Methods, systems, devices, and products for authenticating users
First Claim
Patent Images
1. A method, comprising:
- receiving, by a server, a composite input sent from a device requesting authentication, the composite input comprising an image of a fingerprint extracted from a hand-drawn glyph;
segregating, by the server, the composite input into the image of the fingerprint and into a mechanical characterization of the hand-drawn glyph;
determining, by the server, a first match between the image of the fingerprint and a template associated with the authentication;
determining, by the server, a second match between the mechanical characterization and the template associated with the authentication; and
authenticating, by the server, the device in response to the first match and the second match.
1 Assignment
0 Petitions
Accused Products
Abstract
Enhanced biometric authentication combines a user'"'"'s inherent biometric data with the user'"'"'s password, code, or other secret glyph. For example, the user'"'"'s finger makes an input on a touchpad. An image of a fingerprint is extracted from the input, along with the user'"'"'s password, code, or other secret glyph. In one input, then, the user'"'"'s finger serves two authentication schemes for increased security.
77 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a server, a composite input sent from a device requesting authentication, the composite input comprising an image of a fingerprint extracted from a hand-drawn glyph; segregating, by the server, the composite input into the image of the fingerprint and into a mechanical characterization of the hand-drawn glyph; determining, by the server, a first match between the image of the fingerprint and a template associated with the authentication; determining, by the server, a second match between the mechanical characterization and the template associated with the authentication; and authenticating, by the server, the device in response to the first match and the second match. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a processor; and a memory device, the memory device storing instructions, the instructions when executed causing the processor to perform operations, the operations comprising; receiving a composite input sent from a device for authentication, the composite input comprising an image of a fingerprint extracted from a glyph drawn by a user associated with the authentication; segregating the composite input into the image of the fingerprint and into a mechanical characterization of the glyph drawn by the user; determining a double match between the image of the fingerprint and the mechanical characterization to a template associated with the authentication; and authenticating the device in response to the double match. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable memory storing instructions that when executed cause a processor to perform operations, the operations comprising:
-
receiving a composite input sent from a device for authentication, the composite input comprising an image of a fingerprint extracted from a glyph drawn by a user associated with the authentication; segregating the composite input into the image of the fingerprint and into a mechanical characterization of the glyph; determining a first match between the image of the fingerprint and a template associated with the authentication; determining second match between the mechanical characterization and the template; and authenticating the device in response to the first match and the second match. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification