TWO-DIMENSIONAL ARRAY OF CMOS CONTROL ELEMENTS

    公开(公告)号:US20190247887A1

    公开(公告)日:2019-08-15

    申请号:US16395045

    申请日:2019-04-25

    申请人: InvenSense, Inc.

    IPC分类号: B06B1/06 G06K9/00 G06F3/0354

    摘要: An electronic device includes a plurality of CMOS control elements arranged in a two-dimensional array, where each CMOS control element of the plurality of CMOS control elements includes two semiconductor devices. The plurality of CMOS control elements include a first subset of CMOS control elements, each CMOS control element of the first subset of CMOS control elements including a semiconductor device of a first class and a semiconductor device of a second class, and a second subset of CMOS control elements, each CMOS control element of the second subset of CMOS control elements including a semiconductor device of the first class and a semiconductor device of a third class. The plurality of CMOS control elements are arranged in the two-dimensional array such that CMOS semiconductor devices of the first class are only adjacent to other CMOS semiconductor devices of the first class, CMOS semiconductor devices of the second class are only adjacent to other CMOS semiconductor devices of the second class, and CMOS semiconductor devices of the third class are only adjacent to other CMOS semiconductor devices of the third class.

    Identity Proxy for Access Control Systems
    4.
    发明申请

    公开(公告)号:US20190236257A1

    公开(公告)日:2019-08-01

    申请号:US16378306

    申请日:2019-04-08

    申请人: Apple Inc.

    摘要: A hardware security token in contact with a user's body can send a signal via interbody communication to one or more electronic devices associated with a system of electronic devices having unified access controls such that a user can access each of the electronic devices using the same credentials. The signal sent by the hardware security token can be deputized by a user in possession of credentials to the system as a temporary proxy for that user's identity. In other examples, the signal sent by the portable security token can be deputized by a user in possession of credentials to the system as a temporary proxy for another user's identity. In some embodiments, the proxy can expire after a period of time or after a particular event occurs.

    SYSTEMS AND METHODS FOR SPOOF DETECTION BASED ON LOCAL BINARY PATTERNS

    公开(公告)号:US20190197280A1

    公开(公告)日:2019-06-27

    申请号:US16286974

    申请日:2019-02-27

    发明人: Anthony P. Russo

    摘要: Disclosed are systems and methods for performing spoof detection. The method includes: receiving, by a processor from a biometric sensor, an input image of a biometric; analyzing the input image to identify pixels associated with a first feature in the input image; performing a local binary pattern (LBP) analysis on the pixels associated with the first feature, which comprises computing, for a given pixel associated with the first feature, an LBP value corresponding to texture of one or more neighboring pixels around the given pixel, wherein the neighboring pixels around the given pixel comprise eight pixels around the given pixel, including pixels on a top, a bottom, a left, a right, and at four corners of a location of the given pixel; and, determining whether the input image is a replica of the biometric based on results of performing the LBP analysis on the pixels associated with the first feature.

    CORRECTING A FINGERPRINT IMAGE
    8.
    发明申请

    公开(公告)号:US20190188442A1

    公开(公告)日:2019-06-20

    申请号:US16270516

    申请日:2019-02-07

    申请人: InvenSense, Inc.

    IPC分类号: G06K9/00 G06T7/00 G06T5/00

    摘要: In a method for correcting a fingerprint image, it is determined whether an object is interacting with the fingerprint sensor. Provided an object is not interacting with the fingerprint sensor, it is determined whether to capture a darkfield candidate image at the fingerprint sensor, wherein the darkfield candidate image is an image absent an object interacting with the fingerprint sensor. Responsive to making a determination to capture the darkfield candidate image, the darkfield candidate image is captured at the fingerprint sensor. Provided an object is interacting with the fingerprint sensor, it is determined whether to model a darkfield candidate image at the fingerprint sensor. Responsive to making a determination to model the darkfield candidate image, the darkfield candidate image is modeled at the fingerprint sensor. A darkfield estimate is updated with the darkfield candidate image. A fingerprint image is captured at the fingerprint sensor. The fingerprint image is corrected using the darkfield estimate.