Method, system and program for authenticating a user by...

Image analysis – Applications – Personnel identification

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C382S115000, C382S124000, C382S218000, C713S186000

Reexamination Certificate

active

07840034

ABSTRACT:
Upon registration, a client extracts plural feature points and information (identification information) by which each of the feature points can be identified, from a user's fingerprint, and randomly generates a transformation parameter for each feature point to transform the coordinates and direction. The transformed identification information (template) is transmitted to an authentication server and stored in a memory. The identification information and transformation parameters of the feature points are stored in a memory medium of the user. Upon authentication of the user, the client extracts feature points from the user's fingerprint, and identifies the feature points by the identification information in the memory medium. The client transforms the identified feature points by reading the corresponding transformation parameters from the memory medium, and transmits the transformed information to the authentication server. The server verifies the received identification information against the template registered in advance, to authenticate the user.

REFERENCES:
patent: 4310827 (1982-01-01), Asai
patent: 6751734 (2004-06-01), Uchida
patent: 6845453 (2005-01-01), Scheidt et al.
patent: 6983061 (2006-01-01), Ikegami et al.
patent: 2003/0169910 (2003-09-01), Reisman et al.
patent: 2005/0210269 (2005-09-01), Tiberg
Tulyakov et al., “Symmetric hash functions for fingerprint minutiae”, 2005, Workshop on pattern recognition for crime prevention, Security and surveillance, Bath, UI.
Ohtsuka et al., “A new detection approach for the fingerprint core location using extended relation graph”, 2005, IEICE Trans. ED, vol. E88D, No. 10, pp. 2308-2312.
Oh et al., “Study on the center of rotation method based on minimum spanning tree matching algorithm for fingerprint recognition”, 2004, Optical engineering 43(4), pp. 822-829.
N. K. Ratha, et al.; Enhancing security and privacy in biometrics-based authentication systems; IBM System Journal; 2001; pp. 614-634; vol. 40, No. 3.
Anai Jain, et al.; An Identity Authentication System Using Fingerprints; Proc. Of IEEE, 1997; pp. 1-66; vol. 85, No. 9.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system and program for authenticating a user by... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system and program for authenticating a user by..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and program for authenticating a user by... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4177658

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.