Method and apparatus for digital encoding and operator identification using stored user image
First Claim
1. A device security method for verifying an authorized user, comprising:
- storing an authorized user video image corresponding to authorized user identity data;
receiving a present user video image corresponding to user identity data;
determining image differences between the present user video image and the authorized user video image; and
in response to the determination of image differences and to a difference threshold level, determining whether to permit device usage.
1 Assignment
0 Petitions
Accused Products
Abstract
A security method uses a single stored object as both an MPEG4 object for video compression, and for user identification and security. An authorized user video image is digitized to create corresponding authorized user identity data, which is stored as pixel data. A method is provided using the authorized user video image as a reference image for compression techniques. A stored image difference threshold level, defines the required degree of image match necessary. A present user video image is received, and digitized to create corresponding present user identity data. Image differences, between the present user video image and the authorized user video image are determined and compared to the image difference threshold level to determine whether to permit device usage. In one embodiment, video images are stored in MPEG4 format. The protected device is disabled when differences between a present user video image and an authorized user video image exceed threshold level. Alternate user authorization is optionally requested if image authentication fails. A present user video image is optionally stored or transmitted to a monitoring station if video authentication fails. Motion in present user video image is optionally detected as a prerequisite to authentication. An apparatus for carrying out the video security and compression methods is provided.
-
Citations
20 Claims
-
1. A device security method for verifying an authorized user, comprising:
-
storing an authorized user video image corresponding to authorized user identity data;
receiving a present user video image corresponding to user identity data;
determining image differences between the present user video image and the authorized user video image; and
in response to the determination of image differences and to a difference threshold level, determining whether to permit device usage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A video security apparatus, comprising:
-
a video image input means for producing a user video image;
a user video image digitizing means for creating a digital representation of the user video image;
a user video reference image memory for storing at least one digital user video image as a user video reference image;
a user video reference image control means for controlling access to the user video reference image memory;
a comparison means for determining difference information between the user video reference image and the user video image;
an authentication means for determining an identity mismatch from the difference information; and
an output for communicating the identity mismatch. - View Dependent Claims (13, 14)
-
-
16. An interframe coding method for performing predictive coding using a stored authorized user video image corresponding to authorized user identity data, comprising:
-
receiving a present user video image corresponding to user identity data;
communicating the authorized user video image to a remote video image receiver;
storing the authorized user video image at the remote video image receiver;
determining image difference information between the present user video image and the authorized user video image;
transmitting the difference information to the remote video image receiver;
combining the authorized user video image and the difference information to form an output user video image at the remote video image receiver; and
displaying the output user video image. - View Dependent Claims (17, 18, 19, 20)
-
Specification