WO2008042879A1 - Fraud resistant biometric financial transaction system and method - Google Patents
Fraud resistant biometric financial transaction system and method Download PDFInfo
- Publication number
- WO2008042879A1 WO2008042879A1 PCT/US2007/080135 US2007080135W WO2008042879A1 WO 2008042879 A1 WO2008042879 A1 WO 2008042879A1 US 2007080135 W US2007080135 W US 2007080135W WO 2008042879 A1 WO2008042879 A1 WO 2008042879A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- person
- user
- camera
- probability
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1382—Detecting the live character of the finger, i.e. distinguishing from a fake or cadaver finger
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
Definitions
- This invention relates to biometric identification and authentication systems and methods, more particularly to authentication for financial transactions using biometrics.
- Biometric identification and authentication systems are known in the art, for example systems to compare facial features, iris imagery, fingerprints, finger vein images, and palm vein images have been used. Such systems are known to be useful for either comparing biometric data acquired from an individual to stored sets of biometric data of known "enrolled" individuals, or to compare biometric data acquired from an individual to a proposed template such as when an identification card is supplied to the system by the individual.
- Turk, et al., U.S. Pat. 5,164,992 discloses a recognition system for identifying members of an audience, the system including an imaging system which generates an image of the audience; a selector module for selecting a portion of the generated image; a detection means which analyzes the selected image portion to determine whether an image of a person is present; and a recognition module responsive to the detection means for determining whether a detected image of a person identified by the detection means resembles one of a reference set of images of individuals. If the computed distance is sufficiently close to face space (i.e., less than the preselected threshold), recognition module 10 treats it as a face image and proceeds with determining whose face it is (step 206).
- recognition module 10 identifies the input image as belonging to the individual associated with that reference face. If the
- recognition module 10 reports that a person has been located but the identity of the person is unknown.
- Daugman U.S. Pat. 5,291,560, disclosed a method of uniquely identifying a particular human being by biometric analysis of the iris of the eye.
- Yu, et al., U.S. Pat. 5,930,804 discloses a Web-based authentication system and method, the system comprising at least one Web client station, at least one Web server station and an authentication center.
- the Web client station is linked to a Web cloud, and provides selected biometric data of an individual who is using the Web client station.
- the Web server station is also linked to the Web cloud.
- the authentication center is linked to at least one of the Web client and Web server stations so as to receive the biometric data.
- the authentication center having records of one or more enrolled individuals, provides for comparison of the provided data with selected records.
- the method comprises the steps of (i) establishing parameters associated with selected biometric characteristics to be used in authentication; (ii) acquiring, at the Web client station, biometric data in accordance with the parameters; (iii) receiving, at an authentication center, a message that includes biometric data; (iv) selecting, at the authentication center, one or more records from among records associated with one or more enrolled individuals; and (v) comparing the received data with selected records.
- the comparisons of the system and method are to determine whether the so-compared live data sufficiently matches the selected records so as to authenticate the individual seeking access of the Web server station, which access is typically to information, services and other resources provided by one or more application servers associated with the Web server station.
- recognition module 10 treats it as a face image and proceeds with determining whose face it is (step 206). This involves computing distances between the projection of the input image onto face space and each of the reference face images in face space. If the projected input image is sufficiently close to any one of the reference faces (i.e., the computed distance in face space is less than a predetermined distance), recognition module 10 identifies the input image as belonging to the individual associated with that reference face. If the projected input image is not sufficiently close to any one of the reference faces, recognition module 10 reports that a person has been located but the identity of the person is unknown. [0007] Different biometrics perform differently.
- the face biometric is easy to acquire (a web camera for example) but it's ability to tell an impostor from an authentic person is somewhat limiting.
- a threshold must be set which trades off how many impostors are incorrectly accepted versus how many true authentics are rejected. For example, if a threshold is set at 0 (figuratively), then no authentics would be rejected, but every impostor will also be accepted. If the threshold is set at 1 (again figuratively), no impostors will get through but neither will any authentics. If the threshold is set at 0.5 (again figuratively), then a fraction of impostors will get through and a fraction of authentics will not get through.
- spoofing For example, a life-sized, high-resolution photograph of a person may be presented to an iris recognition system. The iris recognition systems may capture an image of this photograph and generate a positive identification. This type of spoofing presents an obvious security concerns for the implementation of an iris recognition system.
- One method of addressing this problem has been to shine a light onto the eye, then increase or decrease the intensity of the light. A live, human eye will respond by dilating the pupil. This dilation is used to determine whether the iris presented for recognition is a live, human eye or merely a photograph— since the size of a pupil on a photograph obviously will not change in response to changes in the intensity of light.
- liveness being used herein for any step or steps taken to determine whether the biometric data is being acquired from a live human rather than a fake due to a spoof attempt. More specifically however, in this invention, we define probability of liveness as the probability that biometric data has been acquired that can be used by an automatic or manual method to identify the user.
- the liveness test is conducted or carried out first, prior to the match process or matching module.
- match step or module we mean the steps and system components which function to calculate the probability of a match between acquired biometric data from an individual or purported individual being authenticated and data acquired from known individuals.
- the invention comprises in one aspect a system for [0017]
- the invention comprises a method of authenticating financial transactions comprising acquiring biometric data from a person, calculating probability of liveness, Pp, of the person and probability of a match, Pm, between the person and known biometric information, and providing and authenticating decision, D, based on a combination of Pp and Pm.
- a first image is presented on a computer screen, wherein the computer screen is oriented to face a user; at least one camera is positioned proximate the computer screen, wherein the at least one camera is oriented to face the user so that light emitted by the computer screen as the first image is reflected by the user and captured by the at least one camera; obtaining a second image through the at least one camera; and determining whether at least a portion of the second image includes a representation of the first image on the computer screen reflected by a curved surface consistent with a human eye.
- the probability of a live person, Pp is calculated by presenting a first image on a computer screen positioned in front of a user; capturing a first reflection of the first image off of the user through a camera; presenting a second image on the computer screen positioned in front of the user; capturing a second reflection of the second image off of the user through the camera; comparing the first reflection of the first image with the second reflection of the second image to determine whether the first reflection and the second reflection were formed by a curved surface consistent with a human eye.
- the probability of a live person, Pp can be calculated by obtaining a first image of a user positioned in front of a computer screen from a first perspective; obtaining a second image of the user positioned in front of the computer screen from a second perspective; identifying a first portion of the first image and a second portion of the second image containing a representation of a human eye; and detecting a human eye when the first portion of the first image differs from the second portion of the second image.
- the probability of a live person, Pp is calculated in other embodiments by measuring finger or palm temperature and comparing the resultant measured temperature to expected temperature for a human.
- the probability of a match, Pm can be calculated in any way which is desired, for example by iris recognition, fingerprint image recognition, finger vein image recognition, or palm vein image recognition.
- Another aspect of the invention is a system for carrying out the method.
- a still further aspect and an advantage of the invention is that if a person fails or passes authentication, the person is not informed as to whether non-authentication or authentication was based on probability of liveliness or probability of matching of biometric image. This makes it much more difficult for an attempted fraudster to refine their fraudulent methods since they are not being provided clear feedback.
- the invention does not merely depend on the probability that the person is who they said they are when authorizing a transaction.
- the invention includes calculating a second probability which is the probability that the biometric data is from a real person in the first place.
- the first probability is determined using any biometric algorithm.
- the second probability is determined using other algorithms which determine whether the biometric data or the person from whom the data is collected is a real person.
- the decision to authorize a transaction is now a function of both these probabilities. Often, if the first probability is high (a good match), then the second probability typically will also be high (a real person).
- the first probability could be low but the second probability could still be high.
- the algorithms to determine the second probability can be designed to be in many cases less sensitive to conditions out of the control of the algorithms, such as illumination changes and orientation of the person, compared to algorithms that compute the first probability (confidence that the person is a particular person) which are often very sensitive to illumination changes and orientation of the person. Because of this, and since we combine the 2 probabilities to make a decision in a transaction, the reject rate of true authentics can be designed to be greatly reduced.
- the invention authorizes transactions based on a combination of the two probabilities, an attempted fraudster is never sure whether a transaction was authorized or not authorized because they were matched or not matched, or because they were or were not detected as a real person and eliminates the clear feedback that criminals are provided today that they use to develop new methods to defeat systems.
- the invention provides an enormous deterrent to criminals since the system is acquiring biometric data that they have no idea can or cannot be used successfully as evidence against them. Even if there is a small probability that evidence can be used against them is sufficient for many criminals to not perform fraud, in consideration of the consequences of the charges and the damming evidence of biometric data (such as a picture of a face tied to a transaction).
- An analogy to this latter point is CCTV cameras in a high street, which typically reduces crime substantially since people are aware that there is a possibility they will be caught on camera.
- a special advantage of this method and system is that by combining in one algorithm the live-person result with the match result, a fraudulent user does not know whether he or she was authorized or declined as a result of a bad or good match, or because the system has captured excellent live-person data that can be used for prosecution or at least embarrassing public disclosure.
- the system results in a large deterrent since in the process of trying to defeat a system, the fraudulent user will have to present some live-person data to the system and they will not know how much or how little live-person data is required to incriminate themselves.
- the fraudulent user is also not able to determine precisely how well their fraudulent methods are working, which takes away the single most important tool of a fraudster, i.e., feedback on how well their methods are working. At best, they get feedback on the combination of live-person results and match results, but not on either individually. For example, a transaction may be authorized because the probability of a live-person is very high, even if the match probability is low.
- the invention collects a set of live-person data that can be used to compile a database or watch list of people who attempt to perform fraudulent transactions, and this can be used to recognize fraudsters at other transactions such as check-cashing for example by using a camera and another face recognition system.
- the system also ensures that some live-person data is captured, then it provides a means to perform customer redress (for example, if a customer complains then the system can show the customer a picture of them performing a transaction, or a bank agent can manually look at the picture of the user performing the transaction and compare it with a record of the user on file).
- biometric data gathered for calculating Pp can be stored and used later for manual verification or automatic checking.
- FIG. 1 is a flow chart of an authentication system according to the invention.
- the overall process is to compute 11 the probability, Pp, of a live person being presented, compute 13 the probability of a biometric match, Pm, computing 14 D according to the aforementioned formula, wherein at decision block 15 if D exceeds a preset threshold, the transaction is authorized 17 or, if D does not exceed the preset threshold, the transaction is not authorized, 16.
- FIG. 2 an example of a system and method of obtaining data used for calculating the probability of a live person 21 is shown.
- a second image is displayed on the screen (not shown), but this time the black bar is on the left and the white area is on the right and a second from the web-camera 26 is recorded.
- the difference between the two images is recorded and the difference at each pixel is squared.
- the images are then blurred by convolving with a low-pass filter and then threshold the image. Areas above threshold are areas of change between the two images. The system expects to see a change primarily on the cornea, where a sharp image of the screen is reflected.
- Figs. 3 and 4 which represent cornea C with pupil P and section S 1 at time Tl and S2 at time T2, with I representing an iris, given the curved geometry of the cornea, for a live curved and reflective cornea, the black and white area should have a particular curved shape - specifically a curved black bar and a curved white area (much like a fish-eye lens view).
- a template of the expected view is correlated with the first image obtained on the web-camera only in the region of the eye as detected by the prior step), and the peak value of the correlation is detected. The process is then repeated with the template expected from the second image.
- a face recognition match score, Pm is calculated and then normalized to be between 0 and 1.
Abstract
A method and system for authenticating financial transactions is disclosed wherein biometric data is acquired from a person and the probability of liveness of the person and probability of a match between the person and known biometric information are calculated, preferably according to a formula D = P(p) * (K + P(m)), wherein K is a number between 0.1 and 100, and authenticating if the value of D exceeds a predetermined value.
Description
Attorney Docket GLOB0005-500
FRAUD RESISTANT BIOMETRIC FINANCIAL TRANSACTION SYSTEM AND
METHOD
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority from U.S. Provisional Application 60/827,738, filed October 2, 2006, which is hereby incorporated by reference in its entirely.
BACKGROUND OF THE INVENTION
[0002] This invention relates to biometric identification and authentication systems and methods, more particularly to authentication for financial transactions using biometrics.
[0003] Biometric identification and authentication systems are known in the art, for example systems to compare facial features, iris imagery, fingerprints, finger vein images, and palm vein images have been used. Such systems are known to be useful for either comparing biometric data acquired from an individual to stored sets of biometric data of known "enrolled" individuals, or to compare biometric data acquired from an individual to a proposed template such as when an identification card is supplied to the system by the individual.
[0004] Turk, et al., U.S. Pat. 5,164,992, discloses a recognition system for identifying members of an audience, the system including an imaging system which generates an image of the audience; a selector module for selecting a portion of the generated image; a detection means which analyzes the selected image portion to determine whether an image of a person is present; and a recognition module responsive to the detection means for determining whether a detected image of a person identified by the detection means resembles one of a reference set of images of individuals. If the computed distance is sufficiently close to face space (i.e., less than the preselected threshold), recognition module 10 treats it as a face image and proceeds with determining whose face it is (step 206). This involves computing distances between the projection of the input image onto face space and each of the reference face images in face space. If the projected input image is sufficiently close to any one of the reference faces (i.e., the computed distance in face space is less than a predetermined distance), recognition module 10 identifies the input image as belonging to the individual associated with that reference face. If the
I
SUiSTlTUTIi SHIiIiT (RUI . F 26)
projected input image is not sufficiently close to any one of the reference faces, recognition module 10 reports that a person has been located but the identity of the person is unknown.
[0005] Daugman, U.S. Pat. 5,291,560, disclosed a method of uniquely identifying a particular human being by biometric analysis of the iris of the eye.
[0006] Yu, et al., U.S. Pat. 5,930,804, discloses a Web-based authentication system and method, the system comprising at least one Web client station, at least one Web server station and an authentication center. The Web client station is linked to a Web cloud, and provides selected biometric data of an individual who is using the Web client station. The Web server station is also linked to the Web cloud. The authentication center is linked to at least one of the Web client and Web server stations so as to receive the biometric data. The authentication center, having records of one or more enrolled individuals, provides for comparison of the provided data with selected records. The method comprises the steps of (i) establishing parameters associated with selected biometric characteristics to be used in authentication; (ii) acquiring, at the Web client station, biometric data in accordance with the parameters; (iii) receiving, at an authentication center, a message that includes biometric data; (iv) selecting, at the authentication center, one or more records from among records associated with one or more enrolled individuals; and (v) comparing the received data with selected records. The comparisons of the system and method are to determine whether the so-compared live data sufficiently matches the selected records so as to authenticate the individual seeking access of the Web server station, which access is typically to information, services and other resources provided by one or more application servers associated with the Web server station. If the computed distance is sufficiently close to face space (i.e., less than the pre-selected threshold), recognition module 10 treats it as a face image and proceeds with determining whose face it is (step 206). This involves computing distances between the projection of the input image onto face space and each of the reference face images in face space. If the projected input image is sufficiently close to any one of the reference faces (i.e., the computed distance in face space is less than a predetermined distance), recognition module 10 identifies the input image as belonging to the individual associated with that reference face. If the projected input image is not sufficiently close to any one of the reference faces, recognition module 10 reports that a person has been located but the identity of the person is unknown.
[0007] Different biometrics perform differently. For example, the face biometric is easy to acquire (a web camera for example) but it's ability to tell an impostor from an authentic person is somewhat limiting. In fact in most biometrics a threshold must be set which trades off how many impostors are incorrectly accepted versus how many true authentics are rejected. For example, if a threshold is set at 0 (figuratively), then no authentics would be rejected, but every impostor will also be accepted. If the threshold is set at 1 (again figuratively), no impostors will get through but neither will any authentics. If the threshold is set at 0.5 (again figuratively), then a fraction of impostors will get through and a fraction of authentics will not get through. Even though some biometrics such as the iris are sufficiently accurate to have no cross-over between the authentics and impostor distributions when the iris image quality is good, if the iris image is poor then there will be a cross-over and the problem reoccurs.
[0008] In the field of authentication of financial transactions, most systems are designed to compare biometric data from an individual to a known template rather than to a set of enrolled individuals.
[0009] However, in the field of authentication of financial transactions, high levels of accuracy and speed are critical. For example, to authenticate a banking transaction, there is high motivation for an imposter to try to spoof the system and yet the financial institution would require a fast authentication process and a low rate of false rejects or denials. In this field, even a small percentage of rejections of authentics can result in an enormous number of unhappy customers, simply because of the huge number of transactions. This has prevented banks from using certain biometrics.
[0010] In addition, informing the customer (or attempted fraudster) that they successfully got through a biometric system (or not) is not desirable because it enables fraudsters to obtain feedback on methods for trying to defeat the system. Also, there is little or no deterrent for an attempted fraudster to keep on attempting to perform a fraudulent transaction.
[0011] One problem faced by biometric recognition systems involves the possibility of spoofing. For example, a life-sized, high-resolution photograph of a person may be presented to an iris recognition system. The iris recognition systems may capture an image of this photograph and generate a positive identification. This type of spoofing presents an obvious security
concerns for the implementation of an iris recognition system. One method of addressing this problem has been to shine a light onto the eye, then increase or decrease the intensity of the light. A live, human eye will respond by dilating the pupil. This dilation is used to determine whether the iris presented for recognition is a live, human eye or merely a photograph— since the size of a pupil on a photograph obviously will not change in response to changes in the intensity of light.
[0012] In biometric recognition systems using fingerprint, finger vein, palm vein, or other imagery, other methods of determining whether spoofing is being attempted use temperature or other measures of liveness, the term liveness being used herein for any step or steps taken to determine whether the biometric data is being acquired from a live human rather than a fake due to a spoof attempt. More specifically however, in this invention, we define probability of liveness as the probability that biometric data has been acquired that can be used by an automatic or manual method to identify the user.
[0013] In prior biometric systems which include means and steps to determine liveness, the liveness test is conducted or carried out first, prior to the match process or matching module.
[0014] More specifically, in prior art the decision to authorize a transaction does not separately consider a measure of liveness and a measure of match. By match step or module, we mean the steps and system components which function to calculate the probability of a match between acquired biometric data from an individual or purported individual being authenticated and data acquired from known individuals.
[0015] The prior systems and methods have not achieved significant commercial success in the field of authenticating financial transactions due, in part, from the insufficient speed and accuracy from which prior biometric authentication systems for financial transactions suffered. More specifically, the current methods of basing a decision to perform a financial transaction on the measure of match means that many valid customers are rejected, due to the finite false reject rate. There is therefore a need in this field of biometric authentication systems and methods for financial transactions for improved deterrent against attempted fraudulent transactions, and decreased rejection of valid customers .
SUMMARY OF THE INVENTION
[0016] These needs and others as will become apparent from the following description and drawings, are achieved by the present invention which comprises in one aspect a system for [0017] In another aspect, the invention comprises a method of authenticating financial transactions comprising acquiring biometric data from a person, calculating probability of liveness, Pp, of the person and probability of a match, Pm, between the person and known biometric information, and providing and authenticating decision, D, based on a combination of Pp and Pm. In certain embodiments an authentication decision, D, is calculated as a function of the probability of a match Pm and the probability of a live person, Pp, according to the formula D = Pp * (K + Pm) , wherein K is a number between 0.1 and 100, and in some embodiments K is a number between 0.5 and 1.5.
[0018] In some embodiments a first image is presented on a computer screen, wherein the computer screen is oriented to face a user; at least one camera is positioned proximate the computer screen, wherein the at least one camera is oriented to face the user so that light emitted by the computer screen as the first image is reflected by the user and captured by the at least one camera; obtaining a second image through the at least one camera; and determining whether at least a portion of the second image includes a representation of the first image on the computer screen reflected by a curved surface consistent with a human eye.
[0019] In certain embodiments the probability of a live person, Pp, is calculated by presenting a first image on a computer screen positioned in front of a user; capturing a first reflection of the first image off of the user through a camera; presenting a second image on the computer screen positioned in front of the user; capturing a second reflection of the second image off of the user through the camera; comparing the first reflection of the first image with the second reflection of the second image to determine whether the first reflection and the second reflection were formed by a curved surface consistent with a human eye.
[0020] Alternatively wherein the probability of a live person, Pp, can be calculated by obtaining a first image of a user positioned in front of a computer screen from a first perspective; obtaining a second image of the user positioned in front of the computer screen from a second perspective; identifying a first portion of the first image and a second portion of the second image containing a representation of a human eye; and detecting a human eye when the first portion of the first image differs from the second portion of the second image.
[0021] The probability of a live person, Pp, is calculated in other embodiments by measuring finger or palm temperature and comparing the resultant measured temperature to expected temperature for a human.
[0022] The probability of a match, Pm, can be calculated in any way which is desired, for example by iris recognition, fingerprint image recognition, finger vein image recognition, or palm vein image recognition.
[0023] Another aspect of the invention is a system for carrying out the method. [0024] A still further aspect and an advantage of the invention is that if a person fails or passes authentication, the person is not informed as to whether non-authentication or authentication was based on probability of liveliness or probability of matching of biometric image. This makes it much more difficult for an attempted fraudster to refine their fraudulent methods since they are not being provided clear feedback.
[0025] As compared to conventional biometric systems and methods, the invention does not merely depend on the probability that the person is who they said they are when authorizing a transaction. The invention includes calculating a second probability which is the probability that the biometric data is from a real person in the first place. The first probability is determined using any biometric algorithm. The second probability is determined using other algorithms which determine whether the biometric data or the person from whom the data is collected is a real person. The decision to authorize a transaction is now a function of both these probabilities. Often, if the first probability is high (a good match), then the second probability typically will also be high (a real person). However, in some cases where a good customer is trying to perform a transaction and the biometric algorithm is having difficulty performing a match (because light is limited for example and the person's web-cam has a low-contrast image), then the first probability could be low but the second probability could still be high.
[0026] The algorithms to determine the second probability (confidence in whether a person is real or not) can be designed to be in many cases less sensitive to conditions out of the control of the algorithms, such as illumination changes and orientation of the person, compared to algorithms that compute the first probability (confidence that the person is a particular person) which are often very sensitive to illumination changes and orientation of the person. Because of
this, and since we combine the 2 probabilities to make a decision in a transaction, the reject rate of true authentics can be designed to be greatly reduced.
[0027] The invention authorizes transactions based on a combination of the two probabilities, an attempted fraudster is never sure whether a transaction was authorized or not authorized because they were matched or not matched, or because they were or were not detected as a real person and eliminates the clear feedback that criminals are provided today that they use to develop new methods to defeat systems. As a bi-product, the invention provides an enormous deterrent to criminals since the system is acquiring biometric data that they have no idea can or cannot be used successfully as evidence against them. Even if there is a small probability that evidence can be used against them is sufficient for many criminals to not perform fraud, in consideration of the consequences of the charges and the damming evidence of biometric data (such as a picture of a face tied to a transaction). An analogy to this latter point is CCTV cameras in a high street, which typically reduces crime substantially since people are aware that there is a possibility they will be caught on camera.
[0028] A preferred formula used in calculating a decision whether to authenticate a transaction is D = P(p) * (1 + P(m)), where D is the decision probability, P(m) is the probability of a match with a range of 0 to 1, and P(p) is the probability the person is real and the biometric data is valid from 0 to 1. If the algorithm detects person is not live, and no match detected : D = 0 * (1 + 0) = 0. If the algorithm detects strongly that the person is live, and yet no match is detected : D = 1 * (1+0) = 1. If the algorithm detects strongly that the person is live, and a very good match is detected : D = 1 * (1 + 1) = 2. If the algorithm detects strongly that the person is live (or more specifically, that biometric data has been collected that can be used by a manual or automatic method after-the-fact to identify the person in prosecution for example), and a poor match is detected of 0.3: D = 1 * (1 + 0.3) = 1.3 If the threshold is set at, for example, 1.2 for D, then essentially in the latter case, the transaction will be authorized even though the biometric match is not high. This is because the system determined that the biometric data collected can be used by a manual or automatic method after-the-fact to identify the person in prosecution for example. A higher transaction may be authorized if the value of D is higher. Many other functions of Pp and Pm can be used. We use the parallel result to authorize a transaction or access control or other permission, where rejection of a true customer has significant penalty such as a loss of a customer. In the prior art, false rejects and true accepts are often addressed only in consideration
of the biometric match performance, and the substantial business consequences of a false reject is often not considered, and therefore few systems have been implemented practically. [0029] A special advantage of this method and system is that by combining in one algorithm the live-person result with the match result, a fraudulent user does not know whether he or she was authorized or declined as a result of a bad or good match, or because the system has captured excellent live-person data that can be used for prosecution or at least embarrassing public disclosure. The system results in a large deterrent since in the process of trying to defeat a system, the fraudulent user will have to present some live-person data to the system and they will not know how much or how little live-person data is required to incriminate themselves. The fraudulent user is also not able to determine precisely how well their fraudulent methods are working, which takes away the single most important tool of a fraudster, i.e., feedback on how well their methods are working. At best, they get feedback on the combination of live-person results and match results, but not on either individually. For example, a transaction may be authorized because the probability of a live-person is very high, even if the match probability is low. The invention collects a set of live-person data that can be used to compile a database or watch list of people who attempt to perform fraudulent transactions, and this can be used to recognize fraudsters at other transactions such as check-cashing for example by using a camera and another face recognition system. The system also ensures that some live-person data is captured, then it provides a means to perform customer redress (for example, if a customer complains then the system can show the customer a picture of them performing a transaction, or a bank agent can manually look at the picture of the user performing the transaction and compare it with a record of the user on file).
[0030] The biometric data gathered for calculating Pp can be stored and used later for manual verification or automatic checking.
[0031] In the prior art, only Pm has been involved in the decision metric. According to the present invention, Pp is combined so that for a given Pm, the decision criteria, D, is moved toward acceptance compared to when only Pm is involved if Pp is near 1, so that if the system has acquired good biometric data, then it is more likely to accept a match based on given biometric data used to calculate Pm, thereby moving the performance of a transaction system for authentic users from 98 percent to virtually 100 percent while still gathering data which can be used for prosecution or deterrent.
BRIEF DESCRIPTION OF THE DRAWINGS
[0032] FIG. 1 is a flow chart of an authentication system according to the invention.
DETAILED DESCRIPTION
[0033] Referring first to Fig. 1, the overall process is to compute 11 the probability, Pp, of a live person being presented, compute 13 the probability of a biometric match, Pm, computing 14 D according to the aforementioned formula, wherein at decision block 15 if D exceeds a preset threshold, the transaction is authorized 17 or, if D does not exceed the preset threshold, the transaction is not authorized, 16.
[0034] Referring now to Fig. 2, an example of a system and method of obtaining data used for calculating the probability of a live person 21 is shown. First, an image is displayed on a screen 23 with a black bar 24 on the right and a white area 25 on the left, and an image from a web- camera 26 that the person 21 looks at is recorded. A second image is displayed on the screen (not shown), but this time the black bar is on the left and the white area is on the right and a second from the web-camera 26 is recorded.
[0035] The difference between the two images is recorded and the difference at each pixel is squared. The images are then blurred by convolving with a low-pass filter and then threshold the image. Areas above threshold are areas of change between the two images. The system expects to see a change primarily on the cornea, where a sharp image of the screen is reflected.
[0036] Referring to Figs. 3 and 4 which represent cornea C with pupil P and section S 1 at time Tl and S2 at time T2, with I representing an iris, given the curved geometry of the cornea, for a live curved and reflective cornea, the black and white area should have a particular curved shape - specifically a curved black bar and a curved white area (much like a fish-eye lens view). A template of the expected view is correlated with the first image obtained on the web-camera only in the region of the eye as detected by the prior step), and the peak value of the correlation is detected. The process is then repeated with the template expected from the second image.
[0037] The minimum of the two correlation scores (which will lie between -1 to 1) is correlated and normalized it to be between 0 and 1 by adding 1 and dividing by 2. This is the probability of measure of liveness = P(p).
[0038] Using the method described in Turk, et al., U.S. Pat. 5,164,992, a face recognition match score, Pm, is calculated and then normalized to be between 0 and 1.
[0039] The system then computes D = (P(L) * (1 + P(M) ) / 2. If P(L) ranges from 0 to 1, and P(M) ranges from 0 to 1, then D ranges from 0 to 1. A threshold of 0.55 is set. If the value of D for a particular transaction/customer is above 0.55, then the transaction authenticated and allowed to proceed. If the value of D is less than or equal to 0.55, then authentication fails and the transaction is not allowed to proceed. If P(L) = 0.95 (high) and P(M) = 0.95 ((high) , then D = 0.95, which is well above the threshold - the transaction goes through as expected. If P(L) = 0.95 (high), but P(M) = 0.25 (poor), then D = 0.6, and the transaction still goes through.
[0040] The present invention, therefore, is well adapted to carry out the objects and attain the ends and advantages mentioned, as well as others inherent therein. While the invention has been depicted and described and is defined by reference to particular preferred embodiments of the invention, such references do not imply a limitation on the invention, and no such limitation is to be inferred. The invention is capable of considerable modification, alteration and equivalents in form and function, as will occur to those ordinarily skilled in the pertinent arts. The depicted and described preferred embodiments of the invention are exemplary only and are not exhaustive of the scope of the invention. Consequently, the invention is intended to be limited only by the spirit and scope of the appended claims, giving full cognizance to equivalents in all respects.
Claims
1. A method of authenticating financial transactions comprising acquiring biometric data from a person, calculating probability of liveness, Pp, of the person and probability of a match, Pm, between the person and known biometric information, and providing and authentication decision, D, based on a combination of Pp and Pm.
2. The method of claim 1 wherein an D is calculated as a function of Pm and Pp according to the formula D = P(p) * (K + P(m)) , wherein K is a number between 0.1 and 100.
3. The method of claim 1 wherein an authentication decision, D, is calculated as a function of Pm and Pp according to the formula D = P(p) * (K + P(m)) , wherein K is a number between 0.5 and 1.5.
4. The method of claim 1 wherein the biometric data is stored and is used for manual verification.
5. The method of claim 1 wherein Pp is determined by steps comprising presenting a first image on a computer screen, wherein the computer screen is oriented to face a user; positioning at least one camera proximate the computer screen, wherein the at least one camera is oriented to face the user so that light emitted by the computer screen as the first image is reflected by the user and captured by the at least one camera; obtaining a second image through the at least one camera; and determining whether at least a portion of the second image includes a representation of the first image on the computer screen reflected by a curved surface consistent with a human eye.
6. The method of claim 1 wherein Pp is calculated by steps comprising presenting a first image on a computer screen positioned in front of a user; capturing a first reflection of the first image off of the user through a camera; presenting a second image on the computer screen positioned in front of the user; capturing a second reflection of the second image off of the user through the camera; comparing the first reflection of the first image with the second reflection of the second image to determine whether the first reflection and the second reflection were formed by a curved surface consistent with a human eye.
7. The method of claim 1 wherein Pp is calculated by steps comprising obtaining a first image of a user positioned in front of a computer screen from a first perspective; obtaining a second image of the user positioned in front of the computer screen from a second perspective; identifying a first portion of the first image and a second portion of the second image containing a representation of a human eye; and detecting a human eye when the first portion of the first image differs from the second portion of the second image.
8. The method of claim 1 wherein Pp is calculated by steps comprising presenting one or more illuminators, wherein the illuminators are oriented to face a user; positioning at least one camera proximate the illuminators, wherein the at least one camera is oriented to face the user so that light emitted by the illuminators is reflected by the user and captured by the at least one camera as a first image; obtaining a second image through the at least one camera at a different time than the first image; detecting a first position of a reflection in the first image and a second position of a reflection in the second image; normalizing a positional change of the user in the first image and the second image based upon the first position and the second position, wherein the step of normalizing comprises compensating for motion during the time between the first image and the second image by using at least a translation motion model to detect residual motion of the position of the reflection; and determining whether a change between at least a portion of the first image and the second image is consistent with reflection by a curved surface consistent with that of a human eye.
9. The method of claim 1 wherein Pp is calculated by steps comprising measuring finger or palm temperature and comparing the resultant measured temperature to expected temperature for a human.
10. The method of claim 1 wherein Pm is calculated by steps comprising iris recognition, fingerprint image recognition, finger vein image recognition, or palm vein image recognition.
11. The method of claim 1 wherein if a person fails authentication, the person is not informed as to whether non-authentication was based on probability of non-liveliness or probability of non-matching of biometric image.
12. The method of claim 1 wherein the accuracy of authentication of an authentic person is improved use of Pp.
13. The method of claim 1 wherein biometric data used to calculate Pp is obtained from a web camera connected to a computer.
14. The method of claim 1 wherein biometric data used to calculate Pp is obtained from a cell phone camera.
15. A method of authenticating financial transactions comprising acquiring biometric data from a person, calculating cost of liveness, Pp, of the person and probability of a match, Pm, between the person and known biometric information, and providing and authentication decision, D, based on a combination of Pp and Pm.
16. A system for authenticating financial transactions comprising means to acquire biometric data from a person and calculate probability of liveness, Pp, of the person and probability of a match, Pm, between the person and known biometric information.
17. The system of claim 11 wherein the means to calculate comprises a computer programmed to determine Pp, Pm, and to authenticate if the value of D exceeds a predetermined value according to a formula D = P(p) * (K + P(m)) , wherein K is a number between 0.1 and 100.
18. The system of claim 11 wherein the means to calculate comprises a computer programmed to determine Pp, Pm, and to authenticate if the value of D exceeds a predetermined value according to a formula D = P(p) * (K + P(m)) , wherein K is a number between 0.5 and 1.5.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/444,018 US8280120B2 (en) | 2006-10-02 | 2007-10-02 | Fraud resistant biometric financial transaction system and method |
EP07843633A EP2100253A4 (en) | 2006-10-02 | 2007-10-02 | Fraud resistant biometric financial transaction system and method |
US13/598,307 US8818051B2 (en) | 2006-10-02 | 2012-08-29 | Fraud resistant biometric financial transaction system and method |
US13/598,355 US8818052B2 (en) | 2006-10-02 | 2012-08-29 | Fraud resistant biometric financial transaction system and method |
US13/785,987 US9355299B2 (en) | 2006-10-02 | 2013-03-05 | Fraud resistant biometric financial transaction system and method |
US13/837,167 US20130212655A1 (en) | 2006-10-02 | 2013-03-15 | Efficient prevention fraud |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US82773806P | 2006-10-02 | 2006-10-02 | |
US60/827,738 | 2006-10-02 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/444,018 A-371-Of-International US8280120B2 (en) | 2006-10-02 | 2007-10-02 | Fraud resistant biometric financial transaction system and method |
US13/598,355 Continuation US8818052B2 (en) | 2006-10-02 | 2012-08-29 | Fraud resistant biometric financial transaction system and method |
US13/598,307 Continuation US8818051B2 (en) | 2006-10-02 | 2012-08-29 | Fraud resistant biometric financial transaction system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008042879A1 true WO2008042879A1 (en) | 2008-04-10 |
Family
ID=39268808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/080135 WO2008042879A1 (en) | 2006-10-02 | 2007-10-02 | Fraud resistant biometric financial transaction system and method |
Country Status (3)
Country | Link |
---|---|
US (4) | US8280120B2 (en) |
EP (1) | EP2100253A4 (en) |
WO (1) | WO2008042879A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8818052B2 (en) | 2006-10-02 | 2014-08-26 | Eyelock, Inc. | Fraud resistant biometric financial transaction system and method |
EP2657886A3 (en) * | 2012-04-24 | 2015-02-25 | Samsung Electronics Co., Ltd | Method and apparatus for recognizing three-dimensional object |
EP2680190A3 (en) * | 2012-06-26 | 2015-04-22 | Google, Inc. | Facial recognition |
EP3249574A1 (en) * | 2016-05-23 | 2017-11-29 | Gemalto Sa | Automated control of the identity of a person holding an electronic machine-readable travel document |
Families Citing this family (73)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8260008B2 (en) | 2005-11-11 | 2012-09-04 | Eyelock, Inc. | Methods for performing biometric recognition of a human eye and corroboration of same |
US8364646B2 (en) | 2006-03-03 | 2013-01-29 | Eyelock, Inc. | Scalable searching of biometric databases using dynamic selection of data subsets |
US8604901B2 (en) | 2006-06-27 | 2013-12-10 | Eyelock, Inc. | Ensuring the provenance of passengers at a transportation facility |
WO2008036897A1 (en) | 2006-09-22 | 2008-03-27 | Global Rainmakers, Inc. | Compact biometric acquisition system and method |
US8953849B2 (en) | 2007-04-19 | 2015-02-10 | Eyelock, Inc. | Method and system for biometric recognition |
WO2008131201A1 (en) | 2007-04-19 | 2008-10-30 | Global Rainmakers, Inc. | Method and system for biometric recognition |
US20120239458A9 (en) * | 2007-05-18 | 2012-09-20 | Global Rainmakers, Inc. | Measuring Effectiveness of Advertisements and Linking Certain Consumer Activities Including Purchases to Other Activities of the Consumer |
US8212870B2 (en) | 2007-09-01 | 2012-07-03 | Hanna Keith J | Mirror system and method for acquiring biometric data |
US9036871B2 (en) | 2007-09-01 | 2015-05-19 | Eyelock, Inc. | Mobility identity platform |
WO2009029757A1 (en) | 2007-09-01 | 2009-03-05 | Global Rainmakers, Inc. | System and method for iris data acquisition for biometric identification |
US9002073B2 (en) | 2007-09-01 | 2015-04-07 | Eyelock, Inc. | Mobile identity platform |
US9117119B2 (en) | 2007-09-01 | 2015-08-25 | Eyelock, Inc. | Mobile identity platform |
EP2279483B1 (en) | 2008-04-25 | 2019-06-05 | Aware, Inc. | Biometric identification and verification |
WO2009158662A2 (en) | 2008-06-26 | 2009-12-30 | Global Rainmakers, Inc. | Method of reducing visibility of illimination while acquiring high quality imagery |
US20110119141A1 (en) * | 2009-11-16 | 2011-05-19 | Hoyos Corporation | Siccolla Identity Verification Architecture and Tool |
US8878773B1 (en) | 2010-05-24 | 2014-11-04 | Amazon Technologies, Inc. | Determining relative motion as input |
US10043229B2 (en) | 2011-01-26 | 2018-08-07 | Eyelock Llc | Method for confirming the identity of an individual while shielding that individual's personal data |
RU2589859C2 (en) | 2011-02-17 | 2016-07-10 | АЙЛОК ЭлЭлСи | Efficient method and system for obtaining image data of scene and iris image using one sensor |
WO2012158825A2 (en) | 2011-05-17 | 2012-11-22 | Eyelock Inc. | Systems and methods for illuminating an iris with visible light for biometric acquisition |
ES2495425T3 (en) * | 2011-07-11 | 2014-09-17 | Accenture Global Services Limited | Life detection |
US8548207B2 (en) | 2011-08-15 | 2013-10-01 | Daon Holdings Limited | Method of host-directed illumination and system for conducting host-directed illumination |
US8947351B1 (en) | 2011-09-27 | 2015-02-03 | Amazon Technologies, Inc. | Point of view determinations for finger tracking |
WO2013049486A2 (en) * | 2011-09-30 | 2013-04-04 | Sealed Air Corporation (Us) | Visually adaptive process improvement system for order taking |
US8942434B1 (en) * | 2011-12-20 | 2015-01-27 | Amazon Technologies, Inc. | Conflict resolution for pupil detection |
US9208492B2 (en) * | 2013-05-13 | 2015-12-08 | Hoyos Labs Corp. | Systems and methods for biometric authentication of transactions |
US9471919B2 (en) * | 2012-04-10 | 2016-10-18 | Hoyos Labs Ip Ltd. | Systems and methods for biometric authentication of transactions |
US9317113B1 (en) | 2012-05-31 | 2016-04-19 | Amazon Technologies, Inc. | Gaze assisted object recognition |
CN105051752B (en) | 2012-11-14 | 2018-12-14 | 戈兰·魏斯 | Biological feather recognition method and system for registering and authenticating |
US8572398B1 (en) | 2013-02-13 | 2013-10-29 | Daniel Duncan | Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information |
US9143506B2 (en) | 2013-02-13 | 2015-09-22 | Daniel Duncan | Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information |
US8914645B2 (en) | 2013-02-13 | 2014-12-16 | Daniel Duncan | Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information |
US9094576B1 (en) | 2013-03-12 | 2015-07-28 | Amazon Technologies, Inc. | Rendered audiovisual communication |
US9495526B2 (en) | 2013-03-15 | 2016-11-15 | Eyelock Llc | Efficient prevention of fraud |
US20140270404A1 (en) * | 2013-03-15 | 2014-09-18 | Eyelock, Inc. | Efficient prevention of fraud |
US9003196B2 (en) * | 2013-05-13 | 2015-04-07 | Hoyos Labs Corp. | System and method for authorizing access to access-controlled environments |
US11210380B2 (en) | 2013-05-13 | 2021-12-28 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
US10467460B2 (en) | 2013-07-02 | 2019-11-05 | Robert F. Nienhouse 1997 Declaration Of Trust | System and method for locating and determining substance use |
US9269012B2 (en) | 2013-08-22 | 2016-02-23 | Amazon Technologies, Inc. | Multi-tracker object tracking |
US9305225B2 (en) | 2013-10-14 | 2016-04-05 | Daon Holdings Limited | Methods and systems for determining user liveness |
US9838388B2 (en) | 2014-08-26 | 2017-12-05 | Veridium Ip Limited | System and method for biometric protocol standards |
KR102217916B1 (en) | 2013-12-31 | 2021-02-22 | 베리디움 아이피 리미티드 | System and method for biometric protocol standards |
US9817960B2 (en) * | 2014-03-10 | 2017-11-14 | FaceToFace Biometrics, Inc. | Message sender security in messaging system |
US10275583B2 (en) | 2014-03-10 | 2019-04-30 | FaceToFace Biometrics, Inc. | Expression recognition in messaging systems |
WO2015164807A1 (en) | 2014-04-25 | 2015-10-29 | Texas State University | Detection of brain injury and subject state with eye movement biometrics |
US20160005050A1 (en) * | 2014-07-03 | 2016-01-07 | Ari Teman | Method and system for authenticating user identity and detecting fraudulent content associated with online activities |
US9253189B1 (en) | 2014-08-27 | 2016-02-02 | International Business Machines Corporation | Generating weights for biometric tokens in probabilistic matching systems |
US10614204B2 (en) | 2014-08-28 | 2020-04-07 | Facetec, Inc. | Facial recognition authentication system including path parameters |
US10698995B2 (en) | 2014-08-28 | 2020-06-30 | Facetec, Inc. | Method to verify identity using a previously collected biometric image/data |
US11256792B2 (en) | 2014-08-28 | 2022-02-22 | Facetec, Inc. | Method and apparatus for creation and use of digital identification |
CA3186147A1 (en) | 2014-08-28 | 2016-02-28 | Kevin Alan Tussy | Facial recognition authentication system including path parameters |
US10803160B2 (en) | 2014-08-28 | 2020-10-13 | Facetec, Inc. | Method to verify and identify blockchain with user question data |
US10915618B2 (en) | 2014-08-28 | 2021-02-09 | Facetec, Inc. | Method to add remotely collected biometric images / templates to a database record of personal information |
JP6468823B2 (en) * | 2014-12-02 | 2019-02-13 | 三星電子株式会社Samsung Electronics Co.,Ltd. | Biological identification system and electronic device |
WO2016090379A2 (en) * | 2014-12-05 | 2016-06-09 | Texas State University | Detection of print-based spoofing attacks |
AU2015378512B2 (en) * | 2014-12-31 | 2020-07-02 | Tech5 Usa, Inc. | Cloud-based biometric enrollment, identification and verification through identity providers |
US9886639B2 (en) * | 2014-12-31 | 2018-02-06 | Morphotrust Usa, Llc | Detecting facial liveliness |
US9928603B2 (en) | 2014-12-31 | 2018-03-27 | Morphotrust Usa, Llc | Detecting facial liveliness |
WO2016162823A1 (en) * | 2015-04-08 | 2016-10-13 | Visa International Service Association | Method and system for associating a user with a wearable device |
US11329980B2 (en) | 2015-08-21 | 2022-05-10 | Veridium Ip Limited | System and method for biometric protocol standards |
WO2017155826A1 (en) * | 2016-03-07 | 2017-09-14 | Magic Leap, Inc. | Blue light adjustment for biometri security |
US10163282B2 (en) * | 2016-03-30 | 2018-12-25 | Intermec, Inc. | Systems and methods for authentication |
US9948479B2 (en) * | 2016-04-05 | 2018-04-17 | Vivint, Inc. | Identification graph theory |
USD987653S1 (en) | 2016-04-26 | 2023-05-30 | Facetec, Inc. | Display screen or portion thereof with graphical user interface |
CN108513614A (en) * | 2016-12-29 | 2018-09-07 | 罗伯特·F·尼恩豪斯1997信托声明 | System and method for positioning and determining substance migration |
CN107590463A (en) | 2017-09-12 | 2018-01-16 | 广东欧珀移动通信有限公司 | Face identification method and Related product |
KR102455633B1 (en) * | 2017-12-21 | 2022-10-17 | 삼성전자주식회사 | Liveness test method and apparatus |
US11087121B2 (en) | 2018-04-05 | 2021-08-10 | West Virginia University | High accuracy and volume facial recognition on mobile platforms |
CN109190509B (en) * | 2018-08-13 | 2023-04-25 | 创新先进技术有限公司 | Identity recognition method, device and computer readable storage medium |
US10922396B2 (en) | 2019-04-22 | 2021-02-16 | Bank Of America Corporation | Signals-based authentication |
US10726246B1 (en) | 2019-06-24 | 2020-07-28 | Accenture Global Solutions Limited | Automated vending machine with customer and identification authentication |
USD963407S1 (en) | 2019-06-24 | 2022-09-13 | Accenture Global Solutions Limited | Beverage dispensing machine |
EP3869395A1 (en) | 2020-02-21 | 2021-08-25 | Accenture Global Solutions Limited | Identity and liveness verification |
US11681787B1 (en) * | 2021-10-15 | 2023-06-20 | T Stamp Inc. | Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5291560A (en) * | 1991-07-15 | 1994-03-01 | Iri Scan Incorporated | Biometric personal identification system based on iris analysis |
US6064753A (en) * | 1997-06-10 | 2000-05-16 | International Business Machines Corporation | System and method for distortion control in live-scan inkless fingerprint images |
US6366682B1 (en) * | 1994-11-28 | 2002-04-02 | Indivos Corporation | Tokenless electronic transaction system |
US7092553B2 (en) * | 2001-07-03 | 2006-08-15 | Siemens Aktiengesellschaft | Multimodal biometry |
Family Cites Families (158)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4641349A (en) | 1985-02-20 | 1987-02-03 | Leonard Flom | Iris recognition system |
US5259040A (en) | 1991-10-04 | 1993-11-02 | David Sarnoff Research Center, Inc. | Method for determining sensor motion and scene structure and image processing system therefor |
US5488675A (en) | 1994-03-31 | 1996-01-30 | David Sarnoff Research Center, Inc. | Stabilizing estimate of location of target region inferred from tracked multiple landmark regions of a video image |
US5572596A (en) | 1994-09-02 | 1996-11-05 | David Sarnoff Research Center, Inc. | Automated, non-invasive iris recognition system and method |
US6714665B1 (en) | 1994-09-02 | 2004-03-30 | Sarnoff Corporation | Fully automated iris recognition system utilizing wide and narrow fields of view |
US5764789A (en) | 1994-11-28 | 1998-06-09 | Smarttouch, Llc | Tokenless biometric ATM access system |
US5615277A (en) * | 1994-11-28 | 1997-03-25 | Hoffman; Ned | Tokenless security system for authorizing access to a secured computer system |
US5805719A (en) | 1994-11-28 | 1998-09-08 | Smarttouch | Tokenless identification of individuals |
US5613012A (en) | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US7248719B2 (en) | 1994-11-28 | 2007-07-24 | Indivos Corporation | Tokenless electronic transaction system |
US6192142B1 (en) | 1994-11-28 | 2001-02-20 | Smarttouch, Inc. | Tokenless biometric electronic stored value transactions |
US7613659B1 (en) | 1994-11-28 | 2009-11-03 | Yt Acquisition Corporation | System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse |
US5802199A (en) | 1994-11-28 | 1998-09-01 | Smarttouch, Llc | Use sensitive identification system |
US5581629A (en) | 1995-01-30 | 1996-12-03 | David Sarnoff Research Center, Inc | Method for estimating the location of an image target region from tracked multiple image landmark regions |
DE19508623A1 (en) * | 1995-03-10 | 1996-09-12 | Sel Alcatel Ag | Circuit arrangement for displaying and controlling ambient lighting conditions |
JPH09212644A (en) | 1996-02-07 | 1997-08-15 | Oki Electric Ind Co Ltd | Iris recognition device and iris recognition method |
US7346472B1 (en) | 2000-09-07 | 2008-03-18 | Blue Spike, Inc. | Method and device for monitoring and analyzing signals |
US5737439A (en) | 1996-10-29 | 1998-04-07 | Smarttouch, Llc. | Anti-fraud biometric scanner that accurately detects blood flow |
US5835812A (en) * | 1997-02-14 | 1998-11-10 | Eastman Kodak Company | Photographic processing apparatus |
US6144754A (en) | 1997-03-28 | 2000-11-07 | Oki Electric Industry Co., Ltd. | Method and apparatus for identifying individuals |
US6373968B2 (en) | 1997-06-06 | 2002-04-16 | Oki Electric Industry Co., Ltd. | System for identifying individuals |
US6246751B1 (en) | 1997-08-11 | 2001-06-12 | International Business Machines Corporation | Apparatus and methods for user identification to deny access or service to unauthorized users |
US6554705B1 (en) | 1997-08-22 | 2003-04-29 | Blake Cumbers | Passive biometric customer identification and tracking system |
US6064752A (en) | 1997-11-04 | 2000-05-16 | Sensar, Inc. | Method and apparatus for positioning subjects before a single camera |
US6069967A (en) | 1997-11-04 | 2000-05-30 | Sensar, Inc. | Method and apparatus for illuminating and imaging eyes through eyeglasses |
US6055322A (en) | 1997-12-01 | 2000-04-25 | Sensor, Inc. | Method and apparatus for illuminating and imaging eyes through eyeglasses using multiple sources of illumination |
US6021210A (en) | 1997-12-01 | 2000-02-01 | Sensar, Inc. | Image subtraction to remove ambient illumination |
US5953440A (en) | 1997-12-02 | 1999-09-14 | Sensar, Inc. | Method of measuring the focus of close-up images of eyes |
US6028949A (en) | 1997-12-02 | 2000-02-22 | Mckendall; Raymond A. | Method of verifying the presence of an eye in a close-up image |
US6088470A (en) | 1998-01-27 | 2000-07-11 | Sensar, Inc. | Method and apparatus for removal of bright or dark spots by the fusion of multiple images |
US6980670B1 (en) | 1998-02-09 | 2005-12-27 | Indivos Corporation | Biometric tokenless electronic rewards system and method |
US6850631B1 (en) | 1998-02-20 | 2005-02-01 | Oki Electric Industry Co., Ltd. | Photographing device, iris input device and iris image input method |
US5978494A (en) | 1998-03-04 | 1999-11-02 | Sensar, Inc. | Method of selecting the best enroll image for personal identification |
JP3271750B2 (en) | 1998-03-05 | 2002-04-08 | 沖電気工業株式会社 | Iris identification code extraction method and device, iris recognition method and device, data encryption device |
JP3315648B2 (en) | 1998-07-17 | 2002-08-19 | 沖電気工業株式会社 | Iris code generation device and iris recognition system |
US6381347B1 (en) | 1998-11-12 | 2002-04-30 | Secugen | High contrast, low distortion optical acquistion system for image capturing |
US6424727B1 (en) | 1998-11-25 | 2002-07-23 | Iridian Technologies, Inc. | System and method of animal identification and animal transaction authorization using iris patterns |
US6289113B1 (en) | 1998-11-25 | 2001-09-11 | Iridian Technologies, Inc. | Handheld iris imaging apparatus and method |
US6532298B1 (en) | 1998-11-25 | 2003-03-11 | Iridian Technologies, Inc. | Portable authentication device and method using iris patterns |
US6377699B1 (en) | 1998-11-25 | 2002-04-23 | Iridian Technologies, Inc. | Iris imaging telephone security module and method |
KR100320465B1 (en) | 1999-01-11 | 2002-01-16 | 구자홍 | Iris recognition system |
US6944318B1 (en) | 1999-01-15 | 2005-09-13 | Citicorp Development Center, Inc. | Fast matching systems and methods for personal identification |
JP2000259278A (en) | 1999-03-12 | 2000-09-22 | Fujitsu Ltd | Device and method for performing indivisual authentication by using living body information |
KR100320188B1 (en) | 1999-03-23 | 2002-01-10 | 구자홍 | Forgery judgment method for iris recognition system |
US6247813B1 (en) | 1999-04-09 | 2001-06-19 | Iritech, Inc. | Iris identification system and method of identifying a person through iris recognition |
US6700998B1 (en) | 1999-04-23 | 2004-03-02 | Oki Electric Industry Co, Ltd. | Iris registration unit |
US7020351B1 (en) | 1999-10-08 | 2006-03-28 | Sarnoff Corporation | Method and apparatus for enhancing and indexing video and audio signals |
US6871287B1 (en) * | 2000-01-21 | 2005-03-22 | John F. Ellingson | System and method for verification of identity |
US7277561B2 (en) | 2000-10-07 | 2007-10-02 | Qritek Co., Ltd. | Iris identification |
US6819219B1 (en) | 2000-10-13 | 2004-11-16 | International Business Machines Corporation | Method for biometric-based authentication in wireless communication for access control |
KR100649303B1 (en) | 2000-11-16 | 2006-11-24 | 엘지전자 주식회사 | Apparatus of taking pictures in iris recognition system based on both of eyes's images |
US7047418B1 (en) | 2000-11-29 | 2006-05-16 | Applied Minds, Inc. | Imaging method and device using biometric information for operator authentication |
FR2819327B1 (en) | 2001-01-10 | 2003-04-18 | Sagem | OPTICAL IDENTIFICATION DEVICE |
US7095901B2 (en) | 2001-03-15 | 2006-08-22 | Lg Electronics, Inc. | Apparatus and method for adjusting focus position in iris recognition system |
KR20020078225A (en) | 2001-04-06 | 2002-10-18 | 주식회사 큐리텍 | System and method for diagnosing remotely using iris, sclera, retina information and strorage media having program source thereof |
US8284025B2 (en) | 2001-07-10 | 2012-10-09 | Xatra Fund Mx, Llc | Method and system for auditory recognition biometrics on a FOB |
KR20030034258A (en) | 2001-08-04 | 2003-05-09 | 주식회사 큐리텍 | Identification system and method using iris and retina, and media that can record computer program sources thereof |
KR20030051970A (en) | 2001-12-20 | 2003-06-26 | 주식회사 큐리텍 | Iris registration and recognition system |
KR100854890B1 (en) | 2001-12-28 | 2008-08-28 | 엘지전자 주식회사 | Iris recording and recognition method using of several led for iris recognition system |
US20050084137A1 (en) | 2002-01-16 | 2005-04-21 | Kim Dae-Hoon | System and method for iris identification using stereoscopic face recognition |
US7715595B2 (en) | 2002-01-16 | 2010-05-11 | Iritech, Inc. | System and method for iris identification using stereoscopic face recognition |
US6950536B2 (en) | 2002-01-25 | 2005-09-27 | Houvener Robert C | High volume mobile identity verification system and method using tiered biometric analysis |
JP4062031B2 (en) | 2002-09-25 | 2008-03-19 | セイコーエプソン株式会社 | Gamma correction method, gamma correction apparatus and image reading system |
US7385626B2 (en) | 2002-10-21 | 2008-06-10 | Sarnoff Corporation | Method and system for performing surveillance |
KR20030005113A (en) | 2002-12-04 | 2003-01-15 | 주식회사 큐리텍 | Identification system and method using iris, and media that can record computer program sources thereof |
FR2851673B1 (en) | 2003-02-20 | 2005-10-14 | Sagem | METHOD FOR IDENTIFYING PEOPLE AND SYSTEM FOR IMPLEMENTING THE METHOD |
US7492928B2 (en) * | 2003-02-25 | 2009-02-17 | Activcard Ireland Limited | Method and apparatus for biometric verification with data packet transmission prioritization |
KR20050005336A (en) | 2003-07-01 | 2005-01-13 | 주식회사 큐리텍 | Mobile Device Dual Camera system for Iris Identification |
US7152782B2 (en) | 2003-07-11 | 2006-12-26 | Visa International Service Association | System and method for managing electronic data transfer applications |
GB0316631D0 (en) * | 2003-07-16 | 2003-08-20 | Omniperception Ltd | Facial liveness assessment system |
EP1671258A4 (en) | 2003-09-04 | 2008-03-19 | Sarnoff Corp | Method and apparatus for performing iris recognition from an image |
FR2860629B1 (en) | 2003-10-01 | 2005-12-02 | Sagem | DEVICE FOR POSITIONING A USER BY REPERAGE ON BOTH EYES |
US7415138B2 (en) * | 2003-11-25 | 2008-08-19 | Ultra-Scan Corporation | Biometric authorization method and system |
KR20050051861A (en) | 2003-11-28 | 2005-06-02 | 주식회사 큐리텍 | Multi camera system |
US7398925B2 (en) | 2003-12-09 | 2008-07-15 | First Data Corporation | Systems and methods for assessing the risk of a financial transaction using biometric information |
FR2864290B1 (en) | 2003-12-18 | 2006-05-26 | Sagem | METHOD AND DEVICE FOR RECOGNIZING IRIS |
US9191215B2 (en) | 2003-12-30 | 2015-11-17 | Entrust, Inc. | Method and apparatus for providing authentication using policy-controlled authentication articles and techniques |
US7542590B1 (en) | 2004-05-07 | 2009-06-02 | Yt Acquisition Corporation | System and method for upgrading biometric data |
FR2870948B1 (en) | 2004-05-25 | 2006-09-01 | Sagem | DEVICE FOR POSITIONING A USER BY DISPLAYING ITS MIRROR IMAGE, IMAGE CAPTURE DEVICE AND CORRESPONDING POSITIONING METHOD |
JP2005334402A (en) * | 2004-05-28 | 2005-12-08 | Sanyo Electric Co Ltd | Method and device for authentication |
AU2005251372B2 (en) | 2004-06-01 | 2008-11-20 | L-3 Communications Corporation | Modular immersive surveillance processing system and method |
FR2871910B1 (en) | 2004-06-22 | 2006-09-22 | Sagem | BIOMETRIC DATA ENCODING METHOD, IDENTITY CONTROL METHOD, AND DEVICES FOR IMPLEMENTING METHODS |
US7639840B2 (en) | 2004-07-28 | 2009-12-29 | Sarnoff Corporation | Method and apparatus for improved video surveillance through classification of detected objects |
WO2007018523A2 (en) | 2004-07-28 | 2007-02-15 | Sarnoff Corporation | Method and apparatus for stereo, multi-camera tracking and rf and video track fusion |
WO2006012645A2 (en) | 2004-07-28 | 2006-02-02 | Sarnoff Corporation | Method and apparatus for total situational awareness and monitoring |
US7558406B1 (en) | 2004-08-03 | 2009-07-07 | Yt Acquisition Corporation | System and method for employing user information |
US8190907B2 (en) | 2004-08-11 | 2012-05-29 | Sony Computer Entertainment Inc. | Process and apparatus for automatically identifying user of consumer electronics |
US7949295B2 (en) | 2004-08-18 | 2011-05-24 | Sri International | Automated trainee monitoring and performance evaluation system |
US8402040B2 (en) | 2004-08-20 | 2013-03-19 | Morphotrust Usa, Inc. | Method and system to authenticate an object |
US7616788B2 (en) | 2004-11-12 | 2009-11-10 | Cogent Systems, Inc. | System and method for fast biometric pattern matching |
KR100629550B1 (en) | 2004-11-22 | 2006-09-27 | 아이리텍 잉크 | Multiscale Variable Domain Decomposition Method and System for Iris Identification |
US7869627B2 (en) | 2004-12-07 | 2011-01-11 | Aoptix Technologies, Inc. | Post processing of iris images to increase image quality |
US7418115B2 (en) | 2004-12-07 | 2008-08-26 | Aoptix Technologies, Inc. | Iris imaging using reflection from the eye |
KR20070108146A (en) | 2004-12-07 | 2007-11-08 | 에이옵틱스 테크놀로지스, 인크. | Iris imaging using reflection from the eye |
US7697786B2 (en) | 2005-03-14 | 2010-04-13 | Sarnoff Corporation | Method and apparatus for detecting edges of an object |
FR2884947B1 (en) | 2005-04-25 | 2007-10-12 | Sagem | METHOD FOR ACQUIRING THE SHAPE OF THE IRIS OF AN EYE |
US7634114B2 (en) | 2006-09-01 | 2009-12-15 | Sarnoff Corporation | Method and apparatus for iris biometric systems for use in an entryway |
US7505613B2 (en) * | 2005-07-12 | 2009-03-17 | Atrua Technologies, Inc. | System for and method of securing fingerprint biometric systems against fake-finger spoofing |
US7801335B2 (en) | 2005-11-11 | 2010-09-21 | Global Rainmakers Inc. | Apparatus and methods for detecting the presence of a human eye |
US8260008B2 (en) | 2005-11-11 | 2012-09-04 | Eyelock, Inc. | Methods for performing biometric recognition of a human eye and corroboration of same |
FR2895122B1 (en) | 2005-12-16 | 2008-02-01 | Sagem Defense Securite | METHOD OF SECURING PHYSICAL ACCESS AND PROVIDING ACCESS TO THE PROCESS |
US7545962B2 (en) | 2005-12-22 | 2009-06-09 | Daon Holdings Limited | Biometric authentication system |
FR2896604B1 (en) | 2006-01-23 | 2008-12-26 | Sagem Defense Securite | METHODS FOR DETERMINING AN IDENTIFIER AND BIOMETRIC VERIFICATION AND ASSOCIATED SYSTEMS |
US8364646B2 (en) | 2006-03-03 | 2013-01-29 | Eyelock, Inc. | Scalable searching of biometric databases using dynamic selection of data subsets |
US20070211922A1 (en) | 2006-03-10 | 2007-09-13 | Crowley Christopher W | Integrated verification and screening system |
FR2899357B1 (en) | 2006-03-29 | 2008-06-20 | Sagem Defense Securite | PROCESSING BIOMETRIC DATA IN A MULTI DIMENSIONAL REFERENTIAL. |
FR2900482B1 (en) | 2006-04-28 | 2008-06-20 | Sagem Defense Securite | METHOD FOR IDENTIFYING A PERSON BY ANALYZING THE CTERISTIC CARA OF ITS CILES |
FR2901898B1 (en) | 2006-06-06 | 2008-10-17 | Sagem Defense Securite | IDENTIFICATION METHOD AND ACQUIRING DEVICE FOR CARRYING OUT SAID METHOD |
US8604901B2 (en) | 2006-06-27 | 2013-12-10 | Eyelock, Inc. | Ensuring the provenance of passengers at a transportation facility |
FR2903513B1 (en) | 2006-07-10 | 2008-12-05 | Sagem Defense Securite | METHOD FOR IDENTIFYING AN INDIVIDUAL USING A TRANSFORMATION FUNCTION AND ASSOCIATED IDENTIFICATION DEVICE |
US7574021B2 (en) | 2006-09-18 | 2009-08-11 | Sarnoff Corporation | Iris recognition for a secure facility |
FR2906387A1 (en) | 2006-09-21 | 2008-03-28 | St Microelectronics Sa | METHOD AND DEVICE FOR SELECTING IMAGES IN A SEQUENCE OF IMAGES OF IRIS RECEIVED IN CONTINUOUS FLOW |
WO2008036897A1 (en) | 2006-09-22 | 2008-03-27 | Global Rainmakers, Inc. | Compact biometric acquisition system and method |
JP4650386B2 (en) | 2006-09-29 | 2011-03-16 | 沖電気工業株式会社 | Personal authentication system and personal authentication method |
EP2100253A4 (en) | 2006-10-02 | 2011-01-12 | Global Rainmakers Inc | Fraud resistant biometric financial transaction system and method |
US20130212655A1 (en) | 2006-10-02 | 2013-08-15 | Hector T. Hoyos | Efficient prevention fraud |
WO2008092156A1 (en) | 2007-01-26 | 2008-07-31 | Aoptix Technologies, Inc. | Combined iris imager and wavefront sensor |
US8092021B1 (en) | 2007-01-26 | 2012-01-10 | Aoptix Technologies, Inc. | On-axis illumination for iris imaging |
FR2912532B1 (en) | 2007-02-14 | 2009-04-03 | Sagem Defense Securite | SECURED BIOMETRIC CAPTURE DEVICE |
US20090074256A1 (en) | 2007-03-05 | 2009-03-19 | Solidus Networks, Inc. | Apparatus and methods for testing biometric equipment |
WO2008131201A1 (en) | 2007-04-19 | 2008-10-30 | Global Rainmakers, Inc. | Method and system for biometric recognition |
US20120239458A9 (en) | 2007-05-18 | 2012-09-20 | Global Rainmakers, Inc. | Measuring Effectiveness of Advertisements and Linking Certain Consumer Activities Including Purchases to Other Activities of the Consumer |
WO2009029757A1 (en) | 2007-09-01 | 2009-03-05 | Global Rainmakers, Inc. | System and method for iris data acquisition for biometric identification |
US8212870B2 (en) | 2007-09-01 | 2012-07-03 | Hanna Keith J | Mirror system and method for acquiring biometric data |
US9002073B2 (en) | 2007-09-01 | 2015-04-07 | Eyelock, Inc. | Mobile identity platform |
US9036871B2 (en) | 2007-09-01 | 2015-05-19 | Eyelock, Inc. | Mobility identity platform |
US9117119B2 (en) | 2007-09-01 | 2015-08-25 | Eyelock, Inc. | Mobile identity platform |
FR2924247B1 (en) | 2007-11-22 | 2009-11-13 | Sagem Securite | METHOD OF IDENTIFYING A PERSON BY ITS IRIS |
US8028896B2 (en) | 2007-12-14 | 2011-10-04 | Bank Of America Corporation | Authentication methods for use in financial transactions and information banking |
FR2925732B1 (en) | 2007-12-21 | 2010-02-12 | Sagem Securite | GENERATION AND USE OF A BIOMETRIC KEY |
WO2009158662A2 (en) | 2008-06-26 | 2009-12-30 | Global Rainmakers, Inc. | Method of reducing visibility of illimination while acquiring high quality imagery |
US8243133B1 (en) | 2008-06-28 | 2012-08-14 | Aoptix Technologies, Inc. | Scale-invariant, resolution-invariant iris imaging using reflection from the eye |
US8132912B1 (en) | 2008-06-29 | 2012-03-13 | Aoptix Technologies, Inc. | Iris imaging system using circular deformable mirror mounted by its circumference |
US8159328B2 (en) | 2008-07-16 | 2012-04-17 | George William Luckhardt | Biometric authentication and verification |
US8090246B2 (en) | 2008-08-08 | 2012-01-03 | Honeywell International Inc. | Image acquisition system |
FR2935508B1 (en) | 2008-09-01 | 2010-09-17 | Sagem Securite | METHOD FOR DETERMINING A PSEUDO-IDENTITY FROM MINUTE CHARACTERISTICS AND ASSOCIATED DEVICE |
US8306279B2 (en) | 2008-09-15 | 2012-11-06 | Eyelock, Inc. | Operator interface for face and iris recognition devices |
KR101030613B1 (en) | 2008-10-08 | 2011-04-20 | 아이리텍 잉크 | The Region of Interest and Cognitive Information Acquisition Method at the Eye Image |
US20100278394A1 (en) | 2008-10-29 | 2010-11-04 | Raguin Daniel H | Apparatus for Iris Capture |
US8317325B2 (en) | 2008-10-31 | 2012-11-27 | Cross Match Technologies, Inc. | Apparatus and method for two eye imaging for iris identification |
LT2382605T (en) | 2009-01-07 | 2021-01-11 | Magnetic Autocontrol Gmbh | Apparatus for a checkpoint |
US8195044B2 (en) | 2009-03-30 | 2012-06-05 | Eyelock Inc. | Biometric camera mount system |
US8745698B1 (en) | 2009-06-09 | 2014-06-03 | Bank Of America Corporation | Dynamic authentication engine |
US8443202B2 (en) | 2009-08-05 | 2013-05-14 | Daon Holdings Limited | Methods and systems for authenticating users |
US20110119141A1 (en) | 2009-11-16 | 2011-05-19 | Hoyos Corporation | Siccolla Identity Verification Architecture and Tool |
WO2011093538A1 (en) | 2010-01-27 | 2011-08-04 | Iris Id | Iris scanning apparatus employing wide-angle camera, for identifying subject, and method thereof |
US8719584B2 (en) | 2010-10-26 | 2014-05-06 | Bi2 Technologies, LLC | Mobile, wireless hand-held biometric capture, processing and communication system and method for biometric identification |
RU2589859C2 (en) | 2011-02-17 | 2016-07-10 | АЙЛОК ЭлЭлСи | Efficient method and system for obtaining image data of scene and iris image using one sensor |
US8824749B2 (en) | 2011-04-05 | 2014-09-02 | Microsoft Corporation | Biometric recognition |
CN103797495A (en) | 2011-04-19 | 2014-05-14 | 眼锁股份有限公司 | Biometric chain of provenance |
WO2012158825A2 (en) | 2011-05-17 | 2012-11-22 | Eyelock Inc. | Systems and methods for illuminating an iris with visible light for biometric acquisition |
WO2013028700A2 (en) | 2011-08-22 | 2013-02-28 | Eyelock Inc. | Systems and methods for capturing artifact free images |
US8411909B1 (en) | 2012-06-26 | 2013-04-02 | Google Inc. | Facial recognition |
KR101995566B1 (en) | 2012-08-31 | 2019-07-03 | 주식회사 이리언스 | Iris Identifying System with Guide |
KR101455609B1 (en) | 2012-09-25 | 2014-10-28 | 주식회사 이리언스 | Payment system and method using iris information |
KR102010421B1 (en) | 2012-10-19 | 2019-08-14 | 주식회사 이리언스 | System and method for certificate management |
US8584219B1 (en) | 2012-11-07 | 2013-11-12 | Fmr Llc | Risk adjusted, multifactor authentication |
US9043887B2 (en) | 2012-12-31 | 2015-05-26 | Apple Inc. | Adaptive secondary authentication criteria based on account data |
-
2007
- 2007-10-02 EP EP07843633A patent/EP2100253A4/en not_active Ceased
- 2007-10-02 US US12/444,018 patent/US8280120B2/en active Active
- 2007-10-02 WO PCT/US2007/080135 patent/WO2008042879A1/en active Application Filing
-
2012
- 2012-08-29 US US13/598,355 patent/US8818052B2/en active Active
- 2012-08-29 US US13/598,307 patent/US8818051B2/en active Active
-
2013
- 2013-03-05 US US13/785,987 patent/US9355299B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5291560A (en) * | 1991-07-15 | 1994-03-01 | Iri Scan Incorporated | Biometric personal identification system based on iris analysis |
US6366682B1 (en) * | 1994-11-28 | 2002-04-02 | Indivos Corporation | Tokenless electronic transaction system |
US6064753A (en) * | 1997-06-10 | 2000-05-16 | International Business Machines Corporation | System and method for distortion control in live-scan inkless fingerprint images |
US7092553B2 (en) * | 2001-07-03 | 2006-08-15 | Siemens Aktiengesellschaft | Multimodal biometry |
Non-Patent Citations (1)
Title |
---|
See also references of EP2100253A4 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8818052B2 (en) | 2006-10-02 | 2014-08-26 | Eyelock, Inc. | Fraud resistant biometric financial transaction system and method |
US8818051B2 (en) | 2006-10-02 | 2014-08-26 | Eyelock, Inc. | Fraud resistant biometric financial transaction system and method |
US9355299B2 (en) | 2006-10-02 | 2016-05-31 | Eyelock Llc | Fraud resistant biometric financial transaction system and method |
EP2657886A3 (en) * | 2012-04-24 | 2015-02-25 | Samsung Electronics Co., Ltd | Method and apparatus for recognizing three-dimensional object |
EP2680190A3 (en) * | 2012-06-26 | 2015-04-22 | Google, Inc. | Facial recognition |
EP3249574A1 (en) * | 2016-05-23 | 2017-11-29 | Gemalto Sa | Automated control of the identity of a person holding an electronic machine-readable travel document |
WO2017202755A1 (en) * | 2016-05-23 | 2017-11-30 | Gemalto Sa | Automated control of the identity of a person holding an electronic machine-readable travel document |
Also Published As
Publication number | Publication date |
---|---|
US20120328164A1 (en) | 2012-12-27 |
US8280120B2 (en) | 2012-10-02 |
EP2100253A4 (en) | 2011-01-12 |
EP2100253A1 (en) | 2009-09-16 |
US8818052B2 (en) | 2014-08-26 |
US20100014720A1 (en) | 2010-01-21 |
US9355299B2 (en) | 2016-05-31 |
US20130182913A1 (en) | 2013-07-18 |
US8818051B2 (en) | 2014-08-26 |
US20120321141A1 (en) | 2012-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9355299B2 (en) | Fraud resistant biometric financial transaction system and method | |
US20210287026A1 (en) | Method and apparatus with liveness verification | |
Tome et al. | On the vulnerability of finger vein recognition to spoofing | |
US8422746B2 (en) | Face authentication system and authentication method thereof | |
Jain et al. | Biometric identification | |
JP4156430B2 (en) | Face verification method and system using automatic database update method | |
US7522750B2 (en) | Biometrics verification system and a method thereof | |
US20130212655A1 (en) | Efficient prevention fraud | |
JP7253691B2 (en) | Verification device and verification method | |
US20100329568A1 (en) | Networked Face Recognition System | |
RU2670798C1 (en) | Method of iris authentication of user and device therefor | |
AU5570798A (en) | Security apparatus and method | |
JP5730044B2 (en) | Face image authentication device | |
US20220277311A1 (en) | A transaction processing system and a transaction method based on facial recognition | |
KR100711110B1 (en) | System for iris recognition against counterfeit attack using gradient based fusion of multi-spectral images and method thereof | |
JP3999983B2 (en) | Operator monitoring device | |
JP2005196516A (en) | Security method by face recognition | |
CN112069915A (en) | ATM with face recognition system | |
Braghin | Biometric authentication | |
WO2022059151A1 (en) | Face authentication method, face authentication program, and face authentication device | |
Pankanti et al. | Biometrics: Promising frontiers for emerging identification market | |
Aparna et al. | Data Anonymization on Biometric Security Using Iris Recognition Technology | |
Balaji et al. | Development of fusion biometric system for atm machines | |
Girdhar et al. | Improving performance of a face liveness detection system using soft biometrics | |
Njoku et al. | Multi-Modal Biometric System: An Approach towards Security Management in Vulnerable Location |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07843633 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12444018 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007843633 Country of ref document: EP |