Recoverable biometric identity system and method
A method for identifying persons based on biometric data achieves enhanced security and increased accuracy compared with other systems by distorting one or more biometrics prior to detection and recognition. The method includes detecting a distorted biometric for input into an identification system, comparing the distorted biometric to one or more distortion patterns, and determining an identity of the person based on results of the comparison. The biometric may be an eye pattern, a fingerprint or palm print, a voice print, a handwriting sample, a DNA sample, a facial image, or any other type of characteristic or behavioral attribute of a person. The biometric may be distorted in any one of a variety of ways for comparison to previously enrolled biometrics which have been distorted using the same or similar element. A system and program embodied within a computer-readable medium performs the steps of the method.
This application claims benefit of provisional U.S. patent application Ser. No. 60/470,204 filed on May 14, 2003 and provisional U.S. patent application Ser. No. 60/436,996 filed on Dec. 31, 2002. The contents of these provisional applications are incorporated by reference herein. This application also incorporates by reference the subject matter in pending U.S. patent application Ser. No. 10/_______ entitled “Fingerprint Reader Using Surface Acoustic Wave Device” (Attorney Docket No. IQB-0020), pending U.S. patent application Ser. No. 10/______, filed on entitled “System and Method for Performing Security Access Control Based on Modified Biometric Data” (Attorney Docket No. IQB-0021), and pending U.S. patent application Ser. No. 10/______ entitled “System and Method for Performing Personal Identification Based on Biometric Data Recovered Using Surface Acoustic Waves” (Attorney Docket No. IQB-0022).
BACKGROUND OF THE INVENTION1. Field of the Invention
This invention generally relates to identification systems, and more particularly to a system and method for identifying persons based on biometric data. The invention also relates to a system and method for controlling access to a restricted item based on personnel biometric data.
2. Description of the Related Art
The ability to perform secure transactions, control access to restricted areas, and protect the dissemination of information are paramount concerns in the public and private sector. While various approaches have been developed to address these concerns, one approach which has proven to be particularly effective involves the use of biometrics.
Biometric systems use automated methods of verifying or recognizing the identity of persons based on some physiological characteristic (e.g., a fingerprint or face pattern) or aspect of behavior (e.g., handwriting or keystroke patterns). In its most basic form, this is accomplished in three steps. First, one or more physiological or behavioral traits are captured and stored in a database. Second, the biometric of a particular person to be identified is compared to the information in the database. Finally, a negative or positive confirmation is returned based on results of the comparison.
Because personal characteristics or behavioral aspects are considered unique, biometric systems have proven to provide an enhanced measure of protection compared with password- and PIN-based systems. This enhanced security comes in several forms. For example, the person to be identified is required to be physically present at the point-of-identification. Visual or physiological confirmation therefore takes place instead of a mere numerical comparison. Also, biometric identification is beneficial to the user because it obviates the need to remember a password or carry a token.
While existing biometric systems have proven effective, they are not without drawbacks. Perhaps most significantly, these systems can be breached using stolen biometric data. Consider, for example, a biometric system which performs identification based on employee fingerprints. In order to gain unauthorized access, a thief can obtain a sample of an employee's fingerprint (e.g., off of a glass) with relative ease and then present that sample to a system fingerprint reader. Unable to determine the source of the fingerprint, the system will grant access to the thief to thereby causing a breach. Existing biometric systems have also proven to be inaccurate because they are one-dimensional in nature, e.g., they perform identification verification based on only form of biometric data.
Due at least in part to the tragic events of 9/11, the use of biometrics systems is expected to increase dramatically in the coming years. In fact, according to the International Biometric Industry Association, the biometrics market has been projected to jump from $165 million in 2000 to $2.5 billion by 2010. This jump will inevitably involve using biometric systems in new applications including the prevention of unauthorized access or fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks.
In view of the foregoing considerations, it is apparent that there is a need for a biometric-based system and method which is more secure than other systems and methods which have been proposed, and more particularly which achieves this improved security based on the use of multiple degrees of uniqueness for achieving identification confirmation.
SUMMARY OF THE INVENTIONAn object of the present invention is to provide an improved system and method for identifying persons using biometric information.
Another object of the present invention is to provide a system and method for identifying persons using biometric information which is more secure than existing systems and methods.
Another object of the present invention is to provide a system and method of the aforementioned type which demonstrates a greater resilience to fraudulent attack from unauthorized personnel.
Another object of the present invention is to provide a system and method for identifying persons using biometric information which is more accurate than other systems which have been proposed.
Another object of the present invention is to provide a system and method for identifying persons using biometric information which achieves improved accuracy by considering multiple degrees of uniqueness, based solely on biometric data or on a combination of biometric data and one or more unique attributes.
Another object of the present invention is to provide a system and method of the aforementioned type which is sufficiently flexible to perform personal identification confirmation based on virtually any type of biometric.
Another object of the present invention is to provide a computer-readable medium containing an application program which controls a processing system to automatically perform identification confirmation in any of the aforementioned ways.
These and other objects and advantages of the present invention are achieved by providing an identification method which includes detecting a distorted biometric for input into an identification system, comparing the distorted biometric to one or more distortion patterns, and determining an identity of the person based on results of the comparison. The biometric may be an eye pattern, a fingerprint or palm print, a voice print, a handwriting sample, a DNA sample, a facial image, or any other type of characteristic or behavioral attribute of a person. The biometric may be distorted in any one of a variety of ways for comparison to previously enrolled biometrics which have been distorted using the same or similar element.
The present invention also provides an identification system which includes a detector that captures a distorted biometric of a person and a processor which compares the distorted biometric to one or more distortion patterns and determines an identity of the person based on results of the comparison. The biometric may be an eye pattern, a fingerprint or palm print, a voice print, a handwriting sample, a DNA sample, a facial image, or any other type of characteristic or behavioral attribute of a person. The biometric may be distorted in any one of a variety of ways for comparison to previously enrolled biometrics which have been distorted using the same or similar element.
The present invention is also a computer-readable medium which includes a program for performing an identification function. The program includes a first code section for comparing a signal indicative of a combination of two or more unique identity attributes to one or more identity patterns, at least one of the unique identity attributes corresponding to a biometric of a person, and a second code section for determining an identity of a person based on results of the comparison.
By distorting the biometric before it is input into the system, the present invention ensures that system security cannot be breached by theft of the biometric itself. The distortion element therefore in effect serves as a key which when combined with the biometric provides two degrees of uniqueness which must be satisfied before a positive identification result can be confirmed. Moreover, if the distorted biometric of a person is ever lost or stolen, the present invention can easily re-enroll biometrics into the system or switch to a different previously enrolled biometric altered using a different unique distortion element. Additional embodiments contemplated combining three or more degrees of uniqueness for providing an even greater level of security.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is a system and method for identifying a person based on biometric data which has been encoded or otherwise uniquely modified for the purpose of preventing fraud and enhancing security. The present invention is also a system and method for identifying a person based on the combination of two or more unique identity attributes, at least one of which is a biometric which is either coupled with or modified by the second attribute. The present invention is also computer-readable medium storing a program that implements one or more of the methods described herein. Whether taken collectively or individually, the embodiments of the present invention combine multiple degrees of uniqueness to provide a greater degree of security and resistance to fraud than other systems which have been proposed.
Structurally, the distortion element is selected to coincide with the type of biometric obtained from a person whose identity is to be determined, illustratively shown by reference numeral 15. In embodiments of the invention discussed below, specific types of distortion elements are identified. While these embodiments are considered advantageous for a variety of applications, they are not to be limiting of the invention in any way. Rather, it is sufficient to acknowledge that the distortion element may be one capable of imposing any form of distortion on a biometric. This distortion includes but is not limited to non-linear distortion, various types of modulation, and/or one or more forms of encoding imposed mechanically, optically, electrically, or through mathematical or signal processing techniques.
Irrespective of the type of distortion imposed, the purpose of the distortion element is to alter the form of the biometric as received from its source, so that the biometric as presented to the system decision unit is different from its original form. This ensures that inputting a person's biometric directly into the system will always result in failed recognition, which is beneficial from the standpoint of protecting the integrity of the host system from unauthorized breach as well as for a variety of other purposes.
The input unit includes a detector for detecting or otherwise receiving the distorted biometric output from the distortion element. The input unit may be as small or large as necessary to be compatible with the host system. When the identification system is used for security access purposes, the input unit may be incorporated within a panel which optionally but preferably includes a display or indicator that provides information, instructions, and/or messages to each person presenting a modified biometric for identification. The particular input unit used depends on the type of modified biometric generated by the distortion element. Non-limiting examples are identified in embodiments which follow.
The storage unit stores information for each person to be identified by the system. This information includes an identity pattern that corresponds to a distorted biometric obtained during an enrollment process and optionally but desirably one or more other forms of identifying data (e.g., PIN or other access number or password, social security number, driver's license number, address, citizenship, marital status, and/or other forms of personal information that may be used as an independent basis for identification). If desired, unit 4 may store multiple identity patterns for each person, where each pattern is generated using a different distortion element. This provides a degree of flexibility to the system while simultaneously enhancing security. For example, a system manager or system software may change the distortion element to be used and thus the identity patterns to be searched, for example, on a periodic basis or when a breach of the host system has occurred.
The storage unit may be a database included within or externally connected to the identification decision unit via a wireless or wireline communications link. Alternatively, the storage unit maybe a memory chip storing the identity patterns for each person presented for identification. This latter case is preferable when, for example, the system is formed as an integrated unit. Those skilled in the art can appreciate that other forms of storage devices may be used to store the identity patterns in accordance with the present invention.
The identification decision unit compares the distorted biometric received from the input unit with one or more identity patterns in the storage unit. The comparison function is performed by a processor 7 under control of an application program stored in a memory 8. The type of comparison performed depends on the type of distorted biometric received. The comparison may, for example, involve a spectrum signal analysis or a pattern recognition analysis performed using a neural network, statistical model, or other type of signal processing technique. Examples of comparison algorithms are discussed in embodiments which follow. As an added measure of security, the identification decision unit may be protected by a firewall and an interface unit 9 may be included for transmitting or receiving data, instructions, or other information from the system management controller.
The enrollment station captures new distorted biometrics for persons who are already registered in the system and for persons to be added. The enrollment station includes a distortion element 11 for distorting biometric as received from its source and a detector 12 for receiving the distorted biometric. In order for positive identification to occur, a person must at a minimum present the same biometric using the same distortion element as was presented during enrollment, e.g., the same type of distortion must be performed by elements 1 and 11 on the same biometric. The identification system of the present invention thus may be said to require at least two unique identity attributes to be presented in proper combination in order for a positive identification to occur, where the first and second unique attributes correspond to the biometric and the specific type of distortion imposed on the biometric. While the enrollment station is depicted to be separate from detector 2, those skilled in the art can appreciate that enrollment may also be performed by this detector.
The system management controller generates new identity patterns from the distorted biometrics obtained from the enrollment station. These patterns are then forwarded to the storage unit. The controller also performs a number of other management functions. For example, when multiple identity patterns (e.g., distorted biometrics) are stored for each person, the controller may specify which distorted biometric type is to be used by the decision unit for identification.
To illustrate, consider the case where each person has enrolled two distorted biometrics into the system. The biometrics may differ based on the use of different distortion elements for the same biometric, use of the same distortion element for different biometrics, or different distortion elements for different biometrics. The system management controller may control which type of distorted biometric may be used on any given day or under any given set of circumstances for identification. For example, an eye retina scan through a first nonlinear distortion element may be system active one day and an eye retina scan through a second nonlinear distortion element may be system active on another day. A positive identification will only result by inputting the correct distorted biometric into the system. The system controller manages which distorted biometric will be active based on direct input from a system administrator or based on instructions which have been programmed into the processor control software, e.g., on a periodic basis, in the event that a host system breach has occurred, etc.
In addition to these functions, the system controller maybe used to edit and/or delete identity patterns or other identification information in the storage unit. Also, this controller may control the input unit in terms of when it is active and what messages, information, or other data is to be displayed. If multiple detectors are included in the input unit, the control may also designate which detector is to be activated.
A second step includes inputting the distorted biometric into the input unit of the identification system. (Block 21). This may be accomplished in a variety of ways depending on the type of biometric and/or the type of distortion element imposed on the biometric. For example, in the case where the biometric is an eye pattern (e.g., retina or iris) and the distortion element is a lens having a non-linear refractive pattern, the distorted eye pattern as viewed through the lens may be captured by a detector (e.g., scanner, camera, CCD array, or other imaging system) included in the input unit of the identification system. The detector converts the captured pattern into an electrical spectrum signal for comparison by the decision unit. In the case where the biometric is a voice sample and the distortion element is a voice scrambler, the distorted voice pattern would be converted into an electrical spectrum signal by a microphone in the input unit of the system. The signal would then be input into the decision unit for analysis. Other examples of how a distorted biometric may be captured, detected, or otherwise input into the system are discussed in the specific embodiments which follow.
A third step includes comparing the distorted biometric signal received from the input unit to one or more identity patterns stored in the storage unit. (Block 22). This step is performed by decision unit 3, which searches the distorted biometrics in the stored identity patterns previously enrolled. As previously indicated, the comparison performed depends on the specific type of distorted biometric received. This may involve, for example, various forms of spectrum or pattern analyses. Specific embodiments are discussed below.
A fourth step includes determining an identity of the person who input the distorted biometric into the system. (Block 23). The identity is determined based on results obtained from the comparison performed by the decision unit. If the distorted biometric signal matches one of the identity patterns, then the identity of the person may be determined from the personal information stored in that person's electronic file. Under ideal circumstances, the processor search would result in only one match for each authorized person. However, because of inconsistencies and other adverse influences, it is possible that multiple matches are found. In this case, the processor may be programmed to conclude that there is no match because of an ambiguity. Conversely, the processor may programmed to conclude that for purposes of the host system, any match is sufficient and therefore multiple matches result in an acknowledgment that the person is a person recognized by the system. If no match is produced from the processor search, the system may conclude that the person is an unidentified person and action may be taken accordingly.
A fifth step includes generating a signal indicating whether the person who input the distorted biometric into the system has been identified or not. (Block 25). If the person has been identified, the processor generates an acknowledgment signal which may be used, for example, to grant the person access to a restricted area, system, or other item. The acknowledgment signal may also cause the input unit to display a predetermined message indicating that the person has been identified and that access will now be granted. If the person has not been identified, a non-acknowledgment signal may be generated for the purpose of denying access to the person and/or to generate a message indicating the same.
The identification decision unit identifies the eye pattern contained in the image signal and the compares the pattern to one or more enrolled eye pattern images stored in the database. Eye pattern recognition may be performed using any known technique, a non-limiting example of which is disclosed in the article entitled How Iris Recognition Works, University of Cambridge, The Computer Laboratory, by John Daugman and which is accessible at www.CL.cam.ac.uk/users/jgd1000/. Techniques for performing eye pattern image comparison are also well known, any one of which may be used in accordance with the present invention. An example includes the one disclosed in Iris Matching Engine, and Search Speed which may be found at www.cl.cam.ac.uk./users/jgd1000/search.html.
To allow adequate reading of the fingerprint, the mask is preferably made of a thin-film, flexible, transparent material. The pattern of the mask can be formed by imprinted opaque lines made sufficiently thin or small to allow the fingerprint to still be read through the mask. Lines of this type may be formed, for example, using known screen-printing or thin-film patterning techniques. To steady the mask, the supporting portions of the fingerpiece may be made of a rigid material such as plastic, metal, etc.
Once an image of the masked fingerprint is obtained, processor 7 performs a two-step analysis. First, the image is analyzed using a pattern recognition algorithm to determine whether the mask pattern is present in the image. In
In a variation of the foregoing embodiment, the mask pattern may intentionally obscure selected portions of the fingerprint. The distorted print is then input into the system for subsequent pattern recognition. This variation therefore contemplates recognition of the unobscured portions of the fingerprint which may be sufficiently distinct to allow recognition to occur.
In operation, a person to be identified places his finger onto the reader containing the mask. The reader may be any type previously mentioned, e.g., optical, ultrasonic, capacitive, piezoelectric, etc. The reader reads the fingerprint through the mask and generates an-image signal, which is either directly compared to one or more enrolled images or converted into a spectrum signal for comparison to one or more enrolled spectrums. A positive or negative identification result is returned based on results of the comparison. Fingerprint recognition and comparison may be performed in accordance with any one of a variety of known techniques. Examples are disclosed in Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press International Series on Computational Intelligence, (1999) by L. C. Jain et al.
The facial recognition performed by unit 71 may be any one of a variety of techniques. Examples include but are not limited to eigenspace projection, statistical modeling, neural network analysis, or others such as disclosed in Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press International Series on Computational Intelligence, (1999) by L. C. Jain et al and the article An Automated System for Detection, Recognition & Coding of Faces by MIT Media Laboratory, Vision and Modeling Group, which is accessible at www-white.media.mit.edu/vismod/domos/facerec/system.html.
The multiple biometrics may include any of those previously discussed. For example, a first unique attribute may be an eye pattern distorted by a second unique attribute in the form of a non-linear distortion lens. A third unique attribute may be a fingerprint distorted by a fourth unique attribute in the form of a mask. These attributes may be input sequentially into the system and compared to enrolled information for returning a positive or negative identification result.
One variation involves combining multiple unique identities prior to input into the system. For example, referring to
In any of the aforementioned embodiments, one of the unique attributes may be a personal identification number (PIN) or password. This number may be combined with or entered separately or sequentially with the distorted biometric at, for example, a keypad at the input unit. The use of a PIN or password will provide an additional basis for identifying a person.
Another embodiment of the present invention includes a computer-readable medium storing a program which automatically performs the processing functions or steps of the methods previously described. This computer-readable medium may be a hard drive, a compact disk, a floppy disk, a memory chip, a flash memory, or any other type of medium capable of storing digital information. The processor that executes the program preferably performs the functions of decision unit 3 shown in
Other modifications and variations to the invention will be apparent to those skilled in the art from the foregoing disclosure. Thus, while only certain embodiments of the invention have been specifically described herein, it will be apparent that numerous modifications may be made thereto without departing from the spirit and scope of the invention.
Claims
1. An identification method, comprising:
- detecting a distorted biometric for input into an identification system;
- comparing the distorted biometric to one or more distortion patterns; and
- determining an identity of the person based on results of said comparison.
2. The method of claim 1, wherein the biometric is an eye pattern.
3. The method of claim 2, wherein the detecting step includes:
- detecting the eye pattern through a distortion element which generates the distorted biometric.
4. The method of claim 3, wherein the distortion element includes a lens having a non-linear optical pattern.
5. The method of claim 3, wherein the distortion element includes a diffraction grating which modulates the eye pattern to generate the distorted biometric.
6. The method of claim 5, wherein the diffraction grating is electronically generated adjacent to or within a lens.
7. The method of claim 3, wherein the detecting step includes:
- acquiring the distorted biometric using an imaging system.
8. The method of claim 1, wherein the biometric is a fingerprint.
9. The method of claim 8, wherein the detecting step includes:
- receiving a signal output from a distortion element which distorts the fingerprint.
10. The method of claim 9, wherein the distortion element includes a mask pattern.
11. The method of claim 10, wherein the mask pattern is superimposed over at least a portion of the fingerprint.
12. The method of claim 10, wherein the mask pattern does not obscure the fingerprint.
13. The method of claim 10, wherein the mask pattern is included in a window of a fingerpiece which fits over the person's finger.
14. The method of claim 10, wherein the mask patter is included on a medium placed over a fingerprint reader.
15. The method of claim 1, wherein the biometric is a palm print.
16. The method of claim 1, wherein the biometric is a voice of the person.
17. The method of claim 16, wherein the detecting step includes:
- receiving a signal from a voice distortion unit which imposes a predetermined form of distortion on the voice of the person to generate the distorted biometric.
18. The method of claim 1, wherein the biometric is a handwriting sample.
19. The method of claim 17, wherein the detecting step includes:
- receiving a signal from a reader which includes a mask pattern for distorting the handwriting sample.
20. The method of claim 1, wherein the biometric is a facial pattern.
21. The method of claim 20, wherein the detecting step includes:
- detecting the facial pattern through a distortion element which generates the distorted biometric.
22. The method of claim 21, wherein the distortion element includes a lens having a non-linear optical pattern.
23. The method of claim 21, wherein the detecting step includes:
- acquiring the distorted facial pattern using an imaging system.
24. The method of claim 21, wherein the distortion element includes a lens which distorts the facial pattern.
25. The method of claim 1, wherein the biometric is a DNA sample.
26. The method of claim 25, wherein the detecting step includes:
- receiving an image of the DNA sample produced by a mask pattern.
27. The method of claim 1, wherein each of the distortion patterns corresponds to a distorted biometric of a respective one of a plurality of persons having a known identity.
28. The method of claim 27, wherein the distortion patterns are stored in a database.
29. The method of claim 27, wherein the distortion patterns are stored in a memory chip.
30. The method of claim 1, wherein the determining step includes:
- determining the person has an unknown identity if no match results from the comparison.
31. The method of claim 1, wherein the distorted biometric is generated using a unique distortion element.
32. The method of claim 31, wherein the biometric is an eye pattern and the unique distortion element is a lens which distorts the eye pattern.
33. The method of claim 33, wherein the lens is included in an eyepiece carried by the person.
34. The method of claim 31, the biometric is a voice and the unique distortion element is a voice scrambler carried by the user.
35. An identification system, comprising:
- a detector which captures a distorted biometric of a person; and
- a processor which compares the distorted biometric to one or more distortion patterns and determines an identity of the person based on results of the comparison.
36. The system of claim 35, further comprising:
- a distortion element which generates the distorted biometric of the person.
37. The system of claim 36, wherein the biometric is an eye pattern.
38. The system of claim 37, wherein the distortion element includes:
- a lens having a non-linear optical pattern which generates a distortion of the eye pattern.
39. The system of claim 38, wherein the lens is included in an eyepiece carried by the person.
40. The system of claim 38, wherein the distortion element includes:
- a diffraction grating which modulates the eye pattern to generate the distorted biometric.
41. The system of claim 40, wherein the diffraction grating is electronically generated adjacent to or within a lens.
42. The system of claim 38, further comprising:
- a camera which captures the distorted eye pattern output from the distortion element.
43. The system of claim 36, wherein the biometric is a fingerprint.
44. The system of claim 43, wherein the distortion element includes:
- a mask worn over the finger, said mask including a window which distorts the fingerprint to generate the distorted biometric.
45. The system of claim 36, wherein the biometric is a palm print.
46. The system of claim 36, wherein the biometric is a voice of the person.
47. The system of claim 46, wherein the distortion element includes:
- a modulator which modulates a frequency signal with a voice signal from the person to generate the distorted biometric.
48. The system of claim 36, wherein the biometric is a handwriting sample.
49. The system of claim 48, wherein the distortion element includes:
- a mask which distorts the handwriting sample.
50. The system of claim 36, wherein the biometric is a facial pattern.
51. The system of claim 50, wherein the distortion element includes:
- a lens which generates a distorted image of the facial pattern.
52. The system of claim 36, wherein the biometric is a DNA sample.
53. The system of claim 52, wherein the distortion element includes:
- a mask which isolates predetermined portions of the DNA sample to generate the distorted biometric.
54. The system of claim 36, wherein the distortion element has a non-linear distortion pattern.
55. The system of claim 35, wherein each of the distortion patterns corresponds to a distorted biometric of a respective one of a plurality of persons having a known identity.
56. The system of claim 55, further comprising:
- a database for storing the distortion patterns.
57. The system of claim 55, further comprising:
- a memory chip which stores the distortion patterns.
58. An identification method, comprising:
- receiving a signal indicative of a combination of two or more unique identity attributes, at least one of the unique identity attributes corresponding to a biometric of a person;
- comparing the signal to one or more identity patterns; and
- determining an identity of a person based on results of said comparison.
59. The method of claim 58, wherein another one of the unique identity attributes is a predetermined distortion pattern, said signal indicative of a distortion of the biometric using the predetermined distortion pattern.
60. The method of claim 59, wherein the predetermined distortion pattern includes a non-linear distortion pattern.
61. The method of claim 58, wherein another one of the unique identity attributes is another biometric of the person, said signal indicative of a combination of the two biometrics.
62. The method of claim 58, wherein the biometric is one of an eye pattern, a fingerprint, a palm print, a voice, a handwriting sample, a face, and a DNA sample.
63. The method of claim 58, wherein said one or more identity patterns are stored in a database.
64. The method of claim 58, wherein said one or more identity patterns are stored in a memory chip.
65. The method of claim 58, wherein the determining step includes:
- determining that the person is an unidentified person if no match occurs in the comparing step.
66. An identification system, comprising:
- a receiver which receives a signal indicative of a combination of two or more unique identity attributes, at least one of the unique identity attributes corresponding to a biometric of a person; and
- a processor which compares the signal to one or more identity patterns and determines an identity of a person based on results of said comparison.
67. The system of claim 66, wherein another one of the unique identity attributes is a predetermined distortion pattern, said signal indicative of a distortion of the biometric using the predetermined distortion pattern.
68. The system of claim 67, wherein the predetermined distortion pattern includes a non-linear distortion pattern.
69. The system of claim 66, wherein another one of the unique identity attributes is another biometric of the person, said signal indicative of a combination of the two biometrics.
70. The system of claim 66, wherein the biometric is one of an eye pattern, a fingerprint, a palm print, a voice, a handwriting sample, a face, and a DNA sample.
71. The system of claim 66, further comprising:
- a database for storing said one or more identity patterns.
72. The system of claim 66, further comprising:
- a memory chip which stores said one or more identity patterns.
73. The system of claim 66, wherein the processor determines that the person is an unidentified person if no match occurs in the comparing step.
74. The system of claim 66, further comprising:
- a distortion pattern serving as another one of said unique identity elements.
75. The system of claim 74, wherein the distortion pattern includes a non-linear distortion pattern.
76. The system of claim 74, wherein said signal is indicative of distortion of the biometric using the distortion pattern.
77. A computer-readable medium including a program for performing an identification function, said program comprising:
- a first code section for comparing a signal indicative of a combination of two or more unique identity attributes to one or more identity patterns, at least one of the unique identity attributes corresponding to a biometric of a person; and
- a second code section for determining an identity of a person based on results of said comparison.
78. The computer-readable medium of claim 77, wherein another one of the unique identity attributes is a predetermined distortion pattern, said signal indicative of a distortion of the biometric using the predetermined distortion pattern.
79. The computer-readable medium of claim 78, wherein the predetermined distortion pattern includes a non-linear distortion pattern.
80. The computer-readable medium of claim 77, wherein another one of the unique identity attributes is another biometric of the person, said signal indicative of a combination of the two biometrics.
81. The computer-readable medium of claim 77, wherein the biometric is one of an eye pattern, a fingerprint, a palm print, a voice, a handwriting sample, a face, and a DNA sample.
82. The computer-readable medium of claim 77, wherein said one or more identity patterns are stored in a database.
83. The computer-readable medium of claim 77, wherein said one or more identity patterns are stored in a memory chip.
84. The computer-readable medium of claim 77, wherein the second code section determines that the person is an unidentified person if no match occurs in the comparing step.
85. The computer-readable medium of claim 77, wherein the medium is an optically readable medium.
86. The computer-readable medium of claim 77, wherein the medium is a magnetically readable medium.
87. The computer-readable medium of claim 77, wherein the medium is an integrated circuit chip.
88. A method for identifying a person, comprising:
- generating an encoded biometric;
- detecting the encoded biometric;
- comparing the encoded biometric with a previously enrolled encoded biometric; and
- determining an identity of a person based on a result of the comparison.
89. A system for identifying a person, comprising:
- a detector which detects an encoded biometric; and
- a processor which compares the encoded biometric with a previously enrolled encoded biometric and determining an identity of a person based on a result of the comparison.
Type: Application
Filed: Dec 31, 2003
Publication Date: Jun 22, 2006
Inventors: Andrew Polcha (Lovettsville, VA), Michael Polcha (Lovettsville, VA)
Application Number: 10/748,680
International Classification: G06K 9/00 (20060101);