US20090016573A1 - Bioindex mechanism for increasing the relative speed of biometric indentification against large population samples - Google Patents
Bioindex mechanism for increasing the relative speed of biometric indentification against large population samples Download PDFInfo
- Publication number
- US20090016573A1 US20090016573A1 US10/941,581 US94158104A US2009016573A1 US 20090016573 A1 US20090016573 A1 US 20090016573A1 US 94158104 A US94158104 A US 94158104A US 2009016573 A1 US2009016573 A1 US 2009016573A1
- Authority
- US
- United States
- Prior art keywords
- biometric
- template
- authentication
- key
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Definitions
- This invention relates to the field of data processing generally, particularly to performing fast searches in data having many large data objects to find matches to an unknown similar large data object. It has particular application to authentication utilizing biometric data and more specifically the method and process of biometric database searching.
- a significant problem facing biometric identification using a large population is the processing time required to perform a full comparison on the entire population to a presenting person, so as to identify that person. Even when the database processing is optimized and the data is available before the comparison, the biometric comparison operation becomes a timing bottleneck that slows the identification process on large populations to such a degree as to make real time use of such searches unavailable.
- One way to decrease the time required for biometric identification of an individual is to decrease the population against which a comparison must be performed.
- One potential solution is to use a mechanism to narrow the potential match population must be used to restrict the set of biometric templates from the overall population of templates needing to be compared to the collected biometric data, or rather, the collected biometric data in a templatized form.
- One method of reducing the population of templates used for fingerprint comparison is based on comparing 5 predetermined characteristic data points of a fingerprint. Using a comparison of these 5 data points in the collected biometric and comparing it to the same five data points in the potential population of templates reduces the amount of digit-wise compares that have to be accomplished. Only on the population sample's templates that match on the 5 data points of the captured biometric can be relevant, so only on those that match is a full biometric comparison performed.
- the solution has only been demonstrated for fingerprint identification data sets and may therefore not be transferable to other methods of biometric identification including facial and iris pattern recognition data sets.
- the solution has been fixed to a specific database, e.g. Oracle RDBMS, to provide fast database indexing with multiple keys for searching.
- the accuracy of the method is affected as the biometric data retrieved changes. Biometric data collected from a given individual can change over time for many reasons including age, trauma, and so on.
- a database would be able to create an index capable of identifying one or more candidate records to examine in detail. Rather than comparing the unknown biometric to, say, 100,000,000 records, a system would then be able to identify perhaps 10,000 possible matches for detailed examination, cutting processing time from hours to less than a second.
- a real world example for how this could be applied would be the US VISIT program which calls for passing a person through a lane (as in an immigration lane) in a matter of a few seconds or less while comparing that person to a watch list of dangerous or undesirable people.
- the preferred embodiment uses three steps, Template Key (x t ) generation upon enrollment, Dynamic Key (x d ) generation accompanied by a range of error (y) during a subsequent authentication process, and third, the search of the Template Key (x t ) database using the Dynamic Key (x d ) to authenticate. After this third step, any templates matching the template key can be compared to the collected biometric or its template to obtain a particular match.
- a Template Key (x t ) is generated and stored for each biometric template in the Biometric Database.
- the Biometric Database contains the user identification and the corresponding biometric data as a Biometric Template generated during enrollment.
- the Biometric Template consists of a string of binary data points of unspecified length generated by the implemented biometric device upon biometric feature detection.
- the Template Key (x t ) will be generated each time a template is generated, e.g. during initial enrollment, successive enrollment or on-going training.
- the Template Key (x t ) may be generated using a fingerprint biometric detector. The biometric detector detects any number of data points on the fingerprint and creates a biometric template using binary numbers that represent the value of those data points.
- a Template Key (x t ) will then be generated from that template, with the most significant attribute as the first digit, the second most significant attribute as the second digit, and so forth until a number is formed corresponding to the number of attributes desired.
- the words attribute and digit should be considered interchangeable. (A key could use multiple digits or bits if desired, but the larger the key, generally the longer the search times will be).
- a number such as 876,543,210 will be generated representing the Template Key (x t ), where the number “8” represents the most significant attribute of the biometric template, e.g. height of fingerprint whorl, and the number “7” represents the next most significant attribute of the biometric template, e.g.
- the Template Key (x t ) becomes a comparison key, and in an example of the preferred embodiment, consists of an 8 digit integer representation of the template.
- the 8 digit integer represents the significant attributes of the biometric data from the most significant to the least significant. Two examples of significant attributes may include distance between the eyes and fingerprint swirl height, for face recognition and fingerprint biometrics, respectively. These attributes will be defined according to the biometric sensor utilized.
- the Template Key (x t ) is then stored in a database.
- a Dynamic Key (x d ) is generated during the identification process using the same process as the Template Key (x t ) generation on either the same biometric machine or another biometric machine.
- certain portions of the least significant attributes may either be dropped or not generated at all.
- a collection range error is included with the template, increasing the range of keys searched by the amount of the error.
- the Template Key (x t ) database field is reduced by matching the most significant digit of the Dynamic Key to the most significant digit of the Template Keys (x t ).
- the Template Key (x t ) search field then contains only those numbers whose most significant digits match the most significant digit of the Dynamic Key.
- a further narrowing search is performed by matching the next most significant digit of the Dynamic Key with the next most significant digit of the Template Key (x t ) in the previously reduced Template Key database field.
- the Template Key search field contains only those numbers whose most significant and second most significant digits match the most significant and second most significant digits of the Dynamic Key.
- a range of match such that for example a 6 could be considered within range of a 4 if the range is exact number plus 2 and minus 1, for example.
- the invention will work best within a single biometric and single type of reader/template generator combination. It is advised that the key attributes be selected based on known characteristics of the biometric and reader/template generator combination. Note that after the Template keys that fall within range or match the Dynamic Key are found, all those templates in the overall population database can be searched to determine matches to the collected biometric data's template, thus reducing significantly the overall search time needed to locate an exact match.
- FIGS. 1 and 2 are flow charts for illustrating example processes that can be used by preferred embodiments of this invention.
- FIG. 3 is a block diagram, illustrating an example environment in which the components of a system implementing some embodiments of the invention operate.
- FIG. 4 is an image of a fingerprint with minutia points.
- FIGS. 5-7 are grid plotting graphs.
- the solution proposed here is to generate a single long number from the biometric template itself.
- This number preferably may be represented as an eight-byte integer and stored in any kind of database. This number can then be used as a key in the database just as any other number to speed searches and selectively extract the data from the database.
- This key would not necessarily be a unique key, but the more near unique the generated key is, the faster the identification process can be.
- An enrollment station can be one that has a mechanism for sensing or registering a measurement or set of measurements that identify an individual human being.
- facial recognition systems could be used. Such systems analyze the characteristics of a person's face images input through a digital video camera, by measuring overall facial structure, such as distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. But the size of the data file for each individual is large.
- Iris scans can also be used, and with the relatively small files required by the technology developed by professor John Daugman of Cambridge and a company called Iridian, it may be easier to check for a match with a present person's iris scan against one recorded in an enrollment than it would be for a facial pattern. Fingerprints too, offer fairly small sized files of data for a good biometric match. Any biometric, or combination of biometrics, could be used by this invention, but we show our first example using fingerprint data. In all events, the enrollment station will be used to capture a biometric for an individual.
- enrollment stations are not necessary in security situations where one needs to surreptitiously obtain a biometric of a criminal or other security risk subject, and in such situations hidden sensors or public cameras may be used to generate the original template for such individuals.
- biometric data file may contain a set of fingerprints for all individuals in the database, or a set of fingerprint/iriscans for each individual in the database, just so long as a consistent data type is available for each individual in the database so that the invention can operate across all the individuals's biometric records in the database to identify the one being sensed at any given time.
- a template key (x t ) is generated and stored for each biometric template.
- a dynamic key (x d ), accompanied by a range of error (y) is generated for a captured biometric which will be used to identify a subject.
- the subset upon which a full comparison will be required is defined as the all templates (t) where:
- a key is generated for each biometric template when the template is generated at the time of enrollment.
- a template is generated for that measurement or reading.
- the key would be generated again each time the template is generated.
- This representation is in essence a numeric distillation of the most significant attributes of the template from the most significant to the least significant. For example, the most significant digit in the number 840,348,853 is the numeral 8, in the hundred millions' place, and the least significant number is the numeral 3, in the ones' place.
- a search in an indexed field for the number 840,348,853 should therefore begin with the set representing or covering all numbers present in the database that exist between the numbers 800,000,000 and 9,000,000.
- Our BioIndex works on the same principle.
- a numeric representation of the most significant aspect of the biometric template becomes the most significant portion of the number that will be the key.
- fingerprint data for example, the type of fingerprint, whorl, curve, etc., may be selected and given corresponding values of 0x001, 0x010, 0x11, and so on. (The notation 0x000 . . . indicates by the presence of the 0x prefix that the number associated therewith is binary).
- the next most significant attribute could be the height of the curve, whorl, etc. and be represented by preferably 4 bits, or more if desired.
- distillation of the key can then proceed. This distillation can get as finely detailed as the template type, biometric, and vendor implementation may allow.
- the ultimate number, i.e., the template for a particular fingerprintin this example may be:
- This number can of course be stored in the database as 1299437473, a decimal representation.
- a key for the captured biometric would be created using the same process, yet providing a range of “error” for each portion of the key.
- the algorithm used to generate the key templates, and perhaps even the system configuration settings a certain portion of the least significant places of the key is preferably either dropped or not generated at all. So, dropping the least significant bits of our previous example may generate a captured biometric key of
- FIG. 2 illustrates the process of using the bioindex.
- the bioindex key or dynamic key and range of error are calculated or determined 22 from the captured biometric data, in a manner as described above for enrollment.
- the algorithmic process described for steps 23 - 26 can be accomplished in any number of ways as will be apparent to one of ordinary skill in these arts. For example, we could have pre-indexed the database and pull only that segment of relevance to the key for examination to insert into step 23 .
- step 23 we read the next template key stored in the database, and if it is within the range of error or matching the key generated in step 22 , we compare the biometric templated data at this key in the database to the biometric captured and templated in the database in step 25 . If the captured biometric matches the stored, step 26 , we have identified the subject by noting the ID information associated with the matched data record for an individual in our biometric data database.
- FIG. 3 we illustrate the general environment of the working of the preferred embodiments of the invention.
- Any number of individuals P 0 . . . Pn may be enrolled at the enrollment facility 31 .
- the templates from this enrollment are transferred, usually as Binary Large Objects or BLOBs to a data storage server 32 which holds the database. Given the shrinking size of memories, it is possible that the data servers and enrollment devices may be combined in the future.
- the database 32 a will hold the BLOBs form the enrolled population. From each BLOB or template at least one key will be developed and stored in a related database of template keys 32 k.
- a biometric template 35 is extracted therefrom.
- a dynamic key 34 is developed from that template, although a regular key could be generated.
- a process 33 like the process illustrated in FIG. 2 compares this key and eventually the template against the database, using the template keys to shrink the amount of comparisons that need to be done to find a match.
- a user-id or subject ID should be associated with each template so that the user or subject person can be found when his biometric is matched and other data about the subject can be associated with the results of the search. Since this is why the invention is created generally, it is not seen useful to illustrate a separate data file or field for this name or other related data in the drawing.
- Type 9 minutae records shall contain, and be used to exchange geometric and topological minutiae and related information encoded from a finger or pal. Each record shall represent the processed image data from which the location and orientation descriptors of extracted minutiae characteristics are listed. The primary use of this record type shall be for remote searching of latent prints. Each Type-9 logical record shall contain the minutiae data read from a fingerprint, palm, or latent image”.
- the fingerprint is laid out on a grid and the positions of any points of interest, such as where two ridges meet, are noted.
- the positions and types of these ‘minutiae’ are noted and stored in a file. See FIG. 4 for an illustration of such a fingerprint.
- the arrows point out the minutiae.
- the fingerprint data is captured and processed it is a set of points on a grid.
- One such grid with points is shown in FIG. 5 .
- the data related to each point has an attribute, a pair of grid coordinates (from a 5,000 point grid) and an angle value in the parenthesis near each point. There may be many more such points in a fingerprint.
- the data file describing a fingerprint becomes a collection of points that have type attributes (A,B,C,D), X-Y coordinates, and a theta value (the last number in the value), which indicates the angle of the ridge in degrees.
- a computer searches these point collections until it finds a record that matches the ones from the sample, i.e., the current search criteria. The problem is that this method of searching, while precise, is very slow. A way to narrow down the search field is needed.
- the original minutiae points are illustrated in as encircled. These points are pulled down to the nearest 5, that is, it's nearest lower right hand corner of its local five-by-five grid. If more than one point is contained in any 5 ⁇ 5 grid, the points are combined into a single point, illustrated as a point in a square. The local composites are then averaged into the quadrant composites, illustrated as a point in a triangle. These quadrant composites may then be used to generate the key field or fields to be used.
- An alternate strategy to creating a key is to create a key using several fields in the record. Instead of generating one long string, we can take each composite minutia that was generated and bring it out into a separate record field, and then use the several fields as a composite search key.
- This process will generate a NON-UNIQUE key.
- the fingerprint search software can then search the small group for the unique print in the normal fashion.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
- 1. Field of the Invention
- This invention relates to the field of data processing generally, particularly to performing fast searches in data having many large data objects to find matches to an unknown similar large data object. It has particular application to authentication utilizing biometric data and more specifically the method and process of biometric database searching.
- 2. Background
- A significant problem facing biometric identification using a large population is the processing time required to perform a full comparison on the entire population to a presenting person, so as to identify that person. Even when the database processing is optimized and the data is available before the comparison, the biometric comparison operation becomes a timing bottleneck that slows the identification process on large populations to such a degree as to make real time use of such searches unavailable. One way to decrease the time required for biometric identification of an individual is to decrease the population against which a comparison must be performed. One potential solution is to use a mechanism to narrow the potential match population must be used to restrict the set of biometric templates from the overall population of templates needing to be compared to the collected biometric data, or rather, the collected biometric data in a templatized form.
- Currently, there are a few mechanisms proposed to do this. One method of reducing the population of templates used for fingerprint comparison is based on comparing 5 predetermined characteristic data points of a fingerprint. Using a comparison of these 5 data points in the collected biometric and comparing it to the same five data points in the potential population of templates reduces the amount of digit-wise compares that have to be accomplished. Only on the population sample's templates that match on the 5 data points of the captured biometric can be relevant, so only on those that match is a full biometric comparison performed.
- This method has several disadvantages. First, the solution has only been demonstrated for fingerprint identification data sets and may therefore not be transferable to other methods of biometric identification including facial and iris pattern recognition data sets. Second, the solution has been fixed to a specific database, e.g. Oracle RDBMS, to provide fast database indexing with multiple keys for searching. Third, the accuracy of the method is affected as the biometric data retrieved changes. Biometric data collected from a given individual can change over time for many reasons including age, trauma, and so on.
- We have discovered that by using an algorithm to generate a small, derivative key from a template, a database would be able to create an index capable of identifying one or more candidate records to examine in detail. Rather than comparing the unknown biometric to, say, 100,000,000 records, a system would then be able to identify perhaps 10,000 possible matches for detailed examination, cutting processing time from hours to less than a second.
- A real world example for how this could be applied would be the US VISIT program which calls for passing a person through a lane (as in an immigration lane) in a matter of a few seconds or less while comparing that person to a watch list of dangerous or undesirable people. Current state of the art will not allow this watch list to exceed 12,000 people (using fingerprint data for example), as current technology limits biometric searches to about 20,000 records per second (20,000×6 seconds=120,000 records; 120,000÷10 fingers=12,000 people).
- It is an object of this invention to overcome the disadvantages of prior methods by defining an implementation-independent mathematically calculated index which will be used to reliably reduce the population of templates in the overall population of templates that may be required for a full biometric comparison. It is a further object of this invention is to provide a flexible method in which various biometric types, devices, algorithms and storage mechanisms may be used in the solution. It is also a further object of the invention is to present the data in a standard form which may enable different biometric templates to be stored in a common location, i.e. enterprise biometrics storage. It should also be noted that the techniques described herein can be applied to any large data object database and search for matches therein to a particular large data object under consideration.
- The preferred embodiment uses three steps, Template Key (xt) generation upon enrollment, Dynamic Key (xd) generation accompanied by a range of error (y) during a subsequent authentication process, and third, the search of the Template Key (xt) database using the Dynamic Key (xd) to authenticate. After this third step, any templates matching the template key can be compared to the collected biometric or its template to obtain a particular match.
- In the first step of the preferred embodiment, a Template Key (xt) is generated and stored for each biometric template in the Biometric Database. The Biometric Database contains the user identification and the corresponding biometric data as a Biometric Template generated during enrollment. The Biometric Template consists of a string of binary data points of unspecified length generated by the implemented biometric device upon biometric feature detection. The Template Key (xt) will be generated each time a template is generated, e.g. during initial enrollment, successive enrollment or on-going training. In one example of the preferred embodiment, the Template Key (xt) may be generated using a fingerprint biometric detector. The biometric detector detects any number of data points on the fingerprint and creates a biometric template using binary numbers that represent the value of those data points. A Template Key (xt) will then be generated from that template, with the most significant attribute as the first digit, the second most significant attribute as the second digit, and so forth until a number is formed corresponding to the number of attributes desired. In describing the preferred embodiments, the words attribute and digit should be considered interchangeable. (A key could use multiple digits or bits if desired, but the larger the key, generally the longer the search times will be). In one example of the preferred embodiment, a number such as 876,543,210 will be generated representing the Template Key (xt), where the number “8” represents the most significant attribute of the biometric template, e.g. height of fingerprint whorl, and the number “7” represents the next most significant attribute of the biometric template, e.g. height of the fingerprint curve and so forth. The Template Key (xt) becomes a comparison key, and in an example of the preferred embodiment, consists of an 8 digit integer representation of the template. The 8 digit integer represents the significant attributes of the biometric data from the most significant to the least significant. Two examples of significant attributes may include distance between the eyes and fingerprint swirl height, for face recognition and fingerprint biometrics, respectively. These attributes will be defined according to the biometric sensor utilized. The Template Key (xt) is then stored in a database.
- In the third step of the preferred embodiment, a Dynamic Key (xd) is generated during the identification process using the same process as the Template Key (xt) generation on either the same biometric machine or another biometric machine. Depending on the biometric collection device, certain portions of the least significant attributes may either be dropped or not generated at all. Also, depending on the biometric collection device, a collection range error is included with the template, increasing the range of keys searched by the amount of the error.
- In the third step of the preferred embodiment, matching of the Template Key (xt) to the Dynamic Key authenticates the user. In the preferred embodiment, the Template Key (xt) database field is reduced by matching the most significant digit of the Dynamic Key to the most significant digit of the Template Keys (xt). The Template Key (xt) search field then contains only those numbers whose most significant digits match the most significant digit of the Dynamic Key. A further narrowing search is performed by matching the next most significant digit of the Dynamic Key with the next most significant digit of the Template Key (xt) in the previously reduced Template Key database field. Subsequent to the search, the Template Key search field contains only those numbers whose most significant and second most significant digits match the most significant and second most significant digits of the Dynamic Key. We could use a range of match, such that for example a 6 could be considered within range of a 4 if the range is exact number plus 2 and minus 1, for example. This would be valuable where there is great variation in a particular significant digit/attribute known for a given biometric. There can be substantial variation from one biometric to another and even within particular biometric reader data template populations and these variables need to be controlled. The invention will work best within a single biometric and single type of reader/template generator combination. It is advised that the key attributes be selected based on known characteristics of the biometric and reader/template generator combination. Note that after the Template keys that fall within range or match the Dynamic Key are found, all those templates in the overall population database can be searched to determine matches to the collected biometric data's template, thus reducing significantly the overall search time needed to locate an exact match.
-
FIGS. 1 and 2 are flow charts for illustrating example processes that can be used by preferred embodiments of this invention. -
FIG. 3 is a block diagram, illustrating an example environment in which the components of a system implementing some embodiments of the invention operate. -
FIG. 4 is an image of a fingerprint with minutia points. -
FIGS. 5-7 are grid plotting graphs. - The solution proposed here is to generate a single long number from the biometric template itself. This number preferably may be represented as an eight-byte integer and stored in any kind of database. This number can then be used as a key in the database just as any other number to speed searches and selectively extract the data from the database. This key would not necessarily be a unique key, but the more near unique the generated key is, the faster the identification process can be.
- We begin with raw biometric data capture at an ‘enrollment’ facility or station in an
initial phase 11 of generating a bioindex template key. An enrollment station can be one that has a mechanism for sensing or registering a measurement or set of measurements that identify an individual human being. For example, facial recognition systems could be used. Such systems analyze the characteristics of a person's face images input through a digital video camera, by measuring overall facial structure, such as distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. But the size of the data file for each individual is large. Iris scans can also be used, and with the relatively small files required by the technology developed by professor John Daugman of Cambridge and a company called Iridian, it may be easier to check for a match with a present person's iris scan against one recorded in an enrollment than it would be for a facial pattern. Fingerprints too, offer fairly small sized files of data for a good biometric match. Any biometric, or combination of biometrics, could be used by this invention, but we show our first example using fingerprint data. In all events, the enrollment station will be used to capture a biometric for an individual. - However, it should be recognized that enrollment stations are not necessary in security situations where one needs to surreptitiously obtain a biometric of a criminal or other security risk subject, and in such situations hidden sensors or public cameras may be used to generate the original template for such individuals.
- Also, it should be recognized that for this invention we assume a particular biometric data file to be consistent across the database. For example it may contain a set of fingerprints for all individuals in the database, or a set of fingerprint/iriscans for each individual in the database, just so long as a consistent data type is available for each individual in the database so that the invention can operate across all the individuals's biometric records in the database to identify the one being sensed at any given time.
- After the initial capture of the biometric data, we move to generate a biometric Key to the sample being taken for helping us to sort quickly through the data records in the data base.
- There are two phases of key generation. A template key (xt) is generated and stored for each biometric template. A dynamic key (xd), accompanied by a range of error (y) is generated for a captured biometric which will be used to identify a subject. The subset upon which a full comparison will be required is defined as the all templates (t) where:
-
x d −y<=x t <=x d +y. - A key is generated for each biometric template when the template is generated at the time of enrollment. Each time a biometric sample is taken or read from a human subject in and
enrollment process 11, a template is generated for that measurement or reading. For any biometric requiring on-going training and template generation the key would be generated again each time the template is generated. This becomes the comparison key and should consist of an 8 bit (or larger as storage allows) representation of the template. This representation is in essence a numeric distillation of the most significant attributes of the template from the most significant to the least significant. For example, the most significant digit in the number 840,348,853 is the numeral 8, in the hundred millions' place, and the least significant number is the numeral 3, in the ones' place. A search in an indexed field for the number 840,348,853 should therefore begin with the set representing or covering all numbers present in the database that exist between the numbers 800,000,000 and 9,000,000. Our BioIndex works on the same principle. When the key is generated inphase 13, a numeric representation of the most significant aspect of the biometric template (from phase 12) becomes the most significant portion of the number that will be the key. In fingerprint data, for example, the type of fingerprint, whorl, curve, etc., may be selected and given corresponding values of 0x001, 0x010, 0x11, and so on. (The notation 0x000 . . . indicates by the presence of the 0x prefix that the number associated therewith is binary). The next most significant attribute could be the height of the curve, whorl, etc. and be represented by preferably 4 bits, or more if desired. After this assemblage of a template, distillation of the key can then proceed. This distillation can get as finely detailed as the template type, biometric, and vendor implementation may allow. The ultimate number, i.e., the template for a particular fingerprintin this example may be: -
- 0x0100 1101 0111 0011 1101 0111 1010 0001
- This number can of course be stored in the database as 1299437473, a decimal representation.
- During the identification process, after the biometric is captured, a key for the captured biometric would be created using the same process, yet providing a range of “error” for each portion of the key. Depending on the collection device, the algorithm used to generate the key templates, and perhaps even the system configuration settings, a certain portion of the least significant places of the key is preferably either dropped or not generated at all. So, dropping the least significant bits of our previous example may generate a captured biometric key of
-
- 0x0100 1101 0111 0010 0000 0000 0000 0000 or
- 1299316736
- and a range of error of 1×210
- Using the data from the previous examples, the comparison set given
-
- gives us a comparison range of
- 0x0100 1101 0111 0000 0000 0000 0000 0000 through
- 0x0100 1101 0111 0100 0000 0000 0000 0000
- or 1299185664 through 1299447808.
- This simple restriction on the number of digits that needs to be searched reduces the potential population which requires a full comparison by a factor of 25 or one 32nd. The actual reduction will depend entirely on the key-template generation algorithm's makeup. This makeup or implementation be controlled by the developers of the algorithm so it does not affect the accuracy ratings of the biometrics.
-
FIG. 2 illustrates the process of using the bioindex. After the reaw biometric data is captured foridentification 21, the bioindex key or dynamic key and range of error are calculated or determined 22 from the captured biometric data, in a manner as described above for enrollment. The algorithmic process described for steps 23-26 can be accomplished in any number of ways as will be apparent to one of ordinary skill in these arts. For example, we could have pre-indexed the database and pull only that segment of relevance to the key for examination to insert intostep 23. In any event, atstep 23, we read the next template key stored in the database, and if it is within the range of error or matching the key generated instep 22, we compare the biometric templated data at this key in the database to the biometric captured and templated in the database instep 25. If the captured biometric matches the stored,step 26, we have identified the subject by noting the ID information associated with the matched data record for an individual in our biometric data database. - In
FIG. 3 we illustrate the general environment of the working of the preferred embodiments of the invention. Any number of individuals P0 . . . Pn may be enrolled at theenrollment facility 31. The templates from this enrollment are transferred, usually as Binary Large Objects or BLOBs to adata storage server 32 which holds the database. Given the shrinking size of memories, it is possible that the data servers and enrollment devices may be combined in the future. In any case, thedatabase 32 a will hold the BLOBs form the enrolled population. From each BLOB or template at least one key will be developed and stored in a related database oftemplate keys 32 k. - When a subject Ps is checked and biometric data is read from him or her at a biometric reader/
collector system 36, abiometric template 35 is extracted therefrom. Preferably adynamic key 34 is developed from that template, although a regular key could be generated. Aprocess 33 like the process illustrated inFIG. 2 compares this key and eventually the template against the database, using the template keys to shrink the amount of comparisons that need to be done to find a match. Note that a user-id or subject ID should be associated with each template so that the user or subject person can be found when his biometric is matched and other data about the subject can be associated with the results of the search. Since this is why the invention is created generally, it is not seen useful to illustrate a separate data file or field for this name or other related data in the drawing. - We now describe an example method of creating a natural database record key using the ANSI/NIST ITL 1-2000 standard, using the Type-9 minutiae record, using fingerprints.
- NIST Special Publication 500-245, “American National Standard for Information Systems—Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information”, at page 10, describes Type 9 minutae records as follows: “Type-9 logical records shall contain, and be used to exchange geometric and topological minutiae and related information encoded from a finger or pal. Each record shall represent the processed image data from which the location and orientation descriptors of extracted minutiae characteristics are listed. The primary use of this record type shall be for remote searching of latent prints. Each Type-9 logical record shall contain the minutiae data read from a fingerprint, palm, or latent image”.
- The fingerprint is laid out on a grid and the positions of any points of interest, such as where two ridges meet, are noted. The positions and types of these ‘minutiae’ are noted and stored in a file. See
FIG. 4 for an illustration of such a fingerprint. The arrows point out the minutiae. - Once the fingerprint data is captured and processed it is a set of points on a grid. One such grid with points is shown in
FIG. 5 . Note that the data related to each point has an attribute, a pair of grid coordinates (from a 5,000 point grid) and an angle value in the parenthesis near each point. There may be many more such points in a fingerprint. - Thus, the data file describing a fingerprint becomes a collection of points that have type attributes (A,B,C,D), X-Y coordinates, and a theta value (the last number in the value), which indicates the angle of the ridge in degrees. When trying to locate a fingerprint file matching a sample fingerprint, a computer searches these point collections until it finds a record that matches the ones from the sample, i.e., the current search criteria. The problem is that this method of searching, while precise, is very slow. A way to narrow down the search field is needed.
- What we do to organize the data is to divide the fingerprint grid into sections and average all the minutiae in that section into one ‘composite’ minutia data file. Creating a composite helps smooth out any deviations in the data, helping to avoid any false rejections.
- There are several ways to average out the data, but for illustrative purposes we will average each datum separately and then concatenate into one string. We review the
FIG. 6 illustration of a grid for this discussion. We average the letters by assigning them values (A=1, B=2, C=3, and D=4). (We average rounding up in this example (i.e., rounding C and D to get D), but any mathematical expedient can be used so long as it is consistent throughout the use of the invention). We will assign quadrants starting at the upper left hand and going clockwise. Averaging the three points in quadrant 1 gives us a composite value of B10132003067. There is only one point in quadrant 2, so the key now becomes B10132003067B10262005047. The final key becomes B10132003067B10262005047D10221997089A10131998234. - It is also possible to perform the key generation in successive stages. Rather than go directly from the NIST standard 5000×5000 grid to a 2×2 grid, it may be more accurate to go in stages, as illustrated. For the purposes of clarity, only the X and Y values are included, as illustrated in
FIG. 7 . - The original minutiae points are illustrated in as encircled. These points are pulled down to the nearest 5, that is, it's nearest lower right hand corner of its local five-by-five grid. If more than one point is contained in any 5×5 grid, the points are combined into a single point, illustrated as a point in a square. The local composites are then averaged into the quadrant composites, illustrated as a point in a triangle. These quadrant composites may then be used to generate the key field or fields to be used.
- Going through the process in stages will help avoid false rejects because of minor deviations in the minutiae from different images of the same finger.
- An alternate strategy to creating a key is to create a key using several fields in the record. Instead of generating one long string, we can take each composite minutia that was generated and bring it out into a separate record field, and then use the several fields as a composite search key.
- This process will generate a NON-UNIQUE key. I have avoided calling the generated key a ‘primary key’ as the term is used in database terminology, because a primary key by definition, is unique. This method will not always generate a unique key, even if we use several fields. What it will do is enable a non-unique index to be created, which will speed up the initial search stage by a factor of thousands.
- Once a small group of near matches has been identified, the fingerprint search software can then search the small group for the unique print in the normal fashion.
- We have described a system for quickly finding a match for a large number in a set of large numbers without having to compare each digit of each large number to the one we are trying to match. We have applied this system to biometric data matching describing a system and method to accomplish this. We have described it in detail with respect to a particular biometric, that is, fingerprint data.
Claims (27)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/941,581 US7474769B1 (en) | 2004-09-14 | 2004-09-14 | Bioindex mechanism for increasing the relative speed of biometric identification against large population samples |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/941,581 US7474769B1 (en) | 2004-09-14 | 2004-09-14 | Bioindex mechanism for increasing the relative speed of biometric identification against large population samples |
Publications (2)
Publication Number | Publication Date |
---|---|
US7474769B1 US7474769B1 (en) | 2009-01-06 |
US20090016573A1 true US20090016573A1 (en) | 2009-01-15 |
Family
ID=40175006
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/941,581 Active 2027-01-05 US7474769B1 (en) | 2004-09-14 | 2004-09-14 | Bioindex mechanism for increasing the relative speed of biometric identification against large population samples |
Country Status (1)
Country | Link |
---|---|
US (1) | US7474769B1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280345A1 (en) * | 2005-06-14 | 2006-12-14 | Schneider John K | Large-Area Biometric Specimen Comparison With Small-Area Biometric Sample |
US20130121542A1 (en) * | 2011-11-16 | 2013-05-16 | Authentec, Inc. | Authentication device including template validation and related methods |
US20130297514A1 (en) * | 2005-11-30 | 2013-11-07 | Proxense, Llc | Two-Level Authentication for Secure Transactions |
CN106250857A (en) * | 2016-08-04 | 2016-12-21 | 深圳先进技术研究院 | A kind of identity recognition device and method |
US10026253B2 (en) | 2000-12-27 | 2018-07-17 | Proxense, Llc | Personal digital key and receiver/decoder circuit system and method |
US10437976B2 (en) | 2004-12-20 | 2019-10-08 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US10769939B2 (en) | 2007-11-09 | 2020-09-08 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US10887105B2 (en) | 2019-04-04 | 2021-01-05 | King Abdulaziz University | Bioshares: apply shamir secret sharing to secure fingerprint in the cloud |
US10909229B2 (en) | 2013-05-10 | 2021-02-02 | Proxense, Llc | Secure element as a digital pocket |
US10943471B1 (en) | 2006-11-13 | 2021-03-09 | Proxense, Llc | Biometric authentication using proximity and secure information on a user device |
US10971251B1 (en) | 2008-02-14 | 2021-04-06 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11080378B1 (en) | 2007-12-06 | 2021-08-03 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US11086979B1 (en) | 2007-12-19 | 2021-08-10 | Proxense, Llc | Security system and method for controlling access to computing resources |
US11095640B1 (en) | 2010-03-15 | 2021-08-17 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US11113482B1 (en) | 2011-02-21 | 2021-09-07 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US11258791B2 (en) | 2004-03-08 | 2022-02-22 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US11546325B2 (en) | 2010-07-15 | 2023-01-03 | Proxense, Llc | Proximity-based system for object tracking |
US11553481B2 (en) | 2006-01-06 | 2023-01-10 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005064547A1 (en) * | 2003-12-24 | 2005-07-14 | Telecom Italia S.P.A. | User authentication method based on the utilization of biometric identification techniques and related architecture |
JP4952026B2 (en) * | 2006-03-31 | 2012-06-13 | 株式会社日立製作所 | Biometric information authentication apparatus and authentication method |
US7818395B2 (en) * | 2006-10-13 | 2010-10-19 | Ceelox, Inc. | Method and apparatus for interfacing with a restricted access computer system |
US8218828B2 (en) * | 2006-12-29 | 2012-07-10 | Anthony S. Iasso | Systems and methods for biometric information automation |
US8041956B1 (en) | 2010-08-16 | 2011-10-18 | Daon Holdings Limited | Method and system for biometric authentication |
US8745405B2 (en) * | 2010-02-17 | 2014-06-03 | Ceelox Patents, LLC | Dynamic seed and key generation from biometric indicia |
US8548206B2 (en) | 2011-01-20 | 2013-10-01 | Daon Holdings Limited | Methods and systems for capturing biometric data |
US8457370B2 (en) * | 2011-01-20 | 2013-06-04 | Daon Holdings Limited | Methods and systems for authenticating users with captured palm biometric data |
AR097974A1 (en) * | 2013-10-11 | 2016-04-20 | Element Inc | SYSTEM AND METHOD FOR BIOMETRIC AUTHENTICATION IN CONNECTION WITH DEVICES EQUIPPED WITH CAMERA |
MX2018000566A (en) * | 2015-07-16 | 2018-04-24 | Inscape Data Inc | System and method for improving work load management in acr television monitoring system. |
US10936708B2 (en) * | 2018-10-01 | 2021-03-02 | International Business Machines Corporation | Biometric data protection |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6035398A (en) * | 1997-11-14 | 2000-03-07 | Digitalpersona, Inc. | Cryptographic key generation using biometric data |
US6041133A (en) * | 1996-12-13 | 2000-03-21 | International Business Machines Corporation | Method and apparatus for fingerprint matching using transformation parameter clustering based on local feature correspondences |
US6185316B1 (en) * | 1997-11-12 | 2001-02-06 | Unisys Corporation | Self-authentication apparatus and method |
US20020026582A1 (en) * | 2000-08-31 | 2002-02-28 | Sony Corporation | Person authentication system, person authentication method and program providing medium |
US6484260B1 (en) * | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6507912B1 (en) * | 1999-01-27 | 2003-01-14 | International Business Machines Corporation | Protection of biometric data via key-dependent sampling |
-
2004
- 2004-09-14 US US10/941,581 patent/US7474769B1/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6041133A (en) * | 1996-12-13 | 2000-03-21 | International Business Machines Corporation | Method and apparatus for fingerprint matching using transformation parameter clustering based on local feature correspondences |
US6185316B1 (en) * | 1997-11-12 | 2001-02-06 | Unisys Corporation | Self-authentication apparatus and method |
US6035398A (en) * | 1997-11-14 | 2000-03-07 | Digitalpersona, Inc. | Cryptographic key generation using biometric data |
US6484260B1 (en) * | 1998-04-24 | 2002-11-19 | Identix, Inc. | Personal identification system |
US6507912B1 (en) * | 1999-01-27 | 2003-01-14 | International Business Machines Corporation | Protection of biometric data via key-dependent sampling |
US20020026582A1 (en) * | 2000-08-31 | 2002-02-28 | Sony Corporation | Person authentication system, person authentication method and program providing medium |
US6990684B2 (en) * | 2000-08-31 | 2006-01-24 | Sony Corporation | Person authentication system, person authentication method and program providing medium |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10026253B2 (en) | 2000-12-27 | 2018-07-17 | Proxense, Llc | Personal digital key and receiver/decoder circuit system and method |
US11922395B2 (en) | 2004-03-08 | 2024-03-05 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US11258791B2 (en) | 2004-03-08 | 2022-02-22 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US10698989B2 (en) | 2004-12-20 | 2020-06-30 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US10437976B2 (en) | 2004-12-20 | 2019-10-08 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US7724927B2 (en) * | 2005-06-14 | 2010-05-25 | Ultra-Scan Corporation | Large-area biometric specimen comparison with small-area biometric sample |
US20060280345A1 (en) * | 2005-06-14 | 2006-12-14 | Schneider John K | Large-Area Biometric Specimen Comparison With Small-Area Biometric Sample |
US20130297514A1 (en) * | 2005-11-30 | 2013-11-07 | Proxense, Llc | Two-Level Authentication for Secure Transactions |
US9990628B2 (en) * | 2005-11-30 | 2018-06-05 | Proxense, Llc | Two-level authentication for secure transactions |
US11212797B2 (en) | 2006-01-06 | 2021-12-28 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network with masking |
US11219022B2 (en) | 2006-01-06 | 2022-01-04 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network with dynamic adjustment |
US11553481B2 (en) | 2006-01-06 | 2023-01-10 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US11800502B2 (en) | 2006-01-06 | 2023-10-24 | Proxense, LL | Wireless network synchronization of cells and client devices on a network |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US10374795B1 (en) | 2006-05-05 | 2019-08-06 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US11182792B2 (en) | 2006-05-05 | 2021-11-23 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US12014369B2 (en) | 2006-05-05 | 2024-06-18 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US20170085564A1 (en) * | 2006-05-05 | 2017-03-23 | Proxense, Llc | Single Step Transaction Authentication Using Proximity and Biometric Input |
US11551222B2 (en) * | 2006-05-05 | 2023-01-10 | Proxense, Llc | Single step transaction authentication using proximity and biometric input |
US10764044B1 (en) | 2006-05-05 | 2020-09-01 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US11157909B2 (en) | 2006-05-05 | 2021-10-26 | Proxense, Llc | Two-level authentication for secure transactions |
US10943471B1 (en) | 2006-11-13 | 2021-03-09 | Proxense, Llc | Biometric authentication using proximity and secure information on a user device |
US12033494B2 (en) | 2007-11-09 | 2024-07-09 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US11562644B2 (en) | 2007-11-09 | 2023-01-24 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US10769939B2 (en) | 2007-11-09 | 2020-09-08 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US11080378B1 (en) | 2007-12-06 | 2021-08-03 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US11086979B1 (en) | 2007-12-19 | 2021-08-10 | Proxense, Llc | Security system and method for controlling access to computing resources |
US10971251B1 (en) | 2008-02-14 | 2021-04-06 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11727355B2 (en) | 2008-02-14 | 2023-08-15 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US11095640B1 (en) | 2010-03-15 | 2021-08-17 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US11546325B2 (en) | 2010-07-15 | 2023-01-03 | Proxense, Llc | Proximity-based system for object tracking |
US11669701B2 (en) | 2011-02-21 | 2023-06-06 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US11132882B1 (en) | 2011-02-21 | 2021-09-28 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
US11113482B1 (en) | 2011-02-21 | 2021-09-07 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US12056558B2 (en) | 2011-02-21 | 2024-08-06 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
US9940503B2 (en) | 2011-11-16 | 2018-04-10 | Apple Inc. | Authentication device including template validation and related methods |
US9280697B2 (en) * | 2011-11-16 | 2016-03-08 | Apple Inc. | Authentication device including template validation and related methods |
US20130121542A1 (en) * | 2011-11-16 | 2013-05-16 | Authentec, Inc. | Authentication device including template validation and related methods |
US11914695B2 (en) | 2013-05-10 | 2024-02-27 | Proxense, Llc | Secure element as a digital pocket |
US10909229B2 (en) | 2013-05-10 | 2021-02-02 | Proxense, Llc | Secure element as a digital pocket |
CN106250857A (en) * | 2016-08-04 | 2016-12-21 | 深圳先进技术研究院 | A kind of identity recognition device and method |
WO2018023884A1 (en) * | 2016-08-04 | 2018-02-08 | 深圳先进技术研究院 | Device and method for identity recognition |
US10887105B2 (en) | 2019-04-04 | 2021-01-05 | King Abdulaziz University | Bioshares: apply shamir secret sharing to secure fingerprint in the cloud |
Also Published As
Publication number | Publication date |
---|---|
US7474769B1 (en) | 2009-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7474769B1 (en) | Bioindex mechanism for increasing the relative speed of biometric identification against large population samples | |
US9600730B2 (en) | Biometric authentication technology | |
US6895104B2 (en) | Image identification system | |
US7006671B2 (en) | Personal identification apparatus and method | |
US5892838A (en) | Biometric recognition using a classification neural network | |
US8914313B2 (en) | Confidence based vein image recognition and authentication | |
Iloanusi | Fusion of finger types for fingerprint indexing using minutiae quadruplets | |
Charity et al. | A bimodal biometrie student attendance system | |
Haji et al. | Real time face recognition system (RTFRS) | |
US9436780B2 (en) | Constructing incremental tree model for vein image recognition and authentication | |
Parmar et al. | Fingerprint indexing approaches for biometric database: a review | |
JP2008065651A (en) | Face image authentication method, face image authentication apparatus and program | |
Adeoye | Multi-mode biometric solution for examination malpractices in Nigerian schools | |
Trabelsi et al. | A bi-modal palmvein palmprint biometric human identification based on fusing new CDSDP features | |
Kumar et al. | An efficient space partitioning tree approach for indexing and retrieving fingerprint databases | |
Shinde et al. | An Approach for e-Voting using Face and Fingerprint Verification | |
Chauhan et al. | Fingerprints analysis using AI Algorithm | |
Fatima et al. | Multi-modal Biometric Protection System Using SURF Filter with BioHashing Algorithm. | |
Leghari et al. | Analyzing the effects of data augmentation on single and multimodal biometrics | |
Alhamrouni et al. | Fingerprint Using Histogram Oriented Gradient and Support Vector Machine | |
Elmouhtadi et al. | Fingerprint identification based on hierarchical triangulation | |
JP2868909B2 (en) | Fingerprint collation device | |
Arora et al. | Indexing on Biometric Databases | |
Reji | 3D Face Recognition System in Time Critical Security Applications | |
Arora et al. | 11 Indexing on Biometric |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MCAFEE II KENNETH N.;STONE, RANDALL C.;REEL/FRAME:015806/0772 Effective date: 20040913 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:UNISYS CORPORATION;UNISYS HOLDING CORPORATION;REEL/FRAME:018003/0001 Effective date: 20060531 Owner name: CITIBANK, N.A.,NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:UNISYS CORPORATION;UNISYS HOLDING CORPORATION;REEL/FRAME:018003/0001 Effective date: 20060531 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION, DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 Owner name: UNISYS CORPORATION,PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION,DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023312/0044 Effective date: 20090601 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION, DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 Owner name: UNISYS CORPORATION,PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 Owner name: UNISYS HOLDING CORPORATION,DELAWARE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:023263/0631 Effective date: 20090601 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA Free format text: PATENT SECURITY AGREEMENT (PRIORITY LIEN);ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:023355/0001 Effective date: 20090731 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA Free format text: PATENT SECURITY AGREEMENT (JUNIOR LIEN);ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:023364/0098 Effective date: 20090731 |
|
AS | Assignment |
Owner name: GENERAL ELECTRIC CAPITAL CORPORATION, AS AGENT, IL Free format text: SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:026509/0001 Effective date: 20110623 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY;REEL/FRAME:030004/0619 Effective date: 20121127 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE;REEL/FRAME:030082/0545 Effective date: 20121127 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:042354/0001 Effective date: 20170417 Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:042354/0001 Effective date: 20170417 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:044144/0081 Effective date: 20171005 Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT Free format text: SECURITY INTEREST;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:044144/0081 Effective date: 20171005 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION (SUCCESSOR TO GENERAL ELECTRIC CAPITAL CORPORATION);REEL/FRAME:044416/0358 Effective date: 20171005 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: UNISYS CORPORATION, PENNSYLVANIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:054231/0496 Effective date: 20200319 |