Personal identification via acoustically stimulated biospeckles

ABSTRACT

An optical sensing device can receive a speckle pattern generated by a laser&#39;s interaction with acoustically stimulated tissue. A computing device can identify one or more characteristics within the received speckle pattern. The computing device can then identify a match of the one or more characteristics to a user biometric signature stored within a storage device. Based upon the identified match, the system can authenticate a user within a computer system.

BACKGROUND

Computing technology has revolutionized the way we work, play, andcommunicate. However, the increased presence of computing technology inday-to-day life has led to a significant increase in security risksrelating to digital data and computing resources. To control access todata and computing resources, a password and/or username have been usedas an initial authentication measure within conventional computingdevices. While a password can provide at least an initial level ofsecurity, passwords are only beneficial when they cannot be guessed orotherwise derived by a malicious actor.

Due to the difficulty users tend to have with remembering increasinglylonger and more complex passwords, many computer security systems havebegun to incorporate biometric authentication. A common method ofbiometric authentication involves digitally imaging an individual'sfingerprint and matching the fingerprint to an authorized user. As such,biometric authentication can allow a user to have a highly complexbiometric password (e.g., a fingerprint), while not necessarilyrequiring the user to recall from memory a long and complex password.Unfortunately, recent research has made it increasingly clear thatconventional, simple fingerprint authentication schemes can be readilydefeated. For example, in at least some cases, a fingerprint scanner canbe defeated with a simple picture of an authorized individual'sfingerprint.

The subject matter claimed herein is not limited to embodiments thatsolve any disadvantages or that operate only in environments such asthose described above. Rather, this background is only provided toillustrate one exemplary technology area where some embodimentsdescribed herein may be practiced.

BRIEF SUMMARY

At least some embodiments described herein relate to a computing systemfor identifying a user through a biometric signature. An acoustictransducer can acoustically stimulate tissue belonging to an individual.A laser (also referred to herein as a “laser device”) can alsoilluminate at least a portion of the stimulated tissue. An opticalsensing device can then receive a speckle pattern generated by thelaser's interaction with the stimulated tissue. A computing device canidentify one or more characteristics within the received specklepattern. The computing device can then identify a match of the one ormore characteristics to a user biometric signature stored within astorage device. Based upon the identified match, the system canauthenticate a user within a computer system.

Additional embodiments described herein relate to a biometric securitydevice for authenticating one or more users based upon a specklepattern. The biometric device can comprise an acoustic transducerpositioned near a tissue-receiving portion of the biometric securitydevice. The acoustic transducer can be configured to stimulate tissuebelonging to an individual. A laser device can be configured toilluminate at least a portion of the stimulated tissue. An opticalsensing device can be positioned to receive a speckle pattern generatedby the interaction of the laser with the stimulated tissue. A computingdevice can be configured to determine an identity of the individualbased upon one or more characteristics of the received speckle pattern.

Further, at least one embodiment described herein relates to a methodfor identifying a user through a biometric signature. The method cancomprise receiving at an optical sensing device a speckle patterngenerated by a laser's interaction with the stimulated tissue. Themethod can also comprise identifying at a computing device one or morecharacteristics within the received speckle pattern. Additionally, themethod can comprise identifying a match of the one or morecharacteristics to a user biometric signature stored within a storagedevice. Further, the method can comprise authenticating a user within acomputer system based upon the identified match.

This Summary is not intended to identify key features or essentialfeatures of the claimed subject matter, nor is it intended to be used asan aid in determining the scope of the claimed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and otheradvantages and features can be obtained, a more particular descriptionof various embodiments will be rendered by reference to the appendeddrawings. Understanding that these drawings depict only sampleembodiments and are not therefore to be considered to be limiting of thescope of the invention, the embodiments will be described and explainedwith additional specificity and detail through the use of theaccompanying drawings in which:

FIG. 1 illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 2 illustrates a side-view of an embodiment of a biometricauthentication system embedded within a hardware device.

FIG. 3A illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 3B illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 3C illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 3D illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 3E illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 3F illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 4 illustrates a chart depicting an embodiment of a Fouriertransform of a laser speckle pattern and an acoustic signal.

FIG. 5 illustrates a schematic of an embodiment of a biometricauthentication system.

FIG. 6 illustrates a flowchart for an embodiment of a method forbiometric authentication.

FIG. 7 illustrates another flowchart for an embodiment of a method forbiometric authentication.

DETAILED DESCRIPTION

At least some embodiments described herein relate to a computing systemfor identifying a user through a biometric signature. An acoustictransducer can acoustically stimulate tissue belonging to an individual.A laser (also referred to herein as a “laser device”) can alsoilluminate at least a portion of the stimulated tissue. An opticalsensing device can then receive a speckle pattern generated by thelaser's interaction with the stimulated tissue. A computing device canidentify one or more characteristics within the received specklepattern. The computing device can then identify a match of the one ormore characteristics to a user biometric signature stored within astorage device. Based upon the identified match, the system canauthenticate a user within a computer system. Thus, a system isdescribed that authenticates a user based upon a speckle pattern.

In various embodiments described herein, a biometric authenticationsystem can authenticate an individual based upon identifiablecharacteristics in a speckle pattern that is generated from acousticallystimulated tissue (also referred to as “biospeckles”). While the laserspeckle pattern can be generated by a laser illuminating any tissuebelonging to a target individual, for the sake of simplicity andclarity, the exemplary tissue discussed herein will relate to anindividual's finger and associated finger structure; however, thebiometric authentication system disclosed herein can be practiced withtissue other than a finger. As such, embodiments of the presentinvention comprise a laser illuminating a target individual's finger, anacoustic transducer stimulating the finger, and an optical receivingdevice for receiving a speckle pattern generated by the laser light'sinteraction with the finger.

The optical receiving device can communicate the received specklepattern to a computing device for analysis. As used herein, a computingdevice can comprise one or more processor, one or more remote computingplatforms, a field programmable gate array, an application specificintegrated circuit, or any other electronic computation device. Invarious embodiments, the computing device may be located locally withthe optical receiving device or may be located remotely, such that atleast a portion of the speckle pattern is analyzed at a remote server.In any case, the computing device may identify, within the specklepattern, one or more characteristics that are associated with useridentification. In particular, the one or more characteristics maycomprise elements of the speckle pattern that are influenced by theacoustic stimulation of the individual's finger.

For example, the acoustic stimulation of an individual's finger maycause the individual's finger bone to vibrate. The various uniquecharacteristics of an individual's finger bone may influence theinteraction of acoustic waves with the bone. For instance, anindividual's finger bone may absorb, or dampen, specific, uniqueacoustic frequencies. In various embodiments, the unique interactionbetween an individual's finger bone, acoustic stimulation, andillumination by a laser may also generate a unique laser speckle patternthat accounts for unique characteristics of an individual's soft tissueand/or unique characteristics of an individual's bones.

Accordingly, a biometric authentication system that utilizes laserspeckle patterns caused by acoustically stimulated tissue can provideseveral benefits. For example, the acoustic stimulation of anindividual's bone can generate a unique speckle pattern that isinfluenced by unique surface and shape characteristics of theindividual's finger bone. As such, embodiments of the above mentionedbiometric authentication system may utilize biometric signatures thatare extremely difficult to maliciously replicate because the biometricsignatures rely upon minute differences in an individual's bones. Incontrast, for example, an individual's fingerprint may be replicatedfrom a picture of the individual's hand.

Turning now to the figures, FIG. 1 illustrates a schematic of anembodiment of a biometric authentication system 100. In at least oneembodiment of a biometric authentication system 100, the system can beconfigured to actuate an acoustic transducer 120. The acoustictransducer 120 can be positioned such that it stimulates a targetindividual's finger 150. The acoustic transducer 120 can be configurableto transmit white noise, Gaussian noise, random noise, and/or specificfrequencies of noise. In at least one embodiment, acoustic stimulationof tissue can include the acoustic stimulation of an individual's fingerbone—causing the finger bone to vibrate.

A laser 130 can illuminate the stimulated tissue 150, causing a dynamiclaser speckle pattern to be generated. The laser 130 may operate withina visible light spectrum, within an ultraviolet spectrum, an infraredspectrum, or any other spectrum suitable for generating a detectablespeckle pattern. Additionally, the laser 130 can be configured to pulselight at specific frequencies and/or patterns (i.e., “frequencymarkers”). Modulating the laser 130 at the specific frequencies and/orpatterns can make the resulting speckle pattern much more difficult tomaliciously fake or manipulate.

For example, in at least one implementation, a computing device (e.g.,one or more processors) 110 in communication with an optical sensingdevice 140 can determine whether the received speckle patterndemonstrates the specific frequency markers, such as frequencies and/orpatterns of the laser light. If the received speckle pattern does notdemonstrate the expected frequency markers, the speckle pattern can bediscarded as potentially manipulated or faked. For instance, the laser130 may alternate between different frequencies and/or patterns eachtime a biometric authentication is attempted. The computing device 110may be aware of the particular frequency and/or pattern that the laseris utilizing each time. If the computing device 110 determines that thedetected speckle pattern does not demonstrate the expected frequencymarkers, it may be due to a malicious actor attempting to utilize apreviously recorded speckle pattern signal to inappropriatelyauthenticate as a user. As such, utilizing one or more unique laserfrequencies and patterns can generate a distinguishably unique specklepattern for each authentication attempt.

Once the optical sensing device 140 has received an acceptable specklepattern, the computing device can identify within the speckle patternone or more characteristics. The identified characteristics may comprisephase information within the speckle pattern, frequency informationwithin the speckle pattern, amplitude information within the specklepattern, or any other derivable characteristics within the specklepattern.

In at least one embodiment, the computing device 110 can identify withinthe speckle pattern one or more characteristics that relate to theacoustic stimulation of the individual's finger bone. For example, thecomputing device may identify within the speckle pattern frequencyinformation that matches frequencies used by the acoustic transducer120. Additionally, the computing device may identify that specificfrequencies used by the acoustic transducer are attenuated moresignificantly than other frequencies used by the acoustic transducer.The attenuation of the specific frequencies may be due uniquecharacteristics of the individual's finger bone.

Once the one or more characteristics within the speckle pattern havebeen identified, the computing device 110 can access a storage device160 that contains one or more user biometric signatures and determine ifthe one or more characteristics match the one or more biometricsignatures. The storage device 160 may be located within the same deviceas the optical receiving device 140 or it may be located at a remotestorage device that is network accessible by the computing device 110.In at least one embodiment of the biometric authentication system 100,the biometric signature is encrypted, or otherwise securely stored, toprevent the signature from being improperly accessed.

If the computing device identifies a match within the stored one or moreuser biometric signatures, the computing device 110 can authenticate theindividual (i.e., “the user”) within a computer system. The biometricauthentication system 100 described herein may be utilized in a widevariety of different situations. For example, the biometricauthentication system 100 may be used to authenticate a user on a mobiledevice, within an electronic payment system, within a building securitysystem, or within any other system capable of verifying a user'sidentity.

FIG. 2 illustrates a side-view of an embodiment of a biometricauthentication system 100 embedded within a biometric security device200. As depicted, the various components 110, 120, 130, 140 of thebiometric authentication system 100 can be positioned in a variety ofdifferent configurations. For example, in FIG. 1, the laser 130 is abovethe finger 150, the acoustic actuator 120 is directed towards the tip ofthe finger 150, and the optical sensing device 140 is positioned belowthe finger 150. In contrast, in FIG. 2 all of the components 110, 120,130, 140 are positioned below the finger 150 such that a biometricreading can be received from a finger placed within a tissue receivingportion 230 on the biometric security device 200.

In at least one embodiment of the biometric authentication system 100,the optical sensing device 140 and the acoustic transducer 120 arepositioned within an optimal distance from each other. In particular,the optical sensing device 140 may be positioned at a focus point ofacoustic signal with respect to the acoustic transducer 120. As statedabove, the acoustic transducer 120 may be configured to project anacoustic wave 220 into the finger 150. In at least one embodiment, atleast a portion of the acoustic wave 220 may deflect and change courseas it travels through the layers of tissue of the finger 150 andreflects off of a finger bone 210. The reflected acoustic wave 220 maythen travel back towards the surface of the finger 150. In someembodiments, the initial travel path and reflected travel path of atleast a portion of the acoustic wave 220 may form a banana-shapedacoustic wave 220. The optical sensing device 140 may receive a laserspeckle pattern that comprises more information associated with theacoustic wave 220 if the optical sensing device 140 is positioned at theexit point of the banana-shaped acoustic wave 220 (i.e., the focuspoint). The exit point of the banana-shaped acoustic wave 220 may beidentifiable through simple experimentation and/or calculation.Additionally, the shape and positioning of the banana-shaped acousticwave may be generally the same across a wide-array of users such that ageneral positioning between the acoustic transducer 120 and opticalsensing device 140 may be used across a wide-array of generic devices.

In various embodiments, the biometric authentication system may positionthe various components 110, 120, 130, 140 in a variety of differentconfigurations that may each provide different advantages. For example,FIG. 3A illustrates a schematic of an embodiment of a biometricauthentication system comprising a lens 300. In the depicted embodiment,the optical sensing device 140 receives the speckle pattern 305 througha lens 300 that is positioned between the optical sensing device 140 andthe stimulated tissue 150. The optical sensing device 140 may bepositioned such that it is within an image plane 310 of the lens 300with respect to the speckle pattern 305.

Due to its position within the image plane 310, the optical sensingdevice 140 may receive a two-dimensional image of the speckle pattern.To accommodate the two-dimensional image, the optical sensing device cancomprise an array of optical sensors. In at least one embodiment, anoptical sensing device 140 positioned within an image plane is moresensitive to translational movements of the finger 150 and/or fingerbone 210 than an optical sensing device 140 positioned outside of theimage plane 310.

As an additional embodiment of a biometric authentication system, FIG.3B illustrates a schematic of an embodiment of a biometricauthentication system comprising a lens 300 positioned between a finger150 and an optical sensing device 140. The optical sensing device 140 ispositioned within a focal plane 320 of the lens 300. In at least oneembodiment, the lens 300 can function as a summation mechanism foroptical sensing devices 140 positioned within the focal plane. Forexample, the optics of the lens 300 may cause optical sensing device 140to receive a summation of phases and intensities from the specklepattern 305. As such, in at least one embodiment, the lens 300 mayprovide a helpful mathematical function for analyzing the laser specklepattern by providing a summation of characteristics of the specklepattern. Additionally, in at least one implementation, the optics of thelens 300 allows a single photodetector to be used as the optical sensingdevice 140.

As another embodiment of a biometric authentication system, FIG. 3Cillustrates a schematic of an embodiment of a biometric authenticationsystem that does not comprise a lens 300, but instead utilizes just theoptical sensing device 140 to detect the speckle pattern 305. In orderto function properly, the absence of the lens 300 may require that ahigher intensity laser 130 be used to illuminate the finger 150 and/orthat a higher sensitivity optical receiving device 140 be used toreceive the speckle pattern 305. As such, the embodiment depicted inFIG. 3C allows for manufacturing cost decisions to be accounted for indesigning a biometric authentication system. For example, an appropriatelens 300 may cost significantly more than a higher powered laser 130and/or a more sensitive optical detecting device 140. Accordingly, in atleast one embodiment a designer can lower the overall cost of thebiometric authentication system by not using a lens 300.

As yet another embodiments of a biometric authentication system, FIG. 3Dillustrates a schematic of an embodiment of a biometric authenticationsystem that utilizes reflectance within the finger 150 to receiveinformation relating to the speckle pattern. In particular, the opticalsensing device 140 is positioned directly adjacent to the stimulatedtissue 150. The optical sensing device 140 can receive the dynamicspeckle pattern 305 through reflectance of the laser within thestimulated tissue 150. As such, embodiments of a biometricauthentication system can place all of the necessary components 120,130, 140 of the system on the same side of the finger 150—this may allowfor more useful design configurations for end-user devices.

FIG. 3E illustrates a schematic of an embodiment of a biometricauthentication system that utilizes transmittance of the laser specklepattern through the finger 150. In particular, the stimulated tissue(i.e., the finger 150) is positioned between the laser 130 and theoptical sensing device 140. The optical sensing device 140 can thenreceive the speckle pattern 305 through transmittance of the laserthrough the stimulated tissue 150.

FIG. 3F illustrates a schematic of an embodiment of a biometricauthentication system that utilizes a lens 300 and an optical sensingdevice 140 that comprises image sensor array 140 to receive the specklepattern 305. In various embodiments, the image sensing array maycomprise a charge-coupled device (CCD), a complementarymetal-oxide-semiconductor (CMOS), or any other suitable imaging array.In at least one implementation, the image sensor array 140 may comprisea camera that is integrated within a mobile device, such as a smartphone or tablet.

While the above described embodiments of biometric authenticationsystems depict and describe various different configurations, theexamples are not meant to limit embodiments of biometric authenticationssystems to only those depicted. Various alternate implementations may beotherwise configured to meet the particular needs of a given design.Additionally, while the previous examples depict the laser 130illuminating a finger nail, in various alternate embodiments, the laser130 may be directed towards any portion of the user's tissue.

Turning now to various different embodiments of signal processing thatcan be used to match a speckle pattern to a particular individual, FIG.4 illustrates a chart 400 depicting an embodiment of a Fourier transformof a laser speckle pattern 420 and an acoustic signal 410. As depicted,the acoustic signal 410 comprises white noise of equal intensity acrossthe spectrum of interest. In alternate embodiments, however, theacoustic signal may comprise random noise, specific frequency ranges, orany other signal spectrum.

The depicted Fourier transform of the speckle pattern 420 comprisesmultiple exemplary characteristics 430, 432, 434. In particular, thedepicted characteristics 430, 432, 434 comprise ranges of frequencywhere the relative amplitude of the Fourier transform of the specklepattern 420 drops. In at least one embodiment, the drops 430, 432, 434may occur based upon the specific interactions of the acousticfrequencies produced by the acoustic transducer and the individual'sfinger bone. Speckle patterns from different individuals may demonstratedifferent specific frequency attenuations. As such, the characteristics430, 432, 434 may be utilized to verify the identity of an individual bymatching the detected characteristics with a biometric signature storedwithin a database.

While the above example describes the use of attenuation points 430,432, 434 in a signal 420 as being characteristics, in various alternateembodiments other aspects of a received speckle pattern can be used toidentify an individual. For example, specific phase changes, specificintensity changes, a wavelet transform, similarities in a Fouriertransform, correlation between speckle patters, or other similar signalanalysis techniques can be used to match a specific speckle pattern to aparticular user. In each of the various methods for identifying a user,a specific threshold or confidence factor can be built into the userauthentication process such that matches must have a pre-determinedlevel of precision to be acceptable. As described above, the acousticsignal 410 can also be utilized in identifying an individual. Inparticular, the interaction of the acoustic signal with an individual'stissue can effect a resulting speckle pattern. In various embodiments,knowledge of the acoustic signal characteristics can assist inidentifying a user based upon a received speckle pattern. For example, asine wave or a chirp signal can be used within the acoustic signal toidentify the acoustically influenced aspects of the speckle pattern.

Additionally, in at least one embodiment of a biometric authenticationsystem, a specific acoustic signal can be utilized to identify anindividual. For example, upon initially attempting to authenticatewithin a computing system, an individual can enter a username associatedwith the individual within the computing system. The individual can thenplace a finger within a tissue receiving portion of the biometricauthentication system. Upon receiving the individual's username, acomputing device can direct an acoustic transducer to emit a specificset of frequencies that are associated with the username. The specificfrequencies may be selected based upon a previously identified set offrequencies that exhibit a particularly pronounced response from theindividual.

In addition, the specific frequencies may also include one or morecontrol signals. The control signals may comprise specific acousticfrequencies that are applied to all individuals by the particularbiometric authentication system. When authenticating the individual, thecomputing device may first identify the presence of the control signalswithin the speckle pattern. The identification of the control signalscan be used to verify that the system is properly functioning and alsoto potentially identify signal spoofing. After identifying the presenceof the control signals within the speckle pattern, the computing devicecan then authenticate the individual against the user's known biometricsignature, which is associated with the username. In particular, thecomputing device can identify the particular pronounced responses thatare associated with the specific frequencies that are associated withthe individual's username. As such, in various embodiments, uniqueacoustic signals can be utilized to authenticate an individual basedupon an initial user identification of the user.

In various embodiments of a biometric authentication system, thebiometric signatures can comprise multiple matrices that each containsignal amplitudes over a specific range of frequencies. Each matrix canrepresent the biometric signature of a user, in the form of storedfrequency data from the respective user's speckle pattern. As such, uponreceiving and processing the speckle pattern, the computing device cancompare the amplitude and frequency information of the received specklepattern to the various biometric matrices and identify a nearest match.The computing device can then determine whether the nearest match fallswithin an acceptable threshold or confidence factor. If the match fallswithin the acceptable threshold or confidence factor, the computingdevice can authenticate the user. Otherwise, the computing device candeny authentication.

In addition to relying upon an acoustic signal's interaction with afinger bone, in various implementations additional biometric informationmay be utilized to authenticate a user. For example, FIG. 5 illustratesa schematic of an embodiment of a biometric authentication system 100that also comprises pulse oximetry components 500, 510. In particular,the biometric system 100 comprises an optical sensor 500 and aphotoelectric device 510. One of skill in the art will understand thefunctioning of the pulse oximetry system in its various embodiments. Oneor more components of the laser speckle pattern components 120, 130, 140and the pulse oximetry components 500, 510 may be shared between the twosystems. For example, the optical sensor 500 and the optical sensingdevice 140 may comprise the same component such that a single sensingdevice is receiving both pulse oximetry information and laser specklepattern information.

The use of additional biometric information may be useful to furtherverify the identify of a user and to avoid spoofing of biometricinformation. For example, in the embodiment described above, the pulseoximetry information may be useful for verifying the presence of a pulsewith the accompanying laser speckle pattern. The presence of a pulse mayindicate that the laser speckle pattern is being generated by actualliving tissue.

In addition to the use of pulse oximetry, in various embodiments, otherbiometric information may be used to authenticate a user. For example,the biometric authentication system 100 can capture photographs of afingerprint, capture fingerprint information through laser speckleanalysis, capture finger print information from a capacitive analysis,retinal scanning, voice recognition, or any number of other biometrictechniques. As such, embodiments of the laser speckle biometricauthentication system can be incorporated into a wide variety of othersecurity schemes.

Accordingly, FIGS. 1-5 and the corresponding text illustrate orotherwise describe one or more components, modules, and/or mechanismsfor biometric authentication using a speckle pattern generated byacoustically stimulated tissue. One will appreciate that implementationsof the present invention can also be described in terms ofcomputer-executable instructions within a computing system that whenexecuted comprise one or more acts for accomplishing a particularresult. For example, FIG. 6 and the corresponding text illustrate orotherwise describe a sequence of acts from instructions within acomputing system for authenticating a user with a laser specklebiometric pattern. The acts of FIG. 6 are described below with referenceto the components and modules illustrated in FIGS. 1-5.

For example, FIG. 6 demonstrates that a system for biometricauthentication using a speckle pattern generated by acousticallystimulated tissue can comprise computer-executable instructions thatwhen executed comprise an act 600 of acoustically stimulated tissue. Act600 can include acoustically stimulating, with an acoustic transducer120, tissue belonging to an individual. For example, as described inFIG. 2 and the accompanying description, an acoustic transducer 120 canstimulate an individual's finger 150 and/or finger bone 210. Theacoustic transducer may comprise a speaker, a piezoelectric transducer,an electromagnetic acoustic transducer, or any other component capableof electronically generating an acoustic wave.

Additionally, FIG. 6 shows that the system can includecomputer-executable instructions that when executed comprise an act 610of illuminating with a laser the stimulated tissue. Act 410 can includeilluminating with a laser 130 at least a portion of the stimulatedtissue. For example, as described in FIG. 1 and the accompanyingdescription, laser 130 illuminates the individual's finger 150 with alaser. During at least a portion of the illumination, the user's finger150 is being stimulated by the acoustic transducer 120.

FIG. 6 also shows that the system can include computer-executableinstructions that when executed comprise an act 620 of receiving aspeckle pattern. Act 620 can include receiving at an optical sensingdevice 140 a speckle pattern generated by the laser's interaction withthe stimulated tissue. For example, as described in FIG. 1 and theaccompanying description, the optical sensing device 140 can receive alaser speckle pattern generated by the laser's interaction with thefinger 150. In various embodiments described above, the optical sensingdevice 140 can be positioned in a variety of different location withrespect to the finger 150, the laser 130, and the acoustic transducer120.

Additionally, FIG. 6 shows that the system can includecomputer-executable instructions that when executed comprise an act 630of identifying characteristics in the speckle pattern. Act 630 includesidentifying at a computing device one or more characteristics within thereceived speckle pattern. For example, as described in FIG. 4 and theaccompanying description, a speckle pattern can be processed with aFourier Transform and analyzed to identify various characteristics.

For example, the frequency-domain chart of FIG. 4 depicts threecharacteristics 430, 432, 434 in the form of distinct frequencies thatare attenuated relative to other frequencies.

Further, FIG. 6 shows that the system can include computer-executableinstructions that when executed comprise an act 640 of matching theidentified characteristics to a biometric signature. Act 640 includesidentifying a match of the one or more characteristics to a userbiometric signature stored within a storage device. For example, asdescribed in FIG. 1 and the accompanying description, upon identifyingcharacteristics within the laser speckle pattern (e.g., characteristics430, 432, 434), the computing device 110 can access a storage device 160that stores one or more user biometric signatures. The computing device110 can then match the identified characteristics to a biometricsignature stored within the storage device 160.

Further still, FIG. 6 shows that the system can includecomputer-executable instructions that when executed comprise an act 650of authenticating a user. Act 650 can include based upon the identifiedmatch, authenticating a user within a computer system. For example, uponidentifying a matching biometric signature within the storage device160, the computing device 110 can authenticate a user within a computersystem by providing the user with appropriate permissions within thecomputer system, unlocking the computer system, allowing the user toaccess assets within the computer system, or otherwise authenticate theuser within the computer system.

In addition to the foregoing, FIG. 7 depicts that an additional oralternative embodiment of a biometric authentication system can comprisea method for biometric authentication using a speckle pattern generatedby acoustically stimulated tissue. The method can comprise an act 700 ofreceiving a speckle pattern. Act 700 can include receiving at an opticalsensing device 140 a speckle pattern generated by the laser'sinteraction with the stimulated tissue. For example, as described inFIG. 1 and the accompanying description, the optical sensing device 140can receive a laser speckle pattern generated by the laser's interactionwith the finger 150. In various embodiments described above, the opticalsensing device 140 can be positioned in a variety of different locationswith respect to the finger 150, the laser 130, and the acoustictransducer 120.

Additionally, FIG. 7 shows that the method can comprise an act 710 ofidentifying characteristics in the speckle pattern. Act 710 includesidentifying at a computing device one or more characteristics within thereceived speckle pattern. For example, as described in FIG. 4 and theaccompanying description, a speckle pattern can be processed with aFourier Transform and analyzed to identify various characteristics. Forexample, the frequency-domain chart of FIG. 4 depicts threecharacteristics 430, 432, 434 in the form of distinct frequencies thatare attenuated relative to other frequencies.

Further, FIG. 7 shows that the method can comprise an act 720 ofmatching the identified characteristics to a biometric signature. Act720 includes identifying a match of the one or more characteristics to auser biometric signature stored within a storage device. For example, asdescribed in FIG. 1 and the accompanying description, upon identifyingcharacteristics within the laser speckle pattern (e.g., characteristics430, 432, 434), the computing device 110 can access a storage device 160that stores one or more user biometric signatures. The computing device110 can then match the identified characteristics to a biometricsignature stored within the storage device 160.

Further still, FIG. 7 shows that the method can comprise an act 730 ofauthenticating a user. Act 730 can include based upon the identifiedmatch, authenticate a user within a computer system. For example, uponidentifying a matching biometric signature within the storage device160, the computing device 110 can authenticate a user within a computersystem by providing the user with appropriate permissions within thecomputer system, unlocking the computer system, allowing the user toaccess assets within the computer system, or otherwise authenticate theuser within the computer system

Accordingly, embodiments of the above-described biometric authenticationsystem can provide significant benefits over conventional authenticationschemes. For example, acoustic stimulation of an individual's fingerbone can generate identifiable characteristics within an associatedspeckle pattern that are the result of minute differences in theindividual's finger bone. In contrast to a fingerprint, which can besurreptitiously gathered from a photo or touched surfaces, anindividual's finger bone is completely obscure. Further, several meansexist to reproduce an individual's fingerprint, such as a simplephotograph. In contrast, no such readily available means exist toexactly reproduce an individual's finger bone. As such, embodiments of abiometric authentication system for biometric authentication using aspeckle pattern generated by acoustically stimulated tissue can providesignificant improvements to the field.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the described features or acts described above,or the order of the acts described above. Rather, the described featuresand acts are disclosed as example forms of implementing the claims.

Embodiments of the present invention may comprise or utilize aspecial-purpose or general-purpose computer system that includescomputer hardware, such as, for example, one or more processors andsystem memory, as discussed in greater detail below. Embodiments withinthe scope of the present invention also include physical and othercomputer-readable media for carrying or storing computer-executableinstructions and/or data structures. Such computer-readable media can beany available media that can be accessed by a general-purpose orspecial-purpose computer system. Computer-readable media that storecomputer-executable instructions and/or data structures are computerstorage media. Computer-readable media that carry computer-executableinstructions and/or data structures are transmission media. Thus, by wayof example, and not limitation, embodiments of the invention cancomprise at least two distinctly different kinds of computer-readablemedia: computer storage media and transmission media.

Computer storage media are physical storage media that storecomputer-executable instructions and/or data structures. Physicalstorage media include computer hardware, such as RAM, ROM, EEPROM, solidstate drives (“SSDs”), flash memory, phase-change memory (“PCM”),optical disk storage, magnetic disk storage or other magnetic storagedevices, or any other hardware storage device(s) which can be used tostore program code in the form of computer-executable instructions ordata structures, which can be accessed and executed by a general-purposeor special-purpose computer system to implement the disclosedfunctionality of the invention.

Transmission media can include a network and/or data links which can beused to carry program code in the form of computer-executableinstructions or data structures, and which can be accessed by ageneral-purpose or special-purpose computer system. A “network” isdefined as one or more data links that enable the transport ofelectronic data between computer systems and/or modules and/or otherelectronic devices. When information is transferred or provided over anetwork or another communications connection (either hardwired,wireless, or a combination of hardwired or wireless) to a computersystem, the computer system may view the connection as transmissionmedia. Combinations of the above should also be included within thescope of computer-readable media.

Further, upon reaching various computer system components, program codein the form of computer-executable instructions or data structures canbe transferred automatically from transmission media to computer storagemedia (or vice versa). For example, computer-executable instructions ordata structures received over a network or data link can be buffered inRAM within a network interface module (e.g., a “NIC”), and theneventually transferred to computer system RAM and/or to less volatilecomputer storage media at a computer system. Thus, it should beunderstood that computer storage media can be included in computersystem components that also (or even primarily) utilize transmissionmedia.

Computer-executable instructions comprise, for example, instructions anddata which, when executed at one or more processors, cause ageneral-purpose computer system, special-purpose computer system, orspecial-purpose processing device to perform a certain function or groupof functions. Computer-executable instructions may be, for example,binaries, intermediate format instructions such as assembly language, oreven source code.

Those skilled in the art will appreciate that the invention may bepracticed in network computing environments with many types of computersystem configurations, including, personal computers, desktop computers,laptop computers, message processors, hand-held devices, multi-processorsystems, microprocessor-based or programmable consumer electronics,network PCs, minicomputers, mainframe computers, mobile telephones,PDAs, tablets, pagers, routers, switches, and the like. The inventionmay also be practiced in distributed system environments where local andremote computer systems, which are linked (either by hardwired datalinks, wireless data links, or by a combination of hardwired andwireless data links) through a network, both perform tasks. As such, ina distributed system environment, a computer system may include aplurality of constituent computer systems. In a distributed systemenvironment, program modules may be located in both local and remotememory storage devices.

Those skilled in the art will also appreciate that the invention may bepracticed in a cloud-computing environment. Cloud computing environmentsmay be distributed, although this is not required. When distributed,cloud computing environments may be distributed internationally withinan organization and/or have components possessed across multipleorganizations. In this description and the following claims, “cloudcomputing” is defined as a model for enabling on-demand network accessto a shared pool of configurable computing resources (e.g., networks,servers, storage, applications, and services). The definition of “cloudcomputing” is not limited to any of the other numerous advantages thatcan be obtained from such a model when properly deployed.

A cloud-computing model can be composed of various characteristics, suchas on-demand self-service, broad network access, resource pooling, rapidelasticity, measured service, and so forth. A cloud-computing model mayalso come in the form of various service models such as, for example,Software as a Service (“SaaS”), Platform as a Service (“PaaS”), andInfrastructure as a Service (“IaaS”). The cloud-computing model may alsobe deployed using different deployment models such as private cloud,community cloud, public cloud, hybrid cloud, and so forth.

Some embodiments, such as a cloud-computing environment, may comprise asystem that includes one or more hosts that are each capable of runningone or more virtual machines. During operation, virtual machines emulatean operational computing system, supporting an operating system andperhaps one or more other applications as well. In some embodiments,each host includes a hypervisor that emulates virtual resources for thevirtual machines using physical resources that are abstracted from viewof the virtual machines. The hypervisor also provides proper isolationbetween the virtual machines. Thus, from the perspective of any givenvirtual machine, the hypervisor provides the illusion that the virtualmachine is interfacing with a physical resource, even though the virtualmachine only interfaces with the appearance (e.g., a virtual resource)of a physical resource. Examples of physical resources includingprocessing capacity, memory, disk space, network bandwidth, mediadrives, and so forth.

As used herein, unless otherwise expressly specified, all numbers suchas those expressing values, ranges, amounts or percentages may be readas if prefaced by the word “about”, even if the term does not expresslyappear. Any numerical range recited herein is intended to include allsub-ranges subsumed therein. Plural encompasses singular and vice versa.For example, while the invention has been described in terms of “a”first boundary, “a” first decorative feature, “a” first image, and thelike, one or more of any of these items is within the scope of theinvention. In addition, in this application, the use of “or” means“and/or” unless specifically stated otherwise, even though “and/or” maybe explicitly used in certain instances. “Including”, “such as”, “forexample” and like terms means “including/such as/for example but notlimited to”.

The present invention may be embodied in other specific forms withoutdeparting from its spirit or essential characteristics. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the invention is, therefore, indicatedby the appended claims rather than by the foregoing description. Allchanges which come within the meaning and range of equivalency of theclaims are to be embraced within their scope.

What is claimed is:
 1. A biometric security device for authenticatingone or more users based upon a speckle pattern comprising: an acoustictransducer positioned near a tissue-receiving portion of the biometricsecurity device and configured to stimulate tissue belonging to anindividual; a laser device configured to illuminate, with a laser, atleast a portion of the stimulated tissue; an optical sensing devicepositioned to receive a speckle pattern generated by the interaction ofthe laser with the stimulated tissue; and a computing device configuredto determine an identity of the individual based upon one or morecharacteristics of the received speckle pattern.
 2. The biometricsecurity device as recited in claim 1, wherein the tissue-receivingportion of the biometric security device is configured to receive atleast a portion of a finger.
 3. The biometric security device as recitedin claim 1, wherein the optical sensing device comprises a singlephotodetector.
 4. The biometric security device as recited in claim 1,further comprising a lens positioned between the stimulated tissue andthe optical sensing device.
 5. The biometric security device as recitedin claim 4, wherein the optical sensing device is positioned within afocal plane of the lens.
 6. The biometric security device as recited inclaim 1, wherein the optical sensing device is positioned at a focuspoint of acoustic signal with respect to the acoustic transducer.
 7. Acomputing system comprising: one or more processors; one or more storagedevices having stored thereon computer-executable instructions that areexecutable by the one or more processors, and that configure the systemto identify a user through a biometric signature, includingcomputer-executable instructions that configure the computer system toperform at least the following: acoustically stimulate, with an acoustictransducer, tissue belonging to an individual; illuminate with a laserat least a portion of the stimulated tissue; receive at an opticalsensing device a speckle pattern generated by the laser's interactionwith the stimulated tissue; identify at a computing device one or morecharacteristics within the received speckle pattern; identify a match ofthe one or more characteristics to a user biometric signature storedwithin a storage device; and based upon the identified match,authenticate a user within a computer system.
 8. The system as recitedin claim 7, wherein the optical sensing device is configured to receivethe speckle pattern through a lens positioned between the opticalsensing device and the stimulated tissue.
 9. The system as recited inclaim 8, wherein the optical sensing device is positioned within a focalplane of the lens.
 10. The system as recited in claim 8, wherein theoptical sensing device is positioned within an image plane of the lenswith respect to the stimulated tissue.
 11. The system as recited inclaim 7, wherein the stimulated tissue comprises a finger bone.
 12. Thesystem as recited in claim 7, wherein the optical sensing device ispositioned on an opposing side of the stimulated tissue from the laser,and the optical sensing device is configured to receive the specklepattern through transmittance of the laser within the stimulated tissue.13. The system as recited in claim 7, wherein the optical sensing deviceis positioned adjacent to the stimulated tissue, and the optical sensingdevice is configured to receive the speckle pattern through reflectanceof the laser within the stimulated tissue.
 14. The system as recited inclaim 7, wherein the optical sensing device comprises only a singlephotodetector.
 15. The system as recited in claim 7, wherein the opticalsensing device comprises an image sensor array.
 16. The system asrecited in claim 7, wherein the acoustic stimulation of the tissuegenerates the one or more characteristics within the received specklepattern.
 17. The system as recited in claim 16, wherein thecomputer-executable instructions are further configured to: receive fromthe individual an initial user identification; and based upon theinitial user identification, acoustically stimulate the tissue with aspecific set of frequencies.
 18. The system as recited in claim 7,wherein the computer-executable instructions are further configured to:receive pulse oximetry data from the tissue; and detect a pulse beforeauthenticating the user.
 19. The system as recited in claim 7, whereinthe laser is configured to operate with a pre-defined set of frequencymarkers that are detectable within the received speckle pattern.
 20. Amethod for identifying a user through a biometric signature, the methodcomprising: receiving from an optical sensing device a speckle patterngenerated by a laser beam's interaction with acoustically stimulatedtissue; identifying at a computing device one or more characteristicswithin the received speckle pattern; identifying a match of the one ormore characteristics to user biometric signatures stored within adatabase; and based upon the identified match, authenticating a userwithin a computer system.