Papers
More filters
•
05 Aug 2009TL;DR: In this article, a method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources, and the method determines whether inputted information is known, determines a state of a communications device when the inputted Information is known and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled.
Abstract: A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
267 citations
•
18 Jun 2002TL;DR: In this paper, a secure and paperless eVault system for personal data and documents for citizens is described, which allows controlled access by citizens and optionally by service providers, and can be adapted to allow processes involving the documents to be carried out in a secure, paperless fashion.
Abstract: An eVault system securely stores personal data and documents for citizens and allows controlled access by citizens and optionally by service providers. The eVault may be adapted to allow processes involving the documents to be carried out in a secure and paperless fashion. Documents are certified, and biometric matching is used for security. On effecting a match with a biometric identifier presented by a user, the user is allowed access to his personal eVault and to access a personal cryptographic key stored therein. One or more of these personal keys may be securely applied within the eVault to generate an electronic signature, amongst other functions.
123 citations
•
22 Dec 2005TL;DR: In this paper, a biometric authentication engine includes components which are configured to authenticate a user based on one or more presented biometrics and makes use of multiple threshold parameters or scores so that the authentication process is better tailored to match the specifics of the authentication request.
Abstract: A biometric authentication engine includes components which are configured to authenticate a user based on one or more presented biometrics. The system makes use of multiple threshold parameters or scores so that the authentication process is better tailored to match the specifics of the authentication request
112 citations
•
02 Jul 2002TL;DR: In this paper, a distributed network of independently operable servers is described, where each server is adapted to communicate over the network with one or more other servers, each server having a datastore with a plurality of data fields adapted to store information about one or multiple users.
Abstract: A distributed network of independently operable servers is described. Each server is adapted to communicate over the network with one or more other servers, each server having a datastore with a plurality of datafields adapted to store information about one or more users. By enabling an authentication of a user based on a user supplied biometric identifier, the network is adapted to enable the transfer of information relating to the user between different servers.
98 citations
•
22 May 2009TL;DR: In this article, a method of confirming the identity of a user includes processing biometric credentials, generating a user configurable policy including identities of a plurality of authenticating entities, storing the user configurability policy in a device, presenting the device to an authenticating entity at an authentication station, and requesting biometric and personal data of the user from the device data.
Abstract: A method of confirming the identity of a user includes processing biometric credentials, generating a user configurable policy including identities of a plurality of authenticating entities, storing the user configurable policy in a device, presenting the device to an authenticating entity at an authentication station, and requesting biometric and personal data of the user from the device data. The biometric data corresponds to at least one biometric feature desired for authenticating the user and the requesting operation is performed by a workstation of the authenticating entity. Moreover, the method includes consulting the user configurable policy in response to the requesting operation to determine whether the requested biometric data is permitted to be released from the device data, and releasing the requested biometric and personal data from the device data to the authenticating entity when the default rule associated with the one authenticating entity permits releasing the requested biometric and personal data.
88 citations
Authors
Showing all 26 results
Name | H-index | Papers | Citations |
---|---|---|---|
Michael Peirce | 13 | 20 | 998 |
Mircea Ionita | 12 | 20 | 1097 |
Conor Robert White | 11 | 15 | 729 |
Richard Jay Langley | 6 | 7 | 123 |
Nicolas Jacques Jean Sezille | 6 | 10 | 156 |
Christopher Eric Holland | 4 | 4 | 105 |
Jason Scott Cramer | 4 | 5 | 340 |
James Ahern | 3 | 3 | 153 |
Oliver Tattan | 2 | 2 | 221 |
Tevfik Burak Sahin | 2 | 3 | 67 |
Gaurav Gupta | 2 | 3 | 60 |
Michael Murphy | 1 | 1 | 123 |
Suzanna Diebes | 1 | 2 | 267 |
Steve Cook | 1 | 1 | 7 |
Perez-Rovira Adria | 1 | 2 | 1 |