Method for identifying and protecting information
First Claim
1. A method for identification and authentication of a user and protecting information executed by a machine, comprising the steps of:
- recording audio and visual input of a user including recording visual background information by a recording device;
comparing two recording device results;
analyzing the camera results in an overlay pixel pattern analysis;
calculating the position of a forward focused object;
calculating the position and depth of background focused object;
determining the difference between the first and second values;
generating a preliminary 3D security decision;
creating an audio voice print at the same time as the video calculation;
determining distance by audio voiceprint and assigning a distance value;
comparing the calculated position of the forward focused object to the distance determined by the audio voiceprint;
making a final security decision on whether the object is a real live 3D person or it is a non-live person or object; and
and creating a human key comprised of audio and visual fingerprints.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for identifying and authenticating a user and protecting information. The identification process is enabled by using a mobile device such as a smartphone, laptop, or thin client device. A user speaks a phrase to create an audio voiceprint while a camera streams video images and creates a video print. The video data is converted to a color band calculated pattern to numbers. The audio voiceprint, video print, and color band are registered in a database as a digital fingerprint. Processing of all audio and video input occurs on a human key system server so there is not usage by the thin client systems used by the user to access the human key server for authentication and verification. When a user registers an audio and video fingerprint is created and stored in the database as reference to identify that individual for the purpose of verification.
-
Citations
29 Claims
-
1. A method for identification and authentication of a user and protecting information executed by a machine, comprising the steps of:
-
recording audio and visual input of a user including recording visual background information by a recording device; comparing two recording device results; analyzing the camera results in an overlay pixel pattern analysis; calculating the position of a forward focused object; calculating the position and depth of background focused object; determining the difference between the first and second values; generating a preliminary 3D security decision; creating an audio voice print at the same time as the video calculation; determining distance by audio voiceprint and assigning a distance value; comparing the calculated position of the forward focused object to the distance determined by the audio voiceprint; making a final security decision on whether the object is a real live 3D person or it is a non-live person or object; and and creating a human key comprised of audio and visual fingerprints. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 26, 27, 28, 29)
-
-
24. A method for identification and authentication of a user and protecting information executed by a machine, comprising the steps of:
-
recording audio and visual input of a user including recording visual background information by using a 3D camera to record audio and video; providing automatic object identification when motion is detected; comparing the background with the foreground; forming a box 200 pixels from the center point of the moving objects discovered in field of view; lining up a user'"'"'s nose up with the center of the cross hairs in the analysis area; selecting to register or sign in; locking on to a center point and where ever object moves staying locked on to that center reference point; locking on the image with 16 pixels edge around the profile of the person for processing and background is removed processing only occurs in center pixels; typing a phrase or saying a phrase that is already registered; verifying and identifying the submitted phrase; searching the database for matches; and returning information about the object. - View Dependent Claims (25)
-
Specification