WO1991006920A1 - Non-minutiae automatic fingerprint identification system and methods - Google Patents

Non-minutiae automatic fingerprint identification system and methods Download PDF

Info

Publication number
WO1991006920A1
WO1991006920A1 PCT/US1990/006172 US9006172W WO9106920A1 WO 1991006920 A1 WO1991006920 A1 WO 1991006920A1 US 9006172 W US9006172 W US 9006172W WO 9106920 A1 WO9106920 A1 WO 9106920A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
numerical identifier
person
minutiae
image
Prior art date
Application number
PCT/US1990/006172
Other languages
French (fr)
Inventor
Patricia C. Gagne
Carol M. Puterko
Original Assignee
Tms, Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tms, Incorporated filed Critical Tms, Incorporated
Publication of WO1991006920A1 publication Critical patent/WO1991006920A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints

Definitions

  • the invention system and related methods are directed to the automatic identification of fingerprints by video scanning and digitizing analysis of the scanned fingerprint, and to the general field of verification of the identity of a person to be identified, such verification being accomplished by comparing a non-minutiae digitized numeric identifier indicative of a fingerprint of a person to be identified with a numeric identifier recorded within the confines of a portable personnel identification means, personal to the person to be identified, which identification means can be of numerous kinds such as a retail credit card, a smart card, or others as set forth hereinafter.
  • the numeric identifier of such portable personnel identification means is previously derived in accordance with the teachings of the present invention and then recorded within the identification means to enable identity verification, accomplished by comparison.
  • the system invention and the inventive methods utilized therein and related thereto, satisfy this long felt need for methods and means for providing automatic verifiable identification of an individual submitting him or herself for identification for the purpose of: retail credit card purchases, authorized entry, check cashing, obtaining a driver's license, showing proof of age via a driver's license, verification of the identity of a holder of a passport, etc.
  • a further great need is the development of such a system and methods for providing a verifiable fingerprint identifier which is most applicable to and recordable within a magnetic-stripe of a portable personnel identification card means, such as a magnetic stripe of a credit card.
  • the least number of bytes within a verifiable fingerprint identifier is a 400 byte numeric identifier developed by FINGERMATRI . This known development is not at all applicable to a portable personnel identification card of the magnetic-stripe type for reasons well known to those skilled in this art.
  • the invention includes the actual taking of an individual's fingerprint via an inkless means each time an identification is to be made.
  • the print can be taken of any digit of a person, i.e. index finger or thumb or toe, and the image of a digitprint is video scanned to produce image data which is digitized in accordance with the teachings of the invention to produce a non-minutiae digitized numerical identifier indicative of the digit print image, and this digitized numerical identifier is compared with a numerical identifier read from an identification card means identifying the person to be identified, to verify the identity of that person.
  • the invention by utilizing an unchanging characteristic of an individual for making an identification, is not subject to obsolescence and at the same time may be constructed at various levels of sophistication depending on the degree of security of reliability which is desired.
  • the system can be made an integral part of other systems in which information about individuals is taken and recorded and the system can be so constructed with controls that provide for immediate revocation of the privileges of benefits given any individual identified in the system.
  • It is also another object of the invention to provide a method for the automatic non-minutiae identification of a fingerprint of a person to be identified which includes a method for determining the location of the fingerprint image data stored in a memory means with the whitespace data produced by scanning an image of a fingerprint, and to define a fingerprint or digitprint identity window so as to define a predetermined "area of analysis", which area is defined depending on the specific needs of the end-user application, and with respect to a predetermined "window-size", to enable defining the dimensional area of the fingerprint identity window.
  • FIG. 1A shows an inkless framed format having produced thereon an image of a fingerprint.
  • FIG. IB shows the inkless framed format holder means which is mounted on the face of the system housing.
  • FIG. 2 shows the predetermined position orientation of a video scanning camera and a 16 mm lens to the center of an inkless framed format positioned within the framed format holder means.
  • FIG. 3 shows a portable personnel identification card of the magnetic-stripe kind.
  • FIG. 4 is a flow diagram of the system manual and hardware flow of the present invention.
  • FIG. 5 is a flow diagram of the software process of fingerprint identification verification of the present invention.
  • FIGS. 6A and 6B is a combined flow chart diagram of the manual, firmware and software process flow of the present invention.
  • FIGS. 7A, 7B, 8A, 8B-, 92_, 9B-, 10A, and 10B jointly depict the Image Frame Sizing Routine of the invention, wherein the respective method steps are shown in two forms.
  • FIGS. 7A, 8A, 9A, and 10A illustrate the values computed in reference to a fingerprint image produced on an inkless framed format means; and FIGS. 7B,
  • 8B, 9B and 10B provide illustrations of how the respective values are determined from the performance of their respective method steps which are performed on the digital fingerprint image and whitespace data stored in the memory means of the video digitizer, in accordance with the teachings of the present invention.
  • FIGS. 11A and 11B depict in a fashion similar to
  • FIGS. 7 - 10 a method step of the Algorithm Data
  • FIG. 12 illustrates the computation of count SI.
  • FIG. 13 illustrates the computation of count S2.
  • FIG. 14 illustrates the computation of count Yam.
  • FIG. 15 illustrates the computation of count Ybm.
  • FIG. 16 illustrates the computation of count Ya.
  • FIG. 17 illustrates the computation of count Yb.
  • FIG. 18 illustrates the computation of count Yc.
  • FIG. 19 illustrates the computation of count Xam.
  • FIG. 20 illustrates the computation of count Xbm.
  • FIG. 21 illustrates the computation of count Xa.
  • FIG. 22 illustrates the computation of count Xb.
  • FIG. 23 illustrates the computation of count Xc.
  • FIG. 24 depicts a block diagram of the system invention.
  • FIG. 25 illustrates the System Bus Pinout diagram for interconnection of the digitizer 10 to the MMZ8 edge connector Z8.
  • FIG. 26 illustrates the MMZ8 bus pin configuration interconnections of processor 20 and the Z8 edge connector via J4.
  • FIG. 26A illustrates the interconnections of LCD
  • FIG. 27 illustrates a console serial connector Jl which is utilized to interconnect the PPI/MS Reader 60 with processor 20.
  • FIG. 28 illustrates the serial printer connector
  • FIG. 29 illustrates one embodiment of the system invention employed in application pertaining to personnel identity verification, which embodiment incorporates the use of PPI/MS Reader 60.
  • FIG. 30 illustrates a second embodiment of the system invention employed in an application pertaining to personnel identity verification, which embodiment incorporates the use of a smart card identification means.
  • FIG. 31 Illustrates a third embodiment of the system invention employed in an application pertaining to check cashing-personnel identity verification of check payee, which embodiment incorporates the use of PPI/MS Reader 60 and printer means 50.
  • FIG. 32 illustrates the connection of printer 50 to the processor 20.
  • FIG. 33 is a flow diagram of a firmware/software control process of the present invention.
  • FIG. 34 is a flow diagram of a software process of the invention for card initialization.
  • minutiae is either: (1) a bifurcation, which is the location where a given line forks into different lines; or (2) a ridge ending.
  • Minutiae are usually recorded with three coordinates: two coordinates "x” and "y” for the position of the minutiae relative to a coordinate system: and one coordinate "a", which is an angle representing the average direction of the lines around the minutiae point.
  • non-minutiae based and either provide or utilize a non-minutiae digitized numerical identifier which is uniquely related to the pattern of a fingerprint it identifies.
  • the non-minutiae digitized numerical identifier is provided by selectively analyzing different parts of a fingerprint and deriving from each part a byte numeric which is directly related to the ridge count computed for that part.
  • This non-minutiae digitized numerical identifier can also be described as a "verification string”.
  • digitizing is used herein to refer to the process by which the non-minutiae digitized numerical identifier is derived by the respective invention methods disclosed herewith; and, the term “digitized” is used herein to identify the non-minutiae numerical identifier derived by such process.
  • the "ridge counts” are computed by analyzing or examining selected horizontal and vertical and diagonal memory data lines of the fingerprint identity window defined by the present invention, and counting the number of greylevel shifts from "white” (greylevels 13, 14 or 15) to "black” (greylevels 0 through 12) .
  • the video digitizer of the system invention is the means employed for converting the video scanned fingerprint image data (FID) and whitespace data into digital data to generate within its memory a digitalized picture of that scanned by the video scanner, i.e. the inkless format providing an image of a fingerprint of a person to be identified; but, it is the software-controlled processor means of the invention which functions to selectively analyze the digital data to provide a digitized numerical identifier indicative of the fingerprint image.
  • the present invention discloses an inventive method step termed "image framing" wherein, prior to selectively analyzing different parts of the fingerprint image data and prior to defining a fingerprint identity window, the fingerprint image and whitespace digital data stored in an addressable memory means (RAM) , located in the video digitizer, are framed to a predetermined dimension, and the location of the fingerprint image data stored in this memory means with whitespace data is determined by determining: (1) X-START and X-END values to indicate the start and the end of the fingerprint image data along the X-axis, and (2) Y-START and Y-END values to indicate the start and end of the fingerprint image data along the Y- axis.
  • the "image framing" invention method also includes an "image frame sizing” step which essentially frames the digital fingerprint and whitespace image data contained in memory.
  • the "fingerprint identity window” defined by the present invention is the "area of analysis” defined within the fingerprint image data stored in memory. It is this fingerprint identity window which is selectively scanned and analyzed in accordance with the teachings of the present invention, to provide a non-minutiae digitized numerical identifier indicative of the fingerprint image data of a fingerprint of a person to be identified.
  • the "fingerprint identity window” is defined depending on the specific needs of the end-user application, and is set by determining a "window-size”.
  • the purpose of the "verification string” is to provide a tailorable degree of certainty into the comparison of encoded data on i.e., the magnetic stripe of a credit card, or other article presented by an individual used as a personal identification means, and the individual's fingerprint image.
  • verification string can be variable in size, depending on multiple factors.
  • the invention affords the provision of a verification string (or digitized numerical identifier) which has less than 400 bytes of fingerprint identification data, or one having less than 100 bytes of FID as applicable to a magnetic stripe credit card or a smart card or other personal identification card means, or, in particular, an identifier having only 24 bytes of FID which as disclosed in a preferred method and embodiment of the present invention is uniquely applicable to the magnetic stripe of a credit card.
  • An “element” is a calculated value, generated by the end-user application.
  • a first factor is the size of the "window” in which image analysis is performed.
  • the larger the window the more verification data can be generated for comparison purposes. Since the "window” is variable depending on end- user applications, the size of the verification string can vary as well. Thus, it is reasonable to say that increasing the "window-size” used in verification string generation presents the opportunity to increase the number of elements which comprise the verification string.
  • a second factor is the formulas or calculations used to generate or calculate the verification string.
  • the calculations performed to generate the verification string can vary from one end-user application to another. Any mathematical formula or statistical computation based on ridge counts, whether individually or as a sum, can be used as an element in the verification string data matrix which is compiled.
  • each element within the verification string could be different from one application to another. For instance, one application might use Yc (Y Center Line Count) as a value for the seventh element of the verification string, as disclosed herein, and yet another application may use the same value in another element of its verification string.
  • Yc Y Center Line Count
  • a preferred form of the present invention system and methods combinatively utilize an inkless media for the purpose of taking or providing an image of a fingerprint or digitprint.
  • An image of such print is produced by placing a digit of the person to be identified within a 2" x 2" framed format 1 as shown in FIG. 1A, which contains a treated material which when touched by a finger, utilizing an inkless process, causes immediate development of an image of a fingerprint of such finger in a black and white appearance, to provide a good quality scannable image of a fingerprint.
  • This inkless means for taking a fingerprint of a person to be identified overcomes the disadvantages of conventional fingerprint taking techniques.
  • the inkless framed format 1 is placed within a format holder 3 which is mounted on the face plate of the system housing.
  • the placement of the inkless framed format within the format holder 3 is illustrated in FIG. IB.
  • FIG. 2 shows the predetermined position orientation of a video scanning camera 4 and a 16 mm lens 5 associated therewith, to the center of the inkless framed format when it is positioned within the format holder.
  • the center 6 is the center of the inkless media 2 bearing the fingerprint image.
  • a preferred predetermined distance of 2 1/2 inches is set between the center 6 and the face of lens 5.
  • this provides means by which a fingerprint may be positioned automatically in relation to a video scanning system, in such a way that the position is unique and will be reestablished each time that the framed format 1 is placed within the format holder and thus within the field of scan of the video scanner, to insure that any subsequent scanning operation will always produce proper and desirable results.
  • the framed format 1 is placed within the holder 3 with the fingerprint image facing the housing face plate and towards the field of view of the video scanner. It is to be noted that in an effort to diminish background reflection of light from the framed format 1, the framed portion has been blackened, as shown in, for example, FIG. 7A.
  • the image of a fingerprint is video scanned to produce image data which is provided to a digitizer which converts the image data into digital image data which is stored in an addressable memory means (RAM) of the digitizer.
  • a sequence of commands are issued to the digitizer's "command port". This command sequence is specific to each end-user application. After these commands are issued, the digital fingerprint image and whitespace data generated by the scanning procedure and contained in memory in the digitizer, is ready for analysis.
  • the controlling firmware of the invention system has several components, each of which perform a specific task which, when combined, provide a series of processes that will take a fingerprint sample and verify it against verification data to insure the authenticity of the provider of the sample. These processes include the following routines:
  • Comparison Data Retrieval Routine This routine controls receipt of the Provider's verification data recorded on the identification card means, which is compared against data computed from the fingerprint sample to approve or fail the Provider's authenticity.
  • the verification data could be encrypted and this will be discussed in a following disclosure section, along with an associated decryption function.
  • the verification data (also termed "non-minutiae numerical identifier") recorded within the identification card means is read and stored in a 12 element array which is located in the processor of the invention system. This matrix has the same layout as the Generated Data Matrix which will be discussed subsequent to the following.
  • Image Frame Sizing Routine - This routine is generated subsequent to the Image Capture Routine which controls the operation of the video camera and the digitizer to capture the fingerprint image and whitespace data in memory. With reference to FIGS. 7A and 7B, this is accomplished as follows:
  • Whitespace is defined as a greylevel equal to 13, 14, or 15.
  • X-START is determined by scanning Frame Locations (X,Y), where 0 ⁇ X ⁇ 255 and Y-TOP ⁇ Y ⁇ Y-BOTTOM. This value indicates where the Image "starts" on the X-Axis.
  • X-END is determined the same way, only reversing the X-Axis scan direction from 255 > X > 0, to determine where the Image "Ends" on the X-axis, d)
  • the Y-Axis range of the FID needs to be computed. This is accomplished in a method similar to that used for the X-Axis Range.
  • Each row (horizontal line) is scanned, and, syncing on three consecutive whitespace rows, the next row that contains a greylevel other than whitespace is considered to be part of the image.
  • Y-START is determined by scanning Frame Locations (X,Y) , where X-START ⁇ X ⁇ X-END and Y-TOP ⁇ Y ⁇ Y-BOTTOM.
  • Y-END is determined in similar fashion, only different being that the direction of scan along the Y-Axis is from Y-BOTTOM > Y > Y-TOP.
  • FIGS. 10A and 10B all values generated must be validated to insure that an accurate image has been scanned and sized. If any of the following conditions fail, a "Poor Image Quality" error is generated, and the system recycles.
  • the fingerprint sample is considered to have been accurately scanned and sized.
  • the area within the memory frame where the fingerprint image data exists can be illustrated as shown in FIG. 10B.
  • XC,YC XC and YC, or more appropriately called X-Center Line and Y-Center Line, are determined from values generated in the Image Sizing Routine, according to the following formulas:
  • XC X-END - (X-END - X-START) / 3 YC « Y-END - (Y-END - Y-START) / 2
  • the difference between the two calculations is based upon the knowledge that the lower portion of a person's fingerprint (i.e., the portion containing the whirl) will be located closer to X-END than X-START.
  • the XC value should start in the rightmost third of the print (hence, the division by 3) as that is where the whirl is likely to exist in the digitalized image.
  • YC is simply determined to be the standard Center Line between the two Y points on the frame's Y-Axis.
  • (XC,YC) would be defined as (150,100).
  • the "area of analysis” can easily be defined to the ADGR mainline routine. This area is defined depending on the specific needs of the end-user application, and is set by determining a "window-size". The "window-size" is always an odd number.
  • ADGR Data Generation Routine
  • This routine generates a count of ridges contained on the diagonal line drawn from point (Xs,Ye) to (Xe,Ys) . Since the "window" is an absolute square, this relationship is a one-for-one increment along the Y-Axis for each decrement along the X-Axis, starting at Xs, and ending at Xe. Value #3: Yam ; Y-Axis A-Range Maximum Absolute Count (FIG. 14)
  • This routine yields the highest number of ridges found on a horizontal line in the Y-Axis "A-Range".
  • the Y- Axis "A-Range” is defined as: Ys ⁇ horizontal line ⁇ YC.
  • This routine yields the number of highest number of ridges found on a horizontal line in the Y-Axis "B- Range".
  • the Y-Axis "B-Range" is defined as: YC ⁇ horizontal line ⁇ Ye.
  • This routine yields the total number or ridges found on horizontal lines in the Y-Axis "A-Range".
  • this "overall total” is stored as two numbers, Ya ⁇ and Ya ⁇ .
  • Ya ⁇ is the total number of 256 ridges in the "overall total” (i.e.: if Ya ⁇ is "2", then there are at least 512 ridges in the "overall total”) .
  • Ya ⁇ is the remaining number of ridges counted (i.e.: 6) which is always a number under 256.
  • the Y-Axis "A-Range” is defined as: Ys ⁇ horizontal line ⁇ YC. In the example of FIG. 16, if the horizontal lines summed to 516, the value of "Ya ⁇ ” would be set to "2", and the value of "Ya ⁇ ” would be set to "4".
  • the "A- Range” is indicated with single-line borders.
  • This routine yields the total number of ridges found on horizontal lines in the Y-Axis "B-Range".
  • this "overall total” is stored as two numbers, Yb ⁇ and Yb ⁇ .
  • Yb ⁇ is the total number of 256 ridges in the "overall total” (i.e.: if Yb ⁇ is "2", then there are at least 512 ridges in the "overall total") .
  • Yb ⁇ is the remaining number of ridges counted (i.e.: 6) which is always a number under 256.
  • the Y-Axis "B-Range” is defined as: YC ⁇ horizontal line ⁇ Ye.
  • This routine yields the number or ridges found on the horizontal line on the Y-Axis defined as YC, or Y- Center Line. This would be a whole number, such as 7, if 7 ridges were counted on the Y-Center Line.
  • This routine yields the number of highest number of ridges found on a vertical line on the X-Axis "A-Range".
  • the X-Axis "A-Range” is defined as: Xs ⁇ vertical line ⁇ XC.
  • the value of "Xam” would be set to "15", assuming that no other vertical line contained a ridge count greater than 15.
  • the "A-Range” is indicated with single-line borders.
  • This routine yields the number of highest number of ridges found on a vertical line in the X-Axis "B-Range".
  • the X-Axis "B-Range” is defined as: XC ⁇ vertical line ⁇ Xe.
  • the X-Axis "A-Range” is defined as: Xs ⁇ vertical line ⁇ XC. In the example of FIG. 21, if the vertical lines summed to 516, the value of "Xa ⁇ ” would be set to "2", and the value of "Xa ⁇ ” would be set to "4".
  • the "A-Range” is indicated with single-line borders.
  • This routine yields the total number of ridges found on vertical lines in the X-Axis "B-Range".
  • this "overall total” is stored as two numbers, Xb ⁇ and Xb ⁇ .
  • Xb ⁇ is the total number of 256 ridges in the "overall total” (i.e.: if Xb ⁇ is "2", then there are at least 516 ridges in the "overall total") .
  • Xb ⁇ is the remaining number or ridges counted (i.e.: 6) which is always a number under 256.
  • the X-Axis "B-Range” is defined as: XC ⁇ vertical line ⁇ Xe.
  • This routine yields the number of ridges found on the vertical line on the X-Axis defined as XC, or X-Center Line. This would be a whole number, such as 17, if 17 ridges were counted on the X-Center Line.
  • the first element in the GDM is equal to the value of the first number in the AOD (Algorithm Output Data) .
  • This element is known as "SI”, or the “Diagonal ⁇ Absolute Count”.
  • the second element in the GDM is equal to the value of the second number in the AOD. This element is known as "S2”, or the "Diagonal / Absolute Count”.
  • the third element in the GDM is equal to the value of the third number in the AOD. This element is known as "Yam”, or the "Y-Axis A-Range Maximum Absolute Count”.
  • the fourth element in the GDM is equal to the value of the fourth number in the AOD. This element is known as "Ybm", or the "Y-Axis B-Range Maximum Absolute Count”.
  • the fifth element in the GDM is a calculated value using the fifth and sixth numbers in the AOD. The calculated value can be indicated as follows:
  • the computation is equal to the fifth number in the AOD multiplied by 256, plus the sixth number in the AOD.
  • the result is then divided by _ the window size to give the calculated value.
  • This element is known as "Ya”, or the "Y-Axis A-Range Average Count”.
  • the sixth element in the GDM is a calculated value using the seventh and eighth numbers in the AOD. The calculated value can be indicated as follows:
  • the computation is equal to the seventh number in the AOD multiplied by 256, plus the eighth number in the AOD.
  • the result is then divided by h the window size to give the calculated value.
  • This element is known as "Yb”, or the "Y-Axis B-Range Average Count”.
  • the seventh element in the GDM is equal to the value of the ninth number in the AOD. This element is known as "Yc”, or the "Y-Axis Center Line Absolute Count".
  • the eighth element in the GDM is equal to the value of the tenth number in the AOD. This element is known as "Xam”, or the "X-Axis A-Range Maximum Absolute Count”.
  • the ninth element in the GDM is equal to the value of the eleventh number in the AOD. This element is known as "Xbm”, or the "X-Axis B-Range Maximum Absolute Count”.
  • the tenth element in the GDM is a calculated value using the twelfth and thirteenth numbers in the AOD.
  • the computation is equal to the twelfth number in the AOD multiplied by 256, plus the thirteenth number in the AOD.
  • the result is then divided by h the window size to give the calculated value.
  • This element is known as "Xa”, or the "X-Axis A-Range Average Count”.
  • the eleventh element in the GDM is a calculated value using the fourteenth and fifteenth numbers in the AOD.
  • the calculated value can be indicated as follows:
  • the computation is equal to the fourteenth number in the AOD multiplied by 256, plus the fifteenth number in the AOD.
  • the result is then divided by h the window size to give the calculated value.
  • This element is known as "Xb”, or the "X-Axis B-Range Average Count”.
  • the twelfth element in the GDM is equal to the value of the sixteenth number in the AOD. This element is known as "Xc”, or the "X-Axis Center Line Absolute Count".
  • This routine is responsible for comparing the Comparison Data Matrix (CDM) against the Generated Data Matrix (GDM,) and determining if the fingerprint sample given by the Provider mathematically matches the verification data on the Provider's portable personnel identification means.
  • CDM Comparison Data Matrix
  • GDM Generated Data Matrix
  • Each element of the CDM is compared against its counterpart in the GDM. That is, the first element of the CDM is compared against the first element of the GDM, the second element of the CDM is compared against the second element in the GDM, and so on.
  • the absolute difference between elements is limited to specific pre-defined "tolerances". These tolerances will vary from application to application, depending on the needs of the end-user. An end-user who wants very strict regulation would have lower tolerances than an end-user who wants average regulation. In other words, one end-user may want ⁇ 3 tolerance whereas another might want ⁇ 1 tolerance.
  • the first through seventh elements will always have one level of tolerance higher than the eighth through twelfth elements. In other words, if the eighth through twelfth elements are measured with a ⁇ 2 tolerance, then the first through seventh elements will have a tolerance of ⁇ 3.
  • a "confidence level” has to be achieved. This confidence level starts at zero. When each CDM/GDM element is compared, and the difference falls within the acceptable tolerance, then the confidence level is increased by 8.33%.
  • the actual confidence level that must be achieved in order for a fingerprint to be "approved” is again determined by the specific application.
  • One end-user might want a higher confidence level than another end-user.
  • the 24 byte non-minutiae digitized numerical identifier is recordable within the confines of a portable personnel identification means and in particular, the magnetic stripe of a credit card to allow the credit card to be used as an identification card for entitling the user to certain services, as for example, charged purchases and check cashing.
  • This digitized numerical identifier can also be stored in a memory means included in a smart card.
  • TRACK 1 maximum of 79 alphanumeric characters TRACK 2 maximum of 40 characters, numeric only TRACK 3 maximum of 107 alphanumeric characters
  • ATM Automatic Tellers
  • Verification String encryption routines can take a myriad of forms. Each scheme is application dependent, meaning that a scheme used for one application will not be used in a similar application - thus reducing the possibility of fraud. Since the scheme for each application is different, and bound in the verification firmware EPROMS, the possibility of unauthorized card duplication is reduced, as duplicated cards for one application would not yield valid verification data in another application.
  • Two exemplary encryption schemes are as follows:
  • This complement scheme has the same affect as taking each of the twelve numbers and subtracting each number from ninety-nine (99) to achieve the "encrypted" value.
  • the user only need to subtract 9 from each of the 24 encrypted digits to achieve the original number (ignoring the negative sign) .
  • data encryption will vary from application to application, to avoid multiple applications from having similar verification data, and thus introducing potential misuse of the encrypted verification data.
  • the encryption method is decided in advance, and appropriate decryption logic is programmed into the Comparison Data Retrieval Routine, such that the decrypter logic and means of implementation are contained in the BCC52 processor of the system invention.
  • the Provider in addition to providing a fingerprint sample, the Provider also presents identification card means (i.e., identification card with a magnetic stripe) which contains his or her encrypted verification data (i.e., encrypted digitized numerical identifier) , the identification card is then placed in the card reader for retrieval and decryption of the "comparison data".
  • identification card means i.e., identification card with a magnetic stripe
  • his or her encrypted verification data i.e., encrypted digitized numerical identifier
  • the “comparison data” is stored in a 12 element array, known as the “Comparison Data Matrix”, which has the same layout as the “Generated Data Matrix” presented hereinbefore.
  • error messages are specific to the individual application (i.e., a system with a magnetic stripe card reader would have a "Card Reader Error” or a "Channel Read Error” error message) .
  • the encrypted identifier could also be included on a check payable within a check cashing identity verification application of the present invention.
  • the present invention is applicable to: recording an encrypted or non- encrypted non-minutiae digitized numerical identifier within the confines of a portable personnel identification means, personal to a person, such as a credit card or a smart card, identity verification of a person to be identified with or without an encryption scheme, and payable check verification of identity of payee, with or without encryption.
  • two services could be performed: (1) direct or indirect personal contact with the persons to be identified, deriving non-minutiae digitized numerical identifiers indicative of the fingerprints of such persons, and recording the non- minutiae digitized numerical identifiers within identification means, personal to such persons; or (2) performing such a service but providing the derived non- minutiae digitized numerical identifiers to another party for the performance of the recording procedure.
  • the check payable could include a numerical identifier to be verified with a digitized numerical identifier indicative of a fingerprint of a check payee named on the check payable, or preferably no numeric identifier would be included on the check payable and verification of the identity of the person submitting the check payable in a check cashing application would be accomplished by verification of comparison of a non- minutiae digitized numerical identifier indicative of a fingerprint of a person submitting the check for cashing, with the numerical identifier contained within a portable personnel identification means submitted by such person for identification as the check payee of the check payable.
  • FIG. 24 is a block diagram of the invention system which shows the basic interconnection of the system components including the video camera 4, and the accessories LCD display 40, printer means 50, and PPI/MS Reader 60.
  • An illustrative power supply means PS for providing appropriate voltage supply to the system components is also shown.
  • the system invention can be embodied in three specific configurations which differ from each other as to the application of the system invention and the components utilized for a respective application.
  • Each of the three embodiments incorporate the following: an inkless framed format holder means 3, video scanning means 4, lens 5, digitizer 10, processor 20, LCD driver means 30, a four- slot motherboard bus connector Z8, and a portable personnel identification card reader means 60.
  • Video scanner 4 scans an inkless format means providing an image of a fingerprint of a person to be identified, after this fingerprint image format 1 is placed within the inkless format holder means 3 which automatically positions the format 1 in relation to the video scanner 4 in such a way that the position is predetermined and will be reestablished each time that a print format means is placed before the video scanner, thus insuring that a subsequent scanning operation will always produce consistent and reliable field of scan results.
  • the video scanner 4 is connected to digitizer 10 via a shielded coaxial cable 9.
  • the video scanner 4 receives power from the 120 volts AC supply, and a ground is provided via line 7 from pin 2 of Z8.
  • the video scanner scans the image of a fingerprint provided on an inkless means 2 to produce fingerprint image data and whitespace data which is outputed to the video digitizer board 10.
  • the primary function of the video digitizer board 10 is to convert the fingerprint image and whitespace data signals from the video scanner into digital image data i.e., numerical data, which digital image data is stored in an addressable memory means, RAM, included in the digitizer 10.
  • the stored digital image data is then available to the system program-controlled processor 20 for evaluation of the scanned image data information.
  • the scanned image data information contained in the video camera output signal is made up of discrete points of picture elements, commonly called pixels. Each pixel varies in brightness, depending on the image scanned, through a range of "grey levels" from black to white. In digitizer 10, these grey levels are separated into 16 numerical values from 0 (black) to 15 (white) . Each horizontal line of the image data being viewed contains 256 pixels and the circuitry of the digitizer samples 256 lines. This results in 65,536 pixels or discrete numerical values that the digitizer must store in its random access memory means. Since the pixels are supplied in a scanning sequence (from left to right in the viewed image) it is necessary that the sampling in some subsequent storage of the pixel values be synchronized with camera scanning sequence. Signals are provided, along with the fingerprint image and whitespace data outputed from the camera. These combined signals, image and sync, are commonly referred to as "composite video”.
  • Circuit means of the digitizer functions to extract both horizontal (line) and vertical (frame) synchronization signals.
  • Other circuitry of the digitizer 10 allows the system microprocessor 20 to control a variety of functions under software control.
  • the primary function of the digitizer 10, as referred to earlier, is to convert the scanned image data into numerical values for later evaluation by the software controlled processor.
  • the operation of the digitizer 10 of the invention is well known to those skilled in the art and a specific designation of a digitizer utilized in the system invention is presented hereinafter along with designations for the other components incorporated into the present system.
  • the program-controlled processor means 20 selectively analyzes a plurality of different fingerprint pattern parts of the digital image data contained in the digitizer, and the processor includes means for accomplishing the inventive methods set forth in the foregoing, such as means for computing a ridge count for each of the plurality of selectively analyzed different fingerprint pattern parts, means for compiling a data matrix comprised of ridge counts computed for these different fingerprint pattern parts, means to provide a non-minutiae digitized numerical identifier indicative of the image of the fingerprint of a person to be identified, and means for comparing the numerical identifier provided by the card reader 60 with the non-minutiae digitized numerical identifier, to verify the identity of a person to be identified.
  • Reference to the foregoing description will also provide information as to the other inventive methods of the invention such as that set forth for Image Capture, Image Sizing and the defining of a fingerprint identity window.
  • FIGS. 4 - 6B, 33 and 34 provide the system operations performed by the processor means 20 under software control.
  • the LCD Driver means 30 communicates with the processor 20 via J4 and Z8, and its output is connected to LCD display means 40 via connector J6.
  • Printer 50 is connected to processor 20 via connector J5.
  • a portable personnel identification means magnetic-stripe reader 60 is connected to processor 20 via RS-232-C, 25 pin serial connector 8 and connector Jl. This reader is provided with a simple reset circuit (not shown) to initialize the control microprocessor when power is first supplied to the system. Appendix A attached hereto describes the software utilized in the system of the invention.
  • the MBO 4-slot motherboard Z8 is an 8 BUS configuration.
  • the processor BCC52C contains RAM/EPROM, an EPROM programmer, 3 parallel ports, and 2 serial ports.
  • FIG. 29 illustrates a first embodiment of the system invention which incorporates a PPI/MS Reader 60, card entry means 70 and an LCD display window 80 to display messages from LCD assembly 40, this embodiment being devoid of a printer.
  • the fingerprint format holder means 3 for positioning a fingerprint format in a predetermined scanned position is shown.
  • This holder means 3 is fixedly attached to the faceplate FP of the housing.
  • the faceplate FP includes an appropriately positioned, square-hole, around which the format holder means is attached in a predetermined position. This allows the video camera 4 to have viewing access to the fingerprint image contained within a fingerprint format means 1 after it is placed within the fingerprint format holder 3.
  • the faceplate has mounted on its inner side electroeluminance lamps which illuminate the field of view of the video camera.
  • One of the lamps is mounted in a predetermined position, angled downwardly from the top of the hole, and the other lamp is appropriately mounted and angled from the bottom of the hole.
  • FIG. 30 illustrates a second embodiment of the system invention in the application wherein a smart card is provided as the portable personnel identification card means.
  • a smart card reader means replaces the PPI/MS reader 60 in the basic system circuitry, and a smart card access slot means 90 is provided to allow entry of the smart card into the smart card reader.
  • This embodiment incorporates the same LCD components, and is devoid of a printer.
  • FIG. 31 illustrates a third embodiment of the system invention application to payable check verification of identity of a check payee, as set forth hereinbefore.
  • This embodiment employs an identification card reader means 60 and associated means 70, or can employ an appropriate smart card reader means when a smart card is used as the personnel identification card means.
  • Printer means 50 is incorporated in this embodiment to print on a check payable an identification verification message, or any other message provided by this system invention.
  • Slots 92 and 94 are provided to allow access to and from the printer which is accomplished by inserting a check payable into slot 94, and after the system operation is completed, the check will be returned via slot 92.

Abstract

The invention relates to a system and methods for verifying a person's identity, and pertains in particular to such a system and methods which utilize comparison of a fingerprint pattern for identification verification. The image of a fingerprint of a person to be identified is provided on an inkless means which when touched by finger of the person causes immediate development of an image of the fingerprint of the finger in a black and white appearance. This image of a fingerprint is video scanned (60) to produced image data which is digitized (10) to produce a non-minutiae digitized numerical identifier indicative of the fingerprint. A preferred method and system provides a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data which is recordable within the magnetic stripe of a credit card personal to a person, or may be recorded within the confines of a portable personnel identification means, or within a smart card, personal to a person. The non-minutiae digitized numerical identifier is provided by selectively analyzing different parts of a fingerprint and deriving from each part a byte numeric which is directly related to the ridge count computed for that part. Prior to performing the 'digitizing' method, a fingerprint identity window is defined as the area of analysis. The present invention also discloses inventive methods relating to 'image sizing' and 'image framing' which are performed upon the fingerprint image and whitespace digital data stored in memory, prior to defining a fingerprint identity window. Various applications of the invention methods and system are disclosed herein.

Description

NON- INUTIAE AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEM
AND METHODS
BACKGROUND OF THE INVENTION
The invention system and related methods are directed to the automatic identification of fingerprints by video scanning and digitizing analysis of the scanned fingerprint, and to the general field of verification of the identity of a person to be identified, such verification being accomplished by comparing a non-minutiae digitized numeric identifier indicative of a fingerprint of a person to be identified with a numeric identifier recorded within the confines of a portable personnel identification means, personal to the person to be identified, which identification means can be of numerous kinds such as a retail credit card, a smart card, or others as set forth hereinafter. The numeric identifier of such portable personnel identification means is previously derived in accordance with the teachings of the present invention and then recorded within the identification means to enable identity verification, accomplished by comparison. It is most desirable to have automatic means and methods for identifying human beings. Millions of individuals are checked on a daily basis by cumbersome and unreliable methods in. banks, retail stores, classified areas, security environments, and by law enforcement officials. The problem of verifying the identity of an individual to a personnel identification card means held and offered as proof of identification by such individual, is one of the most common faced in the everyday duties of commerce, industry and government. Present day fingerprint verification methods are too time consuming and cumbersome to be expediently implemented into the civilian and military affairs of today's society. What is clearly needed is a means of, and methods for, providing automatic, rapid and positive verification of a person's identification. The system invention, and the inventive methods utilized therein and related thereto, satisfy this long felt need for methods and means for providing automatic verifiable identification of an individual submitting him or herself for identification for the purpose of: retail credit card purchases, authorized entry, check cashing, obtaining a driver's license, showing proof of age via a driver's license, verification of the identity of a holder of a passport, etc. A further great need is the development of such a system and methods for providing a verifiable fingerprint identifier which is most applicable to and recordable within a magnetic-stripe of a portable personnel identification card means, such as a magnetic stripe of a credit card. The least number of bytes within a verifiable fingerprint identifier, known to the inventors of the present invention, is a 400 byte numeric identifier developed by FINGERMATRI . This known development is not at all applicable to a portable personnel identification card of the magnetic-stripe type for reasons well known to those skilled in this art.
The presently disclosed system invention and the inventive methods thereof fully satisfy this further need by providing a verifiable non-minutiae fingerprint identifier having but 24 bytes of fingerprint identification data which affords recordability to magnetic-stripe identification cards.
The invention includes the actual taking of an individual's fingerprint via an inkless means each time an identification is to be made. The print can be taken of any digit of a person, i.e. index finger or thumb or toe, and the image of a digitprint is video scanned to produce image data which is digitized in accordance with the teachings of the invention to produce a non-minutiae digitized numerical identifier indicative of the digit print image, and this digitized numerical identifier is compared with a numerical identifier read from an identification card means identifying the person to be identified, to verify the identity of that person.
Various other objects and advantages of the invention methods and system will be apparent from that set forth hereinafter, and some of the specific objectives of the invention are recited hereinbelow.
OBJECTS OF THE INVENTION It is an object of the invention to provide a biometric means for comparing the fingerprint of an individual whereby a rapid and highly fraud-proof check may be made.
It is another object of the invention to make the fingerprint image expediently available for immediate analysis to render approval or disapproval of the identity of a given person from whom the fingerprint is taken.
It is a general objective of the invention to provide a system and related methods by which an individual fingerprint may be video-scanned and digitized in such a manner that the procedure produces a numeric identifier uniquely related to the pattern of the fingerprint, this identifier consisting of a specified number of digits or bytes to identify the fingerprint against an actual fingerprint of an individual at the time positive identification is required. It is a specific object of the invention to provide a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data, and in particular, a verifiable identifier having less than 100 bytes of fingerprint identification data for application to mag-stripe personnel identification cards, as exemplified by the provision disclosed herein of a non- minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
It is yet another object of the invention to provide means by which a fingerprint image format may be positioned automatically in relation to the video scanning means, in such a way that the position is predetermined and will be reestablished each time that a print format means is placed before the video scanner, thus insuring that a subsequent scanning operation will always produce consistent and reliable field of scan results.
It is still another object of the invention to provide means and methods for selectively analyzing a plurality of different fingerprint pattern parts of the stored fingerprint image data and computing a ridge count for each of the plurality of fingerprint pattern parts, and then compiling a data matrix comprised of a plurality of ridge counts computed for the plurality of fingerprint pattern parts to provide a non-minutiae digitized numerical identifier indicative of the image of a fingerprint of a person to be identified.
It is still another object of the invention to provide a predetermined sequence of selectively analyzing a plurality of different fingerprint pattern parts of the stored fingerprint image data, which fingerprint pattern parts exist within a fingerprint identity window defined by the invention.
It is yet still another object of the invention to provide a non-minutiae digitized numerical identifier indicative of an image, of a fingerprint of a person to be identified, which is recordable within the magnetic stripe of a credit card personal to the person and therefore, the present invention facilitates the use of a credit card as a verifiable identification card for entitling the user to certain services such as charged purchases and check cashing.
It is even a further object of the invention to provide a fingerprint identification system and inventive methods utilized therein, which can be completely software controlled and automated to eliminate the possibility of human error, to increase the reliability of the identification being made and to eliminate any constant supervision as usually required with conventional identification procedures. The invention, by utilizing an unchanging characteristic of an individual for making an identification, is not subject to obsolescence and at the same time may be constructed at various levels of sophistication depending on the degree of security of reliability which is desired. The system can be made an integral part of other systems in which information about individuals is taken and recorded and the system can be so constructed with controls that provide for immediate revocation of the privileges of benefits given any individual identified in the system.
It is also another object of the invention to provide a method for the automatic non-minutiae identification of a fingerprint of a person to be identified which includes a method for determining the location of the fingerprint image data stored in a memory means with the whitespace data produced by scanning an image of a fingerprint, and to define a fingerprint or digitprint identity window so as to define a predetermined "area of analysis", which area is defined depending on the specific needs of the end-user application, and with respect to a predetermined "window-size", to enable defining the dimensional area of the fingerprint identity window. The foregoing and other objects, features and advantages of the invention will be apparent from the following more detailed description of preferred embodiments and methods of the invention, as illustrated in the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1A shows an inkless framed format having produced thereon an image of a fingerprint.
FIG. IB shows the inkless framed format holder means which is mounted on the face of the system housing. FIG. 2 shows the predetermined position orientation of a video scanning camera and a 16 mm lens to the center of an inkless framed format positioned within the framed format holder means. FIG. 3 shows a portable personnel identification card of the magnetic-stripe kind.
FIG. 4 is a flow diagram of the system manual and hardware flow of the present invention.
FIG. 5 is a flow diagram of the software process of fingerprint identification verification of the present invention.
FIGS. 6A and 6B is a combined flow chart diagram of the manual, firmware and software process flow of the present invention. FIGS. 7A, 7B, 8A, 8B-, 92_, 9B-, 10A, and 10B" jointly depict the Image Frame Sizing Routine of the invention, wherein the respective method steps are shown in two forms. FIGS. 7A, 8A, 9A, and 10A, illustrate the values computed in reference to a fingerprint image produced on an inkless framed format means; and FIGS. 7B,
8B, 9B and 10B provide illustrations of how the respective values are determined from the performance of their respective method steps which are performed on the digital fingerprint image and whitespace data stored in the memory means of the video digitizer, in accordance with the teachings of the present invention.
FIGS. 11A and 11B depict in a fashion similar to
FIGS. 7 - 10, a method step of the Algorithm Data
Generation Routine, wherein the inventive methods of defining a fingerprint identity window and determining the dimensional area of such window, are accomplished.
FIG. 12 illustrates the computation of count SI.
FIG. 13 illustrates the computation of count S2.
FIG. 14 illustrates the computation of count Yam. FIG. 15 illustrates the computation of count Ybm.
FIG. 16 illustrates the computation of count Ya. FIG. 17 illustrates the computation of count Yb. FIG. 18 illustrates the computation of count Yc. FIG. 19 illustrates the computation of count Xam. FIG. 20 illustrates the computation of count Xbm. FIG. 21 illustrates the computation of count Xa. FIG. 22 illustrates the computation of count Xb.
FIG. 23 illustrates the computation of count Xc. FIG. 24 depicts a block diagram of the system invention.
FIG. 25 illustrates the System Bus Pinout diagram for interconnection of the digitizer 10 to the MMZ8 edge connector Z8.
FIG. 26 illustrates the MMZ8 bus pin configuration interconnections of processor 20 and the Z8 edge connector via J4. FIG. 26A illustrates the interconnections of LCD
Driver 30 with Z8.
FIG. 27 illustrates a console serial connector Jl which is utilized to interconnect the PPI/MS Reader 60 with processor 20. FIG. 28 illustrates the serial printer connector
J2 which is utilized to interconnect the processor 20 with the printer 50.
FIG. 29 illustrates one embodiment of the system invention employed in application pertaining to personnel identity verification, which embodiment incorporates the use of PPI/MS Reader 60.
FIG. 30. illustrates a second embodiment of the system invention employed in an application pertaining to personnel identity verification, which embodiment incorporates the use of a smart card identification means.
FIG. 31 Illustrates a third embodiment of the system invention employed in an application pertaining to check cashing-personnel identity verification of check payee, which embodiment incorporates the use of PPI/MS Reader 60 and printer means 50.
FIG. 32 illustrates the connection of printer 50 to the processor 20. FIG. 33 is a flow diagram of a firmware/software control process of the present invention.
FIG. 34 is a flow diagram of a software process of the invention for card initialization.
DEFINITIONS
It is well known that fingerprints contain specific features, called minutiae, which are unique and allow identification of people by their fingerprints or even a toe print. By definition, a minutiae is either: (1) a bifurcation, which is the location where a given line forks into different lines; or (2) a ridge ending. Minutiae are usually recorded with three coordinates: two coordinates "x" and "y" for the position of the minutiae relative to a coordinate system: and one coordinate "a", which is an angle representing the average direction of the lines around the minutiae point.
In contrast, the present invention methods and system are "non-minutiae" based and either provide or utilize a non-minutiae digitized numerical identifier which is uniquely related to the pattern of a fingerprint it identifies. The non-minutiae digitized numerical identifier is provided by selectively analyzing different parts of a fingerprint and deriving from each part a byte numeric which is directly related to the ridge count computed for that part. This non-minutiae digitized numerical identifier can also be described as a "verification string".
The term "digitizing" is used herein to refer to the process by which the non-minutiae digitized numerical identifier is derived by the respective invention methods disclosed herewith; and, the term "digitized" is used herein to identify the non-minutiae numerical identifier derived by such process.
The "ridge counts" are computed by analyzing or examining selected horizontal and vertical and diagonal memory data lines of the fingerprint identity window defined by the present invention, and counting the number of greylevel shifts from "white" (greylevels 13, 14 or 15) to "black" (greylevels 0 through 12) .
The video digitizer of the system invention is the means employed for converting the video scanned fingerprint image data (FID) and whitespace data into digital data to generate within its memory a digitalized picture of that scanned by the video scanner, i.e. the inkless format providing an image of a fingerprint of a person to be identified; but, it is the software-controlled processor means of the invention which functions to selectively analyze the digital data to provide a digitized numerical identifier indicative of the fingerprint image. The present invention discloses an inventive method step termed "image framing" wherein, prior to selectively analyzing different parts of the fingerprint image data and prior to defining a fingerprint identity window, the fingerprint image and whitespace digital data stored in an addressable memory means (RAM) , located in the video digitizer, are framed to a predetermined dimension, and the location of the fingerprint image data stored in this memory means with whitespace data is determined by determining: (1) X-START and X-END values to indicate the start and the end of the fingerprint image data along the X-axis, and (2) Y-START and Y-END values to indicate the start and end of the fingerprint image data along the Y- axis. The "image framing" invention method also includes an "image frame sizing" step which essentially frames the digital fingerprint and whitespace image data contained in memory.
The "fingerprint identity window" defined by the present invention is the "area of analysis" defined within the fingerprint image data stored in memory. It is this fingerprint identity window which is selectively scanned and analyzed in accordance with the teachings of the present invention, to provide a non-minutiae digitized numerical identifier indicative of the fingerprint image data of a fingerprint of a person to be identified. The "fingerprint identity window" is defined depending on the specific needs of the end-user application, and is set by determining a "window-size". The purpose of the "verification string" is to provide a tailorable degree of certainty into the comparison of encoded data on i.e., the magnetic stripe of a credit card, or other article presented by an individual used as a personal identification means, and the individual's fingerprint image.
This "verification string" can be variable in size, depending on multiple factors. The invention affords the provision of a verification string (or digitized numerical identifier) which has less than 400 bytes of fingerprint identification data, or one having less than 100 bytes of FID as applicable to a magnetic stripe credit card or a smart card or other personal identification card means, or, in particular, an identifier having only 24 bytes of FID which as disclosed in a preferred method and embodiment of the present invention is uniquely applicable to the magnetic stripe of a credit card.
An "element" is a calculated value, generated by the end-user application.
A first factor is the size of the "window" in which image analysis is performed. The larger the window, the more verification data can be generated for comparison purposes. Since the "window" is variable depending on end- user applications, the size of the verification string can vary as well. Thus, it is reasonable to say that increasing the "window-size" used in verification string generation presents the opportunity to increase the number of elements which comprise the verification string.
A second factor is the formulas or calculations used to generate or calculate the verification string. The calculations performed to generate the verification string can vary from one end-user application to another. Any mathematical formula or statistical computation based on ridge counts, whether individually or as a sum, can be used as an element in the verification string data matrix which is compiled.
Both of the above scenarios address the flexibility of the verification string size in designing end-user applications with varied degrees of verification confidence. Of course, different applications might have the same number of verification string elements, yet comprise of entirely different formulas used to generate that data. In other words, two end-user applications may comprise verification strings having a different total number of elements, and the applications may generate each element of its verification string differently.
Lastly, the positioning of each element within the verification string could be different from one application to another. For instance, one application might use Yc (Y Center Line Count) as a value for the seventh element of the verification string, as disclosed herein, and yet another application may use the same value in another element of its verification string.
DETAILED DESCRIPTION OF INVENTION METHODS
A preferred form of the present invention system and methods combinatively utilize an inkless media for the purpose of taking or providing an image of a fingerprint or digitprint. An image of such print is produced by placing a digit of the person to be identified within a 2" x 2" framed format 1 as shown in FIG. 1A, which contains a treated material which when touched by a finger, utilizing an inkless process, causes immediate development of an image of a fingerprint of such finger in a black and white appearance, to provide a good quality scannable image of a fingerprint. The use of this inkless means for taking a fingerprint of a person to be identified overcomes the disadvantages of conventional fingerprint taking techniques. Of course, it is within the scope of the present invention to be applicable to video scan a fingerprint image imprinted upon other media, or by other methods.
After the fingerprint has been taken, the inkless framed format 1 is placed within a format holder 3 which is mounted on the face plate of the system housing. The placement of the inkless framed format within the format holder 3 is illustrated in FIG. IB.
FIG. 2 shows the predetermined position orientation of a video scanning camera 4 and a 16 mm lens 5 associated therewith, to the center of the inkless framed format when it is positioned within the format holder. The center 6 is the center of the inkless media 2 bearing the fingerprint image. A preferred predetermined distance of 2 1/2 inches is set between the center 6 and the face of lens 5.
Accordingly, this provides means by which a fingerprint may be positioned automatically in relation to a video scanning system, in such a way that the position is unique and will be reestablished each time that the framed format 1 is placed within the format holder and thus within the field of scan of the video scanner, to insure that any subsequent scanning operation will always produce proper and desirable results. The use of the inkless fingerprint media for taking the person's fingerprint without requiring the direct application of ink to the person's finger, and under controlled conditions, affords that the person's print may be repeatedly produced with the same clarity and detail, thus facilitating an accurate comparison between prints.
After the fingerprint has been taken on the inkless means of the framed format, the framed format 1 is placed within the holder 3 with the fingerprint image facing the housing face plate and towards the field of view of the video scanner. It is to be noted that in an effort to diminish background reflection of light from the framed format 1, the framed portion has been blackened, as shown in, for example, FIG. 7A.
As shown in the FIG. 6A flow chart, in operation, after the fingerprint format is placed in the format holder and an identification card means is placed in a card reader, system command sequences are issued to the video scanner and the digitizer to commence and complete the scanning and digitizer functions.
Thus, the image of a fingerprint is video scanned to produce image data which is provided to a digitizer which converts the image data into digital image data which is stored in an addressable memory means (RAM) of the digitizer. To accomplish this, a sequence of commands are issued to the digitizer's "command port". This command sequence is specific to each end-user application. After these commands are issued, the digital fingerprint image and whitespace data generated by the scanning procedure and contained in memory in the digitizer, is ready for analysis.
Firmware Process Overview - The controlling firmware of the invention system has several components, each of which perform a specific task which, when combined, provide a series of processes that will take a fingerprint sample and verify it against verification data to insure the authenticity of the provider of the sample. These processes include the following routines:
Comparison Data Retrieval Routine Image Capture Routine
Image Sizing Routine
Algorithm Data Generation Routine
Verification Data Generation Routine
Data Confirmation Routine
Each of these routines are executed in sequence, and will be discussed in order. However, before the firmware verification process can commence, that set forth hereinabove must have been performed.
Comparison Data Retrieval Routine - This routine controls receipt of the Provider's verification data recorded on the identification card means, which is compared against data computed from the fingerprint sample to approve or fail the Provider's authenticity. The verification data could be encrypted and this will be discussed in a following disclosure section, along with an associated decryption function. The verification data (also termed "non-minutiae numerical identifier") recorded within the identification card means is read and stored in a 12 element array which is located in the processor of the invention system. This matrix has the same layout as the Generated Data Matrix which will be discussed subsequent to the following.
Image Frame Sizing Routine - This routine is generated subsequent to the Image Capture Routine which controls the operation of the video camera and the digitizer to capture the fingerprint image and whitespace data in memory. With reference to FIGS. 7A and 7B, this is accomplished as follows:
Note: "Whitespace" is defined as a greylevel equal to 13, 14, or 15. a) Memory frame locations (128,Y), where 0 < Y < 255 are inspected, when three consecutive rows of whitespace are found, Y-TOP is defined as the current Y- value; and b) Memory frame locations (128,Y), where 255 > Y > 0 are inspected, when three consecutive rows of whitespace are found, Y-BOTTOM is defined as the current Y- value. c) With respect to FIGS. 8A and 8B, once Y-TOP and Y-BOTTOM values are established, the X-Axis Range of the fingerprint image data needs to be computed. This is accomplished by scanning (i.e., examining) each column (vertical line) to find three consecutive columns of whitespace. Once three columns are found, the next column containing a greylevel other than whitespace (i.e., black) is considered to be part of the Image. Two X-Axis values, X-START and X-END, need to be set, to indicate the start and end memory data locations of the Image on the X-Axis, respectively. X-START is determined by scanning Frame Locations (X,Y), where 0 < X < 255 and Y-TOP < Y < Y-BOTTOM. This value indicates where the Image "starts" on the X-Axis. X-END is determined the same way, only reversing the X-Axis scan direction from 255 > X > 0, to determine where the Image "Ends" on the X-axis, d) With respect to FIGS. 9A and 9B, now that the X-Axis range has been computed, the Y-Axis range of the FID needs to be computed. This is accomplished in a method similar to that used for the X-Axis Range.
Each row (horizontal line) is scanned, and, syncing on three consecutive whitespace rows, the next row that contains a greylevel other than whitespace is considered to be part of the image.
Two Y-Axis values, Y-START and Y-END, need to be set, to indicate the start and end memory data locations of the Image on the Y-Axis, respectively. Y-START is determined by scanning Frame Locations (X,Y) , where X-START < X < X-END and Y-TOP < Y < Y-BOTTOM. Y-END is determined in similar fashion, only different being that the direction of scan along the Y-Axis is from Y-BOTTOM > Y > Y-TOP. e) With respect to FIGS. 10A and 10B, all values generated must be validated to insure that an accurate image has been scanned and sized. If any of the following conditions fail, a "Poor Image Quality" error is generated, and the system recycles.
The conditions which will cause this error are: i. Y-BOTTOM < Y-TOP ii. X-END < X-START iii. Y-END < Y-START If any of the above conditions are true, then the fingerprint sample provided to the Digitizer should be discarded and a new sample taken.
If none of the above error conditions exist, then the fingerprint sample is considered to have been accurately scanned and sized. The area within the memory frame where the fingerprint image data exists can be illustrated as shown in FIG. 10B.
Fingerprint Identity Window "Area of Analysis"
Prior to calling the mainline routine for the algorithm data generation routine (ADGR) , locations must be set to describe the "window" within the fingerprint image data, stored in the memory frame, which is going to be analyzed. This "window" is a box, determined around an origin point defined as (XC,YC) . XC and YC, or more appropriately called X-Center Line and Y-Center Line, are determined from values generated in the Image Sizing Routine, according to the following formulas:
XC = X-END - (X-END - X-START) / 3 YC « Y-END - (Y-END - Y-START) / 2 The difference between the two calculations is based upon the knowledge that the lower portion of a person's fingerprint (i.e., the portion containing the whirl) will be located closer to X-END than X-START. Thus, the XC value should start in the rightmost third of the print (hence, the division by 3) as that is where the whirl is likely to exist in the digitalized image. YC is simply determined to be the standard Center Line between the two Y points on the frame's Y-Axis. Thus, assuming a print has been sized to exist from (50,50) to (200,150), (XC,YC) would be defined as (150,100). Once (XC,YC) has been established, the "area of analysis" can easily be defined to the ADGR mainline routine. This area is defined depending on the specific needs of the end-user application, and is set by determining a "window-size". The "window-size" is always an odd number. The
"area of analysis" is then defined as XC ± DIFF and YC ± DIFF. DIFF is computed with the following formula:
DIFF = h (window-size - 1) So, if the "window-size" is 73, the "area of analysis" would be appropriately defined as (XC ± 36, YC ±
36), or, in our example above, from (114,64) to (186,136).
Accordingly, the dimensional area of the fingerprint identity window is defined by predetermining a window-size for the fingerprint identity window and defining its dimensional area as from (XC - DIFF, YC - DIFF) to (XC + DIFF, YC + DIFF) where DIFF - h (window-size minus 1), wherein (XC - DIFF) = Xs, (YC - DIFF) « Ys, (XC + DIFF) = Xe, and (YC + DIFF) = Ye.
In addition to the X and Y Center Line values, there are four other variables which are used in Algorithm computations and these values are set forth hereinbelow and have been recited in connection with determining the dimensional area of the fingerprint identity window:
Description: Symbol: Value:
Window X-Axis Start Xs XC - DIFF
Window X-Axis End Xe XC + DIFF
Window Y-Axis Start Ys YC - DIFF
Window Y-Axis End Ye YC + DIFF
Once the proper values have been set, the "area of analysis" can be illustrated as shown in FIGS. 11A and 11B. Algorithm Data Generation Routine - The Algorithm
Data Generation Routine (ADGR) consists of a series of modules designed to generate 16 ridge-count values to be used in the computation of the Generated Data Matrix. The processing for each of these values will be discussed after the following presentation:
Algorithm Output Data
Key: SI - Diagonal \ Absolute Count
S2 - Diagonal / Absolute Count Yam - Y-Axis A-Range Maximum Absolute Count
Ybm - Y-Axis B-Range Maximum Absolute Count
Yaα - Y-Axis A-Range Average Count
Yaβ - Y-Axis A-Range Average Count
Ybα - Y-Axis B-Range Average Count Ybβ - Y-Axis B-Range Average Count
Yc - Y-Axis Center Line Absolute Count
Xam - X-Axis A-Range Maximum Absolute Count
Xbm - X-Axis B-Range Maximum Absolute Count
Xaα - X-Axis A-Range Average Count Xaβ - X-Axis A-Range Average Count
Xbα - x-Axis B-Range Average Count
Xbβ - X-Axis B-Range Average Count
Xc - X-Axis Center Line Absolute Count
Algorithm Output Data: 01 02 03 04 05 06 07 08
SI S2 Yam Yb Yaα Yaβ Ybα Ybβ
09 10 11 12 13 14 15 16
Yc Xam Xbm Xaα Xaβ Xbα Xbβ Xc
Ridge counts are generated by examining the horizontal and vertical lines set forth hereinbelow, and counting the number of greylevel shifts from "white"
(greylevels 13, 14, or 15) to "black" (greylevels 0 through
12) .
The computation of the counts for the values of the Algorithm Output Data will now be described.
Value #1: SI ; Diagonal \ Absolute Count (FIG. 12) This routine generates a count of ridges contained on the diagonal line drawn from point (Xs,Ys) to
(Xe,Ye) . Since the "window" is an absolute square, this relationship is a one-for-one increment along the X-Axis and Y-Axis, starting at Xs, and ending at Xe.
Value #2: S2 ; Diagonal / Absolute Count (FIG. 13)
This routine generates a count of ridges contained on the diagonal line drawn from point (Xs,Ye) to (Xe,Ys) . Since the "window" is an absolute square, this relationship is a one-for-one increment along the Y-Axis for each decrement along the X-Axis, starting at Xs, and ending at Xe. Value #3: Yam ; Y-Axis A-Range Maximum Absolute Count (FIG. 14)
This routine yields the highest number of ridges found on a horizontal line in the Y-Axis "A-Range". The Y- Axis "A-Range" is defined as: Ys ≤ horizontal line < YC.
In the example of FIG. 14, of the horizontal lines counted, the value of "Yam" would be set to "25", assuming that no other horizontal line contained a ridge count greater than 25. The "A-Range" is indicated with single-line borders.
Value #4: Ybm ; Y-Axis B-Range Maximum Absolute Count (FIG. 15)
This routine yields the number of highest number of ridges found on a horizontal line in the Y-Axis "B- Range". The Y-Axis "B-Range" is defined as: YC < horizontal line < Ye.
In the example of FIG. 15, of the horizontal lines counted, the value of "Ybm" would be set to "11", assuming that no other horizontal line contained a ridge count greater than 11. The "B-Range" is indicated with single-line borders.
Values #5 & 6: Ya ; Y-Axis A-Range Average Count (FIG.
16)
This routine yields the total number or ridges found on horizontal lines in the Y-Axis "A-Range". For computation purposes, this "overall total" is stored as two numbers, Yaα and Yaβ. Yaα is the total number of 256 ridges in the "overall total" (i.e.: if Yaα is "2", then there are at least 512 ridges in the "overall total") . Yaβ is the remaining number of ridges counted (i.e.: 6) which is always a number under 256. The Y-Axis "A-Range" is defined as: Ys < horizontal line < YC. In the example of FIG. 16, if the horizontal lines summed to 516, the value of "Yaα" would be set to "2", and the value of "Yaβ" would be set to "4". The "A- Range" is indicated with single-line borders.
Values #7 & 8: Yb ; Y-Axis B-Range Average Count (FIG.17)
This routine yields the total number of ridges found on horizontal lines in the Y-Axis "B-Range". For computation purposes, this "overall total" is stored as two numbers, Ybα and Ybβ. Ybα is the total number of 256 ridges in the "overall total" (i.e.: if Ybα is "2", then there are at least 512 ridges in the "overall total") . Ybβ is the remaining number of ridges counted (i.e.: 6) which is always a number under 256. The Y-Axis "B-Range" is defined as: YC < horizontal line < Ye.
In the example of FIG. 17, if the horizontal lines summed to 300, the value of "Ybα" would be set to "1", and the value of "Ybβ" would be set to "44". The "B- Range" is indicated with single-line borders. Value #9: Yc ; Y-Axis Center Line Absolute Count (FIG. 18)
This routine yields the number or ridges found on the horizontal line on the Y-Axis defined as YC, or Y- Center Line. This would be a whole number, such as 7, if 7 ridges were counted on the Y-Center Line.
Value #10: Xam ; X-Axis A-Range Maximum Absolute Count (FIG. 19)
This routine yields the number of highest number of ridges found on a vertical line on the X-Axis "A-Range". The X-Axis "A-Range" is defined as: Xs < vertical line < XC. In the example of FIG. 19, of the vertical lines counted, the value of "Xam" would be set to "15", assuming that no other vertical line contained a ridge count greater than 15. The "A-Range" is indicated with single-line borders.
Value #11: Xbm ; X-Axis B-Range Maximum Absolute Count (FIG. 20)
This routine yields the number of highest number of ridges found on a vertical line in the X-Axis "B-Range". The X-Axis "B-Range" is defined as: XC < vertical line < Xe.
In the example of FIG. 20, of the horizontal lines counted, the value of "Xbm" would be set to "5", assuming that no other vertical line contained a ridge count greater than 5. The "B-Range" is indicated with single-line borders.
Values #12 & 13: Xa ; X-Axis A-Range Average Count (FIG. 21) This routine yields the total number or ridges found on the vertical lines in the X-Axis "A-Range". For computation purposes, this "overall total" is stored as two numbers, Xaα and Xaβ. Xaα is the total number of 256 ridges in the "overall total" (i.e.: if Xaα is "2", then there are at least 512 ridges in the "overall total") Xaβ is the remaining number of ridges counted (i.e.: 6) which is always a number under 256. The X-Axis "A-Range" is defined as: Xs < vertical line < XC. In the example of FIG. 21, if the vertical lines summed to 516, the value of "Xaα" would be set to "2", and the value of "Xaβ" would be set to "4". The "A-Range" is indicated with single-line borders.
Values #14 & 15: Xb ; X-Axis B-Range Average Count (FIG. 22)
This routine yields the total number of ridges found on vertical lines in the X-Axis "B-Range". For computation purposes, this "overall total" is stored as two numbers, Xbα and Xbβ. Xbα is the total number of 256 ridges in the "overall total" (i.e.: if Xbα is "2", then there are at least 516 ridges in the "overall total") . Xbβ is the remaining number or ridges counted (i.e.: 6) which is always a number under 256. The X-Axis "B-Range" is defined as: XC < vertical line < Xe.
In the example of FIG. 22, if the vertical lines summed to 300, the value of "Xbα" would be set to "1", and the value of "Xbβ" would be set to "44". The "B-Range" is indicated with single-line borders.
Value #16: Xc ; X-Axis Center Line Absolute Count (FIG. 23)
This routine yields the number of ridges found on the vertical line on the X-Axis defined as XC, or X-Center Line. This would be a whole number, such as 17, if 17 ridges were counted on the X-Center Line.
Generated Data Matrix
Key: SI - Diagonal \ Absolute Count S2 Diagonal / Absolute Count
Yma - Y-Axis A-Range Maximum Absolute Count
Ymb - Y-Axis B-Range Maximum Absolute Count
Ya - Y-Axis A-Range Average Count
Yb - Y-Axis B-Range Average Count Yc - Y-Axis Center Line Absolute Count
Xma - X-Axis A-Range Maximum Absolute Count
Xmb - X-Axis B-Range Maximum Absolute Count
Xa - X-Axis A-Range Average Count
Xb - X-Axis B-Range Average Count Xc - X-Axis Center Line Absolute Count
Generated Data Matrix: 01 02 03 04 05 06 07 08 09 10 112 SI S2 Yma Ymb Ya Yb Yc Xma Xmb Xa Xb&f
With reference to the Generated Data Matrix, the Verification Data Generation Routine will now be presented.
This routine takes the output of the Algorithm
Data Generation Routine and creates the "Generated Data
Matrix". For a full understanding of this process, refer to the two tables: "Algorithm Output Data" and "Generated Data Matrix", presented above.
The first element in the GDM (Generated Data Matrix) is equal to the value of the first number in the AOD (Algorithm Output Data) . This element is known as "SI", or the "Diagonal \ Absolute Count". The second element in the GDM is equal to the value of the second number in the AOD. This element is known as "S2", or the "Diagonal / Absolute Count".
The third element in the GDM is equal to the value of the third number in the AOD. This element is known as "Yam", or the "Y-Axis A-Range Maximum Absolute Count".
The fourth element in the GDM is equal to the value of the fourth number in the AOD. This element is known as "Ybm", or the "Y-Axis B-Range Maximum Absolute Count". The fifth element in the GDM is a calculated value using the fifth and sixth numbers in the AOD. The calculated value can be indicated as follows:
value = (fifth * 256 + sixth) ÷ (window-size ÷ 2)
In other words, the computation is equal to the fifth number in the AOD multiplied by 256, plus the sixth number in the AOD. The result is then divided by _ the window size to give the calculated value. This element is known as "Ya", or the "Y-Axis A-Range Average Count". The sixth element in the GDM is a calculated value using the seventh and eighth numbers in the AOD. The calculated value can be indicated as follows:
value = (seventh * 256 + eighth) ÷ (window-size
+ 2)
In other words, the computation is equal to the seventh number in the AOD multiplied by 256, plus the eighth number in the AOD. The result is then divided by h the window size to give the calculated value. This element is known as "Yb", or the "Y-Axis B-Range Average Count". The seventh element in the GDM is equal to the value of the ninth number in the AOD. This element is known as "Yc", or the "Y-Axis Center Line Absolute Count".
The eighth element in the GDM is equal to the value of the tenth number in the AOD. This element is known as "Xam", or the "X-Axis A-Range Maximum Absolute Count".
The ninth element in the GDM is equal to the value of the eleventh number in the AOD. This element is known as "Xbm", or the "X-Axis B-Range Maximum Absolute Count".
The tenth element in the GDM is a calculated value using the twelfth and thirteenth numbers in the AOD. The calculated value can be indicated as follows: value = (twelfth * 256 + thirteenth) ÷ (window-size ÷ 2)
In other words, the computation is equal to the twelfth number in the AOD multiplied by 256, plus the thirteenth number in the AOD. The result is then divided by h the window size to give the calculated value. This element is known as "Xa", or the "X-Axis A-Range Average Count".
The eleventh element in the GDM is a calculated value using the fourteenth and fifteenth numbers in the AOD. The calculated value can be indicated as follows:
value = (fourteenth * 256 + fifteenth) ÷ (window-size
+ 2)
In other words, the computation is equal to the fourteenth number in the AOD multiplied by 256, plus the fifteenth number in the AOD. The result is then divided by h the window size to give the calculated value. This element is known as "Xb", or the "X-Axis B-Range Average Count". The twelfth element in the GDM is equal to the value of the sixteenth number in the AOD. This element is known as "Xc", or the "X-Axis Center Line Absolute Count".
Fingerprint Identification System Data Confirmation Routine This routine is responsible for comparing the Comparison Data Matrix (CDM) against the Generated Data Matrix (GDM,) and determining if the fingerprint sample given by the Provider mathematically matches the verification data on the Provider's portable personnel identification means. Each element of the CDM is compared against its counterpart in the GDM. That is, the first element of the CDM is compared against the first element of the GDM, the second element of the CDM is compared against the second element in the GDM, and so on.
The absolute difference between elements is limited to specific pre-defined "tolerances". These tolerances will vary from application to application, depending on the needs of the end-user. An end-user who wants very strict regulation would have lower tolerances than an end-user who wants average regulation. In other words, one end-user may want ±3 tolerance whereas another might want ±1 tolerance.
As an example, the first through seventh elements will always have one level of tolerance higher than the eighth through twelfth elements. In other words, if the eighth through twelfth elements are measured with a ±2 tolerance, then the first through seventh elements will have a tolerance of ±3.
To determine whether or not a fingerprint sample is approved, a "confidence level" has to be achieved. This confidence level starts at zero. When each CDM/GDM element is compared, and the difference falls within the acceptable tolerance, then the confidence level is increased by 8.33%.
The actual confidence level that must be achieved in order for a fingerprint to be "approved" is again determined by the specific application. One end-user might want a higher confidence level than another end-user.
After all elements have been compared, and the confidence level is determined, a flag is set to indicate whether or not the sample has "passed" the confirmation process. The entire process (2 - Image Capture through 6 -
Data Confirmation) is repeated up to 10 times.
If a sample is confirmed two consecutive times, then the fingerprint sample is "approved", an appropriate confirmation message is generated for the Obtainer to view, and the device recycles.
If a sample is rejected two consecutive times, then the fingerprint sample is "failed", an appropriate rejection message is generated for the Obtainer to view, and the device recycles.
If in the ten process cycles the firmware cannot obtain two consecutive "passes" or "failures", then the fingerprint sample is "unable to verify", an appropriate message is generated for the Obtainer to view, and the device recycles.
It should be apparent to any person skilled in the art to which this invention pertains that the disclosure set forth hereinabove with respect to the calculation of the plurality of counts, with reference to either a diagonal line or a horizontal line or a vertical line, pertains to a line of memory data contained within the fingerprint identity window area being analyzed. The foregoing has been disclosed with respect to a preferred method and system wherein the Generated Data Matrix provides 24 bytes of fingerprint identification data, each element of the GDM containing 2 bytes of verification data. The 24 byte non-minutiae digitized numerical identifier is recordable within the confines of a portable personnel identification means and in particular, the magnetic stripe of a credit card to allow the credit card to be used as an identification card for entitling the user to certain services, as for example, charged purchases and check cashing. This digitized numerical identifier can also be stored in a memory means included in a smart card.
As to the particular application of the invention system and methods for providing a 24 byte non-minutiae digitized numerical identifier which is recordable within the magnetic stripe of a credit card to allow the credit card to be used as a portable personnel identification card, regulations of the American National Standards for financial services, financial transaction cards magnetic stripe encoding, limit the magnetic stripe and coding as follows:
TRACK 1 maximum of 79 alphanumeric characters TRACK 2 maximum of 40 characters, numeric only TRACK 3 maximum of 107 alphanumeric characters
Various other market applications of the present invention system and methods are as follows: Retail Credit Card
Government-federal/State/Local
Used to identify the voter; controlling multiple voting Drivers License; control verification of individual for legal drinking age. System could be used in control of aliens on green cards and work visa's
Social Security cards, .verification of holder for check cashing requirements.
Military ID cards for all branches. Control of welfare recipients and check cashing.
Security Market
Banking industry..Automatic Tellers (ATM's), safety deposit boxes.
Professional Market Medical...ID cards.
Education Market College entrance exams. Legal Bar Exams.
Other Markets Passports.
Prisons.
Security..Computer access as well as commercial use.
VARIABLE RESOLUTION The foregoing presentation of the invention methods for image sizing, image framing, and that set forth with respect to defining a fingerprint identity window, bear reference to a resolution area base 256. It should be apparent that the present invention is not limited to this exemplary resolution area since it is well within the teachings and scope of the present invention to employ a resolution area base 512. Accordingly, it will be apparent to those skilled in the art in light of the foregoing disclosure that the invention should not be limited to a resolution area base 256. ENCRYPTION/DECRYPTION
Verification String encryption routines can take a myriad of forms. Each scheme is application dependent, meaning that a scheme used for one application will not be used in a similar application - thus reducing the possibility of fraud. Since the scheme for each application is different, and bound in the verification firmware EPROMS, the possibility of unauthorized card duplication is reduced, as duplicated cards for one application would not yield valid verification data in another application. Two exemplary encryption schemes are as follows:
Scheme 1: Digit Reversal Scheme This "encryption scheme" takes each of the twelve numbers in the Verification String and reverses the digits. In other words, if the Verification String contains the following numbers:
01 40 36 24 22 05 10 18 14 21 04C then the "encrypted" data would appear as follows: 10 04 63 42 22 50 01 81 41 12 400
To "decrypt" the data in an application program, the programmer need only reverse the digits back to obtain the original numbers.
Scheme 2: Digit Complement Scheme This "encryption scheme" operates on all 24 digits of the Verification String as a whole, treating each digit as a separate entity. Each digit is subtracted from nine (9) to achieve a "complement" value. For instance:
01 40 36 24 22 05 10 18 14 21 04B would appear as follows once encrypted:
98 59 63 75 77 94 89 81 85 78 959
This complement scheme has the same affect as taking each of the twelve numbers and subtracting each number from ninety-nine (99) to achieve the "encrypted" value. To reverse the process, the user only need to subtract 9 from each of the 24 encrypted digits to achieve the original number (ignoring the negative sign) .
As stated above, data encryption will vary from application to application, to avoid multiple applications from having similar verification data, and thus introducing potential misuse of the encrypted verification data. The encryption method is decided in advance, and appropriate decryption logic is programmed into the Comparison Data Retrieval Routine, such that the decrypter logic and means of implementation are contained in the BCC52 processor of the system invention.
As to the implementation of the encryption scheme aspect of the present invention, in addition to providing a fingerprint sample, the Provider also presents identification card means (i.e., identification card with a magnetic stripe) which contains his or her encrypted verification data (i.e., encrypted digitized numerical identifier) , the identification card is then placed in the card reader for retrieval and decryption of the "comparison data".
Upon decryption, the "comparison data" is stored in a 12 element array, known as the "Comparison Data Matrix", which has the same layout as the "Generated Data Matrix" presented hereinbefore.
If any errors are encountered during this retrieval process, then an appropriate error message is generated and the system recycles. Such error messages are specific to the individual application (i.e., a system with a magnetic stripe card reader would have a "Card Reader Error" or a "Channel Read Error" error message) . Furthermore, the encrypted identifier could also be included on a check payable within a check cashing identity verification application of the present invention. As set forth in the appended claims, the present invention is applicable to: recording an encrypted or non- encrypted non-minutiae digitized numerical identifier within the confines of a portable personnel identification means, personal to a person, such as a credit card or a smart card, identity verification of a person to be identified with or without an encryption scheme, and payable check verification of identity of payee, with or without encryption.
As to the recording application, two services could be performed: (1) direct or indirect personal contact with the persons to be identified, deriving non-minutiae digitized numerical identifiers indicative of the fingerprints of such persons, and recording the non- minutiae digitized numerical identifiers within identification means, personal to such persons; or (2) performing such a service but providing the derived non- minutiae digitized numerical identifiers to another party for the performance of the recording procedure.
As to the Identity Verification Application of the present invention, this could be accomplished with direct or indirect personal contact with persons to be identified.
With regard to the payable check verification of identity of a check payee, the check payable could include a numerical identifier to be verified with a digitized numerical identifier indicative of a fingerprint of a check payee named on the check payable, or preferably no numeric identifier would be included on the check payable and verification of the identity of the person submitting the check payable in a check cashing application would be accomplished by verification of comparison of a non- minutiae digitized numerical identifier indicative of a fingerprint of a person submitting the check for cashing, with the numerical identifier contained within a portable personnel identification means submitted by such person for identification as the check payee of the check payable. With reference back to the identification verification application of the present invention, where • verification of identity is accomplished by comparing the numerical identifier of identification means with the non- minutiae digitized numerical identifier derived from a fingerprint of such person to be identified, upon finding non-verification, the portable personnel identification means would be withheld by the invention system, or in the case where a smart card is presented as the identification means, the functional integrity of such smart card could be destroyed by known techniques and devices incorporated into the system invention. Thus, it is apparent that there has been provided, in accordance with the invention, an identification system that fully satisfies the objectives, aims and advantages set forth above. While the invention methods have been described in conjunction with specific applications thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended to embrace all such alternatives, modifications and variations which fall within the spirit and scope of the appended method claims.
The terms and expressions which have been employed in the foregoing specification are used therein as terms of description and not solely of limitation, and there is no intention, in the use of such terms and expressions, of excluding equivalents of the features shown and described or portions thereof, it being recognized that the scope of the invention is defined and limited only by the appended method claims.
FINGERPRINT IDENTIFICATION SYSTEM INVENTION A description of the system invention will now be presented with reference to FIGS. 24 - 32 which are illustrative of the system invention, and FIGS. 4 - 6B and FIGS. 33 and 34 which provide flow charts which are descriptive of the operation control of the system invention. FIG. 24 is a block diagram of the invention system which shows the basic interconnection of the system components including the video camera 4, and the accessories LCD display 40, printer means 50, and PPI/MS Reader 60. An illustrative power supply means PS for providing appropriate voltage supply to the system components is also shown.
The system invention can be embodied in three specific configurations which differ from each other as to the application of the system invention and the components utilized for a respective application. Each of the three embodiments incorporate the following: an inkless framed format holder means 3, video scanning means 4, lens 5, digitizer 10, processor 20, LCD driver means 30, a four- slot motherboard bus connector Z8, and a portable personnel identification card reader means 60.
Prior to presenting a description for each embodiment of the system invention, the basic system as depicted in FIG. 24 will now be described. Video scanner 4 scans an inkless format means providing an image of a fingerprint of a person to be identified, after this fingerprint image format 1 is placed within the inkless format holder means 3 which automatically positions the format 1 in relation to the video scanner 4 in such a way that the position is predetermined and will be reestablished each time that a print format means is placed before the video scanner, thus insuring that a subsequent scanning operation will always produce consistent and reliable field of scan results. As shown in FIG. 24, the video output of scanner
4 is connected to digitizer 10 via a shielded coaxial cable 9. The video scanner 4 receives power from the 120 volts AC supply, and a ground is provided via line 7 from pin 2 of Z8. In operation, the video scanner scans the image of a fingerprint provided on an inkless means 2 to produce fingerprint image data and whitespace data which is outputed to the video digitizer board 10. The primary function of the video digitizer board 10 is to convert the fingerprint image and whitespace data signals from the video scanner into digital image data i.e., numerical data, which digital image data is stored in an addressable memory means, RAM, included in the digitizer 10. Thus, the stored digital image data is then available to the system program-controlled processor 20 for evaluation of the scanned image data information.
The scanned image data information contained in the video camera output signal is made up of discrete points of picture elements, commonly called pixels. Each pixel varies in brightness, depending on the image scanned, through a range of "grey levels" from black to white. In digitizer 10, these grey levels are separated into 16 numerical values from 0 (black) to 15 (white) . Each horizontal line of the image data being viewed contains 256 pixels and the circuitry of the digitizer samples 256 lines. This results in 65,536 pixels or discrete numerical values that the digitizer must store in its random access memory means. Since the pixels are supplied in a scanning sequence (from left to right in the viewed image) it is necessary that the sampling in some subsequent storage of the pixel values be synchronized with camera scanning sequence. Signals are provided, along with the fingerprint image and whitespace data outputed from the camera. These combined signals, image and sync, are commonly referred to as "composite video".
Circuit means of the digitizer functions to extract both horizontal (line) and vertical (frame) synchronization signals. Other circuitry of the digitizer 10 allows the system microprocessor 20 to control a variety of functions under software control. The primary function of the digitizer 10, as referred to earlier, is to convert the scanned image data into numerical values for later evaluation by the software controlled processor. The operation of the digitizer 10 of the invention is well known to those skilled in the art and a specific designation of a digitizer utilized in the system invention is presented hereinafter along with designations for the other components incorporated into the present system.
The program-controlled processor means 20 selectively analyzes a plurality of different fingerprint pattern parts of the digital image data contained in the digitizer, and the processor includes means for accomplishing the inventive methods set forth in the foregoing, such as means for computing a ridge count for each of the plurality of selectively analyzed different fingerprint pattern parts, means for compiling a data matrix comprised of ridge counts computed for these different fingerprint pattern parts, means to provide a non-minutiae digitized numerical identifier indicative of the image of the fingerprint of a person to be identified, and means for comparing the numerical identifier provided by the card reader 60 with the non-minutiae digitized numerical identifier, to verify the identity of a person to be identified. Reference to the foregoing description will also provide information as to the other inventive methods of the invention such as that set forth for Image Capture, Image Sizing and the defining of a fingerprint identity window.
The flow charts illustrated in FIGS. 4 - 6B, 33 and 34 provide the system operations performed by the processor means 20 under software control.
The LCD Driver means 30 communicates with the processor 20 via J4 and Z8, and its output is connected to LCD display means 40 via connector J6. Printer 50 is connected to processor 20 via connector J5.
A portable personnel identification means magnetic-stripe reader 60 is connected to processor 20 via RS-232-C, 25 pin serial connector 8 and connector Jl. This reader is provided with a simple reset circuit (not shown) to initialize the control microprocessor when power is first supplied to the system. Appendix A attached hereto describes the software utilized in the system of the invention.
The disclosure set forth hereinabove and attached hereto, with reference to the drawings, will enable any person skilled in the art to which this invention pertains, to assemble and operate the system invention in accordance with the inventive methods provided herein.
The specific circuitry incorporated in the particular embodiment of an automatic fingerprint identification system constructed in accordance with the present invention and described with reference to the respective drawings, can be constructed from discrete elements more advantageously as from integrated circuits. The following Table lists examples of such components. TABLE A
Component Description
Inkless material Identicator Corporation Video camera Associated Systems Model # TC1886,
Camera lens 16 mm, F/1.6 (no iris) PPI/MS card reader American Magnetics Corporation- Model 101 Smart card reader Microcard Technologies Video digitizer VIP Ltd - Model #D10010 Processor Micromint, Inc. - Model # BCC52C LCD Driver Micromint, Inc. - BCC25, BCC52C
ROM A&B, MB04 Passive Backplane Printer Printer Products - Dot Matrix
Printer-40 columns The MBO 4-slot motherboard Z8 is an 8 BUS configuration. The processor BCC52C contains RAM/EPROM, an EPROM programmer, 3 parallel ports, and 2 serial ports.
SYSTEM EMBODIMENTS FIG. 29 illustrates a first embodiment of the system invention which incorporates a PPI/MS Reader 60, card entry means 70 and an LCD display window 80 to display messages from LCD assembly 40, this embodiment being devoid of a printer. The fingerprint format holder means 3 for positioning a fingerprint format in a predetermined scanned position is shown. This holder means 3 is fixedly attached to the faceplate FP of the housing. The faceplate FP includes an appropriately positioned, square-hole, around which the format holder means is attached in a predetermined position. This allows the video camera 4 to have viewing access to the fingerprint image contained within a fingerprint format means 1 after it is placed within the fingerprint format holder 3.
The faceplate has mounted on its inner side electroeluminance lamps which illuminate the field of view of the video camera. One of the lamps is mounted in a predetermined position, angled downwardly from the top of the hole, and the other lamp is appropriately mounted and angled from the bottom of the hole.
FIG. 30 illustrates a second embodiment of the system invention in the application wherein a smart card is provided as the portable personnel identification card means. A smart card reader means (not shown) replaces the PPI/MS reader 60 in the basic system circuitry, and a smart card access slot means 90 is provided to allow entry of the smart card into the smart card reader. This embodiment incorporates the same LCD components, and is devoid of a printer.
FIG. 31 illustrates a third embodiment of the system invention application to payable check verification of identity of a check payee, as set forth hereinbefore. This embodiment employs an identification card reader means 60 and associated means 70, or can employ an appropriate smart card reader means when a smart card is used as the personnel identification card means. Printer means 50 is incorporated in this embodiment to print on a check payable an identification verification message, or any other message provided by this system invention. Slots 92 and 94 are provided to allow access to and from the printer which is accomplished by inserting a check payable into slot 94, and after the system operation is completed, the check will be returned via slot 92.
The specific operations of each of the three embodiments described above is set forth in the foregoing description and in the appended claims.
Thus, it is apparent that there has been provided, in accordance with the system invention, a non- minutiae automatic fingerprint identification system that fully satisfies the objectives, aims and advantages set forth above. While the invention system has been described in conjunction with specific embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended to embrace all such alternatives, modifications and variations which fall within the spirit and scope of the appended system claims.

Claims

1. A method for providing identification of a person comprising the steps of: a) obtaining an image of a fingerprint of said person, said image being provided on an inkless means which when touched by a finger of the said person causes immediate development of an image of the fingerprint of said finger in a black and white appearance, b) video scanning said image of a fingerprint provided on said inkless means to produce image data and digitizing said image data to produce a non-minutiae digitized numerical identifier indicative of said fingerprint, and c) recording said non-minutiae digitized numerical identifier within the confines of a portable personnel identification means, personal to said person.
2. A method as defined in Claim 1 further comprising: recording said non-minutiae digitized numerical identifier within the magnetic stripe of a credit card personal to said person.
3. A method as defined in Claim 1 further comprising: recording said non-minutiae digitized numerical identifier within a smart card, personal to said person, by storing the said non-minutiae digitized numerical identifier in a memory means included in said smart card.
4. A method as defined in Claim 1 further comprising: digitizing the said image data to produce a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data.
5. A method as defined in Claim 1 further comprising: digitizing the said image data to produce a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
6. A method as defined in Claim 2 further comprising: recording within said magnetic stripe of a credit card personal to said person a non-minutiae digitized numerical identifier having less than 100 bytes of fingerprint identification data.
7. A method as defined in Claim 2 further comprising: recording within said magnetic stripe of a credit card, personal to said person, a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
8. A method as defined in Claim 3 further comprising: recording within said smart card, personal to said person, a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data, by storing said data in a memory means included in the said smart card.
9. A method as defined in Claim 3 further comprising: recording within said smart card, personal to said person, a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data, by storing said data in a memory means included in the said smart card.
10. A method for providing identification of a person comprising the steps of: a) requesting and receiving from a person to be identified a fingerprint, said fingerprint being provided via the use of an inkless means which when touched by a finger of said person causes immediate development of an image of the fingerprint of said finger in a black and white appearance, b) video scanning said image of a fingerprint provided on said inkless means to produce image data and digitizing said image data to produce a non-minutiae digitized numerical identifier indicative of said fingerprint, and c) recording said non-minutiae digitized numerical identifier within the confines of a portable personnel identification means, personal to said person.
11. A method as defined in Claim 10 further comprising: recording said non-minutiae digitized numerical identifier within the magnetic stripe of a credit card personal to said person.
12. A method as defined in Claim 10 further comprising: recording said non-minutiae digitized numerical identifier within a smart card, personal to said person, by storing the said non-minutiae digitized numerical identifier in a memory means included in said smart card.
13. A method as defined in Claim 10 further comprising: digitizing the said image data to produce a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data.
14. A method as defined in Claim 10 further comprising: digitizing the said image data to produce a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
15. A method as defined in Claim 11 further comprising: recording within said magnetic stripe of a credit card personal to said person a non-minutiae digitized numerical identifier having less than 100 bytes of fingerprint identification data.
16. A method as defined in Claim 11 further comprising: recording within said magnetic stripe of a credit card, personal to said person, a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
17. A method as defined in Claim 12 further comprising: recording within said smart card, personal to said person, a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data, by storing said data in a memory means included in the said smart card.
18. A method as defined in Claim 12 further comprising: recording within said smart card, personal to said person, a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data, by storing said data in a memory means included in the said smart card.
19. A method as defined in Claim 10, further comprising: prior to step c) , encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier within the confines of said portable personnel identification means.
20. A method as defined in Claim 11, further comprising: prior to step c) , encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier within said magnetic stripe of said credit card.
21. A method as defined in Claim 12, further comprising: prior to step c) , encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier in said memory means of said smart card.
22. A method as defined in Claim 13, further comprising: encrypting said non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within the confines of said portable personnel identification means.
23. A method as defined in Claim 14, further comprising: encrypting said non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within the confines of said portable personnel identification means.
24. A method as defined in Claim 15, further comprising: encrypting said non-minutiae digitized numerical identifier having less than 100 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within said magnetic stripe of said credit card.
25. A method as defined in Claim 16, further comprising: encrypting said non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within said magnetic stripe of said credit card.
26. A method as defined in Claim 17, further comprising: encrypting said non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier in said memory means of said smart card.
27. A method as defined in Claim 18, further comprising: encrypting said non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier in said memory means of said smart card.
28. A method of verifying the identity of a person comprising the steps of: a) obtaining a fingerprint of a person to be identified provided via the use of an inkless means which when touched by a finger of said person causes immediate development of an image of the fingerprint of said finger in a black and white appearance, b) providing a portable personnel identification means, personal to said person, having recorded therewith a non-minutiae numerical identifier which identifies the fingerprint of the said finger of said person, c) reading said numerical identifier recorded on said portable personnel identification means, and storing in memory the said numerical identifier, d) video scanning said image of said fingerprint provided by said inkless means to produce image data and digitizing said image data to produce a non-minutiae digitized numerical identifier indicative of said fingerprint, e) comparing the numerical identifier of said identification means stored in memory with said non-minutiae digitized numerical identifier, to verify the identity of said person.
29. A method as defined in Claim 28, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
30. A method as defined in Claim 28, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
31. A method as defined in Claim 28, further comprising as to step b) above: providing a credit card as said portable personnel identification means, personal to said person.
32. A method as defined in Claim 28, further comprising as to step b) above: providing a smart card as said portable personnel identification means, personal to said person.
33. A method as defined in Claim 28, further comprising as to step d) above: using a video camera to video scan the said image of the said fingerprint provided on the said inkless means.
34. A method as defined in Claim 28, further comprising the step of: prior to digitizing the said image data, storing in a random-access memory means the scanned image of the said fingerprint provided on the said inkless means.
35. A method as defined in Claim 28, further comprising: displaying verification of the identity of said person.
36. A method as defined in Claim 35, further comprising: displaying non-verification of the identity of the said person.
37. A method as defined in Claim 36, further comprising: withholding said portable personnel identification means upon occurrence of non-verification of the identity of said person.
38. A method as defined in Claim 37, further comprising: withholding a credit card provided as said personal personnel identification means upon occurrence of non- verification of the identity of said person.
39. A method as defined in Claim 37, further comprising: withholding a smart card provided as said personal personnel identification means upon occurrence of non- verification of the identity of said person.
40. A method as defined in Claim 36, further comprising: destroying the functional integrity of a smart card provided as said personal personnel identification means upon occurrence of non-verification of the identity of said person.
41. A method as defined in Claim 1, further comprising: prior to step c) , encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier within the confines of said portable personnel identification means.
42. A method as defined in Claim 2, further comprising: prior to step c) , encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier within said magnetic stripe of said credit card.
43. A method as defined in Claim 3, further comprising: prior to step c) , encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier in said memory means of said smart card.
44. A method as defined in Claim 4, further comprising: encrypting said non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within the confines of said portable personnel identification means.
45. A method as defined in Claim 5, further comprising: encrypting said non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within the confines of said portable personnel identification means.
46. A method as defined in Claim 6, further comprising: encrypting said non-minutiae digitized numerical identifier having less than 100 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within said magnetic stripe of said credit card.
47. A method as defined in Claim 7, further comprising: encrypting said non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier within said magnetic stripe of said credit card.
48. A method as defined in Claim 8, further comprising: encrypting said non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier in said memory means of said smart card.
49. A method as defined in Claim 9, further comprising: encrypting said non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data and recording the encrypted digitized numerical identifier in said memory means of said smart card.
50. A method for verifying the identity of a person comprising the steps of: a) providing a fingerprint of a person to be identified, b) providing a portable personnel identification means, personal to said person, having an encrypted numerical identifier which identifies said fingerprint of the said person, c) decrypting said encrypted numerical identifier of said portable personnel identification means to provide a decrypted numerical identifier, d) video scanning the said fingerprint and digitizing the image data of the scanned fingerprint to produce a non-minutiae digitized numerical identifier indicative of said fingerprint, and e) comparing said non-minutiae digitized numerical identifier with said decrypted numerical identifier to verify the identity of said person.
51. A method as defined in Claim 50 further comprising: providing said fingerprint of a person to be identified via the use of an inkless means which when touched by a finger of said person causes immediate development of an image of the said fingerprint in a black and white appearance.
52. A method as defined in Claim 50, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
53. A method as defined in claim 50, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
54. A method as defined in Claim 50, further comprising as to step b) above: providing a credit card as said portable personnel identification means, personal to said person.
55. A method as defined in Claim 50, further comprising as to step b) above: providing a smart card as said portable personnel identification means, personal to said person.
56. A method as defined in Claim 50, further comprising as to step d) above: using a video camera to video scan the said fingerprint.
57. A method as defined in Claim 50, further comprising the step of: prior to digitizing said image data, storing in a random-access memory means the said image data of the scanned fingerprint.
58. A method as defined in Claim 50, further comprising: displaying verification of the identity of said person.
59. A method as defined in Claim 58, further comprising: displaying non-verification of the identity of the said person.
60. A method as defined in Claim 59, further comprising: withholding said portable personnel identification means upon occurrence of non-verification of the identity of said person.
61. A method as defined in Claim 60, further comprising: withholding a credit card provided as said personal personnel identification means upon occurrence of non- verification of the identity of said person.
62. A method as defined in Claim 60, further comprising: withholding a smart card provided as said personal personnel identification means upon occurrence of non- verification of the identity of said person.
63. A method as defined in Claim 59, further comprising: destroying the functional integrity of a smart card provided as said personal personnel identification means upon occurrence of non-verification of the identity of said person.
64. A method as defined in Claim 1, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
65. A method as defined in claim 1, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
66. A method as defined in Claim 1 further comprising as to step a) above: using a toe of a person to be identified to provide an identification print.
67. A method as defined in Claim 10, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
68. A method as defined in claim 10, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
69. A method as defined in Claim 10 further comprising as to step a) above: using a toe of a person to be identified to provide an identification print.
70. A method as defined in Claim 28, further comprising as to step a) above: using a toe of a person to be identified to provide an identification print.
71. A method as defined in Claim 50, further comprising as to step a) above: using a toe of a person to be identified to provide an identification print.
72. A method for the automatic non-minutiae identification of a fingerprint image comprising in combination: a) scanning an image of a fingerprint of a person to be identified; b) storing in an addressable memory means image data produced from scanning said image; c) selectively analyzing a plurality of different fingerprint pattern parts of the stored image data and computing a ridge count for each of said plurality of fingerprint pattern parts; and d) compiling a data matrix comprised of a plurality of ridge counts computed for the said plurality of fingerprint pattern parts to provide a non- minutiae digitized numerical identifier indicative of said image of a fingerprint of a person to be identified.
73. A method as defined in Claim 72 further comprising: providing said fingerprint image via the use of an inkless means which when touched by a finger of said person causes immediate development of said image of a fingerprint of the said person.
74. A method as defined in Claim 73 further comprising: providing a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data.
75. A method as defined in Claim 73 further comprising: providing a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
76. A method as defined in Claim 74 further comprising: encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier within the confines of a portable personnel identification means personal to said person to be identified.
77. A method as defined in Claim 75 further comprising: encrypting said non-minutiae digitized numerical identifier and recording the encrypted digitized numerical identifier within the confines of a portable personnel identification means personal to said person to be identified.
78. A method as defined in Claim 73 further comprising: providing said fingerprint image by using the index finger of said person.
79. A method as defined in Claim 73 further comprising: providing said fingerprint image by using the thumb of said person.
80. A method as defined in Claim 73 further comprising: providing said image by using a toe of said person.
81. A method for the automatic non-minutiae identification of a fingerprint of a person to be identified, comprising the steps of: a) scanning an image of a fingerprint and producing fingerprint image data and whitespace data; b) storing in an addressable memory means said fingerprint image and whitespace data; and c) determining the location of the said fingerprint image data stored in said memory means with the said whitespace data.
82. A method as defined in Claim 81, further comprising: defining a fingerprint identity window within said fingerprint image data.
83. A method as defined in Claim 82, further comprising: defining said fingerprint identity window by determining the dimensions of said window around an origin point defined as (XC, YC) , wherein XC = X-END minus (X-END minus X-START) divided by 3, and YC = Y-END minus (Y-END minus Y- START) divided by 2.
84. A method as defined in Claim 81, further comprising as to step c) : image framing the said fingerprint image and whitespace data to a predetermined dimension, and establishing Y-TOP and Y-BOTTOM values along the Y-axis of said predetermined dimension; computing the X-Axis Range of the fingerprint image data contained in the framed image data by determining two X-axis values, said X-axis values being X- START and X-END, wherein X-START indicates the memory data location where the fingerprint image data starts on the X- axis, and X-END indicates the memory data location where the fingerprint image data ends on the X-axis; computing the Y-Axis Range of the fingerprint image data contained in the framed image data by determining two Y-axis values, said Y-axis values being Y- START and Y-END, wherein Y-START indicates the memory data location where the fingerprint image data starts on the Y- axis, and Y-END indicates the memory data location where the fingerprint image data ends on the Y-axis; and determining the dimensional area of said fingerprint image data by utilizing said X-START, X-END, Y- START and Y-END values.
85. A method as defined in Claim 84, further comprising: defining a fingerprint identity window within said fingerprint image data.
86. A method as defined in Claim 85, further comprising: defining said fingerprint identity window by determining the dimensions of said window around an origin point defined as (XC, YC) , wherein XC = X-END minus (X-END minus X-START) ÷ 3, and YC = Y-END minus (Y-END minus Y-START) ÷ 2.
87. A method as defined in Claim 86, further comprising: defining said whitespace data as having a predetermined greylevel value; defining said fingerprint image data as having a second predetermined greylevel value distinct from that defined for the said whitespace data; as to said image framing, examining memory data locations (128,Y) where 0 < Y < 255, and upon finding three consecutive rows of whitespace data, defining Y-TOP as the latter examined data row Y-axis value, and examining memory data locations (128,Y) where 255 > Y > 0 and upon finding three consecutive rows of whitespace data, defining Y- BOTTOM as the last examined data row Y-axis value; computing the X-Axis Range of the framed image data to indicate the start and end memory locations of the fingerprint image data on the X-axis by determining X-START and X-END X-axis values, wherein X-START is determined by examining memory data locations (X,Y) where 0 < X < 255 and Y-TOP < Y < Y-BOTTOM, by detecting three consecutive columns of whitespace data and a next column having a greylevel value equal to said second predetermined value and considering the memory data location of said next column to be a first part of said fingerprint image data along the X-axis, and wherein X-END is determined in similar manner as for said X-START value but in an opposite direction from 255 ≥ X > 0 along the X-axis so that said X- END value indicates the memory data location along the X- axis where the fingerprint image data ends; computing the Y-Axis Range of the framed image data to indicate the start and end memory locations of the fingerprint image data on the Y-axis by determining Y-START and Y-END Y-axis values, wherein Y-START is determined by memory data locations (X,Y) where X-START < X < X-END and
Y-TOP < Y < Y-BOTTOM, by detecting three consecutive rows of whitespace data and a next row having a greylevel value equal to said second predetermined value and considering the memory data location of said next row to be a first part of said fingerprint image along the Y-axis, and wherein Y-END is determined in similar manner as for said Y-START value but in an opposite direction from Y-BOTTOM >
Y > Y-TOP along the Y-axis so that said Y-END value indicates the memory data location along the Y-axis where the fingerprint image data ends; defining said fingerprint identity window by determining the dimension of said window around an origin point defined as (XC,YC) wherein:
XC = X-END minus (X-END minus X-START) ÷ 3 and
YC = Y-END minus (Y-END minus Y-START) ÷ 2; and further defining the dimensional area of the said fingerprint identity window by predetermining a window-size for said fingerprint identity window and defining said dimensional area as from (XC - DIFF, YC - DIFF) to (XC +
DIFF, YC + DIFF) where DIFF = h (window-size minus 1) , wherein (XC - DIFF) = Xs, (YC - DIFF) = Ys, (XC + DIFF) = Xe, and (YC + DIFF) = Ye.
88. A method as defined in Claim 82, further comprising the steps of: selectively analyzing a plurality of different fingerprint pattern parts contained within said fingerprint identity window and computing a ridge count for each of said plurality of fingerprint pattern parts; and compiling a data matrix comprised of a plurality of ridge counts computed for the said plurality of fingerprint pattern parts to provide a non-minutiae digitized numerical identifier indicative of said image of a fingerprint of a person to be identified.
89. A method as defined in Claim 88, further comprising: providing a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data.
90. A method as defined in Claim 88, further comprising: providing a non-minutiae digitized numerical identifier having less than 100 bytes of fingerprint identification data.
91. A method as defined in Claim 88, further comprising: providing a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
92. A method as defined in Claim 83, further comprising: defining the dimensional area of the said fingerprint identity window by predetermining a window-size for said fingerprint identity window and defining said dimensional area as from (XC - DIFF, YC - DIFF) to (XC + DIFF, YC + DIFF) where DIFF = h (window-size minus 1) and (XC - DIFF) = Xs, (XC + DIFF) = Xe, (YC - DIFF) = Ys, and (YC + DIFF) = Ye.
93. A method as defined in Claim 92, further comprising the steps of: computing a count SI of ridges contained within a diagonal line from (Xs,Ys) to (Xe,Ye) ; computing a count S2 of ridges contained within a diagonal line from (Xs,Ye) to (Xe,Ys) ; computing a count Yma equal to the highest number of ridges found within any horizontal line in the Y-Axis "A-Range" which is defined as: Ys < horizontal line < YC; computing a count Ymb equal to the highest number of ridges found within any horizontal line in the Y-Axis "B-Range" which is defined as: YC < horizontal line < Ye; computing a count Ya equal to the sum total number of ridges found within all horizontal lines in the Y-Axis "A-Range" which is defined as: Ys < horizontal line
< YC, wherein Ya is stored as two counts, Yaα and Yaβ, where Yaα = total number of base 256 ridges in said sum total, and Yaβ = the remaining number or ridges counted which is always a number < 256, wherein Ya = (Yaα(256) + Yaβ) ÷ (window-size ÷ 2) ; computing a count Yb equal to the sum total number or ridges found within all horizontal lines in the Y-Axis "B-Range" which is defined as: YC < horizontal line
< Ye, wherein Yb is stored as two counts, Ybα and Ybβ, where Ybα = total number of base 256 ridges in said sum total, and Ybβ = the remaining number of ridges counted which is always a number < 256, wherein Yb = (Ybα(256) +
Ybβ) + (window-size ÷ 2) ; computing a count Yc equal to the number of ridges found within horizontal line YC on the Y-axis, wherein Yc is a whole number and YC is the Y-axis center line of said fingerprint identity window; computing a count Xma equal to the highest number of ridges found within any vertical line in the X-Axis "A- Range" which is defined as: Xs < vertical line < XC; computing a count Xmb equal to the highest number of ridges found within any vertical line in the X-Axis "B- Range" which is defined as: XC < vertical line < Xe; computing a count Xa equal to the sum total number of ridges found within all vertical lines in the X- Axis "A-Range" which is defined as: Xs < vertical line < XC, wherein Xa is stored as two counts, Xaα and Xaβ, where Xaα = total number of base 256 ridges in said sum total, and Xaβ = the remaining number of ridges counted which is always a number < 256, wherein Xa = (Xaα(256) + Xaβ) ÷ (window-size ÷ 2) ; computing a count Xb equal to the sum total number of ridges found within all vertical lines in the X- Axis "B-Range" which is defined as: XC < vertical line < Xe, wherein Xb is stored as two counts, Xbα and Xbβ, where Xbα = total number of base 256 ridges in said sum total, and Xbβ = the remaining number of ridges counted which is always a number < 256, wherein Xb = (Xbα(256) + Xbβ) ÷ (window-size ÷ 2) ; computing a count Xc equal to the number of ridges found within vertical line XC on the X-axis, wherein Xc is a whole number and XC is the X-axis center line of said fingerprint identity window; and compiling a data matrix from said counts SI, S2, Yma, Ymb, Ya, Yb, Yc, Xma, Xmb, Xa, Xb and Xc to provide a non-minutiae digitized numeric identifier having 24 bytes of fingerprint identification data.
94. A method as defined in Claim 87, further comprising the steps of: computing a count SI of ridges contained within a diagonal line from (Xs,Ys) to (Xe,Ye) ; computing a count S2 of ridges contained within a diagonal line from (Xs,Ye) to (Xe,Ys) ; computing a count Yma equal to the highest number of ridges found within any horizontal line in the Y-Axis "A-Range" which is defined as: Ys < horizontal line < YC; computing a count Ymb equal to the highest number of ridges found within any horizontal line in the Y-Axis
"B-Range" which is defined as: YC < horizontal line < Ye; computing a count Ya equal to the sum total number of ridges found within all horizontal lines in the Y-Axis "A-Range" which is defined as: Ys < horizontal line
< YC, wherein Ya is stored as two counts, Yaα and Yaβ, where Yaα = total number of base 256 ridges in said sum total, and Yaβ = the remaining number or ridges counted which is always a number < 256, wherein Ya = (Yaα(256) + Yaβ) ÷ (window-size ÷ 2) ; computing a count Yb equal to the sum total number or ridges found within all horizontal lines in the Y-Axis "B-Range" which is defined as: YC < horizontal line
< Ye, wherein Yb is stored as two counts, Ybα and Ybβ, where Ybα = total number of base 256 ridges in said sum total, and Ybβ = the remaining number of ridges counted which is always a number < 256, wherein Yb = (Ybα(256) + Ybβ) ÷ (window-size ÷ 2) ; computing a count Yc equal to the number or ridges found within horizontal line YC on the Y-axis, wherein Yc is a whole number and YC is the Y-axis center line of said fingerprint identity window; computing a count Xma equal to the highest number or ridges found within any vertical line in the X-Axis "A- Range" which is defined as: Xs < vertical line < XC; computing a count Xmb equal to the highest number of ridges found within any vertical line in the X-Axis "B- Range" which is defined as: XC < vertical line < Xe; computing a count Xa equal to the sum total number of ridges found within all vertical lines in the X- Axis "A-Range" which is defined as: Xs < vertical line < XC, wherein Xa is stored as two counts, Xaα and Xaβ, where Xaα = total number of base 256 ridges in said sum total, and Xaβ = the remaining number of ridges counted which is always a number < 256, wherein Xa = (Xaα(256) + Xaβ) ÷ (window-size ÷ 2) ; computing a count Xb equal to the sum total number of ridges found within all vertical lines in the X- Axis "B-Range" which is defined as: XC < vertical line < Xe, wherein Xb is stored as two counts, Xbα and Xbβ, where
Xbα = total number of base 256 ridges in said sum total, and Xbβ = the remaining number of ridges counted which is always a number < 256, wherein Xb = (Xbα(256) + Xbβ) ÷
(window-size ÷ 2) ; computing a count Xc equal to the number of ridges found within vertical line XC on the X-axis, wherein Xc is a whole number and XC is the X-axis center line of said fingerprint identity window; and compiling a data matrix from said counts SI, S2, Yma, Ymb, Ya, Yb, Yc, Xma, Xmb, Xa, Xb and Xc to provide a non-minutiae digitized numeric identifier having 24 bytes of fingerprint identification data.
95. A method of verifying the identity of a person comprising the steps of: a) obtaining an image of a fingerprint of a person to be identified provided via the use of an inkless means which when touched by a finger of said person causes immediate development of an image of the fingerprint of said finger in a black and white appearance; b) providing a check payable to said person, having recorded therewith a non-minutiae numerical identifier which identifies the fingerprint of the said finger of said person; c) reading said numerical identifier recorded on said check, and storing in memory the said numerical identifier; d) video scanning said image of said fingerprint provided by said inkless means to produce image data and digitizing said image data to produce a non-minutiae digitized numerical identifier indicative of said fingerprint; and e) comparing the numerical identifier of the said check stored in memory with said non- minutiae digitized numerical identifier, to verify the identity of the said person.
96. A method as defined in Claim 95, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
97. A method as defined in Claim 95, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
98. A method as defined in Claim 95, further comprising as to step a) above: providing said image by using a toe of said person.
99. A method as defined in Claim 95, further comprising as to step d) above: using a video camera to video scan the said image of the said fingerprint provided on the said inkless means.
100. A method as defined in Claim 95, further comprising the step of: prior to digitizing the said image data, storing in a random-access memory means the said image data of the scanned fingerprint.
101. A method as defined in Claim 95, further comprising: displaying verification of the identity of said person.
102. A method as defined in Claim 101, further comprising: displaying non-verification of the identity of the said person.
103. A method as defined in Claim 102, further comprising: withholding said check upon occurrence of non-verification of the identity of said person.
104. A method for verifying the identity of a person comprising the steps of: a) obtaining an image of a fingerprint of said person, said image being provided on an inkless means which when touched by a finger of the said person causes immediate development of an image of the fingerprint of said finger in a black and white appearance; b) providing a check payable to said person, having recorded therewith an encrypted numerical identifier which identifies said fingerprint of the said person; c) reading and decrypting said encrypted numerical identifier recorded on said check to provide a decrypted numerical identifier, and storing in memory said decrypted numerical identifier; d) video scanning said image of said fingerprint to produce image data and digitizing said image data of the scanned fingerprint to produce a non-minutiae digitized numerical identifier indicative of said fingerprint; and e) comparing said non-minutiae digitized numerical identifier with said decrypted numerical identifier, to verify the identity of said person.
105. A method as defined in Claim 104, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
106. A method as defined in Claim 104, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
107. A method as defined in Claim 104, further comprising as to step a) above: providing said image by using a toe of said person.
108. A method as defined in Claim 104, further comprising as to step d) above: using a video camera to video scan the said image of the said fingerprint provided on the said inkless means.
109. A method as defined in Claim 104, further comprising the step of: prior to digitizing the said image data, storing in a random-access memory means the said image data of the scanned fingerprint.
110. A method as defined in Claim 104, further comprising: displaying verification of the identity of said person.
111. A method as defined in Claim 110, further comprising: displaying non-verification of the identity of the said person.
112. A method as defined in Claim 111, further comprising: withholding said check upon occurrence of non-verification of the identity of said person.
113. A method as defined in Claim 104, wherein said decrypted numerical identifier and said non-minutiae numerical identifier each have less than 400 bytes of fingerprint identification data.
114. A method as defined in Claim 104, wherein said decrypted numerical identifier and said non-minutiae numerical identifier each have 24 bytes of fingerprint identification data.
115. A method as defined in Claim 95, wherein said non- minutiae numerical identifier and said non-minutiae digitized numerical identifier each have less than 400 bytes of fingerprint identification data.
116. A method as defined in Claim 95, wherein said non- minutiae numerical identifier and said non-minutiae digitized numerical identifier each have 24 bytes of fingerprint identification data.
117. A method as defined in Claim 28, wherein said numerical identifier recorded within said portable personnel identification means and said non-minutiae digitized numerical identifier each have less than 400 bytes of fingerprint identification data.
118. A method as defined in Claim 31, wherein said numerical identifier recorded within said credit card and said non-minutiae digitized numerical identifier each have 24 bytes of fingerprint identification data.
119. A method as defined in Claim 50, wherein said decrypted numerical identifier and said non-minutiae digitized numerical identifier each have less than 400 bytes of fingerprint identification data.
120. A method as defined in Claim 54, wherein said decrypted numerical identifier and said non-minutiae digitized numerical identifier each have 24 bytes of fingerprint identification data.
121. A method as defined in Claim 1, further comprising as to step c: providing the said non-minutiae digitized numerical identifier to another for recording said identifier within said identification means.
122. A method as defined in Claim 41, further comprising as to step c: providing said encrypted digitized numerical identifier to another for recording said encrypted identifier within said identification means.
123. A method as defined in Claim 10, further comprising as to step c: providing the said non-minutiae digitized numerical identifier to another for recording said identifier within said identification means.
124. A method as defined in Claim 19, further comprising as to step c: providing said encrypted digitized numerical identifier to another for recording said encrypted identifier within said identification means.
125. A method of verifying the identity of a check payee comprising the steps of: a) obtaining an image of a fingerprint of a person to be identified as a check payee, said image being provided via the use of an inkless means which when touched by a finger of said person causes immediate development of an image of the fingerprint of said finger in a black and white appearance; b) providing a check payable to said check payee; c) providing a portable personnel identification means having recorded therewith a non-minutiae numerical identifier which identifies the fingerprint of said check payee; d) reading said numerical identifier recorded on said portable personnel identification means, and storing in memory the said numerical identifier; e) video scanning said image of said fingerprint provided by said inkless means to produce image data and digitizing said image data to produce a non-minutiae digitized numerical identifier indicative of said fingerprint; f) comparing the numerical identifier of the said portable personnel identification means stored in memory with said non-minutiae digitized numerical identifier, to verify the identity of said person as the said check payee; and g) printing on said check payable an identity verification message.
126. A method as defined in Claim 125, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
127. A method as defined in Claim 125, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
128. A method as defined in Claim 125, further comprising as to step a) above: providing said image by using a toe of said person.
129. A method as defined in Claim 125, further comprising as to step d) above: using a video camera to video scan the said image of the said fingerprint provided on the said inkless means.
130. A method as defined in Claim 125, further comprising the step of: prior to digitizing the said image data, storing in a random-access memory means the said image data of the scanned fingerprint.
131. A method for verifying the identity of a check payee comprising the steps of: a) obtaining an image of a fingerprint of a person to be identified as a check payee, said image being provided on an inkless means which when touched by a finger of the said person causes immediate development of an image of the fingerprint of said finger in a black and white appearance; b) providing a check payable to said check payee; c) providing a portable personnel identification means having recorded therewith an encrypted non-minutiae numerical identifier which identifies the fingerprint of said check payee; d) reading and decrypting said encrypted numerical identifier recorded on said portable personnel identification means to provide a decrypted numerical identifier, and storing in memory said decrypted numerical identifier; e) video scanning said image of said fingerprint to produce image data and digitizing said image data of the scanned fingerprint to produce a nori-minutiae digitized numerical identifier indicative of said fingerprint; f) comparing said non-minutiae digitized numerical identifier with said decrypted numerical identifier, to verify the identity of said person as the said check payee; and g) printing on said check payable an identification verification message.
132. A method as defined in Claim 131, further comprising as to step a) above: using the index finger of said person to be identified to provide said fingerprint.
133. A method as defined in Claim 131, further comprising as to step a) above: using the thumb of said person to be identified to provide said fingerprint.
134. A method as defined in Claim 131, further comprising as to step a) above: providing said image by using a toe of said person.
135. A method as defined in Claim 131, further comprising as to step d) above: using a video camera to video scan the said image of the said fingerprint provided on the said inkless means.
136. A method as defined in Claim 131, further comprising the step of: prior to digitizing the said image data, storing in a random-access memory means the said image data of the scanned fingerprint.
137. A method as defined in Claim 125, wherein said non- minutiae numerical identifier and said non-minutiae digitized numerical identifier each have less than 400 bytes of fingerprint identification data.
138. A method as defined in Claim 125, wherein said non- minutiae numerical identifier and said non-minutiae digitized numerical identifier each have 24 bytes of fingerprint identification data.
139. A method as defined in Claim 131, wherein said decrypted numerical identifier and said non-minutiae digitized numerical identifier each have less than 400 bytes of fingerprint identification data.
140. A method as defined in Claim 131, wherein said decrypted numerical identifier and said non-minutiae digitized numerical identifier each have 24 bytes of fingerprint identification data.
141. An automatic non-minutiae fingerprint identification system comprising in combination: fingerprint format holder means for positioning a fingerprint format in a predetermined scan position; video scanner means for scanning an image of a fingerprint of a person to be identified provided by said fingerprint format, to produce image data including fingerprint image data and whitespace data; video digitizer means for converting said fingerprint image and whitespace data into digital image data; addressable memory means for storing said digital image data; program-controlled processor means for selectively analyzing a plurality of different fingerprint pattern parts of the said digital image data stored in said addressable memory means, to provide a non-minutiae digitized numerical identifier indicative of said image of a fingerprint of a person to be identified; portable personnel identification card reader means for reading a numerical identifier recorded within the confines of a portable personnel identification card means and indicative of said fingerprint of said person to be identified; memory means for storing said numerical identifier read by said card reader means; and means for comparing the said numerical identifier with said non-minutiae digitized numerical identifier, to verify the identity of the said person to be identified.
142. A system as defined in Claim 141 further comprising: means for defining a fingerprint identity window within the said digital image data.
143. A system as defined in Claim 141 further comprising: means for image framing the said digital image data to a predetermined dimension and for determining the location of the said fingerprint image data within the said digital image data.
144. A system as defined in Claim 141 further comprising LCD display means for displaying system messages.
145. A system as defined in Claim 144 wherein said program-controlled processor means provides a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data.
146. A system as defined in Claim 144 wherein said program-controlled processor means provides a non-minutiae digitized numerical identifier having less than 100 bytes of fingerprint identification data.
147. A system as defined in Claim 144 wherein said program-controlled processor means provides a non-minutiae digitized numerical identifier having 24 bytes of fingerprint identification data.
148. A system as defined in Claim 144 further comprising: inkless fingerprint format means for providing said image of a fingerprint.
149. A system as defined in Claim 142 further comprising: inkless fingerprint format means for providing said image of a fingerprint.
150. A system as defined in Claim 143 further comprising: inkless fingerprint format means for providing said image of a fingerprint.
151. A system as defined in Claim 144 further comprising: wherein said portable personnel identification card reader means comprises a smart card reader.
152. A system as defined in Claim 151 wherein said program-controlled processor means provides a non-minutiae digitized numerical identifier having less than 400 bytes of fingerprint identification data.
153. A system as defined in Claim 151 further comprising inkless fingerprint format means for providing said image of a fingerprint.
154. A system as defined in Claim 141 further comprising: printer means for printing on a check payable an identity verification message.
155. A system as defined in Claim 154 further comprising check payable entry and exit slots which function to provide access to and exit from said printer means of said check payable.
156. A system as defined in Claim 151 further comprising slot access means for inserting a smart card into said smart card reader.
157. A system as defined in Claim 141 further comprising: inkless fingerprint format means for providing said image of a fingerprint.
PCT/US1990/006172 1989-11-02 1990-10-31 Non-minutiae automatic fingerprint identification system and methods WO1991006920A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US43042189A 1989-11-02 1989-11-02
US430,421 1989-11-02

Publications (1)

Publication Number Publication Date
WO1991006920A1 true WO1991006920A1 (en) 1991-05-16

Family

ID=23707490

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1990/006172 WO1991006920A1 (en) 1989-11-02 1990-10-31 Non-minutiae automatic fingerprint identification system and methods

Country Status (3)

Country Link
US (2) US5363453A (en)
AU (1) AU6723090A (en)
WO (1) WO1991006920A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2256170A (en) * 1991-05-02 1992-12-02 William Robert Brandes Integrated circuit card with fingerprint verification.
US5509083A (en) * 1994-06-15 1996-04-16 Nooral S. Abtahi Method and apparatus for confirming the identity of an individual presenting an identification card
WO1998001820A1 (en) * 1996-07-05 1998-01-15 Dynamic Data Systems Pty. Ltd. Identification storage medium and system and method for providing access to authorised users
US5954583A (en) * 1992-11-05 1999-09-21 Com21 Limited Secure access control system
EP1045346A2 (en) * 1999-03-18 2000-10-18 Omron Corporation Personal identification device and method
WO2001008055A1 (en) * 1999-07-23 2001-02-01 Grosvenor Leisure Incorporated Secure transaction and terminal therefor
EP1315118A1 (en) * 2001-11-20 2003-05-28 Taylor Wayne System for identity verification
US7506172B2 (en) 2002-01-07 2009-03-17 Igt Gaming device with biometric system

Families Citing this family (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10361802B1 (en) 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
JP2908204B2 (en) * 1993-11-12 1999-06-21 日本電気ソフトウェア株式会社 Ten finger fingerprint card input device
US5815252A (en) * 1995-09-05 1998-09-29 Canon Kabushiki Kaisha Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives
US5841888A (en) 1996-01-23 1998-11-24 Harris Corporation Method for fingerprint indexing and searching
US5963679A (en) * 1996-01-26 1999-10-05 Harris Corporation Electric field fingerprint sensor apparatus and related methods
US5828773A (en) * 1996-01-26 1998-10-27 Harris Corporation Fingerprint sensing method with finger position indication
US6067368A (en) * 1996-01-26 2000-05-23 Authentec, Inc. Fingerprint sensor having filtering and power conserving features and related methods
US5956415A (en) * 1996-01-26 1999-09-21 Harris Corporation Enhanced security fingerprint sensor package and related methods
US5897989A (en) * 1996-07-23 1999-04-27 Beecham; James E. Method, apparatus and system for verification of infectious status of humans
US5982913A (en) * 1997-03-25 1999-11-09 The United States Of America As Represented By The National Security Agency Method of verification using a subset of claimant's fingerprint
US6088471A (en) * 1997-05-16 2000-07-11 Authentec, Inc. Fingerprint sensor including an anisotropic dielectric coating and associated methods
US6098330A (en) * 1997-05-16 2000-08-08 Authentec, Inc. Machine including vibration and shock resistant fingerprint sensor and related methods
US5903225A (en) * 1997-05-16 1999-05-11 Harris Corporation Access control system including fingerprint sensor enrollment and associated methods
US5920640A (en) * 1997-05-16 1999-07-06 Harris Corporation Fingerprint sensor and token reader and associated methods
US5953441A (en) * 1997-05-16 1999-09-14 Harris Corporation Fingerprint sensor having spoof reduction features and related methods
US5940526A (en) * 1997-05-16 1999-08-17 Harris Corporation Electric field fingerprint sensor having enhanced features and related methods
US6088585A (en) * 1997-05-16 2000-07-11 Authentec, Inc. Portable telecommunication device including a fingerprint sensor and related methods
US6259804B1 (en) 1997-05-16 2001-07-10 Authentic, Inc. Fingerprint sensor with gain control features and associated methods
US20010053239A1 (en) * 1997-11-12 2001-12-20 Jasper Consulting, Inc. Credit card fraud elimination system
US6560741B1 (en) * 1999-02-24 2003-05-06 Datastrip (Iom) Limited Two-dimensional printed code for storing biometric information and integrated off-line apparatus for reading same
US6681034B1 (en) * 1999-07-15 2004-01-20 Precise Biometrics Method and system for fingerprint template matching
US8036431B1 (en) * 1999-10-29 2011-10-11 Identix Incorporated Portable apparatus for identification verification
US6325285B1 (en) 1999-11-12 2001-12-04 At&T Corp. Smart card with integrated fingerprint reader
CA2407549C (en) * 2000-06-28 2004-09-14 G. Holdings Ltd. Transaction system with portable personal device for transaction identification and control
US20040260657A1 (en) * 2000-07-18 2004-12-23 John Cockerham System and method for user-controlled on-line transactions
US6766040B1 (en) 2000-10-02 2004-07-20 Biometric Solutions, Llc System and method for capturing, enrolling and verifying a fingerprint
US7382911B1 (en) * 2001-02-16 2008-06-03 Hand Held Products, Inc. Identification card reader
US7359553B1 (en) * 2001-02-16 2008-04-15 Bio-Key International, Inc. Image identification system
US20020196963A1 (en) * 2001-02-23 2002-12-26 Biometric Security Card, Inc. Biometric identification system using a magnetic stripe and associated methods
US20020138438A1 (en) * 2001-02-23 2002-09-26 Biometric Security Card, Inc. Biometric identification system using biometric images and copy protect code stored on a magnetic stripe and associated methods
US6959874B2 (en) * 2001-02-23 2005-11-01 Bardwell William E Biometric identification system using biometric images and personal identification number stored on a magnetic stripe and associated methods
CN1537301A (en) * 2001-03-16 2004-10-13 G���ع����޹�˾ System and method for replacing identification data on portable identification device
US7181017B1 (en) 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
AU2002339746A1 (en) * 2001-05-18 2002-12-03 Imprivata Inc. System and method for authentication using biometrics
US20020176611A1 (en) * 2001-05-23 2002-11-28 Dong Mimi C. Fingerprint addressing system and method
US6758394B2 (en) * 2001-07-09 2004-07-06 Infonox On The Web Identity verification and enrollment system for self-service devices
KR100432490B1 (en) 2001-09-17 2004-05-22 (주)니트 젠 Optical fingerprint acquisition apparatus
US6675095B1 (en) 2001-12-15 2004-01-06 Trimble Navigation, Ltd On-board apparatus for avoiding restricted air space in non-overriding mode
US20030116630A1 (en) 2001-12-21 2003-06-26 Kba-Giori S.A. Encrypted biometric encoded security documents
US20030117262A1 (en) * 2001-12-21 2003-06-26 Kba-Giori S.A. Encrypted biometric encoded security documents
JP3535494B2 (en) * 2001-12-25 2004-06-07 エヌティティエレクトロニクス株式会社 Fingerprint image determination device and program
FR2835075B1 (en) * 2002-01-23 2004-05-21 Ier METHOD FOR CONTROLLING ACCESS TO A SENSITIVE AREA, PARTICULARLY A TRANSPORT APPARATUS, BY BIOMETRIC VERIFICATION
US7013030B2 (en) * 2002-02-14 2006-03-14 Wong Jacob Y Personal choice biometric signature
US7039223B2 (en) * 2002-02-14 2006-05-02 Wong Jacob Y Authentication method utilizing a sequence of linear partial fingerprint signatures selected by a personal code
US7035443B2 (en) * 2002-03-22 2006-04-25 Wong Jacob Y Personal choice biometric signature
US20040008875A1 (en) * 2002-07-09 2004-01-15 Miguel Linares 3-D fingerprint identification system
WO2004013801A2 (en) * 2002-08-02 2004-02-12 Cross Match Technologies, Inc. System and method for counting ridges in a captured print image
US7822688B2 (en) 2002-08-08 2010-10-26 Fujitsu Limited Wireless wallet
US7784684B2 (en) 2002-08-08 2010-08-31 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
US7349871B2 (en) * 2002-08-08 2008-03-25 Fujitsu Limited Methods for purchasing of goods and services
US7353382B2 (en) 2002-08-08 2008-04-01 Fujitsu Limited Security framework and protocol for universal pervasive transactions
US20040107170A1 (en) * 2002-08-08 2004-06-03 Fujitsu Limited Apparatuses for purchasing of goods and services
US7606560B2 (en) 2002-08-08 2009-10-20 Fujitsu Limited Authentication services using mobile device
US7801826B2 (en) 2002-08-08 2010-09-21 Fujitsu Limited Framework and system for purchasing of goods and services
AU2003260047A1 (en) * 2002-08-29 2004-03-19 Paul Rudolf Associative memory device and method based on wave propagation
US20040064709A1 (en) * 2002-09-30 2004-04-01 Heath James G. Security apparatus and method
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
US7660880B2 (en) * 2003-03-21 2010-02-09 Imprivata, Inc. System and method for automated login
US20040187029A1 (en) * 2003-03-21 2004-09-23 Ting David M. T. System and method for data and request filtering
US7877605B2 (en) 2004-02-06 2011-01-25 Fujitsu Limited Opinion registering application for a universal pervasive transaction framework
US7356170B2 (en) 2004-02-12 2008-04-08 Lenovo (Singapore) Pte. Ltd. Fingerprint matching method and system
KR101016848B1 (en) * 2004-03-22 2011-02-22 엘지전자 주식회사 Fingerprint symmetry axis extraction method
US20050249388A1 (en) * 2004-05-07 2005-11-10 Linares Miguel A Three-dimensional fingerprint identification system
US20060005050A1 (en) * 2004-06-10 2006-01-05 Supercom Ltd. Tamper-free and forgery-proof passport and methods for providing same
US7155040B2 (en) * 2004-06-29 2006-12-26 Bio-Key International, Inc. Generation of quality field information in the context of image processing
US20060083413A1 (en) * 2004-10-14 2006-04-20 The Secretary Of State For The Home Department Identifier investigation
US7255082B2 (en) * 2005-03-09 2007-08-14 Zajac Optimum Output Motors, Inc. Rotary valve system and engine using the same
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US20070131759A1 (en) * 2005-12-14 2007-06-14 Cox Mark A Smartcard and magnetic stripe emulator with biometric authentication
US7950021B2 (en) * 2006-03-29 2011-05-24 Imprivata, Inc. Methods and systems for providing responses to software commands
US20070252001A1 (en) * 2006-04-25 2007-11-01 Kail Kevin J Access control system with RFID and biometric facial recognition
US7604166B2 (en) * 2006-06-12 2009-10-20 Rania Abouyounes Method and system for flexible purchases using only fingerprints at the time and location of purchase
US20080126260A1 (en) * 2006-07-12 2008-05-29 Cox Mark A Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication
US8265352B1 (en) * 2007-03-28 2012-09-11 Azimuth, Inc. Photographic fingerprint collection and imaging system
GB0819069D0 (en) 2008-10-17 2008-11-26 Forensic Science Service Ltd Improvements in and relating to methods and apparatus for comparison
CN101770299B (en) * 2008-12-26 2013-11-06 深圳富泰宏精密工业有限公司 System and method for realizing functions of navigation keys
US8816819B2 (en) 2011-02-24 2014-08-26 Moon J. Kim Dynamic information radio-frequency identification (RFID) card with biometric capabilities
US8958134B2 (en) 2011-05-17 2015-02-17 Moon J. Kim Image array with localized light source
US9965607B2 (en) 2012-06-29 2018-05-08 Apple Inc. Expedited biometric validation
US9928355B2 (en) 2013-09-09 2018-03-27 Apple Inc. Background enrollment and authentication of a user
CN108399397A (en) * 2018-03-21 2018-08-14 常州金姆健康科技有限公司 A kind of optical scanner pulse wave capture device and a kind of finger-print switch

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4210899A (en) * 1975-06-23 1980-07-01 Fingermatrix, Inc. Fingerprint-based access control and identification apparatus
US4747147A (en) * 1985-09-03 1988-05-24 Sparrow Malcolm K Fingerprint recognition and retrieval system
US4811414A (en) * 1987-02-27 1989-03-07 C.F.A. Technologies, Inc. Methods for digitally noise averaging and illumination equalizing fingerprint images
US4896363A (en) * 1987-05-28 1990-01-23 Thumbscan, Inc. Apparatus and method for matching image characteristics such as fingerprint minutiae
US4944021A (en) * 1984-04-18 1990-07-24 Nec Corporation Identification system employing verification of fingerprints

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2952181A (en) * 1956-12-31 1960-09-13 Jr John Andrew Maurer Method of and apparatus for automatic identification of finger prints
US3231861A (en) * 1960-09-01 1966-01-25 Ibm Automatic recognition of fingerprints by sensing the skin surface with electrical apparatus
US3245697A (en) * 1964-01-13 1966-04-12 Universal Electronic Credit Sy Information card
US3292149A (en) * 1964-06-18 1966-12-13 Ibm Identification and comparison apparatus for contour patterns such as fingerprints
US3383657A (en) * 1965-05-28 1968-05-14 Ibm Personnel security system having personally carried card with fingerprint identification
US3566354A (en) * 1967-07-14 1971-02-23 Ibm Contour pattern scanner
US3584958A (en) * 1968-09-13 1971-06-15 Indentimation Corp Identification system
US3801823A (en) * 1970-07-08 1974-04-02 J Korn Credit card identification device
US3771129A (en) * 1972-07-27 1973-11-06 Sperry Rand Corp Optical processor fingerprint identification apparatus
US3944978A (en) * 1974-09-09 1976-03-16 Recognition Systems, Inc. Electro-optical method and apparatus for making identifications
US3968475A (en) * 1974-11-11 1976-07-06 Sperry Rand Corporation Digital processor for extracting data from a binary image
US3959884A (en) * 1975-07-25 1976-06-01 First Ann Arbor Corporation Method of classifying fingerprints
US4109237A (en) * 1977-01-17 1978-08-22 Hill Robert B Apparatus and method for identifying individuals through their retinal vasculature patterns
US4152056A (en) * 1977-09-02 1979-05-01 Fowler Randall C Fingerprinting arrangement
DE3072034D1 (en) * 1979-12-24 1987-10-29 Electro Optic Dev Method and device for carrying out a comparison between certain patterns, especially finger prints
US4325570A (en) * 1980-05-05 1982-04-20 Estrada Carlos I Identification system
US4537484A (en) * 1984-01-30 1985-08-27 Identix Incorporated Fingerprint imaging apparatus
US4618988A (en) * 1984-07-25 1986-10-21 Fingermatrix, Inc. Matcher
US4696046A (en) * 1985-08-02 1987-09-22 Fingermatrix, Inc. Matcher
US4816653A (en) * 1986-05-16 1989-03-28 American Telephone And Telegraph Company Security file system for a portable data carrier
US4817183A (en) * 1986-06-16 1989-03-28 Sparrow Malcolm K Fingerprint recognition and retrieval system
US5067162A (en) * 1986-06-30 1991-11-19 Identix Incorporated Method and apparatus for verifying identity using image correlation
US4790564A (en) * 1987-02-20 1988-12-13 Morpho Systemes Automatic fingerprint identification system including processes and apparatus for matching fingerprints
US4874932A (en) * 1987-09-26 1989-10-17 Omron Tateisi Electronics Co. Card authorization terminal
US4933976A (en) * 1988-01-25 1990-06-12 C.F.A. Technologies, Inc. System for generating rolled fingerprint images
US4947027A (en) * 1988-02-02 1990-08-07 Golightly Cecelia K System for identifying authorized use of credit cards
DE68905237T2 (en) * 1988-05-24 1993-07-29 Nec Corp METHOD AND DEVICE FOR COMPARING FINGERPRINTS.

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4210899A (en) * 1975-06-23 1980-07-01 Fingermatrix, Inc. Fingerprint-based access control and identification apparatus
US4944021A (en) * 1984-04-18 1990-07-24 Nec Corporation Identification system employing verification of fingerprints
US4747147A (en) * 1985-09-03 1988-05-24 Sparrow Malcolm K Fingerprint recognition and retrieval system
US4811414A (en) * 1987-02-27 1989-03-07 C.F.A. Technologies, Inc. Methods for digitally noise averaging and illumination equalizing fingerprint images
US4896363A (en) * 1987-05-28 1990-01-23 Thumbscan, Inc. Apparatus and method for matching image characteristics such as fingerprint minutiae

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2256170A (en) * 1991-05-02 1992-12-02 William Robert Brandes Integrated circuit card with fingerprint verification.
US5954583A (en) * 1992-11-05 1999-09-21 Com21 Limited Secure access control system
US5509083A (en) * 1994-06-15 1996-04-16 Nooral S. Abtahi Method and apparatus for confirming the identity of an individual presenting an identification card
WO1998001820A1 (en) * 1996-07-05 1998-01-15 Dynamic Data Systems Pty. Ltd. Identification storage medium and system and method for providing access to authorised users
EP1045346A2 (en) * 1999-03-18 2000-10-18 Omron Corporation Personal identification device and method
EP1045346A3 (en) * 1999-03-18 2000-11-29 Omron Corporation Personal identification device and method
US6907134B1 (en) 1999-03-18 2005-06-14 Omron Corporation Personal identification device and method
WO2001008055A1 (en) * 1999-07-23 2001-02-01 Grosvenor Leisure Incorporated Secure transaction and terminal therefor
EP1315118A1 (en) * 2001-11-20 2003-05-28 Taylor Wayne System for identity verification
US7239727B2 (en) 2001-11-20 2007-07-03 Synergex Group Llc Method and device for verifying a person's identity by signature analysis
US7506172B2 (en) 2002-01-07 2009-03-17 Igt Gaming device with biometric system
AU2008237577B2 (en) * 2002-01-07 2010-07-22 Igt Gaming device with biometric system

Also Published As

Publication number Publication date
AU6723090A (en) 1991-05-31
US5363453A (en) 1994-11-08
US6212290B1 (en) 2001-04-03

Similar Documents

Publication Publication Date Title
US5363453A (en) Non-minutiae automatic fingerprint identification system and methods
US5598474A (en) Process for encrypting a fingerprint onto an I.D. card
US4805223A (en) Skin-pattern recognition method and device
CA2170440C (en) Self-verifying identification card
US5073950A (en) Finger profile identification system
US5668874A (en) Identification card verification system and method
US5869822A (en) Automated fingerprint identification system
US5790674A (en) System and method of providing system integrity and positive audit capabilities to a positive identification system
EP0772530B1 (en) Unalterable self-verifying articles
US5321765A (en) Method and apparatus for verifying identity
US4811408A (en) Image dissecting document verification system
US6208264B1 (en) Personal verification in a commercial transaction system
US5553155A (en) Low cost method employing time slots for thwarting fraud in the periodic issuance of food stamps, unemployment benefits or other governmental human services
US20020138351A1 (en) Positive identification system and method
US20030233557A1 (en) Electronic signature verification method and apparatus
EP0612040A2 (en) Method and apparatus for credit card verification
CA2221321A1 (en) Tokenless identification system for authorization of electronic transactions and electronic transmissions
CN1173234A (en) System for varifying use of a credit/identification card including recording of physical attributes of unauthorized users
GB2069203A (en) Multilevel security apparatus and method
JP2009543176A (en) Traceless biometric identification system and method
Hollingum Automated fingerprint analysis offers fast verification
CA2142227A1 (en) Combination radiofrequency identification card - fingerprint identification system
CN100489882C (en) Method, device and system for biometric identification
JPH10134191A (en) Person discrimination system by face shape
CN2332002Y (en) Automatic recognition device for common signature, signing and cipher signature

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU BR CA JP SU

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LU NL SE

NENP Non-entry into the national phase

Ref country code: CA