Random biometric authentication methods and systems

a biometric authentication and random technology, applied in the field of random biometric authentication methods and systems, can solve the problems of electronic and mechanical system security, insecure access control systems, and often forgotten pre-set codes,

Inactive Publication Date: 2002-07-11
IP VENUE LLC
View PDF17 Cites 175 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security for electronic and mechanical systems has rapidly become an important issue in recent years.
Pre-set codes are often forgotten, however, as users have no reliable method of remember them.
Writing down the codes and storing them in close proximity to an access control device (e.g., a combination lock) results in a secure access control system with a very insecure code.
Alternatively, the nuisance of trying several code variations renders the access control system more of a problem than a solution.
Password systems are known to suffer from other disadvantages.
Most users, being unsophisticated users of security systems, choose passwords that are relatively insecure.
Unfortunately, passwords and cards have the same drawbacks when used for building security as when used for computer security.
Unfortunately, along with this increased accessibility comes increased potential for security problems.
As indicated above, however, passwords and PIN numbers may be forgotten or may fall into the wrong hands.
Additionally, using passwords and PIN numbers for security purposes places an additional burden on institutions because passwords or PIN numbers require additional machinery and human resources to deal with customers when customers forget passwords or PIN numbers, or when customers request that passwords or PIN numbers be changed.
For doorway security systems, biometric authentication systems have many known problems.
Remembering a PIN can be inconvenient and the device needed to accept a PIN are sometimes subject to damage and failure.
The device is also an additional expense in a doorway access system.
Since a single processor can provide processing for several doors, for a multiple doorway system, the PIN entry unit forms a significant portion of the overall system cost.
Typically when using a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random biometric authentication methods and systems
  • Random biometric authentication methods and systems
  • Random biometric authentication methods and systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of particular applications and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention.

[0044] Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with principles and features disclosed herein. Although preferred embodiments of the present invention are described herein, those skilled in the art can appreciate that a number of varying embodiments may be implemented in accordance with the present invention.

[0045] FIG. 1 depicts a block diagram illustrating components of an electronic system 12 associated with a database or memory co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Methods and systems for biometrically securing access to electronic systems. A user prompted to input to the electronic system at least one biometric attribute randomly selected from a user profile containing biometric attributes of the user. A user may be prompted to input such a biometric sample through a user interface integrated with the electronic system. A user may be permitted to perform a user-desired activity, such as accessing an ATM machine, particular data, or entry to a secure area, if at least one biometric attribute input by the user to the electronic system matches at least one biometric attribute randomly selected from the user profile. A user profile may be generally accessible from a server through the electronic system. A user profile may also be accessible from a biometric broker through the electronic system over a secure network connection. A user profile may also be accessible from a hand held device, such as a smart card, wireless PDA or wireless communication device.

Description

[0001] 1. Technical Field of the Invention[0002] The present invention relates to authentication for and security of electronic systems, such as computers, kiosks, wireless devices, associated fixed and wireless networks, and mechanical systems, such as secure buildings. The present invention also relates to the use of biometric data for authenticating user identity and providing secure user access to data and / or transactions.[0003] 2. Description of the Related Art[0004] Security for electronic and mechanical systems has rapidly become an important issue in recent years. With the proliferation of computers, computer networks and other electronic device and networks into all aspects of business and daily life, the concern over secure file and transaction access has grown tremendously. The ability to secure data and transactions is particularly important for financial, medical, education, government, military, and communications endeavors.[0005] Using passwords is a common method of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/32
CPCH04L63/0861H04L2463/082H04L63/102H04W12/06
Inventor ORTIZ, LUIS M.
Owner IP VENUE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products