Smart card with fingerprint image pass-through

Registers – Systems controlled by data bearing records – Credit or identification card systems

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C235S382000, C235S454000, C902S001000

Reexamination Certificate

active

06182892

ABSTRACT:

BACKGROUND AND SUMMARY OF THE INVENTION
This application relates to smart card fingerprint authentication, in particular, to imprint and other biometric digitization and verification.
BACKGROUND: SECURITY
Computers are being used in increasing numbers for financial transaction, data storage, and physical access controls. As such, the number of tools used in implement security for these applications has grown. Three of the most common bases for security are knowledge, physical keys or “security tokens”, and biometrics. In some applications these methods are used individually whereas in others they are combined to create a stronger level of security.
BACKGROUND: KNOWLEDGE
One of the simplest ways to maintain security is based on the knowledge of the person desiring access. The most common form of this type of security is authentication through password, or in the case of financial transactions, personal identification number (or “PIN”) information. One of the biggest disadvantages to knowledge based security systems is the difficulty in protecting the password information from other. Password information can be captured in a variety of ways, usually without the owner's knowledge. A common method of intercepting password information is by capturing a datastream containing the password. Another disadvantage of knowledge based security systems is that they usually rely on the user of the system to remember a password. The user, in turn, is more likely to choose a password which is easy to remember. Such passwords usually involve birth dates, maiden names, street names, etc. However, a password which is easy to remember may be easy to devine given minimal knowledge about the user. This results in reduced levels of security.
BACKGROUND: PHYSICAL KEYS
The use of physical keys, such as house or car keys, is a way of gaining access to a physically secure site. Security tokens, or electronic keys, are another type of physical key which can be used control access to both physical and electronic information. Security tokens are portable devices which can be connected to computer terminals but remain detachable and can be carried around by individuals. Security tokens are useful, for example, when attempting access to a database or other electronic store of information, the user is usually required to provide only a username and password. Token authentication via a security token offers a stronger level of security by requiring additional pieces of information.
The security token (like an ATM card) is usually encoded with a PIN which the user must know. It can also information in on-chip memory. Cards which include logic and non-volatile memory are known as “smart cards” and are widely used in some countries. The token is also usually encoded with a unique number which is stored on the card for authentication. Not only must the security token be present for authentication, but information on the security token must be electronically read and verified before access to information is granted. This unique number encoding prevents “fake IDs” from being easily generated.
The main disadvantage of the security token is that it can be easily lost or stolen. If extra security, such as PINs and unique one-time numbers are not included with the token, it can then be used to gain access to that which was protected. Even if a PIN is used, that number can sometimes be captured as well, if proper protection of it is not maintained.
BACKGROUND: BIOMETRICS
Biometrics can be defined as the use of unique physiological or behavioral characteristics for identification purposes. Biometrics represents one of the most secure and reliable ways of verifying the identity of a particular individual. As such, it is somewhat immune from the problems of both knowledge-based and token-based security functions. Physiological characteristics are considered more reliable as they remain relatively stable throughout life.
Physiological characteristics include handwritten signatures, fingerprints, the filaments of the eye, or the spatial features of a face. Of the various physiological characteristics that can be measured, the fingerprint is recognized as the most reliable, unique, undeniable, and unchanging characteristic for identifying persons.
The advantages of biometrics as a security device have caused an increasing demand for use of fingerprints and other physiological features for identification and access purposes. The use of a fingerprint as a means of identifying an individual requires that a reference fingerprint (or “template”) first be obtained. The template must be taken of an identified individual to ensure that an identification made days or years later is accurate. The FBI has created a standard for the digitization of the template in order for automatic electronic comparisons of fingerprints to take place. This standard uses an approach known as wavelet transform/scaler quantization (WSQ). WSQ allows fingerprint information to be encoded for later recognition in a compact manner (e.g., with around 1 megabyte of computer storage space per print). Ease of storage and recognition coupled with an electronic means of verification have fueled consumer desires for the use of fingerprinting.
BACKGROUND: LIVE-SCAN IMPRINTS
Generally, in commercial applications the fingerprint image to be verified is acquired with live-scan devices. The finger to be scanned is placed on a clear glass or acrylic surface (the “platen”). An image of the imprint of the finger is illuminated and then captured, usually by a CCD camera. The image is then digitized using WSQ or another method. This image is then compared to a template for verification.
The main advantage of live-scan systems is that the imprint captured is difficult to falsify, especially when combined with other vital measurements, such as temperature, pulse, etc. However, wide-scale use of commercial live-scan systems in unrestricted environments faces several disadvantages. First, the platen must be constantly exposed to the surrounding environment in order to make it accessible to the users of the system. In areas with severe environmental conditions premature platen wear can occur and affect the ability of the device to capture images. Additionally, when the same platen is used for each verification, it can become worn. The image captured from the platen can become distorted due to scratches, cracks, or even buildup of oils and dirt. Once the platen becomes too worn to pass a clear image, verifications can no longer be performed until the platen is replaced or repaired.
BACKGROUND: APPLICATIONS
The ability to reduce a template and a live-scan image to a compact and easily transmittable and stored size allows fingerprinting to be used for identification and verification purposes in many different contexts. For example, access to data in databases and other systems can be controlled. Requiring fingerprint verification in these situations provides a stronger level of security than password type systems. In response to consumer demand, Oracle has integrated biometric authentication into the Oracle 7™ Advanced Networking Option™ release of its database management system software. Fingerprint verification can also be used to restrict or monitor access to physical areas such as buildings or cabinets containing controlled substances.
Another application of fingerprinting is in situations where verification that the person really is who they say they are and their presence is required. Such situations include time and attendance tracking. Banking and securities trading, especially when transactions occur remotely, can benefit from fingerprint verification as well. Finally, fingerprint verification can be used in place of voter registration certificates and in other situations where the identification of a single person with the proper credentials is essential. Such situations can include doctors, patients, vehicle drivers, and customs operations.
Smart Card With Fingerprint Image Pass-Through
The present application describes a method for providing live-scan fingerprint auth

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Smart card with fingerprint image pass-through does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Smart card with fingerprint image pass-through, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Smart card with fingerprint image pass-through will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2595850

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.