Methods and systems for capturing biometric data

ABSTRACT

A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline image in a stationary position on a display of the device, positioning desired biometric data proximate the device such that the desired biometric data appears as a biometric image on the device display, and monitoring the outline and biometric images shown on the device display. Furthermore, the method includes positioning the device and the desired biometric data to better align the outline and biometric images when the outline and biometric images do not align and capturing the desired biometric data from an individual after approximately aligning the outline image with the biometric image.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation application of U.S. patent application Ser. No.14/825,507, filed Aug. 13, 2015, which is a continuation application ofU.S. patent application Ser. No. 14/013,611, filed Aug. 29, 2013, nowU.S. Pat. No. 9,112,858, issued Aug. 18, 2015, which is a continuationapplication of U.S. patent application Ser. No. 13/025,729, filed Feb.11, 2011, now U.S. Pat. No. 8,548,206, issued Oct. 1, 2013, which is acontinuation-in-part application of U.S. patent application Ser. No.13/010,443, filed Jan. 20, 2011, now U.S. Pat. No. 8,457,370, issuedJun. 4, 2013, the disclosures of which are incorporated herein byreference.

BACKGROUND OF THE INVENTION

This invention relates generally to methods and systems that facilitatecapturing authentication data, and more particularly, to methods andsystems of capturing palm biometric data with a portable device duringauthentication.

Known palm biometric data capture devices typically include a platen andan instrument positioned at a fixed distance from the platen. When apalm is placed on the platen such that the fingers are fully extendedand in a known orientation, a high resolution palm image may be capturedand the size of the palm accurately determined.

However, known palm biometric data capture devices are generally largeand cumbersome. Thus, known palm biometric data capture devices are nottypically portable. Moreover, such devices are not known to be readilyavailable to the general public, thus, accessing such devices isinconvenient and time consuming for members of the general public.Furthermore, such devices have been known to be expensive. Additionally,because known devices require palm placement on the platen in a knownorientation and at a known distance from the capture sensor, palmbiometric data is not captured from a hand positioned freely in space.

Capturing palm biometric data for authentication with a device from ahand positioned freely in space has been known to be difficult because,due to folds and curves in the palm, palm biometric data captured atdifferent times may present widely varying sets of palm features.Moreover, it has been observed that palm biometric data captured from ahand positioned freely in space, with a device, is generally captured atdifferent orientations and at different angles relative to the device.Thus, it has been known that palm biometric data captured from a handpositioned freely in space is not typically reliable biometric data thatmay be used for accurate authentication.

BRIEF DESCRIPTION OF THE INVENTION

In one aspect, a method of capturing biometric data is provided thatincludes activating a security application in a device. The securityapplication is activated by an operator of the device and is configuredto cause the device to display an outline image. Moreover, the methodincludes displaying the outline image in a stationary position on adisplay of the device, positioning desired biometric data proximate thedevice such that the desired biometric data appears as a biometric imageon the device display, and monitoring the outline and biometric imagesshown on the device display. Furthermore, the method includespositioning the device and the desired biometric data to better alignthe outline and biometric images when the outline and biometric imagesdo not align and capturing the desired biometric data from an individualafter approximately aligning the outline image with the biometric image.

In another aspect, a system for capturing biometric data is providedthat includes an authentication system including an authenticationdatabase. The authentication system is configured to at leastcommunicate with devices, store biometric data in the authenticationdata base, and generate an outline image for an individual frombiometric data captured from the individual. Moreover, the systemincludes a device that includes at least a display. The device isconfigured to communicate with at least the authentication system,display the outline image and an image of desired biometric data on thedevice display during authentication of the individual, and capturebiometric data from the individual when the image of the desiredbiometric data aligns approximately with the outline image on the devicedisplay.

In yet another aspect, a method of capturing palm biometric data with aportable device during authentication is provided. The method includesactivating, by an operator of the portable device, a securityapplication in the portable device. The security application isconfigured to cause the portable device to at least display an outlineimage of a palm. Moreover, the method includes displaying the outlineimage in a display of the portable device, and positioning the palm ofan individual proximate the portable device such that an image of thepalm appears in the display. Furthermore, the method includespositioning the portable device and the palm to better align the outlineimage and the palm image when the outline and palm images do not align,and photographing the palm when the outline image and palm image are inalignment.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an exemplary embodiment of anAuthentication Computer (AC) System for authenticating users;

FIG. 2 is a plan view of an exemplary hand image captured duringenrollment;

FIG. 3 is the plan view of the exemplary hand image as shown in FIG. 2,further including an enrollment region of interest;

FIG. 4 is the plan view of the exemplary hand image as shown in FIG. 3,further including a best fit line;

FIG. 5 is the plan view of the exemplary hand image as shown in FIG. 3,further including a patch area;

FIG. 6 is a plan view of an exemplary outline image of a hand;

FIG. 7 is a flowchart illustrating an exemplary process for generatingan outline image;

FIG. 8 illustrates capturing biometric data with a device duringauthentication;

FIG. 9 illustrates the outline image and an initial position of a handimage as shown on a display screen of a device;

FIG. 10 illustrates the outline image and a subsequent position of thehand image as shown in the display of the device;

FIG. 11 illustrates the outline image and an aligned position of thehand image as shown in the display of the device;

FIG. 12 is a plan view of an exemplary authentication hand imagecaptured by the device;

FIG. 13 is a plan view of the exemplary authentication hand image asshown in FIG. 12, further including an authentication region ofinterest;

FIG. 14 is a plan view of a gray scale palm image converted from a handimage included in the authentication region of interest;

FIG. 15 is a plan view of an enrollment mask generated from theenrollment region of interest during enrollment;

FIG. 16 is a plan view of an authentication mask generated from theauthentication region of interest during authentication;

FIG. 17 is a flowchart illustrating an exemplary process for enrollingindividuals in a biometric authentication computer (BAC) system; and

FIG. 18 is a flowchart illustrating an exemplary authentication process.

DETAILED DESCRIPTION OF THE INVENTION

FIG. 1 is an expanded block diagram of an exemplary embodiment of asystem architecture of an Authentication Computer (AC) System 10 forauthenticating the identity of a user. More specifically, the AC system10 includes a Biometric Authentication Computer (BAC) System 12 and adevice 14.

The BAC system 12 includes components such as, but not limited to, a webserver, a disk storage device, a database management server and anauthentication server arranged to be combined into a single structure.Although these components are combined into a single structure in theexemplary embodiment, it should be appreciated that in other embodimentsthese components may be separately positioned at different locations andoperatively coupled together in a network such as, but not limited to, alocal area network (LAN), a wide area network (WAN) and the Internet.The disk storage device may be used for storing any kind of dataincluding, but not limited to, biometric data, results of filteringanalyses, scale factors, coordinates and correlation factors. Thedatabase management server may be used to facilitate transferring datato and from the disk storage device. The authentication server isconfigured to at least perform matching of any feature or informationassociated with individuals to authenticate the identity of individualsas described herein.

The BAC system 12 is configured to wirelessly communicate with thedevice 14 over a communications network 16 in the exemplary embodiment.Moreover, the BAC system 12 is operable to communicate with othercomputer systems (not shown) over a network (not shown) such as, but notlimited to, a local area network (LAN), a wide area network (WAN) andthe Internet. In the exemplary embodiment, the communications network 16is a 3G communications network. However, it should be appreciated thatin other embodiments the communications network 16 may be any networkthat facilitates authentication as described herein, such as, but notlimited to, Wi-Fi, Global System for Mobile Communications (GSM),General Packet Radio Service (GPRS), Enhanced Data for GSM Environment(EDGE), a LAN, a WAN and the Internet.

The BAC system 12 is also operable to store biometric data and to usethe biometric data to conduct authentication matching transactions.Specifically, in the exemplary embodiment, biometric data that may beused as the basis of authentication is captured from individuals duringenrollment and is stored in the BAC system 12. The biometric data maytake any form such as, but not limited to, images, photographs,templates and electronic data representations. Using biometrics as thebasis for authentication facilitates enhancing trust in authenticationmatching transaction results.

The BAC system 12 stores the biometric data of each individual capturedduring enrollment in respective enrollment data records. The capturedbiometric data corresponds to a biometric modality desired to be usedfor conducting authentication transactions. In the exemplary embodiment,the desired biometric modality is the palm of a right hand. However, inother embodiments the palm biometric data may be from the left hand. Inyet other embodiments the biometric data desired for conductingauthentication transactions may correspond to any other biometricmodality that facilitates authentication as described herein. Such otherbiometric modalities include, but are not limited to, hand geometry,foot, face, iris, vascular patterns and hand signatures.

The captured biometric data for each individual is processed duringenrollment to generate an enrollment biometric template, for eachrespective individual, which is used by the BAC system 12 to conductauthentication matching transactions. In the exemplary embodiment, eachenrollment data record includes at least the captured biometric data andthe enrollment biometric template of a respective individual. Moreover,an outline image is generated for each individual and included in therespective enrollment data record. In other embodiments each enrollmentdata record may also include any kind of data that may be used inauthentication. Such data includes, but is not limited to, biographicdata, biometric data for biometric modalities different than thebiometric modality desired for conducting authentication transactions,and any combination of biometric modality data. The term “biographicdata” as used herein includes any demographic information regarding anindividual such as, but not limited to, an individual's name, age, dateof birth, address, citizenship and marital status.

In the exemplary embodiment, biometric features are extracted from thecaptured biometric data by the BAC system 12 and are included as data inthe enrollment biometric template generated by the BAC system 12. Theenrollment biometric templates are a compact representation of thebiometric features included in the captured biometric data, and are usedfor authenticating individuals. Although captured biometric data foreach individual is stored in the BAC system 12 in the exemplaryembodiment, in other embodiments the captured biometric data may bestored in a server system different than the BAC system 12.

Although the biometric data is captured from individuals duringenrollment in the BAC system 12, it should be appreciated that in otherembodiments the biometric data may be obtained by any other methodincluding, but not limited to, automatically reading or extracting thebiometric data from identity documents or from legacy data basesincluded in other computer systems. Likewise, biometric templates andoutline images corresponding to the biometric data may be obtained byany method including, but not limited to, automatically reading orextracting the biometric templates and outline images from identitydocuments or from legacy data bases included in other computer systems.It should be understood that biometric templates and outline imagescorresponding to desired biometric data may be obtained in addition to,or instead of, the desired biometric data. Such other legacy databasesystems include, but are not limited to, systems associated with motorvehicle administrations, social security administrations, welfare systemadministrations, financial institutions and health care providers. Suchidentity documents include, but are not limited to, passports anddriver's licenses. It should be appreciated that by extracting desiredbiometric data, or biometric templates and outline images, from a legacydatabase or identity document, and storing the extracted data in the BACsystem 12, individuals may be enrolled therein without having to providebiometric data.

The BAC system 12 also stores authentication policies therein which areused to determine data that is to be captured or obtained from anindividual attempting to enroll in the BAC system 12. Moreover,additional authentication policies may be stored in the BAC system 12that determine data to be captured from an individual requestingbiometric authentication. The BAC system 12 is also operable to at leastprocess biometric data into an outline image, and determinetransformations, scale factors, coordinates, and correlation factors.

The device 14 includes at least one of buttons and icons 18 operable toat least enter commands, enter data and invoke applications storedtherein. Moreover, the device 14 includes a display screen 20 such as,but not limited to, a Liquid Crystal Display (LCD), and is operable todisplay any text or image on the display screen 20. In the exemplaryembodiment, the device 14 is a smart phone operable to at least displaymessages and images, capture biometric data, process captured biometricdata into an outline image, and transmit the captured biometric data andoutline image to the BAC system 12. By virtue of being a smart phone thedevice 14 is portable in the exemplary embodiment. However, in otherembodiments the device 14 may not be portable.

Although the device 14 is a smart phone in the exemplary embodiment, itshould be appreciated that in other embodiments the device 14 may be anydevice capable of at least communicating with the BAC system 12,displaying messages and images, and capturing and processing biometricdata, and transmitting data. Such other devices 14 include, but are notlimited to, a tablet computer, a television, a camera, a personaldesktop computer, a laptop computer, and a personal digital assistant(PDA). Since each of the listed devices may communicate with otherdevices, the device 14 may also be described as a communications device.

The device 14 is configured to wirelessly communicate with at least theBAC system 12 over the network 16. Moreover, in the exemplary embodimentthe device 14 is used to capture biometric data from individuals.Specifically, a security application is stored in the device 14 thatfacilitates capturing biometric data with the device 14 duringenrollment and authentication. When an individual decides to capturebiometric data, the security application is invoked by activating abutton or icon 18. It should be understood that an operator may invokethe security application and otherwise operate the device 14 duringenrollment and authentication. The operator may be the individualoffering biometric data for capture during enrollment or authentication,or may be a user different than the individual. After invoking thesecurity application during enrollment, the security application causesthe device 14 to display a biometric data capture request message in thedisplay screen 20 prompting the user to capture desired biometric data.After biometric data in accordance with the capture request message iscaptured with the device 14, the security application causes the device14 to transmit the captured biometric data to the BAC system 12. In theexemplary embodiment the security application also causes the device 14to display outline images. In other embodiments after capturing thedesired biometric data with the device 14, the security application maycause the device 14 to process the captured biometric data into anoutline image and transmit both the captured biometric data and outlineimage to the BAC system 12.

The memories (not shown) in the BAC 12 and the device 14 can beimplemented using any appropriate combination of alterable, volatile ornon-volatile memory or non-alterable, or fixed, memory. The alterablememory, whether volatile or non-volatile, can be implemented using anyone or more of static or dynamic RAM (Random Access Memory), a floppydisc and disc drive, a writeable or re-writeable optical disc and discdrive, a hard drive, flash memory or the like. Similarly, thenon-alterable or fixed memory can be implemented using any one or moreof ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM(Erasable Programmable Read-Only Memory), EEPROM (Electrically ErasableProgrammable Read-Only Memory), an optical ROM disc, such as a CD-ROM orDVD-ROM disc, and disc drive or the like.

Each memory (not shown) can be a computer-readable recording medium usedto store data in the BAC system 12 and the device 14, and store computerprograms, applications, or executable instructions that are executed bythe BAC system 12 and the device 14. Moreover, the memory (not shown)may include smart cards, SIMs or any other medium from which a computingdevice can read computer programs or executable instructions. As usedherein, the terms “computer program” and “application” are intended toencompass an executable program that exists permanently or temporarilyon any computer-readable recordable medium that causes the computer orcomputer processor to execute the program. The BAC system 12 and thedevice 14, respectively, each include a processor (not shown) and amemory (not shown). It should be understood that, as used herein, theterm processor is not limited to just those integrated circuits referredto in the art as a processor, but broadly refers to a computer, anapplication specific integrated circuit, and any other programmablecircuit. It should be understood that the processors executeinstructions, or computer programs, stored in the respective memories(not shown) of the BAC system 12 and the device 14. The above examplesare exemplary only, and are thus not intended to limit in any way thedefinition and/or meaning of the term “processor.”

FIG. 2 is a plan view of an exemplary enrollment hand image 22 capturedwith the device 14 during enrollment in the BAC system 12. Theenrollment hand image 22 includes a right hand 24 that includesbiometric features 26 which in the exemplary embodiment are lines andwrinkles. However, in other embodiments the biometric features 26 may beany biometric feature including, but not limited to, ridge lines. Itshould be understood that the enrollment hand image 22 isrectangular-shaped, includes a center point 28, is digital, and ispositioned on a first Cartesian coordinate system that includes anX-axis and a Y-axis.

It should be understood that digital images include an array of pixelsand that each pixel occupies a position within the array. Thus, theposition of each pixel within a digital image positioned on a Cartesiancoordinate system is determined by the coordinates of the Cartesiancoordinate system. Because the enrollment hand image 22 is digital andis positioned on the first Cartesian coordinate system, the positions ofpixels within the enrollment hand image 22 are defined by the firstCartesian coordinate system.

FIG. 3 is the plan view of the exemplary enrollment hand image 22 asshown in FIG. 2, further including an enrollment region of interest 30positioned mostly on the palm area of the hand 24. In the exemplaryembodiment, the enrollment region of interest 30 is square-shaped.However, in other embodiments the enrollment region of interest 30 mayhave any shape including, but not limited to, rectangle and circle. Theenrollment region of interest 30 is positioned on a second Cartesiancoordinate system that includes an X′-axis and a Y′-axis. The enrollmentregion of interest 30 defines part of biometric data captured duringenrollment that is to be included in an enrollment biometric templatefor use during authentication. Because the region of interest 30 ispositioned on the hand 24 to include mostly the palm portion of the hand24, palm biometric data is to be used for authentication in theexemplary embodiment.

FIG. 4 is the plan view of the enrollment hand image 22 as shown in FIG.3, further including a best fit line 32 for use in constructing theenrollment region of interest 30. In the exemplary embodiment, theenrollment region of interest 30 is constructed by first calculatingcoordinates of points 34, 36, 38 in accordance with the first Cartesiansystem. Points 34, 36, 38 are each positioned at the base betweendifferent fingers. Next, constructing the enrollment region of interest30 continues by determining the line 32 that constitutes a best fitbetween points 34, 36, 38, and determining a normal projection from eachpoint 34, 36, 38 to the best fit line 32. Each normal projectionintersects the best fit line 32 to define further points 40, 42, 44,respectively. The coordinates of points 40, 42, 44 are calculated inaccordance with the first Cartesian coordinate system. A distance D isdetermined between points 40 and 44 that may be referred to as a scaleidentifying number or a scale factor. Next, the coordinates of amidpoint MP between points 40 and 44 are calculated in accordance withthe first Cartesian coordinate system, and a vector v₁ parallel to thebest fit line 32 and a vector v₂ normal to the best fit line 32 aredetermined. The scale identifying number D, the coordinates of themidpoint MP, and the vectors v₁ and v₂ are then substituted into anequation P_(i)=MP+a₁Dv₁+b₁Dv₂ to calculate the coordinates of eachcorner of the region of interest 30. The designation “i” as used inconjunction with the corner points P_(i), is intended to indicate thatany number “i” of corner points, appropriate for any geometric shape,may be used that facilitates authentication as described herein. Itshould be appreciated that a₁ and b₁ designate coefficients thatfacilitate calculating the coordinates of corner points P_(i). By virtueof determining the coordinates of points P_(i), in accordance with thefirst Cartesian coordinate system, it should be appreciated that theenrollment region of interest 30 is defined.

Although the exemplary embodiment determines the enrollment region ofinterest 30 by calculating the coordinates of each corner using anequation, it should be appreciated that differently shaped enrollmentregions of interest 30 may be determined using other methods, equationsor mathematical relationships.

FIG. 5 is the plan view of the exemplary enrollment hand image 22 asshown in FIG. 3, further including a patch area 46. In the exemplaryembodiment, the patch area 46 is rectangular-shaped, has a fixed sizethat is smaller than the enrollment region of interest 30, and ispositioned at a center of gravity of the hand 24. It should beunderstood that the patch area 46 is not merely a rectangular geometricshape superimposed on the hand 24. Rather, the patch area 46 representsa copy of a portion of the enrollment hand image 22 within the bounds ofthe patch area 46. The coordinates of the center of gravity of the handare calculated in accordance with the second Cartesian coordinatesystem. Next, the center of the patch area 46 is positioned to becoincident with the center of gravity. Thus, after positioning thecenter of the patch area 46 on the center of gravity, the center of thepatch area 46 has the same coordinates as the center of gravity of thehand 24. In the exemplary embodiment sides of the patch area 46 areparallel to the sides of the enrollment region of interest 30. However,in other embodiments it is not necessary that the sides of the patcharea 46 be parallel to the sides of the enrollment region of interest30.

It should be understood that the position of the enrollment region ofinterest 30 and the position of the patch area 46 are not related.However, the patch area 46 is to be positioned completely within theenrollment region of interest 30. Although the patch area isrectangular-shaped in the exemplary embodiment, in other embodiments thepatch area 46 may be any shape including, but not limited to, square andcircle. Moreover, in other embodiments instead of positioning the centerof the patch area 46 coincident with the center of gravity of the hand24, the patch area 46 may be positioned at areas on the hand 24 withinthe enrollment region of interest 30 that have a higher density ofbiometric features than other areas. A biometric template of the patcharea 46 and an enrollment biometric template of the portion of hand 24within the enrollment region of interest 30 are generated by the BACsystem 12 and stored therein. Because the region of interest 30 ispositioned on the hand 24 to include mostly the palm portion of the hand24, by thus generating the enrollment biometric template palm biometricdata is considered to have been captured such that biometricauthentication based on palm biometric data may be conducted.

FIG. 6 is a plan view of an exemplary outline image 48 of the hand 24that is generated by the BAC system 12 from the enrollment hand image 22in the exemplary embodiment. However, in other embodiments the outlineimage 48 may be generated by the device 14.

FIG. 7 is a flowchart 50 illustrating an exemplary process forgenerating the outline image 48 from the enrollment hand image 22 duringenrollment in the BAC system 12. Specifically, the generating processstarts 52 by capturing desired biometric data 54 from an enrollingindividual with the device 14 and transmitting the captured biometricdata to the BAC system 12. In the exemplary embodiment, the desiredbiometric data is the palm side of the right hand. The BAC system 12continues processing by generating 54 the enrollment hand image 22 fromthe captured hand biometric data, and converting the enrollment handimage 22 into a gray scale hand image.

Next, processing continues by conducting a first stage of filtering 56.Specifically, processing continues by filtering the gray scale handimage with a first filter and with a second filter. As a result, thefirst filter generates a first digital image and the second filtergenerates a second digital image. Next, processing continues bydetermining an average image of the first and second images which isreferred to herein as a first average image. Because the first andsecond images are digital images, the first average image is also adigital image.

Next, processing continues by conducting a second stage of filtering 58.Specifically, processing continues by rotating the gray scale hand imageabout the center point 28 clockwise by forty-five degrees and filteringthe rotated gray scale hand image with the first filter and with thesecond filter. As a result, the first filter generates a first rotateddigital image and the second filter generates a second rotated digitalimage. Processing continues by determining an average image of the firstand second rotated images which is referred to herein as a secondaverage image. Because the first and second rotated images are rotateddigital images of the gray scale hand image, the second average image isalso a rotated digital image of the gray scale hand image. In theexemplary embodiment, the first and second filters are different Sobelfilters. However, in other embodiments any type of edge detection filtermay be used that facilitates generating the outline image 48 asdescribed herein. Moreover, in yet other embodiments any process may beused that facilitates generating the outline image 48 including, but notlimited to, conducting statistical color analysis, clustering, and anycombination of such processes with each other or in concert withconducting edge detection using edge detection filters.

Next, processing continues by combining the first and second averageimages 60 to form a combined average digital image. Specifically,processing continues by rotating the second average image about thecenter point 28 counterclockwise by forty-five degrees and determiningthe intensity of each pixel included in the first average image and inthe second average image. Each pixel in the first average image has acorresponding pixel in the second average image. Corresponding pixels inthe first and second average images have the same coordinates andconstitute a pair of pixels. Each pair of pixels is compared against arange of intensities that includes a low intensity range, a middleintensity range, and a high intensity range. When at least one of thepixels included in each pair has an intensity in the middle intensityrange, a pixel in the combined average image corresponding to each pixelof the pair, is set to a positive non-zero value of 255. Otherwise, thecombined average image pixel corresponding to each pixel of the pair isset to zero.

After combining the average images 60 to form the combined averageimage, processing continues by filtering the combined average image 62with a smoothing filter. In the exemplary embodiment the smoothingfilter is a Gaussian function having a standard deviation of one.However, in other embodiments any filter may be used that facilitatesdetermining the outline image 48 as described herein. A smoothedcombined average image is generated as the result of the filteringoperation 62. Processing continues by converting the smoothed combinedaverage image into a binary image. Specifically, processing continues bydetermining the intensity 64 of each pixel in the smoothed combinedaverage image. Each pixel in the smoothed combined average image havingan intensity below a mid-point value of 128 is given a value of zero.All other pixels in the smoothed combined average image are given avalue of one. By thus giving each pixel in the smoothed combined averageimage a value of zero or one, the smoothed combined average image isconverted into a binary image that represents a preliminary outlineimage of the right hand 24.

Next, processing continues by eliminating noise 66 from the preliminaryoutline image. Specifically, processing continues by determiningfour-connected sets of pixels within the preliminary outline image anddetermining a population of each four-connected set of pixels. When thepopulation of a four-connected set of pixels is less than a thresholdvalue, each pixel included in the four-connected set of pixels is givena value of zero. Otherwise, when the population of a four-connected setof pixels is at least equal to the threshold value, each pixel valueincluded in the four connected set of pixels remains unchanged.

After eliminating noise 66 from the preliminary outline image,processing continues by expanding each non-zero value pixel 68 includedin the preliminary outline image by a predetermined width in both the Xand Y directions of the first Cartesian coordinate system. Doing so,facilitates enhancing the visibility of the preliminary outline imageand thus results in the outline image 48 of the right hand 24.Processing continues by storing 70 the outline image 48 in the BACsystem 12. Next, processing ends 72.

Although the outline image 48 is stored in the BAC system 12 afterexpanding each non-zero value pixel in the exemplary embodiment, inother embodiments after expanding each non-zero value pixel processingmay continue by transmitting the captured biometric data and outlineimage 48 to the device 14, and displaying the captured biometric dataand outline image 48 on the display screen 20. The operator continuesprocessing by reviewing the outline image 48 for correctness andconfirms that the outline image 48 is correct by activating a button oricon 18. For example, the operator may confirm that the outline image 48includes the correct number of fingers. After confirming that theoutline image 48 is correct, processing continues by transmitting thecaptured biometric data and outline image 48 to the BAC system 12 forstorage therein. When the outline image 48 is not confirmed as correct,processing may continue by again capturing biometric data at operation54. Otherwise, processing ends 72.

Although the BAC system 12 generates the outline image 48 in theexemplary embodiment, in other embodiments upon capturing the biometricdata, the device 14 may generate the outline image 48 and transmit theoutline image 48 and captured biometric data to the BAC system 12. Insuch other embodiments, upon generating the outline image 48 the device14 may continue processing by presenting the outline image and capturedbiometric data on the display screen 20 for review by the operator.After confirming that the outline image is correct, processing maycontinue by transmitting the captured biometric data and outline image48 to the BAC system 12 for storage therein. Such other embodimentsavoid repeatedly transmitting the captured biometric data and outlineimage 48 between the BAC system and device 14.

A frequently encountered problem associated with automated biometricsmay be location of the biometric data offered for capture. Thus, itshould be appreciated that by virtue of confirming that the outlineimage 48 is correct, the operator may also confirm that a correctlocation of the biometric data offered for capture has been determined.

Although hand biometric data is captured during enrollment in the BACsystem 12 without using an outline image in the exemplary embodiment, itshould be appreciated that in other embodiments a generic outline imageof an average sized hand may be presented on the display screen 20 tofacilitate capturing biometric data and generating the outline image 48during enrollment. In yet other embodiments, any type of visual aid maybe shown on the display screen 20 that would function as a guide forenabling an operator to capture the desired biometric data in accordancewith a prescribed manner. Such visual aids include, but are not limitedto, circles, lines, curves and marks.

Although the second stage of filtering is conducted by rotating and thenfiltering the gray scale hand image in the exemplary embodiment, inother embodiments instead of rotating the gray scale image, the firstand second filters may be mathematically modified to effect a forty-fivedegree rotation prior to filtering the gray scale hand image. Applyingthe mathematically modified first and second filters to the gray scalehand image generates first and second rotated digital images that areabout the same as those generated in the exemplary embodiment. Moreover,although the gray scale hand image is rotated by forty-five degrees inthe exemplary embodiment, in other embodiments the gray scale hand imagemay be rotated by any angle that facilitates determining the outlineimage 48 as described herein. Furthermore, in yet other embodiments thefirst and second filters may be mathematically modified to effect anydegree of rotation that facilitates determining the outline image 48 asdescribed herein.

Although biometric data of the palm side of the right hand is used togenerate the outline 48 in the exemplary embodiment, it should beappreciated that in other embodiments biometric data of differentbiometric modalities may be captured and used to generate the outlineimage 48. Such different biometric modalities include, but are notlimited to, face, iris, and foot. Moreover, it should be appreciatedthat such different biometric modalities may have biometric features,different than wrinkles and lines that can be extracted from thecaptured biometric data and included in a biometric template. Forexample, when iris biometric data is captured during enrollment orauthentication, phase information and masking information of the irismay be extracted from the captured iris biometric data and included in abiometric template.

FIG. 8 illustrates capturing biometric data with the device 14 duringauthentication. Specifically, the palm side of a right hand 74 of anindividual desiring to be authenticated is positioned proximate thedevice 14 such that an image of the hand 74 appears on the displayscreen 20. It should be understood that the hand 74 is not controllablyoriented on a surface in a fixed position. Rather, the individual beingauthenticated freely positions his hand proximate to, and with respectto, the device 14 such that the image of the hand 74 appears in thedisplay screen 20. The outline image 48 also appears on the displayscreen 20 during authentication in a stationary position.

FIG. 9 illustrates the outline image 48 and an initial position of animage 76 of the hand 74 as shown on the display screen 20 whilecapturing biometric data during authentication. The hand image 76 in theinitial position does not align with the outline image 48. Consequently,the device 14 and the hand 74 are repositioned with respect to eachother such that the hand image 76 shown on the display screen 20 betteraligns with the outline image 48 shown on the display screen 20.

FIG. 10 illustrates the outline image 48 and a subsequent position ofthe hand image 76 as shown on the display screen 20 while capturingbiometric data during authentication. After repositioning the device 14and the hand 74 with respect to each other, the hand image 76 as shownon the display screen 20 has been rotated and translated from theinitial position into the subsequent position. However, the subsequentposition of the hand image 76 as shown on the display screen 20 does notadequately align with the outline image 48 as shown on the displayscreen 20. Consequently, the device 14 and the hand 74 are furtherrepositioned with respect to each other such that the hand image 76 asshown on the display screen 20 is better aligned with the outline image48 shown on the display screen 20.

FIG. 11 illustrates the outline image 48 and an aligned position of thehand image 76 as shown on the display screen 20 while capturingbiometric data during authentication. After further repositioning thedevice 14 and the hand 74 with respect to each other, the hand image 76has been further rotated and translated from the subsequent positionsuch that the hand image 76 as shown on the display screen 20approximately aligns with the outline image 48 shown on the displayscreen 20. When the hand image 76 shown in the display screen 20approximately aligns with the outline image 48 shown on the displayscreen 20, the operator captures hand biometric data by photographingthe hand 74 with the device 14.

It should be appreciated that because the hand image 76 alignsapproximately with the outline image 48 during capture, hand biometricdata captured during authentication is typically captured at adifferent, but similar, orientation as the hand biometric data capturedduring enrollment in the BAC system 12. Moreover, it should beunderstood that the size of the of the hand biometric data capturedduring authentication may typically be different than the size of thehand biometric data captured during enrollment. In the exemplaryembodiment, the size of the hand biometric data image captured duringauthentication is different than the size of the outline image 48.Although the operator photographs the hand 74 with the device 14 in theexemplary embodiment, it should be understood that in other embodimentsthe security application may cause the device 14 to automaticallyphotograph the hand 74. In such other embodiments, a photograph may beautomatically taken when the hand image 76 is within an establishedtolerance of the outline image 48.

FIG. 12 is a plan view of an exemplary authentication hand image 78captured by the device 14 during authentication. The authentication handimage 78 includes a center point 80, the hand image 76, and biometricfeatures 82 included in the hand image 76. The biometric features 82 arelines and wrinkles in the exemplary embodiment. However, in otherembodiments the biometric features 82 may be any biometric featureincluding, but not limited to, ridge lines.

FIG. 13 is a plan view of the exemplary authentication hand image 78 asshown in FIG. 12, further including an authentication region of interest84. The authentication region of interest 84 is determined in asubstantially identical way as the enrollment region of interest 30. Theauthentication region of interest 84 also includes the second Cartesiancoordinate system similar to the enrollment region of interest 30. Theauthentication region of interest 84 defines part of biometric datacaptured during authentication that is to be used for authentication.Because the authentication region of interest 84 is positioned on thehand image 76 to include mostly the palm portion of the hand image 76,palm biometric data is to be used for authentication in the exemplaryembodiment.

In order to facilitate approximately aligning differently oriented anddifferently sized images of the same biometric modality, duringauthentication the authentication region of interest 84 is manipulatedto be approximately the same as the enrollment region of interest 30.Specifically, the size of the authentication region of interest 84 isincreased or decreased by a scale factor such that the size of theauthentication region of interest 84 is approximately the same as thesize of the enrollment region of interest 30. Furthermore, theauthentication region of interest 84 is rotated to have approximatelythe same orientation as the enrollment region of interest 30. It shouldbe understood that the portion of the hand image 76 within theauthentication region of interest 84 is manipulated in concert with theauthentication region of interest 84 to have approximately the same sizeand orientation as the portion of the hand 24 within the enrollmentregion of interest 30. By thus manipulating the authentication region ofinterest 84 and the portion of the hand image 76 within theauthentication region of interest 84, the portion of the hand image 76within the authentication region of interest 84 and the portion of thehand 24 within the enrollment region of interest 30 may be approximatelyaligned with each other such that accurate authentication results may begenerated. The authentication region of interest 84 and the enrollmentregion of interest 30 have the same shape in the exemplary embodiment.After the authentication region of interest 84 is manipulated to haveapproximately the same size and orientation as the enrollment region ofinterest 30, a portion of the palm image 76 within the authenticationregion of interest 84 is converted to a gray scale image.

Although the authentication region of interest 84 is manipulated to haveapproximately the same size and orientation as the enrollment region ofinterest 30 in the exemplary embodiment, in other embodiments theenrollment region of interest 30 may be selected to be manipulated in asimilar manner to have approximately the same size and orientation asthe authentication region of interest 84.

FIG. 14 is a plan view of a gray scale image 86 converted from the handimage 76 within the authentication region of interest 84. Because theauthentication region of interest 84 is positioned on the hand image 76to include mostly the palm portion of the hand image 76, the gray scaleimage 86 is also a gray scale image of the palm and is referred toherein as a gray scale palm image 86. The patch area 46 determinedduring enrollment in the BAC system 12 is used to facilitate determiningan optimum area of the gray scale palm image 86 that best correlates tothe patch area 46. Specifically, the patch area 46 is incrementallypositioned over the entire gray scale palm image 86. In the exemplaryembodiment, the patch area 46 is incrementally positioned over theentire gray scale palm image 86 one pixel row or column at a time. Ateach position, the patch area 46 is compared against the palm biometricdata of the gray scale palm image 86 encompassed by the patch area 46such that a correlation score is determined for each position. An areaof the gray scale palm image 86 encompassed by the patch area 46 isreferred to herein as a matching area of the gray scale palm image 86.The correlation score indicates the correlation between the patch area46 and a corresponding matching area of the gray scale palm image 86.Comparing the patch area 46 against the gray scale palm image 86 andgenerating the correlation scores is referred to herein as applying thepatch area 46 against the gray scale palm image 86. It should beunderstood that the gray scale palm image 86 is rotated through a seriesof angles and at the same time is scaled through a series of scalefactors. For each rotation angle and scale factor combination, the patcharea 46 is applied against the gray scale palm image 86.

After calculating the correlation scores for each desired rotation angleand scale factor combination, the best correlation score is determined.Optimum transformation parameters are determined to be the rotationangle and the scale factor that correspond to the best correlationscore, as well as the center point coordinates of the matching area thatcorresponds to the best correlation score. The matching area of the grayscale palm image 86 that corresponds to the patch area 46 at the bestcorrelation score is the optimum area of the gray scale palm image 86.The gray scale palm image 86 is then adjusted by the rotation angle andscale factor corresponding to the best correlation score, and thecoordinates of the matching area in the gray scale palm image 86 arecalculated using the second Cartesian coordinate system. The rotationangle and the scale factor of the optimum area are also referred to asthe optimum rotation angle and the optimum scale factor. The optimumrotation angle, optimum scale factor and the coordinates of the optimumarea, together constitute an optimum transformation parameter set.

It should be understood that the authentication region of interest 84may also be used to generate an authentication mask. Thus, by virtue ofknowing the center point coordinates of the patch area 46 in theenrollment region of interest 30, the optimum rotation angle, theoptimum scale factor, and the coordinates of the optimum area centerpoint, a transformation necessary for approximately aligning theauthentication region of interest 84 with the enrollment region ofinterest 30 may be calculated. Likewise, the transformation may becalculated for approximately aligning the authentication mask with anenrollment mask generated during enrollment, and for approximatelyaligning the gray scale palm image 86 with an enrollment gray scaleimage generated during enrollment. Thus, the transformation is appliedagainst the authentication mask to approximately align theauthentication and enrollment masks. The transformation is also appliedagainst the gray scale palm image 86 to approximately align the grayscale palm image 86 with the enrollment gray scale image.

After aligning the authentication and enrollment masks, and aligning thegray scale palm image 86 and the enrollment gray scale image, abiometric template is generated from the aligned gray scale palm image86. The authentication and enrollment masks are compared to determine aregion common to both masks. Biometric template data generated from thealigned gray scale palm image 86 that is also within the common regionis used to conduct a biometric authentication matching transaction. Thecommon region may also be referred to as a region of agreement.

In the exemplary embodiment the authentication region of interest 84 isrotated, from its original orientation, through angles ranging from tendegrees clockwise to ten degrees counterclockwise. However, in otherembodiments the authentication region of interest 84 may be rotated byangles greater than ten degrees in either the clockwise orcounterclockwise directions. Moreover, scale factors are applied to theauthentication region of interest 84 that increase and decrease the sizeof the authentication region of interest 84 by up to twenty percent.However, in other embodiments other scale factors may be applied thatincrease or decrease the size of the authentication region of interest84 by greater than twenty percent.

It should be understood that the authentication mask and the gray scalepalm image 86 each include the authentication region of interest 84.Thus, all information or data included in the authentication mask andthe gray scale palm image 86 is rotated and scaled as described abovefor the authentication region of interest 84. Computations relating todetermination of the optimum area are conducted in the second Cartesiancoordinate system.

FIG. 15 is a plan view of an enrollment mask 88 generated from theportion of the hand 24 within the enrollment region of interest 30during enrollment. The enrollment mask 88 includes shaded areas 90 thatrepresent areas not containing valid biometric data within theenrollment region of interest 30. The mask 88 also includes another area92 that represents areas containing valid biometric data within theenrollment region of interest 30.

FIG. 16 is a plan view of an authentication mask 94 generated from theportion of the hand image 76 within the authentication region ofinterest 84 during authentication. The mask 94 includes shaded areas 96that represent areas not containing valid biometric data within theauthentication region of interest 84. The authentication mask 94 alsoincludes another area 98 that represents areas containing validbiometric data within the authentication region of interest 84. Duringauthentication, the enrollment mask 88 and the authentication mask 94are compared to define a region common to both masks 88, 94. Biometricdata within the common region is used for matching duringauthentication.

FIG. 17 is a flowchart 100 illustrating an exemplary process forenrolling individuals in the BAC system 12. The enrolling process starts102 by activating a security application stored in the device 14. Thesecurity application causes the device 14 to display a message promptingthe operator to capture desired biometric data. The desired biometricdata is the palm side of the right hand. Next, processing continues bycapturing biometric data 102, in accordance with the message, from anenrollee with the device 14. Specifically, in the exemplary embodimentthe biometric data is captured by photographing the enrollee's hand withthe device 14. In the exemplary embodiment a single photograph is takenduring enrollment. The device 14 continues processing by transmittingthe captured biometric data to the BAC system 12.

Next, the BAC system 12 continues processing by generating 104 theoutline image 48, determining 106 the enrollment region of interest 30,and generating 106 the enrollment mask 88. The outline image 48,enrollment region of interest 30, and enrollment mask 88 are stored inthe enrollment data record of the enrollee in the BAC system 12.

Processing continues by determining 108 the patch area 46 within theenrollment region of interest 30, processing the patch area 46 into apatch area biometric template, and storing the patch area biometrictemplate in the enrollment data record of the enrollee. Afterdetermining 108 the patch area 46, processing continues by extractingbiometric features 110 from the captured biometric data included in theenrollment region of interest 30, and processing the extracted biometricfeatures into an enrollment biometric template. Because the enrollmentregion of interest 30 includes mostly the palm of the hand, theextracted biometric features are palm biometric features. Thus, theenrollment biometric template includes palm biometric data. Theenrollment biometric template is stored in the enrollment data record ofthe enrollee. After extracting the biometric features 110, a message iscommunicated to, and displayed on, the device 14 notifying the user thatenrollment is complete. Next, enrollment processing ends 112.

FIG. 18 is a flowchart 114 illustrating an exemplary authenticationprocess used by the AC system 10 for authenticating the identity of anindividual. For AC system 10, the process starts 116 by activating thesecurity application 118 in the device 14 which initiates theauthentication process, when the individual desires to be authenticated.It should be appreciated that the individual may desire to beauthenticated in many different circumstances including, but not limitedto, when conducting any kind of transaction and when requested bysecurity personnel to prove a claim of identity. After initiating theauthentication process, the device 14 continues processing by requestingthe outline image 48 from the BAC system 12 and the BAC system 12transmits the requested outline image 48 to the device 14 for use duringauthentication.

Next, processing continues by displaying a message on the display screen20 prompting the operator of the device 14 to capture desired biometricdata, and displaying 120 the outline image 48 on the display screen 20in a stationary position. It should be understood that the biometricmodality data captured during authentication should be the same as thatcaptured during enrollment. Thus, biometric data corresponding to thepalm side of a right hand is captured during authentication.Accordingly, the outline image 48 corresponds to the desired biometricdata. Processing continues by positioning the desired biometric data 122of the individual proximate to, and with respect to, the device 14 suchthat the desired biometric data appears as a desired biometric image inan initial position on the display screen 20. Next, the operatorcontinues processing by monitoring the desired biometric image shown onthe display screen 20 with respect to the outline image 48 shown on thedisplay screen 20, and positioning the device 14 and the desiredbiometric data with respect to each other, to better align the outlineand desired biometric images, when the initial position of the desiredbiometric image shown on the display screen 20 does not approximatelyalign with the outline image 48 shown on the display screen 20. Thedevice 14 and the desired biometric data are positioned with respect toeach other until the desired biometric image shown on the display screen20 approximately aligns with the outline image 48 shown on the displayscreen 20. After positioning the device 14 and the desired biometricdata such that the desired biometric image shown on the display screen20 approximately aligns with the outline image 48 shown on the displayscreen 20, processing continues by capturing the desired biometric data.Specifically, the operator continues processing by photographing thedesired biometric data with the device 14. The device 14 continuesprocessing by communicating the captured biometric data to the BACsystem 12. In the exemplary embodiment a single photograph is takenduring authentication. However, in other embodiments any number ofphotographs may be taken.

Although the desired biometric data is captured using the outline image48 during authentication in the exemplary embodiment, it should beunderstood that biometric data may also be captured in a substantiallyidentical manner during enrollment if an outline image 48 has beengenerated and stored in the BAC system 12 prior to enrollment.

Next, processing continues by generating an authentication biometrictemplate 126 from the captured biometric data. Specifically, processingcontinues by determining the authentication region of interest 84including the palm from the captured biometric data, and generating thegray scale palm image 86 and the authentication mask 96 for the capturedbiometric data. Processing continues by determining the optimum areawithin the authentication region of interest 84, and adjusting the scaleand angle of the authentication region of interest 84 such that theadjusted authentication region of interest 84 approximately aligns withthe enrollment region of interest 30. The authentication and enrollmentmasks, and the gray scale palm image 86 and enrollment gray scale imageare similarly approximately aligned with each other. Next, processingcontinues by extracting biometric feature data from the aligned grayscale palm image 86 and generating an authentication biometric template126 from the extracted biometric feature data. The alignedauthentication and enrollment masks are compared to determine the regionof agreement. Biometric feature data included in the authenticationbiometric template that is within the region of agreement is used forconducting a biometric verification matching transaction.

Processing continues by verifying the identity 128 of the individual bycomparing the biometric feature data included in the authenticationbiometric template that is within the region of agreement, againstcorresponding biometric feature data included in the enrollmentbiometric template and generating a matching score. After generating thematching score, processing continues by comparing the matching scoreagainst a predetermined threshold. When the matching score is at leastequal to the predetermined threshold the identity of the individual isverified. A message is communicated to, and displayed on, the device 14notifying the operator of the verification, and processing continues byconducting the network-based transaction 130. Next, processing ends 132.However, when the matching score is less than the predeterminedthreshold, a message is communicated to, and displayed on, the device 14notifying the operator that the individual was not verified, and thuscannot conduct the transaction. Next, processing ends 132.

Although a single outline image 48 is generated by and stored in the BACsystem 12 in the exemplary embodiment, in other embodiments a pluralityof outline images of different biometric modalities, for eachindividual, may be stored in the BAC system 12. In such otherembodiments an outline image of the right hand and an outline image ofthe left hand may both be stored in the BAC system 12. Thus, prior torequesting the outline image 48 during authentication, the operator mayselect one of the outline images to be used for authentication.Moreover, when the desired biometric data to be captured includesbiometric data of different modalities, outline images corresponding toeach different modality may be selected and presented in succession onthe display screen 20. For example, the left hand image outline may bedisplayed first and the right hand image outline may be shown on thedisplay screen 20 second.

In each embodiment, the above-described processes for capturing palmbiometric data and applying a transform to the captured palm biometricdata, facilitate reducing the time and costs of accuratelyauthenticating the identity of an individual based on palm biometricdata captured while positioned freely in space. More specifically, anoutline image is generated from hand biometric data captured with adevice during enrollment in an authentication system. Duringauthentication, the outline image appears on the device display. Whileaiming the device at a hand, an image of the hand also appears on thedevice display. The image of the hand may be positioned within thedisplay to be approximately aligned with the outline image. When theimage of the hand approximately aligns with the outline image in thedevice display, the hand is captured as biometric data by the device. Aregion of interest defines that palm biometric data included in thecaptured hand biometric data is to be used during authentication. Atransform is calculated and is applied to the captured palm biometricdata within the region of interest. The transform causes the capturedpalm biometric data to have approximately the same size and orientationas the palm biometric data captured during enrollment. As a result,biometric authentication of identities facilitates reducing the time andcosts associated with authentication based on palm biometric datacaptured while positioned freely in space with a device readilyavailable to the members of the general public. Accordingly, biometricauthentication of identities is facilitated to be enhanced in a costeffective and reliable manner.

Exemplary embodiments of processes and systems that facilitateconvenient, flexible and inexpensive biometric authentication based onpalm biometric data are described herein. The processes are not limitedto use with the specific computer system embodiments described herein,but rather, the processes can be utilized independently and separatelyfrom other processes described herein. Moreover, the invention is notlimited to the embodiments of the processes and systems described abovein detail. Rather, other variations of the processes may be utilizedwithin the spirit and scope of the claims.

While the invention has been described in terms of various specificembodiments, those skilled in the art will recognize that the inventioncan be practiced with modification within the spirit and scope of theclaims.

What is claimed is:
 1. A method for authenticating users comprising:capturing, by a communications device, a biometric data image from auser, the biometric data image being captured after a visual aiddisplayed by the communications device is approximately aligned with animage of the biometric data displayed by the communications device;approximately aligning, by a computer system, the captured biometricdata image with another image; generating a biometric template from theapproximately aligned captured biometric data image; and verifying theidentity of the user based on a comparison of the generated biometrictemplate against a corresponding user enrollment biometric template. 2.A method of authenticating users in accordance with claim 1 furthercomprising determining that a network-based transaction is to beconducted after successfully verifying the identity of the user.
 3. Amethod of authenticating users in accordance with claim 1 furthercomprising determining positions of biometric features included in theapproximately aligned captured biometric data image.
 4. A method ofauthenticating users in accordance with claim 1 further comprisingdetermining a region of interest of the captured biometric data image.5. A method of authenticating users in accordance with claim 1, furthercomprising communicating a result of said verifying step to anothercomputer system.
 6. A computer system for authenticating userscomprising: a processor; and a memory configured to store biometricdata, said computer system being associated with a network and saidmemory being in communication with said processor and havinginstructions stored therein which, when executed by said processor causesaid processor to: approximately align a biometric data image withanother image, the biometric data image being captured from a user witha communications device after a visual aid displayed by thecommunications device is approximately aligned with an image of thebiometric data displayed by the communications device; generate abiometric template from the approximately aligned captured biometricdata image; and verify the identity of the user based on a comparison ofthe generated biometric template against a corresponding user enrollmentbiometric template.
 7. A computer system for authenticating users inaccordance with claim 6, wherein the instructions when executed by saidprocessor further cause said processor to communicate a result of saidverifying step to another computer system.
 8. A computer system forauthenticating users in accordance with claim 6, wherein theinstructions when executed by said processor further cause saidprocessor to determine that a network-based transaction is to beconducted after successfully verifying the user.
 9. A computer systemfor authenticating users in accordance with claim 6, wherein theinstructions when executed by said processor further cause saidprocessor to determine positions of biometric features included in theapproximately aligned captured biometric data image.
 10. A computersystem for authenticating users in accordance with claim 6, wherein theinstructions when executed by said processor further cause saidprocessor to determine a region of interest of the captured biometricdata image.
 11. A method for authenticating users comprising:approximately aligning, by a processor, a captured biometric data imagewith another image, the biometric data image being captured from a userafter a visual aid is approximately aligned with a displayed image ofthe biometric data; generating a biometric template from theapproximately aligned captured biometric data image; and verifying theidentity of the user based on a comparison of the generated biometrictemplate against a corresponding user enrollment biometric template. 12.A method of authenticating users in accordance with claim 11 furthercomprising determining that a network-based transaction is to beconducted after successfully verifying the identity of the user.
 13. Amethod of authenticating users in accordance with claim 11 furthercomprising determining positions of biometric features included in theapproximately aligned captured biometric data image.
 14. A method ofauthenticating users in accordance with claim 11 further comprisingdetermining a region of interest of the captured biometric data image.15. A method of authenticating users in accordance with claim 11 furthercomprising communicating a result of said verifying step to anothercomputer system.
 16. A computer system for authenticating userscomprising: a processor; and a memory configured to store biometricdata, said computer system being associated with a network and saidmemory being in communication with said processor and havinginstructions stored therein which, when executed by said processor causesaid processor to: approximately align a biometric data image withanother image, the biometric data image being captured from a user aftera visual aid is approximately aligned with a displayed image of thebiometric data; generate a biometric template from the approximatelyaligned captured biometric data image; and verify the identity of theuser based on a comparison of the generated biometric template against acorresponding user enrollment biometric template.
 17. A computer systemfor authenticating users in accordance with claim 16, wherein theinstructions when executed by said processor further cause saidprocessor to communicate a result of said verifying step to anothercomputer system.
 18. A computer system for authenticating users inaccordance with claim 16, wherein the instructions when executed by saidprocessor further cause said processor to determine that a network-basedtransaction is to be conducted after successfully verifying the user.19. A computer system for authenticating users in accordance with claim16, wherein the instructions when executed by said processor furthercause said processor to determine the position of biometric featuresincluded in the approximately aligned captured biometric data image. 20.A computer system for authenticating users in accordance with claim 16,wherein the instructions when executed by said processor further causesaid processor to determine a region of interest of the capturedbiometric data image.