Methods and systems for multiple factor authentication using...

Image analysis – Applications – Personnel identification

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C382S209000, C382S280000, C382S302000

Reexamination Certificate

active

07986816

ABSTRACT:
Methods and systems for multiple factor authentication combining eye tracking hardware with iris scanning. The resulting multiple factor authentication is a highly secure and highly accurate authentication procedure. Iris scanning provides excellent identification and eye tracking provides the information that the iris is live and provides identification capabilities based on the eye movement itself while enabling gaze-based password entry.

REFERENCES:
patent: 5291560 (1994-03-01), Daugman
patent: 5559961 (1996-09-01), Blonder
patent: 5614967 (1997-03-01), Ishikawa et al.
patent: 5644642 (1997-07-01), Kirschbaum
patent: 5861940 (1999-01-01), Robinson et al.
patent: 6120461 (2000-09-01), Smyth
patent: 6134339 (2000-10-01), Luo
patent: 6714665 (2004-03-01), Hanna et al.
patent: 6758563 (2004-07-01), Levola
patent: 7161468 (2007-01-01), Hwang et al.
patent: 7657062 (2010-02-01), Pilu
patent: 2002/0152034 (2002-10-01), Kondo et al.
patent: 2003/0152252 (2003-08-01), Kondo et al.
patent: 2005/0270386 (2005-12-01), Saitoh et al.
patent: 2006/0098097 (2006-05-01), Wach et al.
patent: 2006/0111125 (2006-05-01), Karaoguz
patent: 2006/0210122 (2006-09-01), Cleveland et al.
patent: 2007/0061590 (2007-03-01), Boye et al.
patent: 2007/0241861 (2007-10-01), Venkatanna et al.
Bednarik, T. Kinnunen, A. Mihaila, and P. Franti, “Eye-movements as a biometric,” In Proceedings of the 14th Scandinavian Conference on Image Analysis, SCIA 2005, Joensuu, Finland, Jun. 19-22, 2005. Lecture Notes in Computer Science, 3540:780-789, Springer (2005).
Chen, C. A. Bouman, and J. C. Dalton, “Hierarchical browsing and search of large image databases,” IEEE Transactions on Image Processing, 9(3) (Mar. 2000).
Chen, C. H., “Fusion of face and iris features for multimodal biometrics,” Advances in Biometrics, Springer Berlin / Heidelberg, ISSN 0302-9743 (Print) 1611-3349 (Online), 3832:571-580 (2005).
Daugman, “High confidence visual recognition of persons by a test of statistical independence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11):1148-1161 (1993).
Daugman, “How Iris Recognition Works,” Retrieved on Sep. 12, 2006 at http://www.cl.cam.ac.ulc/—jgd1000/irisrecog.pdf.
Davis, F. Monrose, and M. Reiter, “On user choice in graphical password schemes,”Proceedings of the 13thUSENIX Security Symposium San Diego, CA, USA (Aug. 9-13, 2004).
Entry on retinal scanning on the web site of Court Technology Laboratory Retrieved on Sep. 12, 2006 at http://ctl.ncsc.dni.usibiomet%20web/BMRetinal.html.
Hembrooke, M. Feusner, and G. Gay, “Average scan patterns and what they can tell us, late breaking results paper,” Proceedings of the Eye Tracking and Research Applications, p. 41 (ETRA'06) (Mar. 2006).
Hoanca and K. Mock, “Screen oriented technique for reducing the incidence of shoulder surfing,” Proceedings of Security and Management (SAM'05), Las Vegas, NV (Jun. 20-24, 2005).
Hoanca and K. Mock, “Secure graphical password entry system for access from high-traffic public areas,” Late Breaking Results Paper, Proceedings of the Eye Tracking and Research Applications (ETRA'06) (Mar. 2006).
Hopper and M. Blum, “A secure human-computer authentication scheme,” CMU Tech Report CMU-CS-00-139. Retrieved on Feb. 14, 2005 at http://www.andrew.cmu.edu/user/abender/humanaut/links.html.
Hyrskykari, “Detection of comprehension difficulties in reading on the basis of word frequencies and eye movement data,” Proc. 12th European Conference on Eye Movements (ECEM 12), Dundee, Scotland, PB 13 (2003).
Jansen, “Authenticating mobile device users through image selection,” The Internet Society: Advances in Learning, Commerce and Security, K. Morgan & M. J. Spector (Editors), 30:10 (2004).
Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The design and analysis of graphical passwords,” 8th USENIX Security Symposium (1999).
Kasprowski, “Eye movements in biometrics,” Springer Berlin / Heidelberg, ISSN 0302-9743 (Print) 1611-3349 (Online), 3087:248-258 (2004).
Kent, Malaysia car thieves steal finger, BBC News, Kuala Lumpur. Retrieved on Sep. 12, 2006 at http:/
ews.bbc.co.itIc/2/hi/asia-pacific/4396831.stm.
Microsoft's Wireless IntelliMouse Explorer with Fingerprint Reader, retrieved online on Feb. 4, 2005 at http://www.microsoft.com/hardware/mouseandkeyboard/productdetails.aspx?pid=03.
Proenca, “Iris segmentation methodology for non-cooperative recognition,” IEE Proceedings—Vis. Image Signal Process.,153(2):199-205 (Apr. 2006).
Scheeres, “Airport Face Scanner Failed,”Wired News, May 16, 2002, retrieved on Feb. 4, 2005 online at http://www.wired.com
ews/privacy/0,1848,52563,00.html.
Sobrado J.C. and Birget, “Shoulder surfmg resistant graphical passwords,” Retrieved on Sep. 29, 2005 at http://clam.rutgers.edu/-birget/grPssw/srgp.pdf.
Sung, “Towards non-cooperative iris recognition systems,” IEEE, 7th International Conference on Control, Automation, Robotics and Vision, 2002. Singapore 2:990-995 (2002).
Thalheim J. Krissler and P.-M. Ziegler. “Body check: Biometrics defeated,” c't Magazine. Retrieved Sep. 9, 2006 from http://www.extremetech.com/print—article/0,3428,a=27687,00.asp Jun. 3, 2002.
Thorpe and P. van Oorschot, “Graphical dictionaries and the memorable space of graphical passwords,” Proceedings of the 13th USENIX Security Symposium, San Diego, USA, 135-150 (Aug. 9-13, 2004).
Titsworth, T., “More than face value: airports and multimedia security,” IEEE MultiMedia 11-13 (2002).
Tseng, “Comparison of holistic and feature based approaches to face recognition,” Masters of Applied Science in Information Technology Thesis, School of Computer Science and Information Technology, Faculty of Applied Science, Royal Melbourne Institute of Technology University, Melbourne, Victoria, Australia (Jul. 2003).
Wiedenbeck, J. Water, J. C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: effects of tolerance and image choice,” Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA (Jul. 6-8, 2005).
Young, Boffins use Play-Doh to fool biometrics, posted on vnunet.com Dec. 13, 2005, Retrieved on Sep. 12, 2006 at http://www.itweek.co.ulchnunet
ews/2147491/hackers-play-doh-fool.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for multiple factor authentication using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for multiple factor authentication using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for multiple factor authentication using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2716091

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.