摘要:
Systems and methods for biometrically identifying an individual for purchasing a product and/or service without a need for the individual to input authentication data into a system/device are described. Data representative of a scanned iris of a customer desiring to make a purchase may be made. The customer may be identified based upon the scanned iris. A determination may be made as to whether the identified customer desires to make a purchase with an associated payment amount from an entity. A determination may be made as to whether the identified customer has a default purchase at the entity. Information of an account of the customer to make a purchase may be received and funds in the account may be debited by the associated payment amount. An item corresponding with the purchase based upon the scanned iris may be determined.
摘要:
Systems and methods for authorizing an individual for purchasing a product and/or service are described. Monetary funds of a customer of a company may be received into a monetary account of the company at the financial entity. The received monetary funds of the customer may be maintained virtually in a non-monetary account with the non-monetary account value being proportional to the received monetary funds. A determination may be made as to whether an identified customer is authorized to make a purchase with an associated payment amount. The customer may be identified by a scanned iris. Upon determining the identified customer is authorized, the non-monetary account value may be decreased proportional to the associated payment amount.
摘要:
Systems and methods for integrating biometric authentication with video conference sessions are described. An individual seeking to participate in a video conference may first be identified with a biometric parameter such as an iris scan based on a comparison of the scanned iris with a database of stored parameters. If authorized, the system may connect the individual to the video session. In addition, the system may generate dynamic tags that allow the participants to identify and locate individuals in the video conference. For example, if one of the participants is speaking and moving within the room, her tag may change color and move with her on the video screen.
摘要:
Systems and methods for integrating facility access with other security systems are described. An individual seeking access authorization to a facility may be identified with a biometric parameter such as an iris scan. If authorized, the system may allow entry by disabling the alarm system, and a time period for access may be determined based on one or more characteristics associated with the individual. These characteristics may include the functional role of the individual at the facility and/or the location of the facility itself. Moreover, this facility access authorization system may be integrated with a network access authorization system associated with the facility so that when an individual gains access to the facility for a specific time period, the system is also able to determine how long the individual may access its network resources.
摘要:
Systems and methods for integrating facility access with other security systems are described. An individual seeking access authorization to a facility may be identified with a biometric parameter such as an iris scan. If authorized, the system may allow entry by disabling the alarm system, and a time period for access may be determined based on one or more characteristics associated with the individual. These characteristics may include the functional role of the individual at the facility and/or the location of the facility itself. Moreover, this facility access authorization system may be integrated with a network access authorization system associated with the facility so that when an individual gains access to the facility for a specific time period, the system is also able to determine how long the individual may access its network resources.
摘要:
Systems and methods according to the present invention provide a more secure Automated Teller Machine (ATM) transaction by preventing observation of banking customers' Personal Identification Number (PIN). Such systems and methods make it difficult to obtain a customer's PIN by tracking the hand movement of a customer using an ATM. Inputs presented for a customer selection are preferably dynamically displayed in different locations preferably each time the customer is asked to enter a PIN. Dynamically changing the sequence of the display and/or location of the presented inputs reduces the possibility of mapping the hand movement of the customer to the positions of the inputs displayed for a customer selection. Inputs may also be presented at a very narrow viewing angle, thereby making observation of a PIN difficult. Hence, banking customers are preferably provided with a more robust and secured ATM transaction system.
摘要:
A system and method for analyzing news content information is disclosed. In a particular embodiment, the method includes receiving a first electronic data from a first news source, wherein the first electronic data is associated with a particular news event and receiving a second electronic data from a second news source, wherein the second electronic data is associated with the particular news event. The method also includes comparing the first and second electronic data and based on the comparison, assigning a numerical value to at least one of the first and second electronic data. The method further includes based on the numerical value assigned to at least one of the first and second electronic data, generating a third electronic data and transmitting the third electronic data to a user.
摘要:
Real time facial images of individuals transacting accounts held in a bank facility are taken following the grant of authorization to the individual to access the account under the bank's required identification protocol, the real time facial images being matched to recorded facial images of account holders maintained by the bank to further authenticate the transacting individual as having authorized account access.
摘要:
Embodiments of the present invention relate to systems and methods for tracking an item by concealing a tracking device in the item and activating the tracking device when the item is relocated or accessed without authorization. In particular, according to some embodiments, a system is provided for tracking the geographic location of a physical item that is stored in a controlled area and then later removed from the controlled area. An exemplary system comprises: an inner sensor located proximate to a perimeter of the controlled area; an outer sensor located between the perimeter and the inner sensor; and a tracking device associated with the physical item, wherein the tracking device is triggered when the physical item passes by the inner sensor and then the outer sensor.
摘要:
A system and method for electronic mail analysis and processing is disclosed. In one embodiment, the method includes receiving a plurality of electronic mail messages. The method also includes for each of the plurality of electronic mail messages, determining one or more characteristics associated with the respective electronic mail message. Further, the method includes assigning a numerical value to each of the plurality of electronic mail messages based on the determined characteristics and based on the assigned numerical values, selecting one or more of the plurality of electronic mail messages to transmit to a user. The method further includes generating a message based on the selected one or more of the plurality of electronic mail messages and transmitting the generated message to the user.