G06V40/53

SYSTEM AND METHOD FOR VERIFYING USER BY SECURITY TOKEN COMBINED WITH BIOMETRIC DATA PROCESSING TECHNIQUES

A user verifying method comprises: receiving an enrollment request signal including biometric information for enrollment from a user terminal; extracting feature information from the biometric information; embedding the feature information extracted from the biometric information; generating a projection parameter and a decision hyperplane parameter based on the embedding result; storing the projection parameter and the decision hyperplane parameter; generating a first template by applying a cryptographic hashing function to a pre-generated first key; receiving a verification request signal including biometric information from the user terminal; extracting feature information from the biometric information; embedding the feature information extracted from the biometric information; generating a second key corresponding to the first key based on the embedding result; generating a second template by applying the cryptographic hashing function to the second key; comparing the first template with the second template; and completing user verification based on the comparison result.

Storage device with concurrent initialization and fingerprint recognition

A method is provided for operating a storage device having biometric security protection, including: simultaneously starting both a device initialization operation and a biometric recognition operation; and if the device initialization operation has completed and the biometric recognition operation has successfully completed, setting the storage device to a normal access mode permitting external access to the storage device in accordance with the biometric security protection, wherein the device initialization operation and the biometric recognition operation are performed concurrently.

Methods and systems for enhancing user liveness detection
11810401 · 2023-11-07 · ·

A method for enhancing user liveness detection is provided that includes receiving image data of a user that includes items of metadata. Moreover, the method includes comparing each item of metadata associated with the received image data against a corresponding item of metadata associated with record image data of the user, and determining whether each item of metadata associated with the received image data matches the corresponding item of metadata. In response to determining at least one item of metadata associated with the received image data does not match the corresponding item of metadata, the method deems the received image data to be genuine and from a live person. In response to determining all items of metadata associated with the received image match the corresponding item of metadata, the method deems the received image data to be fraudulent and not from a living person.

Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated Password is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device.

STORAGE DEVICE WITH CONCURRENT INTIALIZATION AND FINGERPRINT RECOGNITION
20230385395 · 2023-11-30 ·

A method is provided for operating a storage device having biometric security protection, including: simultaneously starting both a device initialization operation and a biometric recognition operation; and if the device initialization operation has completed and the biometric recognition operation has successfully completed, setting the storage device to a normal access mode permitting external access to the storage device in accordance with the biometric security protection, wherein the device initialization operation and the biometric recognition operation are performed concurrently.

Method and system for securing user access, data at rest, and sensitive transactions using biometrics for mobile devices with protected local templates

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated Password is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device.

Efficient hands free interaction using biometrics

Methods and systems for performing demographics filtering based on biometric information are disclosed. An access terminal can capture a biometric instance corresponding to a user, such as a fingerprint scan, iris scan, etc. The access terminal can determine demographics information from the biometric instance, such as the age, biological sex, or ethnicity of the user. The access terminal can compare the demographics information to demographics information stored on a group of mobile devices corresponding to a group of users, in order to identify candidate user mobile devices. Once candidate user mobile devices are identified, the access terminal can perform a biometric match between the biometric instance corresponding to the user and biometric instances stored on the candidate user mobile devices. Once a biometric match and the corresponding mobile device are determined, the access terminal can conduct a further interaction with the mobile device.

Method for managing fingerprint and system thereof
11403380 · 2022-08-02 · ·

The present disclosure discloses a method for managing a fingerprint and a system thereof, which relates to the field of information technology. The method includes that an upper computer builds a connection with a fingerprint card; the upper computer receives an operation from a user and determines a type of the operation, the upper computer sends the collecting fingerprint instruction to the fingerprint card and the fingerprint card collects a fingerprint and returns a collecting fingerprint response to the upper computer if the operation is a collecting fingerprint operation; the upper computer sends the managing fingerprint instruction to the fingerprint card, the fingerprint card finishes a managing operation on the fingerprint according to the managing fingerprint instruction and returns the managing fingerprint response to the upper computer if the operation is a managing fingerprint operation; and the method further comprises the server authenticates the user information.

PRIVACY-PRESERVING MOTION ANALYSIS

A method, a structure, and a computer system for privacy-preserving motion analysis. Embodiments may include collecting data corresponding to a user with one or more sensors and identifying one or more joints of the user based on the data. Embodiments may additionally include generating one or more 3D representations of the one or more joints of the user and anonymizing the one or more 3D representations by applying thereto a joint-centering and a random shuffling. Embodiments may further include classifying one or more actions of the user based on analysing the one or more 3D representations, and exporting at least one of the data and the one or more actions.

WIRELESS BIOMETRIC AUTHENTICATION SYSTEM AND METHOD
20220191014 · 2022-06-16 ·

Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractors generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractors reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.