Object authentication system
First Claim
Patent Images
1. A method of authenticating an identity of an object, comprising the steps of:
- enrolling the object in a computer readable data base by storing identification information associated with each object of a plurality of objects in the computer readable database;
assigning a trust value to the identification information for each object to indicate a level of trust of the validity of the identification information, and storing the trust value in association with the identification information for each object;
carrying out an authentication session by receiving an request for identification of an object, and receiving identification data of the object to be identified from a sensor into which the identification information was input;
comparing the identification data received during the authentication session with the stored identification information received during the enrollment of the object to find a sufficient match therebetween;
using the trust value of the identification information stored during enrollment to derive a score;
using a predetermined trust value of the sensor to derive the score, where the trust value of the sensor is embedded in the sensor and signifies a level of confidence that the person inputting identification information therein is who they purport to be;
using the trust value of the sensor and the trust value of the identification information, and defining the score so that the score is no larger than either of the trust value of the sensor or the trust value of the identification information; and
providing a response indicating a sufficient match, and providing the score indicating a probability that the object is what the object is purported to be.
1 Assignment
0 Petitions
Accused Products
Abstract
A system employing enrollment information and the quality of the enrollment information. The enrollment information includes data unique to the identification of a person. The system also stores biometric sensor quality information. When a person seeks to authenticate his/her identity, the sensor transmits the sensor quality data along with the biometric attribute data to the system. The transmitted data is correlated with the enrollment data, and quality of the enrollment data, to produce a score indicative of the probability of a correct identification.
50 Citations
19 Claims
-
1. A method of authenticating an identity of an object, comprising the steps of:
-
enrolling the object in a computer readable data base by storing identification information associated with each object of a plurality of objects in the computer readable database; assigning a trust value to the identification information for each object to indicate a level of trust of the validity of the identification information, and storing the trust value in association with the identification information for each object; carrying out an authentication session by receiving an request for identification of an object, and receiving identification data of the object to be identified from a sensor into which the identification information was input; comparing the identification data received during the authentication session with the stored identification information received during the enrollment of the object to find a sufficient match therebetween; using the trust value of the identification information stored during enrollment to derive a score; using a predetermined trust value of the sensor to derive the score, where the trust value of the sensor is embedded in the sensor and signifies a level of confidence that the person inputting identification information therein is who they purport to be; using the trust value of the sensor and the trust value of the identification information, and defining the score so that the score is no larger than either of the trust value of the sensor or the trust value of the identification information; and providing a response indicating a sufficient match, and providing the score indicating a probability that the object is what the object is purported to be. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of authenticating the identity of a person comprising the steps of:
-
enrolling the identity of a person in a computer-readable database by storing identification information relating to the identity of the person; storing in association with the identification information a trust value which is a measure of the accuracy of the identification information identifying the person; storing in the database biometric identification information of the person; capturing biometric identification information of the person to be identified; using a trust value of the biometric sensor used to identify the person, where the trust value is a measure of the accuracy of the biometric identification information in identifying the person; and using the trust value of the biometric sensor and the trust value of the identification information stored in the database, and defining a score no larger than either of the trust values wherein the score provides an indication of the identity of the person. - View Dependent Claims (16)
-
-
17. A method of authenticating an identity of a person, comprising the steps of:
-
using a computer-implemented program of an identification authentication system; enrolling the identity of a person in a database of the system by accumulating identification information in the database, where the identification information is obtained from the person to be enrolled; assigning a trust value to the enrolled identification information as a function as to whether the person to be enrolled is present and providing the identification information to an authorized agent, or whether the person is not present and is transmitting the identification information via a computer terminal for storage in the database; receiving a request to identify a person together with identification information which is submitted by the person whose identity is to be determined; receiving biometric identification information from the person whose identity is to be determined, and using a trust value of a biometric sensor which provides the biometric identification information; and using the trust value of the enrolled identification information and the trust value of the biometric sensor to provide a score relating to a conclusion as to the identity of the person whose identity is to be determined wherein the score is no larger than the trust value of the enrolled identification information or the trust value of the biometric sensor. - View Dependent Claims (18, 19)
-
Specification