G06V40/33

Authentication system
11275822 · 2022-03-15 · ·

An authentication system includes a user authentication unit. The user authentication unit performs user authentication by combining password authentication and handwriting authentication, the password authentication being performed by collating an entire character string of a password inputted using an operation input unit and a handwriting input unit with an entire character string of a registration password stored in a storage unit, the handwriting authentication being performed by collating the handwriting information of a part of characters of the password inputted by the handwriting input unit with handwriting information of handwriting data of this inputted character stored in the storage unit.

Dynamic layout adjustment for reflowable content

Systems and methods are provided for laying out reflowable content for display, such as content of an electronic book, in a manner that may differ from spacing properties originally defined in a corresponding reflowable file. When an amount of spacing that the reflowable file indicates should be included in a given line exceeds a threshold that is set based at least in part on the available line display length, the layout may be adjusted to decrease the total spacing for the line without adjusting the display size of reflow objects within the line. The adjusted layout may include utilizing a scaled down amount of space relative to the spacing properties defined in the reflowable file, or applying a different alignment type than is indicated by the reflowable file.

METHOD FOR GENERATING INFORMATION ABOUT THE PRODUCTION OF A HANDWRITTEN, HANDAFFIXED OR PRINTED TRACE
20220075987 · 2022-03-10 ·

A method for generating at least one information about the production of a handwritten, hand-affixed or printed trace on a surface. The method includes extracting several features describing the trace from at least one three-dimensional image of the trace, acquired by an imagery system. The method includes inputting the extracted features in a trained module to output the at least one information. The module has been trained beforehand with a plurality of previously-acquired three-dimensional images of traces and corresponding information related to the production of these traces.

TRAINING A NEURAL NETWORK MODEL FOR RECOGNIZING HANDWRITTEN SIGNATURES BASED ON DIFFERENT CURSIVE FONTS AND TRANSFORMATIONS

A device receives information indicating first names and last names of individuals and applies different cursive fonts to each of the first names and the last names to generate images of different cursive first names and different cursive last names. The device applies different transformations to the images of the different cursive first names and the different cursive last names to generate a set of first name images and a set of last name images. The device combines each first name image with each last name image to form a set of signature images and trains a neural network model, with the set of signature images, to generate a trained neural network model. The device receives an image of a signature and processes the image of the signature, with the trained neural network model, to recognize a first name and a last name in the signature.

FACIAL AUTHENTICATION SYSTEM
20220067132 · 2022-03-03 ·

An authentication system accesses an image of a face of a user. The face of the user is partially covered by a facial mask. The authentication system detects an area on the facial mask and generates a first identification of the user based on the area on the facial mask. The authentication system also detects an exposed area uncovered by the facial mask on the face of the user and generates a second identification of the user based on the exposed area. The authentication system compares the first identification of the user with the second identification of the user, and authenticates the user based on the comparison.

SYSTEM FOR MULTIPLE ALGORITHM PROCESSING OF BIOMETRIC DATA

A system performs processing of biometric information to create multiple templates. This allows biometric systems to be flexible and interact with a plurality of vendors' technologies. Specifically, a biometric sample is captured from a sensor and transmitted to a processing component. The biometric sample is then processed by a first algorithm to yield a biometric template and the template is stored and associated with a record identifier. The biometric sample is also processed by a second algorithm to yield a second template. The second template is stored and associated with the record identifier.

COMPUTER-IMPLEMENTED SYSTEM FOR IMAGE PROCESSING OF DOCUMENTS ASSOCIATED WITH ELECTIONS AND METHODS THEREOF

A system for election document processing is disclosed. Image data representative of a scanned election document is matched with a template for processing and consideration of a new elections record. The template defines areas of interest and rules for processing the image data. Data associated with picture elements defining the areas of interest is applied to predetermined validation functions to validate whether the image data includes sufficient information for populating predefined fields and accepting the scanned election document. Additional functions are applied to the image data to compare the image data with information of a voter registration database in order to verify a voter associated with the election document. The scanned election document is further processed for validation sampling.

SYSTEM AND METHOD FOR SECURING ELECTRONIC DOCUMENT EXECUTION AND AUTHENTICATION
20210319119 · 2021-10-14 · ·

The present embodiments provide an environment where a user first creates or imports a document comprising of fields to be completed by one or more users. All users who have view-only access or can act on a document are considered to be “in the workflow.” All users in the workflow (except view-only users) can take actions in the document by editing, adding or entering values or signatures in those fields. When the document is complete, a computing device adds an encrypted token visualization element to the document that uniquely identifies and secures the document. Thereafter, a copy of the original document, all attachments, authentication, security and validation information, and all other relevant information about the document and users will be available to view in the chain of custody and audit trail by the authorized users by scanning the token visualization element within the platform (web application or mobile application).

Systems and methods for personalizing digital fantasy sports memorabilia
11144977 · 2021-10-12 · ·

Disclosed are methods and systems for generating digital fantasy sports memorabilia including: providing a digital fantasy sports memorabilia signor with a digital fantasy sports photograph, a digital fantasy sports jersey, or a combination thereof; receiving at least one of an electronic signature or an electronic written message from the fantasy sports digital memorabilia signor to be embedded in the digital fantasy sports photograph, the digital fantasy sports jersey, or the combination thereof; embedding the at least one of an electronic signature or an electronic written message from the digital fantasy sports memorabilia signor into the digital fantasy sports photograph, the digital fantasy sports jersey, or a combination thereof to form the generated digital fantasy sports memorabilia; sending the generated digital fantasy sports memorabilia including the electronic signature and the electronic written message to a verification service to verify authenticity of the electronic signature and electronic written message in the generated digital fantasy sports memorabilia; and delivering the generated fantasy sports memorabilia to a digital fantasy sports receiver.

Blockchain-based system for analyzing and tracking work performance

Disclosed are blockchain-based systems and methods for analyzing and tracking work performance. An example method may commence with detecting a plurality of actions performed by one or more users with regard to one or more digital files. The method may continue with creating a timestamp for each of the plurality of actions. The method may further include generating a hash value for each of the plurality of actions. The method may continue with storing the hash value and the timestamp associated with each of the plurality of actions to a record on a blockchain. The method may further include analyzing the hash value and the timestamp associated with the plurality of actions of the one or more users to evaluate the work performance of the one or more users.