Patent classifications
G06V40/67
Systems, devices and methods for managing a fingerprint sensor
Some disclosed methods may involve receiving an indication of a digit touching a surface of an apparatus in an active fingerprint sensor area, obtaining current fingerprint image data from the digit and performing a first authentication process based, at least in part, on the current fingerprint image data. Responsive to determining that the first authentication process is an unsuccessful authentication process, some methods may involve obtaining non-digit image data after the digit has been removed from the surface, performing a second authentication process based, at least in part, on the non-digit image data and providing a notification regarding the outcome of the second authentication process. In some examples, the non-digit image data may be obtained and the second authentication process may be performed without providing a notification regarding the unsuccessful outcome of the first authentication process.
Method for unlocking mobile device using authentication based on ear recognition and mobile device performing the same
Exemplary embodiments relate to a method for unlocking a mobile device using authentication based on ear recognition including obtaining an image of a target showing at least part of the target's body in a lock state, extracting a set of ear features of the target from the image of the target, when the image of the target includes at least part of the target's ear, and determining if the extracted set of ear features of the target satisfies a preset condition, and a mobile device performing the same.
Spoofing detection device, spoofing detection method, and recording medium
To provide a technology of more accurately detecting spoofing in face authentication, without increasing a scale of a device configuration and a burden on a user. A spoofing detection device includes a facial image sequence acquisition unit, a line-of-sight change detection unit, a presentation information display unit, and a spoofing determination unit. The facial image sequence acquisition unit acquires a facial image sequence indicating the face of a user. The line-of-sight change detection unit detects information about a temporal change in the line-of-sight from the facial image sequence. The presentation information display unit displays presentation information presented to the user as part of an authentication process. The spoofing determination unit determines the likelihood of the face indicated by the facial image sequence being spoofing on the basis of the information about the temporal change in the line-of-sight with respect to the presentation information.
Imaging device and imaging method
An imaging device includes: an imaging portion that captures an image of a portion of a living body to take in the image; a display portion that displays first and second display images with being superimposed on each other, the first display image being based on the taken-in image, the second display image including guidance regarding a way to place the portion of the living body in a prescribed position; a determination portion that determines whether the portion of the living body is placed in the prescribed position; and a control portion that, until it is determined that the portion of the living body is placed in the prescribed position, causes the imaging portion to newly capture and take in a new image of the portion of the living body and causes the display portion to display an image based on the new taken-in image.
Bioacoustic authentication
According to various, but not necessarily all, embodiments there is provided an apparatus comprising means for: determining at least two locations at which a user touches a device; selecting a first location and a second location from the at least two locations to define a transmission path for an acoustic signal through the user; applying an acoustic signal to the user through the first location; detecting an acoustic signal transmitted through the user at the second location; and analysing the detected acoustic signal to determine if it is indicative of transmission of the applied acoustic signal through an authorised user based on a known bioacoustic signature of the authorised user.
Input-triggered inmate verification
Some implementations provide input-triggered user verification. This may involve trigging a user verification (e.g., capture of an image, sound, fingerprint, etc.) to verify a user's identity based on input (e.g., typing) received ad the device. Triggering the user-verification based on receiving input may help ensure that the image, sound, fingerprint, etc. is captured at a time when the user is close to the device, touching the finger-print sensor, and/or in view of the camera during the capturing. Some implementations provide user verification based on a user-identification of a previously selected image. This may involve using an inmate-selected picture or other image to recover a forgotten alphanumeric reference. Some implementations of the invention disclosed herein provide user verification based on a computer-vision identification of a wearable identification tag. This may involve using an image of the user's identification tag worn on the user's wrist to verify the user's identity.
EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
Facial recognition-based authentication
Facial recognition-based authentication comprises obtaining a first image of a target object, updating projection information associated with a display by a display device, obtaining a second image of the target object, the second image being an image of the target object after the projection information is updated, obtaining an image difference data based at least in part on the first image and the second image, and determining whether the target object is a virtual object based at least in part on the image difference data.
INFORMATION ACQUISITION APPARATUS, INFORMATION ACQUISITION METHOD, AND STORAGE MEDIUM
There is provided an information acquisition apparatus including an output means for outputting guidance information for guiding a subject to move a head while gazing at a predetermined position, and an image acquisition means for acquiring an image including an iris of the subject after outputting the guidance information.
LIVENESS DETECTION BASED ON REFLECTIONS ANALYSIS
Disclosed herein are methods and systems for determining liveness of a user, comprising analyzing visual content of a screen of a client device used by a user to access an online service, adjusting one or more visual objects displayed on the screen of the client device according to dynamically changing patterns, capturing a sequence of images depicting one or more reflecting surfaces associated with the user viewing the screen while the visual objects are displayed, analyzing the images to identify a reflection of the displayed visual objects in the reflecting surfaces and verifying liveness of the user based on one or more of a plurality of reflection attributes of the identified reflection.