Patent classifications
G06V40/53
SYSTEM, DEVICE, AND METHOD FOR PATTERN REPRESENTATION AND RECOGNITION
A system and methodologies for pattern representation and recognition are provided. A method includes acquiring a representation associated with discriminating information associated with a subject, retrieving an association between a stored representation and an identity of the subject, determining a discrimination score as a function of the representation and the stored representation based on a neighbor similarity score and relationship contextualization process parameters, and executing one or more control actions based on the discrimination score.
INFORMATION PROCESSING SYSTEM, METHOD, AND DEVICE, AND STORAGE MEDIUM
The present disclosure relates to information processing systems, methods, devices, and storage mediums. In one example method, a first node stores a private key and public object information, and a second node stores information obtained by encryption based on a public key of the first node. When feature information of an object is not sent out from a client, a plurality of nodes interact with each other based on an information mapping relationship.
System and method for handling anonymous biometric and/or behavioral data
There is provided a method and corresponding system for handling and/or generating anonymous biometric and/or behavioural data. The method comprises the steps of mapping (S1) biometric data originating from a subject into a biometric key using a one-way locality-sensitive hash function or receiving the biometric key. The method also comprises storing (S2) additional anonymous behavioural data bound to this key into an existing biometric trajectory in a database, wherein the behavioural data describes the user behavior of the subject. The method is performed to anonymize biometric data from a multitude of individuals, or subjects, per key, where each biometric key maps to biometric data of several subjects, and such a set of subjects resulting in the same biometric key is called a hash group, and a biometric trajectory is developed for each hash group.
IRREVERSIBLE DIGITAL FINGERPRINTS FOR PRESERVING OBJECT SECURITY
Various techniques employ digital fingerprints, alone or in conjunction with other data related to a physical object, to characterize the physical object in a way allows an identity of the physical object to be confirmed or authenticated within a threshold of confidence when the physical object is encountered at a subsequently after a digital fingerprint thereof was previously ingested, without capture, retention and/or reference to certain types or categories of characterizing information which may be of a sensitive nature and/or subject to misuse or abuse. Such digital fingerprints may include feature vectors and non-positional characterization values, while advantageously omitting positional information that would otherwise allow recreation of a recognizable image of the physical object or an image from which one or more immutable characteristics or traits (e.g., physical appearance, color, race, ethnicity, gender, age) of the physical object may be discerned, and hence denominated as irreversible digital fingerprints.
Secure biometric data capture, processing and management for selectively prohibiting access to a data storage component from an application execution environment
A system includes one or more biometric sensors, a sensor hub and a trusted application execution environment. The sensor hub has exclusive access to the sensors and also isolates untrusted/unauthenticated portions of the operating system from direct access to unencrypted biometric data acquired by the sensors. During a biometric scan/collection process, only the sensor hub and a security engine can access the sensors and a storage component. The sensor hub reads the sensors to obtain the biometric data associated with the scan/collection process and stores the biometric data in the storage component. The security engine encrypts the biometric data before the sensor hub removes the access restrictions. Various components transfer the encrypted biometric data from the storage component to the trusted environment, which hosts algorithms for processing the biometric data.
Security method
The present invention relates to a method for authenticating and/or identifying persons, objects, service systems or computer programs, in which a static, unchanging security feature that is characteristic of the person, the object, the service system or the computer program, is created or used, which is subsequently altered under the influence of an unforeseeable factor and thereby converted into a dynamic security feature. Positive authentication is obtained, when the dynamic security feature has at least been partly changed by a dynamic factor between two query times in comparison with the static security feature stored in the storage medium, wherein the static security feature stored in the storage medium corresponds to the most recently updated, altered dynamic security feature from the last query time. Further, the invention relates to an authentication system, in which dynamic security features originate from a static security feature.
Method for confirming the identity of an individual while shielding that individual's personal data
A method for confirming the identity of an individual while shielding that individual's personal data. At least one biometric such as the image of the iris of an individual is captured and stored in a database. A unique identification code is assigned to the biometric without reference to the first individual's personal information. A subsequent biometric data collect is compared with the contents of the database. If a match between the subsequent biometric is found with the original biometric, the system transmits the identification code corresponding to the matched biometric. In a second aspect of the invention, in order to protect the privacy of individuals, the unique identification code is encrypted such that only the individual to whom the biometric belongs holds the de-encryption key. In a third aspect of the invention also intended to protect the privacy of individuals, a non-unique group identification code is assigned to the biometric. Preferably, in the case where the biometric used is the iris, the system replaces enrollment and live iris images with iris templates and bases comparisons on these templates, rather than storing/comparing actual images. The system is adapted to assist in locating missing persons and in verifying transactions. If an individual is missing and a live iris template is matched to that person's stored template, the system automatically contacts another individual.
BIOMETRIC DATA HASHING, VERIFICATION AND SECURITY
A fingerprint identification system comprising a smart device, a fingerprint scanner, a processor coupled to a transceiver and to the fingerprint scanner, and a digital storage element coupled to the processor. The digital storage element stores logic that causes the processor to: activate the fingerprint scanner to scan a user's finger, identify a feature and multiple minutia of the user's fingerprint, and generate a digital fingerprint string(s) indicative of a position of each minutia relative to the feature. The processor is then caused to combine the digital fingerprint string(s) with a first cryptographic salt to generate a first hash. The first hash is compared to a first hash signature to determine if the first hash represents an authentic fingerprint. If authentic, the processor combines the digital fingerprint string(s) with a second cryptographic salt to generate a second hash. This second hash is transmitted to one or more servers.
SECURE BIOMETRIC AUTHENTICATION WITH CLIENT-SIDE FEATURE EXTRACTION
Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing device
BIOMETRIC TEMPLATE SECURITY AND KEY GENERATION
Methods and systems for securing biometric templates and generating secret keys are provided. One or more images are received. Interest points are identified based on the received images, and a plurality of obfuscating data points are generated based on the interest points. An obfuscated template based on the interest points and the obfuscating data points is created and stored. A secret key can be encoded using a subset of at least one of the obfuscating data points and the interest points in the template.