会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Method of Identifying a User by Means of Modified Biometric Characteristics, and a Database for Implementing the Method
    • 通过改进的生物特征识别用户的方法和实现方法的数据库
    • US20090106559A1
    • 2009-04-23
    • US11791694
    • 2005-11-02
    • Herve ChabanneFrancois RieulBernard Didier
    • Herve ChabanneFrancois RieulBernard Didier
    • H04L9/32H04L9/06
    • G06F21/32G06F21/31G06K9/00087G06K9/00885G07C9/00158H04L9/06H04L9/32H04L9/3231H04L63/083
    • The present invention relates to a method of identifying a user, the method being implemented by means of a database containing personal data of users and containing for each user at least one unmodified biometric characteristic (E1,i), at least one biometric characteristic (E2,i) that has been modified and that is accessible from the unmodified biometric characteristic, and at least one item of identification data (D) that is accessible from a code identifying the modification that has implemented on the second biometric characteristic. The method comprises the steps of comparing first and second biometric characteristics (e1,i) read from the user with the characteristics in the database in order to determine (5) what modification has been implemented and to deduce therefrom the code identifying the modification; and extracting (6) the identification data by means of the code as deduced in this way. The invention also provides a database for implementing the method.
    • 本发明涉及一种识别用户的方法,该方法通过包含用户个人数据的数据库并且为每个用户包含至少一个未修改的生物特征(E1,i),至少一个生物特征(E2 ,i)已经被修改并且可以从未修改的生物特征访问,以及至少一个识别数据项目(D),其可以从识别在第二生物特征上实施的修改的代码访问。 该方法包括以下步骤:将从用户读取的第一和第二生物特征(e1,i)与数据库中的特征进行比较,以确定(5)已经实现了哪些修改并从中推导出识别修改的代码; 并通过以这种方式推导的代码提取(6)识别数据。 本发明还提供了一种用于实现该方法的数据库。
    • 2. 发明授权
    • Cryptography by parameterizing on elliptic curve
    • 椭圆曲线参数化加密
    • US08824670B2
    • 2014-09-02
    • US13378329
    • 2010-06-28
    • Thomas IcartHerve Chabanne
    • Thomas IcartHerve Chabanne
    • G06F21/00H04L9/00H04L9/30H04L9/08
    • H04L9/3066H04L9/005H04L9/0844H04L2209/08
    • A device is controlled by a controller on the basis of a password. A determination is made at the device or at the controller, on the basis of a random value r1, of a point P(X,Y) on an elliptic curve in a finite body Fq, q being an integer, according to: Ea,b(x, y):x3+ax+b=y2. First and second parameters k and k′ are obtained such that P(X,Y)=F(K,k′), where F is a surjective function of Fq×Fq, in Fq. The first and second parameters are obtained in an encrypted format by encryption in accordance with the password. The first and second encrypted parameters are then transmitted to the controller. During the control, the function F is used, such that, whatever the values of z and z′ which are input elements of Fq, F(z,z′) is a point on the elliptic curve and the input elements do not satisfy the equation.
    • 设备由密码控制器控制。 根据Ea,根据有限体Fq中的椭圆曲线上的点P(X,Y),q为整数,根据随机值r1在装置或控制器处进行判定, b(x,y):x3 + ax + b = y2。 获得第一和第二参数k和k',使得P(X,Y)= F(K,k'),其中F是Fq中的Fq×Fq的突出函数。 第一和第二参数是按照密码通过加密获得的。 然后将第一和第二加密参数发送到控制器。 在控制期间,使用函数F,使得无论作为Fq的输入元素的z和z'的值如何,F(z,z')是椭圆曲线上的点,并且输入元素不满足 方程。
    • 3. 发明申请
    • CRYPTOGRAPHY BY PARAMETERIZING ON ELLIPTIC CURVE
    • 通过对ELLIPTIC曲线进行参数化分析
    • US20120134493A1
    • 2012-05-31
    • US13378329
    • 2010-06-28
    • Thomas IcartHerve Chabanne
    • Thomas IcartHerve Chabanne
    • G06F21/00
    • H04L9/3066H04L9/005H04L9/0844H04L2209/08
    • A device is controlled by a controller on the basis of a password. A determination is made at the device or at the controller, on the basis of a random value r1, of a point P(X,Y) on an elliptic curve in a finite body Fq, q being an integer, according to: Ea,b(x, y):x3+ax+b=y2. First and second parameters k and k′ are obtained such that P(X,Y)=F(K,k′), where F is a surjective function of Fq×Fq, in Fq. The first and second parameters are obtained in an encrypted format by encryption in accordance with the password. The first and second encrypted parameters are then transmitted to the controller. During the control, the function F is used, such that, whatever the values of z and z′ which are input elements of Fq, F(z,z′) is a point on the elliptic curve and the input elements do not satisfy the equation.
    • 设备由密码控制器控制。 根据Ea,根据有限体Fq中的椭圆曲线上的点P(X,Y),q为整数,根据随机值r1在装置或控制器处进行判定, b(x,y):x3 + ax + b = y2。 获得第一和第二参数k和k',使得P(X,Y)= F(K,k'),其中F是Fq中的Fq×Fq的突出函数。 第一和第二参数是按照密码通过加密获得的。 然后将第一和第二加密参数发送到控制器。 在控制期间,使用函数F,使得无论作为Fq的输入元素的z和z'的值如何,F(z,z')是椭圆曲线上的点,并且输入元素不满足 方程。
    • 4. 发明申请
    • Processing Biometric Data in a Multidimensional Coordinate System
    • 在多维坐标系中处理生物特征数据
    • US20090231096A1
    • 2009-09-17
    • US12294608
    • 2007-03-20
    • Julien BringerHerve ChabanneMartin Cottard
    • Julien BringerHerve ChabanneMartin Cottard
    • G06F7/04
    • G06K9/00885G06K9/00087G06K9/00597
    • The invention concerns a biometric system provided with a set of reference biometric data (B′i) resulting from the application of a disjunction between a first set of biometric data (Bi) and a first encoded key (Ki), and from an information concerning the first key. A second set of biometric data (B2) is obtained. A second encoded key is determined by using a disjunction between the set of reference biometric data and the second set of biometric data. The second key is decoded by iterative decoding. Then, it is determined whether the first and second sets of biometric data mutually correspond by comparing the information concerning the first key with the second key. The first and second sets of biometric data are expressed in a multidimensional repository with N dimensions, the biometric data according to at least one of the N dimensions being obtained by using processes relative to the biometric part; and the first encoded key is obtained by using an encoding transforming an initial word of specific length into an encoded word in the multidimensional repository.
    • 本发明涉及一种生物测定系统,其具有由在第一组生物特征数据(Bi)和第一编码密钥(Ki)之间的分离的应用而得到的一组参考生物测定数据(B'i) 第一个关键 获得第二组生物特征数据(B2)。 第二编码密钥通过使用参考生物测定数据集与第二组生物特征数据之间的分离来确定。 第二个键通过迭代解码进行解码。 然后,通过将关于第一密钥的信息与第二密钥进行比较来确定第一组和第二组生物特征数据是否相互对应。 第一组和第二组生物特征数据在具有N维的多维存储库中表达,根据N维中的至少一个通过使用相对于生物特征部分的过程获得的生物特征数据; 并且通过使用将特定长度的初始字变换为多维存储库中的编码字的编码来获得第一编码密钥。
    • 9. 发明授权
    • Method of executing a cryptographic calculation
    • 执行密码计算的方法
    • US08681972B2
    • 2014-03-25
    • US12600197
    • 2008-05-09
    • Herve ChabanneJulien BringerThomas Icart
    • Herve ChabanneJulien BringerThomas Icart
    • G06F21/00
    • H04L9/0866H04L9/0836H04L9/321H04L2209/805
    • A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an intrusion into the electronic component. The one-way function is based on a first affine operation corresponding to a first secret key. The one-way function is applied, by obtaining (11) first and second random values (r, r′), then, by obtaining a first result (13) by applying a second affine operation (σK1), which corresponds to a second secret key, to a first combination (12) of the first and second random values, and, by obtaining (14) thereafter a second result by applying a third affine operation (σK2) which corresponds to a third secret key to said first result. The combination of the third and second affine operations (σK1 o σK2) corresponds to the first affine operation; and a cryptographic operation is moreover applied (15) to one at least among said second result and a second combination of the first and second random values.
    • 根据密码算法,在电子部件中执行加密计算,所述加密算法包括在侵入电子部件时被禁用的单向功能的至少一个应用。 单向功能基于对应于第一秘密密钥的第一仿射操作。 应用单向函数,通过获得(11)第一和第二随机值(r,r'),然后通过应用第二个仿射运算(&sgr; K1)获得第一个结果(13) 第二秘密密钥,涉及第一和第二随机值的第一组合(12),并且通过将对应于第三秘密密钥的第三仿射操作(&Sgr; K2)应用于第二结果,获得第二结果(14) 说第一个结果。 第三次和第二次仿射操作(&sgr; K1 o&sgr; K2)的组合对应于第一次仿射操作; 并且至少在所述第二结果和第一和第二随机值的第二组合中至少应用(15)至一个加密操作。
    • 10. 发明授权
    • Method of determining a pseudo-identity on the basis of characteristics of minutiae and associated device
    • 基于细节和相关设备的特性确定伪身份的方法
    • US08594394B2
    • 2013-11-26
    • US13060689
    • 2009-08-31
    • Julien BringerHerve Chabanne
    • Julien BringerHerve Chabanne
    • G06K9/00
    • G06K9/00093G06K9/001
    • Additional information regarding a fingerprint is estimated, with a given level of confidence, on the basis of characteristics of a set of minutiae corresponding to this print. Local descriptors are determined around some at least of the minutiae, so that they comprise, in relation to zones comprising additional information estimated with the given confidence level, values calculated on the basis of said information and, in relation to zones not comprising such information, erasures. The local descriptors determined are quantized according to a given number of integer values, a value being reserved for erasures. The quantized local descriptors are coded with the aid of an error-tolerant coding algorithm associated with a decoding algorithm devised to take account of errors and erasures. And a pseudo-identity is determined on the basis of some at least of the coded quantized local descriptors.
    • 基于与此打印相对应的一组细节的特征,估计关于指纹的附加信息,具有给定的置信水平。 局部描述符是围绕一些至少细节确定的,使得它们包括关于包含以给定置信水平估计的附加信息的区域,基于所述信息计算的值,并且关于不包括这些信息的区域, 擦除 确定的局部描述符根据给定数量的整数值进行量化,一个值被保留用于擦除。 量化的局部描述符借助与解码算法相关联的容错编码算法进行编码,以解决误差和擦除。 并且基于一些至少编码量化的局部描述符来确定伪身份。