G06V40/53

Biometric data hashing, verification and security

A fingerprint identification system comprising a smart device, a fingerprint scanner, a processor coupled to a transceiver and to the fingerprint scanner, and a digital storage element coupled to the processor. The digital storage element stores logic that causes the processor to: activate the fingerprint scanner to scan a user's finger, identify a feature and multiple minutia of the user's fingerprint, and generate a digital fingerprint string(s) indicative of a position of each minutia relative to the feature. The processor is then caused to combine the digital fingerprint string(s) with a first cryptographic salt to generate a first hash. The first hash is compared to a first hash signature to determine if the first hash represents an authentic fingerprint. If authentic, the processor combines the digital fingerprint string(s) with a second cryptographic salt to generate a second hash. This second hash is transmitted to one or more servers.

Detecting facial liveliness
09928603 · 2018-03-27 · ·

Methods, systems, and computer-readable storage mediums for detecting facial liveliness are provided. Implementations include actions of processing first and second facial images of a subject to determine first and second corneal reflections of an object, the first and second facial images being captured at first and second sequential time points, determining a corneal reflection change of the object based on the determined first and second corneal reflections, comparing the determined corneal reflection change of the object to a motion associated with the first and second time points, and determining facial liveliness of the subject based on a result of the comparison.

Systems and methods for authenticating user identity based on user-defined image data

The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display. The communications device may receive, from the first user, information identifying portions of the first digital image selected in accordance with a candidate authentication sequence established by the first user. The selected first image portions may, for example, be associated with corresponding facial features of the first user. The communications device may determine whether the candidate authentication sequence matches a reference authentication sequence associated with the first digital image, and may authenticate an identity of the first user, when the first selection sequence is determined to match the second selection sequence.

Image recognition system, image recognition server, and image recognition

An object of the present invention is to provide an image recognition system, an image recognition server, and an image recognition method having a new high security framework that can achieve utilization of multi-device diversity. The image recognition system according to the present disclosure includes a computationally non-intensive encryption algorithm based on random unitary transformation and achieves a high level of security. In addition, the image recognition system achieves high recognition performance by using ensemble learning to integrate recognition results based on the dictionaries of different devices.

Method and system for generating protected biometric templates

The present disclosure provides an efficient system for cancelable biometric template protection which is not available in the conventional systems. Initially, the system receives a biometric template from a user. The biometric template is one of, a face image, a fingerprint, an iris image and a palmprint. Further, a vector embedding is computed based on the biometric template using a pretrained neural network. After computing the vector embedding, a key based permutation is computed based on the vector embedding and a permutation key. The permutation key is generated based on an Identification number (ID) associated with the user using a random number based key generation technique. Finally, a protected biometric template is generated by computing a permuted embedding corresponding to the biometric template based on the key based permutation using a plurality of fully connected layers pretrained using a weight based center triplet loss function.

A NOVEL SYSTEM AND METHOD FOR PERSON IDENTIFICATION AND PERSONALITY ASSESSMENT BASED ON EEG SIGNAL

The present invention relates a novel system and method for person identification and personality assessment based on electroencephalography (EEG) signal. More particularly, this invention relates to a novel method of EEG recording and processing to map the inherent and unique properties of brain in the form of highly specific brain signature to be used as means for person identification and personality assessment.

Concealed data matching device, concealed data matching program, and concealed data matching method
09870458 · 2018-01-16 · ·

A concealed data matching method for a computer including: registering a first concealed vector obtained by concealing registered data and key data based on a first random number and a linear combination of row vectors of a determination matrix; acquiring a second concealed vector; calculating a remainder vector indicating a remainder obtained by dividing the difference between the first concealed vector and the second concealed vector; determining the similarity between the registered data and the matching data based on the remainder vector; extracting the key data from the remainder vector if it is determined they are similar; calculating an inter-vector distance between the registered data and the matching data; and determining the similarity between the registered data and the matching data based on the magnitude of the inter-vector distance.

Apparatus, system and method for application-specific biometric processing in a computer system
12169539 · 2024-12-17 · ·

Technologies and techniques for biometrically authenticating a user for an apparatus. User biometric data is generated via a biometric capture device. A processor processes the user biometric data to generate one or more biometric templates. A memory stores the biometric templates and one or more previously generated biometric templates. A biometric manager module associates executable applications with respective biometric templates, wherein the processor matches one of the biometric templates with the previously generated biometric templates to determine if the matched biometric template is associated with the executable application. The processor generates at least one of a password and/or a cryptographic key for allowing access to the associated executable application based on the matched biometric template.

Enrollment using synthetic fingerprint image and fingerprint sensing systems
12165431 · 2024-12-10 · ·

A fingerprint sensing system. The fingerprint sensing system includes: at least one sensor; at least one display device; at least one application processor; and at least one secure enclave processor. The application processor(s) receives fingerprint data from the sensor(s) and provides the fingerprint data to the secure enclave processor(s). The secure enclave processor(s) decodes the fingerprint data and provides a signal indicative of at least one matched node. The application processor(s), responsive to receipt of the signal indicative of the matched node(s), presents at least a portion of a synthetic fingerprint image via at least one display device corresponding to the matched node(s).

GRAPHIC DATA ALTERATION TO ENHANCE ONLINE PRIVACY
20170330024 · 2017-11-16 ·

A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.