Authentication system
First Claim
Patent Images
1. A method of authenticating the identity of a user, the method comprising:
- a. placing, in sequence, each of a plurality of parts of the user'"'"'s body on a biometric contact sensor at a sensing position;
b. obtaining from the sensor a data set of biometric contact characteristics for each of the plurality of body parts;
c. comparing each data set with authentic versions stored in a database; and
, d. issuing an authentication signal if the data sets satisfactorily match the corresponding authentic versions.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating the identity of a user is described. Each of a plurality of parts of the user'"'"'s body are placed, in sequence, on a biometric contact sensor at a sensing position.
A data set of biometric contact characteristics for each of the plurality of body parts is obtained from the sensor.
Each data set is compared with authentic versions stored in a database and an authentication signal is issued if the data sets satisfactorily match the corresponding authentic versions.
19 Citations
17 Claims
-
1. A method of authenticating the identity of a user, the method comprising:
-
a. placing, in sequence, each of a plurality of parts of the user'"'"'s body on a biometric contact sensor at a sensing position;
b. obtaining from the sensor a data set of biometric contact characteristics for each of the plurality of body parts;
c. comparing each data set with authentic versions stored in a database; and
,d. issuing an authentication signal if the data sets satisfactorily match the corresponding authentic versions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of authenticating the identity of a user, the method comprising:
-
a. obtaining a sequence of data sets of biometric characteristics of the user, each data set relating to one of a plurality of parts of the user'"'"'s body;
b. comparing each data set with authentic versions stored in a database;
c. monitoring the order in which the sequence of data sets was obtained; and
,d. issuing an authentication signal if the data sets satisfactorily match the corresponding authentic versions and the sequence of data sets was obtained in a predetermined order. - View Dependent Claims (15, 16, 17)
-
Specification