Polarized images for security
    1.
    发明授权
    Polarized images for security 有权
    极化图像的安全

    公开(公告)号:US09536362B2

    公开(公告)日:2017-01-03

    申请号:US14279648

    申请日:2014-05-16

    Applicant: Apple Inc.

    Abstract: One embodiment may take the form of a method for providing security for access to a goal including storing a first image and receiving a second image comprising polarized data. The method also includes comparing the first image with the second image to determine if the first image and the second image are substantially the same. In the event the first and second images are not substantially the same, the method includes denying access to the goal. In the event the first and second images are substantially the same, the method includes determining, utilizing the polarized information, if the second image is of a three-dimensional object. Further, in the event the second image is not of a three-dimensional object, the method includes denying access to the goal and, in the event the second image is of a three-dimensional object, permitting access to the goal.

    Abstract translation: 一个实施例可以采取用于提供访问目标的安全性的方法的形式,包括存储第一图像并接收包括偏振数据的第二图像。 该方法还包括将第一图像与第二图像进行比较,以确定第一图像和第二图像是否基本相同。 在第一和第二图像基本不相同的情况下,该方法包括拒绝对目标的访问。 在第一和第二图像基本相同的情况下,该方法包括确定利用偏振信息,如果第二图像是三维物体。 此外,在第二图像不是三维对象的情况下,该方法包括拒绝对目标的访问,并且在第二图像是三维对象的情况下允许访问目标。

    Polarized Images for Security
    2.
    发明申请
    Polarized Images for Security 审中-公开
    极化图像为安全

    公开(公告)号:US20140247361A1

    公开(公告)日:2014-09-04

    申请号:US14279648

    申请日:2014-05-16

    Applicant: Apple Inc.

    Abstract: One embodiment may take the form of a method for providing security for access to a goal including storing a first image and receiving a second image comprising polarized data. The method also includes comparing the first image with the second image to determine if the first image and the second image are substantially the same. In the event the first and second images are not substantially the same, the method includes denying access to the goal. In the event the first and second images are substantially the same, the method includes determining, utilizing the polarized information, if the second image is of a three-dimensional object. Further, in the event the second image is not of a three-dimensional object, the method includes denying access to the goal and, in the event the second image is of a three-dimensional object, permitting access to the goal.

    Abstract translation: 一个实施例可以采取用于提供访问目标的安全性的方法的形式,包括存储第一图像并接收包括偏振数据的第二图像。 该方法还包括将第一图像与第二图像进行比较,以确定第一图像和第二图像是否基本相同。 在第一和第二图像基本不相同的情况下,该方法包括拒绝对目标的访问。 在第一和第二图像基本相同的情况下,该方法包括确定利用偏振信息,如果第二图像是三维物体。 此外,在第二图像不是三维对象的情况下,该方法包括拒绝对目标的访问,并且在第二图像是三维对象的情况下允许访问目标。

Patent Agency Ranking