Image analysis – Applications – Personnel identification
Reexamination Certificate
2007-04-27
2010-11-23
Le, Brian Q (Department: 2624)
Image analysis
Applications
Personnel identification
C382S115000, C382S124000, C382S218000, C713S186000
Reexamination Certificate
active
07840034
ABSTRACT:
Upon registration, a client extracts plural feature points and information (identification information) by which each of the feature points can be identified, from a user's fingerprint, and randomly generates a transformation parameter for each feature point to transform the coordinates and direction. The transformed identification information (template) is transmitted to an authentication server and stored in a memory. The identification information and transformation parameters of the feature points are stored in a memory medium of the user. Upon authentication of the user, the client extracts feature points from the user's fingerprint, and identifies the feature points by the identification information in the memory medium. The client transforms the identified feature points by reading the corresponding transformation parameters from the memory medium, and transmits the transformed information to the authentication server. The server verifies the received identification information against the template registered in advance, to authenticate the user.
REFERENCES:
patent: 4310827 (1982-01-01), Asai
patent: 6751734 (2004-06-01), Uchida
patent: 6845453 (2005-01-01), Scheidt et al.
patent: 6983061 (2006-01-01), Ikegami et al.
patent: 2003/0169910 (2003-09-01), Reisman et al.
patent: 2005/0210269 (2005-09-01), Tiberg
Tulyakov et al., “Symmetric hash functions for fingerprint minutiae”, 2005, Workshop on pattern recognition for crime prevention, Security and surveillance, Bath, UI.
Ohtsuka et al., “A new detection approach for the fingerprint core location using extended relation graph”, 2005, IEICE Trans. ED, vol. E88D, No. 10, pp. 2308-2312.
Oh et al., “Study on the center of rotation method based on minimum spanning tree matching algorithm for fingerprint recognition”, 2004, Optical engineering 43(4), pp. 822-829.
N. K. Ratha, et al.; Enhancing security and privacy in biometrics-based authentication systems; IBM System Journal; 2001; pp. 614-634; vol. 40, No. 3.
Anai Jain, et al.; An Identity Authentication System Using Fingerprints; Proc. Of IEEE, 1997; pp. 1-66; vol. 85, No. 9.
Mimura Masahiro
Takahashi Kenta
Antonelli, Terry Stout & Kraus, LLP.
Hitachi , Ltd.
Le Brian Q
Park Soo Jin
LandOfFree
Method, system and program for authenticating a user by... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, system and program for authenticating a user by..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and program for authenticating a user by... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4177658