SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO ACCESS-CONTROLLED ENVIRONMENTS

    公开(公告)号:US20200334347A1

    公开(公告)日:2020-10-22

    申请号:US16874396

    申请日:2020-05-14

    摘要: Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with fixed PC's, servers and mobile devices (e.g., smartphones) operated by users. The systems and methods described herein enable a series of operations whereby a user attempting to access an access-controlled environment is prompted to biometrically authenticate using the user's preregistered mobile device. Biometric authentication can include capturing images of the user's biometric features, encoding the features as a biometric identifier, comparing the biometric identifier to a previously generated biometric identifier and determining liveness. In addition, the authentication system can further authorize the user and electronically grant access to the access-controlled environment. In this manner the secure authentication system can, based on biometric authentication, authorize a user's access to devices, online services, physical locations or any networked environment that require user authorization.

    SYSTEM AND METHOD FOR USER RECOGNITION USING MOTION SENSOR DATA

    公开(公告)号:US20190286242A1

    公开(公告)日:2019-09-19

    申请号:US16356399

    申请日:2019-03-18

    摘要: Technologies are presented herein in support of system and methods for user recognition using motion sensor data. Embodiments of the present invention concern a system and method for capturing motion sensor data using motion sensors of a mobile device and characterizing the motion sensor data into features for user recognition. The motion sensor data of a user is collected by the motion sensors of a mobile device in the form of a motion signal. One or more sets of features are extracted from the motion signal and a subset of discriminative features are then selected. The subset of features is analyzed, and a classification score is generated to classify the user as a genuine user or an imposter user.

    System and method for biometric protocol standards

    公开(公告)号:US11329980B2

    公开(公告)日:2022-05-10

    申请号:US16520191

    申请日:2019-07-23

    摘要: Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing device that is configured via a distributed client software application and is processed. The enrollment request is usable to enroll the user computing device in a network and includes an encrypted partial initial biometric vector associated with a user. An authentication request is processed that is subsequently received that includes an encrypted partial second biometric vector and that is associated with a user of the user computing device. A comparison of the encrypted partial initial biometric vector and the encrypted partial second biometric vector is performed, and a value representing the comparison is generated and transmitted to the user computing device. The user computing device is authenticated where the value is above a minimum threshold.

    Systems and methods for performing iris identification and verification using mobile devices

    公开(公告)号:US10691939B2

    公开(公告)日:2020-06-23

    申请号:US15679635

    申请日:2017-08-17

    摘要: Technologies are presented herein in support of a system and method for performing iris identification and verification using mobile devices. Embodiments of the present invention concern a method for authenticating a user with a mobile device that includes steps for capturing imagery of a user's face, analyzing the imagery to identify the portion of the image depicting the user's eyes and segmenting the eye image to isolate the iris image data and encoding the iris image data in iris template. The present disclosure further describes authenticating the user based on the encoded iris template and additional techniques for preventing erroneous authentication caused by spoofing. In some examples, the anti-spoofing techniques may include capturing one or more images of a user's eyes and analyzing the captured images for indications of liveness based on reflection characteristics depicted in the imagery.

    SYSTEM AND METHOD FOR BIOMETRIC PROTOCOL STANDARDS

    公开(公告)号:US20200036707A1

    公开(公告)日:2020-01-30

    申请号:US16520191

    申请日:2019-07-23

    摘要: Secure communications are provided between a user computing device and a server computing device. An enrollment request is received from a user computing device that is configured via a distributed client software application and is processed. The enrollment request is usable to enroll the user computing device in a network and includes an encrypted partial initial biometric vector associated with a user. An authentication request is processed that is subsequently received that includes an encrypted partial second biometric vector and that is associated with a user of the user computing device. A comparison of the encrypted partial initial biometric vector and the encrypted partial second biometric vector is performed, and a value representing the comparison is generated and transmitted to the user computing device. The user computing device is authenticated where the value is above a minimum threshold.

    SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO ACCESS-CONTROLLED ENVIRONMENTS

    公开(公告)号:US20180260553A1

    公开(公告)日:2018-09-13

    申请号:US15980818

    申请日:2018-05-16

    摘要: Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with fixed PC's, servers and mobile devices (e.g., smartphones) operated by users. The systems and methods described herein enable a series of operations whereby a user attempting to access an access-controlled environment is prompted to biometrically authenticate using the user's preregistered mobile device. Biometric authentication can include capturing images of the user's biometric features, encoding the features as a biometric identifier, comparing the biometric identifier to a previously generated biometric identifier and determining liveness. In addition, the authentication system can further authorize the user and electronically grant access to the access-controlled environment. In this manner the secure authentication system can, based on biometric authentication, authorize a user's access to devices, online services, physical locations or any networked environment that require user authorization.