G07C2209/12

Video and still image data alteration to enhance privacy
11080513 · 2021-08-03 ·

A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.

ANONYMIZED BIOMETRIC DATA INTEGRATION

Biometric features are derived from security data associated with a subject. The security data is obtained from a security device. A biometric value is calculated from the biometric features. The biometric value is anonymized to an identifier associated with the subject. The identifier is integrated with event data associated with a security system. In an embodiment, the security device is a Personal Identification Number (PIN) pad integrated into a transaction terminal, the security data is fingerprint data, which is read from a finger of the subject placed on a fingerprint reader integrated into the PIN pad, and the biometric value is a PIN calculated from fingerprint data during a transaction at the transaction terminal. In an embodiment, the security device is a security camera, the security data is a secure video stream, and the biometric features are facial features of the subject in the secure video stream.

Short-range device communications for secured resource access

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

METHOD FOR PROTECTING BIOMETRIC TEMPLATES, AND A SYSTEM AND METHOD FOR VERIFYING A SPEAKER'S IDENTITY
20200335107 · 2020-10-22 ·

A method for protecting a biometric template, comprising the steps of: retrieving an original vector (V) representing said biometric template, said vector comprising a plurality of original elements (v.sub.1, v.sub.2, . . . v.sub.i, . . . , v.sub.n); mapping at least some elements from said original vector to a protected vector (P) comprising a plurality of protected elements (p.sub.1, p.sub.2, . . . p.sub.i, . . . , p.sub.nm+1), the mapping being based on multivariate polynomials defined by m user-specific coefficients (C) and exponents (E).

Personal Digital Key Initialization and Registration for Secure Transactions
20200304301 · 2020-09-24 ·

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes.

Biometric signature system and biometric certificate registration method
10719593 · 2020-07-21 · ·

This biometric signature system comprises: a biometric certificate storage module that stores a biometric certificate generated on the basis of a user's biometric information; a biometric information acquisition module that acquires new biometric information from the user; a biometric certificate generation module that generates a new biometric certificate on the basis of the new biometric information; a biometric signature generation module that assigns a biometric signature to the new biometric certificate on the basis of the new biometric information; a biometric signature verification module that verifies the biometric signature using the biometric certificate stored in the biometric certificate storage module; and a biometric certificate registration module that registers the new biometric certificate in the biometric certificate storage module if verification of the biometric signature was successful.

Short-range device communications for secured resource access

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

Anonymized biometric data integration

Biometric features are derived from security data associated with a subject. The security data is obtained from a security device. A biometric value is calculated from the biometric features. The biometric value is anonymized to an identifier associated with the subject. The identifier is integrated with event data associated with a security system. In an embodiment, the security device is a Personal Identification Number (PIN) pad integrated into a transaction terminal, the security data is fingerprint data, which is read from a finger of the subject placed on a fingerprint reader integrated into the PIN pad, and the biometric value is a PIN calculated from fingerprint data during a transaction at the transaction terminal. In an embodiment, the security device is a security camera, the security data is a secure video stream, and the biometric features are facial features of the subject in the secure video stream.

ENTRY MANAGEMENT SYSTEM, ACCESS CONTROL APPARATUS, ACCESS CONTROL METHOD, AND RECORDING MEDIUM
20240062605 · 2024-02-22 · ·

An entry management system SYS includes: a user terminal 1 that is possessed by a user U and is capable of notifying information to the user; and an entry control apparatus 3. The entry control apparatus includes: an acquisition unit 311 configured to acquire biological information on the user; a determination unit 312 configured to determine, based on the biological information, whether or not to permit entry of the user into a management target area MTA; and a control unit 313 configured to output determination result information to the user terminal in a case where it is determined that entry of the user into the management target area is not permitted.