System and method for secure five-dimensional user identification
First Claim
Patent Images
1. A method for secure user identification, comprising:
- creating a first user identification, using an identification device comprising at least a processor, a memory, and a plurality of programming instructions stored in the memory and operating on the processor, the identification comprising;
a video recording of a user'"'"'s head, recorded from a range of positions and using illumination in different wavelengths;
a point cloud model of the user'"'"'s head, based on at least a portion of the video recording;
a three-dimensional mesh model of the user'"'"'s head, based on at least a portion of the video recording;
a first motion signature comprising a plurality of head movements measured during the creation of the video recording, the first motion signature being uniquely identifiable to the user; and
a second motion signature comprising a plurality of hand movements measured during the creation of the video recording, the second motion signature being uniquely identifiable to the user;
uniquely associating the user identification with the user,recording, using the identification device, an unknown user'"'"'s head from a range of positions and using illumination in different wavelengths;
retrieving a second user identification; and
comparing, using the identification device, the second user identification against the recording of the unknown user'"'"'s head and a plurality of measured movements of the unknown user'"'"'s head and hand to identify the unknown user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for secure user identification is disclosed, comprising the steps of: creating a first user identification; uniquely associating the user identification with the user; recording, using the identification device, an unknown user'"'"'s head from a range of positions and using illumination in different wavelengths; retrieving a second user identification; and comparing, using the identification device, the second user identification against the recording of the unknown user'"'"'s head and a plurality of measured movements of the unknown user'"'"'s head and hand to identify the unknown user.
15 Citations
8 Claims
-
1. A method for secure user identification, comprising:
-
creating a first user identification, using an identification device comprising at least a processor, a memory, and a plurality of programming instructions stored in the memory and operating on the processor, the identification comprising; a video recording of a user'"'"'s head, recorded from a range of positions and using illumination in different wavelengths; a point cloud model of the user'"'"'s head, based on at least a portion of the video recording; a three-dimensional mesh model of the user'"'"'s head, based on at least a portion of the video recording; a first motion signature comprising a plurality of head movements measured during the creation of the video recording, the first motion signature being uniquely identifiable to the user; and a second motion signature comprising a plurality of hand movements measured during the creation of the video recording, the second motion signature being uniquely identifiable to the user; uniquely associating the user identification with the user, recording, using the identification device, an unknown user'"'"'s head from a range of positions and using illumination in different wavelengths; retrieving a second user identification; and comparing, using the identification device, the second user identification against the recording of the unknown user'"'"'s head and a plurality of measured movements of the unknown user'"'"'s head and hand to identify the unknown user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification