Personal authentication system and personal authentication method

An authentication system and authentication method technology, which are applied in the fields of digital data authentication, character and pattern recognition, image data processing, etc., can solve the problems of low authentication accuracy, and achieve the effect of improving authentication accuracy.

Inactive Publication Date: 2009-08-26
OKI ELECTRIC IND CO LTD
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the above-mentioned system, even if the same user obtains different standardized images when the direction of sight is differe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal authentication system and personal authentication method
  • Personal authentication system and personal authentication method
  • Personal authentication system and personal authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0062]

[0063] Such as figure 2 As shown, the personal authentication system according to the embodiment of the present invention is composed of a registration device 10 , a biometric information database (DB) 20 connected to the registration device 10 via a network 40 , and an authentication device 30 . Here, the personal authentication system of the present invention is used, for example, in an electronic door unlocking system of a building of a company or a research facility.

[0064] Here, to simplify the description, figure 2 Only one authentication device 30 is shown, but a plurality of authentication devices 30 having the same functions as the authentication device 30 are connected to the network 40 .

[0065] The registration device 10 is a device operated by a registration applicant in order to perform a registration procedure as a user of the personal authentication system, and the registration device 10 has a communication unit 11 connected to the network 40, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A personal authentication system comprises an imaging section for capturing an image of a user's eye including the iris; pupil/iris region extraction section for extracting a pupil region and an iris region from the captured image; a three-dimensional polar coordinate image creation section for estimating the three-dimensional center position of the eyeball based on the extracted pupil region and iris region and for creating a three-dimensional polar coordinate image by converting the iris region into three-dimensional coordinates with reference to the center position of the eyeball; and a three-dimensional polar coordinate image coding section for creating a three-dimensional polar coordinate image code formed by extracting and coding a characteristic of the created three-dimensional polar coordinate image. The personal authentication system can create iris information highly accurately representing characteristics of a user's iris independent of the direction of line of sight of the user.

Description

technical field [0001] The present invention relates to a personal authentication system and a personal authentication method for verifying the user's identity by checking iris information acquired from a user with registered iris information registered in advance by the user. Background technique [0002] Conventionally, in a personal authentication system using iris information for personal authentication, as disclosed in Patent Document 1, for example, the boundary (inner boundary) between the pupil and the iris and the boundary between the iris and the iris are extracted from an image of the user's eyes. In the iris area surrounded by the boundary of the sclera (outer boundary), in order to correct the positional deviation between the pupil and the center of the iris in the iris area due to the influence of the user's line of sight orienting obliquely during photography, the inner boundary is generated using a linear transformation. The normalized image after two-dimensi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T7/00
CPCG06K9/00604G06F21/32G06T19/00G06V40/19G06T7/40G06F18/00
Inventor 藤井明宏藤根俊夫
Owner OKI ELECTRIC IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products