Biometric authentication of individuals utilizing characteristics of bone and blood vessel structures
First Claim
1. A computer-implemented method for granting access to a user over a data communication network, utilizing biometric authentication enhanced with non-invasive bone structure matching, the access grant method comprising:
- receiving an access request at a network interface of an access server;
receiving a data transmission of a vertice profile at a network interface of the authentication server, the vertice profile generated from an anatomical multi-dimensional image scanned of a human body part by a scanning device of from a first biometric device, wherein the vertice profile provides relative locations of divots and peaks of the bone structure;
utilizing biometric authentication enhanced with non-invasive bone structure matching comprising;
generating, via a processor and memory of the authentication server, a vertice profile from the relative locations of divots and peaks of the bone structure, and determining, via the processor and memory of the authentication server, if the generated vertice profile and a database stored vertice profile, through comparison, meets a pre-determined threshold of accuracy; and
responsive to a determination that the generated vertice profile and a database stored vertice profile meets a pre-determined threshold of accuracy, granting the access request to the user through the network interface of the authentication server based on a particular level of permissions associated with a user policy.
2 Assignments
0 Petitions
Accused Products
Abstract
Biometric authentication of a subject utilizing bone and/or blood vessel (vein or artery) structures is provided. A vertice profile is generated from a non-invasive, multi-dimensional image scan of a subject or a portion thereof. The vertice profile is generated by identifying relative locations of divots and peaks on a surface of a bone structure or by identifying branch intersections and traversals of blood vessels. Additional verification techniques can be used for proof of life (verification of human subject). If authenticated, access to physical or digital/virtual assets is allowed.
-
Citations
1 Claim
-
1. A computer-implemented method for granting access to a user over a data communication network, utilizing biometric authentication enhanced with non-invasive bone structure matching, the access grant method comprising:
-
receiving an access request at a network interface of an access server; receiving a data transmission of a vertice profile at a network interface of the authentication server, the vertice profile generated from an anatomical multi-dimensional image scanned of a human body part by a scanning device of from a first biometric device, wherein the vertice profile provides relative locations of divots and peaks of the bone structure; utilizing biometric authentication enhanced with non-invasive bone structure matching comprising;
generating, via a processor and memory of the authentication server, a vertice profile from the relative locations of divots and peaks of the bone structure, and determining, via the processor and memory of the authentication server, if the generated vertice profile and a database stored vertice profile, through comparison, meets a pre-determined threshold of accuracy; andresponsive to a determination that the generated vertice profile and a database stored vertice profile meets a pre-determined threshold of accuracy, granting the access request to the user through the network interface of the authentication server based on a particular level of permissions associated with a user policy.
-
Specification