Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_c5397fc5ff75ee49a454558b68b36baa |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2115 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0847 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-602 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07C9-00087 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07C9-257 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-321 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3231 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3073 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3033 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-60 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G07C9-00 |
filingDate |
2004-04-22^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_40798f3bf2aef33f700f66f240213019 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9f61aced4071ac0dd3a124fbaef8f824 |
publicationDate |
2004-11-10^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
GB-2401462-A |
titleOfInvention |
Security method using biometric and non-biometric data |
abstract |
A data access control method and system involves a trusted authority 40 reading identity data from a memory device 50 presented by an individual 70A. This identity data comprises both biometric data 51 of a specific individual 70 and additional identity data 52 concerning the same individual. The trusted authority 40 uses the biometric data 51 as a biometric reference for comparison with biometric characteristics of the individual 70A presenting the memory card 50 in order to determine 44 whether the latter is the individual 70 represented by the biometric data. The trusted authority 40 uses the additional identity data 52 or matching data, together with private data p,q of the trusted authority 40 to generate a decryption key KDEC. This decryption key is apt to decrypt data encrypted using both an encryption key string KENC comprising the additional identity data 52 of the specific individual 70 and public data N of the trusted authority. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-2102790-A4 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8510797-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7886156-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/GB-2441793-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-9117096-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/GB-2483515-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-2102790-A2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-104157048-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/GB-2441793-B http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8898462-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/GB-2483515-B |
priorityDate |
2003-04-23^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |