Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Random biometric authentication methods and systems

a biometric authentication and random technology, applied in the field of random biometric authentication methods and systems, can solve the problems of electronic and mechanical system security, insecure access control systems, and often forgotten pre-set codes,

Inactive Publication Date: 2002-07-11
IP VENUE LLC
View PDF17 Cites 175 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security for electronic and mechanical systems has rapidly become an important issue in recent years.
Pre-set codes are often forgotten, however, as users have no reliable method of remember them.
Writing down the codes and storing them in close proximity to an access control device (e.g., a combination lock) results in a secure access control system with a very insecure code.
Alternatively, the nuisance of trying several code variations renders the access control system more of a problem than a solution.
Password systems are known to suffer from other disadvantages.
Most users, being unsophisticated users of security systems, choose passwords that are relatively insecure.
Unfortunately, passwords and cards have the same drawbacks when used for building security as when used for computer security.
Unfortunately, along with this increased accessibility comes increased potential for security problems.
As indicated above, however, passwords and PIN numbers may be forgotten or may fall into the wrong hands.
Additionally, using passwords and PIN numbers for security purposes places an additional burden on institutions because passwords or PIN numbers require additional machinery and human resources to deal with customers when customers forget passwords or PIN numbers, or when customers request that passwords or PIN numbers be changed.
For doorway security systems, biometric authentication systems have many known problems.
Remembering a PIN can be inconvenient and the device needed to accept a PIN are sometimes subject to damage and failure.
The device is also an additional expense in a doorway access system.
Since a single processor can provide processing for several doors, for a multiple doorway system, the PIN entry unit forms a significant portion of the overall system cost.
Typically when using a biometric information sample, a low match score results in failure to authorize an individual.
In the past, a one-to-many search of biometric information has generally been considered undesirable because security may be compromised.
Whereas 1 / 1,000,000 is generally acceptable for many applications, 1 / 25,000 is likely not as acceptable.
Further, as the number of individual templates grows, the rate of false acceptance increases; when 250 templates exist, a likelihood of about 1 / 4,000 of false acceptance exists.
In order to solve this problem, one might reduce the false acceptance rate to 1 / 10,000,000; however, this results in problems identifying some people and makes such a system inconvenient.
A system of this type is unlikely to provide consistent results and therefore, requires a security guard at least at a door to provide access for those who are not identifiable to 1 / 10,000,000.
Another potential problem with the use of biometrics is related to the unauthorized interception of a digital signal or file representing a biometric (i.e., similar to unauthorized interception of passcodes / passwords).
An unauthorized user may substitute a digital signal of a biometric attribute or template by bypassing biometric readers or scanners altogether.
Therefore, like passwords or passcodes, use of biometrics for security purposes and user authorization, verification, and identification is not full proof.
Based on the foregoing, those skilled in the art can appreciate that despite the advances in biometric authentication, most biometric authentication systems are still plagued with various physical and algorithmic drawbacks.
Additionally, at least one defective biometric attribute associated with the user may be identified as defective (or otherwise un-readable), according to a method disclosed herein.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random biometric authentication methods and systems
  • Random biometric authentication methods and systems
  • Random biometric authentication methods and systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of particular applications and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention.

[0044] Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with principles and features disclosed herein. Although preferred embodiments of the present invention are described herein, those skilled in the art can appreciate that a number of varying embodiments may be implemented in accordance with the present invention.

[0045] FIG. 1 depicts a block diagram illustrating components of an electronic system 12 associated with a database or memory co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and systems for biometrically securing access to electronic systems. A user prompted to input to the electronic system at least one biometric attribute randomly selected from a user profile containing biometric attributes of the user. A user may be prompted to input such a biometric sample through a user interface integrated with the electronic system. A user may be permitted to perform a user-desired activity, such as accessing an ATM machine, particular data, or entry to a secure area, if at least one biometric attribute input by the user to the electronic system matches at least one biometric attribute randomly selected from the user profile. A user profile may be generally accessible from a server through the electronic system. A user profile may also be accessible from a biometric broker through the electronic system over a secure network connection. A user profile may also be accessible from a hand held device, such as a smart card, wireless PDA or wireless communication device.

Description

[0001] 1. Technical Field of the Invention[0002] The present invention relates to authentication for and security of electronic systems, such as computers, kiosks, wireless devices, associated fixed and wireless networks, and mechanical systems, such as secure buildings. The present invention also relates to the use of biometric data for authenticating user identity and providing secure user access to data and / or transactions.[0003] 2. Description of the Related Art[0004] Security for electronic and mechanical systems has rapidly become an important issue in recent years. With the proliferation of computers, computer networks and other electronic device and networks into all aspects of business and daily life, the concern over secure file and transaction access has grown tremendously. The ability to secure data and transactions is particularly important for financial, medical, education, government, military, and communications endeavors.[0005] Using passwords is a common method of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/32
CPCH04L63/0861H04L2463/082H04L63/102H04W12/06
Inventor ORTIZ, LUIS M.
Owner IP VENUE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products