-
公开(公告)号:US20250095406A1
公开(公告)日:2025-03-20
申请号:US18970431
申请日:2024-12-05
Applicant: Google LLC
Inventor: Cem Kemal Hamami , Philip Andrew Mansfield , Samuel Paradis , Michael Williams , Wen-Sheng Chu
IPC: G06V40/50 , G06V10/762 , G06V40/16
Abstract: This document describes systems and techniques that enable continuous personalization of face authentication. In aspects, an authentication system associated with a network includes an authentication manager. The authentication manager receives an embedding representing image data associated with a user's face. The authentication manager generates a confidence score based on the embedding. Further, the authentication manager updates previously enrolled embeddings with the embedding based on the confidence score, the embedding meeting a clustering confidence threshold. Through such a technique, the authentication manager can alter the previously enrolled embeddings by which a future embedding is used to authenticate the user's face. By so doing, the techniques may provide more-accurate and successful user authentication over time.
-
公开(公告)号:US12183117B2
公开(公告)日:2024-12-31
申请号:US17433912
申请日:2019-04-03
Applicant: Google LLC
Inventor: Cem Kemal Hamami , Joseph Edwin Johnson, Jr. , Kuntal Sengupta , Piotr Kulaga , Wen-Sheng Chu , Zachary Iqbal
Abstract: A method includes receiving data indicative of an image of a face of an unknown user of the computing device while the computing device is in a reduced access mode locked state. The method also includes determining whether the unknown user is the known user by at least comparing the image of the face of the unknown user to one or more images of a plurality of images of a face of a known user of the computing device. The method further includes setting the computing device to an increased access mode in response to determining that the unknown user is the known user.
-
公开(公告)号:US20220139109A1
公开(公告)日:2022-05-05
申请号:US17433912
申请日:2019-04-03
Applicant: Google LLC
Inventor: Cem Kemal Hamami , Joseph Edwin Johnson, Jr. , Kuntal Sengupta , Piotr Kulaga , Wen-Sheng Chu , Zachary Iqbal
Abstract: A method includes receiving data indicative of an image of a face of an unknown user of the computing device while the computing device is in a reduced access mode locked state. The method also includes determining whether the unknown user is the known user by at least comparing the image of the face of the unknown user to one or more images of a plurality of images of a face of a known user of the computing device. The method further includes setting the computing device to an increased access mode in response to determining that the unknown user is the known user.
-
-