摘要:
Embodiments of the present invention relate to systems and methods for tracking an item by concealing a tracking device in the item and activating the tracking device when the item is relocated or accessed without authorization. In particular, according to some embodiments, a system is provided for tracking the geographic location of a physical item that is stored in a controlled area and then later removed from the controlled area. An exemplary system comprises: an inner sensor located proximate to a perimeter of the controlled area; an outer sensor located between the perimeter and the inner sensor; and a tracking device associated with the physical item, wherein the tracking device is triggered when the physical item passes by the inner sensor and then the outer sensor.
摘要:
Embodiments of the present invention relate to systems and methods for authenticating the identity of an authorized custodian of a physical item and activating a tracking device concealed in the physical item in the event the item is removed from a controlled area or accessed by an unauthorized individual. In particular, according to some embodiments, the identity of an authorized custodian of a physical item stored in a controlled area is authenticated by: recording an image of an iris of the authorized custodian in a database; capturing an image of an iris of an individual attempting to remove the physical item from the controlled area; and verifying, prior to allowing removal of the physical item, that the captured image of the iris of the individual attempting to the physical item matches the recorded image of the iris of the authorized custodian.
摘要:
Embodiments of the invention relate to systems, methods, and computer program products for authenticating the identity of an authorized custodian of a dependent individual visiting a facility. In particular, the identity of an authorized custodian of a dependent individual visiting a facility is authenticated by: recording an image of an iris of the authorized custodian in a database; capturing an image of an iris of an individual attempting to accompany the dependent individual when the dependent individual exits the facility; and verifying, prior to allowing the dependent individual to exit the facility, that the captured image of the iris of the individual attempting to accompany the dependent individual matches the recorded image of the iris of the authorized custodian.
摘要:
Systems and methods according to the present invention provide a more secure Automated Teller Machine (ATM) transaction by preventing observation of banking customers' Personal Identification Number (PIN). Such systems and methods make it difficult to obtain a customer's PIN by tracking the hand movement of a customer using an ATM. Inputs presented for a customer selection are preferably dynamically displayed in different locations preferably each time the customer is asked to enter a PIN. Dynamically changing the sequence of the display and/or location of the presented inputs reduces the possibility of mapping the hand movement of the customer to the positions of the inputs displayed for a customer selection. Inputs may also be presented at a very narrow viewing angle, thereby making observation of a PIN difficult. Hence, banking customers are preferably provided with a more robust and secured ATM transaction system.
摘要:
Systems and methods for integrating biometric authentication with video conference sessions are described. An individual seeking to participate in a video conference may first be identified with a biometric parameter such as an iris scan based on a comparison of the scanned iris with a database of stored parameters. If authorized, the system may connect the individual to the video session. In addition, the system may generate dynamic tags that allow the participants to identify and locate individuals in the video conference. For example, if one of the participants is speaking and moving within the room, her tag may change color and move with her on the video screen.
摘要:
A system and method for analyzing news content information is disclosed. In a particular embodiment, the method includes receiving a first electronic data from a first news source, wherein the first electronic data is associated with a particular news event and receiving a second electronic data from a second news source, wherein the second electronic data is associated with the particular news event. The method also includes comparing the first and second electronic data and based on the comparison, assigning a numerical value to at least one of the first and second electronic data. The method further includes based on the numerical value assigned to at least one of the first and second electronic data, generating a third electronic data and transmitting the third electronic data to a user.
摘要:
Real time facial images of individuals transacting accounts held in a bank facility are taken following the grant of authorization to the individual to access the account under the bank's required identification protocol, the real time facial images being matched to recorded facial images of account holders maintained by the bank to further authenticate the transacting individual as having authorized account access.
摘要:
A system and method for electronic mail analysis and processing is disclosed. In one embodiment, the method includes receiving a plurality of electronic mail messages. The method also includes for each of the plurality of electronic mail messages, determining one or more characteristics associated with the respective electronic mail message. Further, the method includes assigning a numerical value to each of the plurality of electronic mail messages based on the determined characteristics and based on the assigned numerical values, selecting one or more of the plurality of electronic mail messages to transmit to a user. The method further includes generating a message based on the selected one or more of the plurality of electronic mail messages and transmitting the generated message to the user.
摘要:
Systems and methods for biometrically identifying an individual for purchasing a product and/or service without a need for the individual to input authentication data into a system/device are described. Data representative of a scanned iris of a customer desiring to make a purchase may be made. The customer may be identified based upon the scanned iris. A determination may be made as to whether the identified customer desires to make a purchase with an associated payment amount from an entity. A determination may be made as to whether the identified customer has a default purchase at the entity. Information of an account of the customer to make a purchase may be received and funds in the account may be debited by the associated payment amount. An item corresponding with the purchase based upon the scanned iris may be determined.
摘要:
Real time facial images of individuals transacting accounts held in a bank facility are taken following the grant of authorization to the individual to access the account under the bank's required identification protocol, the real time facial images being matched to recorded facial images of account holders maintained by the bank to further authenticate the transacting individual as having authorized account access.