G06V40/12

In-ear liveness detection for voice user interfaces
11699449 · 2023-07-11 · ·

Introduced here are approaches to authenticating the identity of speakers based on the “liveness” of the input. To prevent spoofing, an authentication platform may establish the likelihood that a voice sample represents a recording of word(s) uttered by a speaker whose identity is to be authenticated and then, based on the likelihood, determine whether to authenticate the speaker.

Input-triggered inmate verification

Some implementations provide input-triggered user verification. This may involve trigging a user verification (e.g., capture of an image, sound, fingerprint, etc.) to verify a user's identity based on input (e.g., typing) received ad the device. Triggering the user-verification based on receiving input may help ensure that the image, sound, fingerprint, etc. is captured at a time when the user is close to the device, touching the finger-print sensor, and/or in view of the camera during the capturing. Some implementations provide user verification based on a user-identification of a previously selected image. This may involve using an inmate-selected picture or other image to recover a forgotten alphanumeric reference. Some implementations of the invention disclosed herein provide user verification based on a computer-vision identification of a wearable identification tag. This may involve using an image of the user's identification tag worn on the user's wrist to verify the user's identity.

EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE

This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).

STEGANOGRAPHIC IMAGE ENCODING OF BIOMETRIC TEMPLATE INFORMATION ON A CARD

Various embodiments are generally directed to utilizing a steganographically encoded image with an offline and/or online verification or authentication protocol. A method for using the steganographic image can include: receiving or utilizing a steganographic image associated with a user at a third-party device, the steganographically encoded image including an identification of a user steganographically encoded with a fingerprint template of the user, and authenticating the user using the steganographically encoded image.

POWER KEY AND FINGERPRINT READER

Examples are disclosed that relate to computing devices and methods for authenticating a user. In one example, a method for authenticating a user at a computing device comprises activating a fingerprint reader integrated into a power key of the computing device, and activating a visual indicator at the power key to indicate a status of the fingerprint reader. Based at least in part on activating the fingerprint reader, a standby function of the power key is disabled. A fingerprint of the user is received via the fingerprint reader and used to authenticate the user. After authenticating the user, the visual indicator is deactivated and the standby function of the power key is re-enabled.

Activating display and performing additional function in mobile terminal with one-time user input
11551263 · 2023-01-10 · ·

A mobile terminal includes a touch screen display, a camera, a power button and an activation button for turning on the touch screen display. The mobile terminal has a first function and a second function to perform in response to user input and provides user settings for configuring at least one of the first and second functions such that the at least one of the first and second functions is performed along with turning on the touch screen display when pressing of the activation button is detected while the touch screen display is turned off. The mobile terminal is configured to perform the first and second functions depending upon length of pressing of the activation button in addition to turning on the touch screen display.

Activating display and performing additional function in mobile terminal with one-time user input
11551263 · 2023-01-10 · ·

A mobile terminal includes a touch screen display, a camera, a power button and an activation button for turning on the touch screen display. The mobile terminal has a first function and a second function to perform in response to user input and provides user settings for configuring at least one of the first and second functions such that the at least one of the first and second functions is performed along with turning on the touch screen display when pressing of the activation button is detected while the touch screen display is turned off. The mobile terminal is configured to perform the first and second functions depending upon length of pressing of the activation button in addition to turning on the touch screen display.

SYSTEMS AND METHODS FOR GENERATING TARGETED MEDIA CONTENT
20230214419 · 2023-07-06 ·

Systems and methods for generating targeted media content capture an image from an image capture device. The system may analyze the image to recognize a visual identifier for each entity in the image, each of which may have one or more group identifiers. The system may aggregate the group identifiers to identify the number of each group in the audience area and select media content to display to the audience based on the aggregate numbers of each group identified in the audience area. The system may also derive time restrictions for groups identified in the audience area to help optimize how groups traverse through one or more areas.

METHOD AND APPARATUS FOR FINGERPRINT IDENTIFICATION, AND ELECTRONIC DEVICE

Embodiments of the present application provide a method for fingerprint identification, and electronic device. The method includes: acquiring a first image collected by a fingerprint sensor at a first exposure time; determining whether to acquire a second image collected by the fingerprint sensor at a second exposure time according to the first image, where the second exposure time is continuous with the first exposure time, and a length of the second exposure time is greater than or equal to a length of the first exposure time; performing fingerprint identification according to the first image, or, the first image and the second image. The method, and electronic device of the embodiments of the present application can take into account an unlocking rate and unlocking time, thereby improving unlocking experience of a user.

METHOD AND APPARATUS FOR FINGERPRINT IDENTIFICATION, AND ELECTRONIC DEVICE

Embodiments of the present application provide a method for fingerprint identification, and electronic device. The method includes: acquiring a first image collected by a fingerprint sensor at a first exposure time; determining whether to acquire a second image collected by the fingerprint sensor at a second exposure time according to the first image, where the second exposure time is continuous with the first exposure time, and a length of the second exposure time is greater than or equal to a length of the first exposure time; performing fingerprint identification according to the first image, or, the first image and the second image. The method, and electronic device of the embodiments of the present application can take into account an unlocking rate and unlocking time, thereby improving unlocking experience of a user.