Security access based on facial features
First Claim
1. A security method of controlling access of human beings to a secure item, the method comprising the steps of:
- (1) retrieving an identification code from an identification object;
(1a) retrieving feature data from a memory using said identification code, said retrieved feature data representative of a plurality of facial features of a first person;
(2) capturing a plurality of facial features of a second person by taking pictures at different positions around said second person'"'"'s head and generating feature data that is representative of facial features of said second person; and
(3) comparing said retrieved feature data of said first person to said second person feature data to determine security access for said second person, includingdetermining a plurality of errors that represent a difference between said plurality of facial features of said first person and a corresponding plurality of facial features of said second person,determining an average error of said plurality of errors to determine security access of said second person.
2 Assignments
0 Petitions
Accused Products
Abstract
A card based security system determines security access by comparing the facial features of the card owner with the facial features of an applicant that is requesting access to a secure item. The facial features of an authorized card owner are stored in a medium of a security access card in the form of feature data. When an applicant presents the card for access, the card feature data is read from the card medium and compared to applicant'"'"'s facial feature. The facial features of the applicant are determined by taking a picture, and generating applicant feature data that is similar in format to the card feature data. The card feature data is compared to the applicant feature data to determine a level of agreement. The applicant is granted security access if the agreement is above a threshold, and the applicant is denied access if the agreement is below a threshold. In an alternate embodiment, the card medium does not carry the feature data of the card owner. Instead the card medium carries an ID code that identifies the card owner, and the feature data of card owner is retrieved from a computer memory that catalogs the feature data using the ID code. In embodiments of the invention, the feature data represents normalized ratios of distances between face features of the person characterized by the feature data. The normalized ratios are sufficient to adequately represent a person'"'"'s face for security access purposes. Exemplary ratios include the forehead-to-chin distance, nostril-to-nostril distance, and ear-to-ear distance, where the normalization factor is the eye-to-eye separation of the person. In embodiments of the invention, the card medium that holds the feature data or ID code is a magnetic medium. In an alternate embodiment, the card medium is a bar code. In a preferred embodiment, the card medium is a two dimensional bar code, such as PDF417. Commercially available 2-D bar codes (such as PDF417) can store approximately 1100 bytes of data per square inch. As such, the 2-D bar code has sufficient storage density to store the necessary feature data on an access card the size of an ATM card or an employee badge, which is desirable for portability.
58 Citations
49 Claims
-
1. A security method of controlling access of human beings to a secure item, the method comprising the steps of:
-
(1) retrieving an identification code from an identification object; (1a) retrieving feature data from a memory using said identification code, said retrieved feature data representative of a plurality of facial features of a first person; (2) capturing a plurality of facial features of a second person by taking pictures at different positions around said second person'"'"'s head and generating feature data that is representative of facial features of said second person; and (3) comparing said retrieved feature data of said first person to said second person feature data to determine security access for said second person, including determining a plurality of errors that represent a difference between said plurality of facial features of said first person and a corresponding plurality of facial features of said second person, determining an average error of said plurality of errors to determine security access of said second person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of limiting security access to an authorized card owner, the method comprising the steps of:
-
(1) reading a medium of an access card to retrieve an identification code of the card owner; (1a) retrieving feature data from a storage memory in a remote location using said identification code, said retrieved feature data representative of a plurality of facial features of the card owner; (2) taking pictures of an applicant at different positions around said applicant'"'"'s head and determining a plurality of facial features of the applicant using the pictures; and (3) comparing said facial features of the card owner with said facial features of the applicant to determine access of the applicant, including determining a plurality of errors that represent a difference between said plurality of facial features of the card owner and a corresponding plurality of facial features of the applicant, determining an average error of said plurality of errors to determine security access of the applicant. - View Dependent Claims (22)
-
-
23. A method of determining if an applicant is the owner of an access card for security access purposes, the method comprising the steps of:
-
(1) reading a bar code on an access card, said bar code having feature data representative of a plurality of facial features of a card owner, said feature data including a normalized forehead-to-chin separation distance of said card owner; (2) capturing a plurality of facial features of an applicant and generating applicant feature data that is representative of said applicant facial features, said step (2) comprising the steps of (a) taking pictures of the applicant at different positions rotated around the applicant'"'"'s head, (b) determining an eye-to-eye separation of the applicant using said pictures, and (c) determining a forehead-to-chin separation distance on a face of the applicant using said pictures, and normalizing said forehead-to-chin separation distance to said eye-to-eye separation; (3) comparing said applicant feature data to said card feature data to determine security access, comprising comparing said normalized forehead-to-chin separation distance of said applicant with said normalized forehead-to-chin separation distance of said card owner that is included in said card feature data determining a plurality of errors that represent a difference between said plurality of facial features of the card owner and a corresponding plurality of facial features of the applicant, determining an average error of said plurality of errors to determine security access of the applicant.
-
-
24. A method of recording facial features of a person in a storage medium, the method comprising the steps of:
-
(1) taking pictures of the person at different positions with a camera that rotates around the person'"'"'s head; (2) generating feature data representative of facial features of the person, said feature data including a forehead-to-chin separation distance; and (3) writing said feature data to said storage medium, said feature data capable of providing security access to that person. - View Dependent Claims (25, 26, 27, 28, 29)
-
-
30. A system for determining security access of an applicant, comprising:
-
a medium reader, for reading an access card medium to retrieve an identification code associated with a card owner; a memory that stores facial feature data that is cataloged according to said identification code; a rotating camera for taking pictures at different positions around said applicant'"'"'s head and generating feature data representative of facial features of said applicant; and a processor for comparing said card feature data to said applicant feature data to determine security access, wherein said processor determines a plurality of errors that represent differences between said stored facial feature data and said applicant feature data, and determines an average error of said plurality of errors to determine security access of the applicant. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A system for determining security access of an applicant, comprising:
-
a medium reader, for reading an access card medium to retrieve an identification code that identifies a card owner; a memory that stores facial feature data that is cataloged according to said identification code; a rotating camera for taking pictures at different positions around of the applicant'"'"'s head, said rotating camera including a means for generating image data representative of said pictures; and a processor coupled to said medium reader and said camera, said processor including computer program code for causing said processor to determine if the applicant is the card owner using said image data of said applicant and said card feature data, said computer program code comprising, first program code means for causing said processor to determine a plurality of applicant feature separations using said image data, said applicant feature separations representing a distance between a first feature and a second feature on a face of said applicant, second program code means for causing said processor to access said memory using said identification code and to retrieve a plurality of card owner feature separations, said card owner feature separations representing a distance between a first feature and a second feature on a face of said card owner, and third program code means for causing said processor to compare said card owner feature separations to said applicant feature separations and determine agreement for security access, wherein said third program means includes program means for determining a plurality of errors that represent a difference between said plurality of card owner feature separations and a corresponding plurality of applicant feature separations, and program means for determining an average error of said plurality of errors to determine security access. - View Dependent Claims (40, 41, 42, 43, 44, 45)
-
- 46. An access card for use with a security system, said access card comprising a storage medium that stores an identification code associated with an owner of said access card, wherein said identification code catalogs feature data in a memory external to said access card, said feature data generated by a camera that rotates around said owner'"'"'s head and representative of facial features associated with said owner of the access card, said security system configured to provide security access to said owner based on said feature data.
-
49. A method of controlling security access of humans, comprising:
-
retrieving an identification code from an identification object; retrieving feature data from a memory using said identification code, said retrieved feature data representative of a plurality of facial features of a first person, said plurality of facial features normalized to an eye-to-separation of said first person; capturing a plurality of facial features of a second person including taking pictures at different positions around said second person'"'"'s head with a single camera that rotates around said second person'"'"'s head, and generating applicant feature data from said pictures that is representative of facial features of said second person, including locating a first eye and a second eye of said second person using said applicant feature data, determining an eye-to-eye separation on a face of said second person using said applicant feature data, determining a forehead-to-chin separation on said face of said second person using said applicant feature data, normalizing said forehead-to-chin separation relative to said eye-to-eye separation resulting in a normalized forehead-to-chin ratio of said second person, determining a nostril-to-nostril separation distance between a first nostril and a second nostril on said face of said second person using said applicant feature data, normalizing said nostril-to-nostril separation distance relative to said eye-to-eye separation resulting in a normalized nostril-to-nostril separation ratio of said second person, determining an ear-to-ear separation distance between a first ear and a second ear on said face of said second person using said applicant feature data, normalizing said ear-to-ear separation distance relative to said eye-to-eye separation resulting in a normalized ear-to-ear ratio of said second person; comparing said normalized ratios of said second person with corresponding ratios of said retrieved features data of said first person, including determining a difference between a normalized nostril-to-nostril separation ratio of said first person and said normalized nostril-to-nostril separation ratio of said second person, resulting in a first ratio error, determining a difference between a normalized forehead-to-chin separation ratio of said first person and said normalized forehead-to-chin separation ratio of said second person, resulting in a second ratio error, determining a difference between a normalized ear-to-ear separation ratio of said first person and said normalized ear-to-ear separation ratio of said second person, resulting in a third ratio error, and determining an average error of said first ratio error, said second ratio error, and said third ratio error to determine security access for said second person; granting access to said second person if said average error is below a threshold; and denying access to said second person if said average error is above said threshold.
-
Specification