains a biometric reading from the user.
- the biometric node then queries a database, such as one of TAS databases 1050 , to determine the biometric random key associated with the user.
- exemplary method 1100 proceeds to step 1130 , where the biometric node or another entity determines whether additional authorization is required to allow the requested action. More particularly, in various exemplary embodiments, the biometric node sends the biometric random key to a database, such as one of TAS databases 1050 , to retrieve security clearance information for the requested action. Alternatively, the security clearance information may be stored on the biometric node itself.
- the biometric node determines whether to request additional authorization.
- a biometric node may determine that, to allow a patient to view his or her medical records, a doctor at the hospital must first authorize the data transfer.
- a transfer of money over a predetermined amount may require authorization from both a bank clerk and a bank manager.
- an attempt to board an airplane by a parent in custody of a child may require authorization of the other parent.
- a transaction may be conducted in connection with an escrow asset, such that multiple parties must approve the transaction prior to allowing it to proceed.
- exemplary method 1100 proceeds to step 1140 , where the biometric node requests additional authorization. More particularly, in various exemplary embodiments, the biometric node sends a message to another biometric node requesting the authorization. The other biometric node, in turn, displays the requested authorization message to its user. It should be apparent that, using this method, a biometric node may request immediate authorization from another individual, regardless of his or her physical location. Alternatively, the biometric node may display a message on its own display indicating that additional authorization is required.
- the additional authorization requested by the biometric node includes a biometric reading from a person other than the user.
- the additional authorization requested is the insertion of a smart card or other device held by either the user or the institution.
- exemplary method 1100 proceeds to step 1150 , where the biometric node receives the requested authorization.
- Exemplary method 1100 then proceeds to step 1160 , where the biometric node verifies the received authorization information. More particularly, in various exemplary embodiments, the biometric node determines whether the received authorization matches the authorization required by the security clearance information obtained in step 1130 .
- exemplary method 1100 returns to step 1130 , where the biometric node determines whether additional authorization is required.
- exemplary method 1100 proceeds to step 1170 .
- the biometric node displays an error message indicating that the proper authentication was not received and that the requested action cannot be performed.
- Exemplary method 1100 then proceeds to step 1190 , where exemplary method 1100 stops.
- exemplary method 1100 proceeds to step 1180 , where the requested action is executed or allowed. More particularly, in various exemplary embodiments, the biometric node retrieves and displays the aggregated data, permits access to an area, or otherwise allows the requested action to proceed. Exemplary method 1100 then proceeds to step 1190 , where exemplary method 1100 stops.
- various exemplary embodiments utilize a biometric node that plays a pivotal role in the network to enable secure and non-persistent user identity aggregation from disparate sources.
- a biometric node that plays a pivotal role in the network to enable secure and non-persistent user identity aggregation from disparate sources.
- users may retrieve and view personal information on a single, integrated device based solely on the input of biometric data.
- the biometric node is not merely a passive participant in a database scheme, but rather an active hub or node for identity aggregation and association.
- the use of a network of biometric nodes allows for instantaneous multi-party authorization, without the need to obtain a password or other form of authorization.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Biomedical Technology (AREA)
- Collating Specific Patterns (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Various exemplary embodiments relate to an anonymous database system. The system includes a plurality of biometric nodes in communication with one another. Each of the plurality of biometric nodes includes a biometric input that receives biometric data from a user. The system also includes at least one central database in communication with the plurality of biometric nodes; and a plurality of institution databases in communication with the plurality of biometric nodes. A first node of the plurality of biometric nodes is configured to receive a message from a second node of the plurality of biometric nodes, the message requesting authorization of data access by the second node. Various embodiments relate to a method for performing an action requiring multiple levels of authentication using an anonymous database system.
Description
- This application is a divisional of parent U.S. application Ser. No. 12/081,070 filed on Apr. 10, 2008. The entire disclosure of the prior application is hereby incorporated by reference herein in its entirety.
- 1. Field of the Invention
- This invention relates generally to a device and related systems and methods for anonymously storing and accessing data utilizing biometrics.
- 2. Description of Related Art
- Identity management systems typically serve two fundamental purposes, authentication and authorization. Authentication refers to the process used to verify a person's identity. In other words, verifying that a person is who they claim to be. Authorization, on the other hand, refers to the process of establishing access privileges granted to the authenticated individual. Authentication and authorization form the cornerstones of traditional identity management.
- In data intensive industries, such as banking, the association of data to an authenticated individual is of enormous importance. Consider, for example, an individual who desires to deposit a paycheck using an automated teller machine (ATM). In this situation, it is critical to the bank and the individual that the deposit be properly routed to the account associated with the individual. The banking industry presently utilizes a two-factor authentication system to verify the identity of the individual making the deposit. More specifically, in order to be properly authenticated, the individual must present an ATM card and a personalized secret code.
- Having confidently verified the individual, the financial institution and the individual are reassured that funds are transferred to the correct account belonging to the authenticated individual. In addition to authentication, however, the financial institution must verify that the individual is authorized to conduct a transaction. More specifically, although the individual is verified to be the person he or she claims to be, the institution must make sure that the specific transaction to be conducted is allowed. For example, the individual would have to be authorized to make a withdrawal from an account. As another example, the bank may place a predetermined cap on withdrawals, such that the individual is not authorized to make a withdrawal from the account greater than the cap.
- Authentication and authorization play a pivotal role in everyday life. From conducting financial transactions to logging into a computer network, authentication and authorization play a dual and intertwined role central to identity management in data intensive industries. There are, however, inherent problems with the systems currently used to implement authentication and authorization.
- Classic database models used for authentication and authorization utilize a spoke and hub data arrangement, in which the individual identity rests at the center with associated ancillary data linked to that individual identity. Consequently, the relationships among ancillary or spoke-level data are managed via the central or hub-level individual identity. While occasional relationships among ancillary or spoke level data may exist or be created, these relationships remain localized. Therefore, in order to make the data stored at the ancillary or spoke level useful, it must be combined with data via the central or hub-level database. More particularly, the central or hub-level database contains information identifying individuals used to enable combination of data from multiple localized databases. Thus, successfully combining ancillary data depends on the ability to uniquely identify the individual at the center of the hub.
- The requirement of combining data from multiple ancillary data sources is illustrated in the retrieval of credit scores. While an individual bank may be able to associate various accounts held by a client at its own institution, the bank typically has no way to associate the accounts with the client's accounts at other institutions. Credit reporting agencies, on the other hand, utilize individual identity fields, such as a social security number, to connect account histories and behavior from multiple financial institutions into a single hub and spoke data model. Again, the efficacy of this service relies on the credit reporting agency's ability to uniquely identify the individual account holder.
- In present systems, unfortunately, the need to identify the individual raises a number of privacy concerns. In many of these systems, the information used to uniquely identity the individual, such as social security numbers, addresses, and phone numbers, can be tied back to an individual with confidence. Thus, given the potential, if not certainty, of security failure in any Internet connected system, the individual's identity and important private data, such as financial and medical records, are at risk.
- Accordingly, there is a need for a new model of authentication and authorization that allows for authentication of an individual with a high degree of certainty, while eliminating the possibility of discovering the individual's true identity from the central hub. More particularly, there is a need for a device that aggregates and associates private data from multiple databases, while authenticating each individual using data that, if intercepted or discovered, would fail to reveal the identity of the individual.
- The foregoing objects and advantages of the invention are illustrative of those that can be achieved by the various exemplary embodiments and are not intended to be exhaustive or limiting of the possible advantages which can be realized. Thus, these and other objects and advantages of the various exemplary embodiments will be apparent from the description herein or can be learned from practicing the various exemplary embodiments, both as embodied herein or as modified in view of any variation that may be apparent to those skilled in the art. Accordingly, the present invention resides in the novel methods, arrangements, combinations, and improvements herein shown and described in various exemplary embodiments.
- In light of the present need for an anonymous association system utilizing biometrics, a brief summary of various exemplary embodiments is presented. Some simplifications and omissions may be made in the following summary, which is intended to highlight and introduce some aspects of the various exemplary embodiments, but not to limit the scope of the invention. Detailed descriptions of a preferred exemplary embodiment adequate to allow those of ordinary skill in the art to make and use the inventive concepts will follow in later sections.
- In various exemplary embodiments, an anonymous association system utilizing biometrics provides the ability to aggregate and associate data about individuals without knowing or being able to deduce who they are. Although biometrics can be tied back to a unique individual with a very high degree of certainty, biometrics do not, by themselves, identify the individual without other individually identifiable information being associated with those biometrics. More particularly, various exemplary embodiments operate on the premise that a biometric marker, such as a finger print, may be used in an indirect fashion to create a matrix of associations among an individual's ancillary data elements. In this manner, identifying information is not associated with the biometric marker or identifying information held at the central hub.
- Accordingly, in various exemplary embodiments, a device for interaction with an anonymous database system comprises: a biometric input that receives biometric data from a user; a communicator configured to retrieve, using the biometric data, a key stored in a first enrollment process, retrieve, using the key, an institution identifier and a user identifier stored in a second enrollment process, and retrieve user data from an institution database corresponding to the institution identifier; and a display that displays the retrieved user data.
- Furthermore, in various exemplary embodiments, a method of enrolling a user in an anonymous database system comprises: performing a first enrollment process by interacting with a user, the first enrollment process comprising: receiving first biometric data from the user, and storing, in a first database, the first biometric data in association with a key; and performing a second enrollment process by interacting with an institution, the second enrollment process comprising: verifying the identity of the user at the institution, receiving second biometric data from the user, retrieving the key from the first database using the second biometric data, and storing, in a second database, the key, an identifier uniquely identifying the institution, and an identifier uniquely identifying the user at the institution.
- In addition, in various exemplary embodiments, an anonymous database system comprises: a plurality of biometric nodes in communication with one another, each of the plurality of biometric nodes comprising a biometric input that receives biometric data from a user; at least one central database in communication with the plurality of biometric nodes; and a plurality of institution databases in communication with the plurality of biometric nodes, wherein a first node of the plurality of biometric nodes is configured to receive a message from a second node of the plurality of biometric nodes, the message requesting authorization of data access by the second node.
- Finally, in various exemplary embodiments, a method for performing an action requiring multiple levels of authentication comprises: receiving a request to perform an action from a first user operating a first biometric node; receiving biometric data from the user; determining, using the biometric data, whether additional authorization is required to allow the requested action to proceed; sending a request for additional authorization to a second biometric node when additional authorization is required; receiving authorization data at the second biometric node; and allowing the requested action to proceed.
- In order to better understand various exemplary embodiments, reference is made to the accompanying drawings, wherein:
-
FIG. 1 is a perspective view of an exemplary embodiment of a biometric node; -
FIG. 2 is a schematic diagram of an exemplary embodiment of an anonymous association system using biometrics; -
FIG. 3 is a flowchart of an exemplary embodiment of a method for person-level enrollment executed at a biometric node; -
FIG. 4 is a flowchart of an exemplary embodiment of a method for person-level enrollment executed at a first database; -
FIG. 5 is a flowchart of an exemplary embodiment of a method for person-level enrollment executed at a second database; -
FIG. 6 is a flowchart of an exemplary embodiment of a method for institution-level enrollment executed at a biometric node; -
FIG. 7 is a flowchart of an exemplary embodiment of a method for institution-level enrollment executed at a database; -
FIG. 8 is a flowchart of an exemplary embodiment of a method for data aggregation executed at a biometric node; -
FIG. 9 is a flowchart of an exemplary embodiment of a method for data aggregation executed at a database; -
FIG. 10 is a schematic diagram of an exemplary embodiment of an anonymous association system including multiple biometric nodes; and -
FIG. 11 is a flowchart of an exemplary embodiment of a method for performing an action requiring multiple levels of authorization. - Referring now to the drawings, in which like numerals refer to like components or steps, there are disclosed broad aspects of various exemplary embodiments.
-
FIG. 1 is a perspective view of an exemplary embodiment of abiometric node 100.Biometric node 100 includesbiometric input 110,biometric indicator 120,communicator 130,connection indicator 140,display 150,alphanumeric input 160,power connector 170,computer interface 180, andcard slot 190. - In various exemplary embodiments,
biometric input 110 is a component configured to obtain a biometric reading to uniquely identify an individual. Thus, in various exemplary embodiments,biometric input 110 is a fingerprint reader. Accordingly, when an individual presses a thumb or finger againstbiometric input 110,biometric input 110 scans the thumb or finger and encodes the reading into a digital representation of the biometric. It should be apparent that any encoding method known to those of ordinary skill in the art may be utilized to encode the biometric data. Furthermore, the encoding algorithm utilized bybiometric input 110 may be updated using a software or firmware upgrade. - It should also be apparent that although shown as a fingerprint reader,
biometric input 110 may be any device capable of analyzing one or more physiological or behavioral characteristics that uniquely identify an individual. Thus, in various exemplary embodiments,biometric input 110 is instead a palm print reader, retina scanner, iris scanner, face recognition device, or any other device that reads unique physical characteristics of an individual. In addition,biometric input 110 may be a device that analyzes a DNA-containing sample, such as blood, hair, or saliva. Alternatively, in various exemplary embodiments,biometric input 110 is a microphone that receives a voice sample, which may in turn be used to identify the individual. Furthermore, to provide additional security, two or more biometrics may be used in combination. - Although illustrated as integrated into
biometric node 100, in various exemplary embodiments,biometric input 110 is a separate device connected tobiometric node 100 using any interface including, but not limited to, Universal Serial Bus (USB), FireWire, and Wi-Fi. Alternatively,biometric input 110 may be a replaceable module that integrates directly intobiometric node 100. Accordingly, in these embodiments,biometric input 110 may be replaced in the event of damage or other failure. - In various exemplary embodiments,
biometric indicator 120 displays the current status ofbiometric input 110. Thus,biometric indicator 120 may be a Light Emitting Diode (LED) that changes colors to indicate the status of a biometric scan. For example,biometric indicator 120 may be unlit whenbiometric input 110 is inactive, yellow whenbiometric input 110 is obtaining a biometric reading, green whenbiometric input 110 successfully obtains a biometric reading, and red when an attempted biometric reading fails. Alternatively, in various exemplary embodiments,biometric indicator 120 is an icon, text, or other information field displayed ondisplay 150. - In various exemplary embodiments,
communicator 130 exchanges data with one or more databases, described in further detail below with reference toFIG. 2 . Thus, in various exemplary embodiments,communicator 130 is an antenna capable of sending and receiving data via a wireless connection over a Transmission Control Protocol/Internet Protocol (TCP/IP) network. Alternatively, in various exemplary embodiments,communicator 130 is an Ethernet jack or any other interface, wired or wireless, that allowsbiometric node 100 to communicate with an external database. It should be apparent that any protocol may be used for communication betweencommunicator 130 and the external database. - In various exemplary embodiments,
connection indicator 140 displays the current status of the connection betweenbiometric node 100 and one or more external databases. Thus,connection indicator 140 may be an LED that changes colors to indicate the status of the connection. For example,biometric indicator 120 may be yellow whencommunicator 130 is attempting to establish a connection with the external database, green whencommunicator 130 has successfully established a connection, and red whencommunicator 130 has failed to establish a connection. Alternatively,connection indicator 140 may be an icon, text, or other information field displayed ondisplay 150. - In various exemplary embodiments,
display 150 is used to convey information to the user ofbiometric node 100. As described in further detail below with reference toFIG. 8 ,display 150 displays data received bycommunicator 130 from one or more external databases. Thus, in various exemplary embodiments,display 150 is a Liquid Crystal Display (LCD). It should be apparent, however, that any technology suitable for displaying information to a user may be used. Furthermore, it should be apparent that, in various exemplary embodiments,display 150 may instead be an external display connected to abiometric node 100 without a display. - Moreover, in various exemplary embodiments,
display 150 is a touch screen display that enables a user to input commands by touching the surface ofdisplay 150. Thus, in these embodiments,display 150 may output buttons or objects that may be pressed by the user to execute a command. For example,display 150 may output a button labeled, “Show Data,” which allows a user to retrieve data based on a biometric entered intobiometric input 110. - In various exemplary embodiments,
alphanumeric input 160 is used to receive data and commands from a user ofbiometric node 100. Accordingly,alphanumeric input 160 may receive a personal identification number (PIN), other optional data, and commands to transfer and/or display data. Thus, in various exemplary embodiments,alphanumeric input 160 is an array of buttons arranged in a telephone-style layout, such that each button is used for a number and multiple letters. Alternatively, in various exemplary embodiments,alphanumeric input 160 is an array of buttons arranged in a QWERTY layout. Although illustrated as separate fromdisplay 150, it should be apparent thatalphanumeric input 160 may instead be integrated intodisplay 150 using touch screen technology. - In various exemplary embodiments,
power connector 170 provides an interface for connectingbiometric node 100 to a power source. Thus, in various exemplary embodiments,power connector 170 is a male pin that receives a female connector of an AC adapter. Accordingly,biometric node 100 may be connected to a power source viapower connector 170 to charge a battery (not shown) ofbiometric node 100. - In various exemplary embodiments,
computer interface 180 provides a connection betweenbiometric node 100 and a personal computer (PC) of the user (not shown). Accordingly,computer interface 180 may be a USB slot, FireWire input, serial input, wireless interface, or any other interface that may be used to connect an external device to a PC. Thus, althoughbiometric node 100 may operate as a standalone device,biometric node 100 may also be connected to a PC to allow data exchange with the PC. Accordingly, it should be apparent that, in various exemplary embodiments,biometric node 100 does not directly communicate with the external databases, but instead exchanges data with the external databases using a PC as a conduit. - In various exemplary embodiments,
card slot 190 provides an interface for receiving a smart card, flash memory device, or any other external device that may store information. Thus, in various exemplary embodiments,card slot 190 enables a user to insert a smart card or other device to assist in authorization. For example,biometric node 100 may determine that a higher level authorization is necessary to allow access to the data and require the user to insert a smart card prior to aggregating the data. Alternatively, a smart card or other device may be inserted intocard slot 190 to indicate the data the user desires to retrieve. For example, a user may insert a card associated with a bank to retrieve financial records, while inserting a card associated with a hospital to retrieve medical records. - It should be apparent that the above-described functionality of
biometric node 100 may be implemented using a number of alternatives. Thus, in various exemplary embodiments,biometric node 100 includes a complementary metal oxide semiconductor (CMOS) chip, which may include embedded logic for controlling the operation of the components ofbiometric node 100. In these embodiments, the operation ofbiometric node 100 may be updated utilizing a firmware update. Alternatively, in various exemplary embodiments, exchange of data ofbiometric node 100 is controlled by a customized software installation on a PC or using a web portal to transfer data in conjunction with the data obtained by the biometric device. Thus, in these embodiments, the operation ofbiometric node 100 may be updated utilizing a software and/or firmware update. -
FIG. 2 is a schematic diagram of an exemplary embodiment of ananonymous association system 200.Anonymous association system 200 includesbiometric node 210,database 1 220,database 2 230,database 3 240,database 4 250,institution database 1 260, andinstitution database 2 270. - In various exemplary embodiments,
biometric node 210 is a standalone device including features described above with reference tobiometric node 100. Alternatively,biometric node 210 may be a PC operated in conjunction withbiometric node 100. In various exemplary embodiments,biometric node 210 communicates with each of thedatabases databases biometric node 210. Accordingly, the URL alias may be modified by firmware update ofbiometric node 210, preferably utilizing public key encryption to prevent unauthorized firmware upgrades. - In various exemplary embodiments,
biometric node 210 is a device operated by a user. Thus,biometric node 210 may be operated by a user to perform a person-level enrollment process, as described in further detail below with reference toFIGS. 3-5 . Furthermore,biometric node 210 may be operated by a user to retrieve and aggregate data, as described in further detail below with reference toFIGS. 8 and 9 . - Alternatively, in various exemplary embodiments,
biometric node 210 is instead a device operated by an institution. Thus,biometric node 210 may be utilized by an institution to perform an institution-level enrollment process, as described in further detail below with reference toFIGS. 6 and 7. It should be apparent, however, that both person-level enrollment and institution-level enrollment may be performed utilizing a user device. - In various exemplary embodiments,
database 1 220,database 2 230,database 3 240, anddatabase 4 250 are centrally located databases used to provide association and aggregation services. In various exemplary embodiments,databases databases institution databases databases anonymous association system 200 remain concealed. - In various exemplary embodiments,
database 1 220 stores raw biometric data provided by a user in association with a biometric random key. Thus, the raw biometric data may be a fingerprint data set, retinal scan data set, or any other biometric data obtained bybiometric input 110. Furthermore, biometric random key may be a globally unique identifier associated with the raw biometric data. Accordingly, in various exemplary embodiments, there is a one-to-one correspondence between raw biometric data and biometric random keys, such that the biometric random key for a particular user may be obtained by performing a search using the biometric data. - Furthermore, in various exemplary embodiments,
database 2 230 stores the biometric random key in association with a PIN random key and other optional data. Thus, in various exemplary embodiments, when a user provides a PIN along with the biometric data,database 2 230 generates a hash-encrypted PIN random key and stores the PIN random key in association with the biometric random key. It should be apparent, however, that any suitable encryption algorithm may be utilized to generate the encrypted random key. - In various exemplary embodiments,
database 3 240 stores the biometric random key in association with several pieces of data. This data may include an institution ID, which uniquely identifies an institution participating inanonymous association system 200. Thus, each institution ID may identify an institution that stores records in a database, such asinstitution database 1 260 orinstitution database 2 270. For example, the institution ID could identify a bank, hospital, government agency, or any other entity that provides access to data throughanonymous association system 200. - In addition, the data stored in
database 3 240 may include a unique ID, which may uniquely identify, within the institution, the individual associated with the biometric random key. For example, the unique ID may be an account number, random number, or any other alphanumeric value that uniquely identifies the individual at the institution. - In addition, the data stored in
database 3 240 may include security clearance information or additional authorization information. Thus, the security clearance information could indicate that the data stored in the institution for an individual identified by the unique ID may only be accessed when accompanied by an additional biometric or other piece of information. For example, the security clearance information may indicate that a biometric from a second person, such as a manager or employee, is required to permit access to the data. Alternatively, the security clearance information may indicate that a smart card must be inserted intocard slot 190 or that a password or other alphanumeric value must be entered. - In various exemplary embodiments,
database 4 250 is an institutional dictionary that stores information used to access the data stored ininstitutional databases database 4 250 may store an institution ID identifying a participating institution, the name of the institution, and a digital address identifying the location of the associated institutional database. For example, the digital address may include a URL, IP address, and any other information necessary to connect to the database, including port numbers, passwords, and the like. The URL, IP address, and other information may be pre-registered for each institution, manually configured, or automatically configured. - In various exemplary embodiments,
institution database 1 260 andinstitution database 2 270 are databases operated by institutions. Thus, in various exemplary embodiments,databases Databases - Although illustrated as including four centrally located
databases institutional databases databases databases anonymous association system 200 includes any number of institutional databases. Moreover,anonymous association system 200 may include additional databases or data fields omitted fromFIG. 2 for the sake of simplicity. -
FIG. 3 is a flowchart of an exemplary embodiment of amethod 300 for person-level enrollment executed at abiometric node 210.Exemplary method 300 starts instep 310 and proceeds to step 320, wherebiometric node 210 receives biometric data from a user. Thus, in various exemplary embodiments,biometric node 210 obtains a biometric reading from the user viabiometric input 110. More particularly, in various exemplary embodiments,biometric input 110 receives raw biometric data and encodes the raw data into a digital representation. - After obtaining the biometric data in
step 320,exemplary method 300 proceeds to step 330, wherebiometric node 210 sends the biometric data to a centralized database ofanonymous association system 200, such asdatabase 1 220. The processing performed by this database is described in further detail below with reference toFIG. 4 . -
Exemplary method 300 then proceeds to step 340, wherebiometric node 210 optionally receives additional data from the user. More particularly, in various exemplary embodiments,biometric node 210 acquires a PIN, password, or other alphanumeric key from user viaalphanumeric input 160, an attached keyboard, or some other input device. - After obtaining the optional data in
step 340,exemplary method 300 proceeds to step 350, wherebiometric node 210 sends the optional data to a centralized database ofanonymous association system 200, such asdatabase 2 230. The processing performed by this database is described in further detail below with reference toFIG. 5 . -
Exemplary method 300 then proceeds to step 360, wherebiometric node 210 receives one or more keys from the corresponding databases. Thus, in response to sending biometric data todatabase 1 220,biometric node 210 receives a biometric random key fromdatabase 1 220. Furthermore, whenbiometric node 210 sends optional data todatabase 2 230,biometric node 210 receives a PIN random key fromdatabase 2 230. Generation of these keys is described in further detail below with reference toFIGS. 4 and 5 . After receiving one or more keys instep 360,exemplary method 300 proceeds to step 370, whereexemplary method 300 stops. -
FIG. 4 is a flowchart of an exemplary embodiment of amethod 400 for person-level enrollment executed at a first database, such asdatabase 1 220.Exemplary method 400 starts instep 410 and proceeds to step 420, wheredatabase 1 220 receives biometric data frombiometric node 210.Exemplary method 400 then proceeds to step 430, wheredatabase 1 220 performs a query to determine whether the received biometric data is associated with a new user. - When, in
step 430, it is determined that the user has not yet enrolled with theanonymous association system 200,exemplary method 400 proceeds to step 440, wheredatabase 1 220 stores the biometric data.Exemplary method 400 then proceeds to step 450, wheredatabase 1 220 generates a biometric random key. It should be apparent that, as described in further detail above with reference toFIG. 2 , biometric random key may be a globally unique identifier associated with the biometric data. After generating the biometric random key instep 450,exemplary method 400 proceeds to step 460, wheredatabase 1 220 stores the biometric random key in association with the biometric data. - On the other hand, when, in
step 430, it is determined that the user has already performed person-level enrollment and is therefore not a new user,exemplary method 400 proceeds to step 470. Instep 470,database 1 220 performs a query to look up the corresponding biometricrandom key 210 using the biometric data received frombiometric node 210. - After storing the biometric random key in
step 460 or looking up the biometric random key instep 470,exemplary method 400 proceeds to step 480, wheredatabase 1 220 returns the biometric random key tobiometric node 210.Exemplary method 400 then proceeds to step 490, whereexemplary method 400 stops. -
FIG. 5 is a flowchart of an exemplary embodiment of amethod 500 for person-level enrollment executed at a database, such asdatabase 2 230.Exemplary method 500 starts instep 510 and proceeds to step 520, wheredatabase 2 230 receives optional data frombiometric node 210, such as a PIN or password. -
Exemplary method 500 then proceeds to step 530, wheredatabase 2 230 receives the biometric random key. It should be apparent that the biometric random key may be sent fromdatabase 1 220 todatabase 2 230 when the biometric random key is generated. Alternatively, the biometric random key may be sent frombiometric node 210 todatabase 2 230 afterdatabase 1 220 returns the key tobiometric node 210. - After receiving the biometric random key in
step 530,exemplary method 500 proceeds to step 540, wheredatabase 2 230 stores the biometric random key.Exemplary method 500 then proceeds to step 550, wheredatabase 2 230 optionally encrypts, then stores the optional data in association with the biometric random key. - After storing the biometric random key and optionally encrypting and storing the optional data,
exemplary method 500 proceeds to step 560, wheredatabase 2 230 generates a PIN random key. It should be apparent that, as described in further detail above with reference toFIG. 2 , PIN random key may be a globally unique identifier associated with the PIN or password. After generating the PIN random key instep 560,exemplary method 500 proceeds to step 570, wheredatabase 2 230 stores the PIN random key in association with the biometric random key and other data. - After generating and storing the PIN random key,
exemplary method 500 proceeds to step 580, wheredatabase 2 230 optionally returns the PIN random key tobiometric node 210.Exemplary method 500 then proceeds to step 590, whereexemplary method 500 stops. -
FIG. 6 is a flowchart of an exemplary embodiment of amethod 600 for institution-level enrollment executed atbiometric node 210.Exemplary method 600 starts instep 610 and proceeds to step 620, where the user's identity is verified. - In various exemplary embodiments,
biometric node 210 is operated by an institution, such that the user seeking to initiate institution-level enrollment is physically present at one of the institution's locations. Thus, in such embodiments, instep 620, the institution may perform a procedure to verify that the user is the person he or she purports to be. For example, an employee of the institution may verify the user's identity by performing a process including, but not limited to, examining a photo ID, requiring the person to provide personal information, and/or obtaining a signature. Furthermore, the operator ofanonymous association system 200 may establish minimum standards an institution must observe in verifying the identity of the user. - Alternatively, in various exemplary embodiments,
biometric node 210 is operated by a user seeking to initiate institution-level enrollment at an institution for which there is no readily-accessible physical location. For example, a user may desire to access his or her data stored at a web-based institution, such as a credit agency or online bank. In such embodiments, several methods of verifying the user's identity may be used. - First, in various exemplary embodiments, the user opens or logs into an account at the institution using
biometric node 210, a personal computer, or any other web-enabled device. By verifying that the user has proper authentication to access his or her account, the institution may be reasonably certain that the actual user is the registered owner of the account. As an alternative to web-based identify verification, the institution may instead rely on in-person identity verification conducted at a proxy institution. Thus, for example, a user may perform institution-level enrollment in person at a bank and simultaneously perform institution-level enrollment for the web-based institution. - After verifying the user's identity in
step 620,exemplary method 600 proceeds to step 630, wherebiometric node 210 obtains a biometric reading from the user via a biometric input. More particularly, in various exemplary embodiments, the biometric input receives raw biometric data and encodes the raw data into a digital representation. -
Exemplary method 600 then proceeds to step 640, wherebiometric node 210 retrieves the biometric random key. In various exemplary embodiments, as described in further detail above with reference toFIG. 4 ,biometric node 210 sends the biometric data todatabase 1 220, which searches for a biometric random key associated with the biometric data. Whendatabase 1 220 does not find an existing entry,database 1 220 enrolls the user, as described in further detail above with reference tosteps FIG. 4 . Alternatively, whendatabase 1 220 finds an existing entry,database 1 220 simply looks up the biometric random key, as described in further detail above with reference to step 470 ofFIG. 4 . In either case,database 1 220 returns the biometric random key tobiometric node 210. - After retrieving the biometric random key in
step 640,exemplary method 600 proceeds to step 650, wherebiometric node 210 sends the retrieved biometric random key todatabase 3 240.Exemplary method 600 then proceeds to step 660, wherebiometric node 210 sends, todatabase 3 240, the institution ID of the institution at which the user is registering. More particularly, in various exemplary embodiments, the on-chip software ofbiometric node 210 is embedded with the institution ID, such that the institution ID can be retrieved frombiometric node 210. Alternatively, in various exemplary embodiments, an employee or other agent of the institution enters the institution ID intobiometric node 210. As a third alternative, in various exemplary embodiments,biometric node 210 retrieves the institution ID from a computer system located at or connected to the institution. Finally, as a fourth alternative, in various exemplary embodiments,biometric node 210 retrieves the institution ID from a smart card inserted intobiometric node 210. -
Exemplary method 600 then proceeds to step 670, wherebiometric node 210 sends, todatabase 3 240, the unique ID assigned by the institution to identify the user. Exemplary method then proceeds to step 680, whereexemplary method 600 stops. -
FIG. 7 is a flowchart of an exemplary embodiment of amethod 700 for institution-level enrollment executed at a database, such asdatabase 3 240.Exemplary method 700 starts instep 710 and proceeds to step 720, wheredatabase 3 240 receives the biometric random key frombiometric node 210.Exemplary method 700 then proceeds to step 730, wheredatabase 3 240 receives the institution ID frombiometric node 210, and then to step 740, wheredatabase 3 240 receives the unique ID identifying the user frombiometric node 210. - After receiving the data in
steps exemplary method 700 proceeds to step 750. Instep 750,database 3 240 stores the biometric random key.Exemplary method 700 then proceeds to step 760, wheredatabase 3 240 stores the institution ID. Finally,exemplary method 700 proceeds to step 770, wheredatabase 3 240 stores the unique ID.Exemplary method 700 then proceeds to step 780, whereexemplary method 700 stops. - It should be apparent from the forgoing description that, although described above as two separate procedures, person-level enrollment and institution-level enrollment need not be performed at different locations or times. More particularly, if, while performing institution-level enrollment, it is discovered that the user has not yet performed person-level enrollment, the system may dynamically execute the person-level enrollment process prior to proceeding with the institution-level enrollment process.
-
FIG. 8 is a flowchart of an exemplary embodiment of amethod 800 for data aggregation executed atbiometric node 210. More particularly, in various exemplary embodiments,exemplary method 800 is executed by a user at abiometric node 210 to retrieve data from disparate sources and display the data on thebiometric node 210. -
Exemplary method 800 starts instep 805 and proceeds to step 810, wherebiometric node 810 obtains a biometric reading from the user via a biometric input. More particularly, in various exemplary embodiments, the biometric input receives raw biometric data and encodes the raw data into a digital representation. -
Exemplary method 800 then proceeds to step 815, wherebiometric node 210 retrieves the biometric random key using the raw biometric data. More particularly, in various exemplary embodiments,biometric node 210 sends the biometric data todatabase 1 220, which searches for and returns the corresponding biometric random key. - After receiving the biometric random key,
exemplary method 800 proceeds to step 820, wherebiometric node 210 sends a request to a database, such asdatabase 3 240, for information required to access the data stored oninstitution databases display 150 or usingalphanumeric input 160. Alternatively, the data desired to be retrieved may be set by inserting a smart card or other device intocard slot 190. - After sending the request for institution information in
step 820,exemplary method 800 proceeds to step 825, wherebiometric node 110 receives institution information fromdatabase 3 240. In various exemplary embodiments, the institution information is received from the database in response to processing performed by the database, as described in further detail below in connection withFIG. 9 . Thus, the information received fromdatabase 3 240 may include a list of institution IDs and the unique ID of the user at each of the institutions. After receiving the institution information,exemplary method 800 proceeds to step 830. - When, in
step 830, it is determined that there are additional institution IDs contained in the institution information,exemplary method 800 proceeds to step 835. Instep 835,biometric node 210 extracts the next institution ID and unique ID contained in the institution information.Exemplary method 800 then proceeds to step 840, wherebiometric node 210 retrieves the institution name and digital address using the institution ID. More particularly, in various exemplary embodiments,biometric node 210 queries a database, such asdatabase 4 250, by sending the institution ID to the database. The database, in turn, looks up the institution name and digital address corresponding to the institution ID, then returns the institution name and digital address tobiometric node 210. -
Exemplary method 800 then proceeds to step 845, wherebiometric node 210 retrieves the desired data from an institution database, such asinstitution database 1 260 orinstitution database 2 270. More particularly, in various exemplary embodiments,biometric node 210 sends a request for data to the digital address of the institution database including the unique ID and, optionally, details regarding the desired data. The institution database, in turn, looks up the desired data and returns the data to biometric node. - After receiving the data in
step 845,exemplary method 800 proceeds to step 850, wherebiometric node 210 adds the received data to a temporary data structure for later display. Alternatively, in various exemplary embodiments,biometric node 210 immediately displays the data as it is received and does not performsteps Exemplary method 800 then returns to step 830, wherebiometric node 210 determines whether additional institution IDs were included in the institution information. - When, in
step 830, it is determined that there are no more institution IDs contained in the data received from the database,exemplary method 830 proceeds to step 850. Instep 850,biometric node 210 accesses the data structure containing the aggregated data and displays this data to the user. Thus, in various exemplary embodiments,biometric node 210 displays the data to the user viadisplay 150 or via a display connected tobiometric node 210. In various exemplary embodiments, for added security,biometric node 210 then clears the temporary data structure containing the aggregated data from memory.Exemplary method 800 then proceeds to step 860, whereexemplary method 800 stops. -
FIG. 9 is a flowchart of an exemplary embodiment of amethod 900 for data aggregation executed at a database. In various exemplary embodiments,exemplary method 900 is executed atdatabase 3 240 upon receipt of an institution information request from abiometric node 210. -
Exemplary method 900 starts instep 910 and proceeds to step 920, wheredatabase 3 240 receives a user request for institution information frombiometric node 210, the request including a biometric random key of the user.Exemplary method 900 then proceeds to step 930, wheredatabase 3 240 parses the request. More particularly, in various exemplary embodiments,database 3 240 processes the request to determine what information the user has requested. Thus,database 3 240 may parse the request to determine the category of data, type of institutions, or any other parameters specified by the user. - After parsing the request in
step 930,exemplary method 900 proceeds to step 940, wheredatabase 3 240 retrieves one or more institution IDs and corresponding unique IDs. More particularly, in various exemplary embodiments,database 3 240 accesses the data corresponding to the biometric random key received with the request. Based on the parsed request,database 3 240 retrieves, from this data, the institution IDs and unique IDs requested by the user. - After retrieving the institution IDs and corresponding unique IDs in
step 940,exemplary method 900 proceeds to step 950, wheredatabase 3 240 sends the retrieved data tobiometric node 210.Exemplary method 900 then proceeds to step 960, whereexemplary method 900 stops. -
FIG. 10 is a schematic diagram of an exemplary embodiment of ananonymous association system 1000 including multiple biometric nodes. In various exemplary embodiments,anonymous association system 1000 includesbiometric node 1 1010,biometric node 2 1020,biometric node 3 1030,biometric node 4 1040,anonymous association databases 1050,institution database 1 1060, andinstitution database 2 1070. - In various exemplary embodiments,
biometric nodes databases biometric nodes biometric node 100. Alternatively, one or more ofbiometric nodes biometric node 100. It should be apparent that, in various exemplary embodiments, each ofbiometric nodes - In various exemplary embodiments,
TAS databases 1050 are a collection of one or more databases that store data implementing the functionality ofanonymous association system 1000. Thus, in various exemplary embodiments,TAS databases 1050 correspond todatabase 1 220,database 2 230,database 3 240, anddatabase 4 250, described in further detail above with reference toFIG. 2 . - In various exemplary embodiments,
institution database 1 1060 andinstitution database 2 1070 are databases operated by institutions. Thus, in various exemplary embodiments,databases - Although illustrated as including four
nodes institutional databases anonymous association system 200 includes any number of biometric nodes or institutional databases. -
FIG. 11 is a flowchart of an exemplary embodiment of amethod 1100 for performing an action requiring multiple levels of authorization. In various exemplary embodiments,method 1100 is executed at a biometric node such asbiometric node 1 1010,biometric node 2 1020,biometric node 3 1030, orbiometric node 4 1040. -
Exemplary method 1100 starts instep 1100 and proceeds to step 1110, where the biometric node receives a request for an action from a user. In various exemplary embodiments, the requested action is the display of aggregated data at the biometric node. Alternatively, the requested action may be any other action requiring multiple levels of authorization, including, but not limited to, conducting large financial transactions, gaining entrance to a high security area, and negotiating child custody authorization. - After receiving the request from the user,
exemplary method 1100 proceeds to step 1120, where the biometric node obtains a biometric reading from the user. In various exemplary embodiments, the biometric node then queries a database, such as one ofTAS databases 1050, to determine the biometric random key associated with the user. - After receiving the user biometric random key in
step 1120,exemplary method 1100 proceeds to step 1130, where the biometric node or another entity determines whether additional authorization is required to allow the requested action. More particularly, in various exemplary embodiments, the biometric node sends the biometric random key to a database, such as one ofTAS databases 1050, to retrieve security clearance information for the requested action. Alternatively, the security clearance information may be stored on the biometric node itself. - Based on the retrieved security clearance information, the biometric node determines whether to request additional authorization. Thus, for example, a biometric node may determine that, to allow a patient to view his or her medical records, a doctor at the hospital must first authorize the data transfer. As another example, a transfer of money over a predetermined amount may require authorization from both a bank clerk and a bank manager. As a third example, an attempt to board an airplane by a parent in custody of a child may require authorization of the other parent. As a fourth example, a transaction may be conducted in connection with an escrow asset, such that multiple parties must approve the transaction prior to allowing it to proceed.
- When, in
step 1130, it is determined that additional authorization is required,exemplary method 1100 proceeds to step 1140, where the biometric node requests additional authorization. More particularly, in various exemplary embodiments, the biometric node sends a message to another biometric node requesting the authorization. The other biometric node, in turn, displays the requested authorization message to its user. It should be apparent that, using this method, a biometric node may request immediate authorization from another individual, regardless of his or her physical location. Alternatively, the biometric node may display a message on its own display indicating that additional authorization is required. - In various exemplary embodiments, the additional authorization requested by the biometric node includes a biometric reading from a person other than the user. Alternatively, in various exemplary embodiments, the additional authorization requested is the insertion of a smart card or other device held by either the user or the institution.
- After requesting the additional authorization from the user,
exemplary method 1100 proceeds to step 1150, where the biometric node receives the requested authorization.Exemplary method 1100 then proceeds to step 1160, where the biometric node verifies the received authorization information. More particularly, in various exemplary embodiments, the biometric node determines whether the received authorization matches the authorization required by the security clearance information obtained instep 1130. - When, in
step 1160, the biometric node verifies the received authorization,exemplary method 1100 returns to step 1130, where the biometric node determines whether additional authorization is required. When, instep 1160, however, it is determined that the received authorization does not match the required authorization,exemplary method 1100 proceeds to step 1170. In various exemplary embodiments, instep 1170, the biometric node displays an error message indicating that the proper authentication was not received and that the requested action cannot be performed.Exemplary method 1100 then proceeds to step 1190, whereexemplary method 1100 stops. - When, in
step 1130, it is determined that all required authorization has been properly obtained,exemplary method 1100 proceeds to step 1180, where the requested action is executed or allowed. More particularly, in various exemplary embodiments, the biometric node retrieves and displays the aggregated data, permits access to an area, or otherwise allows the requested action to proceed.Exemplary method 1100 then proceeds to step 1190, whereexemplary method 1100 stops. - According to the forgoing, various exemplary embodiments utilize a biometric node that plays a pivotal role in the network to enable secure and non-persistent user identity aggregation from disparate sources. Through the use of such a biometric node, users may retrieve and view personal information on a single, integrated device based solely on the input of biometric data. Accordingly, in various exemplary embodiments, the biometric node is not merely a passive participant in a database scheme, but rather an active hub or node for identity aggregation and association. Furthermore, in various exemplary embodiments, the use of a network of biometric nodes allows for instantaneous multi-party authorization, without the need to obtain a password or other form of authorization.
- Although the various exemplary embodiments have been described in detail with particular reference to certain exemplary aspects thereof, it should be understood that the invention is capable of other embodiments and its details are capable of modifications in various obvious respects. As is readily apparent to those skilled in the art, variations and modifications can be affected while remaining within the spirit and scope of the invention. Accordingly, the foregoing disclosure, description, and figures are for illustrative purposes only and do not in any way limit the invention, which is defined only by the claims.
Claims (16)
1. An anonymous database system, the system comprising:
a plurality of biometric nodes in communication with one another, each of the plurality of biometric nodes comprising a biometric input that receives biometric data from a user;
at least one central database in communication with the plurality of biometric nodes; and
a plurality of institution databases in communication with the plurality of biometric nodes,
wherein a first node of the plurality of biometric nodes is configured to receive a message from a second node of the plurality of biometric nodes, the message requesting authorization of data access by the second node.
2. The anonymous database system according to claim 1 , wherein the at least one central database comprises a database that stores a set of data, each entry in the set of data comprising biometric data and a key identifying a corresponding user.
3. The anonymous database system of claim 2 , wherein the key is generated during a first enrollment process independently of the biometric data and stored in association with the biometric data.
4. The anonymous database system according to claim 1 , wherein the at least one central database comprises a database that stores a set of data, each entry in the set of data comprising a key identifying a user and a corresponding alphanumeric code.
5. The anonymous database system according to claim 1 , wherein the at least one central database comprises a database that stores a set of data, each entry in the set of data comprising a key identifying a user, an identifier uniquely identifying an institution, and an identifier uniquely identifying the user at the institution.
6. The anonymous database system according to claim 1 , wherein the at least one central database comprises a database that stores a set of data, each entry in the set of data comprising an identifier uniquely identifying an institution, a name of the institution, and a digital address identifying the location of an associated institution database.
7. The anonymous database system of claim 6 , wherein each entry in the set of data further comprises: security clearance information for the user at the institution.
8. The anonymous database system of claim 7 , wherein the security clearance information for the user at the institution includes a biometric random key of a second user required to authorize an action.
9. A method for performing an action requiring multiple levels of authentication, the method comprising:
receiving a request to perform an action from a first user operating a first biometric node;
receiving biometric data from the first user;
determining, using the biometric data, whether additional authorization is required to allow the requested action to proceed;
sending a request for additional authorization to a second biometric node when additional authorization is required;
receiving authorization data at the second biometric node; and
allowing the requested action to proceed.
10. The method for performing an action requiring multiple levels of authentication according to claim 9 , where the requested action is selected from the group consisting of aggregating data associated with the first user, gaining access to a restricted area, and transferring funds.
11. The method for performing an action requiring multiple levels of authentication according to claim 9 , further comprising accessing security clearance information to identify the second biometric node that will receive the request for additional authorization.
12. The method for performing an action requiring multiple levels of authentication according to claim 9 , wherein the authorization data is second biometric data obtained from a second user.
13. The method for performing an action requiring multiple levels of authentication according to claim 9 , wherein the authorization data is received from a card inserted into a card slot of the second biometric node.
14. The method of claim 9 , wherein the step of determining, using the biometric data, whether additional authorization is required comprises:
querying a database with the biometric data to obtain a biometric random key, the biometric random key generated during a first enrollment process independently of the biometric data and stored in association with the biometric data; and
retrieving security clearance information for the requested action based on the biometric random key.
15. The method of claim 14 , wherein the authorization data comprises second biometric data and the method further comprises:
querying the database with the second biometric data to obtain a second biometric random key, the second biometric random key generated during a first enrollment process independently of the second biometric data and stored in association with the second biometric data; and
determining whether the second biometric random key matches the security clearance information.
16. The method of claim 15 , wherein the security clearance information comprises a biometric random key of a second user required to provide authorization.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/667,109 US20130081145A1 (en) | 2008-04-10 | 2012-11-02 | Anonymous association system utilizing biometrics |
US15/631,752 US10270766B2 (en) | 2008-04-10 | 2017-06-23 | Anonymous association system utilizing biometrics |
US16/368,389 US10623404B2 (en) | 2008-04-10 | 2019-03-28 | Anonymous association system utilizing biometrics |
US16/812,876 US11115412B2 (en) | 2008-04-10 | 2020-03-09 | Anonymous association system utilizing biometrics |
US17/410,017 US11765161B2 (en) | 2008-04-10 | 2021-08-24 | Anonymous association system utilizing biometrics |
US18/447,658 US12069048B2 (en) | 2008-04-10 | 2023-08-10 | Anonymous association system utilizing biometrics |
US18/777,916 US20240372857A1 (en) | 2008-04-10 | 2024-07-19 | Anonymous association system utilizing biometrics |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/081,070 US8320638B2 (en) | 2008-04-10 | 2008-04-10 | Anonymous association system utilizing biometrics |
US13/667,109 US20130081145A1 (en) | 2008-04-10 | 2012-11-02 | Anonymous association system utilizing biometrics |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/081,070 Continuation US8320638B2 (en) | 2008-04-10 | 2008-04-10 | Anonymous association system utilizing biometrics |
US12/081,070 Division US8320638B2 (en) | 2008-04-10 | 2008-04-10 | Anonymous association system utilizing biometrics |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/631,752 Division US10270766B2 (en) | 2008-04-10 | 2017-06-23 | Anonymous association system utilizing biometrics |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130081145A1 true US20130081145A1 (en) | 2013-03-28 |
Family
ID=43353806
Family Applications (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/081,070 Active 2031-06-29 US8320638B2 (en) | 2008-04-10 | 2008-04-10 | Anonymous association system utilizing biometrics |
US13/667,109 Abandoned US20130081145A1 (en) | 2008-04-10 | 2012-11-02 | Anonymous association system utilizing biometrics |
US15/631,752 Active US10270766B2 (en) | 2008-04-10 | 2017-06-23 | Anonymous association system utilizing biometrics |
US16/368,389 Active US10623404B2 (en) | 2008-04-10 | 2019-03-28 | Anonymous association system utilizing biometrics |
US16/812,876 Active US11115412B2 (en) | 2008-04-10 | 2020-03-09 | Anonymous association system utilizing biometrics |
US17/410,017 Active 2028-05-06 US11765161B2 (en) | 2008-04-10 | 2021-08-24 | Anonymous association system utilizing biometrics |
US18/447,658 Active US12069048B2 (en) | 2008-04-10 | 2023-08-10 | Anonymous association system utilizing biometrics |
US18/777,916 Pending US20240372857A1 (en) | 2008-04-10 | 2024-07-19 | Anonymous association system utilizing biometrics |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/081,070 Active 2031-06-29 US8320638B2 (en) | 2008-04-10 | 2008-04-10 | Anonymous association system utilizing biometrics |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/631,752 Active US10270766B2 (en) | 2008-04-10 | 2017-06-23 | Anonymous association system utilizing biometrics |
US16/368,389 Active US10623404B2 (en) | 2008-04-10 | 2019-03-28 | Anonymous association system utilizing biometrics |
US16/812,876 Active US11115412B2 (en) | 2008-04-10 | 2020-03-09 | Anonymous association system utilizing biometrics |
US17/410,017 Active 2028-05-06 US11765161B2 (en) | 2008-04-10 | 2021-08-24 | Anonymous association system utilizing biometrics |
US18/447,658 Active US12069048B2 (en) | 2008-04-10 | 2023-08-10 | Anonymous association system utilizing biometrics |
US18/777,916 Pending US20240372857A1 (en) | 2008-04-10 | 2024-07-19 | Anonymous association system utilizing biometrics |
Country Status (1)
Country | Link |
---|---|
US (8) | US8320638B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106203041A (en) * | 2016-06-30 | 2016-12-07 | 安徽易联众信息技术有限公司 | A kind of medical information management system of automatic identification identity |
US10270766B2 (en) * | 2008-04-10 | 2019-04-23 | Dignity Health | Anonymous association system utilizing biometrics |
US11144922B2 (en) * | 2012-04-25 | 2021-10-12 | Samton International Development Technology Co., Ltd. | Electronic transaction method |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8497836B2 (en) | 2008-05-06 | 2013-07-30 | Cisco Technology, Inc. | Identifying user by measuring pressure of button presses on user input device |
EP2596478B1 (en) * | 2010-07-19 | 2019-09-04 | Risst Ltd. | Fingerprint sensors and systems incorporating fingerprint sensors |
US8830032B2 (en) * | 2010-10-25 | 2014-09-09 | International Business Machines Corporation | Biometric-based identity confirmation |
US8543833B2 (en) * | 2010-12-29 | 2013-09-24 | Microsoft Corporation | User identification with biokinematic input |
US20130097416A1 (en) * | 2011-10-18 | 2013-04-18 | Google Inc. | Dynamic profile switching |
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9819676B2 (en) | 2012-06-29 | 2017-11-14 | Apple Inc. | Biometric capture for unauthorized user identification |
US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9721175B2 (en) | 2013-05-08 | 2017-08-01 | Jpmorgan Chase Bank, N.A. | Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage |
US9760785B2 (en) | 2013-05-08 | 2017-09-12 | Jpmorgan Chase Bank, N.A. | Systems and methods for high fidelity multi-modal out-of-band biometric authentication |
US10235508B2 (en) * | 2013-05-08 | 2019-03-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking |
US20150035644A1 (en) * | 2013-07-30 | 2015-02-05 | Wave Technologies, LLC | Event management system |
US9923855B2 (en) | 2013-08-01 | 2018-03-20 | Jpmorgan Chase Bank, N.A. | Systems and methods for electronic message prioritization |
US9892576B2 (en) | 2013-08-02 | 2018-02-13 | Jpmorgan Chase Bank, N.A. | Biometrics identification module and personal wearable electronics network based authentication and transaction processing |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US20150073998A1 (en) | 2013-09-09 | 2015-03-12 | Apple Inc. | Use of a Biometric Image in Online Commerce |
US20150220931A1 (en) | 2014-01-31 | 2015-08-06 | Apple Inc. | Use of a Biometric Image for Authorization |
US9779174B2 (en) * | 2014-05-11 | 2017-10-03 | Sap Se | Framework for anonymous reporting of social incidents |
US10395055B2 (en) * | 2015-11-20 | 2019-08-27 | PhysioWave, Inc. | Scale-based data access control methods and apparatuses |
CN105959947A (en) * | 2016-04-23 | 2016-09-21 | 乐视控股(北京)有限公司 | Method for safely having access to network and system thereof |
US10785648B2 (en) * | 2017-06-01 | 2020-09-22 | Nokia Solutions And Networks Oy | User authentication in wireless access network |
CN107968788A (en) * | 2017-12-07 | 2018-04-27 | 湖州华科信息咨询有限公司 | A kind of method and apparatus for working document safety management |
US10410075B2 (en) * | 2017-12-18 | 2019-09-10 | Honeywell International Inc. | Different levels of access to aircraft based on biometric input data |
US10423964B2 (en) | 2017-12-29 | 2019-09-24 | Scott Kimmel | User controlled event record system |
WO2019199276A1 (en) | 2018-04-10 | 2019-10-17 | Visa International Service Association | Method, system, and computer program product for authenticating a device |
US11303632B1 (en) * | 2018-06-08 | 2022-04-12 | Wells Fargo Bank, N.A. | Two-way authentication system and method |
EP3582031A1 (en) * | 2018-06-11 | 2019-12-18 | Siemens Aktiengesellschaft | Secure management of access data for control devices |
US12149516B2 (en) * | 2020-06-02 | 2024-11-19 | Flex Integration, LLC | System and methods for tokenized hierarchical secured asset distribution |
Citations (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4916738A (en) * | 1986-11-05 | 1990-04-10 | International Business Machines Corp. | Remote access terminal security |
US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US20010042124A1 (en) * | 2000-03-27 | 2001-11-15 | Barron Robert H. | Web-based method, apparatus, and system for secure data storage |
US20020097142A1 (en) * | 2000-11-13 | 2002-07-25 | Janiak Martin J. | Biometric authentication device for use with token fingerprint data storage |
US6523745B1 (en) * | 1997-08-05 | 2003-02-25 | Enix Corporation | Electronic transaction system including a fingerprint identification encoding |
US20030154382A1 (en) * | 2002-01-18 | 2003-08-14 | Dominique Vicard | User authentication method and system |
US20030219121A1 (en) * | 2002-05-24 | 2003-11-27 | Ncipher Corporation, Ltd | Biometric key generation for secure storage |
US6658091B1 (en) * | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US6688891B1 (en) * | 1999-08-27 | 2004-02-10 | Inter-Tares, Llc | Method and apparatus for an electronic collaborative education process model |
US20040104807A1 (en) * | 2002-10-16 | 2004-06-03 | Frank Ko | Networked fingerprint authentication system and method |
US20040179718A1 (en) * | 2003-03-14 | 2004-09-16 | Chou Bruce C.S. | Card-type biometric identification device and method therefor |
US20040255168A1 (en) * | 2003-06-16 | 2004-12-16 | Fujitsu Limited | Biometric authentication system |
US20050084139A1 (en) * | 2003-05-13 | 2005-04-21 | Biocom, Llc | Identity verification system with interoperable and interchangeable input devices |
US20050240779A1 (en) * | 2004-04-26 | 2005-10-27 | Aull Kenneth W | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) |
US20060020558A1 (en) * | 2004-07-01 | 2006-01-26 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a smartcard |
US20060036442A1 (en) * | 2004-07-30 | 2006-02-16 | Sbc Knowledge Ventures, L.P. | Centralized biometric authentication |
US20060072727A1 (en) * | 2004-09-30 | 2006-04-06 | International Business Machines Corporation | System and method of using speech recognition at call centers to improve their efficiency and customer satisfaction |
US20060090079A1 (en) * | 2004-10-21 | 2006-04-27 | Honeywell International, Inc. | Voice authenticated alarm exit and entry interface system |
US20060104224A1 (en) * | 2004-10-13 | 2006-05-18 | Gurminder Singh | Wireless access point with fingerprint authentication |
US20060173712A1 (en) * | 2004-11-12 | 2006-08-03 | Dirk Joubert | Portable medical information system |
US20060271543A1 (en) * | 2005-05-24 | 2006-11-30 | Dodson Jon R | Secure online repository |
US20060293925A1 (en) * | 2005-06-22 | 2006-12-28 | Leonard Flom | System for storing medical records accessed using patient biometrics |
US20070057764A1 (en) * | 2005-09-14 | 2007-03-15 | Nec Corporation | Mobile communication terminal, authentication method and authentication program |
US20070071286A1 (en) * | 2005-09-16 | 2007-03-29 | Lee Yong J | Multiple biometric identification system and method |
US20070124597A1 (en) * | 2005-11-30 | 2007-05-31 | Bedingfield James C Sr | Security devices, systems and computer program products |
US20070136792A1 (en) * | 2005-12-05 | 2007-06-14 | Ting David M | Accelerating biometric login procedures |
US20070194884A1 (en) * | 2004-03-17 | 2007-08-23 | Sagem Defense Securite | Person identification control method and system for implementing same |
US20070208662A1 (en) * | 2006-02-10 | 2007-09-06 | The Western Union Company | Biometric based authorization systems for electronic fund transfers |
US20080049983A1 (en) * | 2004-11-16 | 2008-02-28 | Imageware Systems, Inc. | Multimodal biometric platform |
US20080072066A1 (en) * | 2006-08-21 | 2008-03-20 | Motorola, Inc. | Method and apparatus for authenticating applications to secure services |
US20080172342A1 (en) * | 2007-01-17 | 2008-07-17 | The Western Union Company | Secure Money Transfer Systems And Methods Using Biometric Keys Associated Therewith |
US7427019B2 (en) * | 2004-08-25 | 2008-09-23 | Hsbc North America Holdings Inc. | Biometric identification system, method and medium for point of sale environment |
US20090108988A1 (en) * | 2005-01-27 | 2009-04-30 | Cleveland Terri P | System and method for administering access to an interior compartment of an enclosure |
US7542590B1 (en) * | 2004-05-07 | 2009-06-02 | Yt Acquisition Corporation | System and method for upgrading biometric data |
US20090146779A1 (en) * | 2007-12-07 | 2009-06-11 | Cisco Technology, Inc. | Home entertainment system providing presence and mobility via remote control authentication |
US20090158423A1 (en) * | 2007-12-14 | 2009-06-18 | Symbol Technologies, Inc. | Locking mobile device cradle |
US20090234764A1 (en) * | 2008-03-14 | 2009-09-17 | Mark Friesen | Systems and methods for biometric authentication of monetary fund transfer |
US20100039223A1 (en) * | 2006-08-28 | 2010-02-18 | National Biometric Security Project | Method and system for authenticating and validating identities based on multi-modal biometric templates and special codes in a substantially anonymous process |
US20100058063A1 (en) * | 2006-11-21 | 2010-03-04 | Koninklijke Philips Electronics N.V. | Fuzzy biometrics based signatures |
US20100321156A1 (en) * | 2008-04-10 | 2010-12-23 | Pitt Alan M | Anonymous association system utilizing biometrics |
US8046589B2 (en) * | 2004-06-25 | 2011-10-25 | Koninklijke Philips Electronics N.V. | Renewable and private biometrics |
US8058972B2 (en) * | 2007-05-09 | 2011-11-15 | University Of North Texas | Methods and devices for enrollment and verification of biometric information in identification documents |
US8176532B1 (en) * | 2003-03-17 | 2012-05-08 | Sprint Communications Company L.P. | Secure access point for scada devices |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7613659B1 (en) * | 1994-11-28 | 2009-11-03 | Yt Acquisition Corporation | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US7152045B2 (en) | 1994-11-28 | 2006-12-19 | Indivos Corporation | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US7631193B1 (en) * | 1994-11-28 | 2009-12-08 | Yt Acquisition Corporation | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US5930804A (en) | 1997-06-09 | 1999-07-27 | Philips Electronics North America Corporation | Web-based biometric authentication system and method |
US7519558B2 (en) * | 1997-08-27 | 2009-04-14 | Ballard Claudio R | Biometrically enabled private secure information repository |
US20020124176A1 (en) * | 1998-12-14 | 2002-09-05 | Michael Epstein | Biometric identification mechanism that preserves the integrity of the biometric information |
AU2001243673A1 (en) | 2000-03-15 | 2001-09-24 | Emedicalfiles, Inc. | Web-hosted healthcare medical information management system |
US7552333B2 (en) * | 2000-08-04 | 2009-06-23 | First Data Corporation | Trusted authentication digital signature (tads) system |
AU2001284721A1 (en) * | 2000-08-04 | 2002-02-18 | First Data Corporation | Method and apparatus for access authentication entity |
JP2003076863A (en) * | 2001-08-31 | 2003-03-14 | Hitachi Ltd | Transfer center system and remittance charge calculation method |
US20030065626A1 (en) | 2001-09-28 | 2003-04-03 | Allen Karl H. | User verification for conducting health-related transactions |
US20030088441A1 (en) * | 2001-11-08 | 2003-05-08 | Mcnerney Michelle | System for the integrated management of healthcare information |
US20040122709A1 (en) * | 2002-12-18 | 2004-06-24 | Avinash Gopal B. | Medical procedure prioritization system and method utilizing integrated knowledge base |
US7209886B2 (en) | 2003-01-22 | 2007-04-24 | Biometric Technologies, Inc. | System and method for implementing healthcare fraud countermeasures |
US6826537B1 (en) | 2003-04-08 | 2004-11-30 | Richard Glee Wood | Cardless method for reducing fraud in government healthcare programs |
US20050278197A1 (en) | 2004-06-10 | 2005-12-15 | Podczerwinski Dana M | Biometric information reader and system |
US20060026043A1 (en) | 2004-07-30 | 2006-02-02 | Schneider John K | Medical records system and method |
WO2006039365A2 (en) * | 2004-10-01 | 2006-04-13 | Solidus Networks, Inc. D/B/A/Pay By Touch | Method and system of authentication on an open network |
JP2005100454A (en) | 2004-11-18 | 2005-04-14 | Mitsui Sumitomo Insurance Co Ltd | Health information management server and program |
JP2006195669A (en) | 2005-01-12 | 2006-07-27 | Tokyo Medical & Dental Univ | Medical support system |
US20070027715A1 (en) * | 2005-06-13 | 2007-02-01 | Medcommons, Inc. | Private health information interchange and related systems, methods, and devices |
US20070055552A1 (en) * | 2005-07-27 | 2007-03-08 | St Clair David | System and method for health care data integration and management |
WO2007145687A1 (en) * | 2006-02-21 | 2007-12-21 | Weiss Kenneth P | Method and apparatus for secure access payment and identification |
WO2007103818A2 (en) * | 2006-03-02 | 2007-09-13 | Vxv Solutions, Inc. | Methods and apparatus for implementing secure and adaptive proxies |
WO2007120793A2 (en) | 2006-04-12 | 2007-10-25 | Unifile, Llc | Patient information storage and access |
US7593549B2 (en) | 2006-04-27 | 2009-09-22 | Bruce Reiner | Apparatus and method for utilizing biometrics in medical applications |
-
2008
- 2008-04-10 US US12/081,070 patent/US8320638B2/en active Active
-
2012
- 2012-11-02 US US13/667,109 patent/US20130081145A1/en not_active Abandoned
-
2017
- 2017-06-23 US US15/631,752 patent/US10270766B2/en active Active
-
2019
- 2019-03-28 US US16/368,389 patent/US10623404B2/en active Active
-
2020
- 2020-03-09 US US16/812,876 patent/US11115412B2/en active Active
-
2021
- 2021-08-24 US US17/410,017 patent/US11765161B2/en active Active
-
2023
- 2023-08-10 US US18/447,658 patent/US12069048B2/en active Active
-
2024
- 2024-07-19 US US18/777,916 patent/US20240372857A1/en active Pending
Patent Citations (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4916738A (en) * | 1986-11-05 | 1990-04-10 | International Business Machines Corp. | Remote access terminal security |
US5280527A (en) * | 1992-04-14 | 1994-01-18 | Kamahira Safe Co., Inc. | Biometric token for authorizing access to a host system |
US6523745B1 (en) * | 1997-08-05 | 2003-02-25 | Enix Corporation | Electronic transaction system including a fingerprint identification encoding |
US6688891B1 (en) * | 1999-08-27 | 2004-02-10 | Inter-Tares, Llc | Method and apparatus for an electronic collaborative education process model |
US20010042124A1 (en) * | 2000-03-27 | 2001-11-15 | Barron Robert H. | Web-based method, apparatus, and system for secure data storage |
US20020097142A1 (en) * | 2000-11-13 | 2002-07-25 | Janiak Martin J. | Biometric authentication device for use with token fingerprint data storage |
US20030154382A1 (en) * | 2002-01-18 | 2003-08-14 | Dominique Vicard | User authentication method and system |
US6658091B1 (en) * | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US20030219121A1 (en) * | 2002-05-24 | 2003-11-27 | Ncipher Corporation, Ltd | Biometric key generation for secure storage |
US20040104807A1 (en) * | 2002-10-16 | 2004-06-03 | Frank Ko | Networked fingerprint authentication system and method |
US20040179718A1 (en) * | 2003-03-14 | 2004-09-16 | Chou Bruce C.S. | Card-type biometric identification device and method therefor |
US8176532B1 (en) * | 2003-03-17 | 2012-05-08 | Sprint Communications Company L.P. | Secure access point for scada devices |
US20050084139A1 (en) * | 2003-05-13 | 2005-04-21 | Biocom, Llc | Identity verification system with interoperable and interchangeable input devices |
US20040255168A1 (en) * | 2003-06-16 | 2004-12-16 | Fujitsu Limited | Biometric authentication system |
US20070194884A1 (en) * | 2004-03-17 | 2007-08-23 | Sagem Defense Securite | Person identification control method and system for implementing same |
US20050240779A1 (en) * | 2004-04-26 | 2005-10-27 | Aull Kenneth W | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) |
US7542590B1 (en) * | 2004-05-07 | 2009-06-02 | Yt Acquisition Corporation | System and method for upgrading biometric data |
US8046589B2 (en) * | 2004-06-25 | 2011-10-25 | Koninklijke Philips Electronics N.V. | Renewable and private biometrics |
US20060020558A1 (en) * | 2004-07-01 | 2006-01-26 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a smartcard |
US20060247933A1 (en) * | 2004-07-30 | 2006-11-02 | Sbc Knowledge Ventures, L.P. | Centralized biometric authentication |
US20060036442A1 (en) * | 2004-07-30 | 2006-02-16 | Sbc Knowledge Ventures, L.P. | Centralized biometric authentication |
US20080071545A1 (en) * | 2004-07-30 | 2008-03-20 | At&T Knowledge Ventures, L.P. | Centralized biometric authentication |
US7427019B2 (en) * | 2004-08-25 | 2008-09-23 | Hsbc North America Holdings Inc. | Biometric identification system, method and medium for point of sale environment |
US20060072727A1 (en) * | 2004-09-30 | 2006-04-06 | International Business Machines Corporation | System and method of using speech recognition at call centers to improve their efficiency and customer satisfaction |
US20060104224A1 (en) * | 2004-10-13 | 2006-05-18 | Gurminder Singh | Wireless access point with fingerprint authentication |
US20060090079A1 (en) * | 2004-10-21 | 2006-04-27 | Honeywell International, Inc. | Voice authenticated alarm exit and entry interface system |
US20060173712A1 (en) * | 2004-11-12 | 2006-08-03 | Dirk Joubert | Portable medical information system |
US20080049983A1 (en) * | 2004-11-16 | 2008-02-28 | Imageware Systems, Inc. | Multimodal biometric platform |
US20080059807A1 (en) * | 2004-11-16 | 2008-03-06 | Imageware Systems, Inc. | Multimodal biometric platform |
US20090108988A1 (en) * | 2005-01-27 | 2009-04-30 | Cleveland Terri P | System and method for administering access to an interior compartment of an enclosure |
US20060271543A1 (en) * | 2005-05-24 | 2006-11-30 | Dodson Jon R | Secure online repository |
US20060293925A1 (en) * | 2005-06-22 | 2006-12-28 | Leonard Flom | System for storing medical records accessed using patient biometrics |
US20070057764A1 (en) * | 2005-09-14 | 2007-03-15 | Nec Corporation | Mobile communication terminal, authentication method and authentication program |
US20070071286A1 (en) * | 2005-09-16 | 2007-03-29 | Lee Yong J | Multiple biometric identification system and method |
US20070124597A1 (en) * | 2005-11-30 | 2007-05-31 | Bedingfield James C Sr | Security devices, systems and computer program products |
US20070136792A1 (en) * | 2005-12-05 | 2007-06-14 | Ting David M | Accelerating biometric login procedures |
US20070208662A1 (en) * | 2006-02-10 | 2007-09-06 | The Western Union Company | Biometric based authorization systems for electronic fund transfers |
US20080072066A1 (en) * | 2006-08-21 | 2008-03-20 | Motorola, Inc. | Method and apparatus for authenticating applications to secure services |
US20100039223A1 (en) * | 2006-08-28 | 2010-02-18 | National Biometric Security Project | Method and system for authenticating and validating identities based on multi-modal biometric templates and special codes in a substantially anonymous process |
US20100058063A1 (en) * | 2006-11-21 | 2010-03-04 | Koninklijke Philips Electronics N.V. | Fuzzy biometrics based signatures |
US20080172342A1 (en) * | 2007-01-17 | 2008-07-17 | The Western Union Company | Secure Money Transfer Systems And Methods Using Biometric Keys Associated Therewith |
US8058972B2 (en) * | 2007-05-09 | 2011-11-15 | University Of North Texas | Methods and devices for enrollment and verification of biometric information in identification documents |
US20090146779A1 (en) * | 2007-12-07 | 2009-06-11 | Cisco Technology, Inc. | Home entertainment system providing presence and mobility via remote control authentication |
US20090158423A1 (en) * | 2007-12-14 | 2009-06-18 | Symbol Technologies, Inc. | Locking mobile device cradle |
US20090234764A1 (en) * | 2008-03-14 | 2009-09-17 | Mark Friesen | Systems and methods for biometric authentication of monetary fund transfer |
US20100321156A1 (en) * | 2008-04-10 | 2010-12-23 | Pitt Alan M | Anonymous association system utilizing biometrics |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10270766B2 (en) * | 2008-04-10 | 2019-04-23 | Dignity Health | Anonymous association system utilizing biometrics |
US10623404B2 (en) | 2008-04-10 | 2020-04-14 | Dignity Health | Anonymous association system utilizing biometrics |
US11115412B2 (en) * | 2008-04-10 | 2021-09-07 | Dignity Health | Anonymous association system utilizing biometrics |
US20210400038A1 (en) * | 2008-04-10 | 2021-12-23 | Dignity Health | Anonymous association system utilizing biometrics |
US11765161B2 (en) * | 2008-04-10 | 2023-09-19 | Dignity Health | Anonymous association system utilizing biometrics |
US20230388301A1 (en) * | 2008-04-10 | 2023-11-30 | Dignity Health | Anonymous association system utilizing biometrics |
US12069048B2 (en) * | 2008-04-10 | 2024-08-20 | Dignity Health | Anonymous association system utilizing biometrics |
US11144922B2 (en) * | 2012-04-25 | 2021-10-12 | Samton International Development Technology Co., Ltd. | Electronic transaction method |
US11151565B2 (en) * | 2012-04-25 | 2021-10-19 | Samton International Development Technology Co., Ltd. | Identity verification circuit and system thereof |
CN106203041A (en) * | 2016-06-30 | 2016-12-07 | 安徽易联众信息技术有限公司 | A kind of medical information management system of automatic identification identity |
Also Published As
Publication number | Publication date |
---|---|
US20170295176A1 (en) | 2017-10-12 |
US8320638B2 (en) | 2012-11-27 |
US20200213303A1 (en) | 2020-07-02 |
US20100321156A1 (en) | 2010-12-23 |
US20230388301A1 (en) | 2023-11-30 |
US20190222572A1 (en) | 2019-07-18 |
US11765161B2 (en) | 2023-09-19 |
US20210400038A1 (en) | 2021-12-23 |
US10623404B2 (en) | 2020-04-14 |
US20240372857A1 (en) | 2024-11-07 |
US10270766B2 (en) | 2019-04-23 |
US12069048B2 (en) | 2024-08-20 |
US11115412B2 (en) | 2021-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12069048B2 (en) | Anonymous association system utilizing biometrics | |
US11106777B2 (en) | Systems and methods for authenticating a user at a public terminal | |
US7802723B2 (en) | System and method for nameless biometric authentication and non-repudiation validation | |
US8667285B2 (en) | Remote authentication and transaction signatures | |
TW201528028A (en) | Apparatus and methods for identity verification | |
CN109951489A (en) | A digital identity authentication method, device, device, system and storage medium | |
US20040128502A1 (en) | Methods and apparatus for credential validation | |
US12206776B2 (en) | Biometric authenticated biometric enrollment | |
US20150066867A1 (en) | Systems and methods for zero-knowledge attestation validation | |
KR102737339B1 (en) | Server emulator for kiosk communication, server emulation system and method having same | |
US20240296237A1 (en) | Electronic records system and related methods | |
US20220278840A1 (en) | Utilization management system, management device, utilization control device, user terminal, utilization management method, and program | |
US12062102B2 (en) | Coordination platform for generating and managing authority tokens | |
KR20050078483A (en) | System and method for providing manless medical acceptance and information using fingerprint recognition | |
KR102682490B1 (en) | Method for unmanned self-service storage service and unmanned self-service storage system | |
KR20050032653A (en) | System and method for providing automated banking services using fingerprint recognition | |
JP2023172300A (en) | Information processing device, user terminal, information processing method, control method, and computer program | |
KR20030068020A (en) | Identification system for personal information security | |
KR20160054788A (en) | Method, apparatus and computer program for exchanging user authentication information | |
JPH1079025A (en) | Duplex signature authentication method | |
JP2007183794A (en) | Card management system, card management method and card management program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DIGNITY HEALTH, ARIZONA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PITT, ALAN M.;PARTOVI, SHAHRAM;SIGNING DATES FROM 20121112 TO 20121113;REEL/FRAME:029501/0786 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |