Patent classifications
G06V40/53
Methods and apparatus for authentication in an electronic device
Embodiments of the invention provide methods and apparatus for monitoring the routing configuration within an electronic device such that a biometric authentication process can be carried out without interference from other components of the device, such as may occur when the device has become infected with malware for example. The invention may provide a codec or speaker recognition processor, coupled to receive biometric input data, comprising a security module that determines whether a routing configuration complies with one or more rules. The security module may be implemented to prevent genuine biometric data from being output from the speaker recognition processor, and/or to prevent spoof biometric data from being inserted into the authentication module.
METHODS FOR ENROLLING A USER AND FOR AUTHENTICATION OF A USER OF AN ELECTRONIC DEVICE
The present disclosure generally relates to methods for enrolling a user of an electronic device and authentication the user of the electronic device. The electronic device comprising a biometry sensor for acquiring sensing signals representative of a biometric feature, and a processor for computing a verification representation based on said sensing signals. The electronic device further includes a secure module isolated from said processor for computing an encrypted representation of said enrollment representation.
Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated Password is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device.
Camera privacy switch and filter to inhibit biometric data collection
Apparatuses, methods, systems, and program products are disclosed for capturing an image and determining whether a switch is in a filtering position or a non-filtering position. When the switch is in the filtering position, the camera apparatus detects a switch position and determines whether the switch is in the filtering position or the non-filtering position. The camera captures the image, including audio/visual signals, while the switch is detected to be in the filtering position and modifies the image to inhibit biometric data collection from the image in response to the switch being in the filtering position when the image is captured.
WIRELESS BIOMETRIC AUTHENTICATION SYSTEM AND METHOD
Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractor's generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractor's reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.
SYSTEM AND METHOD FOR PATIENT PRIVACY PROTECTION IN MEDICAL IMAGES
Systems and methods for de-identification of medical images can be applied to medical images acquired using various techniques. A 3D medical image can be analyzed to generate an image mask that partitions the image into a foreground region and a background region. From the image mask, a skin surface can be reconstructed based on the boundary between the foreground region and the background region. The image mask can be modified, e.g., by moving a randomly-selected subset of the voxels from the foreground region to the background region so that the shape of the skin surface is altered, thus obscuring patient-identifying features. The original medical image can be modified by changing the intensity of voxels in the background region while preserving the original intensity of voxels in the foreground region.
Partial Fingerprint and Partial Iris Payment Device
A partial fingerprint and partial iris payment device, which comprises partial fingerprint and partial iris collection means, payment fingerprint and iris collection means, and a storage and matching unit; the payment fingerprint and iris collection means is used for extracting, during user payment, a fingerprint and an iris of the user that respectively correspond to the partial fingerprint and/or the partial iris; and the storage and matching unit is used for respectively matching, during the user payment, the partial fingerprint and/or the partial iris with the fingerprint and/or the iris, and sending a payment instruction when the matching is successful. The present invention realizes an extremely high identification effect and accuracy during payment. Moreover, the extraction of a partial fingerprint and partial iris will not cause a substantively negative impact and potentially negative impact on the individual with regard to any privacy and legal risks, etc.
METHOD AND SYSTEM FOR ENCODING FINGERPRINT OF THINGS
An encoding method and system for a fingerprint of thing according to the present application is disclosed. Based on images of human fingerprints, at least one characteristic of fingerprint is provided on at least friction ridge lines so as to enable the encodement in the form of numbers and/or alphabets, and thereby a fingerprint image including the specific information are formed and can be used for labelling products with codes. The fingerprint image includes the specific information of a thing, and when attached onto said thing, is also unique similar to a fingerprint of an individual. Such fingerprint image for representing the specific identification information of a thing using minutia of finger can be referred to as fingerprint of thing (FOT). The fingerprint of thing, as a wholly new two-dimensional code which is generated based on images of human fingerprints, includes the more information than that of a one-dimensional barcode, and can be used for represent the information which cannot be represented by a one-dimensional barcode and will be too complicated for a two-dimensional barcode to represent. With an encoding method and system according to the present application, a fingerprint of thing including the unique identification information can be printed or carved onto every product, and can keep unchanged similar to a human fingerprint and can be readily used for query.
Obfuscating biometric data to provide enhanced authentication security
A nonce is sent to a user communication device. Obfuscated biometric data is received from the user communication device. The obfuscated biometric data is generated by an obfuscation process that uses the nonce and first biometric data. The first biometric data is generated from a biometric of a user at the user communication device. For example, the first biometric data may be biometric data from a fingerprint scan. The obfuscation process is reversed by using the first nonce to produce the first biometric data. The first biometric data is compared to known biometric data of the user. In response to the first biometric data being within a threshold of the known biometric data, the user is authenticated.
IMAGE DATA PROCESSING METHOD, IMAGE DATA RECOGNITION METHOD, TRAINING METHOD FOR IMAGE RECOGNITION MODEL, IMAGE DATA PROCESSING APPARATUS, TRAINING APPARATUS FOR IMAGE RECOGNITION MODEL, AND IMAGE RECOGNITION APPARATUS
Implementations of the present specification provide an image data processing method, an image data recognition method, a training method for an image recognition model, an image data processing apparatus, an image data recognition apparatus, and a training apparatus for an image recognition model. During image data processing, data anonymization processing is performed on image data based on frequency domain transform to obtain anonymized image data of the image data. The obtained anonymized image data includes a subgraph data set. Each subgraph data in the subgraph data set corresponds to a different frequency. Then, image blending processing is performed on the obtained anonymized image data based on data augmentation, to obtain augmented anonymized image data. In some implementations, graph size alignment processing is performed on each subgraph data in the augmented anonymized image data, so that a size of each subgraph data after the graph size alignment processing is same as a size of the image data in original form.