WO2006059190A2 - Method and apparatus for electro-biometric identity recognition - Google Patents
Method and apparatus for electro-biometric identity recognition Download PDFInfo
- Publication number
- WO2006059190A2 WO2006059190A2 PCT/IB2005/003281 IB2005003281W WO2006059190A2 WO 2006059190 A2 WO2006059190 A2 WO 2006059190A2 IB 2005003281 W IB2005003281 W IB 2005003281W WO 2006059190 A2 WO2006059190 A2 WO 2006059190A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ecg
- signature
- biometric
- signal
- enrolled
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 176
- 238000002565 electrocardiography Methods 0.000 claims description 254
- 238000012545 processing Methods 0.000 claims description 31
- 239000000523 sample Substances 0.000 claims description 27
- 238000004458 analytical method Methods 0.000 claims description 16
- 238000000513 principal component analysis Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 11
- 230000007246 mechanism Effects 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 10
- 238000000718 qrs complex Methods 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 8
- 238000000354 decomposition reaction Methods 0.000 claims description 7
- 230000001131 transforming effect Effects 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 5
- 210000000707 wrist Anatomy 0.000 claims description 5
- 230000002457 bidirectional effect Effects 0.000 claims description 4
- 210000004247 hand Anatomy 0.000 claims description 2
- 238000010606 normalization Methods 0.000 claims description 2
- 230000002829 reductive effect Effects 0.000 claims description 2
- 238000001514 detection method Methods 0.000 claims 3
- 230000001413 cellular effect Effects 0.000 claims 1
- 238000012795 verification Methods 0.000 abstract description 7
- 238000009826 distribution Methods 0.000 description 24
- 230000006870 function Effects 0.000 description 18
- 230000009466 transformation Effects 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000012360 testing method Methods 0.000 description 8
- 230000002596 correlated effect Effects 0.000 description 6
- 239000002184 metal Substances 0.000 description 6
- 238000000844 transformation Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000010276 construction Methods 0.000 description 5
- 230000004913 activation Effects 0.000 description 4
- 229940079593 drug Drugs 0.000 description 4
- 239000003814 drug Substances 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000005259 measurement Methods 0.000 description 4
- 238000012935 Averaging Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 3
- 238000010219 correlation analysis Methods 0.000 description 3
- 230000007423 decrease Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000005192 partition Methods 0.000 description 3
- 210000001525 retina Anatomy 0.000 description 3
- 230000003213 activating effect Effects 0.000 description 2
- 230000001154 acute effect Effects 0.000 description 2
- 239000000654 additive Substances 0.000 description 2
- 230000000996 additive effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 150000001875 compounds Chemical group 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000008030 elimination Effects 0.000 description 2
- 238000003379 elimination reaction Methods 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 210000003414 extremity Anatomy 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 230000002068 genetic effect Effects 0.000 description 2
- 238000012880 independent component analysis Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000000670 limiting effect Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000007619 statistical method Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000026676 system process Effects 0.000 description 2
- 210000001519 tissue Anatomy 0.000 description 2
- 230000001052 transient effect Effects 0.000 description 2
- RZVHIXYEVGDQDX-UHFFFAOYSA-N 9,10-anthraquinone Chemical compound C1=CC=C2C(=O)C3=CC=CC=C3C(=O)C2=C1 RZVHIXYEVGDQDX-UHFFFAOYSA-N 0.000 description 1
- 241001465754 Metazoa Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000036772 blood pressure Effects 0.000 description 1
- 230000006998 cognitive state Effects 0.000 description 1
- 238000011109 contamination Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000000875 corresponding effect Effects 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000008921 facial expression Effects 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 210000005003 heart tissue Anatomy 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000013178 mathematical model Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000004660 morphological change Effects 0.000 description 1
- 210000000653 nervous system Anatomy 0.000 description 1
- 239000011824 nuclear material Substances 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000035790 physiological processes and functions Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 210000001747 pupil Anatomy 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000011524 similarity measure Methods 0.000 description 1
- 231100000430 skin reaction Toxicity 0.000 description 1
- 230000000638 stimulation Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000002889 sympathetic effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 210000003371 toe Anatomy 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000002747 voluntary effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/213—Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
- G06F18/2135—Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods based on approximation criteria, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/117—Identification of persons
Definitions
- Identity recognition plays an important role in numerous facets of life, including automatic banking services, e-commerce, e-banking, e-investing, e-data protection, remote access to resources, e-transactions, work security, anti-theft devices, criminologic identification, secure entry, and entry registration in the workplace.
- biometrics As a result, identity recognition systems that use measures of an individual's biological phenomena — biometrics — have grown in recent years. Utilized alone or integrated with other technologies such as smart cards, encryption keys, and digital signatures, biometrics are expected to pervade nearly all aspects of the economy and our daily lives .
- biometric identification including fingerprint recognition, retina and iris recognition, face recognition, and voice recognition.
- Shockley et al . , U.S. Pat. No. 5,534,855 generally describes using biometric data, such as fingerprints, to authorize computer access for individuals.
- Scheidt et al . , U.S. Patent No. 6,490,680 describes identity authentication using biometric data.
- Dulude et al . , U.S. Patent No. 6,310,966 describes the use of fingerprints, hand geometry, iris and retina scans, and speech patterns as part of a biometric authentication certificate.
- 6,483,929 generally describes "physiological and histological markers," including infra-red radiation, for biometric authentication.
- these types of technologies have penetrated only limited markets due to complicated and unfriendly acquisition modalities, sensitivity to environmental parameters (such as lighting conditions and background noise), and high cost.
- the foregoing technologies usually require operator attendance.
- Fingerprint recognition is well-established and the most mature technology of the group. But it has several drawbacks: a fingerprint recognition system cannot verify physical presence of the fingerprint owner and therefore is prone to deception, limiting its suitability for on-line applications; the optical sensor is a costly and fragile device generally unsuitable for consumer markets; and the system suffers from negative connotations related to criminology. Retina scanning technologies are characterized by high performance. However, they require high-precision optical sensors, and are not user friendly because they require manipulation of head posture and operate on a very sensitive organ — the human eye. The optical sensor is also costly and fragile.
- Iris and face recognition systems are user-friendly technologies since they record an image from afar and are not intrusive. However, they require digital photographic equipment and are sensitive to lighting conditions, pupil size variations and facial expressions. In addition, iris recognition performance is degraded by the use of dark glasses and contact lens, and face recognition may be deceived by impersonation.
- Voice recognition is the most user-friendly technology of the group; however, it requires a low-noise setting and is highly sensitive to intrinsically variable speech parameters, including intonation. Moreover, existing conventional recording technologies may be used to deceive speech-based recognition systems.
- ECG signals are electric signals generated by the heart and can be picked up using conventional surface electrodes, usually mounted on the subject's chest. ECG signals are made up of several components representative of different functional stages during each heart beat and projected according to the electric orientation of the generating tissues. Individuals present different, subject-specific detail in their electro-cardiologic signals due to normal variations in the heart tissue structure, heart orientation, and electrical tissue orientation, all of which affect the electro-cardiologic signals measured from the limbs. Numerous types of systems make use of these subject-specific variations .
- ECG signal is comprised of ECG components having features that may be common to a group. None of these references describe a system or method that eliminates common features of ECG components to create a signature for subject identification. Thus, there still exists a need for systems and methods with these attributes to identify an individual.
- Applicant provides solutions to the foregoing problems of biometric identification with various apparatuses and methods having several aspects.
- applicant solves each of the foregoing problems of biometric identification through the use of the following method and variations thereof: producing and storing a first biometric signature that identifies a specific individual by forming the difference between a representation of the heartbeat pattern of the specific individual and a stored representation of common features of heartbeat patterns of a plurality of individuals; after the producing step, obtaining a representation of the heartbeat pattern of a selected individual and producing a second biometric signature by forming the difference between the heartbeat pattern of the selected individual and the stored representation of the common features of the heartbeat patterns of the plurality of individuals; and comparing the second biometric signature with the first biometric signature to determine whether the selected individual is the specific individual.
- a system comprises an ECG signal acquisition module, an ECG signal processing module that comprises an ECG signature generator, and an output module .
- the systems and methods disclosed herein transform bio-electric signals into unique electro-biometric signatures .
- the uniqueness of the electro-cardiologic signatures makes the system very difficult to deceive, and the method's inherent robustness makes it ideal for local as well as for remote and on-line applications.
- a biometric-signature-based system is characterized by high recognition performance and supports both open and closed search modes.
- the stored representation of common features of one or more ECG components is obtained by measuring and storing such representations for a plurality of individuals and then averaging all of the stored representations.
- the common features may be obtained through techniques such as principal component analysis, fuzzy clustering analysis, wavelet decomposition, and the like. Since electro-cardiologic methods according to this first aspect are robust, they have another important advantage: they permit a simple and straightforward acquisition technology that can be implemented as a low-cost, user friendly acquisition apparatus and also eliminate the need for a skilled operator.
- the common features of one or more of a subject's ECG components may be removed using an analytical model of common features of one or more ECG components, instead of, or in addition to, use of an empirical model.
- the common features may be removed by first classifying the stored representations into subgroups, identifying the common features in at least one subgroup, classifying a subject signal according to subgroup, creating a subject signature by removing the common features of one or more of the subgroup's ECG components from the subject signal, and identifying the subject by calculating the subject signature correlations relative to that subgroup's signatures.
- Common features may be determined by averaging synchronized electrocardiograms from a group of individuals and then subtracted from the subject's electrocardiogram to determine the subject's signature. But this method assumes that common features are constant across a group of individuals. In reality, certain common features are present to a greater or lesser degree in any given individual. Therefore, it is better to approximate common features so they make the best fit with a given subject's electrocardiogram before removing them to obtain the subject's signature. This technique provides for a more accurate determination of the subject's signature.
- a group of electrocardiograms may be broken down (decomposed) into a set of characteristic waveforms.
- the characteristic waveforms that represent common features of the group are then weighted to best approximate the extent of common features present in the subject's electrocardiogram.
- the approximation is then subtracted from the subject's electrocardiogram. What remains includes the subject's electrocardiogram signature.
- Multiple templates may also be kept for each subject, such as by storing multiple signatures produced by an individual at different pulse rates.
- the subject signature may then be correlated with the appropriate template, such as the one for the appropriate pulse rate.
- the systems and methods disclosed herein may use multiple signature templates to identify an individual over a range of circumstances and reactions.
- the subject signal and the enrolled signals may also be normalized based on pulse rate.
- a process for identification may set a dynamic threshold. This dynamic threshold may be based on a desired level of confidence in the identification, such as one determined by a confidence score.
- the systems and methods disclosed herein may employ a "Q-factor" to determine whether to reduce signal contamination due to noise.
- the Q-factor or other quality of signal measurement may be used to determine the length of the subject sample required to identify a subject with a desired level of confidence. It may also be used to enroll a sample with the desired level of confidence so that the sample may be suitable for the future comparison.
- the systems and methods disclosed herein may calculate standard deviations in the subject signature and/or enrolled signatures due to noise, and from those calculations determine whether signal quality is appropriate for identification.
- the systems and methods disclosed herein may determine the signal quality by measuring the impedance of the contact or probe. Signal quality measurements according to this aspect may also be used to inform the subject to adjust his or her contact with or position relative to the sensor or probe.
- the subject and database signatures may be encrypted as a safety precaution against unauthorized access to and use of the signatures.
- the ECG signal may be acquired with electrodes placed in contact with certain body sites that yield a consistent signal. For certain body locations even a slight change of electrode placement may cause drastic changes in the received signal morphology, and may even cause distinct signal components to appear or disappear.
- the methods and systems disclosed herein may use electrode placement sites that produce subject-specific, consistent signals, that are robust notwithstanding changes of electrode placement within the sites. These sites include the arms and legs (including fingers and toes) . The robustness of electrode placement within these sites stems from a constant electro-cardiologic signal projection which does not change as long as the electrodes remain close to a limb extremity.
- certain sensing probes may also be used to acquire a signal, including a signal from a single body point such as a fingertip.
- these ultra-high impedance probes may remotely sense the electro-cardiologic signal and thereby eliminate the difficulty of electrode placement while maintaining signal consistency.
- the systems and methods disclosed herein may comprise elements and steps that protect against enrollment fraud and reduce the ability of a database enrollee to misrepresent his or her identity.
- the systems and methods disclosed herein may identify a subject by comparing his or her match scores with the match scores of database enrollees .
- the systems and methods disclosed herein may use weighted correlation techniques, ascribing different weights to different electro-cardiologic signal components for the purpose of producing a signature.
- signatures may be normalized using a variety of metrics including root-mean-square computations or Ll metrics .
- Some biometric technologies employ challenge-response protocols to ensure that the user data that they receive is live. In that way, they can reduce the risk that the system can be spoofed by the playback of biometric data.
- the challenge-response mechanisms for biometric systems have required active participation by the user. And active user participation complicates and extends the user verification process. For example, speech recognition systems typically require the user to repeat a randomly selected word or sentence.
- a biometric ID system may reduce the risk of spoofing by beneficially employing a biological-challenge- response mechanism that does not require a conscious response from the user.
- the systems and methods according to each of the foregoing aspects preferably perform their tasks automatically for the purpose of identity recognition. Further, these systems and methods can be incorporated into a wide range of devices and systems.
- a few non-limiting examples are as follows: a smart card; a passport; a driver's license apparatus; a Bio-logon identification apparatus; a personal digital assistant ("PDA") ; a cellular- embedded identification apparatus; an anti-theft apparatus; an ECG monitoring apparatus; an e-banking apparatus; an e- transaction apparatus; a pet identification apparatus; a physical access apparatus; a logical access apparatus; and an apparatus combining ECG and fingerprint monitoring, blood pressure monitoring and/or any other form of biometric device.
- PDA personal digital assistant
- systems and methods disclosed herein can be used to identify a person's age, such as by comparing the width of a subject's QRS complex, or more generally the subject's QRS-related signature component, with those of an enrolled group or analytical ECG model.
- the systems and methods herein may be used to identify persons on medication, such as by enrolling and calculating, or analytically deriving, a series of drug-related signature templates. This method may also be used to identify or catch subjects who would attempt to fool the system by using medication to alter their ECG signal .
- Other applications include using the systems and method disclosed herein for building and room access control, surveillance system access, wireless device access, control and user verification, mobile phone activation, computer access control (including via laptop, PC, mouse, and/or keyboard) , data access (such as document control), passenger identification on public transportation, elevator access control, firearm locking, vehicle control systems (including via ignition start and door locks), smart card access control and smart card credit authorization, access to online-line material (including copyright-protected works), electronic ticketing, access and control of nuclear material, robot control, aircraft access and control
- vending machine access and control (passenger identity, flight control, access of maintenance workers) , vending machine access and control, laundromat washer/dryer access and control, locker access, childproof locks, television and/or video access control, decryption keys access and use, moneyless slot machines, slot machine maintenance access, game console access (including on-line transaction capability) , computer network security (including network access and control) , point-of-sale buyer identification, on-line transactions (including customer identification and account access), cash payment service or wire transfer identification, building maintenance access and control, and implanted medical device programming control.
- Other applications will be apparent to those skilled in the art and within the scope of this disclosure.
- an apparatus can operate continuously or on demand.
- the apparatus can be constructed to obtain the representation of the heartbeat pattern of a selected individual by having one or more electrodes in contact with individual or sensors remote from the individual.
- the apparatus can be enabled for a limited period of time after successful recognition and disabled thereafter until the next successful recognition is performed.
- the apparatus can be constructed to operate with encryption keys or digital signatures .
- the steps of the foregoing methods may be performed sequentially or in some other order.
- the systems and methods disclosed herein may be used on human or other animal subjects. Each of these aspects may be used in permutation and combination with one another. Further embodiments as well as modifications, variations and enhancements are also described herein.
- FIG. 1 is a simplified block diagram of a system for use with the aspects disclosed herein composed of a signal acquisition module, a signal processing module, and an output module.
- FIG. 2 is a block diagram of an embodiment of the signal acquisition module of the system of FIG. 1.
- FIG. 3 is a block diagram of an embodiment of the signal processing module of the system of FIG. 1.
- FIG. 4 shows the first six most influential PCs extracted from a pool of one-hundred subjects, and the contribution of the first ten PCs to the representation of data variance.
- FIG. 5 shows the original electrocardiographic signals and their respective signatures constructed by eliminating the optimal combination of the three most influential PCs and their latency shifted versions.
- FIG. 6 is a diagram showing a grand-average electro- cardiologic signal waveform calculated from a database of 20 subjects .
- FIG. 7 shows a group of electro-cardiologic signal waveforms of ten of the subjects participating in the database and contributing to the average waveform of FIG. 4.
- FIG. 8 shows a group of electro-biometric signature waveforms, or templates, derived from the signal waveforms of FIG. 7.
- FIG. 9 shows a scatter plot and distribution histograms of the sign-maintained squared correlation values of the 20 subjects who contributed to the grand average waveform of FIG. 4.
- FIG. 10 shows a table of z-scores based on the desired degree of confidence in the identification cut-off.
- FIG. 11a shows a distribution of correlation.
- FIG. lib shows a distribution of Z-transformed correlations .
- FIG. 12 shows identification performance curves (static) .
- FIG. 13 shows identification performance curves (dynamic) .
- FIG. 14 shows signal quality as a function of NSR.
- FIG. 15 shows match score distribution as a function of signal quality for 5 second segments.
- FIG. 16 shows match score distribution as a function of signal quality for 20 second segments.
- FIG. 19 shows a functional component diagram of a preferred system.
- FIG. 20 shows a functional component diagram of a preferred signal processor.
- “Closed search” means a search in which a single stored signature is examined to verify the identity of an individual.
- Open search means a search in which a plurality of stored signatures are searched to identify a subject.
- a bio-electric signal is acquired, processed and analyzed to identify the identity of an individual.
- FIG. 1 shows a system called an Electro-Biometric IDentification (E-BioID) system.
- E-BioID Electro-Biometric IDentification
- the stored representation of the common features of the one or more ECG components of the plurality of individuals is the average of those individuals' one or more ECG components.
- other embodiments can utilize stored representations of different types of common features, such as those attainable by, for example, principal component analysis, fuzzy clustering analysis, or wavelet decomposition, or provided by an analytical model.
- the basic elements of the E-BioID system include a signal acquisition module 12, a signal processing module 14, and an output module 16, implemented in a single housing.
- the system may provide for remote analysis of locally acquired electro-biometric signals.
- FIG. 2 shows a preferred construction of the signal acquisition module 12 in an E-BioID system.
- the data acquisition module preferably includes one or more sensors 22, pre-amplifiers 24, band-pass filters 26 and an analog- to-digital (A/D) converter 28.
- A/D analog- to-digital
- Sensors 22 can be of any type capable of detecting the heartbeat pattern.
- they can be metal plate sensors that are an "add-on" to a standard computer keyboard.
- a single sensor may, by itself, acquire the signal from a single point of contact, such as by contacting a finger; alternately, the sensor may not need to touch the subject at all.
- FIG. 3 shows preferred elements of signal processing module 14 in the E-BioID system.
- the signal processing module preferably includes a Digital Signal Processor (DSP) 32, a Dual Port Ram (DPR) 34, an Electrically Erasable Programmable Read Only Memory (E 2 PROM) 36 and an I/O port 38.
- DSP Digital Signal Processor
- DPR Dual Port Ram
- E 2 PROM Electrically Erasable Programmable Read Only Memory
- I/O port 38 I/O port
- the signal processing module may be implemented, with suitable programming, on a personal computer, which is a flexible computation platform, allowing straight-forward integration of the system into existing computing facilities in a home, office, or institute/enterprise environments .
- Output module 16 preferably consists of a dedicated display unit such as an LCD or CRT monitor, and may include a relay for activation of an external electrical apparatus such as a locking mechanism. Alternatively, the output module may include a communication line for relaying the recognition result to a remote site for further action.
- Bioelectric signals are acquired in a simple manner, where the subject is instructed to touch at least one sensor 22 for a few seconds.
- the one or more sensors which may be metal plates, conduct the bioelectric signals to the amplifiers 24, which amplify the bioelectric signals to the desired voltage range. In a preferred embodiment, the voltage range is zero to five volts.
- the amplified signals pass through filters 26 to remove contributions outside a preferable frequency range of 4Hz — 40Hz. Alternatively, a wider range of 0.IHz — 100Hz may be used in conjunction with a notch filter to reject mains frequency interference (50/60Hz) . Digitization of the signal is preferably performed with a 12-bit A/D converter 28, at a sampling frequency of preferably about 250Hz.
- the signals are normalized by the ⁇ R' peak magnitude, to account for signal magnitude variations which mostly relate to exogenic electrical properties.
- the normalized data is transformed into an electro-biometric signature which is compared to pre-stored electro-biometric signature templates.
- the result of the comparison is quantified, optionally assigned a confidence value, and then transmitted to output module 16, which provides recognition feedback to the user of the E-BioID system and may also activate external apparatuses such as a lock or siren, virtual apparatuses like network login confirmation, or a communication link.
- the signal may be normalized for pulse rate. This is useful because electro- cardiologic signals are affected by changes in pulse rate, which is a well-known electro-cardiologic modifier.
- Pulse rate changes may cause latency, amplitude and morphological changes of the ⁇ P' and ⁇ T' components relative to the ⁇ QRS' component of the electro-cardiologic signal (these components appear in FIG. 7) .
- pulse rate changes may be automatically compensated for by retrospective, pulse rate-driven adjustment of the signal complex.
- an adaptive operation mode of the system can track and compensate for pulse rate induced changes. This can be done by compressing or expanding the time scale of one cycle of the heartbeat waveform. More sophisticated formulations describing the relations between waveform characteristics
- a method according to this variation may be based on electro-cardiologic signal discrimination, wherein analysis is carried out synchronously with the heart beat, eliminating features common to the general population and thus enhancing subject-specific features that constitute an electro-biometric, or biometric, signature, normally undetectable in raw electro-cardiologic signals.
- the E-BioID system is implemented as a fully integrated compact device, where many of the functional elements are implemented on an ASIC based system.
- the apparatus can be incorporated into a watch worn on the wrist, where the signal is measured between the wrist of the hand on which the watch is worn and the other hand of the wearer.
- the back side of the watch may be made of a conductive medium
- the watch may transmit a signal indicating confirmation of the identity of its wearer, and/or activating a physically or logically locked device such as a door, a computer, a safe, etc.
- the watch may also transmit personal information about its wearer.
- the apparatus can be incorporated into a belt, or any other apparel item comprising a conductive medium.
- the belt or other apparel item may then transmit a signal indicating confirmation of the identity of its wearer, and/or activating a physically or logically locked device and/or transmitting personal information about its wearer.
- Biometric recognition requires comparing a newly acquired biometric signature against signature templates in a registered or enrolled biometric signature template database. This calls for two phases of system operation:
- each new subject is instructed to touch a first sensor with a finger of the left hand, while simultaneously touching another sensor with a finger of the right.
- the subject may touch the sensors, typically made of metal, with other parts of the body, preferably the hands or legs.
- the subject may touch a single sensor with a single body point. Alternately, the subject need not touch a sensor at all.
- the system monitors the subject's pulse rate and initiates a recording, preferably lasting for at least 20 seconds. Shorter intervals may be used depending on the required level of accuracy. Once the recording is complete, the system may perform a self-test to verify signature consistency by comparison of at least two biometric signatures derived from two parts of the registered segment.
- the two parts may be two halves, or two larger, overlapping, segments.
- the two parts may be used to derive two biometric signatures. If the self-test result is successful, enrollment of that subject is complete, and if unsuccessful the procedure is repeated. The successful recording is used for construction of an electro-cardiologic signal or a series of electro-cardiologic signals, which are added to an electro-cardiologic signal database.
- the electro-cardiologic signals are then transformed into a set of electro-biometric signature templates by eliminating features that are common to all or a subset of the subjects participating in the dataset, thereby enhancing subject-specific discriminating features.
- the system creates a grand- average electro-cardiologic template, which is calculated by synchronous averaging of normalized electro-cardiologic signals from the entire pool of subjects.
- the grand-average represents the above-mentioned common features, and thus subtraction of the grand-average from each one of the electro-cardiologic signals yields a set of distinct, subject-specific electro-biometric template signatures.
- other means for elimination of the common features may be used, such as a principal component analysis, fuzzy clustering analysis or wavelet decomposition.
- a group of electrocardiograms may be broken down (decomposed) into set of characteristic waveforms .
- noise is removed from the electrocardiograms of a group of individuals.
- the system may use Principal Component Analysis (PCA) to decompose the group's electrocardiograms into a set of orthogonal (non-correlated) components. These non-correlated components, taken together, represent the entire energy of the signals—that is 100% of the signal variance.
- PCA Principal Component Analysis
- the first principal components are associated with largest eigen values of the PCA representation.
- the first three to five components and, in any event, less than the first ten components of the group's electrocardiograms typically represent approximately 90% of the electrocardiogram's energy or variance and contain the common features .
- these first components represent common features that are present and stable across the human population at large.
- the remaining smaller components (which typically can be 10% of the total waveform energy) represent noise and some individual information of the group.
- the characteristic waveforms that represent common features of the group are then subtracted from the subject's electrocardiogram. What remains includes the subject's electrocardiogram signature plus some remaining noise.
- Characteristic waveforms may be created in different ways, and depend on the desired “distance” or “overlap” between each waveform.
- the correlation function may preferably be used to determine the desired distance between waveforms, although other methods also work.
- an electrocardiogram is taken from an individual who has not participated in the enrollment data set, it is possible to determine his or her electrocardiogram signature usually with reference to just the first three to four PCA components of the enrolled data set and time shifted versions of them.
- All subjects' electrocardiograms contain each of the first principal components to greater or lesser degrees. According to this preferred embodiment, a subject's electrocardiogram may be approximated using the principal components from the sample set according to the following equation.
- C 1 is a reconstruction coefficient
- p is the model order
- PC is the principal component.
- the goal is to find the coefficients that weight the database principal components for the best approximation of the subject's electrocardiogram. In other words, the goal is to minimize the error between an approximation of the subject signal constructed by the weighting the database's principal components and the original subject signature.
- One method is to determine reconstruction coefficients using a least squares approximation to minimize the norm of the reconstruction error. This is shown below:
- the optimal coefficients may be used to sum the database's first principal components (such as the top 3 or 4) according to the following equation:
- noise by definition, is uncorrelated, it is usually described by the last principal components — those that are associated with the smallest eigen values. As a result, noise may be optionally removed from the subject signal by weighting these last principal components to make the optimal fit with the subject signature and then removing them from the subject signal. Noise may also be removed by other methods .
- Some of the variation in an electrocardiogram component database is due to latency changes, namely time variance in enrolled data signatures.
- the foregoing method may be enhanced by time shifting the principal components, preferably both to the left and to the right. For example, if three principal components are used to approximate common electrocardiogram features, then six more components could be added to account for latency variation—two for each component, shifted left and shifted right.
- the three principal components and the six time shifted components would be used to calculate the construction coefficients. And once the best construction coefficients are determined, the common feature components are constructed and subtracted from the original subject electrocardiogram signature to yield the individual signature:
- FIG. 4 shows the first six most influential PCs extracted from a pool of one-hundred subjects, and the contribution of the first ten PCs to the representation of data variance.
- FIG. 5 shows the original electro- cardiographic signals and their respective signatures constructed by eliminating the optimal combination of the three most influential PCs and their latency shifted versions .
- ICA independent component analysis
- wavelet decomposition may be used to decompose compound signals into a set of time-scaled waveforms called wavelets.
- WD is based on a transient wavelet waveforms, as opposed to Fourier decomposition (which is based on continuous sine and cosine decomposition) .
- Fourier decomposition which is based on continuous sine and cosine decomposition
- WD has an advantage over Fourier analysis in that wavelets are more efficient descriptors of transient signal components such as electrocardiograms .
- common features may be removed by using an analytical model for common features of one or more ECG components rather than by using an empirical model calculated from the enrolled data.
- the database is divided into several subsets in a way that enhances intra- subset similarity and inter-subset disparity.
- the embodiment then calculates a distinct grand-average or other common feature determination for one or more of the subsets.
- This database partition itself may be performed using standard pattern classification schemes such as linear classifiers, Bayesian classifiers, fuzzy classifiers, or neural networks.
- it is useful to partition the database into subsets in order to simplify and shorten the search process as well as to ensure the validity of the grand-average ' as an appropriate representative of similarity among the electro-cardiologic signals.
- the subject signature may then be created by removing common features found in the appropriate subgroup.
- FIG. 6 shows an example of a grand-average, constructed from a pool of 20 subjects participating in the database.
- FIG. 7 shows 10 examples of electro-cardiologic signals
- FIG. 8 shows the electro-biometric template signatures derived from the above electro-cardiologic signals by elimination of features common to all the subjects included in the database. Specifically, each signature of FIG. 8 is obtained by subtracting the waveform of FIG. 6 from the corresponding signal of FIG. 7. It will be observed that while the original electro-cardiologic signals are highly similar, the derived electro-biometric signatures are markedly different. These differences have been found to reflect inherently unique electro-cardiologic disparity which underlies the recognition capabilities of the E-BioID system.
- the subject interacts with the system in a similar manner to that of the enrollment phase, however a shorter recording time on the order of a few seconds is sufficient.
- the system executes a verification procedure (closed search) : the system processes the acquired signals, forms an electro-biometric subject signature by removing common features found in the entire database, found in a partitioned subgroup of the database or provided by analytical ECG model, adjusts the signature according to the pulse rate, and compares the adjusted electro-biometric signature with the subject's enrolled electro-biometric signature template.
- a verification procedure close search: the system processes the acquired signals, forms an electro-biometric subject signature by removing common features found in the entire database, found in a partitioned subgroup of the database or provided by analytical ECG model, adjusts the signature according to the pulse rate, and compares the adjusted electro-biometric signature with the subject's enrolled electro-biometric signature template.
- the system executes an identification procedure (open search) : the system repeats the comparison process for the entire database or a partitioned sub-group of the database, thereby providing identification of the matching identity.
- an identification procedure open search
- the comparison is performed by calculation of a correlation coefficient, p, between an electro-biometric signature Oj and an electro-biometric signature template ⁇ if as follows: corfo ⁇ .j
- the comparison may be based on other similarity measures, such as RMS error between the electro-biometric signatures.
- the comparison may yield one or several correlation coefficients, depending on the mode of operation: closed search; or open search.
- closed search the sign- maintained squared correlation coefficient ( ⁇ ) is used for making the recognition decision: a value greater than a preset threshold is regarded as a positive identification, or a match; borderline, near-threshold values may indicate a need for extended or repeated recording.
- open search mode the largest sign-maintained squared correlation coefficient among all sign-maintained squared correlation coefficients yields the most likely subject identification, provided that the highest coefficient is above a selected threshold.
- the preset threshold is derived from the required confidence level; higher desired confidence levels require higher thresholds.
- sign-maintained squared correlation values larger than 0.8 are characteristic of a match and values lower than 0.7 are characteristic of a mismatch.
- sign-maintained squared correlation values higher than 0.8 may be considered as true matches and values lower than 0.7 as mismatches.
- the upper diagrams of FIG. 9 shows a scatter plot of sign-maintained squared correlation values, marking the 0.8 threshold with a dashed line. A clear separation between matches (circles) and mismatches (stars) is evident.
- the histograms in the other two diagrams provide a different view of the powerful recognition capabilities of the E-BioID system, where it can be seen that the mismatches are concentrated around the zero value (no correlation) while matches are densely distributed near 1.0 (absolute correlation) .
- more sophisticated decision schemes may be used such as multi-parameter schemes (e.g. fuzzy logic schemes) , which use more than one distance measure; for example, multiple correlation values can be derived from segmented data analysis.
- multi-parameter schemes e.g. fuzzy logic schemes
- the system improves its performance with time by adding electro-cardiologic signals to the subject's database file when changes in the signals are encountered.
- the system processes the newly acquired signals, calculates the pulse rate, forms an electro-biometric subject signature, selects the enrolled electro-biometric signature template with the most similar pulse rate, and compares the new electro- biometric signature with the selected enrolled electro- biometric signature template.
- the system uses signals acquired during long-term system operation to track possible variation in the enrolled subject electro- cardiologic signal and, if consistent changes occur, the enrolled signal is automatically adjusted to reflect these changes.
- This tracking process compensates for gradual changes in the electro-cardiologic signal over long time periods, but does not compensate for fast, acute changes like those expected in connection with clinical heart conditions.
- such acute changes may be reported to the subject indicating a need for medical consultation.
- Biometric identification methods benefit from proper determination of an identification threshold.
- the identification threshold may be derived from correlation analysis between candidate signatures and registered database signatures.
- the threshold may be determined using a distribution of empirical data to achieve optimal identification performance. Yet a fixed threshold implicitly assumes deterministic signatures and stationary noise, while in practice signatures are variable and noise depends on mostly unpredictable external influences. Therefore, biometric identification methods, including those according to the first aspect, may be adversely affected by signal and noise variations in database and test readings . In general, this would yield decreased correlations for both matches and mismatches.
- methods and systems of biometric identification may use a dynamic threshold capable of compensating for the effect of signal variations and noise interference.
- This aspect yields a dynamic, data- dependent identification threshold.
- the dynamic threshold is re-calculated in each identification attempt using a statistical approach to normalize the correlation data and thus enable calculation of a quantifiable, statistically significant identification threshold.
- the threshold is shown to be resistant to variable signal and noise conditions.
- the preferred method according to this second aspect is based on determination of a confidence limit for a correlation-based scoring between a test signature and a set of registered signatures.
- ECG signatures can be empirically determined, but they may also be synthetic, in which case there is no need for a background database in the biometric matching process. Synthetic ECG signatures can be created by using random sets of reconstruction coefficients in the PCA-based ECG model. Alternately, reconstruction coefficient sets may be drawn according to a set of rules extracted from the distributions of real-life reconstruction coefficients derived from real subjects.
- a confidence limit describes, with a given degree of statistical confidence, the upper and lower limits for the values in question.
- a two-tailed limit describes both upper and lower bounds, while a one-tailed limit describes only an upper or a lower cutoff, with the understanding that there is either no lower or no upper limit to the value of the variable.
- Confidence limits can be determined statistically, in several different ways, if the variable under consideration meets certain statistical criteria appropriate to each statistical method.
- Normally distributed variables have been well characterized statistically, and their statistical limits can be determined in a straightforward manner based on the variable average and variation.
- a normalizing transformation may be used to transform the original variable into a new variable which would then be distributed normally, and may thus be used to determine confidence limits.
- the appropriate mathematical transformation may be determined using statistical considerations, or by empirical examination of a sufficiently large dataset. In order to express the confidence limits in terms of the original variable, a back-transformation is also required.
- Signal cross-correlation analysis may be used for the matching procedure. Values range from -1 (absolute negative correlation) through 0 (no correlation) to +1 (absolute positive correlation) . Generally, significantly positive correlation indicates a probable true identification, and thus a one-tailed, upper confidence limit should be used to describe the dynamic identification threshold.
- correlations are bounded variables and thus are not normally distributed.
- a mathematical transformation is necessary to normalize the correlation distribution allowing determination of the upper confidence limit.
- empirical techniques which do not rely on such transformations may be used.
- a preferred method, described more fully below, is particularly appropriate for correlation analysis. It is based on the Fisher Z transformation, which converts correlations into a normally distributed variable.
- Another method may use squared correlations. Since raw correlations are not additive, averages or other statistical functions of correlations have no statistical meaning. Squared correlations are additive, but they are also not normally distributed, so that additional transformations would be required. If prior processing of the correlations changes the distribution of their values, additional transformations may be necessary to account for these changes. These additional transformations include, but are not limited to, logarithms, squares, square roots, and transcendental functions. Still another method would involve a degree of prior empirical testing, preferably where a large number of candidates are correlated to a large database. The likelihood of false identifications would be directly determined by examination of this database, or appropriate transformations could be empirically determined. However, because this method is not dynamic and must be performed prior to real testing, the effects of testing conditions cannot be easily compensated, requiring development of mathematical models for the influence of noise.
- the preferred method according to this second aspect involves transformation of the correlations between the candidate signature and the registered signatures in order to obtain a distribution of scores that are more nearly normally distributed.
- data that meets assumptions of normality can be used to derive parametric confidence limits .
- the Fisher Z transformation was designed to normalize correlations.
- the transformation may be expressed as follows:
- arctanh is the hyperbolic arc tangent function
- r is the correlation.
- the arctanh should be expressed in radians.
- Confidence limit tanh (Z f mean + z* sd Z fJ
- z is the normal distribution ⁇ z score'
- Z f mean is the mean of transformed correlations with the database
- sd Z f is the standard deviation of the transformed correlations with the data base.
- the lower case z here refers to the value of the normal distribution z-score, which is derived based on the desired degree of confidence in the cut-off.
- a table of such scores is provided in FIG. 10.
- the standard deviation is multiplied by the appropriate z-score and is added to the mean, and the entire quantity back-transformed to a correlation by taking the hyperbolic tangent.
- a 95% confidence limit could be determined using a z score of 1.65. So if the mean of the transformed values was 0.05, and the standard deviation was 0.25, the 95% confidence limit would be 0.72. That is, a correlation value over 0.72 would only occur by chance less than 5% of the time.
- Z (Zfc — Zf m ean ) / sdzf
- z is the normal distribution ⁇ z score'
- Z fc is the transformed candidate correlation
- Z f mean is the mean of transformed correlations with the database
- sd zf is the standard deviation of the transformed correlations with the data base.
- the resulting z-score can be converted to a 1-tailed probability value by reference to a table of the cumulative normal distribution, and interpolation if necessary. For example, with reference to the abbreviated table above, a z- score of 1.80 would suggest a 3.75% probability that the candidate correlated so highly by chance. As mentioned above, if noise in the registered signatures or in the candidate signature is random, it would reduce the overall correlations with the candidate value. The true identification, if it exists, would therefore have a lower correlation with the candidate. It should be noted that variability of raw correlations increases as the raw values decrease, since high raw correlations are less variable due to a ceiling effect of maximum correlation of
- the following examples of the second aspect are based on a 38-subject database. All subjects are healthy individuals, participating in the study on a voluntary basis .
- a set of 703 cross-correlations was obtained by correlating all pairs in the database.
- the raw and z- transformed correlation distributions are presented in FIG.
- Example 2 Performance The biometric identification method was implemented using analysis of 38 enrolled signatures and 38 test signatures.
- FIG. 12 presents FAR and FRR performance curves as a function of a static threshold
- FIG. 13 presents the performance curves as a function of a dynamic threshold.
- the dynamic identification threshold is a data-driven threshold, preferably recalculated in each identification session to establish a confidence limit and substantiate a statistical significance of the identification process. Yet overall scores still decrease with the drop in signal quality due to background noise, lowering the dynamic threshold and thereby reducing identification confidence. This problem calls for assessment of signal quality in both enrollment and identification phases to facilitate high performance recognition.
- a quality of signal index Q is a quantitative description of the quality of the ECG signature. It is based on an analysis of the random error in two or more ECG complexes, derived with reference to their signal average ECG.
- the Q value may be used to confirm signal quality during the enrollment and identification phases, ensuring adequate system performance.
- the measurement may either be extended or repeated until the confidence requirement is met.
- One preferred methodology derives Q in a series of steps: (1) The input ECG signal is segmented into ECG complexes comprised of the conventional wave morphology features (e.g. P, Q-R-S, T elements) .
- the conventional wave morphology features e.g. P, Q-R-S, T elements
- An average ECG is derived from the aligned ECG complexes .
- the preferred method is to take an arithmetic mean, although other methods may be employed, such as the harmonic mean, geometric mean, weighted mean, or median. Other alternatives include transforming the original signals by other methods such as by Principal Component Analysis.
- Each original ECG complex is processed relative to the average ECG, such that some difference is derived against the average ECG.
- the preferred method is to perform subtraction, i.e. original ECG minus average ECG, although other methods may be employed (e.g. division of the original ECG by average ECG) . If the average ECG is a stable and true representation of the subject's ECG, then the resulting difference is a representation of the noise inherent in each individual ECG complex (ECG noise) .
- Each sample point which corresponds in time across each ECG noise complex is processed together to derive a measure of variability.
- the most preferred method is to determine the variance.
- Other measures that may be employed include standard deviation or range.
- An average is taken of these measures of variability.
- the most preferred method is to take an arithmetic average.
- Other methods may involve taking averages after transformation (e.g. log), or taking alternative averages (geometric, harmonic, median) .
- Other summary scores may also be employed, such as the maximum.
- the average may itself be employed as a Q index, as it is directly related to the SNR.
- various other scaling transformations may be applied to the average to convert it to an index with the desired minima, maxima, and linearity characteristics.
- each row representing one ECG complex may be denoted x ⁇ (n) where i is the index of an ECG complex and n represents a discrete time unit.
- the average of all ECG complexes is denoted x(n) .
- FIG. 14 presents Q values as a function of the Noise to Signal Ratio (NSR) . It can be seen that once Q starts to decline from its plateau, it drops monotonically with the increase in NSR, until the ECG alignment procedure breaks down (NSR ⁇ -35dB, Q ⁇ 0.2) .
- NSR Noise to Signal Ratio
- Example 2 according to the Third Aspect: Score as a function of Signal Quality
- match scores close to 1 indicate a positive match, while non-match scores should tend to zero indicating complete lack of correlation.
- true match scores are influenced by temporal variations in the ECG signature and, more significantly, from background noise.
- a higher signal quality is required for short time, high scored identification.
- high quality signal increases the upper bound on match score, but does not influence the lower bound which depends on the cardiologic signature variability.
- FIGS. 13 and 14 demonstrates score distribution as a function of signal quality, based on a database of 38 subjects.
- FIG. 15 shows short data segments of 5 seconds each.
- FIG. 16 shows longer segments of 20 seconds each (FIG. 16) . Obviously, with longer segments the effect of noise is compensated to some extent and the score distribution flattens.
- Signal quality may be quantified using the Q parameter.
- FIGS. 15 and 16 show the increase in identification score as a function of the length of recording for a given Q value.
- the methods and systems disclosed herein may calculate signal quality using a Q-factor or other measure, and cause the system to seek a sample with reduced noise or to take a longer sample based on the Q-factor or other signal quality measure and the desired degree of identification confidence.
- the methods and systems disclosed herein may encrypt stored signatures.
- This safety feature is designed to prevent misuse of the data in the database notwithstanding that the various methods and systems herein typically operate on stored signatures rather than raw ECG data.
- an added layer of security may be employed by encrypting the signatures themselves.
- a variety of scrambling techniques may be used including the PKI (public key infrastructure) techniques used for credit card data.
- PKI public key infrastructure
- This fourth aspect makes improper use of the enrolled subject's data all the more difficult, since an unauthorized person would have to decrypt the signature and then still need to convert the signature back into a raw data signal, an impossible task without knowing which common features were removed from the raw data.
- one advantage of the systems and methods disclosed herein is that they make it extremely difficult for anyone to misuse the stored information.
- Biometric identification systems are in general vulnerable to enrollment fraud.
- the systems and methods according to this fifth aspect solve this problem by using ECG data from genetically related individuals who have enrolled in the database. Immediate family members often have ECGs that share common features.
- the system can confidently determine whether or not the subject is who they purport to be.
- This technique can be used in addition to confirming the individual ' s identity through conventional methods such as picture identification and/or fingerprint matching.
- this technique can determine fraud at any stage of enrollment process by determining a probability of a genetic relationship based on the enrollee's ECG signature.
- the systems and methods disclosed herein may also make use of ultra-high impedance probes to measure ECG. Since reliability and ease of use is important for an ECG-based biometric identification system, it is advantageous to measure an ECG at a single point, or even without touching the subject.
- Electric potential probes can work with biometric methods and systems, including those described herein, to increase reliability and ease of use for biometric identification.
- Ultra-high impedance probes come in a variety of forms. See e.g. Electric potential probes- new directions in the remote sensing of the human body, Harland et al. , Meas . Sci. Technol . 13 (2002) 163-169.
- the ultra-high input impedance probes preferably have ultra-low noise characteristics, and do not require a current conducting path in order to operate. As a result, they work well with the foregoing methods and systems even when used by a layperson without the help of an expert system operator.
- these probes may be used in airport-based biometric identification systems, such as by acquiring an ECG signal when an individual passes through a scanner (similar to a metal detector) in full dress.
- a single probe may be used to collect an ECG from an individual's finger tip, such as at an ATM or gaming machine. The use of a single probe contact gives the subject more freedom of movement and makes it easier for him or her to comply with the identification and enrollment regimen.
- the single probe and remote probe ECG capture systems according to this aspect may also be complemented by noise reduction strategies to reduce body noise and EMG.
- a biometric identification method and system may correlate the match scores for a subject (which are created by comparing the subject's signature with those of database enrollees) with the match scores of a plurality of enrollees (which are created by comparing the enrollees' signatures with those of database enrollees) .
- this identification technique analyzes the distribution of the correlation of a subject's match scores and those of the enrollees.
- the methods and systems according to this aspect are useful for identifying related individuals.
- the methods and systems described herein may employ a weighted correlation for identification.
- the correlation may give different weights to various signature differences.
- signature differences due to QRS complex features may be weighted more than signature differences due to T or P complex features.
- the systems and methods may also use the root mean square of the signature values as part of a weighting function since T is highly variable, QRS is stable, and P is somewhere in the middle.
- the signatures may be normalized using root-mean- square computations, Ll metrics or another normalizing technique.
- FIG. 19 shows a functional diagram of a preferred system.
- FIG. 20 shows a functional diagram of a preferred signal processor.
- the term "processor” is used herein generically and the processing may be done by physically discrete components, such as with co-processors on an IC chip, or the processor may comprise a physically integral unit.
- ENROLLMENT ALGORITHM The following is an example algorithm for an enrollment phase that may be used with any of the foregoing aspects: i. Let x,(n) represent a 20-second, 250Hz digitized sample of the i th new subject, where n denotes discrete units of time. ii . x,(fi) is band-pass filtered in the range 4Hz —
- the filtered signal is denoted y,(n) . iv.
- the filtered signal y,(n) is searched for QRS complexes, identifying the ⁇ R' peaks as anchor points.
- the filtered signal V 1 (Ji) is maintained or inverted to obtain positive ⁇ R' peaks. vi .
- the identified QRS complexes are counted to establish an average pulse rate reading Pi?, . vii.
- the filtered signal y,(n) is segmented around the anchor points, taking 50 samples before and 90 samples after each ⁇ R' anchor point, viii. Each data segment is normalized by the amplitude of the ⁇ R' anchor point. ix.
- the segments are aligned around the anchor points and averaged to produce the subject electro- cardiologic signal, denoted s t (n) . x.
- the subject electro-cardiologic signal .S 1 (Vz) is adjusted according to the average pulse rate PR 1 , by normalizing ⁇ P' and ⁇ T' latencies according to the pulse rate.
- the adjusted electro-cardiologic signal is denoted V 1 (U) . xi .
- the pulse rate adjusted subject's electro- cardiologic signal V 1 (Ji) is added to the database and is introduced into a grand-average T(n) . xii.
- a set of electro-biometric signatures ⁇ is constructed by subtraction of the grand-average T( ⁇ ) from each of the pulse rate adjusted electro- cardiologic signals stored in the system database.
- the filtered signal y j in) is searched for the locations of QRS complexes, using the R peak as an anchor point.
- the filtered signal y ⁇ (n) is maintained or inverted to obtain positive ⁇ R' peaks.
- the identified QRS complexes are counted to establish an average pulse rate reading PR 1 .
- VIl The filtered signal .V 7 (w) is segmented around the anchor points, taking 50 samples before and 90 samples after each anchor point.
- VlIl The segments are aligned around the anchor points and averaged to produce the subject electro- cardiologic signal, denoted S j ( ⁇ ) .
- the subject electro-cardiologic signal S j ( ⁇ ) is normalized according to the average pulse rate Pi? .
- the pulse rate adjusted subject electro- cardiologic signal is denoted V 7 (W) .
- An electro-biometric signature CT 7 - is constructed by subtraction of the grand-average T(n) from the pulse rate adjusted electro-cardiologic signal V j (n) .
- Xl The correlation coefficients between the electro- biometric signature ⁇ ⁇ and all the enrolled electro-biometric signatures ⁇ , are calculated and squared, maintaining their original arithmetic sign. xii. The largest sign-maintained squared correlation value is selected and compared to a preset threshold. xiii. If the selected largest sign maintained squared correlation value is larger than the preset threshold then a positive match is indicated, and the subject is identified.
- a method and apparatus of acquisition, processing, and analysis of electro-cardiologic signals for electro-biometric identity recognition may include any subset of the following enrollment and recognition steps :
- the newly captured electro-biometric signature is compared with the subject specific enrolled electro- biometric signature template; a. Correlation and confidence analysis of the newly captured subject electro-biometric signature with the relevant stored electro-biometric signature template; b. Display and registration of the recognition result and/or activation of a physical or virtual local/remote mechanism.
- the newly captured electro-biometric signature is compared with all of the electro-biometric signature templates participating in the database; a. Correlation and confidence analysis of the newly captured subject electro-biometric signature with all stored electro-biometric signature templates; b. Display and registration of the recognition result and/or activation of a physical or virtual local/remote mechanism.
- the E-BioID system measures an electrical bio-signal from the human body through conductive sensor plates .
- These same plates may be used for bidirectional interaction with the subject's nervous system, for example, by inducing a sympathetic skin response in the user with small magnitude electrical stimulation that is provided through the plates.
- Such bidirectional interaction constitutes a biological challenge-response mechanism that ensures submission of a ⁇ fresh bio-signal without requiring active participation of the user in the challenge-response procedure .
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05850656A EP1815391A2 (en) | 2004-11-08 | 2005-11-08 | Method and apparatus for electro-biometric identity recognition |
AU2005310994A AU2005310994A1 (en) | 2004-11-08 | 2005-11-08 | Method and apparatus for electro-biometric identity recognition |
JP2007539648A JP4782141B2 (en) | 2004-11-08 | 2005-11-08 | Method and apparatus for electronic biometric identification recognition |
CA2586772A CA2586772C (en) | 2004-11-08 | 2005-11-08 | Method and apparatus for electro-biometric identity recognition |
AU2010246527A AU2010246527A1 (en) | 2004-11-08 | 2010-11-30 | Method and apparatus for electro-biometric identity recognition |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2004/003899 WO2006048701A2 (en) | 2004-11-08 | 2004-11-08 | Method and apparatus for electro-biometric indentity recognition |
ILPCT/IB2004/03899 | 2004-11-08 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006059190A2 true WO2006059190A2 (en) | 2006-06-08 |
WO2006059190A3 WO2006059190A3 (en) | 2008-02-21 |
Family
ID=34959495
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/003899 WO2006048701A2 (en) | 2002-07-29 | 2004-11-08 | Method and apparatus for electro-biometric indentity recognition |
PCT/IB2005/003281 WO2006059190A2 (en) | 2004-11-08 | 2005-11-08 | Method and apparatus for electro-biometric identity recognition |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/003899 WO2006048701A2 (en) | 2002-07-29 | 2004-11-08 | Method and apparatus for electro-biometric indentity recognition |
Country Status (7)
Country | Link |
---|---|
EP (2) | EP1815386A1 (en) |
JP (2) | JP2008518708A (en) |
KR (2) | KR101019844B1 (en) |
CN (2) | CN101421744B (en) |
AU (3) | AU2004324705A1 (en) |
CA (2) | CA2587214A1 (en) |
WO (2) | WO2006048701A2 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7536557B2 (en) * | 2001-03-22 | 2009-05-19 | Ensign Holdings | Method for biometric authentication through layering biometric traits |
JP2014111162A (en) * | 2007-06-07 | 2014-06-19 | Zoll Medical Corp | Medical device configured to inspect responsiveness of user |
US9311546B2 (en) | 2008-11-28 | 2016-04-12 | Nottingham Trent University | Biometric identity verification for access control using a trained statistical classifier |
WO2017096550A1 (en) * | 2015-12-09 | 2017-06-15 | Intel Corporation | Methods and apparatus using human electrocardiogram to protect electronic data |
US9750434B2 (en) | 2015-03-17 | 2017-09-05 | Panasonic Intellectual Property Management Co., Ltd. | Personal authentication apparatus, personal authentication method, and recording medium |
US10257191B2 (en) | 2008-11-28 | 2019-04-09 | Nottingham Trent University | Biometric identity verification |
US10278620B2 (en) | 2015-09-10 | 2019-05-07 | Panasonic Intellectual Property Management Co., Ltd. | Individual authentication method, electrocardiographic authentication information generation method, individual authentication device, electrocardiographic authentication information generating device, recording medium, and method |
US11568984B2 (en) | 2018-09-28 | 2023-01-31 | Zoll Medical Corporation | Systems and methods for device inventory management and tracking |
US11744502B2 (en) | 2013-11-30 | 2023-09-05 | Koninklijke Philips N.V. | Automated detection of patient age by ECG |
Families Citing this family (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0704429D0 (en) | 2007-03-08 | 2007-04-18 | Sensor Technologies & Devices | Method and apparatus for determining information concerning the identity of an individual |
JP4406460B2 (en) * | 2008-02-27 | 2010-01-27 | 東海電子株式会社 | Breath alcohol measuring device |
WO2009111671A2 (en) * | 2008-03-05 | 2009-09-11 | Pulmonary Data Systems, Inc. | System including method and device for identification and monitoring of pulmonary data |
WO2010023962A1 (en) * | 2008-09-01 | 2010-03-04 | 独立行政法人情報通信研究機構 | Ubiquitous electrocardiograph system |
US8680995B2 (en) * | 2010-01-28 | 2014-03-25 | Honeywell International Inc. | Access control system based upon behavioral patterns |
EP2544914B1 (en) * | 2010-03-12 | 2019-03-13 | Tata Consultancy Services Ltd. | A system for vehicle security, personalization and cardiac activity monitoring of a driver |
JP5772242B2 (en) | 2011-06-03 | 2015-09-02 | ソニー株式会社 | Measuring apparatus, measuring method, program, and information processing apparatus |
WO2013096954A1 (en) | 2011-12-23 | 2013-06-27 | The Trustees Of Dartmouth College | Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric |
PT106102B (en) * | 2012-01-19 | 2014-08-11 | Inst Superior Técnico | DEVICE AND METHOD FOR CONTINUOUS BIOMETRIC RECOGNITION BASED ON ELECTROCARDIOGRAPHIC SIGNS |
CN103220564A (en) * | 2013-04-07 | 2013-07-24 | 深圳Tcl新技术有限公司 | Method for identifying identity of user and remote control device |
KR101492802B1 (en) * | 2013-06-26 | 2015-02-12 | 계명대학교 산학협력단 | Electrode sensor for measuring of skin impedance of personal authentication, and skin impedance measurement device having the same |
EP3047601B1 (en) * | 2013-09-19 | 2019-07-10 | Intel Corporation | Technologies for synchronizing and restoring reference templates |
CN104657852B (en) | 2013-11-22 | 2019-01-22 | 宏达国际电子股份有限公司 | Electronic device and its authorization method |
US9345231B2 (en) * | 2013-11-26 | 2016-05-24 | Vet Innovations, Llc | Selective access control apparatus for animals using electronic recognition |
EP3089658A4 (en) * | 2014-02-24 | 2017-10-11 | Sony Corporation | Smart wearable devices and methods for acquisition of sensorial information from wearable devices to activate functions in other devices |
EP2963603A1 (en) * | 2014-07-03 | 2016-01-06 | Nxp B.V. | Method and device for secure identification of a user of a service |
CN105336021A (en) * | 2014-08-12 | 2016-02-17 | 鸿富锦精密工业(深圳)有限公司 | Automobile as well as unlocking system without key and automobile unlocking method without key thereof |
KR102257289B1 (en) * | 2014-08-26 | 2021-05-27 | 삼성전자주식회사 | Method and apparatus for authenticating user using ecg signal |
US9734315B2 (en) * | 2014-09-01 | 2017-08-15 | Lg Electronics Inc. | Wearable terminal |
KR102299819B1 (en) * | 2014-12-30 | 2021-09-08 | 삼성전자주식회사 | Method and apparatus for authenticating user using bio signal |
US9590986B2 (en) | 2015-02-04 | 2017-03-07 | Aerendir Mobile Inc. | Local user authentication with neuro and neuro-mechanical fingerprints |
US10357210B2 (en) | 2015-02-04 | 2019-07-23 | Proprius Technologies S.A.R.L. | Determining health change of a user with neuro and neuro-mechanical fingerprints |
US9577992B2 (en) | 2015-02-04 | 2017-02-21 | Aerendir Mobile Inc. | Data encryption/decryption using neuro and neuro-mechanical fingerprints |
US9836896B2 (en) | 2015-02-04 | 2017-12-05 | Proprius Technologies S.A.R.L | Keyless access control with neuro and neuro-mechanical fingerprints |
US11160459B2 (en) | 2015-06-12 | 2021-11-02 | ChroniSense Medical Ltd. | Monitoring health status of people suffering from chronic diseases |
US10687742B2 (en) | 2015-06-12 | 2020-06-23 | ChroniSense Medical Ltd. | Using invariant factors for pulse oximetry |
US11464457B2 (en) | 2015-06-12 | 2022-10-11 | ChroniSense Medical Ltd. | Determining an early warning score based on wearable device measurements |
US10952638B2 (en) | 2015-06-12 | 2021-03-23 | ChroniSense Medical Ltd. | System and method for monitoring respiratory rate and oxygen saturation |
US11160461B2 (en) | 2015-06-12 | 2021-11-02 | ChroniSense Medical Ltd. | Blood pressure measurement using a wearable device |
US11712190B2 (en) | 2015-06-12 | 2023-08-01 | ChroniSense Medical Ltd. | Wearable device electrocardiogram |
GB2544087A (en) * | 2015-11-05 | 2017-05-10 | B-Secur Ltd | Automatic teller machine with biometric authentication |
US11000235B2 (en) | 2016-03-14 | 2021-05-11 | ChroniSense Medical Ltd. | Monitoring procedure for early warning of cardiac episodes |
CN107788992B (en) * | 2016-08-29 | 2022-03-08 | 松下知识产权经营株式会社 | Apparatus for recognizing living body and method for recognizing living body |
KR102596904B1 (en) * | 2016-09-01 | 2023-11-07 | 주식회사 라이프사이언스테크놀로지 | Method for Encrypting and Decrypting of Personal Information using ECG Signal |
CN106859633A (en) * | 2017-01-06 | 2017-06-20 | 湖北工业大学 | Mobile ecg telemonitoring early warning system |
IL303078A (en) * | 2017-03-24 | 2023-07-01 | Magic Leap Inc | Accumulation and confidence assignment of iris codes |
JP6762903B2 (en) * | 2017-04-26 | 2020-09-30 | 東芝情報システム株式会社 | Risk management system and program for risk management system |
JP6765657B2 (en) * | 2017-06-27 | 2020-10-07 | 公立大学法人会津大学 | Authentication device, authentication method and computer program |
CN108125686B (en) * | 2017-07-13 | 2021-02-12 | 广东网金控股股份有限公司 | Anti-fraud method and system |
KR101917526B1 (en) | 2017-07-20 | 2018-11-12 | 현대오트론 주식회사 | Real time clock and method for input/output of time information using the same |
KR20200020837A (en) * | 2017-07-25 | 2020-02-26 | 파나소닉 아이피 매니지먼트 가부시키가이샤 | ECG signal processing device, personal authentication device and ECG signal processing method |
US10499827B2 (en) * | 2017-09-19 | 2019-12-10 | Honeywell International Inc. | System and method for interpretation of signal-to-noise ratios detected in an array of electrodes sensors in terms of physical and cognitive state |
WO2019111471A1 (en) | 2017-12-08 | 2019-06-13 | ソニー株式会社 | Information processing device, method for controlling same, and recording medium |
EP3860441A4 (en) * | 2018-10-01 | 2022-10-12 | Delgado, Reynolds | High frequency qrs in biometric identification |
US11000198B2 (en) * | 2018-12-05 | 2021-05-11 | Viavi Solutions Inc. | Autonomous full spectrum biometric monitoring |
CN109431493B (en) * | 2018-12-07 | 2021-02-26 | 南京医科大学 | Wearable body surface potential acquisition device based on distance segmentation weighting algorithm |
CN109875546B (en) * | 2019-01-24 | 2020-07-28 | 西安交通大学 | Depth model classification result visualization method for electrocardiogram data |
CN110123289B (en) * | 2019-04-08 | 2022-01-07 | 清华大学深圳研究生院 | Biological identification method based on pulse wave and related device |
WO2020237302A1 (en) * | 2019-05-27 | 2020-12-03 | La Trobe University | Wireless electrochemical analysis |
CN112168176B (en) * | 2019-06-12 | 2024-03-19 | 京东方科技集团股份有限公司 | Electrocardiosignal-based identity recognition method, device and equipment |
KR102276606B1 (en) * | 2019-12-05 | 2021-07-13 | 한국전자기술연구원 | Method for personal authentication using electrocardiogram |
CN111415442A (en) * | 2020-03-16 | 2020-07-14 | 恒玄科技(上海)股份有限公司 | Access control method, electronic device and storage medium |
JP7237917B2 (en) * | 2020-12-28 | 2023-03-13 | マクセル株式会社 | Biometric device |
CN113836995B (en) * | 2021-08-09 | 2024-04-02 | 新绎健康科技有限公司 | Age group identification method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6040783A (en) * | 1995-05-08 | 2000-03-21 | Image Data, Llc | System and method for remote, wireless positive identity verification |
US20020138768A1 (en) * | 2001-03-22 | 2002-09-26 | Murakami Rick V. | Method for biometric authentication through layering biometric traits |
WO2003000015A2 (en) * | 2001-06-25 | 2003-01-03 | Science Applications International Corporation | Identification by analysis of physiometric variation |
WO2004012388A1 (en) * | 2002-07-29 | 2004-02-05 | C-Signature Ltd. | Method and apparatus for electro-biometric identiy recognition |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101201403B1 (en) * | 2010-12-30 | 2012-11-14 | 에이피시스템 주식회사 | Sensing module |
-
2004
- 2004-11-08 JP JP2007539643A patent/JP2008518708A/en active Pending
- 2004-11-08 EP EP04799001A patent/EP1815386A1/en not_active Withdrawn
- 2004-11-08 CN CN2004800443502A patent/CN101421744B/en not_active Expired - Fee Related
- 2004-11-08 CA CA002587214A patent/CA2587214A1/en not_active Abandoned
- 2004-11-08 AU AU2004324705A patent/AU2004324705A1/en not_active Abandoned
- 2004-11-08 WO PCT/IB2004/003899 patent/WO2006048701A2/en active Application Filing
- 2004-11-08 KR KR1020077012835A patent/KR101019844B1/en not_active IP Right Cessation
-
2005
- 2005-11-08 AU AU2005310994A patent/AU2005310994A1/en not_active Abandoned
- 2005-11-08 CN CNA2005800379021A patent/CN101263510A/en active Pending
- 2005-11-08 CA CA2586772A patent/CA2586772C/en not_active Expired - Fee Related
- 2005-11-08 JP JP2007539648A patent/JP4782141B2/en not_active Expired - Fee Related
- 2005-11-08 KR KR1020077012836A patent/KR101019838B1/en active IP Right Grant
- 2005-11-08 EP EP05850656A patent/EP1815391A2/en not_active Withdrawn
- 2005-11-08 WO PCT/IB2005/003281 patent/WO2006059190A2/en active Application Filing
-
2010
- 2010-11-30 AU AU2010246527A patent/AU2010246527A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6040783A (en) * | 1995-05-08 | 2000-03-21 | Image Data, Llc | System and method for remote, wireless positive identity verification |
US20020138768A1 (en) * | 2001-03-22 | 2002-09-26 | Murakami Rick V. | Method for biometric authentication through layering biometric traits |
US20030128867A1 (en) * | 2001-03-22 | 2003-07-10 | Richard Bennett | Obtaining biometric identification using a direct electrical contact |
WO2003000015A2 (en) * | 2001-06-25 | 2003-01-03 | Science Applications International Corporation | Identification by analysis of physiometric variation |
WO2004012388A1 (en) * | 2002-07-29 | 2004-02-05 | C-Signature Ltd. | Method and apparatus for electro-biometric identiy recognition |
Non-Patent Citations (3)
Title |
---|
BIEL L ET AL: "ECG analysis: a new approach in human identification" INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE, 1999. IMTC/99. PROCEEDINGS OF THE 16TH IEEE VENICE, ITALY 24-26 MAY 1999, PISCATAWAY, NJ, USA,IEEE, US, 24 May 1999 (1999-05-24), pages 557-561, XP010340258 ISBN: 0-7803-5276-9 * |
KIL, D.H. AND SHIN F.B.: "Pattern recognition and prediction with applications to signal characterization" 1996, AIP PRESS , XP002433292 pages 22-26: section 2.1.2 "Adaptive Noise Filtering" * |
SHEN T W ET AL: "One-lead ECG for identity verification" SECOND JOINT EMBS-BMES CONFERENCE 2002. CONFERENCE PROCEEDINGS. 24TH. ANNUAL INTERNATIONAL CONFERENCE OF THE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY. ANNUAL FALL MEETING OF THE BIOMEDICAL ENGINEERINGSOCIETY. HOUSTON, TX, OCT. 23 - 26, 2002, ANNUA, vol. VOL. 1 OF 3. CONF. 24, 23 October 2002 (2002-10-23), pages 62-63, XP010621210 ISBN: 0-7803-7612-9 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7536557B2 (en) * | 2001-03-22 | 2009-05-19 | Ensign Holdings | Method for biometric authentication through layering biometric traits |
US10434321B2 (en) | 2007-06-07 | 2019-10-08 | Zoll Medical Corporation | Medical device configured to test for user responsiveness |
US11207539B2 (en) | 2007-06-07 | 2021-12-28 | Zoll Medical Corporation | Medical device configured to test for user responsiveness |
US9370666B2 (en) | 2007-06-07 | 2016-06-21 | Zoll Medical Corporation | Medical device configured to test for user responsiveness |
JP2014111162A (en) * | 2007-06-07 | 2014-06-19 | Zoll Medical Corp | Medical device configured to inspect responsiveness of user |
US10328275B2 (en) | 2007-06-07 | 2019-06-25 | Zoll Medical Corporation | Medical device configured to test for user responsiveness |
US10257191B2 (en) | 2008-11-28 | 2019-04-09 | Nottingham Trent University | Biometric identity verification |
US9311546B2 (en) | 2008-11-28 | 2016-04-12 | Nottingham Trent University | Biometric identity verification for access control using a trained statistical classifier |
US11744502B2 (en) | 2013-11-30 | 2023-09-05 | Koninklijke Philips N.V. | Automated detection of patient age by ECG |
US9750434B2 (en) | 2015-03-17 | 2017-09-05 | Panasonic Intellectual Property Management Co., Ltd. | Personal authentication apparatus, personal authentication method, and recording medium |
US10278620B2 (en) | 2015-09-10 | 2019-05-07 | Panasonic Intellectual Property Management Co., Ltd. | Individual authentication method, electrocardiographic authentication information generation method, individual authentication device, electrocardiographic authentication information generating device, recording medium, and method |
WO2017096550A1 (en) * | 2015-12-09 | 2017-06-15 | Intel Corporation | Methods and apparatus using human electrocardiogram to protect electronic data |
US10853516B2 (en) | 2015-12-09 | 2020-12-01 | Intel Corporation | Methods and apparatus using human electrocardiogram to protect electronic data |
US11568984B2 (en) | 2018-09-28 | 2023-01-31 | Zoll Medical Corporation | Systems and methods for device inventory management and tracking |
US11894132B2 (en) | 2018-09-28 | 2024-02-06 | Zoll Medical Corporation | Systems and methods for device inventory management and tracking |
Also Published As
Publication number | Publication date |
---|---|
KR20070085856A (en) | 2007-08-27 |
KR101019838B1 (en) | 2011-03-04 |
WO2006059190A3 (en) | 2008-02-21 |
JP2008518708A (en) | 2008-06-05 |
WO2006048701A2 (en) | 2006-05-11 |
KR20070085857A (en) | 2007-08-27 |
AU2005310994A1 (en) | 2006-06-08 |
AU2010246527A1 (en) | 2010-12-23 |
JP2008518709A (en) | 2008-06-05 |
EP1815386A1 (en) | 2007-08-08 |
CA2586772A1 (en) | 2006-06-08 |
CA2586772C (en) | 2015-01-13 |
EP1815391A2 (en) | 2007-08-08 |
CN101421744B (en) | 2013-06-05 |
CA2587214A1 (en) | 2006-05-11 |
AU2004324705A1 (en) | 2006-05-11 |
KR101019844B1 (en) | 2011-03-04 |
CN101263510A (en) | 2008-09-10 |
JP4782141B2 (en) | 2011-09-28 |
CN101421744A (en) | 2009-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2586772C (en) | Method and apparatus for electro-biometric identity recognition | |
US7689833B2 (en) | Method and apparatus for electro-biometric identity recognition | |
US20060136744A1 (en) | Method and apparatus for electro-biometric identity recognition | |
US20100311482A1 (en) | Electro-Biometric Methods and Apparatus | |
Komeili et al. | Liveness detection and automatic template updating using fusion of ECG and fingerprint | |
Singh et al. | Bioelectrical signals as emerging biometrics: Issues and challenges | |
JP5642210B2 (en) | Method and apparatus for electronic biometric identification recognition | |
Pouryayevali | ECG biometrics: new algorithm and multimodal biometric system | |
Ivanciu et al. | A review of ECG based biometric systems | |
Mousavi | Fusion of ECG and PPG signals in apply to spoof detection and biometric authentication | |
Alariki et al. | A Review Study of Heartbeat Biometric Authentication. | |
Agrafioti | Robust subject recognition using the Electrocardiogram | |
Mageshbabu et al. | Analysis on specific biometric approaches: ECG as one of its trait | |
Komeili | Feature Selection, Cross-view Matching and Spoof Detection for Electrocardiogram-based Human Recognition | |
SHARMA | ALTERNATIVE “IS ALIVE” BASED APPROACH FOR ALTERED FINGERPRINT IDENTIFICATION | |
Safie et al. | Pulse domain novel feature extraction methods with application to ecg biometric authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200580037902.1 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005310994 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2586772 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007539648 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 2005310994 Country of ref document: AU Date of ref document: 20051108 Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077012836 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005850656 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2005850656 Country of ref document: EP |