G07C9/26

BIOMETRIC METHODS FOR ONLINE USER AUTHENTICATION
20230208835 · 2023-06-29 · ·

Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.

CONNECTED CAR AS A PAYMENT DEVICE
20230206203 · 2023-06-29 ·

A method includes determining a fuel amount; providing navigation directions; determining a vehicle arrival; transmitting a fuel purchase request; controlling a tank cover; receiving fuel; detecting that a tank is full; and transmitting a stop fueling request. A computer system includes a processor configured to: determine a fuel amount; provide navigation directions; determine a vehicle arrival; transmit a fuel purchase request; cause a pump to provide fuel; control a tank cover; detect that a tank is full; and transmit a stop fueling request. A non-transitory computer-readable medium storing thereon a set of instructions that, when executed on a processor, causes the processor to: determine a fuel amount; provide navigation directions; determine a vehicle arrival; transmit a fuel purchase request; cause a pump to provide fuel; control a tank cover; detect that fuel tank is full; and transmit a stop fueling request.

Method and System for Implementing User Biometrics as a Boarding Pass for Public Transportation
20170372541 · 2017-12-28 ·

A boarding management system which utilizes a person's biometrics as a boarding-pass ticket in order to increase efficiency without compromising safety. The overall process begins with an access gate receiving entrant biometric data through a scanning device. The entrant biometric data is then compared against authentic biometric data for each of a plurality of user accounts in order to identify a matching account, thus authenticating the entrant individual. Next, boarding-pass data associated with the matching account is retrieved and checked against a set of requirements in order to ensure that a matching timeframe and matching route identification (ID) data requirements are met. In general, the boarding-pass data of the matching account is compared against a gate itinerary in order to identify shared scheduling data. If the shared scheduling data meets the set of scheduling requirements, then a confirmation notification is sent from a remote server to the access gate.

Biometric ticketing

In biometric ticketing, physical token-less ticketing system using biometrics, a person may be identified using a digital representation of a biometric. Ticketing information may be ascertained based on the identification. The ticketing information may be provided, actions may be performed using the ticketing information, and so on. In some implementations, a checkpoint device receives biometric data from a person. A digital representation of the biometric data is used to obtain an identifier from an identification system. The digital representation of the biometric data may not be included in the identifier. The identifier is used by to obtain ticketing information from a ticketing system. The person may be allowed or denied entry into a ticketed area based on the ticketing information.

Biometric ticketing

In biometric ticketing, physical token-less ticketing system using biometrics, a person may be identified using a digital representation of a biometric. Ticketing information may be ascertained based on the identification. The ticketing information may be provided, actions may be performed using the ticketing information, and so on. In some implementations, a checkpoint device receives biometric data from a person. A digital representation of the biometric data is used to obtain an identifier from an identification system. The digital representation of the biometric data may not be included in the identifier. The identifier is used by to obtain ticketing information from a ticketing system. The person may be allowed or denied entry into a ticketed area based on the ticketing information.

Systems and techniques for managing biometric data at an electromechanical gun

The present disclosure provides systems and techniques for authenticating biometric data while protecting user privacy. Aspects of the present disclosure include collecting biometric query data at a biometric sensor of the gun, generating a set of query features from the biometric query data, each query feature of the set of query features including a first number of dimensions, generating a projection matrix, each element of the projection matrix being drawn independently from an identical distribution having zero mean and unit variance, transforming the set of query features into a transformed set of query features according to the projection matrix, retrieving a transformed set of enrollment features from memory of the gun, identifying a data match based on the transformed set of query features and the transformed set of enrollment features satisfying a similarity threshold, and unlocking the gun in response to the identifying the data match.

Systems and techniques for managing biometric data at an electromechanical gun

The present disclosure provides systems and techniques for authenticating biometric data while protecting user privacy. Aspects of the present disclosure include collecting biometric query data at a biometric sensor of the gun, generating a set of query features from the biometric query data, each query feature of the set of query features including a first number of dimensions, generating a projection matrix, each element of the projection matrix being drawn independently from an identical distribution having zero mean and unit variance, transforming the set of query features into a transformed set of query features according to the projection matrix, retrieving a transformed set of enrollment features from memory of the gun, identifying a data match based on the transformed set of query features and the transformed set of enrollment features satisfying a similarity threshold, and unlocking the gun in response to the identifying the data match.

Keyless access control with neuro and neuro-mechanical fingerprints

In accordance with one embodiment, an access control system is disclosed. The access control system comprises an access control panel including a touchable surface, a multi-dimensional touch sensor under the touchable surface, and a processor coupled to the multi-dimensional touch sensor. The multi-dimensional touch sensor captures a multi-dimensional motion signal including a micro-motion signal component representing neuro-mechanical micro-motions of a user touching the multi-dimensional touch sensor. The processor performs signal processing of the multi-dimensional motion signal to obtain the micro-motion signal component; and extracts unique values of predetermined features from the micro-motion signal component to form a neuro-fingerprint (NFP) that uniquely identifies the user. The NFP can be used as a gatekeeper to control entry into homes, offices, buildings, or other real properly typically protected by access control.

Binding device with embedded smart key and method for controlling object using the same

Provided is a binding device and method of operation of the binding device, with the binding device including a strap including a body, a first area formed inside the body, with a smart key related control circuit disposed in the first area, and a second area formed on one side of the body, with a battery for supplying electric power for operating the smart key related control circuit seated on the second area such that at least a portion of the battery is exposed, and a cover formed to cover the second area.

PORTABLE AND SINGLE-USE DEVICE FOR ACCESSING AN AREA WITH RESTRICTED ACCESS, ASSOCIATED ACCESS KEY GENERATION SYSTEM AND ASSOCIATED ACCESS CONTROL METHOD
20230177905 · 2023-06-08 ·

The invention relates to a device for accessing an area with restricted access or an area to which access is controlled, comprising a support, a sensor and access control stage, the support comprising a portion to be discarded and a portion to be retained, the sensor being borne by the portion to be discarded and being configured to measure at least one parameter of a subject's health, and to deliver a detection signal representative of the measurement of each health parameter, the access control stage being borne by the portion to be retained and being configured to store access information dependent on the detection signal delivered by the sensor, the portion to be retained being able to be mechanically separated from the portion to be discarded so as to form an access key allowing, depending on the access information, access or otherwise to the area with restricted access or to the area to which access is controlled.