H04W12/77

Ensemble method for face recognition deep learning models

Aspects of the present disclosure involve systems, methods, devices, and the like for user identification using Artificial Intelligence, Machine Learning, and data analytics. In one embodiment, a verification system and method is introduced that can provide user authentication using parallel modeling for face identification. The verification system used includes a face identification module for use in the identification and verification using parallel processing of a received image with a claimed identity. The parallel processing includes an ensemble of machine learning models processed in parallel for optimal performance.

DISPLAY APPARATUS AND DISPLAY METHOD
20170366975 · 2017-12-21 · ·

An image display system includes a first terminal device and with a second terminal device whose usable function range is smaller than a usable function range of the first terminal device. The image display system includes a display projection unit, a communication unit that establishes wireless connection with the first and second terminal devices, a control unit that manages the wireless connection, and a connection control image generating unit. The control unit and the connection control image generating unit generate a terminal connection image including information for connecting the second terminal device with the image display system, based on terminal connection permission information that assigns the second terminal device whose wireless connection with the display system is permitted, the terminal connection permission information being transmitted from the first terminal device. The display projection unit displays the terminal connection image.

ARRANGEMENT FOR, AND METHOD OF, ESTABLISHING A BLUETOOTH® PAIRED CONNECTION BETWEEN A WIRELESS, ELECTRO-OPTICAL READER AND ONE OR MORE HOSTS
20170367124 · 2017-12-21 ·

A wireless, Bluetooth® paired connection is established between a wireless, electro-optical reader and a host by reading a multi-parameter, pairing symbol displayed by the host. An identification parameter is extracted from the pairing symbol to automatically identify the host, and one or more configuration parameters are substantially simultaneously extracted from the same pairing symbol to automatically configure the paired connection between the reader and the host.

METHOD AND APPARATUS OF IMPLEMENTING A VPN TUNNEL
20170366529 · 2017-12-21 · ·

The present invention is directed to allowing a more secure initial, and continuous authentication of virtual private network (VPN) tunneling. The device of the present invention contains its own microprocessor and operating system which connects to the host system via a universal serial bus (USB) or another coupling mode. The present invention involves executing and storing of the VPN software, certificates, credentials and sensors on the device, which allows for more security and manageability as opposed to executing the VPN on the host system. The device continuously authenticates the presence of the user via biometrics or the presence of second device, including a smartphone, a smartwatch, an NFC ring or a custom device with a microprocessor, via Quick Response (QR) Codes, Near-Field Communication (NFC) or Bluetooth Low Energy (LE) proximity authentication to activate or deactivate the VPN tunnel.

DISPLAY APPARATUS AND DISPLAY METHOD
20230199491 · 2023-06-22 · ·

An image display system includes a first terminal device and with a second terminal device whose usable function range is smaller than a usable function range of the first terminal device. The image display system includes a display projection unit, a communication unit that establishes wireless connection with the first and second terminal devices, a control unit that manages the wireless connection, and a connection control image generating unit. The control unit and the connection control image generating unit generate a terminal connection image including information for connecting the second terminal device with the image display system, based on terminal connection permission information that assigns the second terminal device whose wireless connection with the display system is permitted, the terminal connection permission information being transmitted from the first terminal device. The display projection unit displays the terminal connection image.

SYSTEMS, APPARATUS AND METHODS FOR SECURE ELECTRICAL COMMUNICATION OF BIOMETRIC PERSONAL IDENTIFICATION INFORMATION TO VALIDATE THE IDENTITY OF AN INDIVIDUAL
20230196362 · 2023-06-22 · ·

An apparatus for validating an identity of an individual based on biometrics includes a memory and a processor operatively coupled to a distributed database and the memory. The processor is configured to provide biometric data as an input to a predefined hash function to obtain a first biometric hash value. The processor is configured to obtain, using a first pointer to the distributed database, a signed second biometric hash value. The processor is configured to define a certification of the biometric data in response to verifying that a signature of the signed second biometric hash value is associated with the compute device and verifying that the first biometric hash value corresponds with the second biometric hash value. The processor is configured to digitally sign the certification using a private key associated with the processor to produce a signed biometric certification and store the signed biometric certification in the distributed database.

Portable terminal and lock state control method
09848329 · 2017-12-19 · ·

A mobile phone 10 comprises a display 14 and a touch panel 16, and a lock state of restricting performance of the predetermined processing based on a touch operation is set. A home screen including a function icon is displayed on the display 14. When the lock state is set, a lock screen is produced based on this home screen. Then, the lock screen is displayed if the power supply of the display 14 is turned on. A cancellation icon corresponding to the function icon is included in the lock screen. If a cancellation operation using the cancellation icon corresponding to a mail application is performed the lock state is canceled and the mail application is performed.

SYSTEMS AND METHODS FOR CREDENTIALS SHARING
20230198981 · 2023-06-22 ·

Systems and methods for credential sharing are disclosed. In some embodiments, a system comprises at least one processor, and memory storing instructions executable by the at least one processor, the instructions when executed cause the system to obtain, from a first user device, a request to share credentials for an access control device with a second user device; generate a host Uniform Resource Locator (URL), the URL comprising a unique token for accessing the access control device; and send the URL to the first user device, wherein the URL is configured to be shared with the second user device.

SYSTEM AND METHOD FOR FIELD PROVISIONING OF CREDENTIALS USING QR CODES

A system and method for authenticating a user device is disclosed. In one embodiment, the method comprises: transmitting a request for credentials from the user device, wherein the request comprises a user device identifier and the credentials comprise an asymmetric key pair having a public key and an associated private key, the private key being encrypted; receiving the credentials in the user device, the credentials comprising the encrypted private key and the public key; retrieving quick response (QR) code data associated with the user device identifier from a QR code data directory, the QR code data generated from the public key and stored in the QR code data directory according to the user device identifier by a secure online service; extracting the public key from the QR code data; and establishing an authenticated and encrypted communication session with the user device according to the extracted public key.

Tracking and managing multiple time-based one-time password (TOTP) accounts
20170357799 · 2017-12-14 ·

A host machine has a web browser. A user of the host machine also has a mobile device. A time-based, one-time password (TOTP) authentication scheme leverages a plug-in associated with the browser to automatically inject a received TOTP code into an element of an HTML-based TOTP authentication page, and to programmatically submit the HTML form (e.g., by mimicking the “click to submit” button on the TOTP form). Typically, the TOTP code is obtained following a successful completion of a push notification interaction between a cloud service, which stores TOTP shared secrets that are used to generate the TOTP codes, and the user of the mobile device. As a further feature, a method to keep track of multiple TOTP accounts and to find the account usable for a given website are also provided.