US20140068740A1 - System and method for biometric authentication in connection with camera equipped devices - Google Patents
System and method for biometric authentication in connection with camera equipped devices Download PDFInfo
- Publication number
- US20140068740A1 US20140068740A1 US14/019,512 US201314019512A US2014068740A1 US 20140068740 A1 US20140068740 A1 US 20140068740A1 US 201314019512 A US201314019512 A US 201314019512A US 2014068740 A1 US2014068740 A1 US 2014068740A1
- Authority
- US
- United States
- Prior art keywords
- user
- palm
- authentication
- images
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/23—Clustering techniques
- G06F18/232—Non-hierarchical techniques
- G06F18/2321—Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions
- G06F18/23213—Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
- G06F18/2413—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
- G06F18/24133—Distances to prototypes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/40—Extraction of image or video features
- G06V10/46—Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]; Salient regional features
- G06V10/462—Salient features, e.g. scale invariant feature transforms [SIFT]
- G06V10/464—Salient features, e.g. scale invariant feature transforms [SIFT] using a plurality of salient features, e.g. bag-of-words [BoW] representations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/762—Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks
- G06V10/763—Non-hierarchical techniques, e.g. based on statistics of modelling distributions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/764—Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/13—Sensors therefor
- G06V40/1312—Sensors therefor direct reading, e.g. contactless acquisition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- the present invention relates generally to the use of biometric technology for authentication and identification, and more particularly to non-contact based solutions for authenticating and identifying users, via computers, such as mobile devices, to selectively permit or deny access to various resources.
- authentication and/or identification is performed using an image or a set of images of an individual's palm through a process involving the following key steps: (1) detecting the palm area using local classifiers; (2) extracting features from the region(s) of interest; and (3) computing the matching score against user models stored in a database, which can be augmented dynamically through a learning process.
- Mobile devices such as smartphones, tablets, and notebooks, have become widely adopted and used by many people on a daily basis. These devices have become more and more powerful and as developers create more and more applications and services that run on them, they become even more entrenched in our daily lives. These mobile devices not only provide a powerful computing platform in their own right but they also provide connectivity to a practically unlimited set of services, applications and data available on remote platforms which are typically accessed via a wireless link to a cell site and then backhauled to the internet backbone. In addition to accessing these remote platforms, mobile devices also have the ability to connect to other mobile devices through short and long range wireless connections.
- resource access is controlled through the input of text/numerical strings, such as user IDs and passwords.
- text/numerical strings such as user IDs and passwords.
- a smartphone user may be required to enter a four digit code before he is permitted to access any functionality on the device.
- each local application or other resource on the device might require the user to enter one or more text/numerical strings prior to obtaining access to the resource.
- the correct data (user ID, password, etc.) may be stored in the memory of the device.
- the user and/or the device might be required to transmit a correct set of text/numerical strings to the remote resource which, in turn, verifies that the transmitted data matches the correct data before permitting access to the resource.
- the typical contact-based method of a user using his or her fingers to enter passwords and user IDs on the smartphone screen lends itself to security risks.
- Experienced hackers are often able to “lift” the fingerprint pattern from the screen based on the oil residue left by the finger to gain unauthorized access. This is particularly true in the context of entering a short numerical string such as a four digit number to unlock the device. Once the device is unlocked, many of the resources on the device might not even be secured leading to serious security risks.
- contact-based methods involving transmittal of germs, viruses, or other biological hazards, particularly in the case of shared devices between users.
- an individual's fingertips, and an individual's hands are often one of the primary mediums for transferring germs, viruses, or other biological hazards between people.
- contact-based methods of authentication and identification in which a user types an identifying string with his or her fingertips, or authenticates or identifies himself or herself through contact-based biometric methods, such as fingerprint or palm print recognition, among others, create risk of transferring said biological hazards via the shared contact medium.
- users of such camera-equipped devices (hereinafter referred to at times as “smartphones” for convenience, although the devices are to be understood as including all devices with a camera capability, including both mobile devices and stationary devices, such as desktop computers) who are required to identify or authenticate themselves as a condition of obtaining access to one or more resources take one or a series of photos of their palm or both palms using the smartphone camera.
- the system of the present invention then employs computer vision technology to analyze the palm print image and either verify that the palm print signature matches the user's model in a database (user authentication) or find the matching user model among many models in a database (user identification).
- FIG. 1 is a diagram depicting the major components of the system of the present invention in a preferred embodiment thereof;
- FIG. 2 is a block diagram, which is useful in illustrating the methodology of the present invention in a preferred embodiment thereof;
- FIG. 3 is a diagram illustrating the secure connectivity between a mobile device and one or more remote servers according to a preferred embodiment of the present invention
- FIG. 4 is a flowchart illustrating the key steps in authenticating a user or device according to the present invention in a preferred embodiment thereof.
- FIG. 5 is a flowchart illustrating the key steps in identifying a user or device according to the present invention in a preferred embodiment thereof.
- a palm includes a single palm or both palms of an individual and reference to “an image” includes reference to one or more images.
- the use of terms that can be described using equivalent terms include the use of those equivalent terms.
- the use of the term “camera” is to be understood to include any device capable of obtaining an image of an object.
- the term “smartphone” includes all devices with a camera capability.
- Device 100 can be any device that contains a camera capable of taking high quality photographs.
- the camera of Device 100 also contains a flash element capable of being selectively and rapidly activated and deactivated for illuminating the area to be photographed.
- Examples of such Devices 100 include smartphones, tablet computers, notebooks, and any other device that can be carried by a user and that provides a computing platform that allows for the functionality of the present invention to be operative, as well as desktop computers or a variety of stationary embedded devices.
- Device 100 can also contain various other features, such as a viewing screen (which may also be a touchscreen), a keypad, an accelerometer, GPS capabilities, storage capacity, and a central processing unit (CPU).
- a viewing screen which may also be a touchscreen
- a keypad which may also be a touchscreen
- an accelerometer GPS capabilities
- storage capacity for storage capacity
- CPU central processing unit
- Device 100 includes at least one Camera 105 , which is preferably capable of producing high quality photographs of, for example, two megapixels or more, such as four megapixels, six megapixels, or eight megapixels.
- Camera Data Processor 110 receives the image data from Camera 105 and processes it as known in the art to create pixel data representative of the photograph, which may be used in various ways, including for the purposes outlined in connection with the present invention as now described.
- Region of Interest Detector 115 serves to locate the area of the palm within the broader image, and delineate the area with a high level of precision and consistency, such as to provide masks of the palm area of substantially the same shape and position on the palm through a variety of independent images with different lighting conditions and orientations of the palm to the camera.
- the region of interest is detected using sliding window-based local classifiers to label palm and non-palm pixels by the classification scores, followed by a segmentation step to group neighboring palm pixels into connected components in the input image.
- a high level of accuracy and robustness to image noise can be achieved because a significant number of discriminative local features are learned from a large collection of exemplar images to capture the stable characteristics of the palm appearance to form strong classifiers.
- the trained detector can precisely locate and delineate the region(s) of interest on input images taken free-form with various hand orientations and lighting conditions.
- Region of Interest Detector 115 local classifiers based on Haar Wavelets and AdaBoost (reference 1) are used to detect the region of interest in the palm area of a user's hand.
- local classifiers based on support vector machines (reference 2) are used to detect the region of interest in the palm area of a user's hand.
- a convolutional neural network is used to detect the region of interest in the palm area of a user's hand, such as the ones described in U.S. Pat. Nos. 5,067,164 and 5,058,179, and in (references 3 and 4).
- Region of Interest Detector 115 then feeds the image data, including the palm area mask, to Conversion Processor 120 , which serves to extract a Signature 125 from image patches representing the characteristic features of the individual's palm area that can be used to distinguish the individual from another user, wherein said patches are small sampling windows within the palm area mask.
- Signature 125 is a vector computed as follows. First, a histogram of edge orientations in a number of well-chosen regions in the image is computed. This may be performed using one of the well-known methods of computer vision for extracting local image descriptors, such as Scale Invariant Feature Transform (SIFT) (see, for example, reference 5), Histogram of Oriented Gradients (HOG) (see, for example, reference 6), and other references known in the art. Second, each orientation histogram is compared with a number of prototypes that have been computed from training data, for example using the well-known K-means clustering algorithm.
- SIFT Scale Invariant Feature Transform
- HOG Histogram of Oriented Gradients
- the signature vector is formed such that component k of the vector corresponds to the k-th prototype aforementioned.
- Component k contains the number of regions for which the histogram was closer to prototype k than to all other prototypes.
- This sequence of operations is known in the literature as a “Bag of Features” representation (see reference 7, for example). It should be apparent from the current teachings that in another embodiment of the present invention, multiple Bags of Features can be used to preserve the geometric relationship between local regions.
- AID Engine 130 serves to implement many of the key processes of the present invention as hereinafter described.
- AID Engine 130 communicates with Database of User Models 135 , if present, to store a local copy of a user model.
- Database of User Models 135 if present, to store a local copy of a user model.
- a user signature resulting from palm print images taken by Camera 105 may be compared against known user model(s), stored in Database of User Models 135 for authentication or identification.
- the user models are statistical models computed from a collection of an individual's palm images, with the signatures derived from those images defining the model.
- the user model consists of a so-called Gaussian density model of the signatures computed from the user's reference images. Given the signature of query image S, the user model is used to compute a matching score. The signature is considered to be matched to the user model if the matching score
- Mi and Vi are the mean and variance of the i-th component of the signature vectors of all the reference images of the given user, and u is a small constant.
- the signature is considered to be matched to the user model if the matching score R is larger than a pre-selected threshold for this user model.
- the Authentication and Identification Engine 130 , Model Building Engine 155 , and Database of User Models 135 form an AID Unit 160 .
- Model Building Engine 155 updates the aforementioned means and variances Mi and Vi using the signature extracted from new images of the user.
- Remote Resource Interface 145 serves as the interface between the authentication and identification functionalities implemented on Device 100 and those same functionalities as they occur on external/remote resources, such as remote servers and remote devices.
- Remote Resource Interface 145 interacts with applications resident on remote servers to coordinate authentication or identification as required by the remote applications. This can include managing and responding to requests by external resources for authentication or identification of a user operating Device 100 or for authentication or identification of Device 100 itself.
- Remote Resource Interface 145 can communicate with Network Interface 150 to transmit and receive data in connection with authentication and identification activities.
- Various wireless communication protocols can be used, including radio frequency as well as others, including and without limitation, Bluetooth and other near field communications technologies.
- the data communicated back and forth from Device 100 over the open wireless link is secured as is known in the art by means of, for example, encryption and/or other methodologies, which reduce or eliminate the possibility that user data and other data associated with the authentication and identification methodologies of the present invention can be intercepted by unauthorized parties.
- Network Interface 150 typically comprises a radio frequency transceiver module as is known in the art and permits Device 100 to communicate via wireless link with Wireless Network 400 .
- Wireless Network 400 typically backhauls the data that is transmitted by or to be received by Device 100 to Data Network 500 , again as is known in the art.
- the present invention permits users of Device 100 or Device 100 itself to be authenticated or identified by remote servers and applications and other resources residing on remote servers.
- Remote Server 200 can communicate with Device 100 via the communication path discussed above.
- AID Unit 205 residing on Remote Server 200 can request and receive authentication and identification data from Device 100 for comparison with known and validated user models residing on or accessible by Remote Server 200 as more fully described below.
- This authentication and identification capability provides for selective access to one or more Applications 210 , Data 215 , and other resources residing on Remote Server 200 .
- the same capability may also provide for selective access to Local Resources 140 , including applications, data, and/or other resources residing on Device 100 , as well as cases where such local resources seek access to data or other resources that are remote to Device 100 .
- Remote Devices 300 can be the same or different device types as Device 100 and authentication/identification functionality according to the teachings of the present invention can occur both ways.
- Device 100 can respond to authentication/identification requests from Remote Device 300 in order to access, for example, one or more Applications 310 and/or Data 315 residing on Remote Device 300 via the AID Unit 305 on Remote Device 300 .
- Remote Device 300 can receive and respond to authentication and identification requests initiated by Device 100 in order for Remote Device 300 (or a user operating it) to access resources resident on Device 100 .
- both Device 100 and Remote Device 300 will require authentication and/or identification of the other before resources are shared. This might occur, for example, in the context of a desired secure communication between users of Device 100 and Remote Device 300 .
- FIG. 2 the methodology of user/device authentication and/or identification according to a preferred embodiment of the present invention is now described.
- the difference between authentication and identification in the context of the teachings of the present invention is first described.
- the user presents an identity in the form of a user ID or user name and the system of the present invention verifies that the user is indeed who he or she claims to be.
- the system compares the signature derived from an image or images of the user's palm with the corresponding model in the database of user models. If they match, the user is authenticated. If they do not match, the user is rejected.
- FIG. 4 The flowchart for user authentication according to the teachings of the present invention, in a preferred embodiment, is shown in FIG. 4 .
- the user at Device 100 may enter his or her name or other identifying information into Device 100 , or the user's identity may already be pre-loaded in Device 100 .
- the user takes a picture or set of pictures of the palm of his or her hand or hands using Camera 105 of Device 100 .
- Camera Data Processor 110 sends the raw pixel data to Region of Interest Detector 115 which determines the palm area within the image.
- the masked palm area from Region of Interest Detector 115 is fed to Conversion Processor 120 , which derives the unique signature of the user.
- This conversion function can alternatively be processed on a remote resource or partially on a remote resource and partially on Device 100 .
- the system of the present invention identifies the individual using a multi-step software solution involving feature extraction, feature processing into user signatures, and the matching of user signatures to stored user signatures or user models in which: (i) a single or multiple regions of interest are detected and segmented out from the input image to remove extraneous pixel data and isolate the palm area; (ii) a number of high dimensional sparse feature vectors are extracted from the image (see, for example, reference 8); (iii) a single signature for each image is created in a process in which nearby feature vectors are pooled into a more compact and robust image representation; and (iv) multiple image signatures are combined into an identity model for each individual user.
- Authentication and Identification Engine 130 looks up the user's model (based on the user identifying data previously presented) in the Database of User Models 135 . At this point, if the derived user signature matches the stored user model, then the user is authenticated and is permitted access to the desired resource or set of resources. Alternatively, if the user signature and model do not match, then the user is denied access to the desired resource or set of resources.
- the foregoing functionality regarding look up and matching may alternatively be performed remotely to Device 100 .
- Authentication and Identification Engine 130 compares the signature derived from the palm print image or images with all models or a subset of models in the Database of User Models 135 . If a match is found then the user is identified. If no match is found, the user is unknown.
- the flowchart for user identification is shown in FIG. 5 .
- the user takes a picture or set of pictures of the palm of his or her hand.
- This data is again processed into pixel form by Camera Data Processor 110 and sent to Region of Interest Detector 115 to determine the palm area within the image.
- the masked palm area from Region of Interest Detector 115 is fed to Conversion Processor 120 , which derives the unique signature of the user and then AID Engine 130 compares the derived signature with all models or a subset of models stored in the Database of User Models 135 .
- the above referenced conversion and comparison functions could alternatively be processed on a remote resource or partially on a remote resource and partially on Device 100 .
- the user is identified and may be granted access to a resource or set of resources. If no match is found, then the user can not be identified and access to a desired resource or set of resources will not be granted.
- the second factor of identity can take any of the common forms, such as a user name, user ID, password, unique employee ID, social security number, email address, a variety of other biometric modalities, among others.
- the second factor of identity is the signature derived from the palm print image(s) of the individual's second hand, with the individual signatures of each of both palm print images or sets of images of the individual utilized together for authentication or identification.
- a signature generated by an image or set of images of a user's palm taken at Device 100 could be matched against a model or models contained in a database located at either or both of Remote Server 200 or one or more Remote Devices 300 .
- the user of Device 100 would typically be seeking access to one or more resources resident at these remote platforms rather than a resource located locally within Device 100 .
- processing could be done locally at the smartphone/Device 100 whereas if authentication is being undertaken, for example, in connection with a remote based application, some portion of the processing could be done at a Remote Server 200 with user models to be matched against being stored possibly at Remote Server 200 as opposed to locally on the smartphone.
- user models, signatures and/or other biometric data can be synchronized between any of the AID Units 160 , 205 , 305 to allow for local authentication or identification at any one of Device 100 , Remote Server 200 , Remote Device 300 without said Device 100 , Remote Server 200 or Remote Device 300 having generated that user model, signature and/or other biometric data locally.
- Step (1) Device 100 is used to take a picture or series of pictures of the palm of the user to be identified (step (2)) with Camera 105 (step (3)).
- a flash component (step (4)) may be embedded in Device 100 to provide necessary pre-processing of the image, particularly as it relates to providing minimum sufficient light for region of interest detection, feature extraction, and signature processing of the individual's palm image.
- the palm region of the image is masked by Region of Interest Detector 115 (step (5)) and fed to Conversion Processor 120 (step (6)) to convert raw pixels into a uniquely identifying user signature, Signature 125 .
- the user signature is a compact code that contains relevant identifying information associated with the user's palm print image and can be quickly and precisely matched to a large database of user models such as Database of User Models 135 or a database at a remote platform (step (7)).
- One benefit of the derived user signature is that it makes it essentially impossible to reconstruct a user's palm image from a database of user models.
- AID Engine 130 compares the user signature from the palm image or set of images with those in the database of user models to identify or authenticate the user as applicable.
- the above referenced conversion and comparison functions could alternatively be processed on a remote resource or partially on a remote resource and partially on Device 100 .
- FIG. 3 it can be seen that in cases where authentication or identification is being accomplished with respect to a remote resource, communication between Device 100 and that remote resource preferably occurs over a secure connection as is known in the art. This can involve one or more techniques as is known in the art to include, for example, strong encryption, public or private key encryption, digital certificates, and/or digital signatures among others.
- Spoof protection is an important aspect of this invention. It prevents adversaries, for example, from using a printed photograph of a palm instead of a real hand for authentication.
- One novel aspect of the present invention that is directed to spoof protection involves detecting and using the three dimensional characteristics of a human hand in order to provide security against spoofing.
- the system of the present invention takes a series of pictures in rapid sequence, with the camera flash being used intermittently and at varying lengths of time.
- the pictures of a 3-D object (a real hand) taken with the flash will have certain highlighted regions and shadows created by the flash, whereas on positions of the hand in which a 2-D representation of the hand (for example, a printed photograph of a palm or a palm image shown on the display screen of another mobile device) would not show such highlighted regions and shadows.
- This allows the system of the present invention to utilize a comparison of the highlighted regions and shadows on the hand created between the flash and non-flash photos to distinguish between a printed photograph and a real hand. In this way, an unauthorized party who happens to have obtained a picture of an authorized user's palm cannot use that picture to gain unauthorized access to local or remote resources.
- Further methods for detecting a real hand include 3-D modeling of the hand.
- the system of the present invention may prompt the user to turn his or her hand while a series of multiple pictures are taken.
- a true 3-D object will reveal different parts of the hand with each successive image while a 2-D object will always show the exact same part of the hand, just with varying degrees of distortion.
- This lets the system of the present invention distinguish between a printed photograph and a real hand.
- the user can be prompted to close the hand to a fist or open it from a fist while the series of pictures is taken.
- Other methods of distinguishing a real hand from the photograph of a hand are also possible.
- Another novel aspect of the present invention is a methodology in which replay attacks may be detected and prevented.
- an adversary modifies a mobile device such that it sends one or a series of previously recorded pictures from the real hand of a legitimate user to the network for authentication or identification instead of sending the images taken by the camera. It is assumed here that the adversary could take pictures of an authorized user's hand without the authorized user being aware or able to prevent this. If this is in fact a risk (e.g., a case where an authorized user is sleeping or unconscious), then it is preferable for the system to be used in such a way that one or more additional identity factors such as a user ID or other form of data independent of the palm print image is required to authenticate a user.
- the system of the present invention issues a series of pictures and flashes at a variety of intervals, i.e., it records a series of pictures, some with the flash turned off and others with the flash turned on.
- the specific pictures and flash on/off sequence can be chosen at random or according to a pre-determined sequence and can change for each authentication or identification request.
- the system of the present invention can easily detect if an adversary uses a previously recorded series of pictures because the on/off pattern of the pictures and flashes will not match the one actually sent to the mobile device.
- Another method to detect a replay attack involves storing all previously used images and comparing new images against that database. Because the pixel data underlying the images of two different palms can essentially never be exactly the same or substantially the same to a certain tolerance level, the system can detect when a previously taken image is used again. Other methods of detecting a replay attack are also conceivable.
- Yet another novel aspect of the present invention is the ability to embed transaction information or other data within the timing of a series of photographs and/or flash patterns.
- This timing pattern can further be used to encode information about the transaction itself.
- a cryptographic hash code can then be applied to this information.
- the hash code makes the resulting code compact (short) and also prevents anybody who observes the flash pattern from deriving any information about the original content of the code.
- the timing of the sequence of images and/or flash patterns is utilized as part of an anti-spoofing mechanism to determine whether the image sequence provided for authentication or identification matches the information from the transaction itself.
- a specific implementation may include:
- the present invention provides computer systems (including a combination of software running on suitable hardware), computer-implemented methods, and devices for authentication or identification of an individual which includes using an image or a set of images of an individual's palm through a process involving the following steps: (1) detecting the palm area using local classifiers; (2) extracting features from the region(s) of interest; and (3) computing the matching score against user models stored in a database, which can be augmented dynamically through a learning process.
- the invention includes a system for providing selective access to resources available in connection with a device comprising software executed on suitable computer hardware, in which the system comprises: (a) at least one camera associated with said device, said camera being capable of taking at least one photograph of a human palm print; (b) a detector module using local classifiers to locate and segment the region of interest of the palm without physical contact; (c) a conversion processor which converts raw pixel data associated with said region of interest of a human palm print into a unique signature associated with said palm print; and (d) an authentication and identification engine, said authentication and identification engine determining whether access to one or more of said resources should be granted based upon said unique signature and at least one database containing a plurality of user models.
- the system may further comprise a learning processor that improves the user models with new data, wherein the learning processor selectively includes said palm print image to augment said database and said authentication and identification engine.
- the device is a mobile device, while in other embodiments, the device is a desktop device or a stationary embedded device.
- the system can include a flash component that selectively activates at the time of image capture to provide minimum sufficient light for region of interest detection, feature extraction, and signature processing of the human's palm image.
- the conversion processor of the system uses descriptors extracted from patches over the region of interest. The descriptors can be encoded into high dimensional sparse vectors, which can be pooled into at least one group.
- the system of the invention can have, as part of the method implemented within the system, the feature of computing a signature from a Bag of Features or multiple Bags of Features representations.
- the detector module of the system can use Haar Wavelets and AdaBoost algorithms.
- the system includes a detector module that uses support vector machines or a convolutional neural network.
- the user module of the system can be a statistical model computed from a collection of a human's palm images.
- the user model can be a Gaussian density model or a mixture of Gaussians density model.
- the system of the invention can be configured such that at least one of the resources is remote from the device. Alternatively, at least one of the resources can be resident on the device. In some embodiments, at least one of the resources is an application or a database.
- the individual signatures of each of both palm print images of a human are utilized together for authentication or identification of the human.
- palm print authentication or identification is combined with other modalities, such as one or more of the following: passcodes, security questions, fingerprint recognition, facial recognition, iris recognition, written signature recognition, and other biometric and non-biometric modalities.
- the system of the invention can be implemented in a way such that an application selectively permits one or more users to conduct one or more transactions.
- the system of the invention can also include the use of a sequence of flash and non-flash images of the human's palm, which can be used, among other things, as part of an anti-spoofing mechanism to determine whether the presented hand is a 3-D object or a 2-D representation of a hand. Furthermore, the system of the invention can be implemented in such a way that image data captured during movement of the human's palm are utilized as part of an anti-spoofing mechanism to determine whether the presented hand is a 3-D object or a 2-D representation of a hand.
- the sequence of flash and non-flash images of the human's palm as well as the time interval(s) between successive images are utilized as part of an anti-spoofing mechanism to determine whether an adversary is attempting to utilize a previously-recorded sequence of images for authentication or identification.
- all of a human's previously used images are stored, such as in a database resident on a computing device, for comparison against new images as part of an anti-spoofing mechanism to determine whether an adversary is attempting to utilize previously-recorded images for authentication or identification.
- the system of the invention is implemented such that transaction information or other data is embedded within the timing of a sequence of images and/or flash patterns as part of an anti-spoofing mechanism to determine whether the image sequence provided for authentication or identification matches the information from the transaction itself.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/019,512 US20140068740A1 (en) | 2012-09-05 | 2013-09-05 | System and method for biometric authentication in connection with camera equipped devices |
US14/449,730 US10135815B2 (en) | 2012-09-05 | 2014-08-01 | System and method for biometric authentication in connection with camera equipped devices |
US16/153,412 US10728242B2 (en) | 2012-09-05 | 2018-10-05 | System and method for biometric authentication in connection with camera-equipped devices |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261696820P | 2012-09-05 | 2012-09-05 | |
US14/019,512 US20140068740A1 (en) | 2012-09-05 | 2013-09-05 | System and method for biometric authentication in connection with camera equipped devices |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/449,730 Continuation US10135815B2 (en) | 2012-09-05 | 2014-08-01 | System and method for biometric authentication in connection with camera equipped devices |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140068740A1 true US20140068740A1 (en) | 2014-03-06 |
Family
ID=50189413
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/019,512 Abandoned US20140068740A1 (en) | 2012-09-05 | 2013-09-05 | System and method for biometric authentication in connection with camera equipped devices |
US14/449,730 Active US10135815B2 (en) | 2012-09-05 | 2014-08-01 | System and method for biometric authentication in connection with camera equipped devices |
US16/153,412 Active US10728242B2 (en) | 2012-09-05 | 2018-10-05 | System and method for biometric authentication in connection with camera-equipped devices |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/449,730 Active US10135815B2 (en) | 2012-09-05 | 2014-08-01 | System and method for biometric authentication in connection with camera equipped devices |
US16/153,412 Active US10728242B2 (en) | 2012-09-05 | 2018-10-05 | System and method for biometric authentication in connection with camera-equipped devices |
Country Status (19)
Country | Link |
---|---|
US (3) | US20140068740A1 (fr) |
EP (2) | EP2893489B1 (fr) |
JP (3) | JP2015529365A (fr) |
KR (1) | KR101938033B1 (fr) |
CN (1) | CN104756135B (fr) |
AP (1) | AP2015008348A0 (fr) |
AU (2) | AU2013312495B2 (fr) |
BR (1) | BR112015004867B1 (fr) |
CA (1) | CA2884096C (fr) |
EA (1) | EA201590485A1 (fr) |
ES (1) | ES2791776T3 (fr) |
HK (1) | HK1212494A1 (fr) |
IL (2) | IL237556B (fr) |
MX (1) | MX346218B (fr) |
MY (1) | MY181564A (fr) |
PH (2) | PH12015500481B1 (fr) |
SG (1) | SG11201501691VA (fr) |
WO (1) | WO2014039732A2 (fr) |
ZA (1) | ZA201502207B (fr) |
Cited By (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140253711A1 (en) * | 2013-03-07 | 2014-09-11 | Advanced Optical Systems, Inc. | Agile non-contact biometric sensor |
US20150139485A1 (en) * | 2013-11-15 | 2015-05-21 | Facebook, Inc. | Pose-aligned networks for deep attribute modeling |
US20150242840A1 (en) * | 2014-02-25 | 2015-08-27 | Jpmorgan Chase Bank, N.A. | Systems and methods for dynamic biometric configuration compliance control |
US20150278499A1 (en) * | 2013-11-21 | 2015-10-01 | Yevgeny Levitov | Motion-Triggered Biometric System for Access Control |
WO2015175670A1 (fr) * | 2014-05-13 | 2015-11-19 | Element, Inc. | Système et procédé de fourniture de clé électronique et de gestion d'accès en lien avec des dispositifs mobiles |
CN105741375A (zh) * | 2016-01-20 | 2016-07-06 | 华中师范大学 | 一种大视场双目视觉的红外图像考勤方法 |
WO2016137554A3 (fr) * | 2014-12-27 | 2016-10-20 | Mcafee, Inc. | Authentification d'utilisateur prédictive |
US9510196B2 (en) | 2014-03-17 | 2016-11-29 | Qualcomm Incorporated | Method and apparatus for authenticating a user on a mobile device |
US20160373438A1 (en) * | 2015-06-17 | 2016-12-22 | Electronics And Telecommunications Research Institute | User authentication apparatus |
WO2017093294A1 (fr) * | 2015-11-30 | 2017-06-08 | Koninklijke Philips N.V. | Oxymétrie du pouls et système de surveillance sans contact de données biométriques d'un patient |
US20170171177A1 (en) * | 2015-12-11 | 2017-06-15 | Paypal, Inc. | Authentication via item recognition |
US9858340B1 (en) | 2016-04-11 | 2018-01-02 | Digital Reasoning Systems, Inc. | Systems and methods for queryable graph representations of videos |
US9965728B2 (en) | 2014-06-03 | 2018-05-08 | Element, Inc. | Attendance authentication and management in connection with mobile devices |
US10135815B2 (en) | 2012-09-05 | 2018-11-20 | Element, Inc. | System and method for biometric authentication in connection with camera equipped devices |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US10262182B2 (en) | 2013-09-09 | 2019-04-16 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10282637B2 (en) | 2015-11-25 | 2019-05-07 | Xiaomi Inc. | Method, device, and storage medium for image characteristic extraction |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
US10339440B2 (en) | 2015-02-19 | 2019-07-02 | Digital Reasoning Systems, Inc. | Systems and methods for neural language modeling |
CN110084224A (zh) * | 2019-05-08 | 2019-08-02 | 电子科技大学 | 一种云上的指纹安全认证系统及方法 |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
CN110245548A (zh) * | 2018-03-09 | 2019-09-17 | 苹果公司 | 包括非接触式手掌生物特征传感器的电子设备和相关方法 |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
CN110603542A (zh) * | 2017-06-07 | 2019-12-20 | 赫尔实验室有限公司 | 用于实时视觉活动识别的神经形态系统 |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10643051B2 (en) | 2017-07-13 | 2020-05-05 | Samsung Electronics Co., Ltd. | Optics-based fingerprint sensor, electric device including optics-based fingerprint sensor, and operation method of electric device |
US10678908B2 (en) * | 2013-09-27 | 2020-06-09 | Mcafee, Llc | Trusted execution of an executable object on a local device |
US10735959B2 (en) | 2017-09-18 | 2020-08-04 | Element Inc. | Methods, systems, and media for detecting spoofing in mobile authentication |
EP3702958A1 (fr) * | 2019-02-26 | 2020-09-02 | Identy Inc. | Procédé de vérification de l'identité d'un utilisateur en identifiant un objet dans une image comportant une caractéristique biométrique de l'utilisateur et en séparant une partie de l'image comprenant la caractéristique biométrique des autres parties de l'image |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US10873577B2 (en) * | 2018-08-17 | 2020-12-22 | Evgeny Chereshnev | Identifying and authorizing user data over a network based on biometric and statistical data |
US10915725B2 (en) * | 2019-07-01 | 2021-02-09 | Thales Dis Usa Inc. | Method to generate a slap/fingers foreground mask |
US10942997B2 (en) * | 2014-08-12 | 2021-03-09 | At&T Intellectual Property I, L.P. | Multi-factor authentication |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11151234B2 (en) | 2016-08-31 | 2021-10-19 | Redrock Biometrics, Inc | Augmented reality virtual reality touchless palm print identification |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11343277B2 (en) | 2019-03-12 | 2022-05-24 | Element Inc. | Methods and systems for detecting spoofing of facial recognition in connection with mobile devices |
US11380138B2 (en) | 2017-12-14 | 2022-07-05 | Redrock Biometrics, Inc. | Device and method for touchless palm print acquisition |
US20220286594A1 (en) * | 2021-03-04 | 2022-09-08 | Ford Global Technologies, Llc | Illumination control for vehicle sensors |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US11507690B2 (en) * | 2018-03-21 | 2022-11-22 | Idemia Identity & Security France | Method of enrolling data to control an identity, and identity-control method |
US11507248B2 (en) | 2019-12-16 | 2022-11-22 | Element Inc. | Methods, systems, and media for anti-spoofing using eye-tracking |
US11526885B2 (en) | 2015-03-04 | 2022-12-13 | Trusona, Inc. | Systems and methods for user identification using graphical barcode and payment card authentication read data |
US11610006B2 (en) * | 2017-11-13 | 2023-03-21 | Nagravision S.A. | Method to control the display of at least one content on a screen |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US11687778B2 (en) | 2020-01-06 | 2023-06-27 | The Research Foundation For The State University Of New York | Fakecatcher: detection of synthetic portrait videos using biological signals |
US20230252123A1 (en) * | 2017-08-31 | 2023-08-10 | Yeo Messaging Ltd | Method of Displaying Content On A Screen Of An Electronic Processing Device |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105654093B (zh) | 2015-11-25 | 2018-09-25 | 小米科技有限责任公司 | 特征提取方法及装置 |
US10303961B1 (en) * | 2017-04-13 | 2019-05-28 | Zoox, Inc. | Object detection and passenger notification |
US10861583B2 (en) * | 2017-05-12 | 2020-12-08 | Laboratory Corporation Of America Holdings | Systems and methods for biomarker identification |
CN108307113B (zh) | 2018-01-26 | 2020-10-09 | 北京图森智途科技有限公司 | 图像采集方法、图像采集控制方法及相关装置 |
EP3540633B1 (fr) * | 2018-03-16 | 2020-09-23 | Identy Inc. | Procédé d'identification d'un objet dans une image et dispositif mobile pour exécuter le procédé |
US10872221B2 (en) | 2018-06-21 | 2020-12-22 | Amazon Technologies, Inc | Non-contact biometric identification system |
US11354692B2 (en) * | 2018-08-01 | 2022-06-07 | Motional Ad Llc | System and method for keeping an automated-taxi clean |
US11200313B2 (en) | 2019-03-18 | 2021-12-14 | Visa International Service Association | Defense mechanism against component wise hill climbing using synthetic face generators |
US11283937B1 (en) | 2019-08-15 | 2022-03-22 | Ikorongo Technology, LLC | Sharing images based on face matching in a network |
KR20210145458A (ko) | 2020-05-25 | 2021-12-02 | 삼성전자주식회사 | 위조 지문 검출 장치 및 위조 지문 방지를 위한 모델 업데이트 방법 |
TWM608710U (zh) * | 2020-06-05 | 2021-03-01 | 神盾股份有限公司 | 屏下式指紋感測裝置 |
US11663805B1 (en) * | 2021-03-23 | 2023-05-30 | Amazon Technologies, Inc. | Utilizing sensor data for automated user identification |
ES2926354A1 (es) * | 2021-04-14 | 2022-10-25 | Valero Jose Gimeno | Sistema y un metodo de certificacion de resultados de analisis de muestras biologicas en remoto mediante vision artificial |
US11816932B1 (en) * | 2021-06-29 | 2023-11-14 | Amazon Technologies, Inc. | Updating identification data in automated user-identification systems |
KR20230063894A (ko) * | 2021-10-26 | 2023-05-10 | 주식회사 카카오브이엑스 | 딥러닝 기반 비접촉식 장문 인식 시스템 및 방법 |
US11688204B1 (en) * | 2022-01-28 | 2023-06-27 | Armatura Llc | System and method for robust palm liveness detection using variations of images |
US11941911B2 (en) | 2022-01-28 | 2024-03-26 | Armatura Llc | System and method for detecting liveness of biometric information |
US11721132B1 (en) | 2022-01-28 | 2023-08-08 | Armatura Llc | System and method for generating region of interests for palm liveness detection |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090175506A1 (en) * | 2002-12-31 | 2009-07-09 | Polcha Andrew J | Recoverable biometric identity system and method |
Family Cites Families (104)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3733861A (en) | 1972-01-19 | 1973-05-22 | Recognition Devices | Electronic recognition door lock |
US4371951A (en) * | 1980-09-29 | 1983-02-01 | Control Data Corporation | Apparatus for converting serial input sparse vector format to parallel unpacked format for input to tandem arithmetic logic units |
US5067164A (en) | 1989-11-30 | 1991-11-19 | At&T Bell Laboratories | Hierarchical constrained automatic learning neural network for character recognition |
US5058179A (en) | 1990-01-31 | 1991-10-15 | At&T Bell Laboratories | Hierarchical constrained automatic learning network for character recognition |
US5450523A (en) * | 1990-11-15 | 1995-09-12 | Matsushita Electric Industrial Co., Ltd. | Training module for estimating mixture Gaussian densities for speech unit models in speech recognition systems |
US5774059A (en) | 1995-07-20 | 1998-06-30 | Vindicator Corporation | Programmable electronic lock |
CA2156236C (fr) | 1995-08-16 | 1999-07-20 | Stephen J. Borza | Systeme de controle biometrique pour empecher l'utilisation non autorisee d'un vehicule |
JP2815045B2 (ja) * | 1996-12-16 | 1998-10-27 | 日本電気株式会社 | 画像特徴抽出装置,画像特徴解析装置,および画像照合システム |
US6178255B1 (en) | 1998-04-28 | 2001-01-23 | Cross Match Technologies, Inc. | Individualized fingerprint scanner |
EP1038877B1 (fr) | 1999-03-24 | 2004-03-10 | Tosoh Corporation | Dérivé monophosphorique du binaphtole et son utilisation |
JP4727065B2 (ja) * | 2000-05-11 | 2011-07-20 | 株式会社半導体エネルギー研究所 | 認証装置および通信システム |
US6956608B1 (en) | 2000-08-11 | 2005-10-18 | Identix Incorporated | Fingerprint imaging device including an optical plate having microreflectors |
US6819219B1 (en) | 2000-10-13 | 2004-11-16 | International Business Machines Corporation | Method for biometric-based authentication in wireless communication for access control |
JP2002259345A (ja) * | 2001-02-27 | 2002-09-13 | Nec Corp | 身体的特徴データの不正使用を防止する認証方法、認証装置、及びプログラム |
US6633090B2 (en) | 2001-09-07 | 2003-10-14 | Delphi Technologies, Inc. | Starting system for an automotive vehicle using fingerprint recognition |
JP2003148017A (ja) | 2001-11-08 | 2003-05-21 | Sharp Corp | 錠装置、錠制御システム及び錠制御方法 |
US8590013B2 (en) | 2002-02-25 | 2013-11-19 | C. S. Lee Crawford | Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry |
US7616784B2 (en) | 2002-07-29 | 2009-11-10 | Robert William Kocher | Method and apparatus for contactless hand recognition |
US20040114785A1 (en) * | 2002-12-06 | 2004-06-17 | Cross Match Technologies, Inc. | Methods for obtaining print and other hand characteristic information using a non-planar prism |
DE10315923A1 (de) | 2003-04-08 | 2004-10-28 | Tbs Holding Ag | Verfahren und Anordnung zur berührungslosen Detektion von Daten unebener Flächen |
US6923370B2 (en) | 2003-05-20 | 2005-08-02 | Bradley L. Gotfried | Access system |
US6992562B2 (en) | 2003-06-10 | 2006-01-31 | Visteon Global Technologies, Inc. | Biometric keyless entry system |
CA2529033A1 (fr) * | 2003-06-21 | 2005-01-06 | Aprilis, Inc. | Procede et appareil de traitement d'images biometriques |
JP2005063172A (ja) * | 2003-08-13 | 2005-03-10 | Toshiba Corp | 顔照合装置および通行制御装置 |
US8181017B2 (en) | 2004-10-22 | 2012-05-15 | Nds Limited | Certificate renewal |
US20060120568A1 (en) | 2004-12-06 | 2006-06-08 | Mcconville Patrick J | System and method for tracking individuals |
JP2008536197A (ja) | 2005-02-22 | 2008-09-04 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 所定の条件下でメディア権利を転送するためのシステム及び方法 |
JP4696610B2 (ja) * | 2005-03-15 | 2011-06-08 | オムロン株式会社 | 被写体認証装置、顔認証装置、携帯電話、及び被写体認証方法 |
US8151358B1 (en) | 2005-04-07 | 2012-04-03 | Aol Inc. | Annotation of digital items in a shared list |
US20060294393A1 (en) | 2005-06-24 | 2006-12-28 | Mc Call Clark E | Remote biometric registration for vehicles |
WO2007000504A1 (fr) | 2005-06-27 | 2007-01-04 | France Telecom | Procede de reconnaissance biometrique d'une main, systeme et dispositif associes |
US8026840B2 (en) * | 2005-10-28 | 2011-09-27 | Raytheon Company | Biometric radar system and method for identifying persons and positional states of persons |
JP4826234B2 (ja) * | 2005-11-30 | 2011-11-30 | オムロン株式会社 | 顔認証装置、セキュリティ強度変更方法およびプログラム |
DE102006018956A1 (de) * | 2006-04-24 | 2007-10-25 | Robert Bosch Gmbh | Abgassensor |
US7983451B2 (en) * | 2006-06-30 | 2011-07-19 | Motorola Mobility, Inc. | Recognition method using hand biometrics with anti-counterfeiting |
US7660442B2 (en) * | 2006-09-01 | 2010-02-09 | Handshot, Llc | Method and system for capturing fingerprints, palm prints and hand geometry |
US8285648B2 (en) | 2006-09-29 | 2012-10-09 | Dan Scammell | System and method for verifying a user's identity in electronic transactions |
JP2008242631A (ja) * | 2007-03-26 | 2008-10-09 | Oki Electric Ind Co Ltd | 虹彩登録装置および虹彩認証装置 |
US20080284726A1 (en) * | 2007-05-17 | 2008-11-20 | Marc Boillot | System and Method for Sensory Based Media Control |
US8126788B2 (en) | 2007-05-29 | 2012-02-28 | Exaktime Innovations, Inc. | Method for tracking time attendance of either a dedicated user or multiple non-dedicated users, interchangeably, using a single multi-function electronic hand-held device |
CA2636304C (fr) | 2007-06-27 | 2014-12-30 | Research In Motion Limited | Systeme et methode permettant l'amelioration de rebranchements de lecteur de cartes a puce |
JP4693818B2 (ja) | 2007-07-09 | 2011-06-01 | 株式会社エヌ・ティ・ティ・ドコモ | 認証システム及び認証方法 |
GB0714344D0 (en) | 2007-07-24 | 2007-09-05 | Univ Wales Swansea | Biometric attendance verification |
US10169646B2 (en) | 2007-12-31 | 2019-01-01 | Applied Recognition Inc. | Face authentication to mitigate spoofing |
JP5186929B2 (ja) * | 2008-01-21 | 2013-04-24 | 日本電気株式会社 | 認証用撮像装置 |
US9286742B2 (en) | 2008-03-31 | 2016-03-15 | Plantronics, Inc. | User authentication system and method |
US8358856B2 (en) * | 2008-06-02 | 2013-01-22 | Eastman Kodak Company | Semantic event detection for digital content records |
US20100042940A1 (en) | 2008-08-14 | 2010-02-18 | Caterpillar Inc. | Geofence system with integrated user interface |
US8175379B2 (en) * | 2008-08-22 | 2012-05-08 | Adobe Systems Incorporated | Automatic video image segmentation |
CN102197412B (zh) | 2008-10-28 | 2014-01-08 | 日本电气株式会社 | 伪装检测系统和伪装检测方法 |
US8345932B2 (en) | 2008-11-24 | 2013-01-01 | International Business Machines Corporation | Support vector machine for biometric data processing |
JP5098973B2 (ja) * | 2008-11-27 | 2012-12-12 | 富士通株式会社 | 生体認証装置、生体認証方法及び生体認証プログラム |
JP4636171B2 (ja) | 2008-12-17 | 2011-02-23 | トヨタ自動車株式会社 | 車両用生体認証システム |
JP2010146502A (ja) * | 2008-12-22 | 2010-07-01 | Toshiba Corp | 認証処理装置および認証処理方法 |
EP2386097A4 (fr) | 2009-01-06 | 2013-02-20 | Xped Holdings Pty Ltd | Agencement pour gérer un accès de dispositif mobile à des régions de quartier contenant des services, des produits et des informations |
US20100191551A1 (en) | 2009-01-26 | 2010-07-29 | Apple Inc. | Systems and methods for accessing hotel services using a portable electronic device |
JP5436876B2 (ja) | 2009-02-02 | 2014-03-05 | 株式会社ディスコ | 研削方法 |
US20100246902A1 (en) | 2009-02-26 | 2010-09-30 | Lumidigm, Inc. | Method and apparatus to combine biometric sensing and other functionality |
US8194938B2 (en) * | 2009-06-02 | 2012-06-05 | George Mason Intellectual Properties, Inc. | Face authentication using recognition-by-parts, boosting, and transduction |
US8638939B1 (en) | 2009-08-20 | 2014-01-28 | Apple Inc. | User authentication on an electronic device |
US8447119B2 (en) * | 2010-03-16 | 2013-05-21 | Nec Laboratories America, Inc. | Method and system for image classification |
US8326001B2 (en) | 2010-06-29 | 2012-12-04 | Apple Inc. | Low threshold face recognition |
WO2012020591A1 (fr) * | 2010-08-09 | 2012-02-16 | 日本電気株式会社 | Système d'identification de personnes, dispositif de spécification de valeur de caractéristique, procédé de spécification de caractéristique et support d'enregistrement |
US8670935B2 (en) | 2010-08-17 | 2014-03-11 | Blackberry Limited | Tagging a location by pairing devices |
JP5565285B2 (ja) * | 2010-11-19 | 2014-08-06 | コニカミノルタ株式会社 | ガラス光学素子の製造方法 |
US20120137137A1 (en) | 2010-11-30 | 2012-05-31 | Brickell Ernest F | Method and apparatus for key provisioning of hardware devices |
KR101816170B1 (ko) * | 2010-12-22 | 2018-01-09 | 한국전자통신연구원 | 3차원 깊이 정보 획득 장치 및 그 방법 |
US8457370B2 (en) * | 2011-01-20 | 2013-06-04 | Daon Holdings Limited | Methods and systems for authenticating users with captured palm biometric data |
US8675543B2 (en) | 2011-02-24 | 2014-03-18 | Verizon Patent And Licensing Inc. | Route limiting in border gateway protocol over satellite networks |
WO2012135861A1 (fr) | 2011-04-01 | 2012-10-04 | Tony Lam | Système d'accès passif sans clé alimenté par piles, pour accès à un bâtiment |
US8718327B2 (en) * | 2011-04-11 | 2014-05-06 | Intel Corporation | Gesture recognition using depth images |
US9082235B2 (en) | 2011-07-12 | 2015-07-14 | Microsoft Technology Licensing, Llc | Using facial data for device authentication or subject identification |
US8548207B2 (en) | 2011-08-15 | 2013-10-01 | Daon Holdings Limited | Method of host-directed illumination and system for conducting host-directed illumination |
CN102426715A (zh) | 2011-09-30 | 2012-04-25 | 华为技术有限公司 | 一种电子门锁开锁方法、电子门锁及电子门锁系统 |
US8947202B2 (en) | 2011-10-20 | 2015-02-03 | Apple Inc. | Accessing a vehicle using portable devices |
US9111402B1 (en) | 2011-10-31 | 2015-08-18 | Replicon, Inc. | Systems and methods for capturing employee time for time and attendance management |
WO2013100898A1 (fr) | 2011-12-27 | 2013-07-04 | Intel Corporation | Authentification d'un utilisateur basée sur un test de turing et système, dispositif et procédé de vérification de la présence d'un utilisateur |
JP5866216B2 (ja) | 2012-01-31 | 2016-02-17 | 株式会社東海理化電機製作所 | 電子キー登録システム |
US8705070B2 (en) * | 2012-02-24 | 2014-04-22 | Canon Kabushiki Kaisha | Systems and methods for managing use of an imaging device |
US9323912B2 (en) | 2012-02-28 | 2016-04-26 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication |
US20130268418A1 (en) | 2012-04-04 | 2013-10-10 | Accu-Time Systems, Inc. | Methods and apparatus for wireless communication of time and attendance information |
US20130286161A1 (en) | 2012-04-25 | 2013-10-31 | Futurewei Technologies, Inc. | Three-dimensional face recognition for mobile devices |
US9070162B2 (en) | 2012-04-25 | 2015-06-30 | ZR Investments, LLC | Time tracking device and method |
US9047376B2 (en) * | 2012-05-01 | 2015-06-02 | Hulu, LLC | Augmenting video with facial recognition |
WO2013180044A1 (fr) | 2012-05-29 | 2013-12-05 | 株式会社村田製作所 | Système de clé électronique |
US8869053B2 (en) | 2012-07-06 | 2014-10-21 | Sap Ag | Organizer for managing employee time and attendance |
US20140195974A1 (en) | 2012-08-29 | 2014-07-10 | Identity Validation Products, Llc | Method and apparatus for using a finger swipe interface to control a system |
EA201590485A1 (ru) | 2012-09-05 | 2015-12-30 | Элемент, Инк. | Система и способ биометрической аутентификации с использованием устройств, снабженных камерами |
US9740917B2 (en) | 2012-09-07 | 2017-08-22 | Stone Lock Global, Inc. | Biometric identification systems and methods |
US9002586B2 (en) | 2012-12-03 | 2015-04-07 | Honda Motor Co., Ltd. | Integrated biometric switch |
US9003196B2 (en) | 2013-05-13 | 2015-04-07 | Hoyos Labs Corp. | System and method for authorizing access to access-controlled environments |
US9014452B2 (en) | 2013-08-21 | 2015-04-21 | Seiko Epson Corporation | Orientation-aware average intensity histogram to indicate object boundary depth in ultrasound images |
KR101556599B1 (ko) | 2013-10-30 | 2015-10-02 | 연세대학교 산학협력단 | 패턴 입력 장치 및 방법과 이를 이용한 기록 매체 |
US10027884B2 (en) | 2014-03-05 | 2018-07-17 | Disney Enterprises, Inc. | Method for capturing photographs and videos on a handheld client device without continually observing the device's screen |
US9913135B2 (en) | 2014-05-13 | 2018-03-06 | Element, Inc. | System and method for electronic key provisioning and access management in connection with mobile devices |
US20150348214A1 (en) | 2014-05-28 | 2015-12-03 | Shailendra Jain | Messaging service for geofence-based automatic time clocking |
US20150347833A1 (en) | 2014-06-03 | 2015-12-03 | Mark Ries Robinson | Noncontact Biometrics with Small Footprint |
JP6415607B2 (ja) | 2014-06-03 | 2018-10-31 | エレメント,インク. | モバイル・デバイスに関連する出退認証および管理 |
US10614204B2 (en) | 2014-08-28 | 2020-04-07 | Facetec, Inc. | Facial recognition authentication system including path parameters |
US9928603B2 (en) | 2014-12-31 | 2018-03-27 | Morphotrust Usa, Llc | Detecting facial liveliness |
RU2715521C2 (ru) | 2015-06-16 | 2020-02-28 | Айверифай Инк. | Системы и способы для обнаружения обманных объектов и анализа жизненности |
KR102377182B1 (ko) | 2015-09-01 | 2022-03-22 | 엘지전자 주식회사 | 이동 단말기 및 그 제어방법 |
US20170186170A1 (en) | 2015-12-24 | 2017-06-29 | Thomas A. Nugraha | Facial contour recognition for identification |
US9983687B1 (en) | 2017-01-06 | 2018-05-29 | Adtile Technologies Inc. | Gesture-controlled augmented reality experience using a mobile communications device |
-
2013
- 2013-09-05 EA EA201590485A patent/EA201590485A1/ru unknown
- 2013-09-05 ES ES13834699T patent/ES2791776T3/es active Active
- 2013-09-05 CN CN201380055691.9A patent/CN104756135B/zh active Active
- 2013-09-05 MY MYPI2015000557A patent/MY181564A/en unknown
- 2013-09-05 EP EP13834699.4A patent/EP2893489B1/fr active Active
- 2013-09-05 KR KR1020157008250A patent/KR101938033B1/ko active IP Right Grant
- 2013-09-05 EP EP20151530.1A patent/EP3657389A1/fr not_active Withdrawn
- 2013-09-05 SG SG11201501691VA patent/SG11201501691VA/en unknown
- 2013-09-05 AP AP2015008348A patent/AP2015008348A0/xx unknown
- 2013-09-05 WO PCT/US2013/058343 patent/WO2014039732A2/fr active Application Filing
- 2013-09-05 US US14/019,512 patent/US20140068740A1/en not_active Abandoned
- 2013-09-05 AU AU2013312495A patent/AU2013312495B2/en not_active Ceased
- 2013-09-05 JP JP2015531210A patent/JP2015529365A/ja active Pending
- 2013-09-05 BR BR112015004867-6A patent/BR112015004867B1/pt active IP Right Grant
- 2013-09-05 MX MX2015002841A patent/MX346218B/es active IP Right Grant
- 2013-09-05 CA CA2884096A patent/CA2884096C/fr active Active
-
2014
- 2014-08-01 US US14/449,730 patent/US10135815B2/en active Active
-
2015
- 2015-03-04 IL IL237556A patent/IL237556B/en active IP Right Grant
- 2015-03-05 PH PH12015500481A patent/PH12015500481B1/en unknown
- 2015-03-31 ZA ZA2015/02207A patent/ZA201502207B/en unknown
-
2016
- 2016-01-12 HK HK16100302.5A patent/HK1212494A1/xx unknown
-
2018
- 2018-08-21 JP JP2018155029A patent/JP6634127B2/ja active Active
- 2018-10-05 US US16/153,412 patent/US10728242B2/en active Active
-
2019
- 2019-05-29 AU AU2019203766A patent/AU2019203766B2/en not_active Ceased
- 2019-12-13 JP JP2019225774A patent/JP2020061171A/ja active Pending
-
2020
- 2020-03-01 IL IL272998A patent/IL272998B/en active IP Right Grant
-
2021
- 2021-07-30 PH PH12021551836A patent/PH12021551836A1/en unknown
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090175506A1 (en) * | 2002-12-31 | 2009-07-09 | Polcha Andrew J | Recoverable biometric identity system and method |
Cited By (112)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US10516997B2 (en) | 2011-09-29 | 2019-12-24 | Apple Inc. | Authentication with secondary approver |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US10728242B2 (en) | 2012-09-05 | 2020-07-28 | Element Inc. | System and method for biometric authentication in connection with camera-equipped devices |
US10135815B2 (en) | 2012-09-05 | 2018-11-20 | Element, Inc. | System and method for biometric authentication in connection with camera equipped devices |
US20140253711A1 (en) * | 2013-03-07 | 2014-09-11 | Advanced Optical Systems, Inc. | Agile non-contact biometric sensor |
US11287942B2 (en) | 2013-09-09 | 2022-03-29 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces |
US10262182B2 (en) | 2013-09-09 | 2019-04-16 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10410035B2 (en) | 2013-09-09 | 2019-09-10 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11494046B2 (en) | 2013-09-09 | 2022-11-08 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10372963B2 (en) | 2013-09-09 | 2019-08-06 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10678908B2 (en) * | 2013-09-27 | 2020-06-09 | Mcafee, Llc | Trusted execution of an executable object on a local device |
US11907362B2 (en) | 2013-09-27 | 2024-02-20 | MAfee, LLC | Trusted execution of an executable object on a local device |
US20160328606A1 (en) * | 2013-11-15 | 2016-11-10 | Facebook, Inc. | Pose-aligned networks for deep attribute modeling |
US11380119B2 (en) * | 2013-11-15 | 2022-07-05 | Meta Platforms, Inc. | Pose-aligned networks for deep attribute modeling |
US9400925B2 (en) * | 2013-11-15 | 2016-07-26 | Facebook, Inc. | Pose-aligned networks for deep attribute modeling |
US10402632B2 (en) * | 2013-11-15 | 2019-09-03 | Facebook, Inc. | Pose-aligned networks for deep attribute modeling |
US20150139485A1 (en) * | 2013-11-15 | 2015-05-21 | Facebook, Inc. | Pose-aligned networks for deep attribute modeling |
US20150278499A1 (en) * | 2013-11-21 | 2015-10-01 | Yevgeny Levitov | Motion-Triggered Biometric System for Access Control |
US20150242840A1 (en) * | 2014-02-25 | 2015-08-27 | Jpmorgan Chase Bank, N.A. | Systems and methods for dynamic biometric configuration compliance control |
US9510196B2 (en) | 2014-03-17 | 2016-11-29 | Qualcomm Incorporated | Method and apparatus for authenticating a user on a mobile device |
CN111628870A (zh) * | 2014-05-13 | 2020-09-04 | 埃利蒙特公司 | 用于电子钥匙供应、用户验证和访问管理的系统和方法 |
CN106489248A (zh) * | 2014-05-13 | 2017-03-08 | 埃利蒙特公司 | 用于与移动设备相关的电子钥匙供应和访问管理的系统和方法 |
US9913135B2 (en) | 2014-05-13 | 2018-03-06 | Element, Inc. | System and method for electronic key provisioning and access management in connection with mobile devices |
JP2017522634A (ja) * | 2014-05-13 | 2017-08-10 | エレメント,インク. | モバイル装置に接続して電子キーを供給し、アクセスを管理するためのシステムおよび方法 |
WO2015175670A1 (fr) * | 2014-05-13 | 2015-11-19 | Element, Inc. | Système et procédé de fourniture de clé électronique et de gestion d'accès en lien avec des dispositifs mobiles |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US9965728B2 (en) | 2014-06-03 | 2018-05-08 | Element, Inc. | Attendance authentication and management in connection with mobile devices |
US10942997B2 (en) * | 2014-08-12 | 2021-03-09 | At&T Intellectual Property I, L.P. | Multi-factor authentication |
WO2016137554A3 (fr) * | 2014-12-27 | 2016-10-20 | Mcafee, Inc. | Authentification d'utilisateur prédictive |
US10339440B2 (en) | 2015-02-19 | 2019-07-02 | Digital Reasoning Systems, Inc. | Systems and methods for neural language modeling |
US11526885B2 (en) | 2015-03-04 | 2022-12-13 | Trusona, Inc. | Systems and methods for user identification using graphical barcode and payment card authentication read data |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11734708B2 (en) | 2015-06-05 | 2023-08-22 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US20160373438A1 (en) * | 2015-06-17 | 2016-12-22 | Electronics And Telecommunications Research Institute | User authentication apparatus |
KR20160148863A (ko) * | 2015-06-17 | 2016-12-27 | 한국전자통신연구원 | 사용자 인증 장치 |
KR102429865B1 (ko) * | 2015-06-17 | 2022-08-05 | 한국전자통신연구원 | 사용자 인증 장치 |
US10044711B2 (en) * | 2015-06-17 | 2018-08-07 | Electronics And Telecommunications Research Institute | User middle finger—wrist biometric authentication apparatus |
US10282637B2 (en) | 2015-11-25 | 2019-05-07 | Xiaomi Inc. | Method, device, and storage medium for image characteristic extraction |
WO2017093294A1 (fr) * | 2015-11-30 | 2017-06-08 | Koninklijke Philips N.V. | Oxymétrie du pouls et système de surveillance sans contact de données biométriques d'un patient |
US20170171177A1 (en) * | 2015-12-11 | 2017-06-15 | Paypal, Inc. | Authentication via item recognition |
US10397208B2 (en) * | 2015-12-11 | 2019-08-27 | Paypal, Inc. | Authentication via item recognition |
CN105741375A (zh) * | 2016-01-20 | 2016-07-06 | 华中师范大学 | 一种大视场双目视觉的红外图像考勤方法 |
US9858340B1 (en) | 2016-04-11 | 2018-01-02 | Digital Reasoning Systems, Inc. | Systems and methods for queryable graph representations of videos |
US10108709B1 (en) | 2016-04-11 | 2018-10-23 | Digital Reasoning Systems, Inc. | Systems and methods for queryable graph representations of videos |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11151234B2 (en) | 2016-08-31 | 2021-10-19 | Redrock Biometrics, Inc | Augmented reality virtual reality touchless palm print identification |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US11574041B2 (en) | 2016-10-25 | 2023-02-07 | Apple Inc. | User interface for managing access to credentials for use in an operation |
CN110603542A (zh) * | 2017-06-07 | 2019-12-20 | 赫尔实验室有限公司 | 用于实时视觉活动识别的神经形态系统 |
US10643051B2 (en) | 2017-07-13 | 2020-05-05 | Samsung Electronics Co., Ltd. | Optics-based fingerprint sensor, electric device including optics-based fingerprint sensor, and operation method of electric device |
US20230252123A1 (en) * | 2017-08-31 | 2023-08-10 | Yeo Messaging Ltd | Method of Displaying Content On A Screen Of An Electronic Processing Device |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US10410076B2 (en) | 2017-09-09 | 2019-09-10 | Apple Inc. | Implementation of biometric authentication |
US10735959B2 (en) | 2017-09-18 | 2020-08-04 | Element Inc. | Methods, systems, and media for detecting spoofing in mobile authentication |
IL282574B1 (en) * | 2017-09-18 | 2023-06-01 | Element Inc | Methods, systems and media for detecting forgeries in mobile authentication |
US11425562B2 (en) * | 2017-09-18 | 2022-08-23 | Element Inc. | Methods, systems, and media for detecting spoofing in mobile authentication |
US11610006B2 (en) * | 2017-11-13 | 2023-03-21 | Nagravision S.A. | Method to control the display of at least one content on a screen |
US11380138B2 (en) | 2017-12-14 | 2022-07-05 | Redrock Biometrics, Inc. | Device and method for touchless palm print acquisition |
CN110245548A (zh) * | 2018-03-09 | 2019-09-17 | 苹果公司 | 包括非接触式手掌生物特征传感器的电子设备和相关方法 |
US11587353B2 (en) | 2018-03-09 | 2023-02-21 | Apple Inc. | Electronic device including palm biometric sensor layer and related methods |
US11507690B2 (en) * | 2018-03-21 | 2022-11-22 | Idemia Identity & Security France | Method of enrolling data to control an identity, and identity-control method |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US10873577B2 (en) * | 2018-08-17 | 2020-12-22 | Evgeny Chereshnev | Identifying and authorizing user data over a network based on biometric and statistical data |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11783625B2 (en) | 2019-02-26 | 2023-10-10 | Identy Inc. | Method for verifying the identity of a user by identifying an object within an image that has a biometric characteristic of the user and separating a portion of the image comprising the biometric characteristic from other portions of the image |
EP4036795A1 (fr) * | 2019-02-26 | 2022-08-03 | Identy Inc. | Procédé de vérification de l'identité d'un utilisateur par identification d'un objet dans une image comportant un élément biométrique de l'utilisateur et par séparation d'une partie de l'image comprenant l'élément biométrique des autres parties de l'image |
EP3702958A1 (fr) * | 2019-02-26 | 2020-09-02 | Identy Inc. | Procédé de vérification de l'identité d'un utilisateur en identifiant un objet dans une image comportant une caractéristique biométrique de l'utilisateur et en séparant une partie de l'image comprenant la caractéristique biométrique des autres parties de l'image |
WO2020174350A1 (fr) * | 2019-02-26 | 2020-09-03 | Identy Inc. | Procédé de vérification de l'identité d'un utilisateur par identification d'un objet dans une image présentant une caractéristique biométrique de l'utilisateur et séparation d'une partie de l'image présentant la caractéristique biométrique d'autres parties de l'image |
US11343277B2 (en) | 2019-03-12 | 2022-05-24 | Element Inc. | Methods and systems for detecting spoofing of facial recognition in connection with mobile devices |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US11688001B2 (en) | 2019-03-24 | 2023-06-27 | Apple Inc. | User interfaces for managing an account |
US11669896B2 (en) | 2019-03-24 | 2023-06-06 | Apple Inc. | User interfaces for managing an account |
US11610259B2 (en) | 2019-03-24 | 2023-03-21 | Apple Inc. | User interfaces for managing an account |
US11328352B2 (en) | 2019-03-24 | 2022-05-10 | Apple Inc. | User interfaces for managing an account |
CN110084224A (zh) * | 2019-05-08 | 2019-08-02 | 电子科技大学 | 一种云上的指纹安全认证系统及方法 |
US10915725B2 (en) * | 2019-07-01 | 2021-02-09 | Thales Dis Usa Inc. | Method to generate a slap/fingers foreground mask |
US11507248B2 (en) | 2019-12-16 | 2022-11-22 | Element Inc. | Methods, systems, and media for anti-spoofing using eye-tracking |
US11687778B2 (en) | 2020-01-06 | 2023-06-27 | The Research Foundation For The State University Of New York | Fakecatcher: detection of synthetic portrait videos using biological signals |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US11509833B2 (en) * | 2021-03-04 | 2022-11-22 | Ford Global Technologies, Llc | Illumination control for vehicle sensors |
US20220286594A1 (en) * | 2021-03-04 | 2022-09-08 | Ford Global Technologies, Llc | Illumination control for vehicle sensors |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10728242B2 (en) | System and method for biometric authentication in connection with camera-equipped devices | |
TWI727329B (zh) | 用於基於深度學習方法提供對資源之選擇性存取之防欺騙系統及方法 | |
US10552698B2 (en) | System for multiple algorithm processing of biometric data | |
RU2589344C2 (ru) | Способ, устройство и система аутентификации на основе биологических характеристик | |
Wojciechowska et al. | The overview of trends and challenges in mobile biometrics | |
Mun et al. | Design for visitor authentication based on face recognition technology using CCTV | |
US10867022B2 (en) | Method and apparatus for providing authentication using voice and facial data | |
Singh et al. | Adapted Facial Recognition And Spoofing Detection For Management Decision Making System: A Visually Impaired People Perspective | |
US20220230494A1 (en) | Security systems and processes involving biometric authentication | |
Dhakal | MULTI-BIOMETRIC SYSTEMS THEIR APPLICATION AND SECURITY | |
Grafilon et al. | A signature comparing android mobile application utilizing feature extracting algorithms | |
Falohun et al. | Remote Access Control System using Iris Signature | |
El Nahal | Mobile Multimodal Biometric System for Security | |
Abouzakhar et al. | A fingerprint matching model using unsupervised learning approach | |
Dhameja | Multi-Characteristic Biometric Systems: Who Are You? | |
Yang | A multi-stage non-cooperative iris recognition approach with enhanced template security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ELEMENT, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LECUN, YANN;PEROLD, ADAM;WANG, YANG;AND OTHERS;SIGNING DATES FROM 20140723 TO 20140730;REEL/FRAME:033427/0088 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |