G06F2221/2117

System for performing service by using biometric information, and control method therefor

A system for performing a service by using biometric information is disclosed. A system according to the present disclosure comprises an electronic device, a first server and a second server, and a control method of the system comprises the steps of: allowing the electronic device to acquire first biometric information; allowing the electronic device to acquire first encrypted data, in which the first biometric information is encrypted, by using the acquired first biometric information and a first encryption key, and to transmit same to the first server, allowing the first server to acquire second encrypted data, in which the first encrypted data is encrypted, by using the first encrypted data received from the electronic device and a second encrypted key, and first user identification information corresponding to the first biometric information, and to transmit same to the second server; allowing the second server to match the second encrypted data and the first user identification information corresponding to the biometric information, which are received from the first server, and to store same; allowing the second server to acquire authentication information on the basis of the matched second encrypted data and first user identification information, and to transmit same to the first server, and allowing the first server to register the authentication information on the biometric information.

PASSIVE THREE-DIMENSIONAL OBJECT AUTHENTICATION BASED ON IMAGE SIZING
20220414364 · 2022-12-29 ·

Techniques are described for passive three-dimensional (3D) object authentication based on image sizing, such as for biometric facial recognition. For example, during a registration routine, an imaging system captures images of a registering user's face at multiple distances. The images can be processed to extract registration dimensions, including individual deterministic structural dimensions, dimensional relationships that are static over changes in imaging distance, and dimensional relationships that changes predictably over changes in imaging distance. During an authentication routine, the imaging system again captures authentication images of an authenticating user's face (purportedly the previously registered user) at some authentication imaging distance and processes the images to extract authentication dimensions. Expected and actual dimensional quantities are computed from the authentication and registration dimensions and are compared to determine whether the authenticating user's face appears to be authorized as previously registered and/or is a spoof.

REMOTE REGISTRATION OF A DATA STORAGE DEVICE WITH BIOMETRIC AUTHENTICATION

A data storage device including a biometric reader for biometric authentication to enable access to a storage medium. The data storage device is configured for remote registration of a remote user of the data storage device, wherein registration includes receiving a record of a biometric authentication data set of the remote user from a secure database. Alternatively, a secure authorizing command is received remotely from an authorization server to enable the data storage device to directly read and store biometric data of the remote user. The data storage device can be unlocked by biometric authentication to enable a host device to access user data in the storage medium.

Digital safety and account discovery

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

STORING VITAL DOCUMENTS
20220405329 · 2022-12-22 ·

Methods, storage media, and systems for storing a vital document are disclosed. Some embodiments may include: logging, by a user, into an account, checking, by a processor, if the account contains at least one vital document, if the user had not uploaded the at least one vital document, prompting the user, by the processor, to upload the at least one vital document, displaying, on a display of a computer, the at least one vital document in a view-only mode and sharing the at least one vital document via email to a third-party recipient or via download to a local device using a one-time, password-encrypted, time-limited link.

DATA PROCESSING TRANSACTIONS USING MACHINE TO MACHINE (M2M) DATA TRANSFER

A user device is provided. The user device is configured to detect that a user is in a foreign region outside a home region of the user, wherein the user is registered with a home processor located within the home region of the user. The user device provides a recommendation to the user of one or more partner processors located within the foreign region, wherein each of the one or more partner processors has a predetermined association with the home processor. The user device receives a selection of a partner processor selected by the user from the one or more partner processors. The user device authenticates a data processing transaction at the selected partner processor by verifying an identity of the user and initiates the data processing transaction at the selected partner processor after the authentication.

SUPPORTING DATA PROCESSING TRANSACTIONS USING MACHINE TO MACHINE (M2M) DATA TRANSFER

A system is provided for implementing a data processing transaction for a home processor located within a home region. The system is configured to receive a query from a user device of a user, search a list of partner processors located within a foreign region based on the query and transmit to the user device information relating to one or more partner processors determined as a result of the search. The system receives a request to authenticate the data processing transaction at a selected partner processor, verifies an identity of the user based on the request and transmits an indication of successful authentication. The system transmits at least a portion of data relating to a registration of the user at the home processor to the selected partner processor, wherein the data processing transaction is processed by the partner processor based on the transferred data.

PERSONAL AUTHENTICATION DEVICE, PERSONAL AUTHENTICATION METHOD, AND RECORDING MEDIUM

Provided is a personal authentication device capable of simply securing security with little psychological and physical burden of a user to be authenticated. Personal authentication device includes: transmission unit that transmits a first acoustic signal to a user's head; observation unit that observes a second acoustic signal after the first acoustic signal propagation; calculation unit that calculates acoustic characteristics from the first and the second acoustic signal; extraction unit that extracts a feature amount related to a user from the acoustic characteristics; storage control unit that registers the feature amount in the storage unit; identification unit that identifies the user by collating the first feature amount with a second feature amount; and storage unit stores the first feature amount, wherein while identification unit identifies the user as being identical, transmission unit transmits the first acoustic signal every predetermined interval.

A Digital, Personal and Secure Electronic Access Permission
20220382854 · 2022-12-01 ·

The present invention puts forward a personal electronic access permission (Figure B, 31) that can both check on the customer's identity (Figure A, step 2) and right to access an event/venue in one scanning event, and address the unwanted secondary market, still enabling a customer (Figure D, 5) to sell back an electronic access permission to the system (Figure D, I) in case the customer is not able to attend the event.

Method of registering and authenticating a user of an online system

The present invention provides a method of registering a new user of an online system is disclosed. A base grid is created. The user provides a passcode that includes an indication of an ordered set of cells a grid. A grid salt, user identifying information, and a passcode identifier is generated. The passcode identifier is then split into at least three parts using a secret sharing algorithm wherein three of the parts are required to regenerate the passcode identifier. First and second parts are stored in first and second locations in an array and a third part is stored in a third location with user identifying information. The first and second parts are indexed using X-OTC and Y-OTC. A user token containing the position of the first and second parts in the array is passed to the user.