G06V40/55

EFFICIENT REMOVAL OF PERSONAL INFORMATION FROM A DATA SET
20210224563 · 2021-07-22 ·

Computer systems and methods are provided for training a machine learning system to determine an authentication decision and deleting personal data from the machine learning system in a way that cancels any results of the training based on that personal data. A deletion request is received from a user device, the deletion request designating a first image. In response, a server creates an inverse attribute for the first image, the inverse attribute contradicting an initial attribute that was associated with the first image when the first image was initially received. The server updates a machine learning system based on the first image and the inverse attribute. Subsequent to updating the machine learning model, the server deletes the first image from data storage of the machine learning system.

CLIENT DEVICE AUTHENTICATION USING CONTACTLESS LEGACY MAGNETIC STRIPE DATA
20210105621 · 2021-04-08 ·

A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.

IC module, IC card, and verification device

An IC module includes a storage unit, a communications unit, and a processing unit. The storage unit stores reference data. The communications unit receives check data. The processing unit detects a degree of similarity between the reference data and the check data. Furthermore, when the degree of similarity is equal to or larger than a first threshold value, the processing unit determines a verification success, and when the degree of similarity is smaller than the first threshold value, the processing unit determines a verification failure, and updates a verification failure history in a weighted manner according to the degree of similarity.

Device With Biometric-Gated Display

A module configured to perform processing as part of a device capable of performing contactless or contact communication with a terminal. The module comprises: a biometric sensor; one or more display screens; and one or more control units configured to: cause the biometric sensor to capture biometric data of a user which can be used to biometrically authenticate the user; obtain biometric authentication information indicating whether the user was biometrically authenticated based on the captured biometric data; and in response to the biometric authentication information indicating the user was biometrically authenticated, select one or more categories of authenticated information from a plurality of categories of authenticated information based on one or more detected conditions, and cause the one or more display screens to display the one or more selected categories of authenticated information.

FINGERPRINT ENTRY METHOD AND APPARATUS, AND SYSTEM AND ELECTRONIC DEVICE

A fingerprint input method, apparatus, system and an electronic device are provided. The method includes: obtaining a fingerprint as a current fingerprint (S101); comparing the current fingerprint with a fingerprint stored in a fingerprint database (S102); storing, when it is determined that there is no fingerprint identical with the current fingerprint in the fingerprint database, the current fingerprint in the fingerprint database. It can be seen that before storing the obtained current fingerprint into the fingerprint database, it is firstly determined whether there is a fingerprint identical with the current fingerprint in the fingerprint database, and when it is determined that there is no fingerprint identical with the current fingerprint in the fingerprint database, the current fingerprint is stored in the fingerprint database, to avoid the occurrence of duplicate fingerprints in the fingerprint database, avoid the input of the duplicate fingerprints, and improve the user experience.

KEY FOR ON-SCREEN TRANSMISSION
20200374581 · 2020-11-26 ·

Disclosed is a device for transmitting content over an external display facility, including: a processing unit; a USB connector; an HDMI connector; a data storage body; at least one wireless communication module; and an internal battery. The processing unit is designed, according to the mode, to: record visual content data on the data storage body when the data is received from the input connector and/or the at least one wireless communication module; encrypt the recorded data, or decrypt the encrypted data recorded on the data storage body; convert the content data into a media flow; and transmit the media flow via the output connector such that an external screen to which the device is connected transmits the corresponding media.

Robot system having biometric authentication function
10831871 · 2020-11-10 · ·

A robot system includes a robot, and an RF tag, the RF tag including a detection device for detecting biometric authentication information of an individual, a memory for storing unique biometric authentication information of an authorized person which is authorized to perform operations related to a task of the robot, a first processor for obtaining a biometric authentication result by comparing the biometric authentication information detected by the detection device with the unique biometric authentication information stored in the memory, and a first antenna for transmitting the biometric authentication result obtained by the first processor. The robot system further includes a control device including a second antenna for receiving the biometric authentication result transmitted from the RF tag, wherein the control device advances a process of the operation when the biometric authentication result indicates that the individual is the authorized person.

METHOD OF VERIFICATION OF A BIOMETRIC AUTHENTICATION
20200233943 · 2020-07-23 ·

The invention proposes a biometric data processing method implemented by a proof entity (1) and a verification entity (2) that are connected; the proof entity (1) having a candidate biometric data, a reference biometric data, a cryptographic footprint of the reference biometric data, a cryptographic footprint of the candidate biometric data; the verification entity (2) having only a set of cryptographic footprints of reference biometric data of authorized users; the method comprising the steps of: (a) generation by data processing means (11) of the proof entity (1), of a zero-knowledge proof of the fact that the candidate biometric data and the reference biometric data match; (b) transmission to the verification entity (2) of said zero-knowledge proof of the cryptographic footprint of the candidate biometric data, and of the cryptographic footprint of the reference biometric data; (c) verification by data processing means (21) of the verification entity (2) that: the zero-knowledge proof is valid, and the received cryptographic footprint of the reference biometric data belongs to said set of cryptographic footprints of reference biometric data in the possession of the verification entity (2).

Fingerprint Verification System for Financial Transactions
20200226610 · 2020-07-16 ·

A fingerprint verification system for financial transactions is disclosed. The system having three main parts. A first part being a payment cardsuch as an automatic teller machine (ATM) card, credit card anti debit card etc. with onboard memory chip; a second part being cloud-based, fingerprint recognition software; and a third part being a capacitive touch screen. The system being configured for three main financial transactions. A first transaction being between a customer and an ATM; a second transaction being between a customer and an online vendor, a third transaction being between a customer and a brick-and-mortar retail outlet, in all transactions, the customer presents a card that interacts with the software prompting the customer to reveal their fingerprint on the capacitive touch screen. If the fingerprint matches the print in the software the transaction is allowed to continue. If there is no match the transaction is cancelled.

Client device authentication using contactless legacy magnetic stripe data
10701560 · 2020-06-30 · ·

A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.