METHOD OF PUBLIC IDENTIFIER GENERATING FOR AUTHENTICATION OF INDIVIDUAL, IDENTIFICATION OBJECT HOLDER Russian patent published in 2017 - IPC G06F21/32 G06F21/62 

Abstract RU 2621625 C2

FIELD: information technology.

SUBSTANCE: method of public identifier generating for authentication of individual, an identification object holder, wherein method comprises an initialization phase comprising the following steps: recording initial biometric data (Bio) of individual; generating the first key (Kbio) from biometric data; generating the second key (KHW) from the data (P1) generated by an object security component; generating the initial key (Kcom) of encryption, combining the said first key and the said second key; connecting the individual first identifier to a server in accordance with the initial encryption key; generating of public identifier by a server by the first identifier encrypting using the initial encryption key, wherein the said public identifier is stored by a server according to the initial encryption key.

EFFECT: authentication of identification carrier holder to protect their digital identity and rights.

22 cl, 5 dwg

Similar patents RU2621625C2

Title Year Author Number
SYSTEMS AND METHODS FOR PROTECTED BIOMETRIC AUTHENTICATION 2003
  • Lakus Mira K.
RU2320009C2
AUTHENTICATION IN DISTRIBUTED ENVIRONMENT 2015
  • Choi Unho
RU2702076C2
BIOMETRIC COMPARISON FOR PRIVACY PROTECTION USING SERVER 2018
  • Sheets, John F.
  • Wagner, Kim R.
  • Arora, Sunpreet Singh
  • Best-Rowden, Lacey
  • Jiang, Chunxi
RU2776258C2
TELECOMMUNICATION CHIP-CARD 2013
  • Shriya Sandzhiv
  • Fogat Vikas
RU2628492C2
METHOD AND SYSTEM FOR PROTECTING INFORMATION FROM UNAUTHORISED USE (VERSIONS THEREOF) 2013
  • Rabinovich Il'Ja Samuilovich
RU2560810C2
DEVICE AND USER AUTHENTICATION 2010
  • Asim Mukhammad
  • Gvakhardo Merchan Khorkhe
  • Petkovich Milan
RU2538283C2
BIOMETRIC DATA SAFE HANDLING SYSTEMS AND METHODS 2016
  • O'Regan, Alan Joseph
  • Huxham, Horatio Nelson
RU2718226C2
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2
METHOD FOR COMPREHENSIVE, USER-ORIENTED NETWORK SAFETY, PROVIDED BY DYNAMIC COMMUTATION OF DATAGRAMS AND AUTHENTICATION AND ENCODING MODEL UPON REQUIREMENT THROUGH MOBILE INTELLECTUAL INFORMATION CARRIERS 2004
  • Jergensen Dzhimi T.
  • Dehjmon Krejg L.
  • Patuehl Jan
  • Arlaud Kristofer L.
RU2308080C2
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS 2015
  • Le Saint, Eric
  • Gordon, James
  • Joshi, Roopesh
RU2710897C2

RU 2 621 625 C2

Authors

Banteo Bryuno

Berto Filipp

Dates

2017-06-06Published

2013-03-18Filed