Link to home
Start Free TrialLog in
Avatar of khubli
khubli

asked on

Encrypting Biometric Data Over the Network

I am looking for theoretical information on an Encryption system that would encrypt Biometric data before it is sent over a network to a central processing pc. Once the encrypted data is received, it is decrypted, and matched against existing biometric templates - the system then responds according to the results of the matching system?

I am not looking for existing commercial Biometric systems that are advertised, rather, I need theoretical information on how this would work (if there is a commercial company that shows you how this works then that is fine). Also, I would rather it be a simple encryption system, something that is widely available, simple to use and implement and has stood the test of time.

Thanx in advance
Avatar of zero_byte
zero_byte

ASKER CERTIFIED SOLUTION
Avatar of Rich Rumble
Rich Rumble
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of khubli

ASKER

richrumble

Thanks for your reply, I think I understand what you mean - could you provide me with links so I may research this further?


zero byte

I think you have misunderstood me, you have provided me with links that give info on creating crypotgraphic keys from Biometric information, I am looking for encrypting the data at the sending unit and decrypting it at the receiving unit purely for the purposes of secure transmission over the network. Presumably this is already employed in secure environments, I just need some information in regards to what cryptographic techniques can be employed and how they work?

Thanks in advance
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Why reinvent the wheel?  Use HTTPS -- the same way credit card numbers are sent over the Internet.

http://java.sun.com/j2ee/1.4/docs/tutorial/doc/Security6.html

SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
My contribution was negligible, please give the points to others.

--SamB39