A61B5/117

Device interoperation

A surgical robotic system comprising: a surgical robot; a user interface console coupled to the surgical robot whereby a user can control motion of the surgical robot; a data logger for logging data from a surgical procedure performed by means of the robot; and a portable user terminal; the system further comprising: a display controllable by one of the data logger and the user terminal, that one of the data logger and the user terminal being configured for displaying a machine-readable code whereby the data logger or a user of the user terminal can be identified; and a camera coupled to the other of the data logger and the user terminal; the said other of the data logger and the user terminal being configured to, on receiving from the camera an image of a machine-readable code, decode that code to identify the data logger or a user of the user terminal and to cause the identified entity to be logged in association with a procedure performed by means of the robot.

Device interoperation

A surgical robotic system comprising: a surgical robot; a user interface console coupled to the surgical robot whereby a user can control motion of the surgical robot; a data logger for logging data from a surgical procedure performed by means of the robot; and a portable user terminal; the system further comprising: a display controllable by one of the data logger and the user terminal, that one of the data logger and the user terminal being configured for displaying a machine-readable code whereby the data logger or a user of the user terminal can be identified; and a camera coupled to the other of the data logger and the user terminal; the said other of the data logger and the user terminal being configured to, on receiving from the camera an image of a machine-readable code, decode that code to identify the data logger or a user of the user terminal and to cause the identified entity to be logged in association with a procedure performed by means of the robot.

Smart hardware security engine using biometric features and hardware-specific features

A smart hardware security engine using biometric features and hardware-specific features is provided. The smart security engine can combine one or more entropy sources, including individually distinguishable biometric features, and hardware-specific features to perform secret key generation for user registration and authentication. Such hybrid signatures may be distinct from person-to-person (e.g., due to the biometric features) and from device-to-device (e.g., due to the hardware-specific features) while varying over time. Thus, embodiments described herein can be used for personal device authentication as well as secret random key generation, significantly reducing the scope of an attack.

In-ear liveness detection for voice user interfaces
11699449 · 2023-07-11 · ·

Introduced here are approaches to authenticating the identity of speakers based on the “liveness” of the input. To prevent spoofing, an authentication platform may establish the likelihood that a voice sample represents a recording of word(s) uttered by a speaker whose identity is to be authenticated and then, based on the likelihood, determine whether to authenticate the speaker.

In-ear liveness detection for voice user interfaces
11699449 · 2023-07-11 · ·

Introduced here are approaches to authenticating the identity of speakers based on the “liveness” of the input. To prevent spoofing, an authentication platform may establish the likelihood that a voice sample represents a recording of word(s) uttered by a speaker whose identity is to be authenticated and then, based on the likelihood, determine whether to authenticate the speaker.

AGGREGATION OF UNCONSCIOUS AND CONSCIOUS BEHAVIORS FOR RECOMMENDATIONS AND AUTHENTICATION

A system may use unconscious behaviors and conscious behaviors for recommendations and authentication. A method, system, computer readable storage medium, or apparatus provides for sending stimulus, wherein the stimulus is in the presence of an object, wherein the stimulus comprises video, audio, or text; observing activity of the object, wherein the object comprises human or animal; measuring reaction of the object to the stimulus; classifying the reaction of the object to the stimulus; and transmitting a message based on the classification.

System and method for live web camera feed and streaming transmission with definitive online identity verification for prevention of synthetic video and photographic images
11695975 · 2023-07-04 ·

A live web camera feed and streaming transmission system and method for gathering, identifying and authenticating biometric data of a specific human being while constantly monitoring, tracking, analyzing, storing and distributing dynamic biometric data to ensure authorized access to the secured system continues via positive live feed monitoring of biometric data for participating computer systems and or programs. Multiple, correlative, inseparable, embedded serial numbers allow for editing within a live video recording session because the serial numbers are “attached” to one another from frame to frame. The degree of identity verification correlated with the various serial numbers, directly affects an indelible, detectible, identity verification cumulative authentication rating score in conjunction with a recognizable and standardized, indelible, detectible, hyperlinked color-coded security badge displaying the degree of identity authentication. If any one of these components that work cooperatively and correlatively is tampered with in any regard, the video is rendered inoperable.

System and method for live web camera feed and streaming transmission with definitive online identity verification for prevention of synthetic video and photographic images
11695975 · 2023-07-04 ·

A live web camera feed and streaming transmission system and method for gathering, identifying and authenticating biometric data of a specific human being while constantly monitoring, tracking, analyzing, storing and distributing dynamic biometric data to ensure authorized access to the secured system continues via positive live feed monitoring of biometric data for participating computer systems and or programs. Multiple, correlative, inseparable, embedded serial numbers allow for editing within a live video recording session because the serial numbers are “attached” to one another from frame to frame. The degree of identity verification correlated with the various serial numbers, directly affects an indelible, detectible, identity verification cumulative authentication rating score in conjunction with a recognizable and standardized, indelible, detectible, hyperlinked color-coded security badge displaying the degree of identity authentication. If any one of these components that work cooperatively and correlatively is tampered with in any regard, the video is rendered inoperable.

Unique patterns extracted from involuntary eye motions to identify individuals

A method for user authentication is disclosed including capturing involuntary eye movement of an eyeball of a user; generating a unique pattern to identify the user in response to the involuntary eye movement; storing the unique pattern into a secured non-volatile memory device; and authenticating the user with an electronic device in response to the stored unique pattern.

Unique patterns extracted from involuntary eye motions to identify individuals

A method for user authentication is disclosed including capturing involuntary eye movement of an eyeball of a user; generating a unique pattern to identify the user in response to the involuntary eye movement; storing the unique pattern into a secured non-volatile memory device; and authenticating the user with an electronic device in response to the stored unique pattern.