G06F21/32

Occluded Gesture Recognition
20180004301 · 2018-01-04 · ·

This document describes techniques and devices for occluded gesture recognition. Through use of the techniques and devices described herein, users may control their devices even when a user's gesture is occluded by some material between the user's hands and the device itself. Thus, the techniques enable users to control their mobile devices in many situations in which control is desired but conventional techniques do permit effective control, such as when a user's mobile computing device is occluded by being in a purse, bag, pocket, or even in another room.

Occluded Gesture Recognition
20180004301 · 2018-01-04 · ·

This document describes techniques and devices for occluded gesture recognition. Through use of the techniques and devices described herein, users may control their devices even when a user's gesture is occluded by some material between the user's hands and the device itself. Thus, the techniques enable users to control their mobile devices in many situations in which control is desired but conventional techniques do permit effective control, such as when a user's mobile computing device is occluded by being in a purse, bag, pocket, or even in another room.

Fingerprint Emulator

An access key for a device having a fingerprint activated lock includes an electrically conductive member having surface features formed on a surface thereof that can be recognized by the fingerprint activated lock as a unique fingerprint. A second electrically conductive member is electrically coupled to the first electrically conductive member. The second electrically conductive member is electrically coupled to the body of a user such that the sensor recognizes the first electrically conductive member as a fingerprint. The second electrically conductive member is preferably a ring, stylus or gripping portion upon which the first electrically conductive member is mounted. The electrically conductive member is preferably constructed from a capacitive elastomer such as an electrically conductive silicone. The access key functions as a synthetic fingerprint to limit access to a system to a possessor of the key. Access to the system provided by key can be limited to a predetermined period of time or a selected geographic area.

Fingerprint Emulator

An access key for a device having a fingerprint activated lock includes an electrically conductive member having surface features formed on a surface thereof that can be recognized by the fingerprint activated lock as a unique fingerprint. A second electrically conductive member is electrically coupled to the first electrically conductive member. The second electrically conductive member is electrically coupled to the body of a user such that the sensor recognizes the first electrically conductive member as a fingerprint. The second electrically conductive member is preferably a ring, stylus or gripping portion upon which the first electrically conductive member is mounted. The electrically conductive member is preferably constructed from a capacitive elastomer such as an electrically conductive silicone. The access key functions as a synthetic fingerprint to limit access to a system to a possessor of the key. Access to the system provided by key can be limited to a predetermined period of time or a selected geographic area.

ELECTRONIC DEVICE, CONTROL METHOD, AND NON-TRANSITORY STORAGE MEDIUM
20180007192 · 2018-01-04 ·

An electronic device includes a display, and at least one controller that, when an operation to cancel limitation of operations of the electronic device is detected, is configured to cancel the limitation of operations and presents a first screen on the display. The at least one controller is further configured to present a second screen which is different from the first screen on the display when the operation to cancel the limitation of operations is an operation with a thumb.

Method and System for Associating a User with a Wearable Device
20180004926 · 2018-01-04 ·

A method and system are provided for associating a user with a wearable device. The method includes: obtaining physiological information of a user of a wearable device; comparing the obtained physiological information against a stored physiological profile, wherein the stored physiological profile is built up over time from obtained physiological information; and, based on the comparison, updating a confidence parameter indicating the extent to which the obtained physiological information matches the physiological profile.

Method and System for Associating a User with a Wearable Device
20180004926 · 2018-01-04 ·

A method and system are provided for associating a user with a wearable device. The method includes: obtaining physiological information of a user of a wearable device; comparing the obtained physiological information against a stored physiological profile, wherein the stored physiological profile is built up over time from obtained physiological information; and, based on the comparison, updating a confidence parameter indicating the extent to which the obtained physiological information matches the physiological profile.

METHOD OF DETECTING FRAUD OF AN IRIS RECOGNITION SYSTEM

A method of detecting attempted fraud against a system recognising the iris of the human eye includes generation of a first image of an iris using first means of image capture in a visible light spectrum, and generation of a second image of said iris using second means of image capture in a near infra-red spectrum. The method also includes determination of at least one characteristic of the first image as a function of respective optical characteristics of pixels of a plurality of pixels of this first image and determination of at least one characteristic of the second image determined as a function of respective luminous intensities of pixels of a plurality of pixels of this second image. As a function of these determined characteristics, a signal representative of suspected detection of attempted fraud is generated.

METHOD OF DETECTING FRAUD OF AN IRIS RECOGNITION SYSTEM

A method of detecting attempted fraud against a system recognising the iris of the human eye includes generation of a first image of an iris using first means of image capture in a visible light spectrum, and generation of a second image of said iris using second means of image capture in a near infra-red spectrum. The method also includes determination of at least one characteristic of the first image as a function of respective optical characteristics of pixels of a plurality of pixels of this first image and determination of at least one characteristic of the second image determined as a function of respective luminous intensities of pixels of a plurality of pixels of this second image. As a function of these determined characteristics, a signal representative of suspected detection of attempted fraud is generated.

METHOD AND A DEVICE FOR DETECTING FRAUD BY EXAMINATION USING TWO DIFFERENT FOCAL LENGTHS DURING AUTOMATIC FACE RECOGNITION
20180005020 · 2018-01-04 ·

A method and an associated device for detecting fraud during automatic face recognition, the method comprising the following steps: acquiring a first image of the face by means of a first sensor having a first field angle, and a second image of the face by means of a second sensor having a second field angle that is narrower than the first field angle; analyzing the first image to verify that there is no frame around the face; and analyzing the second image to verify that there is no moiré effect.