×

Rjen fingerprint decoder

  • US 20050249389A1
  • Filed: 10/26/2004
  • Published: 11/10/2005
  • Est. Priority Date: 05/04/2004
  • Status: Abandoned Application
First Claim
Patent Images

1. A composite process is claimed whereby a scanned fingerprint is converted into a series of numbers which series can serve, among other things, but not limited to, an Identity Code for the individual providing the scanned print using one of his or her own fingers. This process is comprised of:

  • 1) Creating a Library of fingerprint “

    patterns”

    by creating a file which will reside on the hard-drive of the unit and will contain one sample each of the eight basic fingerprint patterns, namely the double loop, the plain arch, the central pocket loop, the ulnar loop, the accidental, the tented arch, the plain whorl and the radial loop patterns. The library is created by writing these pattern samples to the designated file on the hard-drive, thereby creating a library with eight characters with each fingerprint pattern being viewed as a “

    character. 2) Creating a Coordinated Grid Calculator by intersecting five equi-spaced vertical lines with 4 equi-spaced horizontal lines to form a grid consisting of twelve equally sized, four-sided cells with each vertical and horizontal line having a fixed and assigned numerical value. 3) Obtaining a scanned image of a fingerprint by pressing the pad of a fingertip against the screen of a fingerprint scanner and transferring the scanned image onto a computer monitor via a standard protocol connection between the scanner and the computer. 4) Identifying the basic pattern contained in the displayed scanned image by invoking a “

    search and find”

    routine where the content of the library file is accessed and each character in the library file is compared with the fingerprint pattern onscreen until the character with the highest percentage of similarity to the onscreen image is located. 5) Extracting the pattern from the displayed scanned image determined to be the closest match when compared with the characters in the library and writing it to a temporary file also resident on the hard-drive. 6) Invoking a routine to display the Coordinated Grid Calculator onscreen and copying the contents of the temporary file where the fingerprint pattern resides and superimposing the fingerprint pattern over the Coordinated Grid Calculator in such a manner that both the fingerprint pattern and the Coordinated Grid Calculator are visible and transparent. 7) “

    Cleaning Up”

    the image of the scanned fingerprint on the Coordinated Grid Calculator screen by a process of deleting all extraneous dots, markings, lines, and other bits of data from the scanned fingerprint image that are not an intrinsic part of the basic pattern as determined from comparing the scanned image with the contents of the library characters and saving them to a temporary file with residence on the hard-drive. Removing the remnant of the scanned fingerprint image from the Coordinated Grid Calculator by deleting it and copying the contents of the file containing the extraneous dots, markings, lines, and other bits of data previously saved, back onto the Coordinated Grid Calculator screen in such a transparent manner as to see the extraneous dots, markings, lines, and other bits of data dispersed throughout the cells of the Coordinated Grid Calculator and enlarging the composite image of such dots, markings, lines, and other bits of data in such a manner that the composite image is evenly dispersed over as large an area of the Coordinated Grid Calculator screen as possible. 8) Calculating the value of data in each cell of the Coordinated Grid Calculator by assigning a value to the first bit of data encountered in a specific cell as the cell is scanned from top to bottom and left to right simultaneously. Determining the value of the first encountered bit of data in a cell by detecting the vertical or horizontal line in nearest proximity to the bit of data and assigning the numerical pre-assigned value of that vertical or horizontal line to the selected bit of data. Assigning a default value to the first cell encountered which contains no data and a different default value to each additional cell containing no data and continuing this process of determining a value for the contents of each cell until twelve values have been determined which when assembled in a string would become the twelve-digit identification code obtained for the subject fingerprint. 9) Printing the twelve-digit number to the Coordinated Grid Calculator screen While the Rjen Fingerprint Decoder is a most powerful tool in the fight against credit card fraud and identity theft, it is to be understood that scope of application of the system is not limited to those two areas. The methodology and processes used by the Rjen Fingerprint Decoder can also be used to achieve the desired results of positive identification in other areas such as, but not limited to, a) Automobile safety and security where the user of a vehicle must identify himself to the vehicle before being allowed entry into the vehicle. b) Personal Computer Security where the user of a computer must identify himself as being authorized to access the subject computer system. c) ATM Machines, where the user of the ATM machine must identify himself to the system prior to being allowed to initiate any type of financial transaction. d) Worksite Security where an employee must verify his identity before being allowed access to a restricted area. Or to prove that an employee is in a certain area at a certain time such as at a time clock to verify the beginning and end of a work period. e) Personal Item Identification where the personal Rjen ID Code for a client can be etched, stamped, or printed on personal property items as proof of ownership when a retrieved item must be identified after a theft. Child Safety ID where parents can record an Rjen generated personal ID Code for their minor children and/or have the child wear an Rjen bracelet encoded with the child'"'"'s ID number. A lost child can be quickly identified using this method. It should be understood that the methodology and processes discussed herein as applicable to the Rjen Fingerprint Decoder, can be adapted by one knowledgeable in a pertinent field as the vehicle to obtain a desired result in numerous different fields of endeavor where identification verification and/or security are issues, and therefore claim is made as to the integration of the Rjen Fingerprint Decoder processes and methodology that result in identity confirmation, as integrated, used, or applied in products of any type other than their use as part of the Rjen Fingerprint Decoder.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×