G07C2209/12

AUTHENTICATION CANDIDATE EXTRACTION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION CANDIDATE EXTRACTION METHOD, AND PROGRAM
20240054201 · 2024-02-15 · ·

An authentication candidate extraction apparatus comprises a biometric information input part that receives biometric information of a to-be-authenticated subject, moving from a first spot to a second spot, acquired at the first spot; a feature information storage part that stores feature information used for authentication of the to-be-authenticated subject; a candidate selection part that selects a feature information candidate to be used for the authentication processing by means of a predetermined secure computation scheme using features extracted from the biometric information acquired at the first spot; and a feature information transmission part that transmits the extracted feature information candidate to an authentication apparatus that performs authentication processing using biometric information of the to-be-authenticated subject acquired at the second spot.

Authentication candidate extraction apparatus, authentication system, authentication candidate extraction method, and program
11995164 · 2024-05-28 · ·

An authentication candidate extraction apparatus comprises a biometric information input part that receives biometric information of a to-be-authenticated subject, moving from a first spot to a second spot, acquired at the first spot; a feature information storage part that stores feature information used for authentication of the to-be-authenticated subject; a candidate selection part that selects a feature information candidate to be used for the authentication processing by means of a predetermined secure computation scheme using features extracted from the biometric information acquired at the first spot; and a feature information transmission part that transmits the extracted feature information candidate to an authentication apparatus that performs authentication processing using biometric information of the to-be-authenticated subject acquired at the second spot.

ENTRY CONTROL DEVICE, ENTRY CONTROL SYSTEM, ENTRY CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
20240153326 · 2024-05-09 · ·

An entry control device according to the present disclosure includes: a first biometric authentication control unit that acquires first biometric information from a predetermined user who tries to enter a facility including a plurality of regions where entry is restricted in each of a plurality of locking systems, and controls first biometric authentication; an attribute information acquisition unit that acquires attribute information about the user when the authentication has succeeded; a registration unit that registers, in association with a patron in a storage device, second biometric information acquired from the user when an attribute of the user is an authorized user; a second biometric authentication control unit that acquires biometric information including the second biometric information from the user, and controls second biometric authentication; and an unlocking control unit that instructs unlocking to the locking system when the authentication has succeeded.

Personal digital key initialization and registration for secure transactions
10374795 · 2019-08-06 · ·

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes.

VIDEO AND STILL IMAGE DATA ALTERATION TO ENHANCE PRIVACY
20190197296 · 2019-06-27 ·

A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.

Personal digital key initialization and registration for secure transactions
12014369 · 2024-06-18 · ·

A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A personal digital key (PDK) is programmed using a trusted programming device to initialize and/or register the PDK for use. In one embodiment, the initialization and registration processes are administered by a specialized trusted Notary to ensure the processes follow defined security procedures. In a biometric initialization, the programming device acquires a biometric input from a user and writes the biometric data to a tamperproof memory in the PDK. In registration, the Programmer communicates to one or more remote registries to create or update entries associated with the user PDK. Once initialized and registered, the PDK can be used for various levels of secure authentication processes.

SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS

Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.

Graphic data alteration to enhance online privacy
10223576 · 2019-03-05 ·

A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.

ATTACK RESISTANT BIOMETRIC AUTHORISED DEVICE
20190065716 · 2019-02-28 ·

A biometric authorised device may include a biometric sensor, a processing unit for receiving an output signal from the biometric sensor, and one or more protected feature(s). Access to the protected feature(s) of the device is enabled in response to identification of an authorised user via biometric data supplied through the biometric sensor to the processing unit and the device is arranged to compare the output signal of the biometric sensor with stored data based on earlier output signals for authorised users. If the output signal is found to be identical to one of the earlier output signals then access to the protected feature(s) is not permitted.