US 12,256,011 B2
Methods, systems, and media for secure authentication of users based on a biometric identifier and knowledge-based secondary information
David Stein, New York, NY (US); Ryan Vilim, Brooklyn, NY (US); and John Wittrock, Brooklyn, NY (US)
Assigned to Google LLC, Mountain View, CA (US)
Filed by Google LLC, Mountain View, CA (US)
Filed on Jun. 5, 2023, as Appl. No. 18/329,262.
Application 18/329,262 is a continuation of application No. 16/930,836, filed on Jul. 16, 2020, granted, now 11,711,215.
Claims priority of provisional application 62/875,146, filed on Jul. 17, 2019.
Prior Publication US 2023/0318838 A1, Oct. 5, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); G06F 21/32 (2013.01); G06T 7/73 (2017.01); G06T 17/20 (2006.01); G06V 10/764 (2022.01); G06V 40/12 (2022.01); G06V 40/16 (2022.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3231 (2013.01) [G06F 21/32 (2013.01); G06T 7/74 (2017.01); G06T 17/20 (2013.01); G06V 10/764 (2022.01); G06V 40/12 (2022.01); G06V 40/172 (2022.01); H04L 9/0643 (2013.01); H04L 9/0869 (2013.01); H04L 9/3236 (2013.01); H04L 63/0861 (2013.01); G06T 2207/30201 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method for authenticating users in a biometric recognition system, the method comprising:
receiving an indication that a biometric identifier is to be used to authenticate a user to a service;
receiving (i) the biometric identifier of the user from a capture device and (ii) knowledge-based secondary information associated with the user from an input device;
generating a set of random points based on a random seed, wherein the random seed is associated with the service;
determining a feature vector that corresponds to the biometric identifier;
generating a map of the feature vector to the set of random points;
calculating a hash based on the map of the feature vector and the knowledge-based secondary information;
transmitting the hash to a server device for verification;
in response to transmitting the hash to the server device, receiving a response indicating whether the hash matches a previously stored hash that was stored in the server device; and
determining whether to automatically authenticate the user to the service based on the response from the server device.