Patent classifications
G07C2209/12
ANONYMIZED BIOMETRIC DATA INTEGRATION
Biometric features are derived from security data associated with a subject. The security data is obtained from a security device. A biometric value is calculated from the biometric features. The biometric value is anonymized to an identifier associated with the subject. The identifier is integrated with event data associated with a security system. In an embodiment, the security device is a Personal Identification Number (PIN) pad integrated into a transaction terminal, the security data is fingerprint data, which is read from a finger of the subject placed on a fingerprint reader integrated into the PIN pad, and the biometric value is a PIN calculated from fingerprint data during a transaction at the transaction terminal. In an embodiment, the security device is a security camera, the security data is a secure video stream, and the biometric features are facial features of the subject in the secure video stream.
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM
An information processing system acquires biological information of a target and generates output information determined in correspondence with identification information using the identification information associated with the biological information. Then, the output information is output.
Method for protecting biometric templates, and a system and method for verifying a speaker's identity
A method for protecting a biometric template, comprising the steps of: retrieving an original vector (V) representing said biometric template, said vector comprising a plurality of original elements (v.sub.1, v.sub.2, . . . v.sub.i, . . . , v.sub.n); mapping at least some elements from said original vector to a protected vector (P) comprising a plurality of protected elements (p.sub.1, p.sub.2, . . . p.sub.i, . . . , p.sub.n−m+1), the mapping being based on multivariate polynomials defined by m user-specific coefficients (C) and exponents (E).
SHORT-RANGE DEVICE COMMUNICATIONS FOR SECURED RESOURCE ACCESS
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
Video and still image data alteration to enhance privacy
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.
AUTHENTICATION SERVER, AUTHENTICATION SYSTEM, CONTROL METHOD OF AUTHENTICATION SERVER, AND STORAGE MEDIUM
An authentication server includes a user registration unit, a service registration unit, and a storage unit. The user registration unit acquires a first ID that uniquely determines a user in a system and first biological information that is used for authentication of the user. The service registration unit processes a service registration request that is transmitted from a service provider of a service that the user wishes to use and that includes the first ID and a second ID that identifies the service provider. The service registration unit generates a third ID that is uniquely determined by a combination of the user and the service provider and transmits the third ID to the service provider. The storage unit stores the first biological information, the first ID, the second ID, and the third ID in association with each other.
VIDEO AND STILL IMAGE DATA ALTERATION TO ENHANCE PRIVACY
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.
Anonymized biometric data integration
Biometric features are derived from security data associated with a subject. The security data is obtained from a security device. A biometric value is calculated from the biometric features. The biometric value is anonymized to an identifier associated with the subject. The identifier is integrated with event data associated with a security system. In an embodiment, the security device is a Personal Identification Number (PIN) pad integrated into a transaction terminal, the security data is fingerprint data, which is read from a finger of the subject placed on a fingerprint reader integrated into the PIN pad, and the biometric value is a PIN calculated from fingerprint data during a transaction at the transaction terminal. In an embodiment, the security device is a security camera, the security data is a secure video stream, and the biometric features are facial features of the subject in the secure video stream.
Two-Level Authentication for Secure Transactions
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A Personal Digital Key stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory that is acquired in a secure trusted process. Biometric profiles comprise a representation of physical or behavioral characteristics that are uniquely associated with an individual that owns and carries the PDK. The PDK wirelessly transmits the biometric profile over a secure wireless transaction to a Reader for use in a biometric authentication process. The Reader compares the received biometric profile to a biometric input acquired at the point of transaction in order to determine if the transaction should be authorized.
Graphic data alteration to enhance online privacy
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.