Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Combining Biometric and Digital Information for human identity verification.

IP.com Disclosure Number: IPCOM000016385D
Original Publication Date: 2002-Nov-14
Included in the Prior Art Database: 2003-Jun-21
Document File: 2 page(s) / 58K

Publishing Venue

IBM

Abstract

Today various methods are implemented to proof human identity for various reasons. e.g. Access control etc. The methods can be divided in several categories mainly identified by the source of the data used to check the identity of the human being against. Prior Art Secret Information The method is to verify a secret that only this person and verification counterpart knows such as a PIN or a PASSWORD.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Combining Biometric and Digital Information for human identity verification.

   Today various methods are implemented to proof human identity for various reasons. e.g. Access control etc.

   The methods can be divided in several categories mainly identified by the source of the data used to check the identity of the human being against.

Prior Art Secret Information

   The method is to verify a secret that only this person and verification counterpart knows such as a PIN or a PASSWORD.

   To identify this person, the secret information has to be entered into a device to be verified against the stored verification data for this person.

   This method has advantages and disadvantages: Here a short list of only that advantages and disadvantages important for the new solution.

Advantage:

The data can easily been verified because the verification device can convert this information into machine processable information by an one-to-one relationship (definite), e.g. ASCII to Binary conversion. The false rejection rate is almost 0.

Disadvantage:

The data is not linked to the person. Therefore the data must be protected against eavesdropping. The false acceptance rate is influenced by the fact that the data could be compromised and used to identify the wrong person. In addition, the false acceptance rate is dependant on the secret size, e.g. if a PIN is only 3 digits, the probability for guessing a PIN will be 1 out of 1000.

Biometric Information

   The method is to verify a biometric value unique for that person and to compare this value with a stored one the validation counterpart knows such as a fingerprint, voice, iris etc.

   To identify the person, this biometric information has to be entered into a device to be verified against the stored verification data for that person. This method has also advantages and disadvantages: Here a short list of only that advantages and disadvantages significant for the new process.

Advantage:

The data is directly linked to the person to be identified. Therefore it is difficult to spy out / to get access to that data. The false acceptance rate can be minimized to very good val...