G06V40/382

Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
20180285556 · 2018-10-04 ·

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated Password is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device.

ANALYZING WRITING USING PRESSURE SENSING TOUCHSCREENS

The present invention provides a computer implemented method, a system, and a computer program product for verifying a writing of a user. In an exemplary embodiment, the present invention includes in response to receiving a writing on a pressure sensing touchpad logically coupled a computer system, recording a position and a pressure of one or more points of the writing via a pressure sensing touchscreen, executing a set of logical operations normalizing the writing, comparing the normalized writing to one or more stored writing parameters, executing a set of logical operations determining the normalized writing is within a tolerance of writing parameter deviation limits, thereby verifying the writing, and in response to determining the writing is within the tolerance of writing parameter deviation limits, storing, by the computer system, a value indicating that the writing is valid.

SIGNING WITH YOUR EYES

A user's signature may be decomposed into one or more components. The components may be described using one or more control points. A user may sign with their eyes by focusing their gaze on a set of these control points that make up the signature. If the user's gaze is within a threshold distance from a control point the signature is validated. Moreover, by modifying the control points based upon the actual gaze location (which is within the threshold distance), the signature may be slightly modified. For example, the signature may be decomposed into one or more components as Bezier curves and the user may be asked to focus on each control point of each of the one or more Bezier curves. Modifying the control points of a Bezier curve slightly still produces a smooth curve, but introduces natural variations.

Analyzing writing using pressure sensing touchscreens

The present invention provides a computer implemented method, a system, and a computer program product for verifying a writing of a user. In an exemplary embodiment, the present invention includes in response to receiving a writing on a pressure sensing touchpad logically coupled a computer system, recording a position and a pressure of one or more points of the writing via a pressure sensing touchscreen, executing a set of logical operations normalizing the writing, comparing the normalized writing to one or more stored writing parameters, executing a set of logical operations determining the normalized writing is within a tolerance of writing parameter deviation limits, thereby verifying the writing, and in response to determining the writing is within the tolerance of writing parameter deviation limits, storing, by the computer system, a value indicating that the writing is valid.

Information processing system
10037467 · 2018-07-31 · ·

This information processing system comprises: an object detection unit which detects and tracks an object in motion video data and detects a plurality of object elements which represent elements of the object; a feature value extraction unit which extracts respective feature values for each of the object elements from frame images which configure the motion video data; a frame selection unit which selects, for each object element, the frame images which satisfy respective frame selection criteria which are set for each object element; and a feature value linking unit which links frame specification information which specifies the frame images which are selected with the frame selection unit for each object element, and the object element feature values which are extracted from the selected frame images, and stores same in a prescribed storage unit.

MACHINE PRINT, HAND PRINT, AND SIGNATURE DISCRIMINATION

Computer program products for discriminating hand and machine print from each other, and from signatures, are disclosed and include program code readable and/or executable by a processor to: receive an image, determine a color depth of the image; reducing the color depth of non-bi-tonal images to generate a bi-tonal representation of the image; identify a set of one or more graphical line candidates in either the bi-tonal image or the bi-tonal representation, the graphical line candidates including true graphical lines and/or false positives; discriminate any of the true graphical lines from any of the false positives; remove the true graphical lines from the bi-tonal image or the bi-tonal representation without removing the false positives to generate a component map comprising connected components and excluding graphical lines; identify one or more of the connected components in the component map; and output and/or display and indicator of each of the connected components.

DIGITIZED HANDWRITING SAMPLE INGESTION SYSTEMS AND METHODS
20180129877 · 2018-05-10 ·

Certain aspects of the present methods and systems may focus on computer implemented methods of obtaining digitized hand-writing data corresponding to a sample of a needed code point of a set of code points. Such methods may include: obtaining a sample of digitized handwritten text, the sample of digitized handwritten text including glyph data corresponding to a first glyph, the first glyph corresponding to the needed code point of the set of code points; associating the first glyph with the needed code point; identifying stroke data in the glyph data, the stroke data corresponding to a stroke component of the first glyph, determining a plurality of dimensional values of the stroke component in the stroke data; and associating the plurality of dimensional values with a new code point sample of the needed code point in a code point set data structure.

Machine print, hand print, and signature discrimination

Systems, computer program products, and techniques for discriminating hand and machine print from each other, and from signatures, are disclosed and include determining a color depth of an image, the color depth corresponding to at least one of grayscale, bi-tonal and color; reducing color depth of non-bi-tonal images to generate a bi-tonal representation of the image; identifying a set of one or more graphical line candidates in either the bi-tonal image or the bi-tonal representation, the graphical line candidates including one or more of true graphical lines and false positives; discriminating any of the true graphical lines from any of the false positives; removing the true graphical lines from the bi-tonal image or the bi-tonal representation without removing the false positives to generate a component map comprising connected components and excluding graphical lines; and identifying one or more of the connected components in the component map.

Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates

Biometric data are obtained from biometric sensors on a stand-alone computing device, which may contain an ASIC, connected to or incorporated within it. The computing device and ASIC, in combination or individually, capture biometric samples, extract biometric features and match them to one or more locally stored, encrypted templates. The biometric matching may be enhanced by the use of an entered PIN. The biometric templates and other sensitive data at rest are encrypted using hardware elements of the computing device and ASIC, and/or a PIN hash. A stored obfuscated PassWord is de-obfuscated and may be released to the authentication mechanism in response to successfully decrypted templates and matching biometric samples. A different de-obfuscated password may be released to authenticate the user to a remote or local computer and to encrypt data in transit. This eliminates the need for the user to remember and enter complex passwords on the device.

Underlay body for acquisition of handwriting information

An underlay body includes a surface on which a writing medium is placed, and a sensor that detects a pressure distribution on the surface.