Patent classifications
G06F21/45
MULTI-DOMAIN CONVOLUTIONAL NEURAL NETWORK
In one embodiment, an apparatus comprises a memory and a processor. The memory is to store visual data associated with a visual representation captured by one or more sensors. The processor is to: obtain the visual data associated with the visual representation captured by the one or more sensors, wherein the visual data comprises uncompressed visual data or compressed visual data; process the visual data using a convolutional neural network (CNN), wherein the CNN comprises a plurality of layers, wherein the plurality of layers comprises a plurality of filters, and wherein the plurality of filters comprises one or more pixel-domain filters to perform processing associated with uncompressed data and one or more compressed-domain filters to perform processing associated with compressed data; and classify the visual data based on an output of the CNN.
MULTI-DOMAIN CONVOLUTIONAL NEURAL NETWORK
In one embodiment, an apparatus comprises a memory and a processor. The memory is to store visual data associated with a visual representation captured by one or more sensors. The processor is to: obtain the visual data associated with the visual representation captured by the one or more sensors, wherein the visual data comprises uncompressed visual data or compressed visual data; process the visual data using a convolutional neural network (CNN), wherein the CNN comprises a plurality of layers, wherein the plurality of layers comprises a plurality of filters, and wherein the plurality of filters comprises one or more pixel-domain filters to perform processing associated with uncompressed data and one or more compressed-domain filters to perform processing associated with compressed data; and classify the visual data based on an output of the CNN.
DIGITAL CREDENTIAL REVOCATION
A device implementing a digital credential revocation system includes at least one processor configured to maintain a valid digital credential list, a revocation list, and a synchronization counter value. The at least one processor is configured to transmit a request to synchronize the valid digital credential list with an electronic device, the request including the valid digital credential list and the revocation list. The at least one processor is further configured to, in response to receipt of an updated valid digital credential list from the electronic device: clear the revocation list, replace the valid digital credential list with the updated valid digital credential list, and increment the synchronization counter value, and fulfill a received credential maintenance request when the received credential maintenance request comprises an other synchronization counter value that is greater than or equal to the incremented synchronization counter value, otherwise deny the received credential maintenance request.
DIGITAL CREDENTIAL REVOCATION
A device implementing a digital credential revocation system includes at least one processor configured to maintain a valid digital credential list, a revocation list, and a synchronization counter value. The at least one processor is configured to transmit a request to synchronize the valid digital credential list with an electronic device, the request including the valid digital credential list and the revocation list. The at least one processor is further configured to, in response to receipt of an updated valid digital credential list from the electronic device: clear the revocation list, replace the valid digital credential list with the updated valid digital credential list, and increment the synchronization counter value, and fulfill a received credential maintenance request when the received credential maintenance request comprises an other synchronization counter value that is greater than or equal to the incremented synchronization counter value, otherwise deny the received credential maintenance request.
METHOD AND APPARATUS FOR AUTHENTICATING HANDWRITTEN SIGNATURE USING MULTIPLE AUTHENTICATION ALGORITHMS
According to the present disclosure, a handwritten signature to be authenticated is received, a plurality of pieces of signature behavioral characteristic information are extracted, all of the plurality of the pieces of the extracted signature behavioral characteristic information are applied to each of first and second signature authentication algorithms using different techniques to analyze a degree of matching between the received handwritten signature and a registered handwritten signature, results of analysis performed by the first and second signature authentication algorithms are combined to adjust a false rejection rate and a false acceptance rate, and whether handwritten signature authentication succeeds is finally determined.
METHOD AND APPARATUS FOR AUTHENTICATING HANDWRITTEN SIGNATURE USING MULTIPLE AUTHENTICATION ALGORITHMS
According to the present disclosure, a handwritten signature to be authenticated is received, a plurality of pieces of signature behavioral characteristic information are extracted, all of the plurality of the pieces of the extracted signature behavioral characteristic information are applied to each of first and second signature authentication algorithms using different techniques to analyze a degree of matching between the received handwritten signature and a registered handwritten signature, results of analysis performed by the first and second signature authentication algorithms are combined to adjust a false rejection rate and a false acceptance rate, and whether handwritten signature authentication succeeds is finally determined.
DETECTING ATTEMPTS TO DEFEAT FACIAL RECOGNITION
A device may select an individual that is a candidate for authentication by facial recognition. The device may identify a facial area of the individual and an area of exposed skin of the individual. The device may obtain a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual. The device may determine, based on the first temperature and the second temperature, whether an appearance of the facial area of the individual is likely altered by a face-altering technology. The device may selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology.
DETECTING ATTEMPTS TO DEFEAT FACIAL RECOGNITION
A device may select an individual that is a candidate for authentication by facial recognition. The device may identify a facial area of the individual and an area of exposed skin of the individual. The device may obtain a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual. The device may determine, based on the first temperature and the second temperature, whether an appearance of the facial area of the individual is likely altered by a face-altering technology. The device may selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology.
CUSTOMER RECOGNITION SYSTEM
A method implements a customer recognition system. A request with an identifier of an unidentified user is received. Sparse data is generated from string information corresponding to the identifier. Preexisting identifiers are filtered to generate a list of candidate identifiers using the sparse data. The plurality of preexisting identifiers correspond to a plurality of preexisting users. A core identifier is selected by determining a match between the identifier and a preexisting identifier from the preexisting identifiers using distance information generated using the list of candidate identifiers. The core identifier is matched to the identifier using the match to identify the unidentified user as a preexisting user from the plurality of preexisting users.
Credential manager integration
Techniques are disclosed relating to credential managers. In some embodiments, a computing device maintains a credential manager that stores, in a protected manner, a set of credentials for authenticating a user and metadata about the credentials. The computing device stores an instance of the metadata externally to the credential manager. The computing device uses the externally stored metadata to determine whether the set of credentials includes a particular credential associated with a service and, in response to determining that the set of credentials includes the particular credential, displays an indication of the particular credential. In some embodiments, the computing device receives a selection of the displayed indication by the user and, in response to the selection, sends a request for the particular credential to the credential manager.