[go: up one dir, main page]

GB2401822A - Computer system with data carrier having biometric user identification - Google Patents

Computer system with data carrier having biometric user identification Download PDF

Info

Publication number
GB2401822A
GB2401822A GB0329076A GB0329076A GB2401822A GB 2401822 A GB2401822 A GB 2401822A GB 0329076 A GB0329076 A GB 0329076A GB 0329076 A GB0329076 A GB 0329076A GB 2401822 A GB2401822 A GB 2401822A
Authority
GB
United Kingdom
Prior art keywords
biometric
data carrier
data
fingerprint
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0329076A
Other versions
GB0329076D0 (en
Inventor
James Henderson Mitchell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB0329076D0 publication Critical patent/GB0329076D0/en
Publication of GB2401822A publication Critical patent/GB2401822A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/254Fusion techniques of classification results, e.g. of results related to same input data
    • G06F18/256Fusion techniques of classification results, e.g. of results related to same input data of results relating to different input data, e.g. multimodal recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Digital computer system for biometric identification comprising a right protected, digital data storage carrier 1 which has an encrypted PIN code and an associated reader 3 for reading the identification code via induction and verifying biometric data stored in a database by comparing it against live biometric and DNA data supplied by the user. Preferably, verification is refused if no match is found. The biometric sensor may be located on the data carrier or the reader. The biometric data may include DNA, finger, thumb or palm prints, face or voice recognition, iris or retinal scans, hand geometry or the body's electrical aura.

Description

Description
1.0 Biometrics is defined as the statistical analysis of biological observations and Human phenomena. Biometric authentication is the measurement of a Unique biological feature used to verify the claimed identity of an individual.
The biological feature may be based on either: À A physiological characteristic such as your biometric features. This type of Biometric measurement is usually unchanging and unalterable without Significant duress to the individual.
À A behavioral characteristic such as your signature or voice. A signature In the most common behavioral, biometric used for identification.
Because most behavioral characteristics change over time, identification Using these must allow updates to enrolled biometric references.
Numeric identification in the form of Personal Identification Numbers or Pins is Still today's most widely used security feature. However, biometrics adds a More profound level of security in that it cannot be stolen or lost. In addition, it Enables an organization to authenticate He user as opposed to a piece of Information (Pi) or a piece of equipment Biometrics encompasses: À Fingerprinting À Palm printing À Retina scanning À Iris scanning À Hand geometry À Face recognition À Voice authentication À DNA À The natural bodies electrical charge (Ore) Table 1 compares the various types of biometric characteristics Biometrics encompasses: À Fingerprinting À Palm printing À Retina scanning rls scanning À Hand geometry À Face recognition À Voice authentication À DNA À The natural body's electrical charge (Ore) Table 1 compares the various types of biometric characteristics 3.1.2 Biometric System Components and Process There are three major components to forming a biometric system: A mechanism to scan and capture a representation of the feature to be Used as the user's digitally secure biometric Templates data storage removable carrier.
À Software to store, process and compare the data À An interface with the particular system that will use the result to confirm The individualslbio entity identity.
3 stages are involved in the biometric system process - enrolment and Identification, Verification Enrolment involves the capture and processing of a representative eight a fingers & two thumbs biometric fingers feature from the bioentity (individual), which will serve, as Templates against which any 'live' fingers or thumbs data will be compared. These Templates are stored in a Secure covert remote database server and at any or a mobile ID Data carrier including Digitally secure biometric Templates data storage removable carrier for inserting into a Data Carrier & for later use in identifying or authenticating of a (bin entity) but not limited to a bio entity, person's details. Dependent upon the security class of the biometric features/voice authentication will be picked in accordance with the security status required. Cross-referencing data storage with a live bio entity data carrier to establish & remove the chance of duplication of the Digitally secure biometric Templates data storage removable carrier that can be inserted into the data carrier, from the original data.
Biometric Capture Image Processing Template Storage 1 101 Storage Device (Data Carrier Or database) Template Image.
Verification. The unique characteristics are extracted from a user's live Biometric Templates. This is then compared to the stored digitally secure biometric Templates data storage removable carrier of the bio entity to information where matching takes place between eight fingers & two thumbs Live Templates Secure Identification systems use biometrics for two basic purposes, Identification and authentication. Identification is used to determine whether An individual exists within a secure covert remote database of stored information. This involves Comparing the biometric data captured from the user therefore stored on a Secure covert remote database. Authentication, on the other hand, confirms that the Credentials/file digitally secure biometric Templates data storage removable carrier belong to the person presenting them, e.g. an authentication Biometric device reader.
Therefore, the process only involve comparing the users information with that Of the Templates belonging to the individuals digitally secure biometric Templates data storage removable carrier. That insert into data carrier B i o m e t r i c H a n d l b o d y / R e t i n a; l l e O 1 1 O capture information processing 1 101
_ _ Live
TemDlates 3 way cross. . referencing Biometric covert 1010 data storage remote storage Templates O 110 Biometric with live database extraction 110 1 matching bio entity Templates Any finger The Template or thumbs stipulate which Eight Biometric Matching can be used hand & which fingers two Stored 95% at any one finger it is thumbs Templates Matchmg time reading Template S core Incorrect Template attempted fraud, police The transaction is called, audio-visual recorded, data stored completed Table 1 compares the various biometric technologies.
Characteristic Fin e tints Retina Face Si ature Voice Ora g rp gn Ease of use High Low Medium High Hiah Hich
_ _ _ _
Lighting, Error Dryness, Glasses age, Changing Noise Thermal Incident dirt, age glasses, signature cold suit hair Accuracy High hviegrhy High High High High Used his Medium Median Medium High High High acceptance L tn:;ltetrm High High Medium Med tam Medimn High 3.1.3 Fingerprints Recognition Perhaps the easiest biometric to capture and process are fingerprints. It is also Very easy for a user to supply and is not invasive / inconvenient whilst holding the data carrier at the same time of transaction since the user (Would have to press buttons/voice commands but not limited to,) to initiate transactions at the authentication device reader holding onto the Fingerprint reader on the data carrier at the same time of transaction. "Is no extra effort". whilst a data carrier sends a signal & receives a signal to & from authentication device reader cross reference between the live bio entity fingerprint & the second stored data on the data carrier to verify the big-entity holding the data carrier/identifying giving a visual display whilst scanning the bio entities live fingerprint, what verification of the remote Data Storage device receive such a signal cross referencing would Data of the bio entity fingerprint verifying which finger/digit from which hand then sending an encrypted verification signal back to the authentication device reader that then sense a signal to the data cattier to verify identification code of digital encrypted data of the bioentity A fingerprint reader is implemented on the data carrier that a user presses their finger onto At the point of - transaction or identification verification.
1. At the point of transaction authentication device reader then stores a digital receipt A copy of there receipts of the day can be downloaded at the owner request via a computer. From the database to their personal PCs. After executing the correct biometric identification procedures. Via a data carrier from their personal home/office computer could include but is not limited to via the internet, telephone lines radio waves, Blue tooth technology, etc & receive receipt Data of there purchases in the tax year for book-keeping & account purposes. There are 3 main methods used to construct an image of the fingerprints: Optical A small Digital camera and light source is used to capture an image of the Fingerprints. Capacitive.
The human body's natural electrical charge is used to measure the Differences in capacitance values between ridges and valleys in a Fingerprints and certain algorithms are used to construct an image from The capacitance values. Thermo-Conductive À The differences between valleys and ridges of a fingerprint are measured With respect to the human tissue's thermal conductivity characteristics, i.e. Ridges and valleys conduct heat at different rates and this miniature Differences can be registered.
Once the user's fingerprint is captured, it needs to be compared against the Fingerprint's image Template's of the authorised user.
Before they can be compared, the images need to be reduced to their key Features (typically the stored fingers & thumbprints would already be in this form) & being transmitted to the data carrier via communication devices to the Authentication device reader. To cross-examine the three biometric features. 1. Stored in a data carrier. 2. Stored in a file secure covert remote database, 3.Data Carrier. 4. Live biometric host if necessary.
(Only if Data Carrier is missing, lost or stolen with the use of the pin number) 4.1 identification of fingerprint can be received directly from the bioentity via a fingerprint reader held on authentication device reader with the use of the pin number.
Various algorithms/software packages exist for doing this, some allowing any Orientation of the finger on the sensor.
Biometric devices such as fingerprint readers can either replace or be Combined with the use of pins to access private data on biometric authentication device readers, thus increasing security by introducing another factor of authentication. This Measure will increase security by helping to ensure that a person In possession Of a biometric authentication device reader is authorized to use the services of that Data Carrier.
Two general algorithms usually carry out biometric matching Categories. Minutiae-based maps the points where individual ridges Start/stop or bifurcate (branch), whereas image-based aligns and overlays The images to determine the similarity. Other characteristics used to measure Fingerprints include identification of the pattern type, determination of the Number of ridges, distance between ridges and the number of pores.
Examples of the fingerprints usually encountered are shown in Figure 2.
A Data Carrier can be produced into any form or device etc. Data Carrier, with an Embedded integrated circuit chip that provides memory, Memory along with a programmable microprocessor. Biometric authentication device readers are Designed to be tamper resistant.
Smart Data Carriers must interface with external systems to be of valued to Accomplish the exchange of input/output, biometric (authentication device readers which could include but is not limited to) Blue tooth technology either a contact or a contact less interface. Contact type Data Carriers must be inserted into a reader or swipe To make physical contact with it; the reader provides power to the Data Carrier and Exchanges input/output via the physical contacts. The contact less type Data Carrier Exchanges input/output via induction, and typically is powered by that same Inductive circuit. Essentially, this means that the data carrier, which could include but is not limited to, Embedded wire antenna wound around its perimeter, is activated via radio Frequency when it is placed near the authentication device reader.
The operating distance for Contact less Data Carriers is relatively short; some types work at up to 10 cm (finches), others at up to about one meter. This could include but is not limited to mobile phones, Blue Tooth Technology Pram Pilots. Satellite tracking & reading technology Etc Laptop PC weather the range is,nkn.own or other readable her emitting devices To help facilitate multiple applications on a single Data Carrier, manufacturers Commonly embed both contact and contact less type chips on the same Data carrier to create hybrid Data Carriers. Additionally, there are combined credit cards on the market that provide both contact and contact less functionality via a single chip. Furthermore, other card features, such as bar codes and magnetic stripe, can be integrated into the same data carrier as contact and contact less Integrated circuit chips.
3.1.5biometric authentication device readers containing Biometric information A biometric authentication device reader contains a computer. It can process and store information from the Digitally Secure biometric Templates data storage removable carrier via the data carrier. Because of this, it is the ideal solution for biometric based Authentication for almost any security application. It is especially convenient For AUTHENTICATION DEVICE use because AUTHENTICATION DEVICE users are used to may-stripe cards, and smart Data Carrier work in the same way from the user's point of View (i.e. simply become within range with Blue tooth technology also close proximity readers to enable data carrier communication & with authentication device, or simply insert the Data Carrier into the AUTHENTICATION DEVICE).
Smart Data Carriers are far more secure than may-stripe Data Carriers.
The data stored in the Card is not easily accessible. In addition, because the Data Carrier contains a Processor along with a encrypted digitally Secure biometric Templates data storage removable carrier encryption algorithms can be implemented in the Digitally Secure biometric Templates data storage removable carrier that is inserted into the Data Carrier so that Data can be transferred in and out of the Data Carrier via Digitally Secure biometric Templates data storage removable carrier encrypted. This allows for a completely end-to-end encryption scheme.
Also allows the bioentity to possess/own multiple Data Carrier Devices.
Providing the data carrier has a facility for receiving the Digitally Secure biometric Templates data storage removable carrier That can hold enough information to store a number of different Biometric keys that could include but is not limited to fingerprint, iris scan, voice ID Ora scan images etc.) Along with banking details medical records dental records, & their progressive personal file of their life time in, conjunction with the Data Camer memory.
This opens the door for doing authentication / ID against more than one biometric Simultaneously. AUTHENTICATION DEVICE authentication can be improved and the AUTHENTICATION DEVICE fraud rate Reduced by making use of this as a means of positive authentication on an AUTHENTICATION DEVICE. They are at least as user friendly as mag- stripe cards. But with higher Reliability and prospects of integration with other applications.
A secure identification system combining both biometric authentication device reader and Digitally Secure biometric Templates data storage removable carrier biometric Technology can provide a very high level of confidence in the confirmation Of an individual's identity, while also improving overall security and protecting The individual's privacy. Biometric authentication device readers are now coming available that use Biometric data, especially fingerprint recognition to check a person's details Against a stored Templates. One of the major issues surrounding the use of this technology however, is concerned with how the Templates, the information Relating to a person's identity is stored. Biometric data may be stored on the Digitally Secure biometric Templates data storage removable carrier Smart Data Carrier itself, in a local reader, or in a central Secure covert database server.
Ideally for a biometric authentication device reader based ID system, the biometric Templates could be Stored in the biometric authentication device reader. This offers increased privacy and portability for the User and ensures the information is always with the Data Carrier holder concealed in the digitally secure biometric Templates data storage removable carrier. However, this Requires the biometric authentication device reader to have sufficient memory to store the biometric data updated, when required from the covert database server/ central network.
In some application, however this is unnecessary, for example, for door entry Systems the biometric data could be stored in the reader. Central database Storage of biometric data may be considered to achieve a higher level of Security manage multiple types of readers that use the same biometric Data but different algorithms.
Biometric processing consists of two separate and sequential takes. First, the User's 'live' biometric Templates must be extracted and processed.
Second, The live Templates must be compared with the stored Templates. In theory both These tasks can be performed in the biometric authentication device reader ID, in the reader, ore on a remote covert database server in conjunction with a Centralised covert network.
3.1.6 Activity in this area A great deal of work has been undertaken in this area, of combining Biometrics with biometric authentication device reader technology, an example being biometric authentication device reader technology relies on the storage of a User Templates within the biometric Secure covert remote database server or authentication device reader, which is then used to authenticate the Data Carrier holder before information is released. The user inserts/ or becomes in range whilst pressing their finger or thumbprint on to the Data Carrier reader Fingerprint pad or inserting the Data Carrier into a Reader device, such as an AUTHENTICATION DEVICE that could include but is not limited to (coffee dispensing device, cash dispensing device fuel dispensing device.) for example. The user's 'live' fingerprint or fingerprints /Templates is Captured by the reader device via the data carrier to Updating the personal digital RECEIPT file of the transaction along side the Stored Templates, which biometric then uses to compare With the stored Templates. An appropriate response is then transmitted over a secure connection given.
Therefore, the Data Carrier has a fingerprint reader/sensor upon it, with the means to transmit over a secure connection & receive Data though all means Information relating to the 'enrolled' user is stored and processed by the authentication device reader. After cross referencing with Secure covert remote database server if necessary for verification introduce biometric identification, which will allow. The fugerprints/thumbprints to be captured on the digitally secure biometric Templates data storage removable carrier to via the data carrier after Download.
Developing security systems that used biometric measurements.
Authentic BiomPhic readable device Mat have fingerprint or retina images etc. Stored upon them. When a live image is captured (via an authentication device reader) & cross reference with Secure covert remote database server. If necessary The Data Carrier Compares and processes information to authenticate the user. Such a system Authentication device reader.
Figure 3 where the fingerprint is captured at A reader or directly from the Data Carrier.
Figure 3 Fingerprint recognition devices Utilising fingerprint verification, as shown by Figure 3.
Authentication device reader.featuring facial and voice Recognition to identify customers.
AUTHENTICATION DEVICE that recognises a customer's identity by their iris, via a data carrier reader or directly from authentication device reader without the need of a Data Carrier or personal identification number (PIN) . These developments have led Wolfdale promotions & Many of the world's banks to look more closely at how biometrics can help Them. Big pad fingerprint recognition system Woltdale promotions computer Open Doc reference, the Bank of America rolled out a new pilot programme That uses fingerprint recognition to give individuals access to their online Banking services. It is believed that biometric technology will play an Increasingly important role in security and authentication for financial Services. Bank United has introduced Iris scan technology in some of there Authentication Device Readers, whilst Wolfdale promotions would therefore providing fuger-scan biometric authentication for.
Online banking customers. MasterCard is also testing a fingerprint ID system at Its headquarters, weighing its possible deployment on authentic Biometric readable devices. fingerprint recognition system for Smart Data Carrier authentication, combining biometric authentication device reader and fingerprint recognition Technologies to provide highly secure personal identification. This system I Propose will overcome the weakness of other systems avoiding the necessity To store the fingerprints and other private information on a remote server or Authentication device, which gives rise to security privacy issues combining biometric authentication device reader and Fingerprint recognition technology with public key infrastructure (PKI) Technology. The resulting system raises security to a new level compared to The use of biometric authentication device reader or fingerprint recognition alone, and is also much easier To administer than other alternatives. Fingerprints information In addition, access control information for authorising access to available Applications are stored in the biometric Secure covert remote database server, assuring both confidentiality and Portability. The access control information in the Data Carrier is activated for use only After personal identification by fingerprint recognition has been passed. The
Fingerprint recognition processing takes place completely in the Data Carrier reader Also cross-referencing the fingerprint with the Stored Digitally secure biometric Templates data storage removable carrier concealed within the Data Carrier. Biometric authentication device reader, via a range of communication contact & contact-less devices minimizing the influence on existing systems. It is therefore Readily usable with a wide range of, appropriate applications.
Of biometrics and biometric authentication device reader technology.
Biometrics technology and system integration technology, Delivering biometric authentication device reader technology, as well as the related software and services required for identity programmer.
Biometric authentication device reader-based biometric recognition Inside the identity segment is expected to experience rapid growth in the Future.
Combining biometric authentication device reader and fingerprint recognition. However, this Seems to be largely aimed at authentication of bioentity during examination, Alternatively, controlling access to secure areas within bio biologist's buildings.
The current trend, as seen by the developments above, is to rely on having a Fingerprint censor held remotely, say at a remote covert database server that communicates with an AUTHENTICATION DEVICE whenever necessary if outside of the normal areas used by the bioentity. The Data Carrier is used primarily to Process sand store the personal receipt file details of the user.
There are fewer cases Where the user's fingerprint is read directly from a Data Carrier.
However, at the GSA/FTS Network services Conference held earlier this year The importance of combining biometric and biometric authentication device reader technologies was Discussed in some depth. The advantages to the public of the increased Security from such a system were highlighted and one of the emerging Technologies discussed was that of an integrated biometric authentication device reader In Figure 4.
In addition, such Data Carriers are becoming a reality as having Introduced Data Carriers allowing the capture of a live print directly.
Fingerprint Data Carriers, has identified a number of biometric authentication device readers Applications based on one of three systems; system-on- Data Carrier, match-on- Data Carrier, In addition, Templateson-Data Carrier. Consists of an embedded system on A Data Carrier, which allows the full system of storage, capture and processing to be Undertaken on the Data Carrier. Match-on-Data Carrier the sensor for Capturing the live image of the fingerprint is on a reader. In the last system The Data Carrier is used only to store the Templates image. All processing and Comparisons are made with the Data Carrier reader. However, as you will notice From this technology is not Authentic Biometric readable devices. This technology can be used in wireless applications, especially In the prevention of telecommunication fraud.
Another major break, in '3-D Fingerprints sensor integrated into an authentic Biometric readable device'. The Data Carrier is inserted into a reader, the user places there fingers/thumbs individually one by one on the sensor then stores the Template's/digital photograph images of the face or body of the bioentity to the remote covert database server. After fingerprint templates & digital photograph image are taken, visual & audible recognition of facial features which can include DNA samples with each fingerprint that is then transmitted to verify Template storage, along with the digital photograph image' after rerei,,ng an audio Signal or from a visual display unit Then cross referencing immediately with the remote database server & stored to prevent duplication, in future it is only possible to carry out transactions using either one of the bio entities fngerprints/thumbprints The original bio entities Finger is placed on the sensor housed on the personal Data Carrier. Or on the authentication device reader, however, the one feature that differentiates This from many of the other devices is the ability to capture all fingerprints Templates Including the visual features of the bioentity to be used as a digital signature at a later date for identification purposes of the bioentity.
Fingertip. This makes it possible to identify a person not only based on Nine unique points in the print, but can also detect temperature and blood Pressure. Therefore, the fingerprint has to be 'living'.
Figure 4 biometric authentication device reader combining fingerprint sensor Biometrics also can be used in a wide range of other applications, the most Notable is in airports for Detecting and checking of passengers boarding passes. With increasing Theft of mobile telephones before inserting the digitally secure biometric Templates data storage removable carrier well this technology will stop the Theft, also illicit use of the phone/Data Carrier without the owner's Knowledge.
3.2 Patent search Woltdale Promotions' system.
3.2.1 Concepts 1. Storage of biometric data authentic Biometric readable device Data Carrier 2. A means of capturing fngerprints/thumbprints biometric information data from a bioentity directly onto the Digitally secure biometric Templates data storage removable carrier in conjunction with a Data Carrier.
3. A mechanism by which data stored on the Data Carrier can be retrieved on Insertion into a reading device, such as, but not limited to, and Then compared to a secure covert database server of possible matches.
4. A further mechanism allowing contact less interrogation of the stored data On theDigitally secure biometric Templates data storage removable carrier within The Data Carrier on passing a suitable device.
3.2.2 Key words and phrases Fingerprint recognition Sensor Digitally secure biometric Templates data storage removable carrier Identity Data Carrier transmitter & receive over a Secure connection Storage biometric authentication device reader Fingerprint storage Biometrics of Template's of eight fingers & two thumbs Secure covert database server.
Remote covert database server Secure remote covert database server 3.2.3 Sources 3.2.4 Which holds information? Relating to the owner, the Data Carrier -issuing organization and account number.
Upon it is a sensor device, which is used to capture the fingerprint of the user Holding the Data Carrier. The Data Carrier is equipped with a comparator for comparing the Stored and captured fingerprints. The Data Carrier is used as an ordinary authentic Biometric readable device Would be used. Identification & authentication Biometric readable device Device, complete with fingerprint reader and processing means. The very Existence of this patent in light of the earlier one demonstrates that the Wolfdale invention may still be patentable, is novel in A term of the extra features that is discloses (see below). Both these patent
Specifications are included in Appendix 3.
Table 2 Number date Applicant A self-authenticating identification DataCarrier Includes a fingerprint sensor for authenticating The identity of a user. An ID Data Carrier memory digitally secure biometric Templates data storage removable carrier Permanently stores information related to a Biometrics DNA Fingerprints thumbprints Visual Audio of the Data Carrier user.
Authenticator compares information related To a sensed fm.gerprnt with the stored Fingerprint information and produces an Authentication signal if the sensed fingerprint Information matches the stored fingerprint Information. An audio generator is preferably Included in the Data Carrier for transmitting A predetermined audio signal to a speaker if a Match is sensed. A second memory, in the Form of a programmable magnetic stripe, May be included on the Data Carrier for storing Account information related to the Data Carrier user. Inc
A portable telecommunication device Includes a radio transceiver within a portable Housing, a fingerprint sensor carried by the Housing and an authorising feature for Permitting use of the radio transceiver based Upon the fingerprint sensor sensing a Fingerprint of via authorised digitally secure biometric Templates data storage removable carrier user. The Authorising may be performed locally or Based upon a secure remote covert database server authorization signal.
Biometrics
AB
A fingerprint identification/verification system Using bitmaps of a stored fingerprint to Correlate with a bitmap of an input fingerprint, Wherein an accurate reference point is Located and selected two- dimensional areas In the vicinity of the reference point of the Input image of the fingerprint are correlated With stored fingerprint recognition information To determine if the input fingerprint image and The stored fingerprint recognition information Are sufficiently similar to identify/verify the Input fingerprint. Authentication device reader and has an Embedded digitally secure biometric Templates data storage removable carrier Integrated circuit chip that is Powered by a battery. The Data Carrier has a sensing Pad for the user to enter a fingerprint. The Entered data is compared with data that is Held m. Digitally secure biometric Templates data storage removable carrier Memory and only when the Identification is correct is access allowed. This Then releases the information in the magnetic Strip and enables the integrated chip to Be activated
File date Applicant Disclosure
EP0833281 01-Apr-98 Sagem The control of access equipment includes a Portable badge and a fixed terminal. The Badge has a radio transmitter and an Activating radio receiver and it stores details Of a physical characteristic such as fingerprints In a memory as well as the type of access Permitted in a memory. When the badge Holder approaches the terminal radio Communication and other elements are Activated and details of the type of access In addition, of the owners fingerprints are received After scrambling from the badge. The badge Holder's fingerprint data is checked by a Reader and comparator and if appropriate a Gate is opened. Data
An identification storage medium such as a Card is disclosed. The Data Carrier contains data Relating to a user such as authentic Biometric readable device Information, licence information or the like.
The Data Carrier includes an integrated circuit which Contains biometric data relating to the user And which can be read from the Data Carrier by a Reader. The reader also includes a scanner for Scanning the biometric data such as a Thumbprint of the user so that the scan data Can be compared with the data read from The Data Carrier to establish the user's authenticity.
The comparison can take place in the circuit Alternatively, in the reader. Patent Number
File date Applicant Disclosure
Velden T he invention relates to a method for Identifying a person, e.g. for use in controlling Access to physical or virtual spaces. The Method comprises the steps of storing data Relating to the identity of the person in first Memory means, storing data relating to at Least one unique biometric characteristic of The person in second memory means, Detecting the at least one biometric Characteristic on demand, comparing the or Each detected biometric characteristic with The or each stored biometric characteristic, And releasing the identity data when the or Each detected biometric characteristic Matches the or each stored biometric Characteristic. By using biometric Characteristics, like, e.g. a fingerprint, an Image of an iris or a DNA-"fingerprint", which Are unique to each person, the results of the Identification cannot be manipulated, Thereby providing excellent security. The Invention also relates to a system for carrying Out this method. In a preferred embodiment of The system, the memory means are arranged On a Data Carrier together with the comparing Means and possibly the detecting means, Resulting in an extremely compact, very Secure self-contained personal identification System.
File date Applicant Disclosure
CN1403996 19-Mar-03 Wang Baidong The invention is a method of applying Fingerprint recognition in confirming identity of Financial Data Carrier and authentic Biometric readable device holders. The
Unique fingerprint is stored into the magnetic Bar or IC chip of financial Data Carrier and credit Data Carrier. Identification passport Data Carrier EP0945821 29-Sep-99 Compaq Computer Corp A fingerprint authentication methodology in Which a biometric authentication device reader with an authentic Biometric readable device forms Factor is used to transmit the imprint of a Fingerprint to a live-scan device. Use of a Authentic Biometric readable device form avoids direct contact of the Imprint with the live-scan device, reducing Wear and tear on the live- scan device. Use of A "smart" Data Carrier to store an imprint Templates Enables the owner of user to maintain control Of the print.
ID Data Carrier as we know it have no electronic gadgets or gizmos to read the finger or thumbprint of the person whilst holding the Data Carrier at the point of inserting the Data Carrier into a machine that reads the details of the person who the Data Carrier belongs, 1. Multi-application ID Data Carrier itself can be made out of various materials 2. There is no reason for an ID Data Carrier to be, made out of a part or parts that actually incorporate the screen of a fingerprint recognition machine.
3. Therefore, using a chip or radio sensors to create a direct live link to and from machine and Data Carrier. The Data Carrier was inserted or passing the radio census so that the machine reads the fingerprint recognition Data Carrier, therefore one equally identifying the data carrier User from a fingerprint Recognition file, personal ID Data Carrier Therefore cross references the file held at the original time of licensing, 4. When a data carrier User removes the Data Carrier still holding it with their finger and thumb, they remove the finger and thumb digital encrypted reader multi-application ID/ Data Carrier.
5. If the Data Carrier is lost or stolen, it would make it physically impossible to use a Data Carrier, as that the criminal's fingerprint does not match to the original licensed user. Therefore, to the will become useless and obsolete.
6. Upon the point of the Data Carrier been used in a machine without the correct uses fingerprint the information of this cn Finals fingerprint then will be automatically downloaded into the machine and saved for the police authorities with the power of law behind them to catch and convict this criminal.
7. Removable fingerprint/thumbprint pad reader.
This description is a generation from my earlier invention that is granted and of Wolfdale, global club card and shop discount card.
Patent number: GB 2363358 To connect this with claims of the above granted number In the claims 15. A data carrier as claimed in any of claims 11 to 13, wherein the carrier includes a finger or thumbprint to identify the data carrier User.
As that, these two inventions are in somewhat way connected I would like to give this New Invention the reference: DOG Future of things to come.
Evolution is here (DRAWINGS) Number of drawing 2 Number of pages 2 1. Card 2. Thumbprint/fingerprint 3. Card reader 4. Function buttons 5. Visual display 6. Connections for Data Carrier concealed inside slot 7. Connection to communicate between reader and Data Carrier.
8. Finger thumbprint sensitive device reader 9. Connections made up by direct supply.
lO.Radio waves Connections made use of the radio Data Carrier, 1 1. Clowse proximity Data Carrier reader.
12.None of the prior art above stipulates a key fob fingerprint reader, which could include but is not limited to transmitter to transmit the fingerprint from the key fob to a receiver.
13. Finger thumbprint sensitive device reader 14. Function buttons 15.Visual display 16.Audio verification input device/microphone 17.10udspeaker four personal verification acceptance 18.Digitally secure biometric Templates data storage removable carrier micro chip.
l9.For example but not limited to, a slot to house the data carrier biometric information chip.
20.transmitting and receiving aerial, close proximity area 21.Retina verification visual sensor/Digital Camera lens 22.function buttons for dialling and number or pin 23.power supply power pack

Claims (7)

1. a computer digital system comprising: a biometric digital right protected data storage removable carrier use within multiple portable or static devices for biometric & DNA algorithms identification verification including encryption pin code file key stored on initial enrolment of a bio entity, one or all of biometric & DNA information to be stored, then to be used individually at any one time when required, An input device reader arranged at first location comprising a first digital biometric reading device for reading of an identification code stored on the biometric digital data storage removable carrier communicating all means to transfer information via induction communicating between devices, therefore, cross referencing the live biometric and DNA information of stored information within the removable Data carrier and biometric information stored at the covert database server, an input device reader arranged at first location to read biometric information directly from the live bio entity for establishing idenfffcaffon and verification of registered bio entity account and pass, c.e
2. a digital right protected memory as claimed in a claim 1, wherein the output digital communicating memory having an order to verify
3. a digital rights protected memory as claimed in claim 1,or claim 2, I. .:wherein the output digital communicating memory having an order to refuse verification check and transaction if a Match is not found.
4. a Cross reference biometric sensor's located on a portable or static computerized device as claimed in claim 1,or claim 3,wherein the DEVICE can read all biometric information relating to verification of the living bio entity
5. a computer system substantially as herein described with reference to the accompanying drawings
6. a digital control computer memory system substantially as herein described with reference to the accompanying drawings
7. a data carrier substantially as herein described with reference to the accompanying drawings.
GB0329076A 2003-05-17 2003-12-16 Computer system with data carrier having biometric user identification Withdrawn GB2401822A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB0311423.8A GB0311423D0 (en) 2003-05-17 2003-05-17 ID card

Publications (2)

Publication Number Publication Date
GB0329076D0 GB0329076D0 (en) 2004-01-14
GB2401822A true GB2401822A (en) 2004-11-24

Family

ID=9958311

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB0311423.8A Ceased GB0311423D0 (en) 2003-05-17 2003-05-17 ID card
GB0329076A Withdrawn GB2401822A (en) 2003-05-17 2003-12-16 Computer system with data carrier having biometric user identification

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB0311423.8A Ceased GB0311423D0 (en) 2003-05-17 2003-05-17 ID card

Country Status (1)

Country Link
GB (2) GB0311423D0 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2441793A (en) * 2006-09-18 2008-03-19 John F Franchi Secure transaction system using biometric data verification
WO2010108929A3 (en) * 2009-03-23 2010-11-25 Intresco B.V. Methods for providing a set of symbols uniquely distinguishing an organism such as a human individual
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996006409A1 (en) * 1994-08-25 1996-02-29 Geefield Pty. Ltd. Method and apparatus for providing identification
EP0945821A2 (en) * 1998-03-25 1999-09-29 Compaq Computer Corporation Smart card with fingerprint image pass-through
WO2000048135A1 (en) * 1999-02-11 2000-08-17 Image Data, Llc Positive identity verification system and method including biometric user authentication
WO2001061640A1 (en) * 2000-02-16 2001-08-23 Ong Yong Kin Michael Electronic credit card - ecc
US20020030359A1 (en) * 1998-04-02 2002-03-14 Jerker Bergenek Fingerprint system
WO2002084602A1 (en) * 2001-04-17 2002-10-24 Van Der Velden Hendrikus Herma Method and system for identifying a person by using biometric characteristics

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996006409A1 (en) * 1994-08-25 1996-02-29 Geefield Pty. Ltd. Method and apparatus for providing identification
EP0945821A2 (en) * 1998-03-25 1999-09-29 Compaq Computer Corporation Smart card with fingerprint image pass-through
US20020030359A1 (en) * 1998-04-02 2002-03-14 Jerker Bergenek Fingerprint system
WO2000048135A1 (en) * 1999-02-11 2000-08-17 Image Data, Llc Positive identity verification system and method including biometric user authentication
WO2001061640A1 (en) * 2000-02-16 2001-08-23 Ong Yong Kin Michael Electronic credit card - ecc
WO2002084602A1 (en) * 2001-04-17 2002-10-24 Van Der Velden Hendrikus Herma Method and system for identifying a person by using biometric characteristics

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2441793A (en) * 2006-09-18 2008-03-19 John F Franchi Secure transaction system using biometric data verification
GB2441793B (en) * 2006-09-18 2009-01-07 John F Franchi Secure transaction system
US7886156B2 (en) 2006-09-18 2011-02-08 John Franco Franchi Secure universal transaction system
WO2010108929A3 (en) * 2009-03-23 2010-11-25 Intresco B.V. Methods for providing a set of symbols uniquely distinguishing an organism such as a human individual
US9607127B2 (en) 2009-03-23 2017-03-28 Jan Jaap Nietfeld Methods for providing a set of symbols uniquely distinguishing an organism such as a human individual
NL2003311C2 (en) * 2009-07-30 2011-02-02 Intresco B V Method for producing a biological pin code.
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents

Also Published As

Publication number Publication date
GB0329076D0 (en) 2004-01-14
GB0311423D0 (en) 2003-06-25

Similar Documents

Publication Publication Date Title
US10296735B2 (en) Biometric identification device with removable card capabilities
US6325285B1 (en) Smart card with integrated fingerprint reader
US7310042B2 (en) System and method for biometric-based fraud protection
US7278025B2 (en) Secure biometric verification of identity
US8103881B2 (en) System, method and apparatus for electronic ticketing
US20060107067A1 (en) Identification card with bio-sensor and user authentication method
US20080028230A1 (en) Biometric authentication proximity card
US20060170530A1 (en) Fingerprint-based authentication using radio frequency identification
AU2017221747B2 (en) Method, system, device and software programme product for the remote authorization of a user of digital services
JP2009543176A (en) Traceless biometric identification system and method
WO2003007125A2 (en) Secure network and networked devices using biometrics
LT5344B (en) Secure biometric verification of identity
US20100131414A1 (en) Personal identification device for secure transactions
JP2018124622A (en) Admission reception terminal, admission reception method, admission reception program, and admission reception system
JP2003271565A (en) Identity authentication system, identity authentication terminal, reader, and identity authentication method
JP2020013525A (en) Authentication device, authentication system, and authentication method
EP2365477A1 (en) Personal identification device for secure transactions
EP1276054A1 (en) Personal authentication system
KR101812637B1 (en) Method, institution card, and system for verifing identity using identification code
JP2001067322A (en) Personal authentication system
JP2004070894A (en) Card system with individual identification
GB2401822A (en) Computer system with data carrier having biometric user identification
JP2005141503A (en) System and method for charge settlement, and recording medium
WO2013051010A2 (en) A system and method for implementing biometric authentication for approving user's financial transactions
JP2001358828A (en) Mobile equipment, fingerprint authenticating method for mobile equipment and recording medium with fingerprint authenticating program for mobile equipment recorded thereon

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)