Secure system and method of creating and processing partial finger images

ABSTRACT

Apparatus, system, method, computer program, and computer program product that provide a security in creating and processing fingerprint images obtained from a fingerprint sensor by generating a full image fingerprint minutia feature template without ever generating or reconstructing the full or complete fingerprint image that is conventionally required to generate such minutia feature template.

RELATED APPLICATIONS

This application is related to and claims the benefit of priority under 35 U.S.C. 119 to U.S. Provisional Patent Application Ser. No. 60/573,368 filed 20 May 2004 entitled Secure System And Method Of Creating And Processing Partial Finger Images; and U.S. patent application Ser. No. 10/194,994 filed 12 Jul. 2002 entitled Method and System for Biometric Image Assembly From Multiple Partial Biometric Frame Scans is a related patent application; each of which application is hereby incorporated by reference herein.

BACKGROUND OF THE INVENTION

There are currently many finger image sensors available from various vendors. For example, various fingerprint sensors and systems (including fingerprint swipe sensors, fingerprint placement sensors, and fingerprint sensors of other types) are described in U.S. Pat. Nos. 6,459,804, 6,289,114, 5,177,802, 4,933,976, and 4,429,413, which patents are hereby incorporated by reference. Other fingerprint sensors, systems, and methods are described in co-pending United States patent applications assigned to Atrua Technologies, Inc. 1696 Dell Avenue, Campbell, Calif. 95008, including in U.S. patent application Ser. No. 10/099,558 entitled Fingerprint Biometric Capture Device and Method with Integrated On-Chip Data Buffering and published as U.S. 2003/0021495 A1; and U.S. patent application Ser. No. 10/134,042 entitled Capacitance Sensor System with Improved Capacitance Measuring Sensitivity and published as U.S. 2003/0016849 A1.

Regardless of the specific fingerprint sensing technology used, there are two broad categories of fingerprint sensors: placement sensors and swipe sensors. Placement sensors are large enough to image a finger (or pertinent portion of the finger containing the fingerprint) simply by placing the tip of the finger on the sensing surface and acquiring the data in a single step. Swipe sensors, on the other hand, are too small to capture an entire fingerprint image with a single sensor field of view or acquisition step. Instead, users must move (or swipe) their finger across the smaller sensor while it captures multiple frames of data, each frame containing a portion of the full or complete fingerprint image. The individual image frames are “reconstructed” into a complete fingerprint image so that they can be processed with conventional feature extraction and matching algorithms. One such method of reconstruction is given in U.S. patent application Ser. No. 10/194,994 filed 12 Jul. 2002 by inventor Anthony P. Russo and entitled Method And System For Biometric Image Assembly From Multiple Partial Biometric Frame Scans and published as U.S. 20030126448A1, which is hereby incorporated by reference. Some examples of feature extraction methods are given in references, such as for example in U.S. Pat. No. 6,681,034B1, U.S. Pat. No. 6,668,072B1, U.S. Pat. No. 6,480,617B2, U.S. Pat. No. 6,041,133, U.S. Pat. No. 5,613,014, U.S. Pat. No. 5,420,937, and U.S. Pat. No. 5,109,428 as well as the documents referenced in the references cited section of these patents. The result of feature extraction is called the fingerprint “template” and contains all the distilled information from the original image that is required to match that fingerprint to previously enrolled templates.

As stated above, in the current state of the art, a full or complete image of the fingerprint is typically reconstructed using a set of smaller image frames obtained from a swipe sensor type fingerprint device. However, there are reasons why creating a complete image of the fingerprint prior to the feature extraction step is undesirable.

Security is one of the most compelling reasons for not generating or storing a complete fingerprint image: if a complete fingerprint image never exists in memory or is never otherwise stored as a full image or data set, it cannot be stolen by hackers or used by others in possession of the device carrying the sensor to impersonate the person to whom the fingerprint belongs. Note that in some security systems there is a desirability to have the person physically present at the time the fingerprint image is acquired and therefore permitting a full or complete fingerprint image to be constructed, also offers an opportunity for the constructed full or complete fingerprint image or corresponding data set representing the fingerprint image to be stored and misused. Such complete fingerprint image may even occur unintentionally, such as in the event that the computing system carrying the fingerprint sensor hangs and retains a copy of the sensed fingerprint image independent of intended operation, or in the event that spy ware, or other hacker or malicious code has been introduced into the computer and attempts to detect the presence of a fingerprint image file or data set and capture it. These are only examples, and those workers in the art will appreciate that there are many other scenarios for accidental or intentional misuse of complete fingerprint images.

Swipe sensors are also more attractive than placement sensors for integration into mobile computing and communication devices such as mobile and cellular phones, personal data assistants (PDAs), and other embedded systems because they are smaller. The smaller size reduces cost as well as power consumption, both of which are more significant issues on embedded devices than on a more expensive personal computer (PC) platform. The smaller size also reduces the surface area needed to present the sensor to the user so that it can be used for other purposes and the smaller exposed area also reduces the potential for damage to the sensor.

Computing efficiency is also an important consideration for embedded devices and reduction of computation and/or computational overhead while still maintaining required security is an ever increasing need.

SUMMARY OF THE INVENTION

The invention provides a secure way of creating and processing fingerprint images obtained from a swipe fingerprint sensor that never reconstructs a full or complete fingerprint image and generates a full fingerprint minutia template that can be used for comparing, matching or showing a mismatch, or in other ways validating or invalidating the identity of a person attempting to access a biometrically secured device, facility, or transaction.

In one aspect, the invention provides a method of forming a complete fingerprint feature template for a finger without first reconstructing a complete image of the finger or fingerprint, the method including: generating separate substantially spatially complementary gapped and fill image data sets storing fingerprint image data that would in combination provide fingerprint image data sufficient to form a complete fingerprint image; augmenting a spatially adjacent region of the gapped image and the fill image to form a substantially spatially continuous augmented image data set; extracting fingerprint features from the augmented image data set and destroying the augmented image data set, and the spatially adjacent region of the gapped image and the fill image that formed the augmented image after the extracting; repeating the augmenting, and extracting and destroying until all of the gapped and fill image data sets have had fingerprint features extracted; and combining the separately extracted fingerprint features to form a complete fingerprint feature template that enables the fingerprint to me compared with and where the comparison is within predetermined criteria to be matched with a reference fingerprint template.

In another aspect, the invention provides a method for maintaining the security of a fingerprint acquired with a fingerprint sensor, the method characterized in that: the acquired fingerprint image is separated during acquisition into at least complementary first and second separate data structures so that no complete fingerprint image data set is ever stored in any one data structure; and a fingerprint feature template is generated representing a complete fingerprint using feature extraction, on a partial image reconstruction and extraction by partial image reconstruction and extraction basis, from less than all of the first and second separate data structures.

In another aspect, the invention provides a system and apparatus for forming a complete fingerprint feature template for a finger without first reconstructing a complete image of the finger or fingerprint, the system including: a processor for performing logic operations on a fingerprint data set; a memory store coupled with the processor and defining separate first and second data structures for storing first and second substantially complementary gapped and fill portions of a fingerprint image as it is received as a data stream from an external fingerprint swipe sensor; image augmentation logic augmenting a spatially adjacent region of the gapped image and the fill image to form a substantially spatially continuous augmented image data set; feature extraction logic extracting fingerprint features from the augmented image data set and destroying the augmented image data set, and the spatially adjacent region of the gapped image and the fill image that formed the augmented image after the extracting; and partial template combining logic for combining the separately extracted fingerprint features to form a complete fingerprint feature template.

In another aspect, the invention provides a computer program and computer program product for performing the inventive method within a processor and memory. In still another aspect, the invention provides a secure data structure for maintaining separation of portions of a single finger print image to enhance the security of the fingerprint during acquisition and processing.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration showing aspects of An embodiment of a method of generating a minutia template for a fingerprint without ever reconstructing or storing together a full or complete image of the finger or fingerprint.

FIG. 2 is an illustration showing an embodiment of a system for generating a minutia template for a fingerprint using a swipe image sensor without ever reconstructing or storing together a full or complete image of the finger or fingerprint.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

The invention provides a more secure way of creating and processing finger images or fingerprint images obtained from a “swipe” fingerprint sensor than has previously been available. The present invention is novel and differs from conventional system and methods at least because it never has the fully reconstructed image or dataset representing the image of the complete finger or fingerprint in memory at any one time, which is desirable from both security and computing standpoints. While encrypting parts or all of the reconstructed image might be an alternative and viable approach that addresses the security issue, this inventive structure and method is simpler than an encryption approach and costs very little additional computational effort to carry out. Encryption may be applied in addition to provide even greater security or where encryption is mandated by regulation or according to some standard.

Unlike conventional systems and methods that reconstruct a full or complete image of the fingerprint using a set of smaller images obtained from the swipe sensor device, the invention uses a novel approach that can extract all the important information that would conventionally require the generation of a full or complete fingerprint image, without ever generating or having that complete fingerprint image stored or resident in memory at any time. By not having the image in memory at any time, it provides a more secure method of gathering and processing the information, since a malicious hacker cannot obtain a useful fingerprint image by viewing the memory contents of the host computing platform that executes the processing.

The inventive system and method also advantageously reduce or minimize computational overhead while still achieving security goals.

An embodiment of the inventive method is outlined in FIG. 1, which shows some stages during the acquisition of partial fingerprint images (or data sets) and the minutiae feature extraction from these partial images. During Step 101, all of the raw sensor frames are captured. This capture may be accomplished according to any of a variety of know techniques for operating either a placement sensor or a swipe sensor, such as for example as described in U.S. patent application Ser. No. 10/194,994 and published as U.S. 2003/0126448 A1, herein incorporated by reference. In some embodiments, the capture may be divided into separate frame acquisition events so that the same process never sees the complete fingerprint image, even though to the user it may appear to be a single acquisition event where the user continuously swipes his/her finger over the sensor. In another embodiment, two or more separate swipes may be used to acquire the fingerprint data but this is disadvantageous because of the inconvenience to the user and the possible additional computational burden associated with using parts of two separate fingerprint scans.

Once the raw sensor frames have been captured or acquired, however, instead of reconstructing the image in its entirety as is conventionally done, intentional gaps are left in the reconstructed image. The gaps are created by not reconstructing the image in certain areas, and optionally by inserting blank space into the reconstructed image instead of the actual frame data or by placing some other marker or indicator in the image or external to the image to indicate the gap or discontinuity. The acquired frame data for which the blank space is substituted is saved into a different buffer and not reconstructed, so the acquired but uninserted frame data is useless by itself.

For each saved frame, we also save the computed place (x and y or row and column coordinates) where it should conventionally have been inserted into the reconstructed image had intentional gaps not been created or inserted. Any number of gaps of any size are possible and may be implemented, but in one embodiment of the invention to save memory and still achieve good performance we choose two gaps about 20 rows high, enough to make fingerprint matching difficult if not impossible if this were all the information or data that was used for the matching. Other embodiments having a single gap, or having two, three, four, five, six, seven, eight, nine, ten, or more gaps may be implemented.

The number of gaps may be selected according to various factors, such as the degree of security required, the likelihood that a portion may be sufficient to support some fraudulent activity, and the assessed computational burden associated with the number of gaps. The number and size of gaps may be programmable. In one embodiment, the number and size of gaps are intentionally varied for each acquisition according to some rules, policies, or algorithms reduce an intruders ability to obtain usable partial or complete fingerprint images increase security. In another embodiment, the number of gaps is selected by assessing the computational power and/or memory capabilities of the computing device with which the fingerprint sensor and acquisition system is operating to provide a secure yet optimized or near-optimized configuration.

One goal of the invention is not to generate or store together any single partial fingerprint image reconstruction that would be sufficient to match with another fingerprint image and therefore create a security risk. Another goal being to reduce the memory consumed at any given time for the processing, especially in so called thin computing platforms having relatively small memory and processor capabilities. By comparison, a typical full or complete reconstruction of a fingerprint image uses much more memory.

During Step 102, all of the data from the top of the image to the first gap is processed through a standard minutiae extraction step (or other template creation processing), which finds all of the minutiae in that image segment. This is the initial template. At this point the original image data segment (that is the data from the top of the image to the first gap) can be destroyed for security reasons and/or to reclaim memory.

Feature extraction methods are known in the art and are not described in detail here other than by way of citation to certain papers and references. Some examples of feature extraction methods are given in references, such as for example in U.S. Pat. No. 6,681,034B1, U.S. Pat. No. 6,668,072B1, U.S. Pat. No. 6,480,617B2, U.S. Pat. No. 6,041,133, U.S. Pat. No. 5,613,014, U.S. Pat. No. 5,420,937, and U.S. Pat. No. 5,109,428 as well as the documents referenced in the references cited section of these patents. The result of feature extraction is called the fingerprint “template” and contains all the distilled information from the original image that is required to match that fingerprint to previously enrolled templates.

During Step 103, the top-most remaining gap is “filled in” by pasting the saved frames for that gap into the image at the saved locations (i.e., the gap is now reconstructed).

In Step 104, the image segment from the top of the reconstructed gap to the start of the next gap below it is processed to extract minutiae and/or other features. The newly found minutiae (or other desired fingerprint features) are added to the template created in the previous step to form a larger template that includes all of the information available in the image up to the start of the next gap. Again, the processed image data can then be destroyed and the memory that would have been consumed in storing it can be freed and made available for other processes.

The above Steps 103 and 104 are repeated until all gaps are filled in and all image data has been processed. At the end of the processing, all of the minutiae and other features have been extracted into the template. That is, the final template contains all of the features that would have been available in a full or complete reconstructed fingerprint image, even though no full or complete reconstructed fingerprint image never existed.

Features of the inventive procedure according to one embodiment are now highlighted. First, an image is reconstructed with gaps (Step 101). Next, features are extracted from topmost contiguous segment and the already processed image data is destroyed (Step 102). Then, a partial image segment is created by reconstructing the first gap (Step 103), and features are extracted from current contiguous segment followed by destruction or deletion of the original processed image (Step 104). This process is repeated for any other partial image segments. For example, in the illustration, a partial image segment is created by reconstructing the next gap (Step 106), and features are extracted from the now current contiguous segment and then the already processed image data is destroyed (Step 108). A next partial image segment is created by reconstructing the remaining gap (Step 110), and features are extracted from the last contiguous segment and then the already processed image data for this segment is destroyed (Step 112).

In one particular embodiment, the extraction step advantageously but optionally takes into account the special processing necessary to detect features on the border between partial segments, and is sophisticated enough to correctly detect minutiae that could otherwise only be detected when two adjoining partial segments are available. That is, there are cases where just having one partial segment would not be enough to detect minutiae in that partial segment, because more context is needed, and that context is only available in the next adjoining segment. In one embodiment, it does this by saving enough current state information (but not sensor pixel information) to smoothly continue on when new segments are processed. In another embodiment, a small amount of sensor pixel information or data is retained from each scan near the gap to that these adjacent areas may be specially processed. The data retained is selected so that it is not sufficient by itself to reduce overall security or any specifically identified security risk. In general, creating even one gap of sufficient size or a few gaps for a typical fingerprint will provide a useful level or security, while providing several gaps of sufficient size will virtually assure that there will be insufficient minutiae or fingerprint area coverage to permit a useful fingerprint comparison and identification match.

Either, both, or all of the number of gaps, the gap height (or length in a direction of relative finger-tip to sensor motion), and the gap width (described further below) may be varied. In one embodiment, two gaps, each twenty rows high (in length) are used, but those workers having ordinary skill in the art in conjunction with the description provided here will appreciate that this is not the only combination of gaps number and gaps size that may be used.

In some embodiments there is a relationship between the number of gaps and the height of each gap. The number of gaps times the height of each gap is advantageously less than the total height of what would be the reconstructed image (if the image were actually reconstructed). For example, for a typical four-hundred row image, there would advantageously be no more than twenty gaps where each gap is less than ten rows high, and this would correspond to a situation where one-half the image is gaps.

It is desirable to reduce the number of gaps and the length of the gaps that are created at least because in one embodiment that stores raw scanner frames, gaps are expensive to store because of the amount of raw scan date involved. In simplistic terms, then one does not want to store too many gaps, so long as the number of gaps permits achieving the desired degree of security. Embodiments of the invention have utilized as few as two rows and a practical maximum of about one-hundred rows for a typical four-hundred row image equivalent. Any number of rows between the two-row and four-hundred row gap number may be utilized. These numbers are only guidelines and the system and method do not impose any actual maximum number of rows. Gap length should advantageously also fall within a range. If a small number of rows are used (too few rows) then the gaps may not be large enough and be ineffective at preventing a match using the image with gaps. If the gaps are too large, they will be effective at preventing a match, but will consume too much memory or buffer space to store the raw scanner frames.

In one embodiment, the amount of memory needed to store a gap is reduced by generating gaps that do not extend for the entire width of a frame but only extend for a fraction of less than the full frame width, and have some of the characteristics of holes described elsewhere in this description. In other words, while embodiment of the inventive system and method used a gap width that is equal to the frame width, other embodiments use gap widths of less than the frame width. While there are no absolute limits on the gap width, it will be appreciated that a practical gap width range is from about ten columns up to the full frame width. Again, if the gap width is too small it will not prevent matching to the extent desired for security. Longer gap widths impose larger storage requirements as described. Gap with, gap length, and the number of gaps may be selected to optimize the combination of security benefit (by preventing matching of a gapped image), storage requirements, and computational loading.

Particular embodiments of the invention may used gap widths of from about ten-percent of the frame width to one-hundred percent of the frame width, such as for example 10%, 20%, 30%, 40%, 59%, 60%, 70%, 80%, 90%, 100% or any value between these.

In another alternative embodiment, the gaps are generated or filled with something else besides white (or other constant gray level) pixels or raw frame data. In still another embodiment, the gap data is replaced with nothing, so that discontinuous rows substantially abut each other until the missing reconstructed gap data is inserted back where it belongs. In even still other embodiments, a single row or any other defined number of rows may be introduced to hold the place of the actual sensed rows in the gaps. Therefore in some embodiments there is no need to actually consume memory by storing artificial values for the gap row pixels, instead the system may use knowledge of the location of the gaps in its computations, so that the gap pixels may be actual or virtual. Holes instead of gaps could alternatively be used. According to one embodiment, the use of holes for or within the gaps means that instead of having a rectangular gap of gap height H_(g) that stretches the full width of the frame from one end of the frame (for example, the far left) to the other end of the frame (e.g. the far right), one reconstructs all or substantially all of the data except the data within a narrower rectangular region or within a plurality of smaller regions, still of gap height H_(g), but starting at some first coordinate x1_(start) and ending at another coordinate x1_(end). If a plurality N of holes are to be created then there will be a plurality of starting and stopping coordinates along the width of the frame for each hole, such as the pairs (x1_(start), x1_(end)), (x2_(start), x2_(end)), . . . , (xN_(start), xN_(end)). In one embodiment, only one hole is used for the gap and starts at one edge of the frame (x1_(start)=0) and ends at the other edge of the frame (x1_(end)=frame width).

One advantage associated with the use of gap holes is that it saves memory or buffer storage space. For the single gap hole example, only the raw frame data starting at x1_(start) and stopping at x1_(end) needs to be saved. For the multiple gap hole embodiments, only the raw frame data starting and stopping within each gap hole need be stored.

It will be noted that in some of the described embodiments, there is a reconstructed portion and a gap or gapped portion which are stored and such storage may be distributed into different memories or different portions of the same memory to provide a desired level or security. In other embodiments, the finger image data is stored as partially reconstructed image with gaps and raw frame data may be stored in the same or a different memory or portion of a single memory to provide the desired security. Various memory storage strategies may be employed in conjunction with the invention. Advantageously in many of the embodiments of the invention, neither the raw image frame scan or acquisition process nor the subsequent processing of all or part of the raw image frame scans ever stores or reconstructs a full or complete fingerprint image within a single memory where it may represent a security issue. Other embodiments of the invention may provide different memory storage strategies where security concerns are different.

It will be appreciated that one of the objectives is to remove data in any one image that would permit generating all of the minutiae required for fingerprint matching or recognition with another fingerprint reference minutiae template. This objective is in a trade-off with the desire to minimize memory or buffer storage associated with storing raw frame data for the gaps for subsequent processing.

Note that the entire process still results in a properly formed fingerprint template that has the minutiae for the entire finger (or any portion of the finger that is desired if other than the entire finger or fingerprint is to be collected), and the actual matching of the extracted fingerprint template to one that was enrolled earlier can occur at any time when the template contains enough information to perform an accurate match. However, typically there is little or no advantage to doing the match earlier than the creation of the full template, so systems that employ this invention would typically complete all the steps prior to performing any fingerprint match. Embodiment of the invention that my choose to generate only a partial template (such as a template based only on portions of the sensed fingerprint image and does not attempt to fill in the gaps as the template is generated, may alternatively be used, especially when implemented such that security and reliability are not significantly compromised.

While embodiments of the invention are described using a first image having gaps and a second supplementary or fill image containing the portions of the fingerprint image not included in the first gapped image, it will be appreciated in light of the description provided that the fingerprint image data may be acquired, collected, generated, or stored into a plurality of first gapped images and/or as a plurality of supplementary fill images. It will also be appreciated that the gapped image(s) and fill image(s) are different in the portions of the complete image that they store, and that in theory either may be considered to be the gapped or the fill image, and in practice the image storing the normally smaller gap image data sets is the fill image. Depending upon the complete image size and the number and length of gaps, some embodiments may provide that the gapped and fill images have essentially the same characteristics except that they provide complementary fingerprint image data for the complete fingerprint image.

With reference to FIG. 2 there is illustrated a diagrammatic illustration of a system for generating a minutia template for a fingerprint using a swipe image sensor without ever reconstructing or storing together a full or complete image of the finger or fingerprint.

It will be appreciated that the invention may be utilized in conjunction with a great variety of systems and devices that require or advantageously provide fingerprint-based identification or access to the system or device itself, or to some other system or entity (such as a commercial or financial transaction, contest, or any other event or contract where identification is required or desired) on a remote network server. A placement or swipe fingerprint sensor 202 is coupled for communication via a communication bus or other path 204 with a processor 208 and processor coupled memory (typically a random access memory) 210. The sensor may optionally be coupled to the processor through a separate sensor controller 212. Additional sensor registers or buffers 216 or other forms of sensor memory may be provided to work directly with the sensor 202 and are coupled for communication to the processor and directly or indirectly to the processor memory 210 via busses or other communication paths 222, 224. Where separate sensor controller 212 and/or sensor buffer memory 216 is not present, the communication may be directly between the sensor 202 (and its associated electronics) and the processor 208 and memory 210 and memory controller rather than through the separate sensor controller and sensor memory 216. Structure and method for operating a conventional swipe sensor within a device are known in the art and not further described here. The processor 208 may be a microprocessor, a processor, a controller, or other logic capable of executing software or firmware instructions such as are normally found in computing devices, notebook computers, cellular telephones, PDAs, music players, and the like. The fingerprint sensor 202 may optionally operate in conjunction with an auxiliary sensor controller 212 so as to reduce the burden on the main processor 202. Architectures and structures for computer systems that operate, use or may be adapted to operate, use, or incorporate fingerprint sensors are known in the art and not described in further detail here. One or more data structure 230 storing input, output, and/or intermediate data may optionally be defined in one or more of the memories for use in accomplishing the inventive method. As described herein, the two complementary image portions (such as the images referred to as the gapped image and the fill image are stored in separate data structures 232, 234 so that no complete image of the finger print is stored in a full or complete form. The separate data structures may be separate files or addressable regions within a common physical or logical memory storage, or within separate physical or logical memory storage. Furthermore, embodiments of the invention may provide that one of the gapped and fill images are stored in memory 210 while the other is stored (or maintained) within the sensor buffer memory 216. In the later embodiment, only the portion of the fill image stored on the sensor buffer memory is communicated to the processor 208 and/or processor memory 210 as needed for augmentation and feature extraction. Specialized software, firmware, and or hardware my optionally be provided to clear memory and buffers so that fingerprint image data is not retained under a variety of normal and aberrant operating conditions.

In embodiments where a placement or other fingerprint sensor is provided that is capable of obtaining a full or complete fingerprint image, the inventive system and method provide additional partial image operation mode logic to operate such placement sensors in a partial image acquisition mode. Such logic may for example be software or firmware executing in the processor, separate controller, or other electronics controlling the acquisition of the image or a memory storing the image. In one embodiment, the inventive method acquires a plurality of partial images over a short period of time (temporally) and stores them separately without ever keeping a full or complete fingerprint image. In another embodiment, the placement sensor is spatially scanned to simulate the swipe sensor acquisition and the partial images obtained are handled in the same manner as swipe sensor acquired partial images (though the need for matching partial images is reduced or eliminated).

While the invention has been primarily described in the context of fingerprint scanned biometric, it will be appreciated that the inventive structure, system, apparatus, and method may also be applied to protecting other image based biometrics, such as but not limited to eye retinal scans.

The inventive method may advantageously provide a computer program and computer program product existing on tangible media. The computer program includes a set of executable instructions to carry out the procedural steps of the inventive method.

From the foregoing it will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims. 

1. A method of generating a fingerprint template of fingerprint minutiae sufficient for identifying a person to whom the fingerprint belongs without first generating a complete image of the fingerprint covering the area of the fingerprint template, the method comprising: (a) obtaining a plurality of images of portions of a fingerprint; (b) distributing the storage of a first image portion and a second image portion while they are being acquired from the finger into at least a first and a second different memory data structures; (c) constructing a first partial composite image from the first image portion and extracting minutiae from the first partial composite image to generate a first partial minutiae template; (d) constructing a second partial composite image from the second image portion and extracting minutiae from the second partial composite image to generate a second partial minutiae template; and (e) combining the first and second partial minutiae templates to generate a complete minutiae template.
 2. A method as in claim 1, wherein the steps of distributing, constructing a first partial image, constructing a second partial image, and combining are repeated for a plurality of partial image portions where the plurality is greater than two.
 3. A method as in claim 1, wherein the steps of distributing, constructing a first partial image, constructing a second partial image, and combining are repeated for a plurality of partial image portions where the plurality is a plurality selected from the set of two, three, four, five, six, seven, eight, nine, ten, eleven, twelve, thirteen, fourteen, fifteen, sixteen, seventeen, eighteen, nineteen, twenty, twenty-one, twenty-two, twenty-three, twenty-four, and twenty-five, and any other plurality.
 4. A method as in claim 1, further comprising leaving at least one gap or discontinuity between a first portion of the fingerprint image and a second portion of the fingerprint image.
 5. A method as in claim 1, wherein the second image portion corresponds to a portion of the fingerprint lying between regions of the first portion.
 6. A method as in claim 1, wherein the second image portion corresponds to a portion of the fingerprint lying adjacent to a region of the first portion.
 7. A method as in claim 1, wherein the plurality of images of portions of the fingerprint are rows of pixels values generated with relative movement between the finger and a sensor array.
 8. A method as in claim 4, wherein the at least one gap or discontinuity comprises at least two gaps or discontinuities.
 9. A method as in claim 1, wherein the plurality of images of portions of the fingerprint are rows of pixels values generated by a proper subset of the rows or columns of a placement sensor array without relative movement between the finger and the sensor array.
 10. A method as in claim 1, wherein the distributing the storage of the plurality of image portions while they are being obtained into at least two different memory data structures further including not generating or storing all of the plurality of image portions together in the same memory data structure as a complete fingerprint image or image representation.
 11. A method as in claim 10, wherein the at least two different memory data structures are defined in the same physical memory or buffers.
 12. A method as in claim 10, wherein the at least two different memory data structures are defined in different physical memory or buffers.
 13. A method as in claim 1, wherein the fingerprint minutiae sufficient for identifying the person to whom the fingerprint belongs comprises a substantially complete fingerprint minutiae of the fingertip.
 14. A method as in claim 13, wherein the fingerprint minutiae sufficient for identifying the person to whom the fingerprint belongs comprises a substantially complete fingerprint minutiae of the finger.
 15. A method as in claim 1, wherein the sensor array is a swipe sensor having a first dimension and a second dimension, the first dimension being substantially wide enough to capture the width of a human finger and the second dimension being smaller than the dimension of the length or width of the human finger.
 16. A method of forming a complete fingerprint feature template for a finger without first reconstructing a complete image of the finger or fingerprint, the method comprising: generating separate substantially spatially complementary gapped and fill image data sets storing fingerprint image data that would in combination provide fingerprint image data sufficient to form a complete fingerprint image; augmenting a spatially adjacent region of the gapped image and the fill image to form a substantially spatially continuous augmented image data set; extracting fingerprint features from the augmented image data set and destroying the augmented image data set, and the spatially adjacent region of the gapped image and the fill image that formed the augmented image after the extracting; repeating the augmenting, and extracting and destroying until all of the gapped and fill image data sets have had fingerprint features extracted; and combining the separately extracted fingerprint features to form a complete fingerprint feature template that enables the fingerprint to me compared with and where the comparison is within predetermined criteria to be matched with a reference fingerprint template.
 17. A method as in claim 16, wherein the repeating of the augmenting, and extracting and destroying until all of the gapped and fill image data sets have had fingerprint features extracted is performed with the proviso that if there is an unequal number of gapped and fill image data sets the fingerprint features from the image data set having a greater number has fingerprint features extracted without the need to augment the image before extracting features.
 18. A method as in claim 16, wherein the combining of the separately extracted fingerprint features to form a complete fingerprint feature template may be performed as each set of fingerprint features are extracted, or after all of the set of fingerprint features have been extracted, or as a combination of both of these.
 19. A method as in claim 16, wherein the neither the gapped nor fill images having sufficient data alone to generate a fingerprint minutiae template having enough information to validate a fingerprint match to a reference fingerprint minutiae template.
 20. A method as in claim 16, wherein the gapped image and fill image are separately stored and not combined or addressable as a single data set.
 21. A method as in claim 16, wherein the destroying of the augmented image data set, and the spatially adjacent region of the gapped image and the fill image that formed the augmented image after the extracting is performed before the repeating of the combining, and extracting of any other gapped image and fill image data sets.
 22. A method as in claim 16, wherein the extracted fingerprint features comprise extracted fingerprint minutiae.
 23. A method for maintaining the security of a fingerprint between acquisition with a swipe sensor and extraction of fingerprint features, the method characterized in that: the acquired fingerprint image is separated during acquisition into at least complementary first and second separate data structures so that the complete fingerprint image data set is distributed in a complementary manner but is never created or stored in any one data structure, each of the first and second separate data structures having at least one gap of missing data that is not missing in the other data structure; and a fingerprint feature template is generated for the full fingerprint using feature extraction on a partial image reconstruction and extraction by partial image reconstruction and extraction basis from less than all of the first and second separate data structures, the partial image reconstruction and extraction not generating a feature extraction template that by itself satisfies a standard for fingerprint matching and validation.
 24. A method as in claim 23, wherein the extracted fingerprint features comprise extracted fingerprint minutiae.
 25. A system for forming a complete fingerprint feature template for a finger without first reconstructing a complete image of the finger or fingerprint, the system comprising: a processor for performing logic operations on a fingerprint data set; a memory store coupled with the processor and defining separate first and second data structures for storing first and second substantially complementary gapped and fill portions of a fingerprint image as it is received as a data stream from an external fingerprint swipe sensor; image augmentation logic augmenting a spatially adjacent region of the gapped image and the fill image to form a substantially spatially continuous augmented image data set; feature extraction logic extracting fingerprint features from the augmented image data set and destroying the augmented image data set, and the spatially adjacent region of the gapped image and the fill image that formed the augmented image after the extracting; and partial template combining logic for combining the separately extracted fingerprint features to form a complete fingerprint feature template.
 26. The system in claim 25, wherein the system further comprises the swipe sensor.
 27. The system in claim 25, wherein the system is integrated with at least one of a personal computer, personal data assistant (PDA), cellular telephone, radio, electronic game, information appliance, music player, gambling device, security control device, and combinations of these.
 28. The system in claim 25, wherein the image augmentation logic comprises computer program code instructions executable within the processor and memory, electronic circuit hardware, or a combination of these two.
 29. The system in claim 25, wherein the feature extraction logic comprises computer program code instructions executable within the processor and memory, electronic circuit hardware, or a combination of these two.
 30. The system in claim 25, wherein the partial template combining logic comprises computer program code instructions executable within the processor and memory, electronic circuit hardware, or a combination of these two.
 31. A computer program product stored on tangible media and having a module for controlling an apparatus to forming a complete fingerprint feature template for a finger without first reconstructing a complete image of the finger or fingerprint, the module including instructions for: generating separate substantially spatially complementary gapped and fill image data sets storing fingerprint image data that would in combination provide fingerprint image data sufficient to form a complete fingerprint image; augmenting a spatially adjacent region of the gapped image and the fill image to form a substantially spatially continuous augmented image data set; extracting fingerprint features from the augmented image data set and destroying the augmented image data set, and the spatially adjacent region of the gapped image and the fill image that formed the augmented image after the extracting; repeating the augmenting, and extracting and destroying until all of the gapped and fill image data sets have had fingerprint features extracted; and combining the separately extracted fingerprint features to form a complete fingerprint feature template that enables the fingerprint to me compared with and where the comparison is within predetermined criteria to be matched with a reference fingerprint template.
 32. A data structure for storing a fingerprint image, the data structure comprising: a first storage adapted for storing a first spatially discontinuous plurality of spatially continuous fingerprint portions from a single fingerprint; a second storage adapted for storing a second spatially discontinuous plurality of spatially continuous fingerprint portions from the single fingerprint; and the first and second spatially discontinuous plurality of fingerprint image portions being complementary in spatial coverage and substantially non-overlapping.
 33. A method of generating a fingerprint template of fingerprint minutiae without first generating a complete image of the fingerprint, the method comprising: (a) obtaining a plurality of images of portions of a fingerprint including a first image portion and a second image portion; (b) constructing a first partial composite image from the first image portion and extracting minutiae from the first partial composite image to generate a first partial minutiae template; (c) constructing a second partial composite image from the second image portion and extracting minutiae from the second partial composite image to generate a second partial minutiae template; and (d) combining the first and second partial minutiae templates to generate a complete minutiae template.
 34. A method as in claim 33, wherein the step (c) constructing of the second partial composite image from the second image portion and extracting minutiae from the second partial composite image to generate a second partial minutiae template, is performed in a different memory data structure than the step (b) constructing a first partial composite image from the first image portion and extracting minutiae from the first partial composite image to generate a first partial minutiae template.
 35. A method as in claim 33, further comprising: distributing the storage of the first image portion and the second image portion while they are being acquired into at least a first memory data structure and a different second memory data structure so that the entire finger image is not stored in the same memory data structure at the same time.
 36. A method as in claim 33, wherein: a partially reconstructed image portion with a gap portion may be stored in the same memory data structure as raw finger image frame data.
 37. A method as in claim 33, wherein: a first reconstructed image portion and a second reconstructed image portion which if combined would form a complete finger image are stored in different memory data structures.
 38. A method as in claim 37, wherein: the different memory data structures are selected from the group consisting of different physical memory devices or circuits, different logical memory, a separately addressable portion of a common physical or logical memory, and combinations thereof.
 39. A method for maintaining the security of a fingerprint acquired with a fingerprint sensor, the method characterized in that: the acquired fingerprint image is separated during acquisition into at least complementary first and second separate data structures so that no complete fingerprint image data set is ever stored in any one data structure; and a fingerprint feature template is generated representing a complete fingerprint using feature extraction, on a partial image reconstruction and extraction by partial image reconstruction and extraction basis, from less than all of the first and second separate data structures. 