WO2013051019A1 - Evolved biometric system with enhanced feature and method for the same - Google Patents

Evolved biometric system with enhanced feature and method for the same Download PDF

Info

Publication number
WO2013051019A1
WO2013051019A1 PCT/IN2012/000433 IN2012000433W WO2013051019A1 WO 2013051019 A1 WO2013051019 A1 WO 2013051019A1 IN 2012000433 W IN2012000433 W IN 2012000433W WO 2013051019 A1 WO2013051019 A1 WO 2013051019A1
Authority
WO
WIPO (PCT)
Prior art keywords
biometric
scanner
individual
data
identification
Prior art date
Application number
PCT/IN2012/000433
Other languages
French (fr)
Other versions
WO2013051019A4 (en
Inventor
Jinav Sandeep GHATALIA
Sandeep Harshad GHATALIA
Neetin Shivajirao DESAI
Devang Kaushik THAKAR
Original Assignee
Ghatalia Jinav Sandeep
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ghatalia Jinav Sandeep filed Critical Ghatalia Jinav Sandeep
Publication of WO2013051019A1 publication Critical patent/WO2013051019A1/en
Publication of WO2013051019A4 publication Critical patent/WO2013051019A4/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • the present invention relates to an evolved biometrics system with enhanced feature and method for the same.
  • it relates to the authentication and verification of the identity of users in real time with live biometrics using one or more biometric modalities with maximum accuracy and precision.
  • the data transfer is secured using different encryption techniques.
  • This invention relates generally to authenticating individuals and more particularly to a method and system for biometric authentication.
  • biometric authentication systems are used to identify and verify the identity of individuals and are used in many different contexts such as verifying the identity of individuals entering a country using electronic passports.
  • Biometric authentication systelms have also been known to verify the identity of individuals and have now been deployed in various commercial, civilian, & forensic set-ups as a means of establishing & confirming identity like using driver's licenses, traveler's tokens, employee identity cards and banking cards.
  • Biometric authentication using biometric information is widely used as means for authenticating.
  • Biometric are generally classified as stable and unstable biometric. Biometric which remain stable for longer time and do not vary occasionally are considered as stable biometric not limiting to for e.g. Fingerprints Scan, Palm, Retina, Iris Patterns, Signature, DNA Sequence, face, lips etc. Whereas in case of unstable biometric they frequently vary depending on emotion and surrounding/environment for example not limiting to Voice, Gait, Foot Pressure, Weight, Bodypressure, Heart beat scan, Nail, perspiration and dental pattern etc.
  • Known biometric authentication system search engines generally identify individuals using biometric feature templates derived from raw biometric data captured from individuals.
  • Biometric systems has the means to access control (output) include token-based identification systems such as driver's license or passport and knowledge-based identification systems such as password or personal identification number.
  • token-based identification systems such as driver's license or passport
  • knowledge-based identification systems such as password or personal identification number.
  • biometric information include capture - image information obtained by capturing images of body parts, such as Fingerprints Scanner, Palm, Retina & Iris Patterns, Digital Signature, DNA Sequence and Voice print information obtained by recording voice.
  • biometric feature template derived from biometric data captured from an individual during authentication is compared against a database of previously derived biometric feature templates and the identity of the individual is verified upon determining a match between one of the stored biometric feature templates and the biometric feature template derived during authentication
  • biometric feature templates against a database biometric feature templates may place substantial demands on computer system memory and processing which may result in unacceptably long authentication periods.
  • biometric authentication works in a multi-stages process that consists of the following steps: Enrollment, Processing, Extraction, Comparison and Matching data.
  • biometric systems deployed in real-world applications are unimodal, i.e. they rely on the evidence of a single source of information eg. single or multiple fingerprints or face or iris or retina or palm.
  • the 'unimodal' or 'single mode' biometric solutions have limitations in terms of accuracy and susceptibility to spoofing. For example according to the National Institute of Standards and Technology (NIST/USA) approximately two percent of the population does not have a legible fingerprint and therefore can't be enrolled into a finger print biometric system.
  • WO2008121730 discloses a method and/or system for identity management and authentication of examination candidates by, for example, capturing biometric data and identification information from an examination candidate and storing the data and information in a database.
  • the method and/or system includes, for example, capturing biometric data from an individual at a later time for comparison with data stored in the database, and which allows authentication of the individual after determining that the biometric data matches the previously stored data and the individual matches the previously stored information.
  • Multimodal biometrics uses a combination of recognition technologies to compare the identity of an individual. If one of the technologies fails for any reason, the system can still use another one or more of them to provide accurate identification of an individual. Better accuracy can be naturally obtained by having a large number of biometric scanning systems. Additions of methods like DNA Sequencing, though it is time consuming would offer additional benefits. However it has been observed that integrating a large number of independent biometric systems offer certain technological challenges and hence are rarely attempted to integrate them.
  • WO2005008210 discloses a system and method for performing security access control based on modified biometric data.
  • enhanced security and accuracy is obtained through recognition of one or more distorted biometrics.
  • the method includes detecting a distorted biometric , comparing the distorted biometric, to one or more distortion patterns in storage unit, and controlling access to a restricted item based on results of the comparison.
  • the biometric may be an eye pattern, a fingerprint or palm print, a voice print, a handwriting sample, a DNA sample, a facial image, or any other type of characteristic or behavioral attribute of a person.
  • the biometric may be distorted in any one of a variety of ways for comparison to previously enrolled biometrics which have been distorted using the same or similar element.
  • a system and program embodied within a computer-readable medium performs the steps of the method.
  • the existing multimodal biometric system there is a requirement of system which could provide a real analysis and live biometric.
  • Time consumption is more in conventionally know biometric system to achieve the accuracy, hence there is a need of an system which could provide high accuracy as that of more than 99% in very less time with less noise.
  • As there is large number of data need to be stored hence a system that could store large number of data in considerable small space is required.
  • a primary object of the present invention is to develop multimodal biometric device with high accuracy and precise result.
  • Another object of the invention is to provide a highest level security system.
  • Another object of the invention is to provide an integrated or synchronized biometric system.
  • Another object of the -present invention is to develop the multimodal biometric which captures various / multiple biometric with in fraction of seconds / less time and less sensor noise.
  • Yet another object of the invention is to provide a multimodal biometric which is easy to operate and yet economic.
  • a further object of the present invention is to provide a multimodal biometric device which could save the collected data in compact space (fewer MB) in lesser time.
  • Another object of the invention is to provide a multimodal biometric device which can reduce identity theft.
  • Another object of the invention is to provide a multimodal biometric device which has user friendly application.
  • Another object of the invention is to provide a multimodal biometric device which has highest level of security for the stored /enrolled data.
  • Another object of the invention is to provide a multimodal biometric device which could provide access to secured enrolled data across the globe.
  • Yet another object of the invention is to provide an evolved biometric system which does not interfere with the other working software in a computer/server system.
  • an evolved biometric authentication system providing more than 99% accuracy and is precise as it uses multiple biometrics to identify and authenticate a live individual.
  • This evolved biometric system provides real time verification and authentication.
  • the biometrics characteristic data obtained from the individual at the time of identification and authentication is compared with the previously registered biometrics characteristic data at the time of user registration, said system comprises of multiple biometric instruments, a processing unit, a database, and means of access (output), and the method of biometric identification using multimodal biometric authentication device for authenticating a user enrolled/captured biometric and its means of access (output) with more than 99% accuracy, where initially characteristics image of a biometric feature an individual are captured, then the captured image/information undergoes process of converting, encrypting, and storing the above images in a computer/central processing unit with the help of software program in an integrated method which avoids overlapping of the multiple images an Individual as well as different individuals enabling easy, concise and fast retrieval of the desired biometric data pertaining to
  • FIGURE 1 is a flow chart showing an exemplary embodiment of a working of the
  • FIGURE 2 is the flowchart showing of an exemplary embodiment of working of the finger scanner.
  • FIGURE 3 is the flowchart showing of an exemplary embodiment of a working of iris scanner.
  • FIGURE 4 is the flowchart showing of an exemplary embodiment of a working of the palm scanner.
  • FIGURE 5 is the flowchart showing of an exemplary embodiment of a working of face camera.
  • FIGURE 6 is the flowchart showing of an exemplary embodiment of a circuit used in multimodal biometric system.
  • FIGURE 1 is the working of multimodal biometric.
  • the biometric of an individual are captured using multiple biometric device.
  • the said biometric are either captured simultaneously or are captured one after another.
  • the multiple scanning instruments are used in combination or simultaneously are the biometric device used to capture biometric of individual are palm scanner, iris scanner, face scanner, voice scanner, figure scanner, DNA scanner, signature scanner.
  • the captured data/image /information is then transferred to processing unit which is the hardware within a computer system which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system it is with a software component either as embedded in hardware or running thereon.
  • the processed data is then stored in database which is an organized collection of data in digital form that supports processes requires running the information as required/commanded.
  • the means of access is token-based identification systems such as passport, driving license and/or knowledge-based identification systems such as password or personal identification number.
  • the means of access is an application used in day to day practice where identification is very important and avoids identity theft, where the application are not limited to examples like immigration industry, Identity or identification access to confidential area/restricted area, insurance sector including both health and life insurance, Financial security includes online like trading site, banking site etc and offline both like credit card, debit card etc.
  • FIGURE 2 is the flowchart for working of the finger scanner.
  • the Finger Scanner a component of our Integrated or Synchronized system works as follows.
  • the instrument consists of three parts: 1.
  • the Instrument comprising of Light Emitting Sensor (LES), 2.
  • Software Programmer
  • Data cable is connected to finger scanner at one end and to hardware at other end.
  • finger scanner at one end and to hardware at other end.
  • graphical user interface enrollment and identification is done.
  • the computer system, software program and finger scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the finger scanner is ready to capture images of fingers by a special camera, which provides required magnification and Light Emitting Sensor (LES). Finger of individual is rested on the scanner. The images of the ridges of the finger are captured. The captured images are stored in storage device in milliseconds.
  • the Software converts the scanned image in to a big contour map or a coordinate system. The process of converting the image into a big contour map or a coordinate system, and the output generated is known as Templates. There are many Templates of an individual. All those Templates which belong to an individual are assigned a unique code either manually or automatically.
  • FIGURE 3 describes the working of iris scanner.
  • the Iris scanner as a component of our Integrated or Synchronized system works as follows. 1.
  • the instrument comprising of a camera, 2. Data Cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer.
  • Data cable is connected to iris scanner at one end and to hardware at other end.
  • iris scanner By using graphical user interface enrollment and identification is done.
  • the computer system, software program and iris scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the iris scanner is ready to capture images of iris.
  • To capture iris image it utilizes high resolution camera which provides required magnification.
  • the images of eye iris are captured.
  • the captured iris image is processed and stored in a storage device by Software.
  • the iris images of both irises are stored in the database in the form of binary data with which a Unique Code (for left and right irises of an individual) is also assigned either manually or automatically.
  • FIGURE 4 describes the working of the palm scanner.
  • Palm scanner as a component of our Integrated or Synchronized system works as follows.
  • the instrument consists of three parts:
  • the Instrument comprising of Infra Red Sensor, 2. Data cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer. Data cable is connected to palm scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and palm scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the palm scanner is ready to capture images of left and right Palms. To capture image it utilizes a pattern image while radiating it with near-infrared rays. The deoxidized hemoglobin in the palm vein absorbs these rays, thereby reducing the reflection rate and causing the veins to appear as a black pattern. An individual will rests his or her palm on the scanner. The images of the veins of the palm are captured. The captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
  • FIGURE 5 describes the working of face camera.
  • the Face scanner as a component of our Integrated or Synchronized system works as follows.
  • the instrument consists of three parts:
  • the instrument comprising of a camera, 2. Data Cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer. Data cable is connected to face scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and face scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the Face camera is ready to capture images of Face.
  • To capture face image it utilizes web or normal resolution camera which provides required magnification.
  • An individual is present in front of face camera.
  • the two dimensional (henceforth referred as 2-D) image of face are captured.
  • the captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
  • FIGURE 6 is the circuit used in multimodal biometric system.
  • the circuit comprises of IC's, resistors, capacitors.
  • the Evolved Multimodal biometrics technology utilizes a process for enrollment with the help of one or more biometric instruments either simultaneously or one after another which are:
  • the Finger Scanner a component of our Integrated or Synchronized system works as follows.
  • the instrument consists of three parts: 1.
  • the Instrument comprising of Light Emitting Sensor (LES), 2. Data Cables to connect as well as to transfer data / to or from the instrument to / from hardware 3.
  • Software Programmer Data cable is connected to finger scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done.
  • the computer system, software program and finger scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the finger scanner is ready to capture images of fingers by a special camera, which provides required magnification and Light Emitting Sensor (LES). Finger of individual is rested on the scanner. The images of the ridges of the finger are captured. The captured images are stored in storage device in milliseconds.
  • the Software converts the scanned image in to a big contour map or a coordinate system. The process of converting the image into a big contour map or a coordinate system, and the output generated is known as Templates. There are many Templates of an individual. All those Templates which belong to an individual are assigned a unique code either manually or automatically.
  • Finger Scanner has two major functions:
  • Enrollment - Collecting Biometric Data by capturing the biometric Feature (two thumbs and eight fingers) of an individual for enrollment.
  • This finger scanner is based on a principle that is needs to complete its circuit. In this scanner electrons emitting from finger tips completes the circuit cycle, as the electrode is based on this principle. With this unique feature a dead person's finger cannot be identified as a dead human/animal finger does not contain set of electrons to complete the circuit where as in case of a live human, blood is continuously flowing and replenishment of electrons is continuously there hence the circuit is completed and the individual can be identified. Also fingerprints with contaminants like dust, grease, oil, water and other contaminants can be easily identified using this scanner. Bruised or injured finger, blood stained or dye stained finger can be identified easily.
  • the Iris scanner as a component of our Integrated or Synchronized system works as follows. 1.
  • the instrument comprising of a camera, 2. Data Cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3.
  • Software Programmer Developed by us
  • Data cable is connected to iris scanner at one end and to hardware at other end.
  • iris scanner By using graphical user interface enrollment and identification is done.
  • the computer system, software program and iris scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the iris scanner is ready to capture images of iris.
  • To capture iris image it utilizes high resolution camera which provides required magnification.
  • the images of eye iris are captured.
  • the captured iris image is processed and stored in a storage device by Software.
  • the iris images of both irises are stored in the database in the form of binary data with which a Unique Code (for left and right irises of an individual) is also assigned either manually or automatically.
  • the storage process is being defined in Software.
  • Iris Scanner has two major functions:
  • Enrollment Collecting biometric data by capturing the biometric feature (left and right irises) of an individual for enrollment.
  • Identification - Verifying or Matching or Comparing the recently or newly collected biometric data by capturing the biometric feature (either left or right iris) of an individual with the binary data stored in the database.
  • This iris scanner is able to capture iris through contact lens, coloured contact lens, spectacles and glares.
  • the unique feature of this scanner is autodetection of the iris and automatic capture of the iris.
  • the Face scanner as a component of our Integrated or Synchronized system works as follows.
  • the instrument consists of three parts: 1.
  • the instrument comprising of a camera, 2.
  • Software Programmer 4.
  • Data cable is connected to face scanner at one end and to hardware at other end.
  • face scanner By using graphical user interface enrollment and identification is done.
  • the computer system, software program and face scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the Face camera is ready to capture images of Face.
  • To capture face image it utilizes web or normal resolution camera which provides required magnification.
  • An individual is present in front of face camera.
  • the two dimensional (henceforth referred as 2-D) image of face are captured.
  • the captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
  • Face camera has two major functions:
  • Enrollment Collecting biometric data by capturing the biometric features (face) of an individual for enrollment.
  • Identification - Verifying or Matching or Comparing the recently or newly collected biometric data by capturing the biometric feature (face) of an individual with the binary data stored in the database.
  • This face scanner has an auto-detection and lag detection property which will continuously scan the face either it is identified or unidentified.
  • This face scanner detects face only if the eyes of the individual are available during scanning, this avoids the fraud causes by cheat using a similar look mask or by doing a plastic surgery resembling same individual face, as this scan requires eyes for scanning.
  • Another unique feature of this scanner is it doesn't recognize 2-D 3-D virtual sized photographs of the same individual placed in if front of the camera.
  • the Palm scanner as a component of our Integrated or Synchronized system works as follows.
  • the instrument consists of three parts: 1.
  • the Instrument comprising of Infra Red Sensors, 2.
  • Software Programmer is a component of our Integrated or Synchronized system.
  • Data cable is connected to palm scanner at one end and to hardware at other end.
  • palm scanner By using graphical user interface enrollment and identification is done.
  • the computer system, software program and palm scanner are synchronized and integrated with each other so that they are compatible with each other.
  • the palm scanner is ready to capture images of left and right Palms. To capture image it utilizes a pattern image while radiating it with near-infrared rays. The deoxidized hemoglobin in the palm vein absorbs these rays, thereby reducing the reflection rate and causing the veins to appear as a black pattern. An individual will rests his or her palm on the scanner. The images of the veins of the palm are captured. The captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
  • Palm scanner has two major functions:
  • Enrollment Collecting biometric data by capturing the biometric feature (left and right palms) of an individual for enrollment.
  • Identification - Verifying or Matching or Comparing the recently or newly collected biometric data by capturing the biometric feature (either left or right palm) of an individual with the stored binary data in the database.
  • This scanner identifies only alive individual, a dead individual cannot be identified because deoxygenated blood present both in veins and arteries which will differ from the previously recorded pattern and hence it will not identify.
  • the amplified PCR products were eluted and were further used for sequencing.
  • the crux of our invention lies in integrating all the biometric instruments i.e. finger scanner, iris scanner, face scanner, palm scanner, digital signature with the DNA sequences in the same computer application.
  • the finger scanner can't take very sharp images every time so there is a possibility that the computer system misinterprets and shows us a wrong match for the same person.
  • This can be overcome by using several biometrics of the same person to identify him / her.
  • the iris scanner there is a peculiar problem i.e. if the distance from the camera is not appropriate the scanner gives a distorted image and that can lead to misinterpretation leading to a wrong match.
  • the problem is again solved by using other biometric data of the same person.
  • Our biometric system can assure a result of more than 99% matching as we are using multiple biometrics of the same individual to identify him or her.
  • At least 4 biometric scanning devices are arranged in an unique way with a single usb hub connecting the same to the computer (Fig.8).
  • the hardware consists of two additional devices for connecting the usb of the devices as seen on the blue print of the device.
  • the first device is a usb hub which consists of four ports to fit in the usb drive of our instruments like finger scanner, iris scanner, palm scanner and face scanner.
  • the function of the device is to connect all the devices with the computer via the single usb cable.
  • the instrument is just like a bridge to connect the data transfer of the image between the computer and the scanners.
  • the microprocessor chip of the usb is designed in such a way that it connects all the instruments to the computer still keeping their individual data transfer different from each other so that they do not combine with each other or they do not send the data of that instrument into the wrong field in the computer database which can lead to a confusion and ultimately lead to a collapse of the database.
  • the changes made in the printed circuit board of the multiple usb are for getting higher number of voltage from the main supply.
  • the design of the circuit is indigenous because we have made a unique arrangement for the data transfer of the data from the instruments to the computer.
  • the role the hardware is transferring of data without overlapping of data between the instruments and the computer.
  • the data cable contains four Wires with colours White, Black, Green and Red.
  • White and black wires of the cable are for the power supply to the instruments and Green and Red wires of the cable are for data transfer and instructions transfer from device to computer and vice versa. Any data transfer process is a power consuming process so it needs help of capacitors.
  • the function of capacitor is generally to store charge in the form of electric current.
  • Each capacitor is having maximum capacity of 10 microfarad for charge accumulation and maximum capacity of 5 volts for potential difference. 10 (TEN) such capacitors are installed in the circuit.
  • the reason for installing so many capacitors is to match the requirements of total charge and potential difference of all these instruments.
  • the number of resistors has been significantly decreased so as to provide us the boost in storing the charge in the capacitors. 3 resistors with their minimum capacity have been installed in the circuit.
  • the data cables are embedded in the circuit.
  • Four separate IC's are connected to each of the four data cables.
  • the function of IC's with the microprocessor is to control timing and the data transfer without the confusion or overlapping within the hardware or in the computer.
  • the IC's used in the circuit are 8085, 8081 and 7805.
  • the coding of the particular IC's is done using a language known as computer language "C" which is an universal language of programming for the IC's. Also there are middle level programming languages and assembly level languages for the programming of IC's.
  • the biometric of individuals are captured using figure scan, iris scan, face scanner, palm scanner, signature scanner and DNA scanner. This data is transfer to a processing unit where the information is processed and segregated so that no agglomeration is there in the database. The information is then passed from the processing unit to database where it is stored systematically where time of retrieval is very quick.
  • the mode of access (output) or application can be various depending on requirement not limited to mention below:
  • This system is a very robust system which is built to give authorized user access to restricted areas. This is a system wherein the biometrics is collected and the verified with the already enrolled data and the access is given to only verified person. This system is kept wireless so that the range of the access control system can be extended from just a few feet to kilometers. It utilizes a specially designed circuit which gives wireless access. 2.

Abstract

Thus according to the basic aspect of the present invention there is provided an evolved biometric authentication system providing more than 99% accuracy and is precise as it uses multiple biometrics to identify and authenticate a live individual. This evolved biometric system provides real time verification and authentication. The biometrics characteristic data obtained from the individual at the time of identification and authentication is compared with the previously registered biometrics characteristic data at the time of user registration, said system comprises of multiple biometric instruments, a processing unit, a database, and means of access (output), and the method of biometric identification using multimodal biometric authentication device for authenticating a user enrolled/captured biometric and its means of access (output) with more than 99% accuracy, where initially characteristics image of a biometric feature an individual are captured, then the captured image/information undergoes process of converting, encrypting, and storing the above images in a computer/central processing unit with the help of software program in an integrated method which avoids overlapping of the multiple images an Individual as well as different individuals enabling easy, concise and fast retrieval of the desired biometric data pertaining to an individual. Further this captured data/image/information is matched or compared and verified with the enrolled data to identify or authenticate his or her identification. Then the means of access (output) is used as application in various field as token based identification system or knowledge based identification system.

Description

TITLE OF THE INVENTION: "EVOLVED BIOMETRIC SYSTEM WITH ENHANCED FEATURE AND METHOD FOR THE SAME"
FIELD OF THE INVENTION:
The present invention relates to an evolved biometrics system with enhanced feature and method for the same. In particularly it relates to the authentication and verification of the identity of users in real time with live biometrics using one or more biometric modalities with maximum accuracy and precision. The data transfer is secured using different encryption techniques.
BACKGROUND OF INVENTION:
This invention relates generally to authenticating individuals and more particularly to a method and system for biometric authentication. Generally biometric authentication systems are used to identify and verify the identity of individuals and are used in many different contexts such as verifying the identity of individuals entering a country using electronic passports. Biometric authentication systelms have also been known to verify the identity of individuals and have now been deployed in various commercial, civilian, & forensic set-ups as a means of establishing & confirming identity like using driver's licenses, traveler's tokens, employee identity cards and banking cards.
In recent years, biometric authentication using biometric information is widely used as means for authenticating. Biometric are generally classified as stable and unstable biometric. Biometric which remain stable for longer time and do not vary occasionally are considered as stable biometric not limiting to for e.g. Fingerprints Scan, Palm, Retina, Iris Patterns, Signature, DNA Sequence, face, lips etc. Whereas in case of unstable biometric they frequently vary depending on emotion and surrounding/environment for example not limiting to Voice, Gait, Foot Pressure, Weight, Bodypressure, Heart beat scan, Nail, perspiration and dental pattern etc. Known biometric authentication system search engines generally identify individuals using biometric feature templates derived from raw biometric data captured from individuals. Biometric systems has the means to access control (output) include token-based identification systems such as driver's license or passport and knowledge-based identification systems such as password or personal identification number. Examples of available biometric information include capture - image information obtained by capturing images of body parts, such as Fingerprints Scanner, Palm, Retina & Iris Patterns, Digital Signature, DNA Sequence and Voice print information obtained by recording voice.
Specifically a biometric feature template derived from biometric data captured from an individual during authentication is compared against a database of previously derived biometric feature templates and the identity of the individual is verified upon determining a match between one of the stored biometric feature templates and the biometric feature template derived during authentication However comparing biometric feature templates against a database biometric feature templates may place substantial demands on computer system memory and processing which may result in unacceptably long authentication periods. Moreover such known biometric authentication works in a multi-stages process that consists of the following steps: Enrollment, Processing, Extraction, Comparison and Matching data.
Most biometric systems deployed in real-world applications are unimodal, i.e. they rely on the evidence of a single source of information eg. single or multiple fingerprints or face or iris or retina or palm. But the 'unimodal' or 'single mode' biometric solutions have limitations in terms of accuracy and susceptibility to spoofing. For example according to the National Institute of Standards and Technology (NIST/USA) approximately two percent of the population does not have a legible fingerprint and therefore can't be enrolled into a finger print biometric system. Multiple problems such as noisy data, intra-class variations, interclass similarities, non-universality and spoofing leads to considerably high False Acceptance Rates (FAR) and low False Rejection Rates (FRR), limited indiscrimination capabilities, and lack of desired performances. In Indian patent No ΓΝ236304 by Multimedia Glory describe a method of identifying an individual using biometric data selected from one or more of the following; finger print, palm print, iris or any or any other biometric data. The relativity of each significant feature in relation to other feature is computed. The relativity is combined to obtain a classification code. The classification code and the biometric data obtained are encrypted. Then the encrypted data is stored. The biometrics data is verified against the earlier stored biometrics data of the same individual. WO2008121730 discloses a method and/or system for identity management and authentication of examination candidates by, for example, capturing biometric data and identification information from an examination candidate and storing the data and information in a database. The method and/or system includes, for example, capturing biometric data from an individual at a later time for comparison with data stored in the database, and which allows authentication of the individual after determining that the biometric data matches the previously stored data and the individual matches the previously stored information.
Multimodal biometrics uses a combination of recognition technologies to compare the identity of an individual. If one of the technologies fails for any reason, the system can still use another one or more of them to provide accurate identification of an individual. Better accuracy can be naturally obtained by having a large number of biometric scanning systems. Additions of methods like DNA Sequencing, though it is time consuming would offer additional benefits. However it has been observed that integrating a large number of independent biometric systems offer certain technological challenges and hence are rarely attempted to integrate them.
WO2005008210 discloses a system and method for performing security access control based on modified biometric data. Here enhanced security and accuracy is obtained through recognition of one or more distorted biometrics. The method includes detecting a distorted biometric , comparing the distorted biometric, to one or more distortion patterns in storage unit, and controlling access to a restricted item based on results of the comparison. The biometric may be an eye pattern, a fingerprint or palm print, a voice print, a handwriting sample, a DNA sample, a facial image, or any other type of characteristic or behavioral attribute of a person. The biometric may be distorted in any one of a variety of ways for comparison to previously enrolled biometrics which have been distorted using the same or similar element. A system and program embodied within a computer-readable medium performs the steps of the method. With the existing multimodal biometric system there is a requirement of system which could provide a real analysis and live biometric. There is a need of a system which could transfer data with high security avoiding data theft, plodder, and mutilate. There is a need of system which could authenticate the status of identified individual whether dead or alive. Time consumption is more in conventionally know biometric system to achieve the accuracy, hence there is a need of an system which could provide high accuracy as that of more than 99% in very less time with less noise. As there is large number of data need to be stored, hence a system that could store large number of data in considerable small space is required. Not limiting the above requirement/embodiment there is a need of a system which could overcome all the above drawbacks. Considering the above drawbacks, a biometric system and method for the same is evolved to overcome the same not limiting to the below mentioned embodiments.
OBJECTIVES OF THE INVENTION
A primary object of the present invention is to develop multimodal biometric device with high accuracy and precise result.
Another object of the invention is to provide a highest level security system.
Another object of the invention is to provide an integrated or synchronized biometric system.
Another object of the -present invention is to develop the multimodal biometric which captures various / multiple biometric with in fraction of seconds / less time and less sensor noise.
Yet another object of the invention is to provide a multimodal biometric which is easy to operate and yet economic. A further object of the present invention is to provide a multimodal biometric device which could save the collected data in compact space (fewer MB) in lesser time.
Another object of the invention is to provide a multimodal biometric device which can reduce identity theft.
Another object of the invention is to provide a multimodal biometric device which has user friendly application.
Another object of the invention is to provide a multimodal biometric device which has highest level of security for the stored /enrolled data.
Another object of the invention is to provide a multimodal biometric device which could provide access to secured enrolled data across the globe.
Yet another object of the invention is to provide an evolved biometric system which does not interfere with the other working software in a computer/server system.
It is yet another object of the invention to provide an intelligent biometric system in which the capturing device is a programmable device with embedded software for enrolling and identifying the individual with available protocols and encoding and decoding data encapsulated within them. SUMMARY OF THE INVENTION
Thus according to the basic aspect of the present invention there is provided an evolved biometric authentication system providing more than 99% accuracy and is precise as it uses multiple biometrics to identify and authenticate a live individual. This evolved biometric system provides real time verification and authentication. The biometrics characteristic data obtained from the individual at the time of identification and authentication is compared with the previously registered biometrics characteristic data at the time of user registration, said system comprises of multiple biometric instruments, a processing unit, a database, and means of access (output), and the method of biometric identification using multimodal biometric authentication device for authenticating a user enrolled/captured biometric and its means of access (output) with more than 99% accuracy, where initially characteristics image of a biometric feature an individual are captured, then the captured image/information undergoes process of converting, encrypting, and storing the above images in a computer/central processing unit with the help of software program in an integrated method which avoids overlapping of the multiple images an Individual as well as different individuals enabling easy, concise and fast retrieval of the desired biometric data pertaining to an individual. Further this captured data/image/information is matched or compared and verified with the enrolled data to identify or authenticate his or her identification. Then the means of access (output) is used as application in various field as token based identification system or knowledge based identification system.
BRIEF DRESCEIPTION OF DIGRAM:
The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate various exemplary embodiments of the present invention and together with the description , further serve to explain various principles and to enable a person skilled in the pertinent art to make and use the invention.
FIGURE 1 is a flow chart showing an exemplary embodiment of a working of the
Multimodal Biometric. FIGURE 2 is the flowchart showing of an exemplary embodiment of working of the finger scanner.
FIGURE 3 is the flowchart showing of an exemplary embodiment of a working of iris scanner.
FIGURE 4 is the flowchart showing of an exemplary embodiment of a working of the palm scanner.
FIGURE 5 is the flowchart showing of an exemplary embodiment of a working of face camera.
FIGURE 6 is the flowchart showing of an exemplary embodiment of a circuit used in multimodal biometric system.
DETAIL DESCRIPTION OF THE DIAGRAM: FIGURE 1 is the working of multimodal biometric.
The biometric of an individual are captured using multiple biometric device. The said biometric are either captured simultaneously or are captured one after another. The multiple scanning instruments are used in combination or simultaneously are the biometric device used to capture biometric of individual are palm scanner, iris scanner, face scanner, voice scanner, figure scanner, DNA scanner, signature scanner. The captured data/image /information is then transferred to processing unit which is the hardware within a computer system which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system it is with a software component either as embedded in hardware or running thereon. The processed data is then stored in database which is an organized collection of data in digital form that supports processes requires running the information as required/commanded. The means of access (output) is token-based identification systems such as passport, driving license and/or knowledge-based identification systems such as password or personal identification number. Generally the means of access is an application used in day to day practice where identification is very important and avoids identity theft, where the application are not limited to examples like immigration industry, Identity or identification access to confidential area/restricted area, insurance sector including both health and life insurance, Financial security includes online like trading site, banking site etc and offline both like credit card, debit card etc.
FIGURE 2 is the flowchart for working of the finger scanner.
The Finger Scanner a component of our Integrated or Synchronized system works as follows. The instrument consists of three parts: 1. The Instrument comprising of Light Emitting Sensor (LES), 2. Data Cables to connect as well as to transfer data / to or from the instrument to / from hardware 3. Software Programmer
Data cable is connected to finger scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and finger scanner are synchronized and integrated with each other so that they are compatible with each other.
The finger scanner is ready to capture images of fingers by a special camera, which provides required magnification and Light Emitting Sensor (LES). Finger of individual is rested on the scanner. The images of the ridges of the finger are captured. The captured images are stored in storage device in milliseconds. The Software converts the scanned image in to a big contour map or a coordinate system. The process of converting the image into a big contour map or a coordinate system, and the output generated is known as Templates. There are many Templates of an individual. All those Templates which belong to an individual are assigned a unique code either manually or automatically.
FIGURE 3 describes the working of iris scanner.
The Iris scanner as a component of our Integrated or Synchronized system works as follows. 1. The instrument comprising of a camera, 2. Data Cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer.
Data cable is connected to iris scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and iris scanner are synchronized and integrated with each other so that they are compatible with each other. The iris scanner is ready to capture images of iris. To capture iris image it utilizes high resolution camera which provides required magnification. The images of eye iris are captured. The captured iris image is processed and stored in a storage device by Software. The iris images of both irises are stored in the database in the form of binary data with which a Unique Code (for left and right irises of an individual) is also assigned either manually or automatically.
FIGURE 4 describes the working of the palm scanner.
The Palm scanner as a component of our Integrated or Synchronized system works as follows. The instrument consists of three parts:
1. The Instrument comprising of Infra Red Sensor, 2. Data cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer. Data cable is connected to palm scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and palm scanner are synchronized and integrated with each other so that they are compatible with each other.
The palm scanner is ready to capture images of left and right Palms. To capture image it utilizes a pattern image while radiating it with near-infrared rays. The deoxidized hemoglobin in the palm vein absorbs these rays, thereby reducing the reflection rate and causing the veins to appear as a black pattern. An individual will rests his or her palm on the scanner. The images of the veins of the palm are captured. The captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
FIGURE 5 describes the working of face camera.
The Face scanner as a component of our Integrated or Synchronized system works as follows. The instrument consists of three parts:
1. The instrument comprising of a camera, 2. Data Cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer. Data cable is connected to face scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and face scanner are synchronized and integrated with each other so that they are compatible with each other.
The Face camera is ready to capture images of Face. To capture face image it utilizes web or normal resolution camera which provides required magnification. An individual is present in front of face camera. The two dimensional (henceforth referred as 2-D) image of face are captured. The captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
FIGURE 6 is the circuit used in multimodal biometric system.
The circuit comprises of IC's, resistors, capacitors.
DETAILED DESCRIPTION OF THE INVENTION:
The Evolved Multimodal biometrics technology utilizes a process for enrollment with the help of one or more biometric instruments either simultaneously or one after another which are:
1. Finger scanner, 2. Iris scanner, 3. Face Camera, 4. Palm scanner, 5. Signature recognizer etc
1. Working of the Finger Scanner
The Finger Scanner a component of our Integrated or Synchronized system works as follows. The instrument consists of three parts: 1. The Instrument comprising of Light Emitting Sensor (LES), 2. Data Cables to connect as well as to transfer data / to or from the instrument to / from hardware 3. Software Programmer Data cable is connected to finger scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and finger scanner are synchronized and integrated with each other so that they are compatible with each other.
The finger scanner is ready to capture images of fingers by a special camera, which provides required magnification and Light Emitting Sensor (LES). Finger of individual is rested on the scanner. The images of the ridges of the finger are captured. The captured images are stored in storage device in milliseconds. The Software converts the scanned image in to a big contour map or a coordinate system. The process of converting the image into a big contour map or a coordinate system, and the output generated is known as Templates. There are many Templates of an individual. All those Templates which belong to an individual are assigned a unique code either manually or automatically.
Finger Scanner has two major functions:
1. Enrollment:- Collecting Biometric Data by capturing the biometric Feature (two thumbs and eight fingers) of an individual for enrollment.
2. Identification:- Verifying or Matching or Comparing the recently or newly collected biometric data by capturing the biometric feature (thumb or finger) of an individual with the stored Templates in the computers.
This finger scanner is based on a principle that is needs to complete its circuit. In this scanner electrons emitting from finger tips completes the circuit cycle, as the electrode is based on this principle. With this unique feature a dead person's finger cannot be identified as a dead human/animal finger does not contain set of electrons to complete the circuit where as in case of a live human, blood is continuously flowing and replenishment of electrons is continuously there hence the circuit is completed and the individual can be identified. Also fingerprints with contaminants like dust, grease, oil, water and other contaminants can be easily identified using this scanner. Bruised or injured finger, blood stained or dye stained finger can be identified easily.
2. Working of Iris Scanner:
The Iris scanner as a component of our Integrated or Synchronized system works as follows. 1. The instrument comprising of a camera, 2. Data Cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer Developed by us
Data cable is connected to iris scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and iris scanner are synchronized and integrated with each other so that they are compatible with each other. The iris scanner is ready to capture images of iris. To capture iris image it utilizes high resolution camera which provides required magnification. The images of eye iris are captured. The captured iris image is processed and stored in a storage device by Software. The iris images of both irises are stored in the database in the form of binary data with which a Unique Code (for left and right irises of an individual) is also assigned either manually or automatically. The storage process is being defined in Software.
Iris Scanner has two major functions:
1. Enrollment:- Collecting biometric data by capturing the biometric feature (left and right irises) of an individual for enrollment.
2. Identification:- Verifying or Matching or Comparing the recently or newly collected biometric data by capturing the biometric feature (either left or right iris) of an individual with the binary data stored in the database.
This iris scanner is able to capture iris through contact lens, coloured contact lens, spectacles and glares. The unique feature of this scanner is autodetection of the iris and automatic capture of the iris.
3. Working of Face;
The Face scanner as a component of our Integrated or Synchronized system works as follows. The instrument consists of three parts: 1. The instrument comprising of a camera, 2. Data cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer.
Data cable is connected to face scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and face scanner are synchronized and integrated with each other so that they are compatible with each other.
The Face camera is ready to capture images of Face. To capture face image it utilizes web or normal resolution camera which provides required magnification. An individual is present in front of face camera. The two dimensional (henceforth referred as 2-D) image of face are captured. The captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
Face camera has two major functions:
1. Enrollment:- Collecting biometric data by capturing the biometric features (face) of an individual for enrollment.
2. Identification:- Verifying or Matching or Comparing the recently or newly collected biometric data by capturing the biometric feature (face) of an individual with the binary data stored in the database.
This face scanner has an auto-detection and lag detection property which will continuously scan the face either it is identified or unidentified. This face scanner detects face only if the eyes of the individual are available during scanning, this avoids the fraud causes by cheat using a similar look mask or by doing a plastic surgery resembling same individual face, as this scan requires eyes for scanning. Another unique feature of this scanner is it doesn't recognize 2-D 3-D virtual sized photographs of the same individual placed in if front of the camera.
4. Working of Palm Scanner:
The Palm scanner as a component of our Integrated or Synchronized system works as follows. The instrument consists of three parts: 1. The Instrument comprising of Infra Red Sensors, 2. Data cable to connect as well as to transfer data / to or from the instrument to / from hardware, 3. Software Programmer.
Data cable is connected to palm scanner at one end and to hardware at other end. By using graphical user interface enrollment and identification is done. The computer system, software program and palm scanner are synchronized and integrated with each other so that they are compatible with each other.
The palm scanner is ready to capture images of left and right Palms. To capture image it utilizes a pattern image while radiating it with near-infrared rays. The deoxidized hemoglobin in the palm vein absorbs these rays, thereby reducing the reflection rate and causing the veins to appear as a black pattern. An individual will rests his or her palm on the scanner. The images of the veins of the palm are captured. The captured images are stored in storage device, software convert the scanned image and stores it in the database in the form of binary data with which a unique code is also assigned either manually or automatically.
Palm scanner has two major functions:
1. Enrollment:- Collecting biometric data by capturing the biometric feature (left and right palms) of an individual for enrollment.
2. Identification:- Verifying or Matching or Comparing the recently or newly collected biometric data by capturing the biometric feature (either left or right palm) of an individual with the stored binary data in the database.
The unique feature of this scanner is it identifies only alive individual, a dead individual cannot be identified because deoxygenated blood present both in veins and arteries which will differ from the previously recorded pattern and hence it will not identify.
5. DNA SEQUENCING: For DNA sequencing following steps are followed: A. Collection of Blood Samples
B. Isolation of Genomic DNA from Blood C. Primer design and PCR
1. Primer sequence
2. Standardization of PCR conditions using gradient PCR PCR cleanup:
The amplified PCR products were eluted and were further used for sequencing.
3. Cycle sequencing:
a. Protocol for Cleanup of PCR Product b. Cycle sequencing components c. Clean up after Cycle Sequencing
As described above all the four instruments function independently and store the data in their respective software development kit. Then program takes this input from the software and transfers all this data into the storage place created by program. Program does not allow overlapping of these images to happen as used tools to make our data tables so strong that this confusion is avoided.
After the enrollment process by the instruments is complete the individual will come to the port where his / her blood sample will be collected for DNA sequencing. This process takes a minimum of 48 hours. The sequence is 1400 bases long and it is taken only from the X or Y chromosome respectively. This sequence of 1400 bases is then entered into our program and then stored at the appropriate place.
The crux of our invention lies in integrating all the biometric instruments i.e. finger scanner, iris scanner, face scanner, palm scanner, digital signature with the DNA sequences in the same computer application.
We tried to solve many of the problems associated with the use multiple biometric devices which includes the issues related to accuracy of the instruments or biometric devices For example: the finger scanner can't take very sharp images every time so there is a possibility that the computer system misinterprets and shows us a wrong match for the same person. This can be overcome by using several biometrics of the same person to identify him / her. In case of the iris scanner, there is a peculiar problem i.e. if the distance from the camera is not appropriate the scanner gives a distorted image and that can lead to misinterpretation leading to a wrong match. The problem is again solved by using other biometric data of the same person. Our biometric system can assure a result of more than 99% matching as we are using multiple biometrics of the same individual to identify him or her.
No biometric data may be available of an individual particularly in an accident or a crime scene where only some traces of blood or hair or saliva etc. related to that individual could be obtained. In such cases DNA sequencing helps in identification by checking in our database. Inclusion of DNA sequencing in our system thus becomes invaluable.
EXAMPLE 2
In another embodiment of the invention, at least 4 biometric scanning devices are arranged in an unique way with a single usb hub connecting the same to the computer (Fig.8).
The hardware consists of two additional devices for connecting the usb of the devices as seen on the blue print of the device. The first device is a usb hub which consists of four ports to fit in the usb drive of our instruments like finger scanner, iris scanner, palm scanner and face scanner. The function of the device is to connect all the devices with the computer via the single usb cable. The instrument is just like a bridge to connect the data transfer of the image between the computer and the scanners. The microprocessor chip of the usb is designed in such a way that it connects all the instruments to the computer still keeping their individual data transfer different from each other so that they do not combine with each other or they do not send the data of that instrument into the wrong field in the computer database which can lead to a confusion and ultimately lead to a collapse of the database. The problem which we have solved by installing this system is that most of the laptops currently available in the world have space only for three usb port whereas our program requires four usb ports to connect all the hardware. Hence by this system we are saving space of two usb ports which can be utilized for others purposes such as inserting a pen drive or another type of hardware. Also it takes away 90-95% load put on computer by attaching only one usb hub instead of attaching all the instruments. The greatest advantage of all is that the conventional usb wires are only a meter long while attaching this usb hub we can make the wire at least of 5 meters (as tried and tested by us) and the data transfer speed remaining the same. The circuit consists of four hubs connected in a series connection as per ohms law. It is made unique by connecting by connecting two instruments directly with the printed circuit board will the other two by normal usb connection .What this type of connection does is that it gives us opportunity to run all the instruments simultaneously which currently no one in the world can provide with all these instruments.
Also the changes made in the printed circuit board of the multiple usb are for getting higher number of voltage from the main supply. Basically we have increased the capacity of the multiple usb hub by increasing the numbers of IC's, Capacitors, and the number of resistors has been decreased by a certain amount. This has increased the overall capacity while making the instruments consume fewer amounts of energy but making them work efficiently.
This image represents the structure for a multiple usb hub. (Fig.6)
In this modifications have been made to remove the ports while to replace with direct connections.
Now about the second hardware that is the charger system or the adapter system for our set of instruments. Actually our instruments do not consume that much power but to capture iris with high resolution we need power input of about 2-2.5 volts. So we have developed a charger cum adapter system for it even though the light is cut off it can power the instruments for a few minutes. Figure 7 depicts the figure of adapter which is powering our hardware model currently.
The design of the circuit is indigenous because we have made a unique arrangement for the data transfer of the data from the instruments to the computer. The role the hardware is transferring of data without overlapping of data between the instruments and the computer.
It is designed specifically to transfer data in a proper channel and it is done by using data cables which are retrofitted in the printed circuit board. The working mechanism is that it does not depend on the connection pins of the USB Slots of the computer as well as the device. Our circuit is planned in a very unique fashion consisting of IC's, resistors, capacitors and a microprocessor.
The data cable contains four Wires with colours White, Black, Green and Red. White and black wires of the cable are for the power supply to the instruments and Green and Red wires of the cable are for data transfer and instructions transfer from device to computer and vice versa. Any data transfer process is a power consuming process so it needs help of capacitors. The function of capacitor is generally to store charge in the form of electric current. Each capacitor is having maximum capacity of 10 microfarad for charge accumulation and maximum capacity of 5 volts for potential difference. 10 (TEN) such capacitors are installed in the circuit. The reason for installing so many capacitors is to match the requirements of total charge and potential difference of all these instruments. The number of resistors has been significantly decreased so as to provide us the boost in storing the charge in the capacitors. 3 resistors with their minimum capacity have been installed in the circuit.
The data cables are embedded in the circuit. Four separate IC's are connected to each of the four data cables. The function of IC's with the microprocessor is to control timing and the data transfer without the confusion or overlapping within the hardware or in the computer. The IC's used in the circuit are 8085, 8081 and 7805. The coding of the particular IC's is done using a language known as computer language "C" which is an universal language of programming for the IC's. Also there are middle level programming languages and assembly level languages for the programming of IC's.
The examples mentioned below are not limited to the below mentioned:
Examples:
The biometric of individuals are captured using figure scan, iris scan, face scanner, palm scanner, signature scanner and DNA scanner. This data is transfer to a processing unit where the information is processed and segregated so that no agglomeration is there in the database. The information is then passed from the processing unit to database where it is stored systematically where time of retrieval is very quick. The mode of access (output) or application can be various depending on requirement not limited to mention below:
1. Wireless Access Control
This system is a very robust system which is built to give authorized user access to restricted areas. This is a system wherein the biometrics is collected and the verified with the already enrolled data and the access is given to only verified person. This system is kept wireless so that the range of the access control system can be extended from just a few feet to kilometers. It utilizes a specially designed circuit which gives wireless access. 2. Immigration
Elimination of fake passport can be achieved with this application in aviation industry for immigration. If an individual is issued a passport from a particular county and he moves to another country and then applies for fake passport from other country, in such case when biometric are in record he tries to enroll for the identification. At such point of time such a fraud of passport duplication could be stopped.
3. Insurance
Identity theft today is the biggest threat to insurance industry. Where insurance industry cater to health and life insurance. The enrolled biometric could help to detect the health status of such individual, also to issue an life-insurance the identity of an individual. This can be stopped by enforcing biometrics which will reveal the identity of the particular individual and hence the fraud can be stopped.
For the accuracy, precision and time point of view we had used Wireless Access Control system for 10 people with different age group. There biometric were enrolled and then was identified, authenticated, and verified as mentioned below:
Table 1 : Figure enrollment data:
Figure imgf000021_0001
Table 2:Palm enrollment data:
Figure imgf000022_0001
4 10 10
9.
5 10 10
10.
Table 4: Iris enrollment data:
Time for iris Time for iris data to be Identification enrollment stored in database time
No of
seconds nanoseconds nanoseconds People
5 10 5 .
1.
6 10 5
2.
7 10 5
3.
10 5
4.
6 10 5
5.
5.5 10 5
6.
9 10 5 .
7.
8 10 5
8.
7 10 5
9.
5.5 10 5
10.
Table 5: Data and time:
Figure imgf000023_0001
21 0.9
9.
19 0.9
10.
Although illustrative embodiments have been described herein in detail, it should be noted and understood that the descriptions and drawings have been provided for purposes of illustration only and that other variations both in form and detail can be added thereupon without departing from the spirit and scope of the invention. The terms and expressions have been used as terms of description and not terms of limitation. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents. The terms or expressions herein should not be interpreted to exclude any equivalents of features shown and described or portions thereof.

Claims

1. An evolved biometric authentication system . comprising of comprises of multiple biometric, a processing unit a database and output.
2. An evolved biometric authentication system claimedin claim 1 providing high precision and more than 99% accuracy using, multiple biometrics to identify and authenticate an individual by verifying biometrics characteristic data obtained from the individual at the time of identification and authentication by comparing with the previously registered biometrics characteristic data at the time of user registration, said system comprises: multiple biometric instruments, a processing unit, a database, and means of access (output).
3. A biometric authentication system/device as claimed in claim 1 wherein multiple biometric instruments are used for collection of biometrics stable or unstable/scanner for stable biometric and unstable biometric.
4. A biometric authentication system/device claimed in claim 1 wherein the processing unit is the hardware within a computer system which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system it is with a software component either as embedded in hardware or running thereon.
5. A biometric authentication system/device claimed in claim 1 & 4 wherein the software component is being configured to code, encrypt and store the images obtained from the scanning instruments in such a manner to avoid overlapping of multiple biometric images of various individuals enabling easy, concise, and fast retrieval of desired biometric data pertaining to an individual to compare with the images obtained afresh to authenticate the identification.
6. A biometric authentication system claimed in claim 1 is an efficient and comprehensive authentication system.
7. A biometric authentication system/device claimed in claim 1 & 3 wherein the multiple scanning instruments are used in combination or simultaneously are the biometric device used to capture biometric of individual are palm scanner, iris scanner, face scanner, voice scanner, figure scanner, DNA scanner, signature scanner.
8. A biometric authentication system/device claimed in claim lwherein the database is an organized collection of data in digital form that supports processes requires running the information as required/commanded.
9. A biometric authentication system claimed in claim 1 wherein the means of access (output) is token-based identification and/or knowledge-based identification systems.
10. A biometric authentication system claimed in claim 1 wherein the said multimodal biometric device can be operated online giving its access globally.
1 1. A biometric authentication system claimed in claim 1 & 5 wherein the software component configuration for storing the images comprises of: i) creating storage place using tools stand alone application, client server application and web application
ii) Creating database in many platform and tools like SQL server or Oracle systems and many more.
12. The method of biometric identification using multimodal biometric authentication device for authenticating a user enrolled/captured biometric and its output with more than 99% accuracy, comprising the steps of ;
i) capturing the characteristics image of a biometric feature an individual. ii) process of converting, encrypting, and storing the above images in a computer/central processing unit with the help of software program in an integrated method which avoids overlapping of the multiple images an Individual as well as different individuals enabling easy, concise and fast retrieval of the desired biometric data pertaining to an individual
iii) matching, comparing and verifying the same enrolled data with the images recently or newly obtained (with one or more available scanner) to identify or authenticate his or her identification.
iv) using it with applications as output
13. The method of biometric identification of individuals according to claim 1 1 wherein images of face, finger pattern, iris pattern, signature, voice, and palm pattern are obtained by face camera, finger scanner, iris scanner, signature scanner, voice scanner and palm scanner respectively.
14. The method of biometric identification of individuals according to claim 1 1 wherein the integrated method of storing the data comprises of
i) computer programming languages and web development languages which works on all operating system platforms like Microsoft Windows, Linux / Unix, Apple's MAC OS etc.
ii) assigning unique code to all the captured characteristics image of a biometric feature images and
iii) Creating database tables in SQL Server, Oracle, MySQL, DB2, XML and Microsoft Access etc.
15. A method of biometric identification of individuals as claimed in claim 1 1 comprising the steps of: i) capturing the characteristics image of a biometric feature image of the face or finger pattern or iris pattern or palm pattern with a respective camera or scanner ii) process of converting, encrypting, and storing the above images in a computer with the help of our software program in an integrated method which avoids overlapping of the multiple images an individual as well as different individuals enabling easy, concise and fast retrieval of the desired biometric data pertaining to an individual
iii) matching, comparing and verifying the same enrolled data with the images recently or newly obtained (with one or more available scanner) to identify or authenticate his or her identification.
16. The method of biometric identification of individuals according to claim 1 1 wherein the integrated method of storing the data comprises of :
i) computer programming languages and web development languages which works on all operating system platforms like Microsoft Windows, Linux / Unix, Apple's MAC OS etc.
ii) assigning unique code to all the captured characteristics image of a biometric feature images and
iii) creating database tables in SQL Server, Oracle, MySQL, DB2, XML and Microsoft Access etc.
PCT/IN2012/000433 2011-06-17 2012-06-18 Evolved biometric system with enhanced feature and method for the same WO2013051019A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN1763MU2011 2011-06-17
IN1763/MUM/2011 2011-06-17

Publications (2)

Publication Number Publication Date
WO2013051019A1 true WO2013051019A1 (en) 2013-04-11
WO2013051019A4 WO2013051019A4 (en) 2013-07-11

Family

ID=47557426

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2012/000433 WO2013051019A1 (en) 2011-06-17 2012-06-18 Evolved biometric system with enhanced feature and method for the same

Country Status (1)

Country Link
WO (1) WO2013051019A1 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019057395A1 (en) * 2017-09-21 2019-03-28 EAZY CONNECT Ltd. Method for verifying the identity of a person and providing user data linked thereto
EP3855327A1 (en) * 2020-01-24 2021-07-28 Alitheon, Inc. Data control using digital fingerprints
US11301872B2 (en) 2016-02-19 2022-04-12 Alitheon, Inc. Personal history in track and trace system
US11321964B2 (en) 2019-05-10 2022-05-03 Alitheon, Inc. Loop chain digital fingerprint method and system
WO2022100971A1 (en) * 2020-11-11 2022-05-19 Palmpay Ag Method and system for biometric authentication for large numbers of enrolled persons
US11341348B2 (en) 2020-03-23 2022-05-24 Alitheon, Inc. Hand biometrics system and method using digital fingerprints
US11379856B2 (en) 2016-06-28 2022-07-05 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US11423641B2 (en) 2011-03-02 2022-08-23 Alitheon, Inc. Database for detecting counterfeit items using digital fingerprint records
US11488413B2 (en) 2019-02-06 2022-11-01 Alitheon, Inc. Object change detection and measurement using digital fingerprints
US11568683B2 (en) 2020-03-23 2023-01-31 Alitheon, Inc. Facial biometrics system and method using digital fingerprints
US11593503B2 (en) 2018-01-22 2023-02-28 Alitheon, Inc. Secure digital fingerprint key object database
US11636191B2 (en) 2016-07-05 2023-04-25 Alitheon, Inc. Authenticated production
US11663849B1 (en) 2020-04-23 2023-05-30 Alitheon, Inc. Transform pyramiding for fingerprint matching system and method
US11700123B2 (en) 2020-06-17 2023-07-11 Alitheon, Inc. Asset-backed digital security tokens
US11741205B2 (en) 2016-08-19 2023-08-29 Alitheon, Inc. Authentication-based tracking
US11915503B2 (en) 2020-01-28 2024-02-27 Alitheon, Inc. Depth-based digital fingerprinting
US11922753B2 (en) 2019-10-17 2024-03-05 Alitheon, Inc. Securing composite objects using digital fingerprints
US11948377B2 (en) 2020-04-06 2024-04-02 Alitheon, Inc. Local encoding of intrinsic authentication data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005008210A2 (en) 2003-05-14 2005-01-27 Polcha Michael P System and method for performing security access control based on modified biometric data
WO2006055575A2 (en) * 2004-11-16 2006-05-26 Imageware Systems, Inc. Multimodal biometric platform
WO2008121730A1 (en) 2007-03-28 2008-10-09 Prometric Inc. Identity management system for authenticating test examination candidates and /or individuals
EP2065823A1 (en) * 2007-11-26 2009-06-03 BIOMETRY.com AG System and method for performing secure online transactions
US7882032B1 (en) * 1994-11-28 2011-02-01 Open Invention Network, Llc System and method for tokenless biometric authorization of electronic communications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7882032B1 (en) * 1994-11-28 2011-02-01 Open Invention Network, Llc System and method for tokenless biometric authorization of electronic communications
WO2005008210A2 (en) 2003-05-14 2005-01-27 Polcha Michael P System and method for performing security access control based on modified biometric data
WO2006055575A2 (en) * 2004-11-16 2006-05-26 Imageware Systems, Inc. Multimodal biometric platform
WO2008121730A1 (en) 2007-03-28 2008-10-09 Prometric Inc. Identity management system for authenticating test examination candidates and /or individuals
EP2065823A1 (en) * 2007-11-26 2009-06-03 BIOMETRY.com AG System and method for performing secure online transactions

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11423641B2 (en) 2011-03-02 2022-08-23 Alitheon, Inc. Database for detecting counterfeit items using digital fingerprint records
US11301872B2 (en) 2016-02-19 2022-04-12 Alitheon, Inc. Personal history in track and trace system
US11682026B2 (en) 2016-02-19 2023-06-20 Alitheon, Inc. Personal history in track and trace system
US11593815B2 (en) 2016-02-19 2023-02-28 Alitheon Inc. Preserving authentication under item change
US11379856B2 (en) 2016-06-28 2022-07-05 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US11636191B2 (en) 2016-07-05 2023-04-25 Alitheon, Inc. Authenticated production
US11741205B2 (en) 2016-08-19 2023-08-29 Alitheon, Inc. Authentication-based tracking
WO2019057395A1 (en) * 2017-09-21 2019-03-28 EAZY CONNECT Ltd. Method for verifying the identity of a person and providing user data linked thereto
US11593503B2 (en) 2018-01-22 2023-02-28 Alitheon, Inc. Secure digital fingerprint key object database
US11843709B2 (en) 2018-01-22 2023-12-12 Alitheon, Inc. Secure digital fingerprint key object database
US11488413B2 (en) 2019-02-06 2022-11-01 Alitheon, Inc. Object change detection and measurement using digital fingerprints
US11321964B2 (en) 2019-05-10 2022-05-03 Alitheon, Inc. Loop chain digital fingerprint method and system
US11922753B2 (en) 2019-10-17 2024-03-05 Alitheon, Inc. Securing composite objects using digital fingerprints
EP3855327A1 (en) * 2020-01-24 2021-07-28 Alitheon, Inc. Data control using digital fingerprints
US11915503B2 (en) 2020-01-28 2024-02-27 Alitheon, Inc. Depth-based digital fingerprinting
US11341348B2 (en) 2020-03-23 2022-05-24 Alitheon, Inc. Hand biometrics system and method using digital fingerprints
US11568683B2 (en) 2020-03-23 2023-01-31 Alitheon, Inc. Facial biometrics system and method using digital fingerprints
US11948377B2 (en) 2020-04-06 2024-04-02 Alitheon, Inc. Local encoding of intrinsic authentication data
US11663849B1 (en) 2020-04-23 2023-05-30 Alitheon, Inc. Transform pyramiding for fingerprint matching system and method
US11700123B2 (en) 2020-06-17 2023-07-11 Alitheon, Inc. Asset-backed digital security tokens
EP4002166A1 (en) * 2020-11-11 2022-05-25 PalmPay AG Method and system for biometric authentication for large numbers of enrolled persons
WO2022100971A1 (en) * 2020-11-11 2022-05-19 Palmpay Ag Method and system for biometric authentication for large numbers of enrolled persons

Also Published As

Publication number Publication date
WO2013051019A4 (en) 2013-07-11

Similar Documents

Publication Publication Date Title
WO2013051019A1 (en) Evolved biometric system with enhanced feature and method for the same
Alsaadi Physiological biometric authentication systems, advantages, disadvantages and future development: A review
Jain et al. 50 years of biometric research: Accomplishments, challenges, and opportunities
Delac et al. A survey of biometric recognition methods
Kataria et al. A survey of automated biometric authentication techniques
Sequeira et al. MobBIO: A multimodal database captured with a portable handheld device
CN106709417A (en) Multimodal biological recognition system and use method thereof
Charity et al. A bimodal biometrie student attendance system
Tiwari et al. A review of advancements in biometric systems
Ibrahim et al. Performance analysis of biometric recognition modalities
Deriche Trends and challenges in mono and multi biometrics
Choudhary Survey of different biometrics techniques
Perwej An Empirical Investigation of Human Identity Verification Methods
Yadav et al. Multimodal biometric authentication system: challenges and solutions
CN103700151A (en) Morning run check-in method
Kumar Hand image biometric based personal authentication system
Vasavi et al. Novel Multimodal Biometric Feature Extraction for Precise Human Identification.
Orike et al. A gender and ethnicity identification system in Nigeria using the fingerprint technology
Gupta Advances in multi modal biometric systems: a brief review
Sharma et al. Personal authentication based on vascular pattern using finger vein biometric
Ennaama et al. Comparative and analysis study of biometric systems
Malik Using codes in place of Fingerprints images during image processing for Criminal Information in large Databases and Data warehouses to reduce Storage, enhance efficiency and processing speed
Manikpuri Biometric Security Systems for Beginner
Kumari et al. A novel approach for secure multimodal biometric system using multiple biometric traits
Hummel et al. Authentication Using Biometrics: How to Prove Who You Are

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12813993

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12813993

Country of ref document: EP

Kind code of ref document: A1