G06V40/53

INFORMATION PROCESSING MODULE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING APPARATUS
20190034745 · 2019-01-31 · ·

To provide an imaging apparatus including an image processor that processes a fingerprint portion or the like that can be used for at least biometrics authentication of image data based on a digital imaging signal output from an image sensor into an unverifiable state with a template for biometrics authentication.

Method for robotic devices to authenticate users

The present invention proposes a method for robotic devices to accurately identify authorized users. Biometric data of users is supplied to the system through biometric scanners. Biometric profiles of authorized users are identified to the system during an initial set-up phase. Subsequently, users provide biometric data to the system through the scanners in order to be authenticated. Received data is compared to the original stored profiles, and when a match is found, that user is authenticated. In another aspect of the invention, a time-activated memory storage process is utilized to prevent malicious attempts to overcome the authentication process. Memory cells become writable in successive time slots, after which point the memory cells are converted to read-only. If a user is authenticated during a particular time slot, their biometric data is written in the available memory cell. If no user is authenticated, the available memory cell is written with junk data. In this way, used memory cells may not be altered by a malicious attack. Furthermore, a loyalty metric is established for each user and stored in a loyalty index. The loyalty metric of each user is increased with each successful authentication. Functions of the robotic device may be assigned minimum loyalty requirements such that users must have had a number of successful past authentications in order to access some of the functions of the device.

Systems and methods for gesture based biometric security

A system receives a source and a metadata layer that describes the source. The source may comprise source records with fields containing source data, and the metadata layer may include metadata comprising at least one of a field data type, a field data length, a field description, or a record length. The processor may further validate the metadata layer against the source and write results to a log. The processor may further be configured for transforming the source records into transformed records for a load ready file. The processor may further balance a number of records in the source against a number of transformed records in the load ready file to generate a transformation failure rate.

METHOD AND APPARATUS FOR AUTHENTICATION OF USER USING BIOMETRIC

A method and an apparatus for authenticating user using biometric information. The apparatus authenticates the user by performing: generating a first feature vector from first biometric information of the user obtained by the biometric sensor and multiplying the first feature vector by a plurality of pseudo-random number (PRN) matrices, respectively; generating a query template based on an index of an element having a maximum value among elements of a result vector of the multiplication between the first feature vector and the plurality of PRN matrices; and performing authentication for the user by comparing the query template with a pre-stored reference template of a subscribed user.

Machine-learning image recognition for classifying conditions based on ventilatory data
12061670 · 2024-08-13 · ·

The technology relates to methods and systems for recognition of conditions from ventilation data. The methods may include acquiring ventilation data for ventilation of a patient during a time period; generating an image based on the acquired ventilation data; providing, as input into a trained machine learning model, the generated image, wherein the trained machine learning model was trained based on images having a same type as the generated image; and based on output from the trained machine learning model, generating a predicted condition of the patient. The image may be generated by storing ventilatory data as pixel channel values to generate a human-indecipherable image.

Personalized face biometric key generation method based on deep neural network coding
12056957 · 2024-08-06 · ·

The invention relates to a personalized face biometric key generation method based on deep neural network coding, comprising: preprocessing a face image; converting the preprocessed face image into a feature map with a stability greater than or equal to 80% through a personalized feature extractor Feature_Extraction; outputting a face biometric key with a stability greater than or equal to 99% through a stabilizer Stabilizer; and carrying out error correction with an error correction code on the output biometric key through an error correction coding module and then obtaining a face biometric key with a stability greater than 99.5% through fuzzy extraction by a combined method of error correction code and fuzzy extraction. The finally generated face biometric key has high bit strength and recognition accuracy, can be directly applied to a symmetric cryptographic system and a public key cryptographic system as a key, and satisfies revocability and non-linkability.

IMAGE PROCESSING APPARATUS, METHOD, AND SYSTEM
20180351739 · 2018-12-06 ·

An image processing apparatus communicates with a user's portable terminal, where the portable terminal includes an authentication module for biometric authentication. When the image processing apparatus receives verification data issued by a service providing system, the image processing apparatus uses the portable terminal's authentication module for the biometric authentication and requests a device authentication system cooperating with the service providing system to issue an authentication token.

Systems and methods for secure biometric processing

The invention provides methods, systems and computer program products for secure biometric image processing. The invention involves acquiring a first image of a first field of view corresponding to a biometric camera. A first set of image information defining the first image is received at a processor implemented first high security operating environment, which first set of image information includes a second sub-set of image information relevant for biometric feature extraction or comparison. A second image of the first field of view corresponding to the biometric camera is rendered on a display, which second image is defined by a third set of image information such that the third set of information excludes the second sub-set of image information.

WIRELESS AUTHENTICATION BASED ON LOCATION DATA
20180302414 · 2018-10-18 ·

Embodiments of the invention involve using location data to authenticate individuals wirelessly. In one embodiment, an access device may obtain, by one or more cameras, images of an area captured at different time points, the images including a first image at a first time and a second image at a second time, and where the first image shows the user at a first location and the second image shows the user at a second location. The access device may, based on a position of the user and an association between the user and a communication device, conduct a transaction between the access device and the communication device, where the association between the user and the communication device is based on the first location being proximate to the communication device at the first time and the second location being proximate to the communication device at the second time.

Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
20180285556 · 2018-10-04 ·

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated Password is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device.