Methods and systems for enrollment and authentication

ABSTRACT

Interactive based on said set steps of authentication methods for the recognition of a person. During authentication, a previously stored enrollment image is presented on a display to the person. A candidate person is instructed to present a reproduced image of the same scene and/or object to a camera while the person is holding the camera (mobile camera for example) unsupported in free space with respect to the scene or object. Alternatively the user can hold the object unsupported in free space with respect the camera using the camera, a candidate image of the viewed scene or object is captured and presented with the previously stored enrollment image. The candidate person aligns the candidate image with the previously stored enrollment image. On alignment, the candidate image is verified as an authentic image of the person and the candidate person is authenticated as the person previously enrolled. The motivation of the invention is that once a person authenticates and the data alignment is accurate as in the registration. The needed CPU resources decreases dramatically and the level of authentication is increased in few magnitudes.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation application of U.S. application Ser.No. 15/310,769, titled “Methods and Systems for Enrollment andAuthentication”, filed on Nov. 13, 2016, the entire contents of whichare incorporated herein by reference.

BACKGROUND Technical Field

The field of the present disclosure relates to identity verificationusing methods of enrollment and authentication of a person based on acamera and a display.

Description of Related Art

Many resources have been invested into developing reliable schemes foridentity verification in order to prevent fraud in electronic commerce.Existing methods for identity verification may rely on an item that theperson possesses, such as a smart card or a datum that the person knows,such as a password, personal identification number (PIN) or otherinformation.

Considerable effort has been invested in identity verification usingbiometrics, based on physiological and/or behavioral characteristics.Characteristics used for biometric authentication may includefingerprint, retina or iris scanning, voice, signature, and/or face.

U.S. Pat. No. 7,327,858 discloses biometric authentication usingprominent lines of the hand when scanned by a scanning unit such as ascanner with a planar platen.

SUMMARY

Various computerized biometric methods for enrollment and authenticationof a person are provided for herein. During authentication, a previouslystored enrollment image is presented on a display to the person.

It is to be understood that the usage of the term body part in thepresent invention is by a way of example, and shall be replaced by amore generalized object definition including body part and otherpossibilities as defined later on.

A candidate person is instructed to present an object to a camera whilethe person is holding the object unsupported in free space with respectto the camera. Also, the user can capture, using a mobile camera, anystationary object/scene and then may be required to align the camerawith the object. Using the camera, a candidate image of the object iscaptured and presented with the previously stored enrollment image. Thecandidate person aligns the candidate image with the previously storedenrollment image. On alignment, the candidate image is verified as anauthentic image of the person and the candidate person is authenticatedas the person previously enrolled. The previously stored enrollmentimage may be generated independently from the person. The sameenrollment image may be displayed for the enrollment of multiplepreviously unenrolled persons.

During the enrollment, a person may hold an object unsupported in freespace with respect to the camera. Alternatively, a person can hold thecamera unsupported in free space with relation to the stationaryscene/object. The camera may be used to capture the enrollment image ofthe object and background thereof. The authentication may includecapturing the time series of the candidate images of the candidateobject and background thereof.

During the capture, the time series of candidate images is presented ona display superimposed on the enrollment image with the respectivebackgrounds thereof.

The object may be a portion of an item such as a picture or document.The candidate person may align a feature of the object part in thecandidate images with a corresponding feature in the enrollment image.The feature and the corresponding feature may be: a line, point, edge,unique visual trait, color or texture at certain region or any item withcontrast that can be differentiated from the rest of the captured imageof the object portion.

Verification may be performed by comparing the enrollment image with theauthentication image. The alignment may include alignment in horizontal,vertical image coordinates, angular orientation in image space, and realspace distance to camera.

Prior to presentation of the previously stored enrollment image, theenrollment image may be processed by performing horizontal mirrorinversion of the enrollment image.

The candidate person may be instructed to align a feature of the objectin the candidate images with a corresponding feature in the enrollmentimage. Upon the candidate person aligning the feature of the object inthe candidate image with the corresponding feature in the enrollmentimage, one or more of the candidate images is verified as an authenticimage of the candidate person. One or more candidate images may beauthenticated thereby as an authentic image of the candidate person. Thecandidate person is then authenticated as the person previously enrolledby comparing the feature in the candidate image with the correspondingfeature in the enrollment image. A pre-enrollment image of an object maybe captured while the person is holding an object of the personunsupported in free space with respect to the camera. The pre-enrollmentimage may be presented to the person on a display. Upon presentation ofthe pre-enrollment image, the person may superimpose symbols with imagedfeatures of the object as presented on the display. Upon superimposingthe symbols with the imaged features of the object, the enrollment imageis stored with the symbols and respective positions and orientations ofthe symbols in image space in the pre-enrollment image.

The symbols can be applied either from a predefined group of symbolssuch as keyboard stroke generated symbols or characters. Alternativelythe symbols can be user defined such as user hand written symbols,shapes or any other symbol defined by the user.

During registration, the user can define and set a sequence of stepswere each step consist of different/same symbols applying on screenwith/out object capturing. The symbols detailed definition is referredto as one or more password symbols. The mentioned sequence steps canadditionally be timed in such way that only the user can repeat thesynchronized registered known by user sequence steps. The timesynchronization shall be implemented by any indication of timeprogressing such as timer, progress bar, vibration or any other form ofvisual and audio indication of a measured length of time.

Another implementation can be any keyboard stroke for time interval werea visual symbol indicating the length of press by the user, includingthe gap between step sequence as defined herein.

Step sequence as defined herein is eligible only if the user canreproduce or synchronize the same step sequence in the authenticationphase as in the registration. The current invention describes on screenhints to help the user reproduce the same registration step in theauthentication phase.

Prior to the superimposition, the symbols may be relocated, re-sizedand/or rotated. The presentation on the display to the candidate personof the enrollment image may include the stored symbols and at least aportion of an image of the object. Alternatively, the presentation onthe display to the candidate person of the enrollment image may includepresentation of the stored symbols without any portion of an image ofthe object. Multiple previously defined enrollment scales may bepresented on a display to the person. The person may select one or moreof the scales presented on the display to produce thereby a selectedenrollment scale. The person may superimpose and/or reposition one ofthe enrollment images with the selected scale. The selected scale may bestored as an enrollment image. The authentication includes presentationon a display of the time series of the candidate images superimposed onthe selected enrollment scale

The candidate person may align the candidate images with the selectedenrollment scale.

During the authentication, the presentation of the enrollment scale tothe person may include multiple enrollment scales and the candidateperson may select person the selected enrollment scale.

Various mobile computer systems are provided herein enabled to performthe computerized biometric methods as disclosed herein, wherein thecamera and the display are parts of the mobile computer system.

Various computer readable media are provided for herein encoded withprocessing instructions for causing a processor to execute the methodsdisclosed herein.

The foregoing and/or other aspects will become apparent from thefollowing detailed description when considered in conjunction with theaccompanying drawing figures.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention is herein described, in a non-limiting manner, by way ofexample only, with reference to the accompanying drawings, wherein:

FIG. 1 illustrates a simplified block diagram of a mobile computersystem, for operation of different features of the present invention.

FIG. 2 shows a flow diagram of a method, according to a feature of thepresent invention. FIG. 2 a shows an embodiment of the invention whereina user uses a mobile device camera to start an identification process ofthe invention. FIG. 2 b shows an embodiment of the invention wherein auser holds an object in view of the mobile device camera to start anidentification process of the invention.

FIG. 3 shows an enrollment image presented on a display with abackground also captured according features of the present invention.

FIG. 4 shows enrollment and authentication images superimposed withrespective backgrounds, according to the method illustrated in FIG. 2 .

FIG. 5 illustrate another method of biometric enrollment andauthentication, according to a feature of the present invention.

FIGS. 6 and 7 show examples of previously stored enrollment imagesrespectively on a screen according to a feature of the presentinvention.

FIG. 8 shows a flow diagram of a method, including different features ofthe present invention.

FIG. 9 and FIGS. 10 a and 10 b show a flow diagram of a method and anenrollment images respectively, according to different features of thepresent invention.

FIG. 11 shows a method of the invention.

FIG. 12 shows an illustration of scaled symbols presented on screen,according to the method illustrated in FIG. 11 .

FIGS. 13 and 14 show an illustration of possible user superimposing ofan object with said scaled symbols of FIG. 12 according to the methodillustrated in FIG. 11 .

FIG. 15 shows a set of QR codes used in an embodiment of the invention,illustrating the positioning of the graticule line.

FIG. 16 show examples of an enrollment and authentication methods usingsaid set timed sequence of step/s, according to the method illustratedin FIGS. 5 and 9 .

The foregoing and/or other aspects will become apparent from thefollowing detailed description when considered in conjunction with theaccompanying drawing figures.

DETAILED DESCRIPTION

Reference will now be made in detail to embodiments of the presentinvention, examples of which are illustrated in the accompanyingdrawings, wherein like reference numerals refer to the like elementsthroughout. The embodiments are described below to explain the presentinvention by referring to the figures. The term “registration” as usedherein refers to spatial alignment of image features of different imagescaptured at different places and/or times of similar or identicalobjects in different image frames.

The term “identification” as used herein refers to receiving initialinformation, name, identity card number or other information useful foruniquely identifying the user which a user presents prior or duringenrollment. The term “enroll” or “enrollment” as used herein refers toan initiation of a user in the biometric system during which biometricinformation is received and stored for later identity verification orauthentication. The term “enrollment image” refers to image captureduring enrollment The term “authentication” as used herein refers to abiometric verification that the user is who he/she is claimedhimself/herself to be during identification.

The term “verification” as used hereinafter refers to authentication ordenial of authentication based on biometric image features of thecandidate person as one of the previously enrolled persons or thepreviously identified person. The term “superimpose” as used herein inthe context of presenting two or more images simultaneously on a displayincludes either (i) combining two or more images using image processingtechniques and presenting the combined image and/or (ii) presenting tothe user alternatively two or more images so that the appearance to theuser is that of a combined superimposed image. The term “body part” asused herein for use in biometric enrollment and authentication mayincludes: a hand, an eye, an ear, a nose or a facial profile or portionsthereof of the person.

The term “password symbol” may be combined of any of the following:signature, image, any shape, character, any combination of connecteddots or pixels and any other form of symbol that may be used foridentification. Hand written symbols upon authentication will beauthenticated as biometric signature as known to the one skilled in theart of image processing and biometrics.

The term “region of interest” as used herein refers to any portion ofthe enrollment image selected and marked on screen by the user duringregistration. Upon authentication of the object the region of interestportion must be correlated independently of the whole image of theobject. The correlation process is known to the one skilled in the artof image processing.

The articles “a”, “an” is used herein, such as “a candidate image”, “anenrollment image”, “a background” have the meaning of “one or more” thatis “one or more candidate images”, “one or more enrollment images” and“one or more backgrounds”.

The term “object” as defined herein relates to anything that can bephotographed. Object, in more details as defined herein comprises ofanything that can be captured by camera, anything that can be combinedof tangible objects (a portion of a room, building etc), movable itemssuch as body part as defined above, a photograph, a drawing, a graphicobject, document, 3D object, barcode, QR code or any other form ofvisual code, picture, card of any kind or any combination of the like.Furthermore the term “object” relates to visually reproducible scenethat is and that can be captured during registration and repeatedlysuperimposed upon screen partial/distorted image with the candidateimage of the same object and/or scene.

The object should contain sufficient contrast, edges and should bereproducible so that the authentication phase can succeed.

By way of introduction, different embodiments of the present inventionmay find use in a number of different biometric methods to identify andenroll a user in the system and subsequently authenticate a candidateperson as one of the previously enrolled users. Embodiments of thepresent invention are intended to be used with a camera and atwo-dimensional or three dimensional display as may be available in amobile computer system, e.g. smart-phone. In some embodiments of thepresent invention, the user during enrollment presents unsupported infree space an object, e.g. hand, and an enrollment image is captured.Subsequently, the person when for instance he/she desires to perform anInternet transaction, for example, presents the same object, e.g. hand,and an authentication image is captured also with the hand unsupportedwith free space between the camera and hand. The authentication imagemay be processed to be of the same hand as used for the enrollment imageand authentication is achieved, or otherwise authentication is denied.

When an enrollment image is used again for authentication, theenrollment image when presented for authentication purposes may beblurred, manipulated in gray scale or color, resolution reduced,partially displayed or otherwise image processed, to render it difficultfor an imposter to reconstruct an authentication image from theenrollment image when presented during authentication.

In various embodiments of the present invention to be presented infurther detail, authentication may be in a different location and/ortime or date or using a different computer system from enrollment, andany object may suitable for biometric enrollment and authentication.

The processing for authentication and verification of identity may besimilar to the processing techniques disclosed in U.S. Pat. No.7,327,858 such as by comparing specific features between the enrollmentand authentication images. The features used in U.S. Pat. No. 7,327,858are the prominent lines of the hand. However, according to prior artmethods, before the actual authentication processing may be performed,image registration is performed during which the respective images ofthe same features of interest are located in both the enrollment imageand authentication image. Various embodiments of the present inventionare intended to avoid or facilitate image registration between thecommon imaged features of interest in the enrollment image and in theauthentication. Avoiding or facilitating image registration to reducethe computational burden on the processor being used and/or decreasecomputational time demands. Thus there is a need for and it would beadvantageous to have methods and systems useful for avoiding and/orfacilitating image registration between enrollment images andauthentication images to enable authentication of using image capture ofunsupported objects held in free space, or mobile camera device heldunsupported with relation to the object. Although in some embodiments ofthe present invention a mobile computer system is used for enrollmentand authentication, in other embodiments a non-mobile computer systemand otherwise a dedicated computer system may also or alternatively beused.

The process of registration and authentication as described herein shallbe combined from a set of above mentioned sequence steps. Sequence stepsas presented here are steps of which a user must follow in the sameorder and/or time synchronizations. These sequence steps can becomprised of on screen superimposed candidate images of the same objector view. Furthermore, these sequence steps can be any combination ofsymbols on screen placement, drawing, keyboard stroke or any othercombination of the like.

Before explaining embodiments of the invention in detail, it is to beunderstood that the invention is not limited in its application to thedetails of design and the arrangement of the components set forth in thefollowing description or illustrated in the drawings. The invention iscapable of other embodiments or of being practiced or carried out invarious ways. Also, it is to be understood that the phraseology andterminology employed herein is for the purpose of description and shouldnot be regarded as limiting.

Referring now to the drawings, FIG. 1 illustrates a simplified blockdiagram of a mobile computer system 100 according to features of thepresent invention. Mobile computer system 100 is connectible over anetwork 106 to a server 108. Mobile computer system 100 is alsoconnectible through a cellular base station transceiver 119 to cellularnetwork

121. Mobile computer system 100 includes a processor 110C connected tolocal data storage 102. A data communications module 104C operativelyconnects processor 110C to data network 106. A cellular communicationsmodule operatively connects processor 110C to cellular network 121.Mobile computer system 100 may include operatively connected toprocessor 110C peripheral accessory devices such as a display 109,global positioning system 107, a camera 105, a microphone 111, a speaker113, a vibrator 115 and accelerometer/gravity sensor, Bluetooth™, IRsensor (not shown). Reference is now made to FIG. 2 which shows a method301 of biometric enrollment and authentication, according to a featureof the present invention. Method 301 includes steps 303, 305 forenrollment of a person and steps 307-317 forauthentication/non-authentication or verification of a person. In step303, an image of an object, e.g. card of a person is captured, usingcamera 105 of mobile computer system 100 for instance, to capture anenrollment image of the object e.g. card.

Reference is now also made to FIG. 2 a which shows a person holding hishand without a key, and then in FIG. 2 b with a key 20 free in spacewith respect to the camera 105 and/or display 109 (of an IPAD™ forexample. being used as an example of a mobile computer system 100).Display 109 shows an enrollment image 20 of the key, palm, wrist plusarm of the person and the background which includes the face and torsoof the person. Camera 105 and/or display 109 may be mounted on a standso that both hands of the person are free. FIG. 2 a is by way of exampleonly, another object such as card, document, any photo or scene may becaptured to provide enrollment image 20.

Reference is now made to FIG. 3 which illustrates enrollment image 20including only the key presented for example on display 109 of mobilecomputer system 100. A feature according to embodiments of the presentinvention includes avoiding processing to find the contour of enrollmentimage 20 of the object e.g. key; hence in FIG. 3 , the image of the keyis presented with the background captured during enrollment. Backgroundis shown schematically with an image 22 of a bush in FIG. 109 .

Referring back to FIG. 2 , in step 305 an enrollment image 20 isassociated with the person. The association of the enrollment image 20with the person may include the name of the person, date of birth of theperson, an identification (ID) number or national insurance or socialsecurity number of the person.

Step 307 begins an authentication/non-authentication process of theperson previously enrolled. Authentication may be in a differentlocation and/or time or date or using a different computer system fromenrollment steps 303-307.

Reference is now also made to FIG. 4 which illustrates display 109during authentication. In step 307, enrollment image 20 is presented ondisplay 109 along with background image 22.

Referring back to FIG. 2 , in step 309, a candidate person is instructedto present the object, e.g. key, to a camera 105 and a time series, e.g.video, of candidate images 40 are captured of the key of the candidateperson. Candidate images 40 may include image of the candidate object ofthe candidate person as well as respective background images 42.According to a feature of the present invention, as in enrollment image20, candidate images 40 are presented with respective backgrounds whileavoiding finding the contour of the image of the object to extract andpresent an image of the object without background. In FIG. 4 ,background of candidate image 40 of a key is shown schematically withthe image 42 of a house.

Still referring to FIG. 2 , in step 311, the time series of candidateimages 40 are displayed on a display 109 while capturing (step 309)along with enrollment image 20 previously captured in step 303.Therefore in step 311, one or more candidate images 0 are superimposedon the enrollment image 20 with the respective backgrounds 42 and 22.

In step 313, the candidate person aligns, i.e. positions and repositionsthe object, e.g. key, in front of camera 105 so that one or morecandidate images 40 align with enrollment image 20 on display 109. Toenable alignment in step 313, enrollment image 20 and or candidateimages 40 after being captured (step 303), may be processed such as withhorizontal mirror inversion prior to display (step 311) on display 109.

The basis for alignment in step 313 may be a feature of the object inthe candidate images 40 with a corresponding feature in the enrollmentimage 20. The feature and the corresponding feature may be a contrastbased feature such as edges lines points or any visual differential arealocated in the object image object on the object or candidate objectrespectively. Alignment step 313 includes alignment in horizontal,vertical image coordinates, angular orientation in image space, and realspace distance to camera 105. In decision block 315 when one or morecandidate images 40 are aligned with the enrollment image 20 on display109, verification step 317 may be performed. During verification, (step317), the candidate person may be verified as a previously enrolledperson and/or previously identified person in steps 303-305 by comparingthe enrollment image 20 with an authentication image previously storedaccording to any techniques known in the art of image processing.

In decision block 315 when one or more candidate images 40 are not yetaligned with the enrollment image 20 on display 109, alignment continuesin step 313 by the candidate person.

Reference is now made to FIG. 5 which illustrates another method 501 ofbiometric enrollment and authentication, according to a feature of thepresent invention. Biometric method 501 includes steps for enrollmentand authentication of a person. In step 503, an object of a person iscaptured using camera 105, to produce an enrollment image 20 of theobject, e.g. key. In step 305 the enrollment image 20 is associated withthe person. Step 507 begins an authentication stage, the enrollmentimage 20 is presented on a display 109 with or without background 22. Instep 509, a candidate person is instructed to present his/her key forexample, to a camera 105 and a time series of candidate images 40 arecaptured of the object, e.g. key of the candidate person. Candidateimages 40 include an image of a candidate object of the candidate personpresented with or without background image 42. In step 511 the timeseries of candidate images are displayed on a display 109 duringcapturing (step 509) along with display of the enrollment image 20 (withor without background 22) previously captured in step 503. In step 511,the candidate images 40 are superimposed on the enrollment image 20.

In step 513, the candidate person is able to align, position andreposition his/her object in front of camera 105 so that candidateimages 40 are aligned with enrollment image 20 on display 109.

In order to facilitate alignment, enrollment image 20 and/or candidateimages 40 after being captured (step 503), may be processed withhorizontal mirror inversion prior to display on display 109.

The basis for alignment in step 513 may be an image of a feature of theobject in candidate images 40 with a corresponding image of a feature inthe enrollment image 20. The feature and the corresponding feature maybe line, dot, and area on object with visual differential from otherpart on the object or candidate object respectively. The term “feature”as used herein in the context of alignment of an object may exclude“contour” or the outer edge the body part. Alignment in step 513 may beperformed without aligning imaged contours of the object. The imagecontours are not necessarily visible on display 109 for candidate images40 and/or enrollment image 20. Alignment step 513 of an image featureincludes alignment in horizontal, vertical image coordinates, angularorientation in image space, and real space distance to camera 105.

In decision block 315 when one or more candidate images 40 are alignedwith the enrollment image 20, authentication/non-authentication may beperformed. Authentication of the candidate person may be verified as thepreviously enrolled person by comparing the enrollment image 20 with theauthentication image. Authentication is verified by associating (step317) the candidate image as an authentication image of the candidateperson. In decision block 315 when the time series of candidate images40 are not fully aligned with the enrollment image 20 on display 109,alignment by the candidate person the candidate images 40 with theenrollment image 20 continues in step 513.

Reference is now made to FIG. 6 which shows a method 801, according to afeature of the present invention. In step 807 a previously storedenrollment image is shown to a person for enrollment purposes. Referenceis now also made to FIGS. 7 and 8 which show examples of previouslystored enrollment images 65 and 75 respectively on display 109.Enrollment image 65 is an ellipse in which the person aligns a pictureof a hand 33 within ellipse 65. A dotted line 37 is shown going throughellipse 65 may be used to align the image of the middle finger andwrist. Image 75 includes dashed lines to which the person alignsrespective images of the wrist and fingers of picture of the hand 33.

Referring back to FIG. 6 , in step 809, the person is instructed topresent an object, e.g. picture of a hand 33 to camera 105. In step 809,candidate image 40 of the person is captured while the person attemptsan alignment of candidate image 40 with the previously stored enrollmentimage displayed on display 109. With respect to image 65 and step 809,the person aligns images of each fingertip just within perimeter ofellipse 65 and the middle finger are aligned symmetrically around dottedline 37 going through ellipse 65. With respect to image 75 and step 809,the person tries to ensure that each finger of the hand within thepicture 33 is centered and in parallel with dotted lines of image 75. Indecision 815, once the alignment in step 809 is achieved, verificationis performed by verifying (step 317) candidate image 40 as an authenticimage of the person. Otherwise alignment by the person continues withstep 809.

When previously stored enrollment images 65/75 are used, the enrollingperson may select one or more previously stored enrollment images 65/75from a bank of for instance ten to one hundred stored images stored inmemory 102 of mobile computer system 100, for instance with which toperform enrollment capture step 503. The selection of the previouslystored enrollment image 65/75 provides for additional security andallows for the person to select an enrollment image 65/75 suitable toher hand 33 in this example.

Reference is made to FIGS. 9 and 10 a which show a method 901 and anenrollment image 95 shown on display 109 respectively, according to afeature of the present invention. In step 903, enrollment image 95 of anobject of a person is captured with camera 105. The object as shown inenrollment image 95 (FIG. 10 a ) is the hand of the person. Enrollmentimage 95 as captured in step 903 is then presented to the person ondisplay 109 (step 905). On the enrollment image, the person is able tosuperimpose (step 907) symbols 101, e.g. rectangle over features of theobject as presented on display 109. Features of the hand as shown inFIG. 10 a may include ridges, lines, wrinkles, scars or the curvedportion connecting fingers. Superimposition (step 907) may include theperson relocating, resizing and/or rotating the symbols over thefeatures.

In decision 909, upon successfully superimposing symbols 101 on display109 with features of the hand. The symbols 101 are stored along withrespective positions, orientations, and features of the hand and/orsymbols 101 in image space as the enrollment image 95 (step 911). If thesymbols 101 on display 109 are not yet superimposed with features of thehand, superimposing continues with step 907.

Referring back to FIG. 9 , authentication of a candidate person nowcontinues with steps

913-921. In step 913, the enrollment image 95 stored in step 911 ispresented on display 109. Mobile computer system 100 in step 913,instructs the candidate person to present a candidate body part to acamera. With the candidate body part being a hand for example, a timeseries of candidate images are captured of the hand with camera 105.During capturing step 913, the time series of candidate images aresuperimposed (step 915) with enrollment image 95 and displayed ondisplay 109. In step 917, at least one of the candidate images may bealigned with enrollment image 95 so that corresponding features inenrollment image 95 and one or more of candidate images are aligned. Inaligning (step 917), the candidate may move her hand in front of camera105 so that features, e.g. lines, wrinkles, etc used for identificationknown only by the enrolled person are aligned with symbols 101. Indecision 919, upon a successful alignment of the correct features withthe symbols then verification 317 may be performed based for instance onthe teachings of U.S. Pat. No. 7,327,858. Otherwise, upon unsuccessfulalignment or denial of authentication, the candidate person mayinstructed again to present her hand again in front of camera 105 withstep 913. The user can use simultaneously, or in a specific sequence thefrontal, back or any other cameras of the mobile device.

Reference is now made to FIG. 10 b which illustrates another example ofthe use of symbols 101 shown as software pegs 101 on display 109.Software pegs 101 b may be positioned by the person so that softwarepegs 101 locate the curved connection between fingers, for example.Reference is made to FIG. 11 which includes a flow diagram illustratinga method 1101, according to a feature of the present invention. In step1103, a person is presented with multiple previously defined enrollmentscales on display 109. Examples of previously defined enrollment scalesshown on display 109 are shown in FIG. 12 as scales or graticules 1201a-1201 c which have respective graticule lines 1203 a-1203 c.

Referring back to method 1101, FIG. 11 in step 1105, enrollment imagesof an object of the person are captured with camera 105. In step 1107,enrollment image of the person is presented to the person on display109. The person is able to select (step 1109) a graticule scale 1201a-1201 c, whilst enrollment images are superimposed with the selectedgraticule or scale 1201-1201 c. Using graticule 1201 b as the selectedscale, the person may reposition or rotate selected graticule scale 1201b so that graticule line 1203 b is positioned on the top part of thedoor 1205 b as shown in FIG. 14 . Alternatively, the person rotates andpositions their hand so that graticule line 1203 b is positioned on line1205 b of the top part of the door as shown in FIG. 15 . Referring backto method 1101, FIG. 11 , in step 1111 an enrollment image 20 of theobject of the person is stored along with selected graticule scale 1201b and associated with the enrolled person.

Authentication steps 1113-1123 are the steps which verify that acandidate person is or is not the person previously enrolled in steps1101-1111. In step 1113, identification (ID) number of a candidateperson may be received by mobile computer system 100.

The candidate person is instructed by system 100 to present a candidateobject to camera

105 so as to capture candidate images 40 of the candidate object (step1115).

The captured candidate images are presented (step 1117) superimposed onthe selected enrollment scale. 1201. In step 1119, the candidate alignsone of the candidate images with selected enrollment scale 1201. Indecision block 1121, if there is an alignment between candidate image 40and selected scale 1201, then candidate image 40 may be verified or notverified as an authentic image of the candidate person as the previouslyenrolled person in step 1123. Otherwise in decision 1121 alignment bythe candidate person may continue in step 1119 or after number of failedalignments, the candidate person is notified that an authentication ofthem was unsuccessful.

Further security features are involved in steps 1115 and 1117. In orderto verify (step 317) candidate image 40 as an authentic image, candidateobject and features need to be identical to the object and features usedduring enrollment. Moreover, selected scale 1201 has to be selected bythe candidate person as that used during enrollment, to achieveverification that the candidate image is authentic.

During the enrollment processes shown above in FIGS. 13, 14 , there maybe no knowledge by mobile computer system 100 of the object details(size etc) of an object to be enrolled. Therefore, in the enrollmentstage, several graticule scales 1201 which have respective graticulelines 1203 may be displayed on display 109 and the person aligns theirobject to each scale 1201. Objects can be aligned to scales 1201 wherethe whole object should be placed inside a rectangular box of scale1201.

Referring to FIG. 13 , when the person aligns the object door on display109 to each of the scales 1201 during enrollment, as a result, theobject may be actually placed at different distances to camera 105 foreach of the scales 1201. Mobile computer system 100 may select the bestscale 1201 for the user where the features extracted from enrollmentimage 20 related to corresponding scale 1201, are the most robust anddistinct. From this point on the best selected scale 1201 may be usedfor the person and an enrollment image saved and used duringverification.

Regarding the one of many verification processes described above. Thesame enrollment mechanism may be used by any one of the verificationprocess described above and a candidate person will have to select therequired scale 1201 and place the object according to their choice ofobject alignment placement. In the event of one too many attemptedverifications of the candidate person, the candidate person mayalternatively align their object exactly as in the enrollment phasewithout presenting any information regarding their identity. The numberof attempted verifications of the candidate person may now be limitedonly to related enrollees in the same scale and rotation and the usermay be identified.

Using graticule 1201 b as the selected scale, the person may repositionor rotate selected graticule scale 1201 b so that graticule line 1203 bis positioned on 1205 a of the shoes of the lady in the picture as shownin FIG. 14 . Alternatively, the person rotates and positions the mobilecamera so that graticule line 1203 b is positioned on line 1205 b of thetop line of a door as shown in FIG. 15 . The alternatives presented byFIGS. 14 and 15 may apply to both the enrollment and verificationprocesses or just to the enrollment process. In the verification processthe scales 1201 may be predefined and unchangeable on display 109.

The process of verification may be repeated in a specific way. Forexample, during enrollment the user selects one of scales 1201 a, 1201b, and 1201 c and aligns object 1205 a the woman shoes to scale 1201 bto line 1203 b. If verification is successful, the user continues to asecond verification step with a different scale and so on. For a moresecure option, the user during enrollment may combine scales 1201 insequential verification steps and hence create a password from theordered sequence of scales 1201.

In another implementation a user can capture a card and use a sequenceof card placements and alignments with different scales or symbols onscreen. The steps of card alignment and the timing of the card alignmentwith scales are registered in such a way that during authentication animposter cannot guess the right sequence and timing. That way animposter will need the card, mobile with specific scales and the rightsequence of card placement and the timing of each step. For example theuser aligns the card with any first scale for two seconds and thenaligns the card on two more scales for 0.5 second. The system willverify the card's authenticity as well as correct alignment as in theregistered sequence of scaled symbols and timing of card presentation.

The usage of different cards of different sizes such as driver's licenseor passport may require different symbols sizes. In order to verify thatthe card is in the right focal distance from the camera to which thecard is in the best focus state. For example, a driver's license willhave a small bounding square on the screen, whereas for a passport amuch bigger square may be required on the display. When the user wishesto authenticate a card it should be aligned with the matching boundingsquare on screen. That way the card can be read in the best focaldistance without any auxiliary reading devices.

Wherein the usage of a device may be required, a mobile device is placedin a way that a reflective mirror reflects the inner palm of the hand.In this implementation the mobile camera can capture the palm of theuser and authenticate the user. Due to the mirror, the user can see thedisplay of the mobile (due to the angle of mobile placement) andinteract with the mobile camera. Additionally, the user can capture theback part of the hand and then place the hand in the lower part of thedevice. This method allows interaction with the mobile device display asin the current invention and at the same time identify the person usingthe hand. In this specific implementation the mobile device can bepositioned by users on the auxiliary device and together with the mirrortake a picture of the hand placed on a surface like or peg like deviceto stabilize the hand in a fixed location and distance from the mobileback camera.

This way the user can place any mobile camera and create a most robustsolution. If the upper part of the hand is fetched, no mirror is neededand the hand is placed underneath the mobile device. Due to the mobileposition, in this implementation the user can interact with the mobiledisplay as in the present invention for the purpose of access control,pos and any other application requiring authentication etc.

Reference is now made to FIG. 156 which illustrates sequence steps forauthentication and registration. The user is instructed to captureseveral QR codes from a grid of 9 square than contain different QRcodes. On the device display 109 a symbol display box displays the viewimage. The symbol display boxes 1301, 1301 a, 1301 b and 1301 c displaythe captured image in each of the four steps of authentication andregistration. Timer symbol 1303 is displaying either the time sincestart of the whole sequence or the length of capture time for each stepas defined in the registration. The display boxes of the captured imagesin 1305, 1307, 1309, and 1311 squares are coordinated with the timestamp in 1303 for each step. In phase one the user captures on displaybox 1301 a only the QR codes in square 1305 and neighboring square onthe left (which is part of 1307). In the second step in which isperformed in box display 1301 b the user captures QR codes in squares1309 and 1311 as displayed in 1303. In the third step the user captureson box 1301 c the four QR squares from box 1307 for the length of 3seconds. Once all of the QR capturing steps were done and alignedcorrectly in the right order and in the registered timing frames onscreen in box 1303, the user is authenticated.

The user can alternatively capture and align grid squares of picturesand symbols either on a card, wall, sign and any other availablesurface. During registration the user captures a sequence of gridpictures each aligned with on-screen grids or cells in any desiredcombination. Upon authentication, the user holds the mobile device andaligns the on-screen grid symbols with the grid pictures as in theregistration steps sequence. The authentication steps can besynchronized with a timer or with any other display symbol measured onscreen.

The user can either align the mobile camera with the object or align thecard with the camera. Additionally, any other combined stationary andtangible movable objects such as cards can be part of the desiredsequence of authentication.

Another example is if there are nine squares of the same size arrangedlike on the iPhone™ password screen. During verification the user maypresent the lines of one finger inside a specific square and then thelines of another finger at in a different specific square and so on. Thecombination of steps is saved in the enrollment phase. During theverification the user follows the same verification steps as definedduring the registration. Hence an imposter cannot predict thecombination of finger placements and selections of squares in the orderperformed during initial enrollment.

The on screen symbols as aligned with the object viewed can bepredefined or user defined in any order and placement. The symbols canbe resized, reordered, moved or hand written by the user in such a waythat allows the user to align the on screen symbols with the viewedscene as in the registration. The user must select a reproducible sceneso the authentication would succeed.

For example, if the user selects a tree as part of the scene image it ispossible that the tree will change form and the image would not bereproducible and not eligible for usage. Additionally, the sequence ofdefined steps during registration and upon followed authentication cancombine any form of password like keyboard typing. Said password typingcan be combined within the registration steps either alone or with thepresented steps as described in the present invention. For example, theuser can type the password with specific timing sequence: differenttiming for pressing each password letter or time length of gap betweeneach character or any other combination. During authentication a visualtime display will be present comprising of: timer display, progress bar,or any other equalizer look alike or any other time display notificationfor showing the desired measured character pressing on each characterand any other combination of symbols for sequence timing of the keyboardcharacter press time length and gap between character presses. In such away an imposter even if the password is known cannot use it since theright sequence timing of the character pressing is not known to him.That way instead of using multiple passwords the user can use samepassword and it would be hard to break due to the endless password likepermutations.

The keyboard sequence timing can be timely combined in any combinationwith all other sequence view images alignment and hand written symbolsor any other presented way of authentication.

It is believed that if a person could use the same easy to rememberpassword while maintaining the highest level of security, it wouldchange the way people perform identifications.

An imposter that obtained the password cannot use it if he does not knowthe right step sequence since there are many combinations. Since thefollowing steps are easily reproducible and intuitive, the user cancreate a level of complexity as wanted and not be limited by specificimplementation as long as the sequence is reproducible. Referring now toFIG. 167 illustrates a hand written user symbol such as signaturebiometrics. During registration, at the first step the user paints onthe screen device 109 a registered symbol or signature as shown in 1401.Subsequently, during the second step the person aligns auxiliary symbolsor markers of any kind with the registered symbol or signature of stepone 1401 display symbol. During the registration the user in the secondphase uses the display box 1402 to erase a part of the signature.Auxiliary symbols comprise of any symbol aligned with registered symbolor signature, removing parts of the registered signature, distortion ofany kind of the signature and any other symbol marking parts of thesignature.

During verification the display can contain auxiliary markers/hints ofphase two of the registration 1402 display. The presented process allowshigh levels of signature biometrics authentication. The signaturedistortion of step two comprises of blurring, geometric distortion orany other image manipulation to disable said enrollment imagesreconstruction as in 1401.

Another possible implementation comprises the following steps:

In step one the user applies a signature or a symbol on display 109 inthe symbol box 1401. In step two, signature on the display box symbol1401 is displayed on screen 109 and the user applies arbitrary symbols,scrambled lines and any other symbols to conceal original signature asin symbol box display 1402. Upon authentication, the user views thescrambled lines with the concealed signature in display symbol 1402. Theuser applies the signature or symbol by following the lines of theconcealed signature or symbol of the registration phase one 1401. Inthis implementation an imposter will have a hard time to differentiatethe signature from the other concealing symbols of phase two of theregistration 1402. The new level of authentication method sets a newhard to break within short limited time frame. The handwritten mark orsymbol can be combined with any other form of user authentication.During authentication the user is displayed with one or more randomlyselected enrolment images in a consecutive manner with an unknowncombination.

Additionally, the enrolled biometric method can comprise from a setsequence of registered images or registered video as described herein.Upon authentication the user shall superimpose the object with the onscreen registered video or registered image sequence of objects orsymbols moving on screen as presented within the registration.

For example, upon registration the user can continuously superimposeselected moving line on screen with left edge of the driver license.Alternatively, the user can superimpose the driver license with themoving line at specific synchronized locations of the line on screen. Inyet another example, the user can define a set of symbols such as linesor symbols moving on screen. During registration, two lines on screenare rotating at different directions and the user superimposes theobject at specific synchronization and location of the lines on screento one or more of the moving lines. Upon authentication, the two linesare displayed on screen and the user shall follow the registeredsynchronized location, time with the object. Only the user knows thecorrect line alignment and synchronization between the line and theobject and would be authenticated as an authentic person.

The user could alternatively capture a view image and align or applysymbol in specific location and time on the view image as an additionalsequence step of authentication method.

In yet another example of time display symbols, the display can containa clock like display with moving hands the user can use it as a timedisplay synchronization method mentioned herein. Additionally, the usercan press or swipe on the watch display once the moving hands of theclock reach certain location on the watch or capture certain view image.

The display symbol can also be comprised of any scaled symbol of anykind or any other quantity measurement oriented symbol. For example theuser can use a display bar at a range of numbers of one to one thousand.By sliding finger on the on screen bar the user selects a desired numberas an additional sequence step during the authentication. The bar can beof any kind, range number and accuracy as desired. Another symbol optioncan be any symbol with different portions of color and texture that theuser can select as an additional sequence step in the registration andauthentication.

The invention may make use of a hand written user symbol such assignature biometrics. During registration first step the user paints onthe screen device a registered symbol or signature as shown in 1401.Subsequently, during second step the person aligns auxiliary symbols ormarkers of any kind with the registered symbol or signature of step one1401 display symbol. Still during the registration the user in thesecond phase using display box 1403 erases part of the signature.Auxiliary symbols comprise of any symbol aligned with registered symbolor signature, removing parts of the registered signature, distortion ofany kind of the signature and any other symbol marking parts of thesignature.

During verification the display can contain the auxiliary markers/hintsof phase two of the registration 1402 display. The presented processallows high levels of signature biometrics authentication. The signaturedistortion of step two comprises of blurring, geometric distortion orany other image manipulation to disable said enrollment imagesreconstruction as in 1401.

Another possible implementation consists of the following steps: stepone the user applies a signature or symbol on display 109 in the symbolbox 1401. In step two, signature on display box symbol 1401 is displayedon screen 109 and the user applies arbitrary symbols, scrambled linesand any other symbols to conceal original signature as in symbol boxdisplay 1403. Upon authentication the user views the scrambled lineswith the concealed signature in display symbol 1403. The user appliesthe signature or symbol by following the lines of the concealedsignature or symbol of the registration phase one 1401. In thisimplementation an imposter will have hard time to differentiate thesignature from the other concealing symbols of phase two of theregistration 1402. The new level of authentication method sets a newhard to break within short limited time frame. The handwritten mark orsymbol can be combined with any other form of user authentication.

During authentication the user is displayed with one or more randomlyselected enrolment images in a consecutive manner with an unknowncombination.

Additionally, the enrolled biometric method can consist of a setsequence of registered images or registered video as described herein.Upon authentication the user shall superimpose the object with the onscreen registered video or registered image sequence of objects orsymbols moving on screen as presented within the registration. Forexample upon registration the user can continuously superimpose selectedmoving line on screen with left edge of the driver license.Alternatively the user can superimpose the driver license with themoving line at specific synchronized locations of the line on screen.

In another example the user can define said set of symbols such as linesor symbols moving on screen. During registration two lines on screen arerotating at different directions and the user superimpose the object atspecific synchronization and location of the lines on screen to one ormore of the moving lines. Upon authentication the two lines aredisplayed on screen and the user shall follow the registeredsynchronized location, time with the object. Only the user knows thecorrect line alignment and synchronization between the line and theobject viewed and would be authenticated as an authentic person.

The user could alternatively capture a view image and align or applysymbol in specific location and time on the view image as an additionalsequence step of authentication method.

In another example of time display symbols, the display can contain aclock like display with moving hands the user can use it as a timedisplay synchronization method mentioned herein. Additionally, the usercan press or swipe on the watch display once the moving hands of theclock reach certain location on the watch or capture certain view image.

The display symbol can also be comprised of any scaled symbol of anykind or any other quantity measurement oriented symbol. For example theuser can use a display bar at a range of numbers of one to one thousand.By sliding finger on the on screen bar the user selects a desired numberas an additional sequence step during the authentication. The bar can beof any kind, range number and accuracy as desired. Another symbol optioncan be any symbol with different portions of color and texture that theuser can select as an additional sequence step in the registration andauthentication. When a user inserts a password using a keyboard, eachkeyboard press time is translated to a bar progress notification on thedisplay. Alternatively, the user can press on a symbol between thepassword typing. For example, after typing three first letters of thepassword the user can press on a symbol with scale digits at aremembered location as it was during the registration. The time passedbetween typing the letters can also be shown at a notification bar orother type of progress symbol showing passed time.

The embodiments of the present invention may comprise a general-purposeor special-purpose computer system including various computer hardwarecomponents, which are discussed in greater detail below. Embodimentswithin the scope of the present invention also include computer-readablemedia for carrying or having computer-executable instructions,computer-readable instructions, or data structures stored thereon. Suchcomputer-readable media may be any available media, which is accessibleby a general-purpose or special-purpose computer system. By way ofexample, and not limitation, such computer-readable media can comprisenon-transitory physical storage media such as RAM, ROM, EPROM, flashdisk, CD-ROM or other optical disk storage, magnetic disk storage orother magnetic storage devices, or any other media which can be used tocarry or store desired program code means in the form ofcomputer-executable instructions, computer-readable instructions, ordata structures and which may be accessed by a general-purpose orspecial-purpose computer system.

In this description and in the following claims, a “computer system” isdefined as one or more software modules, one or more hardware modules,or combinations thereof, which work together to perform operations onelectronic data. For example, the definition of computer system includesthe hardware components of a personal computer, as well as softwaremodules, such as the operating system of the personal computer. Thephysical layout of the modules is not important. A computer system mayinclude one or more computers coupled via a computer network. Likewise,a computer system may include a single physical device (such as a phoneor Personal Digital Assistant “PDA”) where internal modules (such as amemory and processor) work together to perform operations on electronicdata. While any computer system may be mobile, the term “mobile computersystem” especially includes laptop computers, notebook computers,cellular telephones, smart phones, wireless telephones, personal digitalassistants, portable computers with touch sensitive screens and thelike.

In this description and in the following claims, a “network” is definedas any architecture where two or more computer systems may exchangedata. The term “network” may include wide area network, Internet localarea network, Intranet, wireless networks such as “Wi-Fi™”, virtualprivate networks, mobile access network using access point name (APN)and Internet. Exchanged data may be in the form of electrical signalsthat are meaningful to the two or more computer systems. When data istransferred or provided over a network or another communicationsconnection (either hardwired, wireless, or a combination of hardwired orwireless) to a computer system or computer device, the connection isproperly viewed as a transitory computer-readable medium. Thus, any suchconnection is properly termed a transitory computer-readable medium.Combinations of the above should also be included within the scope oftransitory computer readable media and non-transitory computer-readablemedia. Computer-executable instructions comprise, for example,instructions and data which cause a general-purpose computer system orspecial-purpose computer system to perform a certain function or groupof functions.

The term “server” as used herein refers to a computer system including aprocessor, data storage and a network adapter generally configured toprovide a service over the computer network. A computer system whichreceives a service provided by the server may be known as a “client”computer system.

Although selected embodiments of the present invention have been shownand described, it is to be understood the present invention is notlimited to the described embodiments. Instead, it is to be appreciatedthat changes may be made to these embodiments without departing from theprinciples of the invention, the scope of which is defined by the claimsand the equivalents thereof.

What is claimed is:
 1. A computerized biometric method comprising:enrollment and authentication of a user, wherein the authenticationincludes: presenting on a display at least one previously storedenrollment image to a candidate person; wherein the at least onepreviously stored enrollment image is fetched from an electronic mediumor a previously stored enrollment image is acquired visually using animaging device from a photograph selected from the group consisting of:a photograph from a passport, video, identification card, driver'slicense and other identification document; instructing the candidateperson to present a view object to a camera; using the camera, capturinga times series of candidate images of the view object while enablingalignment of at least one of said candidate images by the candidateperson with at least one of said previously stored enrollment images;and wherein prior to presenting on the display said at least onepreviously stored enrollment image, processing said at least onepreviously stored enrollment image by performing an image manipulationprocess; and upon said alignment, verifying the at least one of saidcandidate images as an authentic image of said view object, therebyauthenticating the candidate person as the user previously enrolled. 2.The computerized method of claim 1, wherein the view object located inview of the camera is held by the candidate person; and wherein saidalignment includes spatial and angular alignment in image space anddistance in real space between the view object and the display.
 3. Thecomputerized biometric method of claim 1, further comprising: prior toauthentication, enrolling the user thereby selecting by the user saidpreviously stored enrollment image from a plurality of previously storedenrollment images.
 4. The computerized biometric method of claim 1,wherein said image manipulation process comprises: reducing resolutionby at least one of: image deletion, distortion, blurring, presentingplurality of said images on the display and a mathematical manipulationon image pixels; wherein said image manipulation process disables anunauthorized reconstruction of an authentication image.
 5. Thecomputerized biometric method of claim 1, further comprising:instructing the candidate person to align a feature of the view objectin said candidate images with a corresponding feature in said enrollmentimages; and upon the candidate person said aligning said feature of theview object in said candidate image with said corresponding feature insaid enrollment image, said verifying at least one of said candidateimages as an authentic image of said view object, thereby saidauthenticating the candidate person as the user previously enrolled bycomparing said feature of the view object with the corresponding featurein said enrollment image.
 6. The computerized biometric method of claim5, wherein said feature and said corresponding feature are selected froma group consisting of: at least a line, a set of points, a symbol, anoutline, edges, an area of differing pixels, a ridge, a beauty mark, ascar, a mole, an area of differing skin pigmentation, a birth mark, anda wrinkle.
 7. The computerized biometric method of claim 1, furthercomprising: performing said verifying by comparing said enrollment imagewith said authentication image.
 8. The computerized biometric method ofclaim 1, further comprising: storing of an enrollment image, whereinstoring of an enrollment image includes: presenting on a display to auser, a plurality of previously stored enrollment image generatedindependently from the person and usable for a plurality of differentusers; and upon aligning a view object with a previously storedenrollment image, storing a previously stored enrollment along with saidview object image as captured during enrollment as an enrollment imagesfor authentication; and wherein upon the authentication, presenting ondisplay said previously stored enrollment image generated independentlyfrom the person; and wherein said verification is applied by comparingsaid view object in said candidate image with said corresponding viewobject image as captured during enrollment.
 9. The computerizedbiometric method of claim 1, wherein during authentication, a selectedpreviously stored set of one or more enrollment images is not displayedon the display and candidate person is required to present to the camerasaid view object as in said enrollment image as part of saidauthentication.
 10. The computerized biometric method of claim 1,wherein during enrollment said view object is unsupported in free spacein at least one dimension of three dimensions while being supported inanother dimension by an auxiliary device with respect to the camera andwherein the authentication includes capturing a time series of saidcandidate images of said candidate person view object using saidauxiliary device with respect to the camera.
 11. The computerizedbiometric method of claim 1, wherein the enrollment and authenticationfurther include presenting said view object sequentially in timedsequence steps previously defined during enrollment; wherein uponenrollment, a user presents said view object to the camera in said timedsequence steps and storing said sequence of enrollment images andcorresponding time frames; wherein during authentication, said candidateperson follows said timed sequence steps of displayed enrollment imagesby following and aligning said view object in candidate view images ascaptured by camera superimposed with said enrollment image as displayedon the display; wherein by aligning said candidate view images with saidcorresponding on the display enrollment view images in the same timeframe allowing verification of one or more sets of aligned candidateimage and corresponding enrollment image; and upon verification of oneor more said sets of candidate image and said corresponding enrollmentimage verifying said candidate person as an authentic person.
 12. Thecomputerized biometric method of claim 11, wherein a time frame is timesynchronized and time measured by using a visual or audio indication ofmeasured length of time, allowing the user to repeat said timed sequenceof view object positioning.
 13. The computerized biometric method ofclaim 12, wherein the registration and authentication include capturinga plurality of said view object images that are continuously captured bythe camera as a said set of enrolled images with specific time frames;and upon authentication, the user presents and aligns the view objectcontinuously to said continuously displayed enrollment images on thedisplay.
 14. The computerized biometric method of claim 13, wherein: aplurality of previously stored enrollment images are frames within avideo generated independently from the person and are used for multipledifferent users; during enrollment, said aligning said candidate viewobject with currently displayed video frame and storing said capturedcandidate view image as enrollment image in same corresponding timeframe of video; upon authentication presenting on display said videoframes enabling said candidate to align said view object with saidcorresponding video frame; and said verification is executed bycomparing said view object in candidate image with said view object insaid corresponding enrollment images as captured during enrollment. 15.The computerized biometric method of claim 11, wherein duringauthentication a selected previously stored set of one or moreenrollment images is not displayed on the display and candidate personis required to present to the camera said view object in said timedsequence steps as in said enrollment images as part of saidauthentication process.
 16. A mobile computerized biometric system,comprising: a camera; a processor; a storage; and code stored in thestorage which, when executed by the processor, configures the processorto: implement an enrollment and authentication of a user, wherein theauthentication includes: presenting on a display at least one previouslystored enrollment image to a candidate person; wherein the at least onepreviously stored enrollment image is fetched from an electronic mediumor a previously stored enrollment image is acquired visually using animaging device from a photograph selected from the group consisting of:a photograph from a passport, video, identification card, driver'slicense and other identification document; instructing the candidateperson to present a view object to a camera; using the camera, capturinga times series of candidate images of the view object while enablingalignment of at least one of said candidate images by the candidateperson with at least one of said previously stored enrollment images;and wherein prior to presenting on the display said at least onepreviously stored enrollment image, processing said at least onepreviously stored enrollment image by performing an image manipulationprocess; and upon said alignment, verifying the at least one of saidcandidate images as an authentic image of said view object, therebyauthenticating the candidate person as the user previously enrolled. 17.A non-transitory computer readable medium encoded with processinginstructions which, when executed, causes a processor to: implement anenrollment and authentication of a user, wherein the authenticationincludes: presenting on a display at least one previously storedenrollment image to a candidate person; wherein the at least onepreviously stored enrollment image is fetched from an electronic mediumor a previously stored enrollment image is acquired visually using animaging device from a photograph selected from the group consisting of:a photograph from a passport, video, identification card, driver'slicense and other identification document; instructing the candidateperson to present a view object to a camera; using the camera, capturinga times series of candidate images of the view object while enablingalignment of at least one of said candidate images by the candidateperson with at least one of said previously stored enrollment images;and wherein prior to presenting on the display said at least onepreviously stored enrollment image, processing said at least onepreviously stored enrollment image by performing an image manipulationprocess; and upon said alignment, verifying the at least one of saidcandidate images as an authentic image of said view object, therebyauthenticating the candidate person as the user previously enrolled.