摘要:
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
摘要:
A computer alters at least one recognizable metric or text in a digitally-encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.
摘要:
The present application is concerned with an authentication system for authenticating at least one object. The authentication system comprises: —a capture device (40) for capturing at least one biometric output data record (BD) for the object; —a reading device (50, 60) for reading configuration data (Konf), associated with the object, for an artificial neural network; —a processing device (32) which is designed to produce the artificial neural network and to input the biometric output data record (BD) into the neural network; —a verification device (33) which captures an output from the neural network in order to authenticate the object, wherein the neural network is a bidirectional associative memory, particularly a Hopfield network, having a multiplicity of network states and the verification device (33) is designed to determine the output from the neural network by capturing a final state derived from the input of the biometric output data record (BD). A fundamental concept of the present invention is the use of a neural network to store a key associated with a particular person, wherein said key is released only when appropriate biometric data are input into the neural network.
摘要:
In the client, a feature quantity extraction unit extracts a feature quantity from biometric information of a user. A feature quantity conversion unit converts the feature quantity by a one-time parameter. In the first server, a parameter DB stores a parameter in association with the ID. A data generation unit generates data based on the parameter corresponding to the ID transmitted from the client. In the second server, a template DB stores a template to which the feature quantity of the biometric information of the user is converted by the parameter, in association with the ID. A template conversion unit generates a one-time template by converting the template corresponding to the ID transmitted from the first server. Then, a match determination unit compares the converted feature quantity transmitted from the client or the data transmitted from the first server with the one-time template to determine whether they match or not.
摘要:
A computer readable medium embodying a program to be executed by a terminal device used for a biometric authentication, the program including: an image generation code generating an enrolled image and a verification image from biometric information of a user collected at a sensor coupled to the terminal device; a filter generation code generating a random filter for scrambling the enrolled image and an inverse filter of the random filter; a transformation code transforming the enrolled image to a registration template by applying the random filter to the enrolled image and transforming the verification image to a filtered verification image by applying the inverse filter to the verification image; communication code transmitting the registration template and the filtered verification image to a biometric server thereby the biometric server performs biometric authentication of the user based on the cross-correlation between the registration template and the filtered verification image.
摘要:
A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A Personal Digital Key is a portable device carried by an individual that stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory. When multiple PDKs are present at the point of the transaction, the system automatically determines which PDK to associate with the authentication and transaction processes. The differentiation decision is based on one or more differentiation metrics including distance information, location information, and detection duration information associated with each of the PDKs within range. Profile samples comprising subsets of the profile information are received to provide a quick correlation between a PDK an input sample (e.g., a subset of a biometric input). After determining which PDK should be associated with the transaction, a full authentication process is executed.
摘要:
An information processing system acquires biological information of a target and generates output information determined in correspondence with identification information using the identification information associated with the biological information. Then, the output information is output.
摘要:
An entry management system SYS includes: a user terminal 1 that is possessed by a user U and is capable of notifying information to the user; and an entry control apparatus 3. The entry control apparatus includes: an acquisition unit 311 configured to acquire biological information on the user; a determination unit 312 configured to determine, based on the biological information, whether or not to permit entry of the user into a management target area MTA; and a control unit 313 configured to output determination result information to the user terminal in a case where it is determined that entry of the user into the management target area is not permitted.
摘要:
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.
摘要:
Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.