Nothing Special   »   [go: up one dir, main page]

WO2017156487A1 - Methods, apparatus, servers, and systems for human identification based on human radio biometric information - Google Patents

Methods, apparatus, servers, and systems for human identification based on human radio biometric information Download PDF

Info

Publication number
WO2017156487A1
WO2017156487A1 PCT/US2017/021957 US2017021957W WO2017156487A1 WO 2017156487 A1 WO2017156487 A1 WO 2017156487A1 US 2017021957 W US2017021957 W US 2017021957W WO 2017156487 A1 WO2017156487 A1 WO 2017156487A1
Authority
WO
WIPO (PCT)
Prior art keywords
biometric information
csi
radio
radio biometric
person
Prior art date
Application number
PCT/US2017/021957
Other languages
French (fr)
Inventor
Qinyi XU
Yan Chen
Beibei Wang
K. J. Ray LIU
Original Assignee
Origin Wireless, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Origin Wireless, Inc. filed Critical Origin Wireless, Inc.
Priority to JP2018547884A priority Critical patent/JP6931790B2/en
Priority to EP17764252.7A priority patent/EP3426148B1/en
Publication of WO2017156487A1 publication Critical patent/WO2017156487A1/en
Priority to US15/861,422 priority patent/US11025475B2/en
Priority to US15/873,806 priority patent/US10270642B2/en
Priority to US16/101,444 priority patent/US10291460B2/en
Priority to US16/125,748 priority patent/US10833912B2/en
Priority to US16/127,151 priority patent/US11012285B2/en
Priority to US16/127,092 priority patent/US10476730B2/en
Priority to US16/200,608 priority patent/US10735298B2/en
Priority to US16/200,616 priority patent/US10495725B2/en
Priority to US16/203,317 priority patent/US10397039B2/en
Priority to US16/203,299 priority patent/US10374863B2/en
Priority to US16/446,589 priority patent/US10742475B2/en
Priority to US16/667,757 priority patent/US20200064444A1/en
Priority to US16/667,648 priority patent/US11035940B2/en
Priority to US16/790,627 priority patent/US11397258B2/en
Priority to US16/790,610 priority patent/US11928894B2/en
Priority to US17/539,058 priority patent/US12066572B2/en
Priority to US17/838,231 priority patent/US20220303167A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/05Detecting, measuring or recording for diagnosis by means of electric currents or magnetic fields; Measuring using microwaves or radio waves 
    • A61B5/0507Detecting, measuring or recording for diagnosis by means of electric currents or magnetic fields; Measuring using microwaves or radio waves  using microwaves or terahertz waves
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/117Identification of persons
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/72Signal processing specially adapted for physiological signals or for diagnostic purposes
    • A61B5/7235Details of waveform analysis
    • A61B5/7264Classification of physiological signals or data, e.g. using neural networks, statistical classifiers, expert systems or fuzzy systems
    • A61B5/7267Classification of physiological signals or data, e.g. using neural networks, statistical classifiers, expert systems or fuzzy systems involving training the classification device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/103Static body considered as a whole, e.g. static pedestrian or occupant recognition
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/72Signal processing specially adapted for physiological signals or for diagnostic purposes
    • A61B5/7235Details of waveform analysis
    • A61B5/7246Details of waveform analysis using correlation, e.g. template matching or determination of similarity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/08Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/12Classification; Matching
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/70ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for mining of medical data, e.g. analysing previous cases of other patients

Definitions

  • the present teaching generally relates to human identification. More specifically, the present teaching relates to human identification based on human radio biometric information in an environment without line-of-sight.
  • Biometric recognition refers to an automated recognition of individuals based on their human biological and behavioral characteristics. Some well-known biometrics for human recognition may include fingerprint, face, iris, and voice. Since biometric information is inherent and distinctive to an individual, biometric traits are widely used in surveillance systems for human identification. Moreover, due to difficulty for biometrics counterfeit, techniques based on biometrics have clear-cut advantages over traditional security methods such as passwords and signatures in countering the growing security threats and in facilitating personalization and convenience. Even though current biometrics systems can be applied in some environments, all of them require special devices that capture human biometric traits in an extremely line-of-sight (LOS) environment. A LOS environment means there is a direct LOS path between the device and the human (or other test subjects).
  • LOS line-of-sight
  • a person usually puts a finger on top of the fingerprint scanner, where there is a direct straight path of light between the scanner (capturing device) and the finger (test subject).
  • a direct straight path of light between the scanner (capturing device) and the finger (test subject).
  • LOS non-line-of-sight
  • human radio biometrics which record how the wireless signal interacts with a human body, are altered according to individuals' biological and physical characteristics and can be viewed as unique among different individuals.
  • face recognition has been implemented for many years to distinguish from and recognize different people, thanks to the fact that different individuals have different facial features.
  • Human radio biometrics which record how radio frequency (RF) signals respond to the entire body of a human including the face, should contain more information than a face, and thus become more distinct among humans.
  • RF radio frequency
  • the present teaching generally relates to human identification. More specifically, the present teaching relates to human identification based on human radio biometric information in an environment without line-of-sight.
  • an apparatus for human identification comprises a receiver, a processor and a memory communicatively coupled with the processor.
  • the receiver is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified.
  • the processor is configured for:
  • CSI channel state information
  • an apparatus for human identification comprises a plurality of receivers, a processor and a memory communicatively coupled with the processor.
  • Each of the plurality of receivers is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified.
  • the processor is configured for: extracting, regarding each of the plurality of receivers, CSI from the at least one wireless signal, obtaining, from each of the plurality of receivers, radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person, combining the radio biometric information obtained from the plurality of receivers to generate combined radio biometric information, and determining an identity of the person based on the combined radio biometric information.
  • a method for human identification may be implemented on a machine including at least a receiver, a processor and a memory communicatively coupled with the processor for human identification.
  • the method may comprise: receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified; extracting CSI from the at least one wireless signal; obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person; and determining an identity of the person based on the radio biometric information.
  • Other examples in the present teaching include systems, methods, medium, devices, servers, and other implementations directed to object identification based on object's radio biometric information, e.g. human identification based on human radio biometric information, in an environment without line-of-sight.
  • a system or server may include the above mentioned apparatus, or have a similar structure as the above mentioned apparatus for human identification.
  • Other concepts relate to software for implementing the present teaching on exploring computation, storage, application, and processing of human identification based on human radio biometric information.
  • a software product, in accord with this concept includes at least one machine-readable non-transitory medium and information carried by the medium.
  • the information carried by the medium may be executable program code data, parameters in association with the executable program code, and/or information related to a user, a request, content, or information related to a social group, etc.
  • FIG. 1 shows an exemplary system for TR-based wireless transmission, according to an embodiment of the present teaching
  • FIG. 2 shows an example for mapping between a CSI logical space and a time- reversal (TR) space, according to an embodiment of the present teaching
  • FIG. 3 shows exemplary RF reflections and scattering around human, according to an embodiment of the present teaching
  • FIG. 4 shows an exemplary experiment setting for human identification with frequency domain CSI, according to an embodiment of the present teaching
  • FIG. 5 shows exemplary locations of test subjects and devices for an experiment of human identification, according to an embodiment of the present teaching
  • FIG. 6A shows an exemplary time-reversal resonance strength (TRRS) map without background subtraction, according to an embodiment of the present teaching
  • FIG. 7A shows an evaluation on receiver operating characteristic (ROC) curves for background subtraction and transmitter-receiver (TX-RX) locations, with different selected backgrounds, according to an embodiment of the present teaching
  • FIG. 7B shows an evaluation on ROC curves for background subtraction and TX- RX locations, with different values of a for Location (Loc) 7, according to an embodiment of the present teaching
  • FIG. 7C shows an evaluation on ROC curves for background subtraction and TX- RX locations, with different TX-RX locations, according to an embodiment of the present teaching
  • FIG. 8 shows an exemplary ROC curve for identifying 1 1 individuals, according to an embodiment of the present teaching
  • FIG. 9A shows an exemplary TRRS map on stationarity with no training database updating, according to an embodiment of the present teaching
  • FIG. 9B shows an exemplary TRRS map on stationarity with training database updating, according to an embodiment of the present teaching
  • FIG. 10 shows ROC curves for human identification with different obstructions, according to an embodiment of the present teaching
  • FIG. 1 1A shows exemplary test poses during a study on human pose effects, according to an embodiment of the present teaching
  • FIG. 1 IB shows ROC curves for human identification with different poses, according to an embodiment of the present teaching
  • FIG. 12 shows an exemplary performance comparison of human identification with and without waveforming design, according to an embodiment of the present teaching
  • FIG. 13 shows exemplary received signal strength indicator (RSSI) value variation of 1 1 individuals, according to an embodiment of the present teaching
  • FIG. 14A shows an exemplary RSSI values tested in an empty room, according to an embodiment of the present teaching
  • FIG. 14B shows an exemplary RSSI values tested with individuals present, according to an embodiment of the present teaching
  • FIG. 15 shows exemplary RSSI values comparison on variations, according to an embodiment of the present teaching
  • FIG. 16 illustrates an application for human identification, according to an embodiment of the present teaching
  • FIG. 17A shows an exemplary diagram showing general implementation of the human identification, according to an embodiment of the present teaching
  • FIG. 17B shows another exemplary diagram showing general implementation of the human identification, according to an embodiment of the present teaching
  • FIG. 18 is a flow chart showing a process of building database for human identification, according to an embodiment of the present teaching
  • FIG. 19 is a flow chart showing a process of human identification, according to an embodiment of the present teaching.
  • FIG. 20 shows a table listing physical characteristics of test subjects in human identification experiment, according to an embodiment of the present teaching
  • FIG. 21A shows a performance matrix of individual identification without background subtraction, according to an embodiment of the present teaching
  • FIG. 22 shows a performance matrix for a study of stationarity, according to an embodiment of the present teaching
  • FIG. 23 shows a table listing six classes of variation, according to an embodiment of the present teaching.
  • FIG. 24 shows a table listing identification rates under variations, according to an embodiment of the present teaching.
  • FIG. 25 shows an exemplary confusion matrix under an RSSI-based approach, according to an embodiment of the present teaching.
  • the present disclosure generally relates to systems, methods, medium, devices, servers, and other implementations directed to object identification based on object's radio biometric information, e.g. human identification based on human radio biometric information, in an environment without line-of-sight.
  • object's radio biometric information e.g. human identification based on human radio biometric information
  • the present teaching discloses human radio biometrics and presents a human identification system that can discriminate individuals even through walls in a non-line-of-sight environment.
  • the disclosed system can capture the channel state information (CSI) and extract human radio biometric information from Wi-Fi signals using time-reversal (TR) technique.
  • CSI channel state information
  • TR time-reversal
  • the disclosed system can recognize individuals in the TR domain without line-of-sight radio.
  • a prototype has been built for a TR human identification system using standard Wi-Fi chipsets with 3 x 3 MIMO transmission. The performance of the built system is evaluated and validated through multiple experiments.
  • the TR human identification system can achieve an accuracy of 98.78% for identifying about a dozen of individuals using a single pair of transmitter and receiver. Thanks to the ubiquitousness of Wi- Fi, the disclosed system can provide low-cost low-complexity reliable human identification applications based on radio biometrics.
  • a novel concept of radio biometrics is disclosed, and accurate human identifications and verifications can be implemented with commercial Wi-Fi devices in a through-the-wall setting.
  • the disclosed human identification system in the present teaching can distinguish and identify different individuals accurately with commercial MIMO Wi-Fi devices of a 40 MHz transmission bandwidth.
  • the disclosed system can support simple and efficient algorithms to achieve a high-accuracy performance.
  • the received signal at the receiver is a combination of copies of the same transmitted signal through different paths and delays.
  • This phenomenon is called multipath propagation.
  • TR technique takes advantage of the multipath propagation to produce a spatial- temporal resonance effect.
  • the present teaching discloses a TR human identification system that can distinguish and identify individuals by human radio biometrics extracted from the Wi-Fi CSI through the TR technique.
  • TR technique By leveraging the TR technique to extract radio biometrics, a low- complexity human identification system can be widely implemented without restrictions on the device deployment thanks to the ubiquitousness of Wi-Fi.
  • This new system can motivate a novel human identification technique relying on wireless sensing with Wi-Fi signals.
  • an apparatus for human identification comprises a receiver and a processor.
  • the receiver is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified.
  • the processor is configured for: extracting channel state information (CSI) from the at least one wireless signal, obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person, and determining an identity of the person based on the radio biometric information.
  • CSI channel state information
  • Determining the identity of the person may comprise retrieving each stored radio biometric information together with its associated identity from the database; calculating a degree of similarity between the radio biometric information and each stored radio biometric information; determining a highest degree of similarity among the degrees of similarity between the radio biometric information and all of the stored radio biometric information; determining a corresponding identity associated with the stored radio biometric information that gives the highest degree of similarity; and determining the identity of the person based on the highest degree of similarity and the corresponding identity.
  • determining the identity of the person may comprise comparing the highest degree of similarity with a confidence threshold; determining the identity of the person to be the corresponding identity when the highest degree of similarity is greater than the confidence threshold; and determining that the identity of the person is unknown when the highest degree of similarity is not greater than the confidence threshold.
  • the degree of similarity is calculated based on at least one of: a time-reversal resonance strength (TRRS), a cross-correlation, an inner product of two vectors, a similarity score, a distance score, a phase correction, a timing correction, a timing compensation, and a phase offset compensation, of the radio biometric information and each stored radio biometric information.
  • TRRS time-reversal resonance strength
  • obtaining radio biometric information based on each CSI comprises: compensating a phase distortion in the CSI; obtaining common human radio biometric information and static environment information; and subtracting the common human radio biometric information and the static environment information from the compensated CSI to obtain the radio biometric information.
  • the person to be identified is not within a line-of-sight of the receiver, such that no light can directly pass through a straight path between the person and the receiver.
  • the at least one wireless signal is received through a network that is at least one of: Internet, an Internet-protocol network, and another multiple access network; and the receiver is associated with a physical layer of at least one of: a wireless PAN, IEEE 802.15.1 (Bluetooth), a wireless LAN, IEEE 802.1 1 (Wi-Fi), a wireless MAN, IEEE 802.16 (WiMax), WiBro, HiperMAN, mobile WAN, GSM, GPRS, EDGE, HSCSD, iDEN, D-AMPS, IS-95, PDC, CSD, PHS, WiDEN, CDMA2000, UMTS, 3GSM, CDMA, TDMA, FDMA, W-CDMA, HSDPA, W-CDMA, FOMA, lxEV-DO, IS-856, TD-SCDMA, GAN, UMA, HSUPA, LTE, 2.5G, 3G, 3.5G, 3.9G, 4G, 5G, 6G, 7G and beyond, another wireless system and
  • CSI comprises: estimating a multipath profile based on the CSI extracted from each of the plurality of wireless signals; and mapping different multipath profiles into a space based on a design of waveforms in a manner such that a similarity between different multipath profiles is minimized and a distance between different multipath profiles in the space is maximized.
  • obtaining radio biometric information based on each CSI further comprises: designing waveforms for CSI obtained in at least one of time domain and frequency domain; converting a problem of similarity minimization between different multipath profiles into a dual problem with a simple solution; and obtaining radio biometric information based on the different multipath profiles after the similarity of the different multipath profiles is minimized.
  • FIG. 1 shows an exemplary system for TR-based wireless communication, according to an embodiment of the present teaching.
  • h(t) the channel between A and B
  • a spatial-temporal resonance is produced at transceiver B.
  • the TR spatial-temporal resonance is generated by fully collecting the energy of the multipath channel and concentrating into a particular location.
  • spatial-temporal resonance known as focusing effect, is a result of a resonance of electromagnetic (EM) field, in response to the environment. This resonance is sensitive to environment changes, which can be used for capturing differences in multipath CSI.
  • the disclosed TR human identification system may utilize not only human's face, but also an entire physical characteristic profile of each individual.
  • TR spatial-temporal resonance has been established as theory and validated through experiments.
  • the TR technique relies on two verified assumptions of channel reciprocity and channel stationarity.
  • Channel reciprocity demonstrates a phenomenon that the CSI of both forward and backward links is highly correlated, whereas channel stationarity establishes that the CSI remains highly correlated during a certain period.
  • a TR- based indoor localization approach implemented under a 125 MHz bandwidth can achieve a centimeter accuracy even with a single access point (AP) working in non-line-of-sight (LOS) environments.
  • AP access point
  • LOS non-line-of-sight
  • a TR indoor locationing system on a Wi-Fi platform can utilize the location- specific fingerprints generated by concatenating the CSI with a total equivalent bandwidth of 1 GHz.
  • the present teaching presents a TR human identification system for identifying individuals through the walls, in absence of any LOS path, based on the human radio biometrics in Wi-Fi signals. This can verify an existence of human radio biometrics, which can be found embedding in the wireless CSI. Moreover, the present teaching discloses a human recognition system that extracts unique radio biometrics as features from the CSI for differentiating between people through the wall. As in this disclosure, "radio shot” may refer to a procedure to take and record human radio biometrics via Wi-Fi signals.
  • the disclosed method for human identification may comprise two main parts: a refinement of human radio biometrics and the TR-based identification.
  • the refinement is designed to remove the common CSI components coming from static objects in the environment and the similarity in the radio biometrics of all participants, and to extract the CSI components that contain distinctive human radio biometrics.
  • the extracted human radio biometric information is mapped into the TR space and the similarity between different biometrics is quantified and evaluated using the time-reversal resonance strength (TRRS).
  • TRRS time-reversal resonance strength
  • the present teaching introduces a concept of human radio biometrics, which accounts for the wireless signal attenuation and alteration brought by human. Through experiments, its existence has been verified and its ability for human identification has been illustrated.
  • object radio biometrics may refer to the wireless signal attenuation and alteration brought by an object, and can be used for object identification.
  • the procedure to collect human radio biometrics is named as radio shot. Because the dominant component in the
  • the present teaching discloses novel algorithms for extracting individual human radio biometrics from the wireless channel information. Radio biometrics extracted from the raw CSI are complex-valued and high-dimensional. To address this problem, one can apply the TR technique to fuse and compress the human radio biometrics and to differentiate between radio biometrics of different people, by using the strength of the spatial-temporal resonances. For performance evaluation, a prototype has been built to implement the TR human identification system using off-the-shelf Wi-Fi chipsets, and test in an indoor office environment during normal working hours with an identification rate as 98.78% in identifying about a dozen of individuals.
  • the present teaching demonstrates a potential of using commercial Wi-Fi signals to capture human radio biometrics for individual identifications.
  • the disclosed TR human identification system is capable of capturing human biometrics and identifying different individuals through the walls.
  • the human radio biometrics that are embedded in the CSI contain the Wi-Fi reflections and scattering by human body in the indoor environment.
  • the human radio biometrics due to the differences in human biological metrics, are different among different individuals.
  • the disclosed system can easily extract the human radio biometrics from the CSI for distinguishing between individuals. This procedure is called radio shot.
  • FIG. 2 shows an example for mapping between a CSI logical space and a TR space, according to an embodiment of the present teaching.
  • signals encounter different objects in the environment, and the corresponding propagation path and characteristics change accordingly before arriving at the receiver.
  • each dot in the CSI logical space may represent a snapshot of an indoor environment, e.g., an indoor location and an indoor event, which can be uniquely determined by the multipath profile h.
  • TRRS a similarity between two profiles can be quantified by TRRS.
  • a TRRS as strength of the TR resonance, is a measurement of a similarity between two CSI samples.
  • TRRS can be used as a matching score between any two vectors, where each vector represent CSI or any profile in a TR space. The higher the TRRS is, the more similar two profiles in the TR space are. Similar profiles constrained by a threshold on TRRS can be assigned into a single class.
  • an indoor locationing system can achieve centimeter-level accuracy, where each of the indoor physical locations is mapped into a logical location in the TR space and can be easily separated and identified using TRRS.
  • the TR based centimeter-level indoor locationing system can be implemented using commercial Wi-Fi chipsets.
  • the wireless propagation around the human body may highly depend on the physical characteristic (e.g., height and mass), the total body water volume, the skin condition and other biological tissues.
  • the human radio biometrics, recording the features in interactions between EM waves and human bodies, are unique among different individuals and can be mapped into separate points in the TR space.
  • the disclosed system by leveraging the TR technique, is capable of capturing the differences in the multipath profiles introduced by different individuals, even when they stand at the same location with the same posture under a through-the-wall setting.
  • a system prototype is built with one 3-antenna transmitter (TX) and one 3- antenna receiver (RX).
  • the CSI samples are obtained from commodity Wi-Fi chips.
  • the system is operated at carrier frequency 5.845 GHz with 40 MHz bandwidth. Due to the 3 x 3 MIMO transmission, each measurement comprises 9 pieces of the CSI for each transmitting- receiving antenna pair.
  • Each CSI contains 1 14 complex values representing 1 14 accessible subcarriers in a 40 MHz band.
  • FIG. 3 shows exemplary RF reflections and scattering around human, according to an embodiment of the present teaching.
  • the human body acts as a reflector and the dots 302, 304, 306 represent the reflecting and scattering points due to the human body and other objects. Since the wireless signal reaches the receiving antenna from more than one path, the human radio biometrics are implicitly embedded in the multipath CSI profile. However, the human body may only introduce a few paths to the multipath CSI, and the energy of those paths is small due to low reflectivity and permittivity of human body compared with other static objects such as walls and furniture. As a result, the human radio biometrics, captured through radio shot, may be buried by other components in the CSI. [0059] Furthermore, because the raw CSI obtained from Wi-Fi chips is a 9 X 114 complex-valued matrix, the resulting raw radio biometrics are high-dimensional and complex valued, which further complicates the identification and classification problem and increases the computation complexity.
  • the disclosed system can exploit the TR techniques and utilize several post-processing algorithms to extract the human radio biometrics and magnify the difference among individuals.
  • the system can use a background subtraction algorithm such that the common information in the CSI can be removed and the distinctive human radio biometrics are preserved.
  • the human radio biometrics in the form of complex-valued matrices can be related to the corresponding individual through a real -valued scalar, the TRRS.
  • the disclosed time reversal human identification system exploits the above idea and may comprise two main components: human radio biometrics refinement and TR-based identification.
  • the module of human radio biometrics refinement can extract the human biometric information from the raw CSI measurement which is a 9 X 114 complex- valued matrix. Due to the independency of each link, the background for each link may be calculated and compensated individually. An important consideration is that, for each CSI measurement, it may be corrupted by the sampling frequency offset (SFO) and the symbol timing offset (STO). Hence, before background calculation and compensation, the phase of each CSI measurement should be aligned first, for example, using methods disclosed in applications PCT/US2017/015909 and PCT/US2016/066015, which are incorporated herein by reference in their entireties. After alignment, based on the assumption that the human radio biometrics only contribute small changes in the multipath, the background can be obtained by taking an average of several CSI measurements.
  • the module of TR-based identification can simplify the identification problem by reducing the high-dimension complex-valued feature into a real-valued scalar.
  • the module can map human radio biometrics into the TR space and utilize the TRRS to quantify the differences between different radio biometrics.
  • the disclosed system can work when the wireless multipath comes from the environment where the EM signals undergo different reflecting and scattering paths and delays.
  • the wireless propagation around the human body may highly depend on individual physical characteristics and conditions of biological tissues. Since it is rare for two individuals to have exactly the same biological physical characteristics, the multipath profiles after human interferences are therefore different among different persons.
  • the human radio biometrics which record how the wireless signal interacts with a human body, is altered accordingly to individuals' biological physical characteristics and can be viewed as unique among different individuals. Through Wi-Fi sounding, the wireless CSI is collected, as well as the human radio biometrics.
  • an indoor CSI (a.k.a. Channel frequency response, CFR) for the m th link with the presence of human body can be modeled as a sum of the common CSI component and the human affected component:
  • N is the number of individuals to be identified.
  • h m ' is a L x 1 complex-valued vector, which denotes the CSI when the i th individual is inside; L is the number of subcarriers, i.e., the length of the CSI; h. ⁇ , defined as the static CSI component, is generated from the static environment in the absence of human; and 6h m ' ) denotes the perturbation in the CSI introduced by the i th individual.
  • the 6h m ' ) is the raw human radio biometric information of the i th individual embedding in the CSI of the m th link.
  • a spatial-temporal resonance may be generated by fully collecting energy of the multipath channel into a particular location in a rich-scattering indoor environment.
  • the spatial-temporal resonance can capture even minor changes in the multipath channel, and can be utilized to characterize the similarity between two multipath CSI realizations.
  • TR spatial-temporal resonance i.e., the TRRS
  • frequency domain The strength of TR spatial-temporal resonance, i.e., the TRRS, in frequency domain can be defined as below.
  • TR spatial-temporal resonance TR' ( ]. 1 , h 2 ) in frequency domain between two CFRs h x and h 2 is defined as:
  • L is the length of CFR and g 2 is the TR signature of h 2 obtained as
  • the TRRS between two CSI matrices Hj and H j is defined as an average of the TRRSs on each of the links:
  • the high- dimension complex-valued human radio biometrics embedded in the CSI measurements can be mapped into the TR space, and the feature dimension is reduced from L X M to 1.
  • the human recognition problem can be implemented as a simple multi-class classification problem as below.
  • the predicted individual identity (ID) is obtained based on the TRRS as: argmaxT ⁇ (H, H i ), if maxT ⁇ (H, H i ) > ⁇ ,
  • the embedded human radio biometric information ⁇ is small compared with other CSI components in measurement H.
  • the resulting TRRS TJ£(H, Hj) may become quite similar among different samples to degrade the accuracy of identification.
  • the human radio biometrics are implicitly embedded in the CSI measurements. But because only a few paths are affected by the human body, the human biometrics CSI component for the i th individual in the m th link, 6h m ' ) , is small in energy, compared with the common CSI component in equation (1). Without a refinement of the radio biometric information, the common feature in the CSI dominates in the TRRS in equations (4) and (6). Moreover, since there exists similarity between different human bodies, it is inevitable to have resemblances in the human radio biometric information 6h m') . As a result, even though the spatial -temporal resonance captures 6h m ' ) , the difference between the TRRSs for different individuals may become too small to differentiate between people.
  • the present teaching discloses post-processing algorithms to extract the useful human radio biometric information from the CSI, after taking the radio shot.
  • This process is called human radio biometrics refinement, which can include the following two main steps.
  • the first step is phase compensation.
  • the estimated CSI can be corrupted by different initial phases of each measurement and different linear phases on each subcarrier due to the time synchronization error. Therefore, in order for the disclosed system to extract and subtract out correct background CSI components, it is indispensable to compensate for phase errors in all the raw CSI measurements.
  • the second step is background information subtraction.
  • the CSI is modeled as the sum of static background CSI components and human biometrics CSI components. As such, the radio biometric information can be extracted by the system through subtracting out the common information in the CSI.
  • Phase Alignment Algorithm for compensating the phase corruption.
  • each CSI h ⁇ can be mathematically modeled as:
  • ⁇ ⁇ ⁇ 0,1, - , L - 1, J where ⁇ 11 ⁇ 3 ⁇ denotes the slope of the linear phase. ⁇ ⁇ ⁇ is the initial phase, and both of them are different for each CSI.
  • the next step is to cancel the initial phase of the CSI for each link, including the reference.
  • the initial phase is obtained as the phase on the first subcarrier for each CSI h[0], and can be compensated as
  • Both the background and the refined human biometric information may be extracted from the aligned CSI measurements h a ji gn .
  • h instead of h a ji gn will be used to denote the aligned CSI in the rest of the present teaching.
  • a Background Subtraction Algorithm can be used in the second step for background information subtraction.
  • 1) Direct Subtraction In this type of background subtraction, the first step is to estimate the background, a.k.a., common information in the collected CSI samples. Once the common information is obtained, the background subtraction is carried out through subtracting a scaled version of the common information from (phase-aligned) CSI samples. The scale factor is within the range of [0, 1]. Typically, we will choose a factor smaller than 1 to avoid emphasizing noise in the samples.
  • the radio biometrics 6h m ' also involves two parts: the common radio biometric information and the distinct radio biometric information.
  • h m '' can be further decomposed as following:
  • h(m) h (m) + g h (m) + ⁇ (rr y . ⁇ ⁇ n)
  • 6h[ m) 6hjJ° + 6hg ) .
  • 6hjJ ⁇ denotes the common radio biometric information, which is determined by all the participants in the identification system. Meanwhile, is the corresponding distinct radio biometric information, remaining in the extracted radio biometrics after taking out the common biometric information.
  • the background CSI components for several CSI measurements of N individuals can be estimated by taking the average over the aligned CSI as:
  • h h - ah ⁇ ', (14) where a is the the background subtraction factor, 0 ⁇ a ⁇ 1. It cannot be too close to 1 as the remaining CSI will be noise-like.
  • H is the refined radio biometric information matrix for individual i
  • H j is an approximation of the distinctive component in the human radio biometric information matrix 6H j defined in equation (3).
  • FIG. 6A and FIG. 6B An example is shown in FIG. 6A and FIG. 6B, where the TRRS ⁇ , H ; ) before background subtraction is plotted in FIG. 6A while that of TJ£(H, Hj) is shown in FIG. 6B, with the background as the average of all CSI measurements in training database.
  • the comparison between FIG. 6A and FIG. 6B demonstrates that the refinement of human radio biometrics helps to improve the sensitivity of TRRS for differentiating between individuals.
  • the disclosed background subtraction algorithm suppresses the spatial-temporal resonance of the CSI between different classes while maintaining strong resonance within the same class.
  • the disclosed system By leveraging the TR technique to capture human radio biometrics embedded in the CSI of Wi-Fi signals, the disclosed system is capable of identifying different individuals in real office environments with high accuracy. The performance of human identification has been evaluated.
  • the training i.e., taking the radio shot, may be simple and can be done in seconds.
  • FIG. 5 shows exemplary locations of test subjects and devices for an experiment of human identification, according to an embodiment of the present teaching.
  • the experiment configurations of the transmitter, receiver and individuals are demonstrated. Both Wi-Fi devices are placed on the cart or table with height from the ground being 2.8ft.
  • the transmitter (bot) was at location denoted as "TX 2" 502
  • the receiver (RX) was placed at the five locations denoted from “Loc 1 " to "Loc 5".
  • the bot was placed at location "TX 1 " 501
  • the receiver was placed at five locations denoted from "Loc 6" to "Loc 10" respectively.
  • TX-RX locations can represent Line-of-sight (LOS) scenario ("Loc 1 "), non LOS ( LOS) scenarios ("Loc 2" to “Loc 6"), and through-the-wall scenarios ("Loc 7" to “Loc 10").
  • LOS Line-of-sight
  • LOS non LOS
  • LOS through-the-wall scenarios
  • a training database was built with 50 CSI measurements for each class, while the size of the testing database for identification is 500 CSI measurements per class.
  • the 50 CSI measurements for each class can be averaged to get one representative CSI for the particular class and that representative can be stored in the database.
  • For testing one can measure CSI once and use that CSI to compare with the CSIs in the training database.
  • test subjects The physical characteristics of test subjects are listed in FIG. 20. The first five test subjects in FIG. 20 participated in experiments in Section A and Section B below, while all the 1 1 test subjects participated in the identification experiment in Section C below. The test subject #2 was the individual subject in the verification experiments in Section D below.
  • FIG. 6A shows an exemplary time-reversal resonance strength (TRRS) map without background subtraction, according to an embodiment of the present teaching
  • TRRS time-reversal resonance strength
  • FIG. 21 A shows a performance matrix of individual identification without background subtraction, according to an embodiment of the present teaching.
  • Each element of the performance matrix is the probability for that the TRRS between the training and the testing classes is higher than the threshold ⁇ .
  • a higher value in the diagonal means a larger chance of correct identifications.
  • larger off-diagonal elements indicate higher false alarm rates because it implies that the testing sample may be misclassified to the wrong training class with a higher probability if the testing class has never been included in the training set.
  • FIG. 7A shows an evaluation on receiver operating characteristic (ROC) curves for background subtraction and transmitter-receiver (TX-RX) locations, with different selected backgrounds, according to an embodiment of the present teaching.
  • the ROC curves which are obtained by averaging the ROC performance measured at all 10 TX-RX locations, show how the identification rate and false alarm rate vary as the decision threshold ⁇ changes.
  • the dashed line denotes the performance when using all the CSI measurements in training data set as the background (i.e., the background including static environment and common radio biometrics), while the solid line and dotted line represent the case of no background subtraction and subtraction with the static environment background, respectively.
  • FIG. 7B shows an evaluation on ROC curves for background subtraction and TX-RX locations, with different values of a for Loc 7, according to an embodiment of the present teaching.
  • the ROC performance is plotted to evaluate the impact of different a.
  • a— 0.9 the identification performance is the worst because the remaining CSI components after background subtraction is noisy and has few information for human biometrics.
  • the experiment shows that a— 0.5 is optimal for individual identification. The rest experiments discussed in the present teaching will adopt a— 0.5 and the all-CSI background scheme.
  • FIG. 7C shows an evaluation on ROC curves for background subtraction
  • TX-RX locations with different TX-RX locations, according to an embodiment of the present teaching.
  • the identification performance of different scenarios is plotted in FIG. 7C.
  • the performance comparison can be summarized from the best to the worst as: Loc 7 > Loc 2 > Loc 3 > Loc 10 > Loc 1 >Loc 5 > Loc 9 > Loc 4 > Loc 8 > Loc 6.
  • the LOS scenario is not the best configuration for human identification.
  • the human radio biometrics are embedded in the multipath CSI. Due to the independency of each path in the multipath CSI, the more paths the CSI contains, the larger number of degrees of freedom it can provide in the embedded human radio biometrics.
  • FIG. 7C also demonstrate the capability of the disclosed system for through-the-wall human identification, in that no matter which configuration is selected the disclosed system has a high accuracy.
  • the performance of the disclosed human identification system is influenced by both the background subtraction and the TX-RX configurations.
  • the performance is evaluated in a TX-RX configuration with large data set of 1 1 individuals, with optimal background subtraction applied and at an exemplary location, e.g. "Loc 7".
  • the corresponding ROC curve is plotted in FIG. 8.
  • a threshold ⁇ being 0.91
  • the average identification rate is 98.78%
  • the average false alarm rate is 9.75%. This is because when two individuals have similar body contour, the possibility of misclassifying between them increases.
  • the accuracy of identification is still high.
  • FIG. 9A shows an exemplary TRRS map on stationarity with no training database updating, according to an embodiment of the present teaching.
  • the training set is updated every time after measurement and identification, e.g.
  • FIG. 9B shows an exemplary TRRS map on stationarity with training database updating, according to an embodiment of the present teaching. Detail of the verification accuracy is listed in FIG. 22, which shows a performance matrix for a study of stationarity, according to an embodiment of the present teaching.
  • FIG. 24 The detailed verification performance is shown in FIG. 24 where the relation of the threshold ⁇ and the capability of differentiating between different variations are studied.
  • the training set contains the CSI from class #1.
  • a low threshold ⁇ may reduce the sensitivity of the disclosed system in verification.
  • the threshold ⁇ increases, the system can distinguish between radio biometrics collected when a person is wearing nothing and radio biometrics collected when the person is wearing a coat and a backpack, i.e. distinguish between class #1 and class #3.
  • the result shows a 0 probability for class #3 to be misclassified as class #1.
  • the backpack with or without laptop inside as they are shadowed by the human body, the introduced variations have relatively small impact on the accuracy of verification.
  • FIG. 10 shows ROC curves for human identification with different obstructions, according to an embodiment of the present teaching.
  • the average identification rate for the no-obstruction scenario is 97.57% and the corresponding average false alarm rate is 9.85%.
  • the average identification rate can increase to 99.53% while the average false alarm rate is 8.82%.
  • the system has an average identification rate of 97.44% and an average false alarm rate of 8.43%.
  • the multipath profile changes when the obstruction changes, especially when an obstruction locates between the transmitter and the receiver link and in front of the test subject.
  • the TR technique may be used to capture the difference in multipath profile, and to capture the difference introduced by obstruction changes in the meantime.
  • the system is robust to slight changes in posture, e.g., from Pose 1 to Pose 2.
  • the disclosed TR human identification system may fail to find a match in the training database.
  • Pose 4 the test subject is asked to lift the left arm with 90 degree and the direction being perpendicular to the link between the transmitter and the receiver.
  • Pose 5 test subjects lift the arm at the same height but the arm is parallel to the TX-RX link.
  • TR space for a test subjects might fall out of "proximity” (range of a high similarity) of himself or herself, which results in a reduce in the identification rate.
  • proximity range of a high similarity
  • the changed multipath profiles fall into the "proximity” of other test subjects which can lead to an increase in the false alarm rate.
  • the RSS vector contains 6 RSS values for 3 receiving antenna in each 20 MHz band and 1 overall RSS value.
  • each real-valued 7 x 1 vector as the feature and apply the k nearest neighbors (k ) classifiers to the measurements.
  • FIG. 13 shows exemplary TRRS value variation of 1 1 individuals, according to an embodiment of the present teaching. From the results in FIG. 13, the RSSI difference between different individuals is small. The false alarm rate is 68.07% and the identification rate is 31.93%, which is far inferior to the disclosed identification system.
  • FIG. 14A shows an exemplary TRRS values tested in an empty room, according to an embodiment of the present teaching.
  • FIG. 14B shows an exemplary TRRS values tested with individuals present, according to an embodiment of the present teaching.
  • the stationarity is evaluated and from the plot it is obvious that the RSS value is not stable over time.
  • the identification rate for the individual is 89.67% with a 10.33% possibility that the individual is misclassified as an empty room.
  • the identification rate does not improve due to the instability of the RSS values over time.
  • the RSSI-based approach can hardly differentiate between different variations by only using the 7 X 1 RSS vector as shown in FIG. 15 and in the confusion matrix of individual verification in FIG. 25.
  • the reason for its insensitivity to small variations is the same as that for its incapability in human identification.
  • the 7 x 1 RSS vector feature only captures little human radio biometric information and loses the individual discrimination.
  • RSSI is only a real-valued scaler which approximately represents the received signal power, it is less informative. It is susceptible to noise and has large intra-class variations which can degrade the identification accuracy a lot when the number of test subjects increases.
  • the disclosed TR human identification system succeeds in capturing and extracting the human radio biometric information embedded in the CSI, and in distinguishing individuals with high accuracy through-the-wall.
  • the disclosed system can adopt a simple model for human radio biometrics embedded in the CSI as shown in equation (1).
  • the obtained human radio biometrics 6h and the environment component h 0 may be correlated.
  • the human radio biometrics 6h may be location-dependent, which may cause the system to run in an environment consistent over time.
  • Performance of the disclosed system can be improved by deploying more transceiver pairs to capture fine-grained human radio biometrics from different directions simultaneously.
  • the disclosed system may be implemented in the environments that remain stationary most of the time. For example, it can be implemented for identity verification at places like bank vaults to allow the entry of authorized staff. It can also be used in home security systems, functioning as wireless electronic keys in vacation houses. Moreover, the location embedded radio biometrics are helpful in applications where it is needed to tell both who the test subject is and where the test subject is. Once the environment-independent radio biometric information is extracted, the disclosed system can identify individuals without being notified by test subjects and implement in applications where there is no direct contact with test subjects or where there are obstructions in-between the sensor and the subject.
  • FIG. 16 illustrates an application for human identification, according to an embodiment of the present teaching.
  • the system may request each individual to stand at a security checkpoint 1613 for recording his/her human radio biometric information , e.g. at the airport or other places with security check, and transmit a wireless signal through a multipath embedding radio biometrics of the individual.
  • the wireless signal may be transmitted from a transmitter 1612 to a receiver 1614.
  • the receiver 1614 can detect human radio biometric information of the person because the multipath through which the wireless signal was transmitted was impacted by the person and embedded his/her human radio biometric information in it.
  • the receiver 1614 may send the recorded human radio biometric information of the person to the radio biometric database 1616, which can store all human radio biometric information each corresponding to a recorded individual.
  • the system may request each candidate individual to stand at the security checkpoint 1613 for measuring his/her human radio biometric information and transmit a wireless signal through a multipath embedding radio biometrics of the candidate individual.
  • the wireless signal may be again transmitted from the transmitter 1612 to the receiver 1614.
  • the receiver 1614 can detect human radio biometric information of the candidate person because the multipath through which the wireless signal was transmitted was impacted by the candidate person and embedded his/her human radio biometric information in it.
  • the receiver 1614 may then send the detected human radio biometric information of the candidate person for a matching operation at 1622.
  • the system can retrieve stored human radio biometric information each corresponding to a recorded individual, and compare the detected human radio biometric information with the retrieved human radio biometric information to determine whether there is a match.
  • human radio biometric information can be different enough for different individuals to distinguish between people.
  • human radio biometric information can be consistent enough for a same individual to identify the individual.
  • the system can determine the identity of the candidate person based on information of the corresponding recorded individual having the matching human radio biometric information, and may grant an access to the candidate individual according to various applications.
  • the system can deny access of the candidate individual according to various applications.
  • the system may record the human radio biometric information of the unmatched person for future use.
  • similar applications of the system may be used. For example, when police is trying to catch a fleeing felon, the system may provide a warning, instead of access grant, to the police when there is a match of human radio biometric information between the measured candidate and the recorded felon.
  • FIG. 17A shows an exemplary diagram showing general implementation of the human identification in an exemplary disclosed system 1700, according to an embodiment of the present teaching.
  • the exemplary disclosed system includes a receiver 1720, a CSI collector 1702, a radio biometric refiner 1704, a radio biometric extractor 1706, a radio biometric database 1707, a TRRS calculator 1708, an information fuser 1710, an identity determiner 1712.
  • the CSI collector 1702, the radio biometric refiner 1704, the radio biometric extractor 1706, the TRRS calculator 1708, the information fuser 1710, and the identity determiner 1712 may all be implemented on a processor 1730.
  • FIG. 17B shows another exemplary diagram showing general implementation of the human identification in an exemplary disclosed system 1701 , according to an
  • the receiver 1720 may be replaced by a plurality of receivers 1722 to make use of technology of multiple antennas.
  • CSIs from multiple antennas e.g. from the plurality of receivers, can be combined or fused using various methods such as those disclosed in PCT/US2017/015909 and PCT/US2016/066015.
  • each of the disclosed systems 1700, 1701 may include a memory communicatively coupled with the processor 1730.
  • the receiver 1720 in this example may receive at least one wireless signal from a multipath channel that is impacted by a person.
  • the person may be a person to be recorded during a phase of database building, or a person to be tested during a phase of human identification.
  • the CSI collector 1702 in this example may be configured for collecting CSI from the wireless signal.
  • the CSI collector 1702 may estimate the multipath profile based on the received at least one wireless signal.
  • the multipath profile may include radio biometric information of the person.
  • the CSI collector 1702 can send the multipath profile to the radio biometric refiner 1704 for radio biometric refining.
  • the radio biometric refiner 1704 in this example may receive the multipath profile from the radio biometric refiner 1704 and compensate the phase distortion in the estimated multipath profile. In this manner, the radio biometric refiner 1704 can collect the compensated multipath profile of the person and send the compensated multipath profile of the person to the radio biometric extractor 1706 for radio biometric extractor.
  • the radio biometric extractor 1706 in this example may receive the
  • the radio biometric extractor 1706 may then extract the radio biometric information by subtracting the background information from the compensated multipath profile.
  • the radio biometric extractor 1706 may store the refined radio biometrics of this person along with his/her identity in the radio biometric database 1707.
  • the radio biometric extractor 1706 may send the refined radio biometrics of this person to the TRRS calculator 1708 for TRRS calculation.
  • the TRRS calculator 1708 in this example may receive the test radio biometrics from the radio biometric extractor 1706 and retrieve stored radio biometrics from the radio biometric database 1707. Based on each pair of the test radio biometrics and a stored radio biometrics, the TRRS calculator 1708 can calculate the TRRS between the test radio biometrics and the stored radio biometrics. In one embodiment, the TRRS calculator 1708 may send the TRRS to the information fuser 1710 for information fusion.
  • the information fuser 1710 in this example may receive the calculated TRRS from the TRRS calculator 1708 and combine the TRRSs from all links to find the highest
  • the information fuser 1710 may send the highest
  • the identity determiner 1712 in this example may receive the highest TRRS and its corresponding identity from the information fuser 1710, and compare highest TRRS with a confidence threshold. If the highest TRRS is larger than the confidence threshold, the identity determiner 1712 may output the corresponding identity as the identity of the tested person.
  • the identity determiner 1712 may determine that the identity of the tested person is unknown.
  • FIG. 18 is a flow chart showing a process of building database for human identification, according to an embodiment of the present teaching.
  • the process in FIG. 18 may be performed by the system shown in FIG. 17A and FIG. 17B.
  • At 1802 at least one wireless signal is received from a multipath channel that is impacted by a person to be recorded.
  • the multipath profile is estimated at 1804 based on the received at least one wireless signal.
  • the phase distortion in the estimated multipath profile is compensated at 1806.
  • the compensated multipath profile of the person is then collected at 1808. Background information is obtained at 1810.
  • the radio biometric information is extracted at 1812, e.g. by subtracting the background information.
  • the refined radio biometrics of this person, along with his/her identity may be stored in a database for future use of human identification.
  • FIG. 19 is a flow chart showing a process of human identification, according to an embodiment of the present teaching.
  • the process in FIG. 18 may be performed by the system shown in FIG. 17A and FIG. 17B.
  • At 1902 at least one wireless signal is received from a multipath channel that is impacted by a person to be tested.
  • the multipath profile is estimated at 1904 based on the received at least one wireless signal.
  • the phase distortion in the estimated multipath profile is compensated at 1906.
  • the radio biometric information is extracted at 1908, e.g. by subtracting the background information.
  • the TRRS between the test radio biometrics and the radio biometrics in the database is calculated at 1910. TRRSs from all links are combined at 1912. The highest TRRS among all TRRSs between the test radio biometrics and all stored radio biometrics is found at 1914, together with a corresponding identity. At 1915, it is determined whether the highest TRRS is larger than a predetermined confidence threshold. If so, the process goes to 1916, where the corresponding identity is output as the identity of the tested person. Otherwise, the process goes to 1918, where it is determined that the identity of the tested person is unknown.
  • computer hardware platforms may be used as the hardware platform(s) for one or more of the elements described herein (e.g., the components of in the system described with respect to any of FIGs. 1-19).
  • a computer with user interface elements may be used to implement a personal computer (PC) or other type of work station or terminal device, although a computer may also act as a server if appropriately programmed. It is believed that those skilled in the art are familiar with the structure, programming and general operation of such computer equipment and as a result the drawings should be self-explanatory.
  • the disclosed system can be realized by a specialized system having a functional block diagram illustration of a hardware platform which includes user interface elements.
  • the computer may be a general purpose computer or a special purpose computer. Both can be used to implement a specialized system for the present teaching.
  • This computer may be used to implement any component of the techniques of human identification based on human radio biometric information, as described herein.
  • the system in FIG. 17A and FIG. 17B, etc. may be implemented on a computer, via its hardware, software program, firmware, or a combination thereof.
  • aspects of the methods of human identification based on human radio biometric information may be embodied in programming.
  • Program aspects of the technology may be thought of as "products” or “articles of manufacture” typically in the form of executable code and/or associated data that is carried on or embodied in a type of machine readable medium.
  • Tangible non-transitory “storage” type media include any or all of the memory or other storage for the computers, processors or the like, or associated modules thereof, such as various semiconductor memories, tape drives, disk drives and the like, which may provide storage at any time for the software programming.
  • All or portions of the software may at times be communicated through a network such as the Internet or various other telecommunication networks.
  • a network such as the Internet or various other telecommunication networks.
  • communications may enable loading of the software from one computer or processor into another.
  • another type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links.
  • a machine-readable medium may take many forms, including but not limited to, a tangible storage medium, a carrier wave medium or physical transmission medium.
  • Non-volatile storage media include, for example, optical or magnetic disks, such as any of the storage devices in any computer(s) or the like, which may be used to implement the system or any of its components as shown in the drawings.
  • Volatile storage media include dynamic memory, such as a main memory of such a computer platform.
  • Tangible transmission media include coaxial cables; copper wire and fiber optics, including the wires that form a bus within a computer system.
  • Carrier-wave transmission media may take the form of electric or electromagnetic signals, or acoustic or light waves such as those generated during radio frequency (RF) and infrared (IR) data communications.
  • Computer-readable media therefore include for example: a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD or DVD-ROM, any other optical medium, punch cards paper tape, any other physical storage medium with patterns of holes, a RAM, a PROM and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave transporting data or instructions, cables or links transporting such a carrier wave, or any other medium from which a computer may read programming code and/or data. Many of these forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to a physical processor for execution.
  • the radio biometric information extracted from the CSI may be directly compared with other radio biometrics in the database with a similarity metric, e.g. TRRS.
  • a similarity metric e.g. TRRS.
  • the radio biometrics extracted from CSI between different humans can be quite similar.
  • waveforming design as discussed below, can be used to further separate those radio biometrics of different individuals which are extracted from the CSI, and to make them more distinct during applications like human identification.
  • the strength of the spatial- temporal resonance (TRRS) TR' ( ]. 1 , g 2 ) between two CSI samples h x and h 2 in the time domain may be defined as a function between the CSI measurements h x and the waveforming vector g 2 of h 2 as:
  • the waveforming vector g ; , Vi can be designed to suppress the inter-class TRRS ⁇ ⁇ ( ⁇ ⁇ g ; ), while maintaining a lower bound on the intra-class TRRS ⁇ 2 x (h j , g j ), for every j as:
  • gi ll 2 1, i.
  • g is the waveforming vector for the i class of the multipath profiles hj. The purpose is to exaggerate the difference between different CSI samples.
  • the problem in (20) is a joint optimization problem which is complicated and of a high dimension.
  • the SDP relaxation may be applied to the problem in (25) by replacing gig" with G ; as:
  • the problem in (26) and the problem in (25) are equivalent in that they share the same optimal variables and y ⁇ .
  • the problem in (26) yields a near optimal solution.
  • Hi [h «, h (2) , - , h (M) ], Vi, (27) where M is the number of links between the transmitter and the receiver and L is the number of available subcarriers in a channel frequency response (CFR).
  • CFR is the CSI measured in frequency domain.
  • TR spatial-temporal resonance TR' ( ]. 1 , h 2 ) in frequency domain between two CSI samples h x and h 2 may be defined as
  • L is the length of CSI vector
  • k is the subcarrier index
  • g 2 is the waveforming vector of h 2 .
  • the well-known TR waveforming vector for a CSI measurement h in frequency domain is as:
  • the optimization problem in the frequency domain can be designed to suppress inter-class TRRS J£ F (h gj), while maintaining a lower bound on intra-class TRRS
  • g is the waveforming vector for the i th class of multipath profiles hj.
  • optimization (34) is sensitive to the dimensions (number) of the variables, which may be extremely large in the frequency domain TR waveforming problem, since there are usually many subcarriers and the variable G; has a high dimension.
  • g(A, p) AiY t h + inf g H ( ⁇ j ⁇ i Aj Conj (hj)hf - AiConj (hi)h? " )g. (38)
  • 'BG' stands for results when using the algorithm to extract and refme the human radio biometrics
  • 'TR' stands for results when using basic TR waveforming
  • 'WD' stands for results when using the waveforming design disclosed in the present teaching
  • 'BG+TR' stands for results when using basic TR waveforming and the algorithm to extract and refme the human radio biometrics
  • 'BG+WD' stands for results when using the waveforming design disclosed in the present teaching and the algorithm to extract and refme the human radio biometrics.
  • the best strategy is to apply both optimal waveforming and radio biometric refinement to the application of human identification. With the same false alarm rate, the detection rate can be increased by 9%, if using the disclosed waveforming algorithms as well as the radio biometrics refinement.
  • the disclosed system may be a radio shot system used in various applications.
  • the disclosed system can be used as an intelligent electronic key system that requires no touch or connection to sensors and identifies and grants access to authorized users, e.g. entry control for commercial offices and homes.
  • the disclosed system can be used as an alternative for current electronic key system when users want sensors to be invisible or unreachable to test subjects for the sake of protecting sensors from intentional destroy.
  • the disclosed system can be used as an alternative for current electronic key system when users can not touch any sensors or keys for opening a door, for example for offices of disease control that requires free of contamination and only authorized entry.
  • the disclosed system can be used as an easy and efficient electronic key system for every home, offices and other places, compared with systems based on fingerprints, iris or retina scans, due to ubiquitousness of Wi-Fi routers in the current world.
  • the disclosed system can be used as an intelligent parent control system installed on TVs, desktops or other electronic entertainment devices that can identify parents or authorized users through radio shot.
  • an analytic model might be built which can infer basic physical characteristics like weight and height of a test subject according to the radio biometric captured during radio shot.
  • a large database can be built to store radio biometrics of almost every individual in the world, to be used in the area of forensics, anthropology, statistics, etc., just like the DNA library. If more refined radio biometrics are available for further improving the identification accuracy, a radio shot system can be deployed as an identification tool for customs and security check at airports.
  • a user can use the CSI (e.g. in the user's office) as the user's signature for secure transaction.
  • One big problem in secure transaction is the authentication of the user.
  • Existing authentication methods may include password, fingerprint, smart card, iris, etc.
  • the disclosed system can be used to capture the CSI when the user is in office and use the captured CSI to authenticate that the user is indeed in his/her office. It can be useful for commercial applications, when people always do certain things (e.g. conference calls) in a certain room. Since a basic idea of human radio biometrics is to distinguish tiny and subtle difference between different individuals, if there is subtle difference in an object, the device in the present teaching can also detect the difference. For example, one can use the device to detect defects in piping.
  • the CSI statistics/feature may be obtained from channel probing when there is no defect. If there is a crack in a pipe, then some observable multipath patterns different from those without defects can be distinguished.
  • a receiver may be put in a location close to a patient.
  • the disclosed system can obtain some useful information of the patient's body.
  • the disclosed system can be used for checking a person's respiratory. Because a person's nose has two nostrils, after inserting the
  • the Wi-Fi signal may go into the lung and come out.
  • the disclosed system can help to scan the lung, while the set up can be easily done if a patient is put on oxygen. Similar operations can be done for scanning human ears.

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Veterinary Medicine (AREA)
  • Theoretical Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Public Health (AREA)
  • Animal Behavior & Ethology (AREA)
  • Molecular Biology (AREA)
  • Medical Informatics (AREA)
  • Heart & Thoracic Surgery (AREA)
  • Biomedical Technology (AREA)
  • Pathology (AREA)
  • Biophysics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Fuzzy Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Psychiatry (AREA)
  • Computer Hardware Design (AREA)
  • Physiology (AREA)
  • Evolutionary Computation (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Radiology & Medical Imaging (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present teaching relates to human identification based on human radio biometric information in an environment without line-of-sight. In one example, an apparatus for human identification is disclosed. The apparatus comprises a receiver, a processor and a memory communicatively coupled with the processor. The receiver is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified. The processor is configured for: extracting channel state information (CSI) from the at least one wireless signal, obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person, and determining an identity of the person based on the radio biometric information.

Description

METHODS, APPARATUS, SERVERS, AND SYSTEMS FOR HUMAN
IDENTIFICATION BASED ON HUMAN RADIO BIOMETRIC INFORMATION
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] The present application claims priority to U.S. Patent Application No.
62/307,172, filed March 1 1 , 2016, entitled "RADIO SHOT: THROUGH-THE-WALL
HUMAN IDENTIFICATION," and U.S. Patent Application No. 62/334,1 10, filed May 10, 2016, entitled "TIME-REVERSAL TRACKING WITHOUT MAPPING," which are incorporated herein by reference in their entireties.
TECHNICAL FIELD
[0002] The present teaching generally relates to human identification. More specifically, the present teaching relates to human identification based on human radio biometric information in an environment without line-of-sight.
BACKGROUND
[0003] Nowadays, capability of performing reliable human identification and recognition has become a crucial requirement in many applications, such as forensics, airport custom check, and bank securities. Current state-of-the-art techniques for human identification rely on discriminative physiological and behavioral characteristics of human, known as biometrics.
[0004] Biometric recognition refers to an automated recognition of individuals based on their human biological and behavioral characteristics. Some well-known biometrics for human recognition may include fingerprint, face, iris, and voice. Since biometric information is inherent and distinctive to an individual, biometric traits are widely used in surveillance systems for human identification. Moreover, due to difficulty for biometrics counterfeit, techniques based on biometrics have clear-cut advantages over traditional security methods such as passwords and signatures in countering the growing security threats and in facilitating personalization and convenience. Even though current biometrics systems can be applied in some environments, all of them require special devices that capture human biometric traits in an extremely line-of-sight (LOS) environment. A LOS environment means there is a direct LOS path between the device and the human (or other test subjects). For example, to collect a fingerprint, a person usually puts a finger on top of the fingerprint scanner, where there is a direct straight path of light between the scanner (capturing device) and the finger (test subject). In contrast, in a non-line-of-sight ( LOS) environment, there are some blockages, e.g. walls, between the device and the test subject, such that no light can directly pass through the straight path between the device and the test subject.
[0005] Some researchers studied a relationship between the electromagnetic (EM) absorption of human bodies and the human physical characteristics in the carrier frequency range of 1 to 15 GHz, in which the body's surface area is found to have a dominant effect on absorption. Moreover, the interaction of EM waves with biological tissue has been studied and the dielectric properties of biological tissues have been measured. The wireless propagation around the human body highly depends on the physical characteristic (e.g., height and mass), the total body water volume, the skin condition and other biological tissues. The human- affected wireless signal under attenuations and alterations, containing the identity information, may be defined as human radio biometrics or human radio biometric information. Considering the combination of all the physical characteristics and other biological features that affect the propagation of EM waves around the human body and how variable those features can be among different individuals, the chance for two human individuals to have an identical combination is significantly small, no matter how similar those features are. Even if two persons have the same height, weight, clothing and gender, other inherent biological characteristics may be different, resulting in different wireless propagation patterns round the human body. Taking the Deoxyribonucleic acid (DNA) sequence as an example, even though all humans are 99.5% similar to any other humans, no two human individuals are genetically identical, which is the key to techniques such as genetic fingerprinting. Since the probability for two individuals to have exactly the same physical and biological characteristics is extremely small, multipath profiles after human interferences are therefore different among different persons. Consequently, human radio biometrics, which record how the wireless signal interacts with a human body, are altered according to individuals' biological and physical characteristics and can be viewed as unique among different individuals. One example is that face recognition has been implemented for many years to distinguish from and recognize different people, thanks to the fact that different individuals have different facial features. Human radio biometrics, which record how radio frequency (RF) signals respond to the entire body of a human including the face, should contain more information than a face, and thus become more distinct among humans.
[0006] In the recent past, a number of attempts have been made to detect and recognize indoor human activities through wireless indoor sensing. Systems have been built to detect indoor human motions based on the variations of channel state information (CSI). They made use of: first two largest eigenvalues of the CSI correlation matrix; standard deviation of the CSI samples from a 3 X 3 MIMO system to detect human activities such as falling; the received signal strength (RSS) as an indicator for the fluctuation of the wireless channel quality; wireless signal for tracking and recording vital signals. Some system has been disclosed to track human breathing and heartbeat rate using off-the-shelf Wi-Fi signals. A Vital-Radio system was disclosed to monitor vital signs using radar technique to separate different reflections. On the other hand, the recognition of gestures and small hand motions has been implemented using wireless signals. By sending a specially designed frequency modulated carrier wave (FMCW) which sweeps over different carrier frequencies, a new radar-based system was disclosed to keep track of the different time-of-flights (ToFs) of the reflected signals. However, as focusing on differentiating between different human movements, e.g., standing, walking, falling down and small gestures, none of the existing works have addressed the problem of distinguishing one individual from others, who hold the same posture and stand at the same location, by only using Wi-Fi signals in a through-the-wall setting. Recently, a RF-Capture system was presented to image human body contour through the wall. Owing to the distinctiveness of silhouettes, it can differentiate between different individuals by applying image processing and machine learning techniques to the captured human figures. However, to get a high-resolution ToF profile, it requires special devices that can scan over 1 GHz spectrum. Moreover, the computational complexity introduced by the necessary image processing and machine learning algorithms is high.
[0007] Therefore, there is a need to build a human identification system to solve the above-mentioned problems and to avoid the above-mentioned drawbacks.
SUMMARY
[0008] The present teaching generally relates to human identification. More specifically, the present teaching relates to human identification based on human radio biometric information in an environment without line-of-sight. [0001] In one example, an apparatus for human identification is disclosed. The apparatus comprises a receiver, a processor and a memory communicatively coupled with the processor. The receiver is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified. The processor is configured for:
extracting channel state information (CSI) from the at least one wireless signal, obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person, and determining an identity of the person based on the radio biometric information.
[0002] In another example, an apparatus for human identification is disclosed. The apparatus comprises a plurality of receivers, a processor and a memory communicatively coupled with the processor. Each of the plurality of receivers is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified. The processor is configured for: extracting, regarding each of the plurality of receivers, CSI from the at least one wireless signal, obtaining, from each of the plurality of receivers, radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person, combining the radio biometric information obtained from the plurality of receivers to generate combined radio biometric information, and determining an identity of the person based on the combined radio biometric information.
[0003] In yet another example, a method for human identification is disclosed. The method may be implemented on a machine including at least a receiver, a processor and a memory communicatively coupled with the processor for human identification. The method may comprise: receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified; extracting CSI from the at least one wireless signal; obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person; and determining an identity of the person based on the radio biometric information.
[0004] Other examples in the present teaching include systems, methods, medium, devices, servers, and other implementations directed to object identification based on object's radio biometric information, e.g. human identification based on human radio biometric information, in an environment without line-of-sight. For example, a system or server may include the above mentioned apparatus, or have a similar structure as the above mentioned apparatus for human identification. [0005] Other concepts relate to software for implementing the present teaching on exploring computation, storage, application, and processing of human identification based on human radio biometric information. A software product, in accord with this concept, includes at least one machine-readable non-transitory medium and information carried by the medium. The information carried by the medium may be executable program code data, parameters in association with the executable program code, and/or information related to a user, a request, content, or information related to a social group, etc.
[0006] Additional novel features will be set forth in part in the description which follows, and in part will become apparent to those skilled in the art upon examination of the following and the accompanying drawings or may be learned by production or operation of the examples. The novel features of the present teachings may be realized and attained by practice or use of various aspects of the methodologies, instrumentalities and combinations set forth in the detailed examples discussed below.
DESCRIPTION OF DRAWINGS
[0007] FIG. 1 shows an exemplary system for TR-based wireless transmission, according to an embodiment of the present teaching;
[0008] FIG. 2 shows an example for mapping between a CSI logical space and a time- reversal (TR) space, according to an embodiment of the present teaching;
[0009] FIG. 3 shows exemplary RF reflections and scattering around human, according to an embodiment of the present teaching;
[0010] FIG. 4 shows an exemplary experiment setting for human identification with frequency domain CSI, according to an embodiment of the present teaching;
[0011] FIG. 5 shows exemplary locations of test subjects and devices for an experiment of human identification, according to an embodiment of the present teaching;
[0012] FIG. 6A shows an exemplary time-reversal resonance strength (TRRS) map without background subtraction, according to an embodiment of the present teaching;
[0013] FIG. 6B shows an exemplary TRRS map after background subtraction with a =
0.5, according to an embodiment of the present teaching;
[0014] FIG. 7A shows an evaluation on receiver operating characteristic (ROC) curves for background subtraction and transmitter-receiver (TX-RX) locations, with different selected backgrounds, according to an embodiment of the present teaching; [0015] FIG. 7B shows an evaluation on ROC curves for background subtraction and TX- RX locations, with different values of a for Location (Loc) 7, according to an embodiment of the present teaching;
[0016] FIG. 7C shows an evaluation on ROC curves for background subtraction and TX- RX locations, with different TX-RX locations, according to an embodiment of the present teaching;
[0017] FIG. 8 shows an exemplary ROC curve for identifying 1 1 individuals, according to an embodiment of the present teaching;
[0018] FIG. 9A shows an exemplary TRRS map on stationarity with no training database updating, according to an embodiment of the present teaching;
[0019] FIG. 9B shows an exemplary TRRS map on stationarity with training database updating, according to an embodiment of the present teaching;
[0020] FIG. 10 shows ROC curves for human identification with different obstructions, according to an embodiment of the present teaching;
[0021] FIG. 1 1A shows exemplary test poses during a study on human pose effects, according to an embodiment of the present teaching;
[0022] FIG. 1 IB shows ROC curves for human identification with different poses, according to an embodiment of the present teaching;
[0023] FIG. 12 shows an exemplary performance comparison of human identification with and without waveforming design, according to an embodiment of the present teaching;
[0024] FIG. 13 shows exemplary received signal strength indicator (RSSI) value variation of 1 1 individuals, according to an embodiment of the present teaching;
[0025] FIG. 14A shows an exemplary RSSI values tested in an empty room, according to an embodiment of the present teaching;
[0026] FIG. 14B shows an exemplary RSSI values tested with individuals present, according to an embodiment of the present teaching;
[0027] FIG. 15 shows exemplary RSSI values comparison on variations, according to an embodiment of the present teaching;
[0028] FIG. 16 illustrates an application for human identification, according to an embodiment of the present teaching;
[0029] FIG. 17A shows an exemplary diagram showing general implementation of the human identification, according to an embodiment of the present teaching; [0030] FIG. 17B shows another exemplary diagram showing general implementation of the human identification, according to an embodiment of the present teaching;
[0031] FIG. 18 is a flow chart showing a process of building database for human identification, according to an embodiment of the present teaching;
[0032] FIG. 19 is a flow chart showing a process of human identification, according to an embodiment of the present teaching;
[0033] FIG. 20 shows a table listing physical characteristics of test subjects in human identification experiment, according to an embodiment of the present teaching;
[0034] FIG. 21A shows a performance matrix of individual identification without background subtraction, according to an embodiment of the present teaching;
[0035] FIG. 2 IB shows a performance matrix of individual identification after background subtraction with a=0.5, according to an embodiment of the present teaching;
[0036] FIG. 22 shows a performance matrix for a study of stationarity, according to an embodiment of the present teaching;
[0037] FIG. 23 shows a table listing six classes of variation, according to an embodiment of the present teaching;
[0038] FIG. 24 shows a table listing identification rates under variations, according to an embodiment of the present teaching; and
[0039] FIG. 25 shows an exemplary confusion matrix under an RSSI-based approach, according to an embodiment of the present teaching.
DETAILED DESCRIPTION
[0040] In the following detailed description, numerous specific details are set forth by way of examples in order to provide a thorough understanding of the relevant teachings. However, it should be apparent to those skilled in the art that the present teachings may be practiced without such details. In other instances, well known methods, procedures, components, and/or circuitry have been described at a relatively high-level, without detail, in order to avoid unnecessarily obscuring aspects of the present teachings.
[0041] The present disclosure generally relates to systems, methods, medium, devices, servers, and other implementations directed to object identification based on object's radio biometric information, e.g. human identification based on human radio biometric information, in an environment without line-of-sight. The present teaching discloses human radio biometrics and presents a human identification system that can discriminate individuals even through walls in a non-line-of-sight environment. Using commodity Wi-Fi devices, the disclosed system can capture the channel state information (CSI) and extract human radio biometric information from Wi-Fi signals using time-reversal (TR) technique. By leveraging a fact that broadband wireless CSI has a significant number of multipaths, which can be altered by human body interferences, the disclosed system can recognize individuals in the TR domain without line-of-sight radio. A prototype has been built for a TR human identification system using standard Wi-Fi chipsets with 3 x 3 MIMO transmission. The performance of the built system is evaluated and validated through multiple experiments. In general, the TR human identification system can achieve an accuracy of 98.78% for identifying about a dozen of individuals using a single pair of transmitter and receiver. Thanks to the ubiquitousness of Wi- Fi, the disclosed system can provide low-cost low-complexity reliable human identification applications based on radio biometrics.
[0042] In the present teaching, a novel concept of radio biometrics is disclosed, and accurate human identifications and verifications can be implemented with commercial Wi-Fi devices in a through-the-wall setting. The disclosed human identification system in the present teaching can distinguish and identify different individuals accurately with commercial MIMO Wi-Fi devices of a 40 MHz transmission bandwidth. The disclosed system can support simple and efficient algorithms to achieve a high-accuracy performance.
[0043] To achieve the goal of human identification, one can utilize the TR technique to capture the differences between human radio biometrics and to reduce the dimension of features. In an indoor environment, there exists a large amount of reflectors and scatterers. When a wireless signal emitted from the transmitter encounters them, it will travel along different propagation paths with different distances and suffer different fading effects.
Consequently, the received signal at the receiver is a combination of copies of the same transmitted signal through different paths and delays. This phenomenon is called multipath propagation. TR technique takes advantage of the multipath propagation to produce a spatial- temporal resonance effect.
[0044] The present teaching discloses a TR human identification system that can distinguish and identify individuals by human radio biometrics extracted from the Wi-Fi CSI through the TR technique. By leveraging the TR technique to extract radio biometrics, a low- complexity human identification system can be widely implemented without restrictions on the device deployment thanks to the ubiquitousness of Wi-Fi. This new system can motivate a novel human identification technique relying on wireless sensing with Wi-Fi signals.
[0045] In one example, an apparatus for human identification is disclosed. The apparatus comprises a receiver and a processor. The receiver is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified. The processor is configured for: extracting channel state information (CSI) from the at least one wireless signal, obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person, and determining an identity of the person based on the radio biometric information.
[0046] Determining the identity of the person may comprise retrieving each stored radio biometric information together with its associated identity from the database; calculating a degree of similarity between the radio biometric information and each stored radio biometric information; determining a highest degree of similarity among the degrees of similarity between the radio biometric information and all of the stored radio biometric information; determining a corresponding identity associated with the stored radio biometric information that gives the highest degree of similarity; and determining the identity of the person based on the highest degree of similarity and the corresponding identity. In another example, determining the identity of the person may comprise comparing the highest degree of similarity with a confidence threshold; determining the identity of the person to be the corresponding identity when the highest degree of similarity is greater than the confidence threshold; and determining that the identity of the person is unknown when the highest degree of similarity is not greater than the confidence threshold. The degree of similarity is calculated based on at least one of: a time-reversal resonance strength (TRRS), a cross-correlation, an inner product of two vectors, a similarity score, a distance score, a phase correction, a timing correction, a timing compensation, and a phase offset compensation, of the radio biometric information and each stored radio biometric information.
[0047] In one embodiment, obtaining radio biometric information based on each CSI comprises: compensating a phase distortion in the CSI; obtaining common human radio biometric information and static environment information; and subtracting the common human radio biometric information and the static environment information from the compensated CSI to obtain the radio biometric information. In one embodiment, the person to be identified is not within a line-of-sight of the receiver, such that no light can directly pass through a straight path between the person and the receiver. In one embodiment, the at least one wireless signal is received through a network that is at least one of: Internet, an Internet-protocol network, and another multiple access network; and the receiver is associated with a physical layer of at least one of: a wireless PAN, IEEE 802.15.1 (Bluetooth), a wireless LAN, IEEE 802.1 1 (Wi-Fi), a wireless MAN, IEEE 802.16 (WiMax), WiBro, HiperMAN, mobile WAN, GSM, GPRS, EDGE, HSCSD, iDEN, D-AMPS, IS-95, PDC, CSD, PHS, WiDEN, CDMA2000, UMTS, 3GSM, CDMA, TDMA, FDMA, W-CDMA, HSDPA, W-CDMA, FOMA, lxEV-DO, IS-856, TD-SCDMA, GAN, UMA, HSUPA, LTE, 2.5G, 3G, 3.5G, 3.9G, 4G, 5G, 6G, 7G and beyond, another wireless system and another mobile system.
[0048] In another embodiment, obtaining radio biometric information based on each
CSI comprises: estimating a multipath profile based on the CSI extracted from each of the plurality of wireless signals; and mapping different multipath profiles into a space based on a design of waveforms in a manner such that a similarity between different multipath profiles is minimized and a distance between different multipath profiles in the space is maximized. In yet another embodiment, obtaining radio biometric information based on each CSI further comprises: designing waveforms for CSI obtained in at least one of time domain and frequency domain; converting a problem of similarity minimization between different multipath profiles into a dual problem with a simple solution; and obtaining radio biometric information based on the different multipath profiles after the similarity of the different multipath profiles is minimized.
[0049] FIG. 1 shows an exemplary system for TR-based wireless communication, according to an embodiment of the present teaching. Suppose transceiver A gets an estimated multipath CSI, h(t), for the channel between A and B, the corresponding TR signature is obtained as g(t)=hA*(-t). As transceiver A transmits back g(t) over the air, a spatial-temporal resonance is produced at transceiver B. The TR spatial-temporal resonance is generated by fully collecting the energy of the multipath channel and concentrating into a particular location. In physics, spatial-temporal resonance, known as focusing effect, is a result of a resonance of electromagnetic (EM) field, in response to the environment. This resonance is sensitive to environment changes, which can be used for capturing differences in multipath CSI. The disclosed TR human identification system may utilize not only human's face, but also an entire physical characteristic profile of each individual.
[0050] The concept of TR spatial-temporal resonance has been established as theory and validated through experiments. The TR technique relies on two verified assumptions of channel reciprocity and channel stationarity. Channel reciprocity demonstrates a phenomenon that the CSI of both forward and backward links is highly correlated, whereas channel stationarity establishes that the CSI remains highly correlated during a certain period. A TR- based indoor localization approach implemented under a 125 MHz bandwidth can achieve a centimeter accuracy even with a single access point (AP) working in non-line-of-sight ( LOS) environments. A TR indoor locationing system on a Wi-Fi platform can utilize the location- specific fingerprints generated by concatenating the CSI with a total equivalent bandwidth of 1 GHz.
[0051] The present teaching presents a TR human identification system for identifying individuals through the walls, in absence of any LOS path, based on the human radio biometrics in Wi-Fi signals. This can verify an existence of human radio biometrics, which can be found embedding in the wireless CSI. Moreover, the present teaching discloses a human recognition system that extracts unique radio biometrics as features from the CSI for differentiating between people through the wall. As in this disclosure, "radio shot" may refer to a procedure to take and record human radio biometrics via Wi-Fi signals. The disclosed method for human identification may comprise two main parts: a refinement of human radio biometrics and the TR-based identification. The refinement is designed to remove the common CSI components coming from static objects in the environment and the similarity in the radio biometrics of all participants, and to extract the CSI components that contain distinctive human radio biometrics. In the TR-based identification part, the extracted human radio biometric information is mapped into the TR space and the similarity between different biometrics is quantified and evaluated using the time-reversal resonance strength (TRRS). The performance of the disclosed identification system can achieve a 98.78% identification rate when distinguishing between 1 1 individuals.
[0052] The present teaching introduces a concept of human radio biometrics, which accounts for the wireless signal attenuation and alteration brought by human. Through experiments, its existence has been verified and its ability for human identification has been illustrated. In general, object radio biometrics may refer to the wireless signal attenuation and alteration brought by an object, and can be used for object identification. The procedure to collect human radio biometrics is named as radio shot. Because the dominant component in the
CSI comes from the static environment rather than human body, the human radio biometrics are embedded and buried in the multipath CSI. To boost the identification performance, the present teaching discloses novel algorithms for extracting individual human radio biometrics from the wireless channel information. Radio biometrics extracted from the raw CSI are complex-valued and high-dimensional. To address this problem, one can apply the TR technique to fuse and compress the human radio biometrics and to differentiate between radio biometrics of different people, by using the strength of the spatial-temporal resonances. For performance evaluation, a prototype has been built to implement the TR human identification system using off-the-shelf Wi-Fi chipsets, and test in an indoor office environment during normal working hours with an identification rate as 98.78% in identifying about a dozen of individuals.
[0053] The present teaching demonstrates a potential of using commercial Wi-Fi signals to capture human radio biometrics for individual identifications. The disclosed TR human identification system is capable of capturing human biometrics and identifying different individuals through the walls. The human radio biometrics that are embedded in the CSI contain the Wi-Fi reflections and scattering by human body in the indoor environment. As a result, the human radio biometrics, due to the differences in human biological metrics, are different among different individuals. In addition, by leveraging the TR technique, the disclosed system can easily extract the human radio biometrics from the CSI for distinguishing between individuals. This procedure is called radio shot.
[0054] FIG. 2 shows an example for mapping between a CSI logical space and a TR space, according to an embodiment of the present teaching. During the wireless transmission, signals encounter different objects in the environment, and the corresponding propagation path and characteristics change accordingly before arriving at the receiver. As demonstrated in FIG. 2, each dot in the CSI logical space may represent a snapshot of an indoor environment, e.g., an indoor location and an indoor event, which can be uniquely determined by the multipath profile h. By taking a time-reverse and conjugate operation over the multipath profile, the
corresponding TR signature g is generated. Consequently, each of the points in the CSI logical space as marked by "A", "B", and "C" can be mapped into the TR space as points "Α'", "Β'", and "C", respectively. In the TR space, a similarity between two profiles can be quantified by TRRS. A TRRS, as strength of the TR resonance, is a measurement of a similarity between two CSI samples. TRRS can be used as a matching score between any two vectors, where each vector represent CSI or any profile in a TR space. The higher the TRRS is, the more similar two profiles in the TR space are. Similar profiles constrained by a threshold on TRRS can be assigned into a single class. [0055] Taking advantage of the TR technique and the TR space, an indoor locationing system can achieve centimeter-level accuracy, where each of the indoor physical locations is mapped into a logical location in the TR space and can be easily separated and identified using TRRS. The TR based centimeter-level indoor locationing system can be implemented using commercial Wi-Fi chipsets. When leveraging the TR technique to capture the characteristics of multipath profile at different locations, two locations, even only with a distance of 1 to 2 centimeters, are far away in the TR space and can be easily distinguished by the disclosed system.
[0056] The wireless propagation around the human body may highly depend on the physical characteristic (e.g., height and mass), the total body water volume, the skin condition and other biological tissues. The human radio biometrics, recording the features in interactions between EM waves and human bodies, are unique among different individuals and can be mapped into separate points in the TR space. Hence, the disclosed system, by leveraging the TR technique, is capable of capturing the differences in the multipath profiles introduced by different individuals, even when they stand at the same location with the same posture under a through-the-wall setting.
[0057] A system prototype is built with one 3-antenna transmitter (TX) and one 3- antenna receiver (RX). The CSI samples are obtained from commodity Wi-Fi chips. The system is operated at carrier frequency 5.845 GHz with 40 MHz bandwidth. Due to the 3 x 3 MIMO transmission, each measurement comprises 9 pieces of the CSI for each transmitting- receiving antenna pair. Each CSI contains 1 14 complex values representing 1 14 accessible subcarriers in a 40 MHz band.
[0058] FIG. 3 shows exemplary RF reflections and scattering around human, according to an embodiment of the present teaching. As shown in FIG. 3, in an indoor wireless signal propagation environment, the human body acts as a reflector and the dots 302, 304, 306 represent the reflecting and scattering points due to the human body and other objects. Since the wireless signal reaches the receiving antenna from more than one path, the human radio biometrics are implicitly embedded in the multipath CSI profile. However, the human body may only introduce a few paths to the multipath CSI, and the energy of those paths is small due to low reflectivity and permittivity of human body compared with other static objects such as walls and furniture. As a result, the human radio biometrics, captured through radio shot, may be buried by other components in the CSI. [0059] Furthermore, because the raw CSI obtained from Wi-Fi chips is a 9 X 114 complex-valued matrix, the resulting raw radio biometrics are high-dimensional and complex valued, which further complicates the identification and classification problem and increases the computation complexity.
[0060] To address the above problems, the disclosed system can exploit the TR techniques and utilize several post-processing algorithms to extract the human radio biometrics and magnify the difference among individuals. Specifically, the system can use a background subtraction algorithm such that the common information in the CSI can be removed and the distinctive human radio biometrics are preserved. By leveraging the TR technique, the human radio biometrics in the form of complex-valued matrices can be related to the corresponding individual through a real -valued scalar, the TRRS.
[0061] The disclosed time reversal human identification system exploits the above idea and may comprise two main components: human radio biometrics refinement and TR-based identification.
[0062] The module of human radio biometrics refinement can extract the human biometric information from the raw CSI measurement which is a 9 X 114 complex- valued matrix. Due to the independency of each link, the background for each link may be calculated and compensated individually. An important consideration is that, for each CSI measurement, it may be corrupted by the sampling frequency offset (SFO) and the symbol timing offset (STO). Hence, before background calculation and compensation, the phase of each CSI measurement should be aligned first, for example, using methods disclosed in applications PCT/US2017/015909 and PCT/US2016/066015, which are incorporated herein by reference in their entireties. After alignment, based on the assumption that the human radio biometrics only contribute small changes in the multipath, the background can be obtained by taking an average of several CSI measurements.
[0063] Once the 9 X 114 complex-valued human radio biometric information is refined, the module of TR-based identification can simplify the identification problem by reducing the high-dimension complex-valued feature into a real-valued scalar. By leveraging the TR technique, the module can map human radio biometrics into the TR space and utilize the TRRS to quantify the differences between different radio biometrics.
[0064] The disclosed system can work when the wireless multipath comes from the environment where the EM signals undergo different reflecting and scattering paths and delays. The wireless propagation around the human body may highly depend on individual physical characteristics and conditions of biological tissues. Since it is rare for two individuals to have exactly the same biological physical characteristics, the multipath profiles after human interferences are therefore different among different persons. The human radio biometrics, which record how the wireless signal interacts with a human body, is altered accordingly to individuals' biological physical characteristics and can be viewed as unique among different individuals. Through Wi-Fi sounding, the wireless CSI is collected, as well as the human radio biometrics.
[0065] Mathematically, an indoor CSI (a.k.a. Channel frequency response, CFR) for the mth link with the presence of human body can be modeled as a sum of the common CSI component and the human affected component:
hfm) = h?1) + 6h1 (m), i = l,2, - , N, (1) where N is the number of individuals to be identified. h m') is a L x 1 complex-valued vector, which denotes the CSI when the ith individual is inside; L is the number of subcarriers, i.e., the length of the CSI; h.^ , defined as the static CSI component, is generated from the static environment in the absence of human; and 6h m') denotes the perturbation in the CSI introduced by the ith individual. Here, the 6h m') is the raw human radio biometric information of the ith individual embedding in the CSI of the mth link.
[0066] At the receiver side, after each channel state sounding, one can collect a L X M raw CSI matrix for each individu
Figure imgf000016_0001
with the corresponding human radio biometric information matrix being:
6H; = [δ^(1), δ^(2), ··· , δ^Μ)], νί, (3) where M is the number of links between the transmitter and the receiver.
[0067] For human identification and recognition, there are two major problems: first, both 6Hi and H; are L X M complex-valued matrices, such that without appropriate data processing, the classification problem based on the raw data is complex-valued and of high computation complexity; second, since is unknown, it is hard to extract the buried biometric information δΗ; directly from the CSI measurement Hj.
[0068] To tackle the first problem, one can incorporate the TR technique to reduce the data dimension by transforming the feature space into TR spatial-temporal resonance. For the second problem, data post-processing algorithms are disclosed to refine the human radio biometrics from the raw CSI information.
[0069] As discussed before, when transmitting back the TR signature through the corresponding multipath channel, a spatial-temporal resonance may be generated by fully collecting energy of the multipath channel into a particular location in a rich-scattering indoor environment. The spatial-temporal resonance can capture even minor changes in the multipath channel, and can be utilized to characterize the similarity between two multipath CSI realizations.
[0070] The strength of TR spatial-temporal resonance, i.e., the TRRS, in frequency domain can be defined as below.
[0071] Definition: The strength of TR spatial-temporal resonance TR' ( ].1, h2) in frequency domain between two CFRs hx and h2 is defined as:
max|∑k h1 [k]g2 [k]eik<l>|2
TJl(hi' h2) = Wi mna^^y (4)
Here, L is the length of CFR and g2 is the TR signature of h2 obtained as
g2 [k] = ¾ [k], k = 0,l, - , L - l. (5) Hence, the higher the value of
Figure imgf000017_0001
h2) is, the more similar hx and h2 are.
[0072] For two CSI measurements Hj and Hj in a MIMO transmission, one can obtain a
1 X M TRRS vector as
[TXQi*
Figure imgf000017_0002
... ,τχο™, hfM))].
Then, the TRRS between two CSI matrices Hj and Hj is defined as an average of the TRRSs on each of the links:
raCHi. Hj) =
Figure imgf000017_0003
rJ2(h[m , hfm ). (6)
[0073] After taking the radio shot, by means of the TR signal processing, the high- dimension complex-valued human radio biometrics embedded in the CSI measurements can be mapped into the TR space, and the feature dimension is reduced from L X M to 1. The human recognition problem can be implemented as a simple multi-class classification problem as below.
[0074] For any CSI measurement H, given a training database including the CSI samples of each individual Hj, Vi, the predicted individual identity (ID) is obtained based on the TRRS as: argmaxT^(H, Hi), if maxT^(H, Hi) > μ,
ϊ = 1 1 (7)
\0, otherwise,
where μ is a predefined threshold for triggering the identification, and ϊ = 0 denotes an unidentified individual.
[0075] However, as discussed above, the embedded human radio biometric information δΗ is small compared with other CSI components in measurement H. The resulting TRRS TJ£(H, Hj) may become quite similar among different samples to degrade the accuracy of identification. In order to improve the identification performance, one can remove the common components from each CSI measurement, and to extract and refine the embedded human biometrics features after taking the radio shot.
[0076] As the presence of human body can change the multipath propagation environment of Wi-Fi signals, the human radio biometrics are implicitly embedded in the CSI measurements. But because only a few paths are affected by the human body, the human biometrics CSI component for the ith individual in the mth link, 6h m'), is small in energy, compared with the common CSI component in equation (1). Without a refinement of the radio biometric information, the common feature in the CSI dominates in the TRRS in equations (4) and (6). Moreover, since there exists similarity between different human bodies, it is inevitable to have resemblances in the human radio biometric information 6h m') . As a result, even though the spatial -temporal resonance captures 6h m') , the difference between the TRRSs for different individuals may become too small to differentiate between people.
Accordingly, the present teaching discloses post-processing algorithms to extract the useful human radio biometric information from the CSI, after taking the radio shot. This process is called human radio biometrics refinement, which can include the following two main steps.
[0077] The first step is phase compensation. In reality, the estimated CSI can be corrupted by different initial phases of each measurement and different linear phases on each subcarrier due to the time synchronization error. Therefore, in order for the disclosed system to extract and subtract out correct background CSI components, it is indispensable to compensate for phase errors in all the raw CSI measurements.
[0078] The second step is background information subtraction. The CSI is modeled as the sum of static background CSI components and human biometrics CSI components. As such, the radio biometric information can be extracted by the system through subtracting out the common information in the CSI. [0079] While there are various methods, e.g. methods disclosed in applications
PCT/US2017/015909 and PCT/US2016/066015, to compensate the phase corruption, the following shows an exemplary algorithm called Phase Alignment Algorithm, for compensating the phase corruption.
[0080] Considering the phase errors, each CSI h^ can be mathematically modeled as:
h(m) [k] = | Η('η) Μ | βχρ{Η( φΗηβ3Γ -Ι- φίηί)},
k = 0,1, - , L - 1, J where φ11ΗΒ3Γ denotes the slope of the linear phase. φίηϊ is the initial phase, and both of them are different for each CSI.
[0081] Unfortunately, there is no way to explicitly estimate either
Figure imgf000019_0001
or Φίηί· To address the phase misalignment among the CSI measurements, for each identification task, one can pick one CSI measurement in the training database as the reference and align all the other CSI measurements based on this reference.
[0082] For example, one can use the linear phase difference δφ1ίηθ3Γ between the reference and the other CSI samples. For any given CSI h2 and reference hx from the same link, one can have
δφΐίηβ = argmaxl∑k hi fk^Mexp^}! . (9)
Φ
[0083] To align the linear phase of the CSI h2 according to the reference, one may simply compensate for this difference on each subcarrier through
h2 [k] = h2[k]exv{-)k8<$>Unear}, k = 0,l, - , L - l. (10)
[0084] Once upon all the linear phase differences of the CSI measurements have been compensated based on the reference, the next step is to cancel the initial phase of the CSI for each link, including the reference. The initial phase is obtained as the phase on the first subcarrier for each CSI h[0], and can be compensated as
haiign = hexp{-jzh[0]}. (11)
[0085] Both the background and the refined human biometric information may be extracted from the aligned CSI measurements hajign. To simplify notation, h instead of hajign will be used to denote the aligned CSI in the rest of the present teaching.
[0086] A Background Subtraction Algorithm can be used in the second step for background information subtraction. In general, there are typically two types of background subtraction: 1) direct subtraction, and 2) deconvolution. [0087] 1) Direct Subtraction: In this type of background subtraction, the first step is to estimate the background, a.k.a., common information in the collected CSI samples. Once the common information is obtained, the background subtraction is carried out through subtracting a scaled version of the common information from (phase-aligned) CSI samples. The scale factor is within the range of [0, 1]. Typically, we will choose a factor smaller than 1 to avoid emphasizing noise in the samples.
[0088] 2) Deconvolution: In real-world radio wave propagation, every object in the environment may alter the radio wave propagation path, which is often modeled as a convolution process where the channel without the object is functioning as a filter (h). Hence, the incident channel affected by the object is the output of the filter (h*g) while the input of the filter (g) is the characteristics of the object with respect to the radio wave. Hence, in order to extract the characteristic information of the object (g), with the knowledge of (g*h), one could find a filter corresponding to the static environment channel. In the deconvolution method, the first step may be to estimate the filter parameters and features of h. Once the channel filter is built, the deconvolution filter can be built through inverting the channel filter inv(h). Then, by passing the object-affected CSI (h*g) through the deconvolution filter inv(h), the
characteristics g can be extracted.
[0089] In the disclosed CSI model in equation (1), the radio biometrics 6h m') also involves two parts: the common radio biometric information and the distinct radio biometric information. Thus, h m'' can be further decomposed as following:
h(m) = h(m) + gh(m) + ^(rr y. ^ { n) where 6h[m) = 6hjJ° + 6hg). 6hjJ} denotes the common radio biometric information, which is determined by all the participants in the identification system. Meanwhile,
Figure imgf000020_0001
is the corresponding distinct radio biometric information, remaining in the extracted radio biometrics after taking out the common biometric information.
[0090] The background CSI components for several CSI measurements of N individuals can be estimated by taking the average over the aligned CSI as:
Figure imgf000020_0002
Then the human radio biometrics for each individual can be extracted through subtracting a scaled version of the background in equation (13) from the original CSI. C(m) (m) (m) z, Α
h = h - ah^', (14) where a is the the background subtraction factor, 0 < a < 1. It cannot be too close to 1 as the remaining CSI will be noise-like.
[0091] After obtaining the refined radio biometrics
Figure imgf000021_0001
for each link, the classification problem based on the TRRS in equation (7) becomes:
argmax T^(H, Hi), if max T:£(H, Hj) > μ,
ϊ = i i (15)
\0, otherwise,
where H; is the refined radio biometric information matrix for individual i and
Η^ ^ Η^ - , Η^ νί. (16) Hj is an approximation of the distinctive component in the human radio biometric information matrix 6Hj defined in equation (3).
[0092] An example is shown in FIG. 6A and FIG. 6B, where the TRRS ϋΚ , H;) before background subtraction is plotted in FIG. 6A while that of TJ£(H, Hj) is shown in FIG. 6B, with the background as the average of all CSI measurements in training database. The comparison between FIG. 6A and FIG. 6B demonstrates that the refinement of human radio biometrics helps to improve the sensitivity of TRRS for differentiating between individuals. The disclosed background subtraction algorithm suppresses the spatial-temporal resonance of the CSI between different classes while maintaining strong resonance within the same class.
[0093] For the disclosed system, if there are K subjects to be identified, the
computational complexities for building the training database and testing are both 0(M X (K + 1) X Nlog2 N), where M is the number of either the training CSI samples or the testing CSI samples for each subject. N is the search resolution for φ in equations (4) and (9), where typical values for N are 512 and 1024.
[0094] By leveraging the TR technique to capture human radio biometrics embedded in the CSI of Wi-Fi signals, the disclosed system is capable of identifying different individuals in real office environments with high accuracy. The performance of human identification has been evaluated. For the disclosed system, the training, i.e., taking the radio shot, may be simple and can be done in seconds.
[0095] Some exemplary evaluation experiments have been conducted in the office at a
10th floor of a commercial office building with a total of 16 floors. All the experiments were conducted during the normal working hours in weekdays, so that outside the experiment office there are many activities, such as human walking and elevator running, happening at the same time as the experiments run.
[0096] FIG. 5 shows exemplary locations of test subjects and devices for an experiment of human identification, according to an embodiment of the present teaching. In FIG. 5, the experiment configurations of the transmitter, receiver and individuals are demonstrated. Both Wi-Fi devices are placed on the cart or table with height from the ground being 2.8ft. When the transmitter (bot) was at location denoted as "TX 2" 502, the receiver (RX) was placed at the five locations denoted from "Loc 1 " to "Loc 5". When the bot was placed at location "TX 1 " 501 , the receiver was placed at five locations denoted from "Loc 6" to "Loc 10" respectively. These 10 TX-RX locations can represent Line-of-sight (LOS) scenario ("Loc 1 "), non LOS ( LOS) scenarios ("Loc 2" to "Loc 6"), and through-the-wall scenarios ("Loc 7" to "Loc 10"). When taking the radio shot, each individual, to be recognized, stands in the room on the point marked by the star when the door of that room was closed.
[0097] In the experiments, a training database was built with 50 CSI measurements for each class, while the size of the testing database for identification is 500 CSI measurements per class. In one embodiment, the 50 CSI measurements for each class can be averaged to get one representative CSI for the particular class and that representative can be stored in the database. For testing, one can measure CSI once and use that CSI to compare with the CSIs in the training database. One can also collect multiple CSIs during the testing phase, calculate multiple TRRSs between the multiple CSIs during the testing phase and a CSI representative of a particular class in the training database, and choose the highest TRRS as the TRRS of the particular class, then choose the highest one among the TRRS values of all classes.
[0098] The physical characteristics of test subjects are listed in FIG. 20. The first five test subjects in FIG. 20 participated in experiments in Section A and Section B below, while all the 1 1 test subjects participated in the identification experiment in Section C below. The test subject #2 was the individual subject in the verification experiments in Section D below.
[0099] A. Impact of Background Subtraction
[00100] The experiments in this section aimed to quantitatively study the impact of the disclosed background subtraction and biometrics refinement algorithms on human recognition.
FIG. 6A shows an exemplary time-reversal resonance strength (TRRS) map without background subtraction, according to an embodiment of the present teaching, while FIG. 6B shows an exemplary TRRS map after background subtraction with a = 0.5, according to an embodiment of the present teaching. As shown in FIG. 6A and FIG. 6B, after refinement the spatial-temporal resonance between the training and the testing CSI from different classes is suppressed a lot while maintaining a high TRRS for the CSI from the same class.
[00101] In Tables shown in FIG. 21A and FIG. 21B, the performance matrices for human identification are listed to show the performance improvement after refining the radio biometrics. FIG. 21 A shows a performance matrix of individual identification without background subtraction, according to an embodiment of the present teaching. FIG. 2 IB shows a performance matrix of individual identification after background subtraction with a=0.5, according to an embodiment of the present teaching. Each element of the performance matrix is the probability for that the TRRS between the training and the testing classes is higher than the threshold μ. A higher value in the diagonal means a larger chance of correct identifications. However, larger off-diagonal elements indicate higher false alarm rates because it implies that the testing sample may be misclassified to the wrong training class with a higher probability if the testing class has never been included in the training set.
[00102] Both of the matrices in FIG. 21A and FIG. 21B have the same threshold μ = 0.9 as defined in equations (7) and (15). Without background subtraction, although the diagonal value can reach 100%, the off-diagonal ones can be as high as 99.99% as shown in FIG. 21A. A high off-diagonal value implies a larger chance to have a false alarm between these particular training and testing classes. Nevertheless, after background subtraction, when using the refined radio biometrics for identification, the largest off-diagonal value drops to 0.24% while maintaining the diagonal elements higher than 96.35%.
[00103] How to choose the background CSI components is essential for a good radio biometrics refinement. The performance of identification has been studied under three schemes: no background subtraction, subtraction with the static environment background (e.g., the CSI collected in a room with no human), and subtraction with the background consisting of static environment and common radio biometrics.
[00104] FIG. 7A shows an evaluation on receiver operating characteristic (ROC) curves for background subtraction and transmitter-receiver (TX-RX) locations, with different selected backgrounds, according to an embodiment of the present teaching. The ROC curves, which are obtained by averaging the ROC performance measured at all 10 TX-RX locations, show how the identification rate and false alarm rate vary as the decision threshold μ changes. The dashed line denotes the performance when using all the CSI measurements in training data set as the background (i.e., the background including static environment and common radio biometrics), while the solid line and dotted line represent the case of no background subtraction and subtraction with the static environment background, respectively. Here, the background subtraction factor is a = 0.5. The performance of the system using all the training CSI measurements outperforms the others. The reason is that, by taking the average of the CSI samples from all the classes as the background, the system can effectively eliminate the high correlated and similar component, that is the estimation of + as defined in equation
(12), in radio biometrics for different individuals, and thus enlarge the difference between the radio biometrics of different people.
[00105] After determining the optimal background, the next step is to find the optimal background subtraction factor a. FIG. 7B shows an evaluation on ROC curves for background subtraction and TX-RX locations, with different values of a for Loc 7, according to an embodiment of the present teaching. In FIG. 7B, the ROC performance is plotted to evaluate the impact of different a. When a— 0.9, the identification performance is the worst because the remaining CSI components after background subtraction is noisy and has few information for human biometrics. The experiment shows that a— 0.5 is optimal for individual identification. The rest experiments discussed in the present teaching will adopt a— 0.5 and the all-CSI background scheme.
[00106] B. Impact of TX-RX Locations
[00107] The impacts of TX-RX configurations on the performance of human identification are evaluated. "Loc 1 " represents LOS scenario where the transmitter, receiver and an experiment individual are in the same room. "Loc 2" to "Loc 6" represent the NLOS case where either one of the transmitter or the receiver is in the same room with the individual, while the other device is placed outside. Moreover, in the through-the-wall scenarios, represented by "Loc 7" to "Loc 10", the individual to be identified is in the room while both the transmitter and the receiver are outside the room and in different locations.
[00108] FIG. 7C shows an evaluation on ROC curves for background subtraction and
TX-RX locations, with different TX-RX locations, according to an embodiment of the present teaching. The identification performance of different scenarios is plotted in FIG. 7C. The performance comparison can be summarized from the best to the worst as: Loc 7 > Loc 2 > Loc 3 > Loc 10 > Loc 1 >Loc 5 > Loc 9 > Loc 4 > Loc 8 > Loc 6. There is no direct relation between identification performance and the distance between the transmitter and the receiver. Moreover, the LOS scenario is not the best configuration for human identification. As discussed before, the human radio biometrics are embedded in the multipath CSI. Due to the independency of each path in the multipath CSI, the more paths the CSI contains, the larger number of degrees of freedom it can provide in the embedded human radio biometrics.
Consequently, because there are fewer multipath components in the CSI of the LOS scenario, less informative radio biometrics are extracted, which degrades the performance of
identification. The results in FIG. 7C also demonstrate the capability of the disclosed system for through-the-wall human identification, in that no matter which configuration is selected the disclosed system has a high accuracy.
[00109] C. Human Identification
[00110] From the above analysis, one can observe that the performance of the disclosed human identification system is influenced by both the background subtraction and the TX-RX configurations. In this section, the performance is evaluated in a TX-RX configuration with large data set of 1 1 individuals, with optimal background subtraction applied and at an exemplary location, e.g. "Loc 7". The corresponding ROC curve is plotted in FIG. 8. With a threshold μ being 0.91 , the average identification rate is 98.78% and the average false alarm rate is 9.75%. This is because when two individuals have similar body contour, the possibility of misclassifying between them increases. However, since not only the contour but also the permittivity and conductivity of body tissue, which is more distinct for different individuals, will affect the Wi-Fi signal propagation that encounters the human body, the accuracy of identification is still high.
[00111] D. Individual Verification
[00112] In this set of experiments, the performance of individual verification is studied using disclosed system. Instead of finding the correct identity among several possible ones, the individual verification is to recognize a specific individual with variations in both the human body and the environment.
[00113] The stationarity of human verification performance is discussed below. The CSI measurements are collected for both the empty room and with one individual inside twice a day for three consecutive days. The TRRS maps are demonstrated in FIG. 9A and FIG. 9B. FIG. 9A shows an exemplary TRRS map on stationarity with no training database updating, according to an embodiment of the present teaching. As shown in FIG. 9A, when only using the CSI from the first measurement as the training set, the TRRS within the same class gradually decreases. This leads to a 90.83% identification rate with the threshold μ = 0.75. However, if the training set is updated every time after measurement and identification, e.g. during the experiment on Day 2 morning, the training set includes the CSI from measurements on Day 1 morning and Day 1 afternoon, the identification rate can increase to 97.35%. FIG. 9B shows an exemplary TRRS map on stationarity with training database updating, according to an embodiment of the present teaching. Detail of the verification accuracy is listed in FIG. 22, which shows a performance matrix for a study of stationarity, according to an embodiment of the present teaching. Hence, to combat the variations over time, the training data set for both identification and verification should be updated regularly.
[00114] In another experiment, the impact of other types of variations such as wearing a coat, carrying a backpack/laptop on the accuracy of verification is evaluated. Six classes as listed in FIG. 23 are considered in the experiment. The detailed verification performance is shown in FIG. 24 where the relation of the threshold μ and the capability of differentiating between different variations are studied. Here, the training set contains the CSI from class #1. A low threshold μ may reduce the sensitivity of the disclosed system in verification. When the threshold μ increases, the system can distinguish between radio biometrics collected when a person is wearing nothing and radio biometrics collected when the person is wearing a coat and a backpack, i.e. distinguish between class #1 and class #3. As shown in FIG. 24, the result shows a 0 probability for class #3 to be misclassified as class #1. In case for the backpack with or without laptop inside, as they are shadowed by the human body, the introduced variations have relatively small impact on the accuracy of verification.
[00115] Impacts of obstructions and test subject's postures
[00116] Through the above experiments, the capability of the disclosed TR human identification system for identifying and verifying individuals through-the-wall has been proved. The performance of the disclosed system is further studied by comparing it with a RSSI-based identification system.
[00117] Experiments are conducted to evaluate and compare the identification accuracy when there is an obstruction in front of and in the same room with the test subject. FIG. 10 shows ROC curves for human identification with different obstructions, according to an embodiment of the present teaching. With a similar level of false alarm, the average identification rate for the no-obstruction scenario is 97.57% and the corresponding average false alarm rate is 9.85%. When there is a table in front of the subject against to the wall, the average identification rate can increase to 99.53% while the average false alarm rate is 8.82%. When a big chair is put in front of the test subject with a very short distance, the system has an average identification rate of 97.44% and an average false alarm rate of 8.43%. When there is an obstruction between the test subject and the transceiver, because of the reflections and penetrations, more copies of the transmitted signal are created, along with more multipath components. If the obstruction does not attenuate the signal much, most of the signals radiated from the obstruction will eventually encounter the test subject. Then more radio biometric information can be captured through the multipath propagation, which can help the
identification performance. However, if the obstruction is thick in size and has a large vertical surface which attenuates and blocks most of the incoming signals, there will be fewer multipath components passing through the human body. As a result, less informative radio biometrics are obtained, compared with the no-obstruction case. Furthermore, as demonstrated in this experiment, the existence of furniture as the obstruction does not affect the system much.
[00118] However, the multipath profile changes when the obstruction changes, especially when an obstruction locates between the transmitter and the receiver link and in front of the test subject. The TR technique may be used to capture the difference in multipath profile, and to capture the difference introduced by obstruction changes in the meantime.
Hence, if an individual is behind a large desk during the training phase and later stands behind a small desk for the testing, the disclosed system will notice this change in multipath profiles, leading to a mismatch in the training database.
[00119] Experiments have been conducted to evaluate the effects introduced by human poses. Under a same setting as the experiment in FIG. 10, four participants were asked to stand at the same location and perform 5 different poses by lifting their arms with different degrees and directions, as shown in FIG. 1 1A. The corresponding ROC curves are shown in FIG. 1 IB. In the experiment, 50 samples were selected for each subject under Pose 1 as a training set. When the testing samples come from the same pose, the identification rate reaches 97.67% with a false alarm rate being 5.58%. However, as the participants change their poses from Pose 2 to Pose 5, the identification rate drops from 95.66% to 88.06%, 58.83% and 79.29% with a false alarm rate around 5.6%. The experimental results validate that pose changes may degrade the system performance. The system is robust to slight changes in posture, e.g., from Pose 1 to Pose 2. However, as shown by the ROC curve of testing over Pose 4 data with the Pose 1 training in FIG. 1 IB, when the pose alters the propagation environment a lot, the disclosed TR human identification system may fail to find a match in the training database. At Pose 4, the test subject is asked to lift the left arm with 90 degree and the direction being perpendicular to the link between the transmitter and the receiver. On the other hand, at Pose 5, test subjects lift the arm at the same height but the arm is parallel to the TX-RX link.
Comparing the result of testing over Pose 5 with that over Pose 4, it is noticed that the identification accuracy drops more if the pose changes the silhouettes in a manner that is perpendicular to the TX-RX link.
[00120] Hence, when poses or standing locations change, the multipath profiles in the
TR space for a test subjects might fall out of "proximity" (range of a high similarity) of himself or herself, which results in a reduce in the identification rate. Moreover, a worse situation is that the changed multipath profiles fall into the "proximity" of other test subjects which can lead to an increase in the false alarm rate.
[00121] Using standard Wi-Fi chipsets, one can obtain 7 x 1 RSS vectors besides the
CSI in each measurement. The RSS vector contains 6 RSS values for 3 receiving antenna in each 20 MHz band and 1 overall RSS value. Here, one can treat each real-valued 7 x 1 vector as the feature and apply the k nearest neighbors (k ) classifiers to the measurements.
[00122] The identification accuracy of the RSSI-based approach is tested on the dataset of 1 1 individuals. FIG. 13 shows exemplary TRRS value variation of 1 1 individuals, according to an embodiment of the present teaching. From the results in FIG. 13, the RSSI difference between different individuals is small. The false alarm rate is 68.07% and the identification rate is 31.93%, which is far inferior to the disclosed identification system.
[00123] FIG. 14A shows an exemplary TRRS values tested in an empty room, according to an embodiment of the present teaching. FIG. 14B shows an exemplary TRRS values tested with individuals present, according to an embodiment of the present teaching. As shown in FIG. 14, the stationarity is evaluated and from the plot it is obvious that the RSS value is not stable over time. Without training database update, the identification rate for the individual is 89.67% with a 10.33% possibility that the individual is misclassified as an empty room. Even with the training database update, the identification rate does not improve due to the instability of the RSS values over time.
[00124] Furthermore, in terms of verifying individual with small variations as listed in the table in FIG. 23, the RSSI-based approach can hardly differentiate between different variations by only using the 7 X 1 RSS vector as shown in FIG. 15 and in the confusion matrix of individual verification in FIG. 25. The reason for its insensitivity to small variations is the same as that for its incapability in human identification. The 7 x 1 RSS vector feature only captures little human radio biometric information and loses the individual discrimination.
[00125] Hence, even though the RSSI-based approach is robust to the small variations on human body, it may not be put into practice for human identification and verification.
Moreover, since RSSI is only a real-valued scaler which approximately represents the received signal power, it is less informative. It is susceptible to noise and has large intra-class variations which can degrade the identification accuracy a lot when the number of test subjects increases. Compared with the RSSI-based approach, the disclosed TR human identification system succeeds in capturing and extracting the human radio biometric information embedded in the CSI, and in distinguishing individuals with high accuracy through-the-wall.
[00126] The disclosed system can adopt a simple model for human radio biometrics embedded in the CSI as shown in equation (1). The obtained human radio biometrics 6h and the environment component h0 may be correlated. In other words, the human radio biometrics 6h may be location-dependent, which may cause the system to run in an environment consistent over time. One can develop algorithms to separate the human radio biometrics and the outside environment.
[00127] Performance of the disclosed system can be improved by deploying more transceiver pairs to capture fine-grained human radio biometrics from different directions simultaneously.
[00128] Techniques that can record other biological features may be utilized to provide more details in human biological characteristics, such as the muscle mass index and the body temperature. With more detailed information regarding individual biological features besides the common information like height, weight, gender and clothing, the disclosed system make better use of radio biometrics in human identification and verification.
[00129] The disclosed system may be implemented in the environments that remain stationary most of the time. For example, it can be implemented for identity verification at places like bank vaults to allow the entry of authorized staff. It can also be used in home security systems, functioning as wireless electronic keys in vacation houses. Moreover, the location embedded radio biometrics are helpful in applications where it is needed to tell both who the test subject is and where the test subject is. Once the environment-independent radio biometric information is extracted, the disclosed system can identify individuals without being notified by test subjects and implement in applications where there is no direct contact with test subjects or where there are obstructions in-between the sensor and the subject.
[00130] FIG. 16 illustrates an application for human identification, according to an embodiment of the present teaching. As shown in FIG. 16, during the phase of building database 1610, the system may request each individual to stand at a security checkpoint 1613 for recording his/her human radio biometric information , e.g. at the airport or other places with security check, and transmit a wireless signal through a multipath embedding radio biometrics of the individual. The wireless signal may be transmitted from a transmitter 1612 to a receiver 1614. The receiver 1614 can detect human radio biometric information of the person because the multipath through which the wireless signal was transmitted was impacted by the person and embedded his/her human radio biometric information in it. The receiver 1614 may send the recorded human radio biometric information of the person to the radio biometric database 1616, which can store all human radio biometric information each corresponding to a recorded individual.
[00131] Then during the phase of human identification 1620, the system may request each candidate individual to stand at the security checkpoint 1613 for measuring his/her human radio biometric information and transmit a wireless signal through a multipath embedding radio biometrics of the candidate individual. The wireless signal may be again transmitted from the transmitter 1612 to the receiver 1614. The receiver 1614 can detect human radio biometric information of the candidate person because the multipath through which the wireless signal was transmitted was impacted by the candidate person and embedded his/her human radio biometric information in it. The receiver 1614 may then send the detected human radio biometric information of the candidate person for a matching operation at 1622. At 1622, the system can retrieve stored human radio biometric information each corresponding to a recorded individual, and compare the detected human radio biometric information with the retrieved human radio biometric information to determine whether there is a match. As discussed above, human radio biometric information can be different enough for different individuals to distinguish between people. In addition, human radio biometric information can be consistent enough for a same individual to identify the individual. As such, in case the system finds a match at 1622, the system can determine the identity of the candidate person based on information of the corresponding recorded individual having the matching human radio biometric information, and may grant an access to the candidate individual according to various applications. On the other hand, if the system does not find a match at 1622, the system can deny access of the candidate individual according to various applications. In one embodiment, the system may record the human radio biometric information of the unmatched person for future use. In can be understood that similar applications of the system may be used. For example, when police is trying to catch a fleeing felon, the system may provide a warning, instead of access grant, to the police when there is a match of human radio biometric information between the measured candidate and the recorded felon.
[00132] FIG. 17A shows an exemplary diagram showing general implementation of the human identification in an exemplary disclosed system 1700, according to an embodiment of the present teaching. As shown in FIG. 17A, the exemplary disclosed system includes a receiver 1720, a CSI collector 1702, a radio biometric refiner 1704, a radio biometric extractor 1706, a radio biometric database 1707, a TRRS calculator 1708, an information fuser 1710, an identity determiner 1712. In one embodiment, as shown in FIG. 17A, the CSI collector 1702, the radio biometric refiner 1704, the radio biometric extractor 1706, the TRRS calculator 1708, the information fuser 1710, and the identity determiner 1712 may all be implemented on a processor 1730. FIG. 17B shows another exemplary diagram showing general implementation of the human identification in an exemplary disclosed system 1701 , according to an
embodiment of the present teaching. As shown in FIG. 17B, the receiver 1720 may be replaced by a plurality of receivers 1722 to make use of technology of multiple antennas. CSIs from multiple antennas, e.g. from the plurality of receivers, can be combined or fused using various methods such as those disclosed in PCT/US2017/015909 and PCT/US2016/066015. In addition, each of the disclosed systems 1700, 1701 may include a memory communicatively coupled with the processor 1730.
[00133] The receiver 1720 in this example may receive at least one wireless signal from a multipath channel that is impacted by a person. The person may be a person to be recorded during a phase of database building, or a person to be tested during a phase of human identification. The CSI collector 1702 in this example may be configured for collecting CSI from the wireless signal. The CSI collector 1702 may estimate the multipath profile based on the received at least one wireless signal. As discussed above, the multipath profile may include radio biometric information of the person. The CSI collector 1702 can send the multipath profile to the radio biometric refiner 1704 for radio biometric refining.
[00134] The radio biometric refiner 1704 in this example may receive the multipath profile from the radio biometric refiner 1704 and compensate the phase distortion in the estimated multipath profile. In this manner, the radio biometric refiner 1704 can collect the compensated multipath profile of the person and send the compensated multipath profile of the person to the radio biometric extractor 1706 for radio biometric extractor.
[00135] The radio biometric extractor 1706 in this example may receive the
compensated multipath profile of the person from the radio biometric refiner 1704 and obtain the background information. The radio biometric extractor 1706 may then extract the radio biometric information by subtracting the background information from the compensated multipath profile. During the phase of database building, the radio biometric extractor 1706 may store the refined radio biometrics of this person along with his/her identity in the radio biometric database 1707. During the phase of human identification, the radio biometric extractor 1706 may send the refined radio biometrics of this person to the TRRS calculator 1708 for TRRS calculation.
[00136] The TRRS calculator 1708 in this example may receive the test radio biometrics from the radio biometric extractor 1706 and retrieve stored radio biometrics from the radio biometric database 1707. Based on each pair of the test radio biometrics and a stored radio biometrics, the TRRS calculator 1708 can calculate the TRRS between the test radio biometrics and the stored radio biometrics. In one embodiment, the TRRS calculator 1708 may send the TRRS to the information fuser 1710 for information fusion.
[00137] The information fuser 1710 in this example may receive the calculated TRRS from the TRRS calculator 1708 and combine the TRRSs from all links to find the highest
TRRS between the test radio biometrics and a stored radio biometrics, and an identity corresponding to the stored radio biometrics. The information fuser 1710 may send the highest
TRRS and its corresponding identity to the identity determiner 1712 for identity determination.
[00138] The identity determiner 1712 in this example may receive the highest TRRS and its corresponding identity from the information fuser 1710, and compare highest TRRS with a confidence threshold. If the highest TRRS is larger than the confidence threshold, the identity determiner 1712 may output the corresponding identity as the identity of the tested person.
Otherwise, if the highest TRRS is not larger than the confidence threshold, the identity determiner 1712 may determine that the identity of the tested person is unknown.
[00139] FIG. 18 is a flow chart showing a process of building database for human identification, according to an embodiment of the present teaching. The process in FIG. 18 may be performed by the system shown in FIG. 17A and FIG. 17B. At 1802, at least one wireless signal is received from a multipath channel that is impacted by a person to be recorded. The multipath profile is estimated at 1804 based on the received at least one wireless signal. The phase distortion in the estimated multipath profile is compensated at 1806. The compensated multipath profile of the person is then collected at 1808. Background information is obtained at 1810. The radio biometric information is extracted at 1812, e.g. by subtracting the background information. At 1814, the refined radio biometrics of this person, along with his/her identity, may be stored in a database for future use of human identification.
[00140] FIG. 19 is a flow chart showing a process of human identification, according to an embodiment of the present teaching. The process in FIG. 18 may be performed by the system shown in FIG. 17A and FIG. 17B. At 1902, at least one wireless signal is received from a multipath channel that is impacted by a person to be tested. The multipath profile is estimated at 1904 based on the received at least one wireless signal. The phase distortion in the estimated multipath profile is compensated at 1906. The radio biometric information is extracted at 1908, e.g. by subtracting the background information.
[00141] The TRRS between the test radio biometrics and the radio biometrics in the database is calculated at 1910. TRRSs from all links are combined at 1912. The highest TRRS among all TRRSs between the test radio biometrics and all stored radio biometrics is found at 1914, together with a corresponding identity. At 1915, it is determined whether the highest TRRS is larger than a predetermined confidence threshold. If so, the process goes to 1916, where the corresponding identity is output as the identity of the tested person. Otherwise, the process goes to 1918, where it is determined that the identity of the tested person is unknown.
[00142] To implement various modules, units, and their functionalities described in the present disclosure, computer hardware platforms may be used as the hardware platform(s) for one or more of the elements described herein (e.g., the components of in the system described with respect to any of FIGs. 1-19). The hardware elements, operating systems and
programming languages of such computers are conventional in nature, and it is presumed that those skilled in the art are adequately familiar therewith to adapt those technologies to explore human identification based on human radio biometric information as described herein. A computer with user interface elements may be used to implement a personal computer (PC) or other type of work station or terminal device, although a computer may also act as a server if appropriately programmed. It is believed that those skilled in the art are familiar with the structure, programming and general operation of such computer equipment and as a result the drawings should be self-explanatory.
[00143] The disclosed system can be realized by a specialized system having a functional block diagram illustration of a hardware platform which includes user interface elements. The computer may be a general purpose computer or a special purpose computer. Both can be used to implement a specialized system for the present teaching. This computer may be used to implement any component of the techniques of human identification based on human radio biometric information, as described herein. For example, the system in FIG. 17A and FIG. 17B, etc., may be implemented on a computer, via its hardware, software program, firmware, or a combination thereof.
[00144] Hence, aspects of the methods of human identification based on human radio biometric information, as outlined above, may be embodied in programming. Program aspects of the technology may be thought of as "products" or "articles of manufacture" typically in the form of executable code and/or associated data that is carried on or embodied in a type of machine readable medium. Tangible non-transitory "storage" type media include any or all of the memory or other storage for the computers, processors or the like, or associated modules thereof, such as various semiconductor memories, tape drives, disk drives and the like, which may provide storage at any time for the software programming.
[00145] All or portions of the software may at times be communicated through a network such as the Internet or various other telecommunication networks. Such
communications, for example, may enable loading of the software from one computer or processor into another. Thus, another type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links.
The physical elements that carry such waves, such as wired or wireless links, optical links or the like, also may be considered as media bearing the software. As used herein, unless restricted to tangible "storage" media, terms such as computer or machine "readable medium" refer to any medium that participates in providing instructions to a processor for execution.
[00146] Hence, a machine-readable medium may take many forms, including but not limited to, a tangible storage medium, a carrier wave medium or physical transmission medium.
Non-volatile storage media include, for example, optical or magnetic disks, such as any of the storage devices in any computer(s) or the like, which may be used to implement the system or any of its components as shown in the drawings. Volatile storage media include dynamic memory, such as a main memory of such a computer platform. Tangible transmission media include coaxial cables; copper wire and fiber optics, including the wires that form a bus within a computer system. Carrier-wave transmission media may take the form of electric or electromagnetic signals, or acoustic or light waves such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media therefore include for example: a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD or DVD-ROM, any other optical medium, punch cards paper tape, any other physical storage medium with patterns of holes, a RAM, a PROM and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave transporting data or instructions, cables or links transporting such a carrier wave, or any other medium from which a computer may read programming code and/or data. Many of these forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to a physical processor for execution.
[00147] In some embodiments, as discussed above, the radio biometric information extracted from the CSI may be directly compared with other radio biometrics in the database with a similarity metric, e.g. TRRS. In other embodiments, however, the radio biometrics extracted from CSI between different humans can be quite similar. Then, one may develop a method or design applied to those CSI-produced radio biometrics to make them dissimilar, or farther away from each other. For example, waveforming design, as discussed below, can be used to further separate those radio biometrics of different individuals which are extracted from the CSI, and to make them more distinct during applications like human identification.
[00148] During waveforming design for TR recognition, the strength of the spatial- temporal resonance (TRRS) TR' ( ].1, g2) between two CSI samples hx and h2 in the time domain may be defined as a function between the CSI measurements hx and the waveforming vector g2 of h2 as:
rjz(hlf h2) = rjzT(hlf g2) = (17)
Figure imgf000035_0001
where "*" denotes the convolution, 1 is the tap index, L is the number of taps, and g is the waveformin vector of h . The basic TR waveforming vector gXR for h is defined as:
Figure imgf000035_0002
The waveforming vector g;, Vi, can be designed to suppress the inter-class TRRS ΊίΎ(\ ^ g;), while maintaining a lower bound on the intra-class TRRS ^2x(hj, gj), for every j as:
minimize max T^T(hj, gi)
gi.Vi
subject to ^T(hi, gi)≥ Yth, Vi, (19)
II gi ll2 = 1, i. Here, g; is the waveforming vector for the i class of the multipath profiles hj. The purpose is to exaggerate the difference between different CSI samples.
[00150] Suppose all the CSI vectors are normalized, by substituting (17) into (19), one can obtain:
minimize v
gi.Vi
subject to maxmax|(hi * g rkll2 < v Vi,
vj≠i k ' b yL (20) max|(hi * g;)[k]|2 > yth, Vi,
k
II gi ll2= 1, i.
[00151] The problem in (20) is a joint optimization problem which is complicated and of a high dimension. One can decouple the problem into a bunch of optimization problems for each class i by introducing slack variable with details shown below.
minimize γ;
i
subjectto max|(hj * g;)[k]|2 < γ;, Vj≠ i,
max I (hi * g;)[k]|2 > yth,
k
II gi ll2= 1-
[00152] Then the optimum for problem in (20) can be found through γ* = max Vj.
i
[00153] In order to further simplify the problem and find an efficient algorithm to solve it, one can apply several relaxations to (21) and convert (21) to a SDP problem. One can bound the TRRS from bottom as:
maxKhi*gi)[k]|2≥ |(hi*gi)[L]|2
k
= I < T(hifL),gi > I2 = (T(hi,L))Tgig conj(T(hi,D). (22) Here, the superscript T denotes the transpose operator; the function conj(-) performs the elementwise conjugate for a vector. The function Τ(·,·): CLXMU {0}→ CL is the time- reversal function defined as:
T(hi,m)[k] = hi[m-k]. (23)
[00154] Through this relaxation, the complex max operation can be addressed.
Moreover, one can further relax the problem by reducing the number of constraints as
max|(hj * gi)[k]|2 < γ;,
k '
= I <T(hj,k),gi > I2≤ Vi,k = 0,1,-,2L-1,
= (T(hj, k))TgigiIconj(T(hj, k))≤ Vi, k = 0,1, - ,2L - 1,
= (T(hj,k))TgigiIconj(T(hj,k))≤ vifk = L - M,L - M + 1,-,L + M. (24) The last inequality in (24) means that the original 2L constraints are reduced to 2M+1 constraints, which correspond to the central 2M+1 points in the sequence
(T(hj, k))Tgig conj(T(hj, k)), k = 0,1, · ·· ,2L— 1. Then compared with the problem in (21), the optimization problem is much simpler in that the feasible space is much smaller and the max operation has been taken out. The new problem can be expressed as:
minimize γ,
i
subject to (T(hj, m))Tgig conj(T(hj, m)) < y , m = L - M, · ·· , L + M, Vj≠ i,(25)
(T(hi, L))Tgig 1conj(T(hi, L))≥Yth,
II gi ll2= 1-
[00155] Last but not least, the SDP relaxation may be applied to the problem in (25) by replacing gig" with G; as:
minimize Vj
subject to (T(hj, m))TGiConj(T(hj, m)) < γ;, m = L— M, · ·· , L + M, Vj≠ i,
(T(hi, L))TGiconj(T(hi, L))≥Yth, (26) Gi > 0,
Trace(Gi) = 1.
[00156] The above optimization is a typical convex optimization problem and can be solved efficiently using a standard convex optimization solver. Moreover, it is noticed that the Slater's condition holds for the problem in (26), which implies that the strong duality holds.
Furthermore, the optimal variable G , Vi can be proven to have rank 1 , i.e., G\ = gjj gj *", Vi. Hence, the problem in (26) and the problem in (25) are equivalent in that they share the same optimal variables and y\. Considering the original optimization in (19), the problem in (26) yields a near optimal solution.
[00157] At the receiver side, after each channel state sounding, one can collect a L X M raw CSI matrix for each individual as:
Hi = [h«, h(2), - , h(M)], Vi, (27) where M is the number of links between the transmitter and the receiver and L is the number of available subcarriers in a channel frequency response (CFR). CFR is the CSI measured in frequency domain.
[00158] The strength of TR spatial-temporal resonance TR' ( ].1, h2) in frequency domain between two CSI samples hx and h2 may be defined as
max|∑k h1 [k]g2 [k]eik'l'|2
!Tftflii , h2) = r52F(hlf g2) = - (28) Here, L is the length of CSI vector, k is the subcarrier index, and g2 is the waveforming vector of h2. The well-known TR waveforming vector for a CSI measurement h in frequency domain is as:
gTR[k] = h*[k],k = 0,l,-,L-l. (29)
[00159] The optimization problem in the frequency domain can be designed to suppress inter-class TRRS J£F(h gj), while maintaining a lower bound on intra-class TRRS
TJlF( , gj), for every j as:
minimize max ^F(hj,gi)
gi.Vi
subject to
Figure imgf000038_0001
> yth, Vi, (30)
II gi ll2= 1, Vi.
Here, g; is the waveforming vector for the ith class of multipath profiles hj.
[00160] Similarly the problem can be simply decomposed into a bunch of optimization problems for each class i by introducing slack variable γ; and written as below in (31 ) when CFRs are normalized.
minimize γ;
gi
subject to max max|∑k hj[k]gi[k]e'kl'5|2 < γ;
vj≠i Φ (31) max|∑k hi[k]gi[k]eik*|2Yth,
Φ
II gi ll2= 1-
[00161] Then the optimum for problem in (31) can be found through γ* = max Vj. To
i
solve the problem in (31) in a more efficient way, one can relax the problem in 2 steps.
[00162] First, one can relax the constrains in (31) by approximating
max maxjjl∑k [k]gj [k]ejkc|512 with |∑k hj[k]gi[k]|2, and replacing
Vj≠i ψ ' '
maxφ|∑k hi[k]gi[k]eikl|5|2 with a lower bound as |∑k hj[k]gi[k] |2. The new optimization problem can be shown as:
minimize γ;
i
subject to
Figure imgf000038_0002
II gi ll2= 1-
[00163] The lower bound comes from:
max|∑k hi[k]gi[k]eik*|2≥ |∑k hi[k]gi[k]|2. (33) Φ [00164] Through this step, the optimum yj* will be close to the optimum in (31).
Moreover, a SDP relaxation can be applied to (32) to address the non-convexity of the optimization as:
minimize V;
Gi
subject to
Figure imgf000039_0001
Gi > 0,
Trace(Gi) = 1,
where G; =
Figure imgf000039_0002
[00165] The problem in (34) is a convex optimization problem. Moreover, the Slater's condition holds, implying the strong duality. It can be proved that the optimal variable Gj* is of rank 1 in (34), indicating Gj* = g^gi"" . The problem in (34) is a near optimal case to the original problem in (31).
[00166] The computational complexity of solving SDP in frequency domain
optimization (34) is sensitive to the dimensions (number) of the variables, which may be extremely large in the frequency domain TR waveforming problem, since there are usually many subcarriers and the variable G; has a high dimension. The present teaching discloses an efficient solution by solving the dual problem of (34), by using the fact that the strong duality holds and Gj* = glgf . Details of the disclosed fast algorithms are discussed below.
[00167] The Lagrange function of the optimization problem in (34) is defined as
L(Gi, Vi, A, μ, ρ) = vj +∑j≠i Aj (hf GjConj (hj) - ν;) + λ^γ^ - hj GjConj Oij)) + μ(Τ οθ(^) -
1) - PYi, (35) where Aj > 0, Vi, μ, p > 0 are the Lagrange multipliers for the constraints in (34).
[00168] Then the dual function can be derived based on (35) as
g(A, p) = AiYth +
Figure imgf000039_0003
(36) where X = {G: Trace(G) = 1, G 0}. By applying strong duality and Gt * = g*gi°H , one can have:
g(A*, p*) = max §(λ, ρ), (37)
A,p>0
g(A, p) = AiYth + inf gH (∑j≠i Aj Conj (hj)hf - AiConj (hi)h?")g. (38)
=i
[00169] Then, the dual optimization problem becomes [00170]
Amin(∑j≠i
Figure imgf000040_0001
The computational complexity has been greatly reduced, which is linear to the number of CFR classes.
[00171] The performance of waveforming in different recognition tasks is evaluated with both the time domain wireless sensing system and the frequency domain wireless sensing system. The improvement of performance introduced by optimal waveforming is validated through experiments to identify different individuals through the wall. The experimental setting is shown in the floorplan in FIG. 4. In the experiment, there are 12 individuals to be recognized, the ytll is set to 0.9. The performance of identification is evaluated by means of ROC curves, as shown in FIG. 12. In FIG. 12, 'BG' stands for results when using the algorithm to extract and refme the human radio biometrics, 'TR' stands for results when using basic TR waveforming, 'WD' stands for results when using the waveforming design disclosed in the present teaching, 'BG+TR' stands for results when using basic TR waveforming and the algorithm to extract and refme the human radio biometrics, and 'BG+WD' stands for results when using the waveforming design disclosed in the present teaching and the algorithm to extract and refme the human radio biometrics. Among the strategies shown in FIG. 12, the best strategy is to apply both optimal waveforming and radio biometric refinement to the application of human identification. With the same false alarm rate, the detection rate can be increased by 9%, if using the disclosed waveforming algorithms as well as the radio biometrics refinement.
[00172] The disclosed system may be a radio shot system used in various applications.
In one embodiment, the disclosed system can be used as an intelligent electronic key system that requires no touch or connection to sensors and identifies and grants access to authorized users, e.g. entry control for commercial offices and homes. In another embodiment, the disclosed system can be used as an alternative for current electronic key system when users want sensors to be invisible or unreachable to test subjects for the sake of protecting sensors from intentional destroy. In another embodiment, the disclosed system can be used as an alternative for current electronic key system when users can not touch any sensors or keys for opening a door, for example for offices of disease control that requires free of contamination and only authorized entry. In yet another embodiment, the disclosed system can be used as an easy and efficient electronic key system for every home, offices and other places, compared with systems based on fingerprints, iris or retina scans, due to ubiquitousness of Wi-Fi routers in the current world. In another embodiment, the disclosed system can be used as an intelligent parent control system installed on TVs, desktops or other electronic entertainment devices that can identify parents or authorized users through radio shot.
[00173] Since human radio biometrics are affected by physical and biological features, an analytic model might be built which can infer basic physical characteristics like weight and height of a test subject according to the radio biometric captured during radio shot. Once the environment-independent radio biometric information is extracted from current radio biometrics captured by radio shot, a large database can be built to store radio biometrics of almost every individual in the world, to be used in the area of forensics, anthropology, statistics, etc., just like the DNA library. If more refined radio biometrics are available for further improving the identification accuracy, a radio shot system can be deployed as an identification tool for customs and security check at airports.
[00174] A user can use the CSI (e.g. in the user's office) as the user's signature for secure transaction. One big problem in secure transaction is the authentication of the user. Existing authentication methods may include password, fingerprint, smart card, iris, etc. The disclosed system can be used to capture the CSI when the user is in office and use the captured CSI to authenticate that the user is indeed in his/her office. It can be useful for commercial applications, when people always do certain things (e.g. conference calls) in a certain room. Since a basic idea of human radio biometrics is to distinguish tiny and subtle difference between different individuals, if there is subtle difference in an object, the device in the present teaching can also detect the difference. For example, one can use the device to detect defects in piping. The CSI statistics/feature may be obtained from channel probing when there is no defect. If there is a crack in a pipe, then some observable multipath patterns different from those without defects can be distinguished.
[00175] In biomedical applications, a receiver may be put in a location close to a patient.
If the patient swallows a Wi-Fi-enabled robotic pill (the Bot) which transmits Wi-Fi probing signal while going through the patient's body, the disclosed system can obtain some useful information of the patient's body. In another example, the disclosed system can be used for checking a person's respiratory. Because a person's nose has two nostrils, after inserting the
Bot into the right nostril and putting the origin in the left nostril, the Wi-Fi signal may go into the lung and come out. In this way, the disclosed system can help to scan the lung, while the set up can be easily done if a patient is put on oxygen. Similar operations can be done for scanning human ears.
[00176] Those skilled in the art will recognize that the present teachings are amenable to a variety of modifications and/or enhancements. For example, although the implementation of various components described above may be embodied in a hardware device, it may also be implemented as a software only solution— e.g., an installation on an existing server. In addition, the human identification based on human radio biometric information as disclosed herein may be implemented as a firmware, firmware/software combination, firmware/hardware combination, or a hardware/firmware/sof ware combination.
[00177] While the foregoing has described what are considered to constitute the present teachings and/or other examples, it is understood that various modifications may be made thereto and that the subject matter disclosed herein may be implemented in various forms and examples, and that the teachings may be applied in numerous applications, only some of which have been described herein. It is intended by the following claims to claim any and all applications, modifications and variations that fall within the true scope of the present teachings.

Claims

WE CLAIM:
1. An apparatus (1700) for human identification, comprising:
a receiver (1720) configured for receiving at least one wireless signal from a muitipath channel that is impacted by a person to be identified;
a processor (1730); and
a memory communicatively coupled with the processor, wherein the processor is configured for:
extracting channel state information (CSI) from the at least one wireless signal, obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person, and
determining an identity of the person based on the radio biometric information.
2. The apparatus of claim 1 , wherem:
the receiver is further configured for receiving a plurality of wireless signals from the muitipath channel, wherein each of the plurality of wireless signals was impacted by a different person with a known identity; and
the processor is further configured for:
extracting CSI from each of the plurality of wireless signals,
obtaining radio biometric information based on each CSI, wherein each radio biometric information represents how a corresponding wireless signal was impacted by at least part of a body of a different person with a corresponding known identity, and storing each radio biometric information in association with the corresponding known identity into a database.
3. The apparatus of claim 2, wherein determining the identity of the person comprises:
retrieving each stored radio biometric information together with its associated identity from the database;
calculating a degree of similarity between the radio biometric information and each stored radio biometric information;
determining a highest degree of similarity among the degrees of similarity between the radio biometric information and all of the stored radio biometric information; determining a corresponding identity associated with the stored radio biometric information that gives the highest degree of similarity; and
determining the identity of the person based on the highest degree of similarity and the corresponding identity.
The apparatus of claim 3 , wherein determining the identity of the person further comprises:
comparing the highest degree of similarity with a confidence threshold;
determining the identity of the person to be the corresponding identity when the highest degree of similarity is greater than the confidence threshold; and
determining that the identity of the person is unknown when the highest degree of similarity is not greater than the confidence threshold.
The apparatus of claim 3, wherein the degree of similarity is calcul ated based on at least one of: a time-reversal resonance strength (TRRS), a cross-correlation, an inner product of two vectors, a similarity score, a distance score, a phase correction, a timing correction, a timing compensation, and a phase offset compensation, of the radio biometric information and each stored radio biometric information.
The apparatus of claim 1 , wherein obtaining radio biometric information based on each CSI comprises:
compensating a phase distortion in the CSI;
obtaining common human radio biometric information and static environment information; and
subtracting the common human radio biometric information and the static environment information from the compensated CSI to obtain the radio biometric information.
The apparatus of claim 1 , wherein the person to be identified is not within a line-of-sight of the receiver, such that no light can directly pass through a straight path between the person and the receiver.
8. The apparatus of claim 1 , wherein;
the at least one wireless signal is received through a network that is at least one of: Internet, an Internet-protocol network, and another multiple access network: and
the receiver is associated with a physical layer of at least one of: a wireless PAN, IEEE 802.15.1 (Bluetooth), a wireless LAN, IEEE 802.1 1 (Wi-Fi), a wireless MAN, IEEE 802.16 (WiMax), WiBro, HiperMAN, mobile WAN, GSM, GPRS, EDGE, HSCSD, iDEN, D-AMPS, IS-95, PDC, CSD, PHS, WiDEN, CDMA2000, UMTS, 3GSM, CDMA, TDMA, FDMA, W-CDMA, HSDPA, W-CDMA, FOMA, lxEV-DO, IS-856, TD- SCDMA, GAN, UMA, HSUPA, LTE, 2.5G, 3G, 3.5G, 3.9G, 4G, 5G, 6G, 7G and beyond, another wireless system and another mobile system.
9. The apparatus of claim 2, wherein obtaining radio biorneiric information based on each CSI comprises:
estimating a multipath profile based on the CSI extracted from each of the plurality of wireless signals; and
mapping different multipath profiles into a space based on a design of waveforms in a manner such that a similarity between different multipath profiles is minimized and a distance between different multipath profiles in the space is maximized.
10. The apparatus of claim 9, wherein obtaining radio biorneiric information based on each CSI further comprises:
designing waveforms for CSI obtained in at least one of time domain and frequency domain;
converting a problem of similarity minimization between different multipath profiles into a dual problem with a simple solution; and
obtaining radio biometric information based on the different multipath profiles after the similarity of the different multipath profiles is minimized.
11. A method, implemented on a machine including at least a receiver, a processor and a
memory communicatively coupled with the processor for human identification, comprising:
receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified; extracting CSI from the at least one wireless signal:
obtaining radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person; and
determining an identity of the person based on the radio biometric information.
12. The method of claim 1 1 , further comprising:
receiving a plurality of wireless signals from the multipath channel, wherein each of the plurality of wireless signals was impacted by a different person with a known identity;
ex tracting CSI from each of the plurality of wireless signal s;
obtaining radio biometric information based on each CSI, wherein each radio biometric information represents how a corresponding wireless signal was impacted by at least part of a body of a different person with a corresponding known identity; and storing each radio biometric information in association with the corresponding known identity into a database.
13. The method of claim 12, wherein determining the identity of the person comprises:
retrieving each stored radio biometric information together with its associated identity from the database;
calculating a degree of similarity between the radio biometric information and each stored radio biometric information;
determining a highest degree of similarity among the degrees of similarity between the radio biometric information and all of the stored radio biometric information;
determining a corresponding identity associated with the stored radio biometric information that gives the highest degree of similarity; and
determining the identity of the person based on the highest degree of similarity and the corresponding identity.
14. The method of claim 13, wherein determining the identity of the person further
comprises:
comparing the highest degree of similarity with a confidence threshold; determining the identity of the person to be the corresponding identity when the highest degree of similarity is greater than the confidence threshold; and
determining that the identity of the person is unknown when the highest degree of similarity is not greater than the confidence threshold.
15. The method of claim 13, wherein the degree of similarity is calculated based on at least one of: a TRRS, a cross-correlation, an inner product of two vectors, a similarity score, a distance score, a phase correction, a timing correction, a timing compensation, and a phase offset compensation, of the radio biometric information and each stored radio biometric information.
16. The method of claim 1 1, wherein obtaining radio biometric information based on each CSI comprises:
compensating a phase distortion in the CSI;
obtaining common human radio biometric information and static environment information: and
subtracting the common human radio biometric information and the static environment information from the compensated CSI to obtain the radio biometric information.
17. The method of claim 1 1, wherein the person to be identified is not within a line-of-sight of the receiver, such that no light can directly pass through a straight path between the person and the receiver.
18. The method of claim 1 1, wherein:
the at least one wireless signal is received through a network that is at least one of: Internet, an Internet-protocol network, and another multiple access network; and
the receiver is associated with a physical layer of at least one of: a wireless PAN, IEEE 802.15.1 (Bluetooth), a wireless LAN, IEEE 802.1 1 (Wi-Fi), a wireless MAN, IEEE 802.16 (WiMax), WiBro, HiperMAN, mobile WAN, GSM, GPRS, EDGE, HSCSD, iDEN, D-AMPS, IS-95, PDC, CSD, PHS, WiDEN, CDMA2000, UMTS, 3GSM, CDMA, TDMA, FDMA, W-CDMA, HSDPA, W-CDMA, FOMA, lxEV-DO, IS-856, TD- SCDMA, GAN, UMA, HSUPA, LTE, 2.5G, 3G, 3.5G, 3.9G, 4G, 5G, 6G, 7G and beyond, another wireless system and another mobile system.
19. The method of claim 12, wherein obtaining radio biometric information based on each CSI comprises:
estimating a multipath profile based on the CSI extracted from each of the plurality of wireless signals; and
mapping different multipath profiles into a space based on a design of waveforms in a manner such that a similarity between different multipath profiles is minimized and a distance between different multipath profiles in the space is maximized.
20. The method of claim 19» wherein obtaining radio biometric information based on each CSI further comprises:
designing waveforms for CSI obtained in at least one of time domain and frequency domain;
converting a problem of similarity minimization between different multipath profiles into a dual problem with a simple solution; and
obtaining radio biometric information based on the different multipath profiles after the similarity of the different multipath profiles is minimized.
21. An apparatus ( 1701) for human identification, comprising:
a plurality of receivers (1722 ) each of which is configured for receiving at least one wireless signal from a multipath channel that is impacted by a person to be identified; a processor (1730); and
a memory communicatively coupled with the processor, wherein the processor is configured for:
extracting, regarding each of the plurality of receivers, CSI from the at least one wireless signal,
obtaining, from each of the plurality of receivers, radio biometric information based on the CSI, wherein the radio biometric information represents how the at least one wireless signal was impacted by at least part of a body of the person,
combining the radio biometric information obtained from the plurality of receivers to generate combined radio biometric information, and determining an identity of the person based on the combined radio biometric information.
PCT/US2017/021957 2008-09-23 2017-03-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information WO2017156487A1 (en)

Priority Applications (19)

Application Number Priority Date Filing Date Title
JP2018547884A JP6931790B2 (en) 2016-03-11 2017-03-10 Methods, devices, servers and systems for human identification based on human wireless biometric information
EP17764252.7A EP3426148B1 (en) 2016-03-11 2017-03-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information
US15/861,422 US11025475B2 (en) 2012-12-05 2018-01-03 Method, apparatus, server, and systems of time-reversal technology
US15/873,806 US10270642B2 (en) 2012-12-05 2018-01-17 Method, apparatus, and system for object tracking and navigation
US16/101,444 US10291460B2 (en) 2012-12-05 2018-08-11 Method, apparatus, and system for wireless motion monitoring
US16/125,748 US10833912B2 (en) 2012-12-05 2018-09-09 Methods, devices, servers, apparatus, and systems for wireless internet of things applications
US16/127,151 US11012285B2 (en) 2012-12-05 2018-09-10 Methods, apparatus, servers, and systems for vital signs detection and monitoring
US16/127,092 US10476730B2 (en) 2008-09-23 2018-09-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information
US16/200,616 US10495725B2 (en) 2012-12-05 2018-11-26 Method, apparatus, server and system for real-time vital sign detection and monitoring
US16/200,608 US10735298B2 (en) 2012-12-05 2018-11-26 Method, apparatus, server and system for vital sign detection and monitoring
US16/203,317 US10397039B2 (en) 2012-12-05 2018-11-28 Apparatus, systems and methods for fall-down detection based on a wireless signal
US16/203,299 US10374863B2 (en) 2012-12-05 2018-11-28 Apparatus, systems and methods for event recognition based on a wireless signal
US16/446,589 US10742475B2 (en) 2012-12-05 2019-06-19 Method, apparatus, and system for object tracking sensing using broadcasting
US16/667,757 US20200064444A1 (en) 2015-07-17 2019-10-29 Method, apparatus, and system for human identification based on human radio biometric information
US16/667,648 US11035940B2 (en) 2015-07-17 2019-10-29 Method, apparatus, and system for wireless proximity and presence monitoring
US16/790,627 US11397258B2 (en) 2015-07-17 2020-02-13 Method, apparatus, and system for outdoor target tracking
US16/790,610 US11928894B2 (en) 2012-09-18 2020-02-13 Method, apparatus, and system for wireless gait recognition
US17/539,058 US12066572B2 (en) 2015-07-17 2021-11-30 Method, apparatus, and system for human identification based on human radio biometric information
US17/838,231 US20220303167A1 (en) 2012-12-05 2022-06-12 Method, apparatus, and system for identifying and qualifying devices for wireless sensing

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201662307172P 2016-03-11 2016-03-11
US62/307,172 2016-03-11
US201662334110P 2016-05-10 2016-05-10
US62/334,110 2016-05-10

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2017/027131 Continuation-In-Part WO2017180698A1 (en) 2008-09-23 2017-04-12 Methods, apparatus, servers, and systems for object tracking
US16/125,748 Continuation-In-Part US10833912B2 (en) 2012-09-18 2018-09-09 Methods, devices, servers, apparatus, and systems for wireless internet of things applications

Related Child Applications (8)

Application Number Title Priority Date Filing Date
US15/434,813 Continuation-In-Part US10129862B1 (en) 2008-09-23 2017-02-16 Methods, devices, apparatus, and systems for medium access control in wireless communication systems utilizing spatial focusing effect
PCT/US2017/021963 Continuation-In-Part WO2017156492A1 (en) 2008-09-23 2017-03-10 Methods, apparatus, servers, and systems for vital signs detection and monitoring
US15/861,422 Continuation-In-Part US11025475B2 (en) 2008-09-23 2018-01-03 Method, apparatus, server, and systems of time-reversal technology
US16/125,748 Continuation-In-Part US10833912B2 (en) 2012-09-18 2018-09-09 Methods, devices, servers, apparatus, and systems for wireless internet of things applications
US16/127,092 Continuation-In-Part US10476730B2 (en) 2008-09-23 2018-09-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information
US16/127,151 Continuation-In-Part US11012285B2 (en) 2012-09-18 2018-09-10 Methods, apparatus, servers, and systems for vital signs detection and monitoring
US16/200,616 Continuation-In-Part US10495725B2 (en) 2012-09-18 2018-11-26 Method, apparatus, server and system for real-time vital sign detection and monitoring
US16/200,608 Continuation-In-Part US10735298B2 (en) 2012-09-18 2018-11-26 Method, apparatus, server and system for vital sign detection and monitoring

Publications (1)

Publication Number Publication Date
WO2017156487A1 true WO2017156487A1 (en) 2017-09-14

Family

ID=59790853

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2017/021957 WO2017156487A1 (en) 2008-09-23 2017-03-10 Methods, apparatus, servers, and systems for human identification based on human radio biometric information

Country Status (3)

Country Link
EP (1) EP3426148B1 (en)
JP (1) JP6931790B2 (en)
WO (1) WO2017156487A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109041093A (en) * 2018-07-10 2018-12-18 深圳无线电检测技术研究院 A kind of fanaticism source power position combined estimation method and system
CN109341679A (en) * 2018-09-30 2019-02-15 华中科技大学 A kind of smart machine air navigation aid and navigation system
US10270642B2 (en) 2012-12-05 2019-04-23 Origin Wireless, Inc. Method, apparatus, and system for object tracking and navigation
US10291460B2 (en) 2012-12-05 2019-05-14 Origin Wireless, Inc. Method, apparatus, and system for wireless motion monitoring
CN109814096A (en) * 2017-11-21 2019-05-28 松下知识产权经营株式会社 Identification device and recognition methods
JP2019093104A (en) * 2017-11-21 2019-06-20 パナソニックIpマネジメント株式会社 Identification apparatus and identification method
US10374863B2 (en) 2012-12-05 2019-08-06 Origin Wireless, Inc. Apparatus, systems and methods for event recognition based on a wireless signal
US10447094B2 (en) 2016-05-03 2019-10-15 Origin Wireless, Inc. Method, system, and apparatus for wireless power transmission based on power waveforming
KR20200057406A (en) * 2018-11-16 2020-05-26 동아대학교 산학협력단 Monitoring method and apparatus simultaneously performing taget's state sensing and information obtaining
CN111596564A (en) * 2020-05-19 2020-08-28 哈尔滨工程大学 Smart home management system based on WiFi gesture recognition
FR3096476A1 (en) * 2019-06-26 2020-11-27 Orange Method of adjusting a playback device based on the position of a user
US11025475B2 (en) 2012-12-05 2021-06-01 Origin Wireless, Inc. Method, apparatus, server, and systems of time-reversal technology
CN113543140A (en) * 2020-04-16 2021-10-22 支付宝实验室(新加坡)有限公司 Identity recognition method and device based on wireless Wi-Fi signal and electronic equipment
CN113726457A (en) * 2021-07-28 2021-11-30 深圳市联洲国际技术有限公司 Human body action recognition method and device, storage medium and network equipment
CN113743374A (en) * 2021-10-11 2021-12-03 南京邮电大学 Personnel identity identification method based on channel state information respiration perception
CN115119055A (en) * 2021-03-23 2022-09-27 成都极米科技股份有限公司 Control method, control device, display equipment and storage medium
CN116074835A (en) * 2023-01-16 2023-05-05 上海物骐微电子有限公司 Gesture recognition method and device based on WiFi, electronic equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102719622B1 (en) * 2019-09-27 2024-10-21 삼성전자주식회사 Electronic device for identifying a external electronic device and method of operating the same
WO2023276945A1 (en) * 2021-06-29 2023-01-05 パナソニックIpマネジメント株式会社 Estimation device and estimation method

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040240712A1 (en) * 2003-04-04 2004-12-02 Lumidigm, Inc. Multispectral biometric sensor
US20080101658A1 (en) * 2005-12-22 2008-05-01 James Ahern Biometric authentication system
US20080252412A1 (en) * 2005-07-11 2008-10-16 Volvo Technology Corporation Method for Performing Driver Identity Verification
US20100001000A1 (en) * 2006-06-12 2010-01-07 Baughman Gary M Closure assembly having a spout with a memory band for spout directing
US20100152600A1 (en) * 2008-04-03 2010-06-17 Kai Sensors, Inc. Non-contact physiologic motion sensors and methods for use
US20110043515A1 (en) * 2007-04-09 2011-02-24 Sam Stathis System and method capable of navigating and/or mapping any multi-dimensional space
US20110221567A1 (en) * 2006-02-17 2011-09-15 Lehnert Thomas R Biometric identification and analysis
US20140316261A1 (en) 2013-04-18 2014-10-23 California Institute Of Technology Life Detecting Radars
US20150123766A1 (en) * 2013-11-01 2015-05-07 Jerry St. John Escalating biometric identification
US20160048672A1 (en) 2014-08-15 2016-02-18 California Institute Of Technology HERMA - Heartbeat Microwave Authentication
US20160048669A1 (en) * 2014-08-13 2016-02-18 Qualcomm Incorporated Access authorization based on synthetic biometric data and non-biometric data

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011519288A (en) * 2008-04-03 2011-07-07 カイ メディカル、 インコーポレイテッド Non-contact physiological motion sensor and method of use thereof
JP6688791B2 (en) * 2014-07-17 2020-04-28 オリジン ワイヤレス, インコーポレイテッドOrigin Wireless, Inc. Wireless positioning system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040240712A1 (en) * 2003-04-04 2004-12-02 Lumidigm, Inc. Multispectral biometric sensor
US20080252412A1 (en) * 2005-07-11 2008-10-16 Volvo Technology Corporation Method for Performing Driver Identity Verification
US20080101658A1 (en) * 2005-12-22 2008-05-01 James Ahern Biometric authentication system
US20110221567A1 (en) * 2006-02-17 2011-09-15 Lehnert Thomas R Biometric identification and analysis
US20100001000A1 (en) * 2006-06-12 2010-01-07 Baughman Gary M Closure assembly having a spout with a memory band for spout directing
US20110043515A1 (en) * 2007-04-09 2011-02-24 Sam Stathis System and method capable of navigating and/or mapping any multi-dimensional space
US20100152600A1 (en) * 2008-04-03 2010-06-17 Kai Sensors, Inc. Non-contact physiologic motion sensors and methods for use
US20140316261A1 (en) 2013-04-18 2014-10-23 California Institute Of Technology Life Detecting Radars
US20150123766A1 (en) * 2013-11-01 2015-05-07 Jerry St. John Escalating biometric identification
US20160048669A1 (en) * 2014-08-13 2016-02-18 Qualcomm Incorporated Access authorization based on synthetic biometric data and non-biometric data
US20160048672A1 (en) 2014-08-15 2016-02-18 California Institute Of Technology HERMA - Heartbeat Microwave Authentication

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
FADEL ADIB ET AL., CAPTURING THE HUMAN FIGURE THROUGH A WALL, 1 November 2015 (2015-11-01)
HEBA ABDELNASSER ET AL.: "UbiBreathe : A Ubiquitous non-Invasive WiFi-based Breathing Estimator", PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, MOBIHOC '15, 22 June 2015 (2015-06-22), pages 277 - 286, XP055614489, ISBN: 978-1-4503-3489-1, DOI: 10.1145/2746285.2755969
See also references of EP3426148A4

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10374863B2 (en) 2012-12-05 2019-08-06 Origin Wireless, Inc. Apparatus, systems and methods for event recognition based on a wireless signal
US11025475B2 (en) 2012-12-05 2021-06-01 Origin Wireless, Inc. Method, apparatus, server, and systems of time-reversal technology
US10270642B2 (en) 2012-12-05 2019-04-23 Origin Wireless, Inc. Method, apparatus, and system for object tracking and navigation
US10291460B2 (en) 2012-12-05 2019-05-14 Origin Wireless, Inc. Method, apparatus, and system for wireless motion monitoring
US10447094B2 (en) 2016-05-03 2019-10-15 Origin Wireless, Inc. Method, system, and apparatus for wireless power transmission based on power waveforming
JP7065404B2 (en) 2017-11-21 2022-05-12 パナソニックIpマネジメント株式会社 Identification device and identification method
US10880301B2 (en) 2017-11-21 2020-12-29 Panasonic Intellectual Property Management Co., Ltd. Identification device and identification method
EP3489851A1 (en) * 2017-11-21 2019-05-29 Panasonic Intellectual Property Management Co., Ltd. Identification device and identification method
CN109814096A (en) * 2017-11-21 2019-05-28 松下知识产权经营株式会社 Identification device and recognition methods
JP2019093104A (en) * 2017-11-21 2019-06-20 パナソニックIpマネジメント株式会社 Identification apparatus and identification method
CN109041093A (en) * 2018-07-10 2018-12-18 深圳无线电检测技术研究院 A kind of fanaticism source power position combined estimation method and system
CN109341679A (en) * 2018-09-30 2019-02-15 华中科技大学 A kind of smart machine air navigation aid and navigation system
KR102173588B1 (en) * 2018-11-16 2020-11-06 동아대학교 산학협력단 Monitoring method and apparatus simultaneously performing taget's state sensing and information obtaining
KR20200057406A (en) * 2018-11-16 2020-05-26 동아대학교 산학협력단 Monitoring method and apparatus simultaneously performing taget's state sensing and information obtaining
FR3096476A1 (en) * 2019-06-26 2020-11-27 Orange Method of adjusting a playback device based on the position of a user
CN113543140A (en) * 2020-04-16 2021-10-22 支付宝实验室(新加坡)有限公司 Identity recognition method and device based on wireless Wi-Fi signal and electronic equipment
CN111596564A (en) * 2020-05-19 2020-08-28 哈尔滨工程大学 Smart home management system based on WiFi gesture recognition
CN111596564B (en) * 2020-05-19 2022-08-02 哈尔滨工程大学 Smart home management system based on WiFi gesture recognition
CN115119055A (en) * 2021-03-23 2022-09-27 成都极米科技股份有限公司 Control method, control device, display equipment and storage medium
CN115119055B (en) * 2021-03-23 2023-06-27 极米科技股份有限公司 Control method, control device, display equipment and storage medium
CN113726457A (en) * 2021-07-28 2021-11-30 深圳市联洲国际技术有限公司 Human body action recognition method and device, storage medium and network equipment
CN113743374A (en) * 2021-10-11 2021-12-03 南京邮电大学 Personnel identity identification method based on channel state information respiration perception
CN113743374B (en) * 2021-10-11 2023-11-07 南京邮电大学 Personnel identity recognition method based on channel state information respiratory perception
CN116074835A (en) * 2023-01-16 2023-05-05 上海物骐微电子有限公司 Gesture recognition method and device based on WiFi, electronic equipment and storage medium
CN116074835B (en) * 2023-01-16 2024-09-10 上海物骐微电子有限公司 Gesture recognition method and device based on WiFi, electronic equipment and storage medium

Also Published As

Publication number Publication date
EP3426148B1 (en) 2022-09-28
JP2019515703A (en) 2019-06-13
EP3426148A1 (en) 2019-01-16
EP3426148A4 (en) 2019-10-09
JP6931790B2 (en) 2021-09-08

Similar Documents

Publication Publication Date Title
EP3426148B1 (en) Methods, apparatus, servers, and systems for human identification based on human radio biometric information
US10476730B2 (en) Methods, apparatus, servers, and systems for human identification based on human radio biometric information
Xu et al. Radio biometrics: Human recognition through a wall
US20230267758A1 (en) System and method for detecting movement of an individual using millimeter wave radar
Ding et al. WiFi CSI-based human activity recognition using deep recurrent neural network
US20210197834A1 (en) System and method for sensing with millimeter waves for sleep position detection, vital signs monitoring and/or driver detection
Wang et al. The promise of radio analytics: A future paradigm of wireless positioning, tracking, and sensing
Wang et al. Gait recognition using wifi signals
Zhang et al. Anti-fall: A non-intrusive and real-time fall detector leveraging CSI from commodity WiFi devices
US12058213B2 (en) Device-free human identification and device-free gesture recognition
US20200300970A1 (en) Method and apparatus for biometric authentication using face radar signal
Feng et al. RF-identity: Non-intrusive person identification based on commodity RFID devices
Pokkunuru et al. NeuralWave: Gait-based user identification through commodity WiFi and deep learning
CN111310149A (en) Method and system for authentication based on correlation of multiple pulse signals
Wang et al. Verifiable smart packaging with passive RFID
Shi et al. WiFi-enabled user authentication through deep learning in daily activities
Zhu et al. NotiFi: A ubiquitous WiFi-based abnormal activity detection system
Zhang et al. Wi-PIGR: Path independent gait recognition with commodity Wi-Fi
Ning et al. RF-Badge: Vital sign-based authentication via RFID tag array on badges
Showmik et al. Human activity recognition from wi-fi csi data using principal component-based wavelet cnn
Zhang et al. RFree-ID: An unobtrusive human identification system irrespective of walking cofactors using cots RFID
Shah et al. Smart user identification using cardiopulmonary activity
Islam et al. Identity authentication in two-subject environments using microwave Doppler radar and machine learning classifiers
Li et al. Secure UHF RFID authentication with smart devices
Uysal et al. A new rf sensing framework for human detection through the wall

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2018547884

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2017764252

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017764252

Country of ref document: EP

Effective date: 20181011

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17764252

Country of ref document: EP

Kind code of ref document: A1