G06V40/53

Face Image Processing Method and Device
20200349406 · 2020-11-05 ·

A face image processing method is provided. The face processing method comprising: extracting a plurality of features from a primary two-dimensional face image to generate a first feature vector; decomposing a three-dimensional face image into a plurality of base face images and a plurality of weighting factors corresponding to the base face images; generating a first two-dimensional code according to the first feature vector; and generating a second two-dimensional code according to the weighting factors.

Method and system for securing user access, data at rest, and sensitive transactions using biometrics for mobile devices with protected local templates

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated Password is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device.

Method and apparatus for authentication of user using biometric

A method and an apparatus for authenticating user using biometric information. The apparatus authenticates the user by performing: generating a first feature vector from first biometric information of the user obtained by the biometric sensor and multiplying the first feature vector by a plurality of pseudo-random number (PRN) matrices, respectively; generating a query template based on an index of an element having a maximum value among elements of a result vector of the multiplication between the first feature vector and the plurality of PRN matrices; and performing authentication for the user by comparing the query template with a pre-stored reference template of a subscribed user.

METHOD FOR PROTECTING BIOMETRIC TEMPLATES, AND A SYSTEM AND METHOD FOR VERIFYING A SPEAKER'S IDENTITY
20200335107 · 2020-10-22 ·

A method for protecting a biometric template, comprising the steps of: retrieving an original vector (V) representing said biometric template, said vector comprising a plurality of original elements (v.sub.1, v.sub.2, . . . v.sub.i, . . . , v.sub.n); mapping at least some elements from said original vector to a protected vector (P) comprising a plurality of protected elements (p.sub.1, p.sub.2, . . . p.sub.i, . . . , p.sub.nm+1), the mapping being based on multivariate polynomials defined by m user-specific coefficients (C) and exponents (E).

Display device
10810294 · 2020-10-20 · ·

A display device includes a plurality of pixels, a plurality of gate signal lines extending in a first direction and connected to the plurality of pixels, and a plurality of data signal lines extending in a second direction and connected to the plurality of pixels. The second direction crosses the first direction. The display device further includes a fingerprint sensor configured to detect fingerprint information, and a driver integrated circuit (IC) configured to transmit a plurality of scan signals to the pixels via the gate signal lines, transmit a plurality of data signals to the pixels via the data signal lines, receive the fingerprint information from the fingerprint sensor, and encrypt the received fingerprint information. The display device further includes an application processor configured to receive the encrypted fingerprint information from the driver IC.

SERVER, METHOD FOR CONTROLLING SERVER, AND TERMINAL DEVICE
20200314094 · 2020-10-01 ·

Disclosed is a server for performing authentication or identification using biometric information including basic information and detailed information includes a storage for storing basic information and detailed information that are separately encrypted for each of a plurality of users, a communicator for communicating with an external device, and a processor configured to, based on separately encrypted basic information and detailed information being received from an external terminal device through the communicator, performing user authentication or user identification for the received basic information and detailed information by decrypting and comparing the stored encrypted basic information and the received encrypted basic information, and comparing the received detailed information with at least one piece of stored detailed information corresponding to a piece of basic information having a degree of similarity that is higher than or equal to a predetermined value and with the received basic information among the stored basic information.

Method and Apparatus for Security Verification and Mobile Terminal
20200285725 · 2020-09-10 · ·

A method for security verification, an apparatus for security verification and a mobile terminal are provided. The method includes: determining whether a received touchscreen operation is a predetermined operation; acquiring biometric recognition verification information input by a user if the touchscreen operation is not the predetermined operation, and verifying the biometric recognition verification information; and performing verification processing corresponding to the predetermined operation if the touchscreen operation is the predetermined operation.

Method of avoiding biometrically identifying a subject within an image

A method of image processing within an image acquisition device. In one embodiment an image including one or more face regions is acquired and one or more iris regions are identified within the one or more face regions. The one or more iris regions are analyzed to identify any iris region containing an iris pattern that poses a risk of biometrically identifying a subject within the image. Responsive to identifying any such iris region, a respective substitute iris region, containing an iris pattern distinct from the identified iris pattern to avoid identifying the subject within the image, is determined and the identified iris region is replaced with the substitute iris region in the original image.

Wireless Biometric Authentication System and Method
20200279269 · 2020-09-03 ·

Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractors generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractors reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.

Biometric data combination engine

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for combining biometric data are disclosed. In one aspect, a method includes the actions of accessing one or more synthetic biometric data samples. The actions further include identifying data that indicates characteristics of each of the one or more biometric data samples and data that indicates a quality score of each of the one or more biometric data samples. The actions further include identifying target parameters of a synthetic biometric database. The actions further include comparing the target parameters of the synthetic biometric database to the characteristics of each of the one or more biometric data samples and to the quality score of each of the one or more biometric data samples. The actions further include selecting, for the synthetic biometric database, a subset of the synthetic biometric data samples.