Abstract: As a protection mechanism, presently we are using either passwords or biometric finger scanning mechanism. But we know that, through number of hacking techniques password can be stolen or may be lost. With Biometric keyboard scanner, only one finger scanning mechanisms is available now-a-days, usually in the upper right corner of the device. Here we propose an application which uses combination of username characters and corresponding finger scanning along with typed character from keyboard. This biometric keyboard is exactly similar to regular keyboard with finger scanner integrated with alphabets and numerals keyboard. When user press any character key from keyboard, the combination of entered character and finger used to press the key is stored as password. At the time of login, when user enters his username, the combination of character key pressed from keyboard and specific finger used to press that key is validated against stored password. If match found, then only user will get login. If one of the combinations is wrong, then user identified as unauthenticated user. To match the result, biometric hash value is used. Following invention is described in detail with the help of Figure 1 of sheet 1 showing the proposed keyboard
CLIAMS:We claim:-
1. A device and method for development of next generation Biometric keyboard that contain biometric scanner integrated with each alphabet key and numeric keys of keyboard using combination of username characters and corresponding finger scanning along with typed character from keyboard mainly comprising of a regular keyboard with finger scanner integrated with alphabets and numerals keyboard.
2. In the system as claimed in claim 1 when users press any of the keys, that specific finger is scanned along with key pressed and if stored sequence match with key pressed sequence with correct fingers, login is provided to the user.
3. Biometric fingerprint scanner of the device as claimed in claim 1 is integrated with all alphabets from keyboard highlighted with coloured border and numerals highlighted with different coloured border.
4. In the system as claimed in claim 1 there is one SCAN LOCK key at upper right corner which is used for making Biometric scanning ON/OFF, depending on user’s choice.
5. In the keyboard simulation of the device as claimed in claim 1assuming finger sequence is set if user press character m, its fingerprint hash will be generated and finally it will display pressed character (M) and its hash value.
6. In the system as claimed in claim 1 when simulator starts, it has 3 options: Register (1), Login (2) and Settings (3).
7. In the working of the system as claimed in claim 6:
a) When new user is going to use application that person needs to do Registration (1);
b) For Registration user will fill details like selection of user_id, giving user-name (in which user is interested);
c) In our case we have stored Biometric images of 2 users;
d) User_id is needed to use corresponding fingers set for that user;
e) It will show user selected on console;
f) For typing user_name user can select simulated Biometric Keyboard (In our simulator, we have used windows keyboard);
g) When user presses any key that pressed key will be displayed on console as typed character, along with finger used;
h) Then user has to retype user name;
i) It will calculate key+finger hash value;
j) For hash value generation here in built java function is used;
k) As user goes on typing characters of username, total hash value will be calculated and it will show on console as final Bio encrypted username;
l) It will be used during login process to verify user;
m) Next depending on choice, user can set recovery options Recovery with single finger or recovery with 2 fingers;
n) It will be helpful in case of accidental damage to finger/fingers;
o) After registration, user can login (2), by using registration details;
p) Select user_id, type user_name and login or login with recovery options;
q) Here when user gives user name with selected user_id, generated Bio encrypted hash value will be matched with stored Bio encrypted hash value and verification done;
r) Settings (3) section is provided to load or to change fingers used for specific users;
s) In our application we have stored alphabets (A to Z) with specific fingers for 2 users in XML file.
,TagSPECI:FORM 2
THE PATENT ACT 1970
(39 OF 1970)
AND
The patent rules, 2003
COMPLETE SPECIFICATION
(See section 10: rule 13)
1. TITLE OF INVENTION
Next Generation Biometric Keyboard
2 APPLICANTS
Sr. No Name Nationality Address
1 Ajinkya Vishnu Jiman Indian Marathwada Mitra Mandal’s College of Engineering, Pune, Maharashtra, India.
2 Rupali Mahesh Chopade Indian Marathwada Mitra Mandal’s College of Engineering, Pune, Maharashtra, India.
3. PREAMBLE TO THE DESCRIPTION
COMPLETE
Following specification particularly describes the invention and the manner in which it is to be performed.
4. DESCRIPTION.
Technical field of invention:
Present invention in general relates to device and method for next generation Biometric keyboard that contain biometric scanner integrated with each alphabet and numeric keys of keyboard and in particular to a security mechanism where username character and finger prints are used.
Prior art:
All of the computing devices generally require identity verification of users. As merely an example, computer keyboards are most commonly used as such input devices, and user ID and password are often used to verify a user's identity. Unfortunately, certain limitations exist in such verification. For example, user ID and password can be stolen. In other cases, trial-and-error methods, either manual or automated, can be used to derive user ID and password. Accordingly, biometrics information based on user typing behavior has been proposed for user identification.
Although biometrics behavior information has been used with certain computer applications, various limitations still exist. For example, integration of keyboard dynamics biometrics information can also cause complications in computer systems software. In addition, once a user is logged in, the computing system can be left unattended and can become vulnerable to misuse. These and other limitations have been described throughout the prior specification and more particularly below.
US 8134449 B2 describes a method and system for biometric keyboard. A method for training a computing system using keyboard biometric information is disclosed. The method includes depressing two or more keys on a keyboard input device for a first sequence of keys. The method then determines a key press time for each of the two or more keys to provide a key press time characteristic in the first sequence of keys. The method also determines a flight time between a first key and a second key to provide a flight time characteristic in the first sequence of keys, the first key being within the two or more keys. The method includes storing the key press time characteristic and the flight time characteristic for the first sequence of keys, and displaying indications associated with the first sequence of keys on a display device provided on a portion of the keyboard input device.
US 20130347099 A1 discloses Keyboard as biometric authentication device. Various embodiments are generally directed to use of a keyboard as a biometric authentication device. In one embodiment, for example, an apparatus comprises a processor circuit executing a sequence of instructions causing the processor circuit to receive a signal indicative of a key press of at least one key of a keyboard communicatively coupled to the apparatus, and indicative of at least one physical characteristic associated with the key press; compare the at least one physical characteristic to at least one stored physical characteristic associated with at least one authorized user of the apparatus; and determine if the key press is associated with at least one authorized user of the apparatus based on the comparison.
Reconfigurable mobile device with keyboard cover and biometric authentication is mentioned in US 8831694 B1. A multifunction touch screen enabled mobile device may be configured to be connected to the separate cover, which may be attached to the device and detached from the device. The mobile device may be enabled with a cellular voice and data communication, Wi-Fi connectivity, Bluetooth connectivity, and Internet Protocol connectivity. The mobile device may be enabled to play videos, capture photos, and stream multimedia content.
US 20120234058 A1 describes wireless access control system and related methods. A wireless access control system includes a remote access device. A plugin device communicates with the remote access device. A lock controls the ability to lock and unlock a door in which the lock is disposed. The lock is in communication with the plugin device. The plugin device determines a distance between the remote access device and the lock and causes the lock to communicate with the remote access device when the remote access device is at a distance less than or equal to a predetermined distance from the lock to enable the lock to be unlocked.
Method for fingerprinting and identifying internet users is disclosed in US 8204833 B2. Various aspects of the present system provide methods and systems for identifying an individual who operates a remote computer. One aspect provides a technique to generate fingerprint of computer and its user based on the information collected through the actions a user conducts on internet. Another aspect of the system provides a technique to compute the fingerprints and find relations between users and computers. Another aspect of the system provides a trust ranking to a user based on the consistency of information collected from the user's various actions.
US 8667297 B2 discloses Key with integral biometric input device. A key integrates with a biometric input device. According to an aspect a fingerprint scanner may be integral with a spacebar. In accordance with another aspect of the present application, there is provided a mobile communication device. The mobile communication device comprises a keyboard input device including a key and a biometric input device integral with the key. In accordance with a further aspect of the present application, there is provided a method of handling input from a key in a keyboard. The method comprises receiving input from a key in a keyboard, determining that the input is a candidate biometric from a biometric input device integral to the key and processing the candidate biometric.
WO 2007140806 A1 discloses Fingerprint activated quick function selection. A device such as a laptop computer includes a fingerprint sensor and has a specific function to be performed associated with at least two of the fingerprints of an authorized user of the device. The device performs the specific function when an authorized user places a finger on the fingerprint sensor. The functions associated with the fingerprints of the authorized users can be quickly- accessed even when a security or keyboard lock is active. A mobile communication terminal' includes a fingerprint sensor in a call handling key. Calls are answered, rejected or initiated when an authorized user places a finger on the fingerprint sensor.
On-type biometrics fingerprint soft keyboard is described in US 7486810 B1. One embodiment of this invention addresses the use of biometrics for accessing a touch screen keyboard on a tablet personal computer (PC), and ensuring security if the PC is left unattended. The core idea is to assign biometrics to soft keyboards without the use of a physical keyboard. In this example, every key on the keyboard will be assigned a biometric fingerprint associated with the corresponding finger that would type it. When a user types, a portion of its fingerprint touches the keys. By storing the portions and assigning the portions to the soft keyboard, it is ensured that every key typed is associated with the corresponding key fingerprint portion, thus ensuring maximum biometric security. In addition, the keystroke delays and word delays can be recorded and compared with previous data for added security.
From the above, it is seen that an improved technique for computer operation using keyboard biometrics information is desired. Hence the present invention implements a next generation biometric keyboard which can be used as a security mechanism.
Object:
1. Primary object of the present invention is to provide a device and method for next generation Biometric keyboard.
2. Another object of the present invention is to provide a biometric keyboard with biometric scanner integrated with each alphabet keys and numeric keys of keyboard.
3. Yet another object of the present invention is to provide a Biometric Keyboard which can be used as a security mechanism.
4. Yet another object of the present invention is to use our username as password that will be a combination of username characters and fingers that we are generally using to press respective characters of username.
5. Yet another object of the present invention is to provide a method and technique which is more secure than password / PIN.
6. Yet another object of the present invention is to provide a system which uses combination of username characters and corresponding finger scanning along with typed character from keyboard.
7. Yet another object of the present invention is that there is no need to remember password with this system.
8. Yet another object of the present invention is not to worry about password cracking / hacking of our personal documents.
9. Yet another object of the present invention is to provide a mechanism in which user should be physically available to login.
Other objects, features and advantages will become apparent from detail description and appended claims to those skilled in art.
STATEMENT:
Accordingly following invention provides a device and method for development of next generation Biometric keyboard that contain biometric scanner integrated with each alphabet key and numeric keys of keyboard. Here the proposed invention uses combination of username characters and corresponding finger scanning along with typed character from keyboard. This biometric keyboard is similar to regular keyboard with finger scanner integrated with alphabets and numerals keyboard. When users press any of the keys from this, that specific finger will be scanned along with key pressed. If stored sequence match with key pressed sequence with correct fingers, login will be given to user. Biometric fingerprint scanner will be integrated with all alphabets from keyboard highlighted with Green border and numerals highlighted with colored border. There is one SCAN LOCK key at upper right corner which will be used for making Biometric scanning ON/OFF, depending on user’s choice. As per our keyboard simulation assuming finger sequence is set, if user press character m, its fingerprint hash will be generated. Finally it will display pressed character (M) and its hash value. The preferred embodiment mainly comprises of keyboard with scan lock key, biometric scanner, etc.
BRIEF DESCRIPTION OF DRAWING:
This invention is described by way of example with reference to the following drawing where,
Figure 1 of sheet 1 shows one of the preferred embodiments of the proposed biometric keyboard.
Where,
1 denotes Green Border
2 denotes Red Border
3 denotes Scan Lock Key
4 denotes M (Letter)
5 denotes Fingerprint Hash
6 denotes M + (Fingerprint Hash).
Figure 2 of sheet 2 shows flow diagram of the simulator having 3 options Register, Login and Settings
Where,
7 denotes Start
8 denotes Register 1
9 denotes Login 2
10 denotes Setting 3.
11 denotes Login 2
12 denotes Select User-ID
13 denotes Use simulated biometric keyboard
14 denotes Give user name
15 denotes use recovery option
16 denotes Yes
17 denotes Use either recovery option 1 or recovery option 2
18 denotes No
19 denotes Login.
20 denotes Settings 3
21 denotes Load Settings
22 denotes Edit Settings (set/change finger used)
23 denotes Letter
24 denotes Finger used.
Figure 3 of sheet 3 shows fingerprints from left hand side to right hand side
In order that the manner in which the above-cited and other advantages and objects of the invention are obtained, a more particular description of the invention briefly described above will be referred, which are illustrated in the appended drawing. Understanding that these drawing depict only typical embodiment of the invention and therefore not to be considered limiting on its scope, the invention will be described with additional specificity and details through the use of the accompanying drawing.
Detailed description:
As a protection mechanism, presently we are using either passwords or biometric finger scanning mechanism. But we know that, through number of hacking techniques password can be stolen or may be lost. Biometric finger scanning mechanisms are generally used for attendance monitoring. It can’t be used as a password mechanism for application login.
Here the application is a Biometric Keyboard which can be used as a security mechanism where you can use your username as password, that username will be a combination of username characters and fingers that you are generally using to press respective characters of username.
Advantages of Application:
1. More secure than password / PIN
2. No need to remember password
3. User should be physically available to login
4. No worry about password cracking / hacking
Each person has a habit of pressing particular key by particular finger. In real life, we can differentiate between two person using different identities like fingerprints, face, ID proofs. While simulating computer cannot differentiate users using fingerprints only. We need to map user id and his fingerprints. So in simulation we assumed that, specific set of fingerprints are for specific users. I.e. for id user-0 we used 10 fingerprints from left hand side to right hand side as shown in figure 3.
The labels with each fingerprint is assumed as input from scanner attached to each key of keyboard. When user presses the key 2 inputs are passed to the processor, the ASCII value and the fingerprint associated with that key (used while pressing the key). For simulation purpose as already mentioned we uses stored fingerprint as input.
Here, we have stored habit of two users of pressing keys. E.g. user-0 presses a key ‘A’ with ‘index’ (L-4 left hand side 4th finger) this Key-Fingerprint label values are stored in tables.
Whenever a new user registers himself with the system, his data is stored is an XML file. A new xml file is generated per user. When user logs into the system, he is asked to enter his username with same finger print and key combination used at the time of registration. When user enters his details, it is compared against the data in xml file. If user is successfully authenticated, he will be allowed to use the system.
In normal keyboard working when user press and release any key (1) corresponding scan code and break code of key will be generated (2) and accordingly information is sent to monitor to display specific character (3). As shown in above case, pressing SHIFT + A key and displaying it on Display device.
Our proposed Keyboard working is as given below:
Biometric fingerprint scanner will be integrated with all alphabets from keyboard highlighted with Green border (1) and numerals highlighted with Red border (2). There is one SCAN LOCK key at upper right corner (3) which will be used for making Biometric scanning ON/OFF, depending on user’s choice. As per our keyboard simulation assuming finger sequence is set, if user press character m (4), its fingerprint hash will be generated(5). Finally it will display pressed character (M) and its hash value (6).
For secured applications we use password, which is typed from Normal keyboard. But due to number of limitations to password, we have proposed biometric keyboard with integrated biometric scanner to each alphabet and each numerals. With this there is no need of password. User can use his/her username as password. Suppose my username is Indian, then for each character of username my key pressing habits by specific fingers are already stored like password. Suppose stored sequence is as given below (As per finger identification shown in above image).
i:R3
n: R2
d:L4
i:R3
a:L4
n: R2
When I try to login by giving username Indian and pressing keys by stored finger scans then only I will identified as authenticated and will get login.
If I press any of the above character with finger other than stored then my authentication will fail.
Best method of performance of the Invention:-
“Next generation Biometric keyboard” will contain biometric scanner integrated with each alphabet key and numeric keys of keyboard. When users press any of the keys from this, that specific finger will be scanned along with key pressed. If stored sequence match with key pressed sequence with correct fingers, login will be given to user. For example stored sequence (user id) is test(t+L4,e+L3,,s+L4,t+L3),then during login if user follows the same sequence then correct otherwise if one of the combination is wrong(like t+L4,e+L3,,s+L4,t+L4), user will be unable to login. For most secure applications, this keyboard can be used.
When we start simulator will have 3 options: Register (1), Login (2) and Settings (3).
When new user is going to use application that person needs to do Registration (1). For Registration user will fill details like selection of user_id, giving user-name (in which user is interested).In our case we have stored Biometric images of 2 users. User_id is needed to use corresponding fingers set for that user. It will show user selected on console. For typing user_name user can select simulated Biometric Keyboard (In our simulator, we have used windows keyboard).When user presses any key that pressed key will be displayed on console as typed character, along with finger used. Then user has to retype user name. It will calculate key+finger hash value. For hash value generation here in built java function is used. As user goes on typing characters of username, total hash value will be calculated and it will show on console as final Bio encrypted username. It will be used during login process to verify user. Next depending on choice, user can set recovery options Recovery with single finger or recovery with 2 fingers. It will be helpful in case of accidental damage to finger/fingers.
After registration, user can login (2), by using registration details. Select user_id, type user_name and login or login with recovery options. Here when user gives user name with selected user_id, generated Bio encrypted hash value will be matched with stored Bio encrypted hash value and verification done.
Settings (3) section is provided to load or to change fingers used for specific users. In our application we have stored alphabets (A to Z) with specific fingers for 2 users in XML file, as shown in figure (3).
Additional advantages and modification will readily occur to those skilled in art. Therefore, the invention in its broader aspect is not limited to specific details and representative embodiments shown and described herein. Accordingly various modifications may be made without departing from the spirit or scope of the general invention concept as defined by the appended claims and their equivalents.
Adv. Swapnil Gawande (IN/PA/1587)
CLAIMS
We claim:-
1. A device and method for development of next generation Biometric keyboard that contain biometric scanner integrated with each alphabet key and numeric keys of keyboard using combination of username characters and corresponding finger scanning along with typed character from keyboard mainly comprising of a regular keyboard with finger scanner integrated with alphabets and numerals keyboard.
2. In the system as claimed in claim 1 when users press any of the keys, that specific finger is scanned along with key pressed and if stored sequence match with key pressed sequence with correct fingers, login is provided to the user.
3. Biometric fingerprint scanner of the device as claimed in claim 1 is integrated with all alphabets from keyboard highlighted with coloured border and numerals highlighted with different coloured border.
4. In the system as claimed in claim 1 there is one SCAN LOCK key at upper right corner which is used for making Biometric scanning ON/OFF, depending on user’s choice.
5. In the keyboard simulation of the device as claimed in claim 1assuming finger sequence is set if user press character m, its fingerprint hash will be generated and finally it will display pressed character (M) and its hash value.
6. In the system as claimed in claim 1 when simulator starts, it has 3 options: Register (1), Login (2) and Settings (3).
7. In the working of the system as claimed in claim 6:
a) When new user is going to use application that person needs to do Registration (1);
b) For Registration user will fill details like selection of user_id, giving user-name (in which user is interested);
c) In our case we have stored Biometric images of 2 users;
d) User_id is needed to use corresponding fingers set for that user;
e) It will show user selected on console;
f) For typing user_name user can select simulated Biometric Keyboard (In our simulator, we have used windows keyboard);
g) When user presses any key that pressed key will be displayed on console as typed character, along with finger used;
h) Then user has to retype user name;
i) It will calculate key+finger hash value;
j) For hash value generation here in built java function is used;
k) As user goes on typing characters of username, total hash value will be calculated and it will show on console as final Bio encrypted username;
l) It will be used during login process to verify user;
m) Next depending on choice, user can set recovery options Recovery with single finger or recovery with 2 fingers;
n) It will be helpful in case of accidental damage to finger/fingers;
o) After registration, user can login (2), by using registration details;
p) Select user_id, type user_name and login or login with recovery options;
q) Here when user gives user name with selected user_id, generated Bio encrypted hash value will be matched with stored Bio encrypted hash value and verification done;
r) Settings (3) section is provided to load or to change fingers used for specific users;
s) In our application we have stored alphabets (A to Z) with specific fingers for 2 users in XML file.
Adv. Swapnil Gawande (IN/PA/1587)
Ajinkya Vishnu Jiman
Rupali Mahesh Chopade Sheet 3/1
Figure 1
Adv. Swapnil Gawande (IN/PA/1587)
Ajinkya Vishnu Jiman
Rupali Mahesh Chopade Sheet 3/2
Figure 2
Adv. Swapnil Gawande (IN/PA/1587)
Ajinkya Vishnu Jiman
Rupali Mahesh Chopade Sheet 3/3
Figure 3
Adv. Swapnil Gawande (IN/PA/1587)
ABSTRACT
As a protection mechanism, presently we are using either passwords or biometric finger scanning mechanism. But we know that, through number of hacking techniques password can be stolen or may be lost. With Biometric keyboard scanner, only one finger scanning mechanisms is available now-a-days, usually in the upper right corner of the device. Here we propose an application which uses combination of username characters and corresponding finger scanning along with typed character from keyboard. This biometric keyboard is exactly similar to regular keyboard with finger scanner integrated with alphabets and numerals keyboard. When user press any character key from keyboard, the combination of entered character and finger used to press the key is stored as password. At the time of login, when user enters his username, the combination of character key pressed from keyboard and specific finger used to press that key is validated against stored password. If match found, then only user will get login. If one of the combinations is wrong, then user identified as unauthenticated user. To match the result, biometric hash value is used. Following invention is described in detail with the help of Figure 1 of sheet 1 showing the proposed keyboard.
| # | Name | Date |
|---|---|---|
| 1 | Form 18 [03-12-2016(online)].pdf | 2016-12-03 |
| 2 | Form-18(Online).pdf | 2018-08-11 |
| 3 | form 5.pdf | 2018-08-11 |
| 4 | form 3.pdf | 2018-08-11 |
| 5 | form 26.pdf | 2018-08-11 |
| 6 | form 2.pdf | 2018-08-11 |
| 7 | figure.pdf | 2018-08-11 |
| 8 | 329-MUM-2015-FER.pdf | 2020-07-06 |
| 9 | 329-MUM-2015-FER_SER_REPLY [06-01-2021(online)].pdf | 2021-01-06 |
| 10 | 329-MUM-2015-FORM 18A [26-03-2021(online)].pdf | 2021-03-26 |
| 11 | 329-MUM-2015-Correspondence to notify the Controller [26-05-2021(online)].pdf | 2021-05-26 |
| 12 | 329-MUM-2015-FORM-26 [27-05-2021(online)].pdf | 2021-05-27 |
| 13 | 329-MUM-2015-Written submissions and relevant documents [11-06-2021(online)].pdf | 2021-06-11 |
| 14 | 329-MUM-2015-FORM 3 [11-06-2021(online)].pdf | 2021-06-11 |
| 15 | 329-MUM-2015-ENDORSEMENT BY INVENTORS [11-06-2021(online)].pdf | 2021-06-11 |
| 16 | 329-MUM-2015-Annexure [11-06-2021(online)].pdf | 2021-06-11 |
| 17 | 329-MUM-2015-Response to office action [18-06-2021(online)].pdf | 2021-06-18 |
| 18 | 329-MUM-2015-PatentCertificate18-06-2021.pdf | 2021-06-18 |
| 19 | 329-MUM-2015-IntimationOfGrant18-06-2021.pdf | 2021-06-18 |
| 20 | 329-MUM-2015-US(14)-HearingNotice-(HearingDate-27-05-2021).pdf | 2021-10-18 |
| 1 | 329MUM2015E_03-07-2020.pdf |