WO2017147194A1 - System for biometric identity confirmation - Google Patents

System for biometric identity confirmation Download PDF

Info

Publication number
WO2017147194A1
WO2017147194A1 PCT/US2017/018961 US2017018961W WO2017147194A1 WO 2017147194 A1 WO2017147194 A1 WO 2017147194A1 US 2017018961 W US2017018961 W US 2017018961W WO 2017147194 A1 WO2017147194 A1 WO 2017147194A1
Authority
WO
WIPO (PCT)
Prior art keywords
subject
data
pulse wave
wave shape
spirometric
Prior art date
Application number
PCT/US2017/018961
Other languages
French (fr)
Inventor
Brian Kirby Phillips
Geoffrey A. WILSON
Original Assignee
Integrated Monitoring Systems, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/051,935 external-priority patent/US9575470B2/en
Application filed by Integrated Monitoring Systems, Llc filed Critical Integrated Monitoring Systems, Llc
Priority to EP17757150.2A priority Critical patent/EP3420419A4/en
Publication of WO2017147194A1 publication Critical patent/WO2017147194A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C19/00Electric signal transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q1/00Details of selecting apparatus or arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom

Definitions

  • the present invention relates generally to the field of biometric identity confirmation. More specifically, the present invention discloses a system for biometric identity confirmation based on analysis of both spirometric data and pulse wave data for a test subject.
  • Biometric identification is the process of recognizing or rejecting an unknown person as a particular member of a previously characterized set, based on biological measurements.
  • the ideal biometric characterization is specific to the individual, difficult to counterfeit, robust to metabolic fluctuations, insensitive to external conditions, easily measured, and quickly processed.
  • Fingerprint, retinal, iris, and facial scans are well-known biometric identification techniques relying on image processing. Images are two- dimensional, requiring sophisticated and computationally intensive algorithms, the analysis of which is often complicated by random orientation and variable scaling. Voice recognition is an example of biometric identification amenable to time series analysis, an inherently simpler one-dimensional process.
  • biometric identifiers can be expressed as a single parameter, such as height or weight.
  • Single parameter identifiers have been the only quantitative means of identification throughout most of history. The price of simplicity is the loss of specificity, and in the case of weight, the lack of constancy over time. Nevertheless, single-parameter biometrics remain effective identifying factors, as is obvious from their continued use.
  • Identity tracking/confirmation is the process of following the whereabouts of a known subject moving unpredictably among similar individuals, perhaps with deceptive intent. Tracking/confirmation is somewhat simpler than identification, because it merely requires distinguishing the subject from all others rather than distinguishing every individual from every other, and because continuous rather than episodic data are available.
  • Biometric identity tracking/confirmation is the continuous verification that a body-mounted sensor has remained on the subject, and has not been surreptitiously transferred to an impostor.
  • biometric identification should be broadly construed to encompass both biometric identification in its narrower sense, as described above, and identity tracking/confirmation.
  • This invention provides a system for biometric identity confirmation based on both pulse wave shape data and spirometric data for the test subject.
  • pulse wave shape and spirometric data for a known subject are used to generate subject characterization data for the known subject by computing an exemplar and selectively weighting portions of the exemplar based, for example, on repeatability or distinguishing characteristic features among known subjects.
  • pulse wave shape and spirometric data for a test subject are analyzed using the subject characterization data to confirm whether the identity of the test subject matches the known subject.
  • FIG. 1 is a flowchart of the enrollment mode of the present invention.
  • FIG. 2 is a flowchart of the identity authentication mode of the present invention.
  • FIG. 3 is a flowchart of the "acquire trial” procedure for pulse wave data.
  • FIG. 4 is a flowchart of the "acquire trial” procedure for spirometric data.
  • FIG. 5 is a flowchart of the procedure used by both the pulse wave and breath print algorithms to enroll a new client.
  • FIG. 6 is a flowchart of the identity authentication mode of the present invention.
  • FIG. 7 is a graph showing pulse wave exemplar shape vectors of the ten subjects of a recent study, along with the mean pulse wave shape.
  • the present invention provides a biometric system for characterizing individuals by the non-invasive sensing of arterial pulse waves and spirometric data for the purposes of identification and identity tracking/confirmation.
  • the major components include a computer processor, data storage, a pulse sensor adjacent to the subject's tissue that generates time-series data based on the subject's pulse waves, and a spirometric sensor that measures predetermined spirometric properties of the exhaled breath sample, such as flow or pressure.
  • This spirometric data is typically generated as time-series data over the course of the sample.
  • the processor initially receives and analyzes the pulse wave data from the pulse sensor and the spirometric data from the spirometric sensor for a known subject to generate subject characterization data identifying the known subject. Thereafter, in the identity authentication mode, the processor simultaneously receives data from the pulse sensor and spirometric sensor for a test subject (who may or may not be the known subject). The processor analyzes this data in conjunction with the stored subject characterization data to determine whether the test subject is the same as the known subject.
  • test subject refers to the person whose identity is being tested or confirmed during the identity authentication mode of the present system.
  • the present system operates in one of two mutually exclusive modes - an enrollment mode and an identity authentication mode.
  • the enrollment mode acquires subject data under the supervision of a trained technician, computes subject characteristics, calculates the probability of an impostor producing similar characteristics, and stores these findings in a client database for later use during the identity authentication mode.
  • Figure 1 is a general flowchart of the enrollment mode employed to initially build subject characterization data for a known subject.
  • the operator first verifies the identity of the subject (step 20), and mounts and tests the pulse sensor on the subject, and provides the subject with a spirometric sensor (step 21).
  • the processor simultaneously acquires pulse wave data from the pulse sensor and spirometric data from the spirometric sensor for a brief period of time (step 22).
  • the subject may be asked to undertake a range of activities to ensure the enrollment data are representative of that which may be encountered over the subject's normal day-to-day activities.
  • the processor analyzes the enrollment data and generates subject characterization data for identifying the known subject (step 23). This subject characterization data is stored for later use during the identity authentication mode of the present system (step 24), as will be described below.
  • the identity authentication mode is used to authenticate the identity of a test subject, who may or may not be the known subject from the enrollment mode.
  • the system acquires subject data unsupervised in the field, compares it to subject and impostor characteristics, and decides whether to authenticate or challenge identification.
  • Figure 2 is a flowchart of one possible embodiment of the identity authentication mode.
  • the processor acquires pulse wave data from the pulse sensor and spirometric data from the spirometric sensor for the test subject (step 25).
  • the processor analyzes this test data using the subject characterization data (step 26).
  • step 27 the processor determines whether there is a sufficient degree of similarity between the pulse wave and spirometric characteristics of the known subject (from the subject characterization data) and the test subject to conclude that these subjects are the same person (step 28). If so, the processor may update the subject characterization data 18 to include the current test data (step 28A) and then loop back to step 25. Otherwise, if the processor determines that the current test subject is not the same as the known subject, an alarm can be activated to signal that deception has been detected (step 29).
  • the two modes in the preferred embodiment of the present invention share a common "acquire trial" procedure that acquires and pre-processes a short, contiguous time-series data of the digitized measurement, called a "trial”.
  • Figure 3 shows how the pulse wave algorithm acquires a trial.
  • the trial pulse wave typically consists of a small number (e.g. 10) of pulse cycles, which are similar but not identical to each other. Performance is improved by synchronizing and summing pulse cycles to wash out noise.
  • the goal of the procedure is to convert the multi-cycle waveform into a single representative cycle.
  • Block 300 is the start of the procedure.
  • Block 301 reads and discards pulse samples for a fixed duration (e.g. 2 seconds) while the waveform settles. After settling, block 302 reads and records samples for the remainder of the trial (e.g. 8 seconds).
  • the concurrently running block 303 tests samples for "railing" (i.e. exceeding the limits of the digitizer, an indicator of trial corruption).
  • Block 303 Upon detecting a railed sample, Block 303 calls block 304, which rejects the trial and stops the procedure. If no recorded samples are railed, control proceeds to block 305, which calculates the first and second derivatives of the pulse wave with respect to time, to eliminate baseline drift and generate triggers associated with the systolic excursion. Representing the subject's pulse wave with its first derivative also obscures the bio-informational nature of the signal, thus enhancing privacy. The derivatives may or may not be smoothed to reduce high frequency noise.
  • Block 306 chooses the most negative excursion of the second derivative as the "trigger candidate" (TC).
  • block 307 zeroes the TC and some small number (e.g. 4) of immediate predecessor and successor data, to avoid selecting the same peak again.
  • block 308 compares the present TC to the first TC. If the present TC is greater than some threshold fraction (e.g. 1 ⁇ 2) of the first TC, the procedure loops through blocks 306-308, acquiring another TC. If not, TC acquisition is deemed complete, and control proceeds to block 309. If there are many (e.g., 8) more TCs than can be accounted for according to the settled sampling time and maximum pulse rate (e.g., 16 for 8 seconds at 120 beats per minute), the sample is judged too noisy, and block 309 calls block 304, which rejects the trial and stops the procedure. If not, the trial is accepted, but some of the TCs may be noise spikes asynchronous to the underlying pulse cycle.
  • some threshold fraction e.g. 1 ⁇ 2
  • Block 310 calculates a square matrix of the delays ⁇ between every pair of TCs.
  • the procedure loops through all integer pulse periods, in units of the sampling period, from the fastest to the slowest measurable pulse (e.g., 50-150 for 100 Hz sampling and 120-40 beats per minute), to find the best fit to the preponderance of TCs.
  • Block 31 1 increments the pulse period P.
  • Block 312 computes the matrix of squared remainders [ ⁇ mod P] 2 , where the "mod" operation yields the integer remainder with the smallest absolute value (e.g., 15 mod 8 equals -1 , not 7).
  • Block 313 sums the squared remainders for each TC relative to the other TCs, and normalizes such that a "score" near (much smaller than) unity indicates P is a poor (good) fit to the true pulse period.
  • Block 314 averages the TC scores to evaluate P's goodness of fit.
  • Block 315 selects the P with the lowest score.
  • block 316 rejects TCs with optimal-P scores greater than a preset threshold (e.g., 0.6) as false triggers not synchronized with the prevailing pulsatile rhythm, leaving the remaining TCs to serve as true triggers. Then, block 317 uses the true triggers to synchronize and sum the cycles. Finally, block 318 returns the summed cycle to the calling program.
  • a preset threshold e.g. 0.
  • Figure 4 shows how the breath print algorithm acquires a trial.
  • the trial consists of a single forced exhalation, preceded by a quiescent period used to establish a signal baseline, and succeeded by a period used to ensure further exhalation is not forthcoming to spoil the data.
  • the goals of the procedure are to delineate these three periods, subtract the baseline from the exhalation, measure the exhalation duration and forced vital capacity (FVC), normalize the exhalation shape to duration, and compute the auxiliary parameters forced expiratory volume in the initial second (FEV-i) and peak expiratory flow (PEF).
  • Block 400 is the start of the procedure.
  • Block 401 initiates a data acquisition and processing loop that repeats for a fixed number of trial samples ⁇ e.g.
  • Blocks 402 and 403 repeatedly acquire samples until the flow signal exceeds a threshold defining the onset of exhalation.
  • Block 404 determines if there are sufficient samples to establish a baseline (e.g. 50): If not, control passes to block 405, which rejects the trial and stops the procedure. If so, the average of the baseline samples is recorded and control passes to block 406.
  • Blocks 406 and 407 repeatedly acquire samples until the flow signal falls below the previously defined threshold, at which time exhalation is deemed to have ceased.
  • Block 408 determines if there are sufficient exhalation samples (e.g. 250): If not, control passes to block 405, which rejects the trial and stops the procedure.
  • Blocks 409 and 410 acquire post-breath samples until the trial times out, or a sample exceeds the previously defined threshold, indicating a resurgence of exhalation. In the latter case, the trial is deemed corrupted, and control passes to block 405, which rejects the trial and stops the procedure.
  • block 41 1 passes control to block 412, which determines if there are sufficient post-breath samples (e.g. 1 ). If not, control passes to block 405, which rejects the trial and stops the procedure. If so, control passes to block 413, which computes the exhalation duration and FVC.
  • Block 414 uses these to normalize the exhalation shape in time and amplitude, for comparison to other exhalations of different durations and FVCs.
  • Block 4 5 computes the FEVi and PEF.
  • Block 416 returns duration, FVC, shape, FEVi and PEF to the calling routine, and ends the procedure.
  • Figure 5 shows two embodiments of the procedure used by both the pulse wave and breath print algorithms to enroll a new client.
  • This procedure can be used both to establish the client's characteristics as a subject whose identity will be putative in the field, and as a possible impostor for any other client.
  • Block 500 is the start of the procedure.
  • Block 501 acquires a number of trials (e.g., five) by repeatedly calling the appropriate Acquire Trial procedure.
  • Block 502 computes the "exemplar" (i.e., the arithmetic mean over the enrollment trials of any or all of the pulse wave shape vector, the breath print duration and FVC scalars, the breath print shape vector, and the breath print FEVi and PEF scalars, arranged into a vector) using the enrollment trials.
  • exemplar i.e., the arithmetic mean over the enrollment trials of any or all of the pulse wave shape vector, the breath print duration and FVC scalars, the breath print shape vector, and the breath print FEV
  • Block 503 computes the statistics (i.e., the covariance matrix) of the enrollment trial, as well as the relative weights of the shape vector components.
  • the latter may incorporate either or both of two independent innovations: (1 ) dynamic weighting, in which portions of the shape vector that are more repeatable from trial to trial are accentuated relative to less repeatable portions; and (2) feature weighting, in which portions of the shape vector that are more specific or distinctive to the subject are accentuated relative to portions more typical of the population at large.
  • Block 504 transfers control to one of two blocks, depending on whether the "fixed authentication threshold" or the "Bayesian optimal decision” embodiment of the algorithm is selected.
  • the Bayesian embodiment makes use of potential impostor data (i.e., from other clients as potentials impostors for the subject), while the fixed threshold does not.
  • Block 505 finds the principle components of the covariance matrix, and uses the dominant eigenvector (i.e., that with the largest eigenvalue) to linearly combine the parameter vector into a scalar "composite parameter", which is optimal in the sense that the enrollment data has the greatest correlation, and thus the least spread, along the dominant eigenvector.
  • block 506 computes the authentication threshold corresponding to the preset desired true authentication probability (e.g., VB). Then, block 507 enrolls the client, and block 508 stops the procedure. On the other bifurcation, block 509 expands the ratio of the subject probability density to the impostor probability density to second order in the deviation from the subject exemplar. Block 510 includes the effects of the generally unequal penalties of false authentication and false challenge, and the a priori probability of attempted deception, which varies among clients. Since the Bayesian optimal decision embodiment uses the entire covariance matrix, it is not necessary or advantageous to define a composite parameter; and since impostor data is incorporated, the true and false authentication probabilities can be traded.
  • the Bayesian optimal decision embodiment uses the entire covariance matrix, it is not necessary or advantageous to define a composite parameter; and since impostor data is incorporated, the true and false authentication probabilities can be traded.
  • Block 600 is the start of the procedure.
  • Block 601 acquires a field trial, and block 602 subtracts the subject exemplar to yield the "deviation", a vector with the same structure as a trial, and optionally applies dynamic or feature weighting to the deviations of the shape vectors.
  • Block 603 transfers control to one of two blocks, depending on whether the "fixed authentication threshold" or the "Bayesian optimal decision" embodiment of the algorithm is selected.
  • Block 604 computes the optimal composite parameter for the deviation, and block 605 compares it to the authentication threshold. If greater, block 606 advises authorities to authenticate the subject's identity, and block 607 stops the procedure.
  • block 608 advises authorities to challenge the subject's identity.
  • block 609 computes the ratio of the subject probability density to the impostor probability density to second order in the deviation of the field trial from the subject exemplar, and block 610 compares it to zero. If positive, block 606 advises authorities to authenticate the subject's identity. If negative, block 608 advises authorities to challenge the subject's identity.
  • the algorithm uniformly weights each exemplar shape vector component, placing equal importance on the various features.
  • this restriction is unnecessary, and may not be optimal.
  • Some parts of some subjects' exemplars are more characteristic than other parts, so it's reasonable to suppose weighting unusual features more heavily could enhance the distinguishability of subjects.
  • Figure 7 shows the pulse wave exemplar shape vectors of the ten subjects of a recent study, along with the mean pulse wave shape.
  • some subjects are more atypical than others, and therefore are more easily identified in the field.
  • Some subjects have features (e.g., subject 26MJB near 0.27 seconds) that are quite distinctive. If these features are weighted more heavily than more typical regions (e.g., subject 26MJB near 0.14 seconds), the subject is more readily recognized when supplying a legitimate field trial, and less easily mimicked by an impostor.
  • An example feature-weighting strategy is to weight each field trial shape vector component proportionally to the square of the deviation of the corresponding subject exemplar component from the mean exemplar component, thus placing greater weight on more unusual features.
  • J e.g., five
  • the exemplar vector may be the average enrollment vector ⁇ ⁇ or the renormalized unitary vector There are two independent
  • One technique for implementing dynamic weighting is to parse the shape vector into segments that are large enough to avoid excessive statistical fluctuations, yet small enough to provide resolution of the varying character across the vector (e.g., a 100-component breath print vector into 20 five- component segments), and assign a different weight to each segment based on its fluctuations.
  • An example dynamic-weighting strategy is to weight each field trial shape vector segment proportionally to the reciprocal of the segment's variance (i.e., the sum over enrollment trials and segment components of the squared deviation of the enrollment trial component from the exemplar component), thus placing greater weight on more repeatable segments.
  • One technique for implementing feature weighting is to raise each shape vector component probability to a different power greater or less than unity, according to how much the exemplar shape deviates from the average subject at that point.
  • the feature weighting function can be expressed as a vector of the same dimensionality as the shape itself, consisting of components whose average is unity (equal weighting is encompassed as the special case where all components are 1 ). This approach keeps the rest of the algorithm unaffected by whether feature weighting is selected or disabled. In general, the feature weighting vector is different for each client.

Abstract

A biometric identity confirmation system is based on both pulse wave shape data and spirometric data for the subject. During an initial enrollment mode, pulse wave shape and spirometric data (22) for a known subject (20) are used to generate subject characterization data (23) for the known subject (20) by computing an exemplar and selectively weighting portions of the exemplar based, for example, on repeatability or distinguishing characteristic features over the population of known subjects. During a subsequent identity authentication mode, pulse wave shape and spirometric data (25) for a test subject are analyzed using the subject characterization data (26) to confirm whether the identity of the test subject matches the known subject (20).

Description

SYSTEM FOR BIOMETRIC IDENTITY CONFIRMATION
BACKGROUND OF THE INVENTION
Field of the Invention. The present invention relates generally to the field of biometric identity confirmation. More specifically, the present invention discloses a system for biometric identity confirmation based on analysis of both spirometric data and pulse wave data for a test subject.
Background of the Invention. Biometric identification is the process of recognizing or rejecting an unknown person as a particular member of a previously characterized set, based on biological measurements. The ideal biometric characterization is specific to the individual, difficult to counterfeit, robust to metabolic fluctuations, insensitive to external conditions, easily measured, and quickly processed.
Fingerprint, retinal, iris, and facial scans are well-known biometric identification techniques relying on image processing. Images are two- dimensional, requiring sophisticated and computationally intensive algorithms, the analysis of which is often complicated by random orientation and variable scaling. Voice recognition is an example of biometric identification amenable to time series analysis, an inherently simpler one-dimensional process.
The simplest biometric identifiers can be expressed as a single parameter, such as height or weight. Single parameter identifiers have been the only quantitative means of identification throughout most of history. The price of simplicity is the loss of specificity, and in the case of weight, the lack of constancy over time. Nevertheless, single-parameter biometrics remain effective identifying factors, as is obvious from their continued use. Identity tracking/confirmation is the process of following the whereabouts of a known subject moving unpredictably among similar individuals, perhaps with deceptive intent. Tracking/confirmation is somewhat simpler than identification, because it merely requires distinguishing the subject from all others rather than distinguishing every individual from every other, and because continuous rather than episodic data are available. Biometric identity tracking/confirmation is the continuous verification that a body-mounted sensor has remained on the subject, and has not been surreptitiously transferred to an impostor. For the purposes of this application, the term "biometric identification" should be broadly construed to encompass both biometric identification in its narrower sense, as described above, and identity tracking/confirmation.
SUMMARY OF THE INVENTION
This invention provides a system for biometric identity confirmation based on both pulse wave shape data and spirometric data for the test subject. During an initial enrollment mode, pulse wave shape and spirometric data for a known subject are used to generate subject characterization data for the known subject by computing an exemplar and selectively weighting portions of the exemplar based, for example, on repeatability or distinguishing characteristic features among known subjects. During a subsequent identity authentication mode, pulse wave shape and spirometric data for a test subject are analyzed using the subject characterization data to confirm whether the identity of the test subject matches the known subject.
These and other advantages, features, and objects of the present invention will be more readily understood in view of the following detailed description and the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention can be more readily understood in conjunction with the accompanying drawings, in which:
FIG. 1 is a flowchart of the enrollment mode of the present invention.
FIG. 2 is a flowchart of the identity authentication mode of the present invention.
FIG. 3 is a flowchart of the "acquire trial" procedure for pulse wave data. FIG. 4 is a flowchart of the "acquire trial" procedure for spirometric data. FIG. 5 is a flowchart of the procedure used by both the pulse wave and breath print algorithms to enroll a new client.
FIG. 6 is a flowchart of the identity authentication mode of the present invention.
FIG. 7 is a graph showing pulse wave exemplar shape vectors of the ten subjects of a recent study, along with the mean pulse wave shape.
DETAILED DESCRIPTION OF THE INVENTION
The present invention provides a biometric system for characterizing individuals by the non-invasive sensing of arterial pulse waves and spirometric data for the purposes of identification and identity tracking/confirmation. The major components include a computer processor, data storage, a pulse sensor adjacent to the subject's tissue that generates time-series data based on the subject's pulse waves, and a spirometric sensor that measures predetermined spirometric properties of the exhaled breath sample, such as flow or pressure. This spirometric data is typically generated as time-series data over the course of the sample.
As an overview, the processor initially receives and analyzes the pulse wave data from the pulse sensor and the spirometric data from the spirometric sensor for a known subject to generate subject characterization data identifying the known subject. Thereafter, in the identity authentication mode, the processor simultaneously receives data from the pulse sensor and spirometric sensor for a test subject (who may or may not be the known subject). The processor analyzes this data in conjunction with the stored subject characterization data to determine whether the test subject is the same as the known subject. For the purposes of this application, it should be understood that the phrase "test subject" refers to the person whose identity is being tested or confirmed during the identity authentication mode of the present system.
Thus, the present system operates in one of two mutually exclusive modes - an enrollment mode and an identity authentication mode. The enrollment mode acquires subject data under the supervision of a trained technician, computes subject characteristics, calculates the probability of an impostor producing similar characteristics, and stores these findings in a client database for later use during the identity authentication mode.
Figure 1 is a general flowchart of the enrollment mode employed to initially build subject characterization data for a known subject. The operator first verifies the identity of the subject (step 20), and mounts and tests the pulse sensor on the subject, and provides the subject with a spirometric sensor (step 21). The processor simultaneously acquires pulse wave data from the pulse sensor and spirometric data from the spirometric sensor for a brief period of time (step 22). The subject may be asked to undertake a range of activities to ensure the enrollment data are representative of that which may be encountered over the subject's normal day-to-day activities. The processor analyzes the enrollment data and generates subject characterization data for identifying the known subject (step 23). This subject characterization data is stored for later use during the identity authentication mode of the present system (step 24), as will be described below.
The identity authentication mode is used to authenticate the identity of a test subject, who may or may not be the known subject from the enrollment mode. In this mode, the system acquires subject data unsupervised in the field, compares it to subject and impostor characteristics, and decides whether to authenticate or challenge identification. Figure 2 is a flowchart of one possible embodiment of the identity authentication mode. For each identity authentication test, the processor acquires pulse wave data from the pulse sensor and spirometric data from the spirometric sensor for the test subject (step 25). The processor analyzes this test data using the subject characterization data (step 26). Based on this analysis, in step 27, the processor determines whether there is a sufficient degree of similarity between the pulse wave and spirometric characteristics of the known subject (from the subject characterization data) and the test subject to conclude that these subjects are the same person (step 28). If so, the processor may update the subject characterization data 18 to include the current test data (step 28A) and then loop back to step 25. Otherwise, if the processor determines that the current test subject is not the same as the known subject, an alarm can be activated to signal that deception has been detected (step 29).
As will be discussed below, the two modes in the preferred embodiment of the present invention share a common "acquire trial" procedure that acquires and pre-processes a short, contiguous time-series data of the digitized measurement, called a "trial".
Figure 3 shows how the pulse wave algorithm acquires a trial. The trial pulse wave typically consists of a small number (e.g. 10) of pulse cycles, which are similar but not identical to each other. Performance is improved by synchronizing and summing pulse cycles to wash out noise. The goal of the procedure is to convert the multi-cycle waveform into a single representative cycle. Block 300 is the start of the procedure. Block 301 reads and discards pulse samples for a fixed duration (e.g. 2 seconds) while the waveform settles. After settling, block 302 reads and records samples for the remainder of the trial (e.g. 8 seconds). The concurrently running block 303 tests samples for "railing" (i.e. exceeding the limits of the digitizer, an indicator of trial corruption). Upon detecting a railed sample, Block 303 calls block 304, which rejects the trial and stops the procedure. If no recorded samples are railed, control proceeds to block 305, which calculates the first and second derivatives of the pulse wave with respect to time, to eliminate baseline drift and generate triggers associated with the systolic excursion. Representing the subject's pulse wave with its first derivative also obscures the bio-informational nature of the signal, thus enhancing privacy. The derivatives may or may not be smoothed to reduce high frequency noise. Block 306 chooses the most negative excursion of the second derivative as the "trigger candidate" (TC). Next, block 307 zeroes the TC and some small number (e.g. 4) of immediate predecessor and successor data, to avoid selecting the same peak again. Then, block 308 compares the present TC to the first TC. If the present TC is greater than some threshold fraction (e.g. ½) of the first TC, the procedure loops through blocks 306-308, acquiring another TC. If not, TC acquisition is deemed complete, and control proceeds to block 309. If there are many (e.g., 8) more TCs than can be accounted for according to the settled sampling time and maximum pulse rate (e.g., 16 for 8 seconds at 120 beats per minute), the sample is judged too noisy, and block 309 calls block 304, which rejects the trial and stops the procedure. If not, the trial is accepted, but some of the TCs may be noise spikes asynchronous to the underlying pulse cycle.
The section comprising blocks 310-316 is called the "trigger sieve" because it removes asynchronous false triggers, thus enhancing performance (recent data showed useable trial yield increasing from 1/5 to 4/5). Block 310 calculates a square matrix of the delays Δ between every pair of TCs. Next, the procedure loops through all integer pulse periods, in units of the sampling period, from the fastest to the slowest measurable pulse (e.g., 50-150 for 100 Hz sampling and 120-40 beats per minute), to find the best fit to the preponderance of TCs. Block 31 1 increments the pulse period P. Block 312 computes the matrix of squared remainders [Δ mod P]2, where the "mod" operation yields the integer remainder with the smallest absolute value (e.g., 15 mod 8 equals -1 , not 7). Block 313 sums the squared remainders for each TC relative to the other TCs, and normalizes such that a "score" near (much smaller than) unity indicates P is a poor (good) fit to the true pulse period. Block 314 averages the TC scores to evaluate P's goodness of fit. Block 315 selects the P with the lowest score. Next, block 316 rejects TCs with optimal-P scores greater than a preset threshold (e.g., 0.6) as false triggers not synchronized with the prevailing pulsatile rhythm, leaving the remaining TCs to serve as true triggers. Then, block 317 uses the true triggers to synchronize and sum the cycles. Finally, block 318 returns the summed cycle to the calling program.
Figure 4 shows how the breath print algorithm acquires a trial. The trial consists of a single forced exhalation, preceded by a quiescent period used to establish a signal baseline, and succeeded by a period used to ensure further exhalation is not forthcoming to spoil the data. The goals of the procedure are to delineate these three periods, subtract the baseline from the exhalation, measure the exhalation duration and forced vital capacity (FVC), normalize the exhalation shape to duration, and compute the auxiliary parameters forced expiratory volume in the initial second (FEV-i) and peak expiratory flow (PEF). Block 400 is the start of the procedure. Block 401 initiates a data acquisition and processing loop that repeats for a fixed number of trial samples {e.g. 1500 for a 15 second trial digitized at 100 Hz). Blocks 402 and 403 repeatedly acquire samples until the flow signal exceeds a threshold defining the onset of exhalation. Block 404 determines if there are sufficient samples to establish a baseline (e.g. 50): If not, control passes to block 405, which rejects the trial and stops the procedure. If so, the average of the baseline samples is recorded and control passes to block 406. Blocks 406 and 407 repeatedly acquire samples until the flow signal falls below the previously defined threshold, at which time exhalation is deemed to have ceased. Block 408 determines if there are sufficient exhalation samples (e.g. 250): If not, control passes to block 405, which rejects the trial and stops the procedure. If so, the net (baseline-subtracted) exhalation samples are recorded and control passes to block 409. Blocks 409 and 410 acquire post-breath samples until the trial times out, or a sample exceeds the previously defined threshold, indicating a resurgence of exhalation. In the latter case, the trial is deemed corrupted, and control passes to block 405, which rejects the trial and stops the procedure. In the former case, block 41 1 passes control to block 412, which determines if there are sufficient post-breath samples (e.g. 1 ). If not, control passes to block 405, which rejects the trial and stops the procedure. If so, control passes to block 413, which computes the exhalation duration and FVC. Block 414 uses these to normalize the exhalation shape in time and amplitude, for comparison to other exhalations of different durations and FVCs. Block 4 5 computes the FEVi and PEF. Block 416 returns duration, FVC, shape, FEVi and PEF to the calling routine, and ends the procedure.
Figure 5 shows two embodiments of the procedure used by both the pulse wave and breath print algorithms to enroll a new client. This procedure can be used both to establish the client's characteristics as a subject whose identity will be putative in the field, and as a possible impostor for any other client. Block 500 is the start of the procedure. Block 501 acquires a number of trials (e.g., five) by repeatedly calling the appropriate Acquire Trial procedure. Block 502 computes the "exemplar" (i.e., the arithmetic mean over the enrollment trials of any or all of the pulse wave shape vector, the breath print duration and FVC scalars, the breath print shape vector, and the breath print FEVi and PEF scalars, arranged into a vector) using the enrollment trials. Block 503 computes the statistics (i.e., the covariance matrix) of the enrollment trial, as well as the relative weights of the shape vector components. The latter may incorporate either or both of two independent innovations: (1 ) dynamic weighting, in which portions of the shape vector that are more repeatable from trial to trial are accentuated relative to less repeatable portions; and (2) feature weighting, in which portions of the shape vector that are more specific or distinctive to the subject are accentuated relative to portions more typical of the population at large.
Block 504 transfers control to one of two blocks, depending on whether the "fixed authentication threshold" or the "Bayesian optimal decision" embodiment of the algorithm is selected. The chief distinction is that the Bayesian embodiment makes use of potential impostor data (i.e., from other clients as potentials impostors for the subject), while the fixed threshold does not. Block 505 finds the principle components of the covariance matrix, and uses the dominant eigenvector (i.e., that with the largest eigenvalue) to linearly combine the parameter vector into a scalar "composite parameter", which is optimal in the sense that the enrollment data has the greatest correlation, and thus the least spread, along the dominant eigenvector. In general, this results in unequal weighting of the parameters in the decision to authenticate or challenge identity. Next, block 506 computes the authentication threshold corresponding to the preset desired true authentication probability (e.g., VB). Then, block 507 enrolls the client, and block 508 stops the procedure. On the other bifurcation, block 509 expands the ratio of the subject probability density to the impostor probability density to second order in the deviation from the subject exemplar. Block 510 includes the effects of the generally unequal penalties of false authentication and false challenge, and the a priori probability of attempted deception, which varies among clients. Since the Bayesian optimal decision embodiment uses the entire covariance matrix, it is not necessary or advantageous to define a composite parameter; and since impostor data is incorporated, the true and false authentication probabilities can be traded.
Figure 6 shows how either algorithm embodiment decides whether to authenticate or challenge the subject's identity based on a field trial. Block 600 is the start of the procedure. Block 601 acquires a field trial, and block 602 subtracts the subject exemplar to yield the "deviation", a vector with the same structure as a trial, and optionally applies dynamic or feature weighting to the deviations of the shape vectors. Block 603 transfers control to one of two blocks, depending on whether the "fixed authentication threshold" or the "Bayesian optimal decision" embodiment of the algorithm is selected. Block 604 computes the optimal composite parameter for the deviation, and block 605 compares it to the authentication threshold. If greater, block 606 advises authorities to authenticate the subject's identity, and block 607 stops the procedure. If lesser, block 608 advises authorities to challenge the subject's identity. On the other bifurcation, block 609 computes the ratio of the subject probability density to the impostor probability density to second order in the deviation of the field trial from the subject exemplar, and block 610 compares it to zero. If positive, block 606 advises authorities to authenticate the subject's identity. If negative, block 608 advises authorities to challenge the subject's identity.
As so far described, the algorithm uniformly weights each exemplar shape vector component, placing equal importance on the various features. However, this restriction is unnecessary, and may not be optimal. Some parts of some subjects' exemplars are more characteristic than other parts, so it's reasonable to suppose weighting unusual features more heavily could enhance the distinguishability of subjects.
Figure 7 shows the pulse wave exemplar shape vectors of the ten subjects of a recent study, along with the mean pulse wave shape. Generally, some subjects are more atypical than others, and therefore are more easily identified in the field. Some subjects have features (e.g., subject 26MJB near 0.27 seconds) that are quite distinctive. If these features are weighted more heavily than more typical regions (e.g., subject 26MJB near 0.14 seconds), the subject is more readily recognized when supplying a legitimate field trial, and less easily mimicked by an impostor. An example feature-weighting strategy is to weight each field trial shape vector component proportionally to the square of the deviation of the corresponding subject exemplar component from the mean exemplar component, thus placing greater weight on more unusual features.
The present invention can use several biometric scalars and vectors to authenticate or challenge identity. These are assumed to be random variables obeying Gaussian statistics. For scalar quantities (e.g., breath duration and volume), the procedure is straightforward: Collect some number J (e.g., five) of trustworthy samples
Figure imgf000014_0001
from the subject during the controlled enrollment period, calculate the mean μ ≡
Figure imgf000014_0002
and the variance σ2
Figure imgf000014_0003
= exp[-(F-M)2/(2o2)]/[V(2TT)a].
For K-dimensional shape vectors, the simplest generalization is t> = exP[~∑k=i,K(Fk-Mk)2/(2a2)]/[V(2TT)a], where pk is the kth component of the exemplar vector μ, and the global variance is σ2 = [∑j=i,j∑k=i ,K(Ej,k_Mk)2]/(JK-1 ). The exemplar vector may be the average enrollment vector μ ≡
Figure imgf000014_0004
or the renormalized unitary vector There are two independent
Figure imgf000014_0005
problems with this approach:
First, the expectation value of the exponential's argument scales with the vector dimensionality K. For large vectors, t> rapidly vanishes as E deviates from μ. In other words, each component of the vector has the same weight in the authentication decision as each scalar, so the shape vector has K times the weight of any scalar. A possible solution is to redefine the global variance as σ2≡ K[∑j=i,j∑k=i, (Ej,k-pk)2]/(JK-1 ), which reduces to the scalar form when K→1 .
Second, all components are equally weighted, so that noisier portions of the shape vector dominate. The failure of static weighting suggests quieter portions of the vector should be accentuated (i.e., dynamic weighting). Extreme dynamic weighting is to define a local variance Ok2 ≡ [∑j=i ,j(Ej,k_Mk) ]/(J-1 ) for each component of each subject's shape vector. The drawback is the practical limitation to an enrollment comprising only a few trials, causing inordinate statistical fluctuations.
Both problems can be solved by partitioning the vector into N K/N- dimensional segments that are large enough to tame statistical fluctuations, yet small enough to provide resolution of the varying character across the vector. The segments need not be equal lengths, or even contiguous, but there's no clear advantage to these complications, so for simplicity we specify uniform contiguous segments. Each segment has its own variance ση 2 ≡ [∑j=i ,j∑k=(n-i)K/N+i ,nK/N (Ejik-pk)2]/(JK/N-1 ), but each component retains its own mean. Otherwise, it must be admitted that the original K-resolution was unnecessary. We then define dynamic weights Wn based on the variances (e.g., Wn = 1/ση 2), and also possibly the rarity of shape features (i.e., feature weighting).
To correct the over-representation of shape relative to scalar quantities, we define a normalized variance σ2 ≡ [∑j=1 iJAj2]/(J-1 ), where Aj 2 ≡ ∑κ=ι,κ W[(k-i) N](Ejik-pk)2. As a check, allow N = K (i.e., local variance) and Wn = 1/ση 2 (i.e., uniform variance), and the normalized variance σ2→Κ as it should.
The probability density of a field trial F must be modified to t» = exp{-[∑k=1 ,KW[(K-i)/N](Fk-pk)2]/(2a2)}/[V(2^a]. Pretending for the moment that an enrollment trial Ej is actually a field trial F, this reduces to P = exp{-Aj2/(2a2)}/[V(2TT)a], whose exponential argument is of order 1 rather than order K, as desired. The field trial must be mathematically processed exactly as were the enrollment trials. Then, regardless of the specific choice of dynamic weights Wn, all will come out right in the end.
One technique for implementing dynamic weighting is to parse the shape vector into segments that are large enough to avoid excessive statistical fluctuations, yet small enough to provide resolution of the varying character across the vector (e.g., a 100-component breath print vector into 20 five- component segments), and assign a different weight to each segment based on its fluctuations. An example dynamic-weighting strategy is to weight each field trial shape vector segment proportionally to the reciprocal of the segment's variance (i.e., the sum over enrollment trials and segment components of the squared deviation of the enrollment trial component from the exemplar component), thus placing greater weight on more repeatable segments.
One technique for implementing feature weighting is to raise each shape vector component probability to a different power greater or less than unity, according to how much the exemplar shape deviates from the average subject at that point. The feature weighting function can be expressed as a vector of the same dimensionality as the shape itself, consisting of components whose average is unity (equal weighting is encompassed as the special case where all components are 1 ). This approach keeps the rest of the algorithm unaffected by whether feature weighting is selected or disabled. In general, the feature weighting vector is different for each client.
The above disclosure sets forth a number of embodiments of the present invention described in detail with respect to the accompanying drawings. Those skilled in this art will appreciate that various changes, modifications, other structural arrangements, and other embodiments could be practiced under the teachings of the present invention without departing from the scope of this invention as set forth in the following claims.

Claims

WE CLAIM:
1. A method for biometric identity confirmation of a subject having a pulse and a respiratory cycle, said method comprising:
during an initial training mode, simultaneously acquiring pulse wave shape data and spirometric data from a known subject;
generating and storing subject characterization data for the known subject derived at least in part from both the pulse wave shape data and spirometric data for the known subject by:
(a) computing an exemplar from the pulse wave shape data and spirometric data for the known subject during the initial training mode; and
(b) selectively weighting portions of the exemplar; and
during a subsequent identity authentication mode, simultaneously acquiring pulse wave shape data and spirometric data from a test subject, and analyzing the pulse wave shape data and spirometric data with the subject characterization data for the known subject to confirm whether the identity of the test subject matches the known subject.
2. The method of claim 1 wherein portions of the exemplar are selectively weighted based on their repeatability among known subjects.
3. The method of claim 1 wherein portions of the exemplar are selectively weighted based on distinguishing characteristic features among known subjects.
4. The method of claim 1 wherein the exemplar is computed at least in part from the pulse wave shape data by synchronous averaging of multiple pulse cycles.
5. The method of claim 1 wherein the subject characterization data is derived at least in part from a first derivative of the pulse wave shape data with respect to time.
6. The method of claim 1 wherein the step of generating subject characterization data further comprises use of a second derivative of the pulse wave shape data with respect to time to identify pulse cycle start points for synchronous averaging of multiple pulse cycles to create an exemplar for the known subject.
7. The method of claim 6 wherein the second derivative of the pulse wave shape data is used to identity trigger candidates for the pulse cycle start point; and further comprising an analysis of a time delay between trigger candidates to thereby discard false trigger candidates and identify true trigger candidates for synchronous averaging of multiple pulse cycles.
8. The method of claim 1 wherein the step of generating subject characterization data further comprises:
computing an exemplar in the form of a parameter vector from the pulse wave shape data and spirometric data for the known subject;
computing a covariance matrix from the pulse wave shape data and spirometric data for the known subject;
computing an optimal composite parameter from the covariance matrix and parameter vector that is characteristic of the known subject; and
computing an authentication threshold corresponding to a desired true authentication probability for the known subject.
9. The method of claim 8 wherein the step of analyzing the pulse wave shape data and spirometric data with the subject characterization data for the known subject to confirm whether the identity of the test subject matches the known subject further comprises:
computing a deviation of the pulse wave shape data and spirometric data for the test subject from the exemplar for the known subject;
computing an optimal composite parameter from the deviation; and confirming the identity of the test subject matches the known subject if optimal composite parameter is greater than the authentication threshold for the known subject.
10. The method of claim 1 wherein the step of generating subject characterization data further comprises:
computing an exemplar in the form of a parameter vector from the pulse wave shape data and spirometric data for the known subject;
computing a covariance matrix from the pulse wave shape data and spirometric data for the known subject; and
computing a probability distribution ratio of a weighted subject/impostor probability density by a Bayesian optimal decision analysis of the parameter vector, covariance matrix, and data from other subjects as potential impostors for the known subject.
11. The method of claim 10 wherein the step of analyzing the pulse wave shape data and spirometric data with the subject characterization data for the known subject to confirm whether the identity of the test subject matches the known subject further comprises:
computing a deviation of the pulse wave shape data and spirometric data for the test subject from the exemplar for the known subject;
computing a weighted subject/impostor probability density ratio for the deviation; and
confirming the identity of the test subject matches the known subject if the weighted subject/impostor probability density ratio is greater than zero.
12. A method of claim 1 wherein the step of generating subject characterization data for the known subject further comprises measurement of characteristic changes in the pulse wave shape data as a function of the phase of the respiratory cycle of the known subject.
PCT/US2017/018961 2016-02-24 2017-02-22 System for biometric identity confirmation WO2017147194A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP17757150.2A EP3420419A4 (en) 2016-02-24 2017-02-22 System for biometric identity confirmation

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/051,935 US9575470B2 (en) 2012-01-20 2016-02-24 System for biometric identity confirmation
US15/051,935 2016-02-24

Publications (1)

Publication Number Publication Date
WO2017147194A1 true WO2017147194A1 (en) 2017-08-31

Family

ID=59685790

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2017/018961 WO2017147194A1 (en) 2016-02-24 2017-02-22 System for biometric identity confirmation

Country Status (2)

Country Link
EP (1) EP3420419A4 (en)
WO (1) WO2017147194A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6985070B1 (en) * 2002-12-09 2006-01-10 Sprint Communications Company L.P. Biometric authentication of hospitality-site customers
US6993378B2 (en) * 2001-06-25 2006-01-31 Science Applications International Corporation Identification by analysis of physiometric variation
US7441123B2 (en) * 2001-03-23 2008-10-21 Ensign Holdings Method and apparatus for characterizing and estimating the parameters of histological and physiological biometric markers for authentication
US7536557B2 (en) * 2001-03-22 2009-05-19 Ensign Holdings Method for biometric authentication through layering biometric traits
US7603887B2 (en) * 2006-05-20 2009-10-20 Dräger Medical AG & Co. KG Breath alcohol-measuring device, process and system
US7796013B2 (en) * 2000-01-10 2010-09-14 Ensign Holdings Device using histological and physiological biometric marker for authentication and activation

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9223298B2 (en) * 2011-04-04 2015-12-29 Integrated Monitoring Systems, Llc Biometric identification system using pulse waveform
US9274509B2 (en) * 2012-01-20 2016-03-01 Integrated Monitoring Systems, Llc System for biometric identity confirmation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7796013B2 (en) * 2000-01-10 2010-09-14 Ensign Holdings Device using histological and physiological biometric marker for authentication and activation
US7536557B2 (en) * 2001-03-22 2009-05-19 Ensign Holdings Method for biometric authentication through layering biometric traits
US7441123B2 (en) * 2001-03-23 2008-10-21 Ensign Holdings Method and apparatus for characterizing and estimating the parameters of histological and physiological biometric markers for authentication
US6993378B2 (en) * 2001-06-25 2006-01-31 Science Applications International Corporation Identification by analysis of physiometric variation
US6985070B1 (en) * 2002-12-09 2006-01-10 Sprint Communications Company L.P. Biometric authentication of hospitality-site customers
US7603887B2 (en) * 2006-05-20 2009-10-20 Dräger Medical AG & Co. KG Breath alcohol-measuring device, process and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3420419A4 *

Also Published As

Publication number Publication date
EP3420419A1 (en) 2019-01-02
EP3420419A4 (en) 2019-09-25

Similar Documents

Publication Publication Date Title
KR100944443B1 (en) Method and apparatus for electro-biometric identity recognition
KR102367481B1 (en) Method and device to authenticate living body
US8150108B2 (en) Systems and methods of identification based on biometric parameters
Sufi et al. Polynomial distance measurement for ECG based biometric authentication
AU2016219578B2 (en) System for Biometric Identity Confirmation
JP2008518708A (en) Method and apparatus for electronic biometric identification recognition
WO2018152711A1 (en) Electrocardiographic authentication-based door control system and authentication method therefor
US10595753B1 (en) High frequency QRS in biometric identification
US9274509B2 (en) System for biometric identity confirmation
Hadiyoso et al. One-lead electrocardiogram for biometric authentication using time series analysis and Support Vector Machine
JP2013150806A (en) Method and apparatus for electro-biometric identity recognition
Vural et al. Verification of individuals from accelerometer measures of cardiac chest movements
US9223298B2 (en) Biometric identification system using pulse waveform
US9575470B2 (en) System for biometric identity confirmation
WO2017147194A1 (en) System for biometric identity confirmation
Wahid et al. A Gaussian mixture models approach to human heart signal verification using different feature extraction algorithms
AU2014278558B2 (en) Biometric identification system using pulse waveform
Yeen et al. Development of heartbeat based biometric system using wavelet transform
Bui et al. A biometric modality based on the seismocardiogram (SCG)
Přibil et al. Experiment with GMM-Based Subject Identification from PPG Signals Acquired by Wearable Sensors
Ko et al. Biosignal–based multimodal biometric system
WO2018007835A1 (en) Ecg authentication method and apparatus
Nasir et al. Comparison of pulse active ratio similarity measurement

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2017757150

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017757150

Country of ref document: EP

Effective date: 20180924

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17757150

Country of ref document: EP

Kind code of ref document: A1