-
公开(公告)号:US20250053759A1
公开(公告)日:2025-02-13
申请号:US18912469
申请日:2024-10-10
Applicant: Yoti Holding Limited
Inventor: Francisco Angel Garcia Rodriguez , Piers Powlesland , Paolo Greci , Laurence Withers , Eleanor Simone Frederika Loughlin-McHugh , Roman Edward Szczesniak
IPC: G06K7/10 , G06F21/34 , G06Q20/36 , G06Q20/38 , G06Q40/00 , G06Q50/26 , H04L9/08 , H04L9/32 , H04L9/40 , H04W12/06
Abstract: A method of a digital identity system generating a sharing token for authenticating a bearer to a validator, wherein a data store of the digital identity system holds a plurality of attributes of the bearer, the method comprising implementing by the digital identity system the following steps: receiving at the digital identity system from a bearer an electronic sharing token request, wherein the token request identifies at least one of the bearer's attributes in the data store selected for sharing with a validator; in response to the electronic token request, generating a sharing token, which is unique to that request, for presentation by the bearer to a validator; associating with the unique sharing token at the digital identity system the identified at least one bearer attribute; and issuing to the bearer the unique sharing token; and wherein later presentation of the unique sharing token to the digital identify system by a validator causes the at least one bearer attribute associated with the sharing token to be rendered available to the validator by the digital identity system.
-
公开(公告)号:US12223029B2
公开(公告)日:2025-02-11
申请号:US17647796
申请日:2022-01-12
Applicant: Dell Products, L.P.
Inventor: Nicholas D. Grobelny , Charles D. Robison
Abstract: Systems and methods support transferring control of a workspace that operates on an Information Handling System (IHS). An authorization policy is established on the IHS that is modifiable only by an arbiter of a remote orchestration service. The authorization policy specifies authorized administrators of the workspace. The authorization policy is modified to specify the arbiter and a first remote orchestrator as authorized administrators of the workspace. Administration of the workspace by the first orchestrator is allowed based on credentials that validate it as an authorized administrator specified by the policy. A notification is received of a transfer of orchestration of the workspace to a second remote orchestrator. The authorization policy is modified to specify the arbiter and the second orchestrator as authorized administrators of the workspace. Administration of the workspace by the second orchestrator is allowed based on credentials that validate it as an authorized administrator specified by the policy.
-
公开(公告)号:US20250045370A1
公开(公告)日:2025-02-06
申请号:US18920106
申请日:2024-10-18
Applicant: FaceTec, Inc.
Inventor: Kevin Alan Tussy
IPC: G06F21/32 , G06F21/34 , G06Q20/32 , G06Q20/40 , G06V10/10 , G06V40/16 , G06V40/20 , G06V40/50 , G06V40/60 , G06V40/70 , H04L9/40 , H04W12/06 , H04W12/065 , H04W12/65 , H04W12/68 , H04W88/02
Abstract: Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
-
公开(公告)号:US12210610B2
公开(公告)日:2025-01-28
申请号:US17846281
申请日:2022-06-22
Applicant: LEXMARK INTERNATIONAL, INC.
Inventor: James Howard Ellis, Jr. , Timothy John Rademacher
Abstract: A method for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
-
公开(公告)号:US12174933B2
公开(公告)日:2024-12-24
申请号:US17944897
申请日:2022-09-14
Applicant: MK GROUP JSC
Inventor: Khang Trong Nguyen
Abstract: A method for accessing secured data stored in an eID card using combined MoC and MRZ technology is provided. The eID card receives from a card reader an extracted biological feature that is obtained by a biometric device extracting a biological feature of a user. When the extracted biological feature matches a pre-stored biometric template, the eID card permits the card reader to acquire a digital access code stored therein the content of which is identical to a printed MRZ code on the eID card. Upon receipt of the digital access code, the card reader establishes secured communication with the eID card to access the secured data that is stored in the eID card.
-
公开(公告)号:US12174931B2
公开(公告)日:2024-12-24
申请号:US16949032
申请日:2020-10-09
Applicant: GOOGLE LLC
Inventor: Brett Barros , Alexander James Faaborg
Abstract: A head-mounted device (HMD) may be used to determine an access request for accessing a device. An identifier identifying the device may be received at the HMD and from the device. By verifying receipt of the identifier at the HMD, and that access rights associated with the HMD enable granting of the access request, the access request may be granted.
-
公开(公告)号:US20240411849A1
公开(公告)日:2024-12-12
申请号:US18733505
申请日:2024-06-04
Applicant: The Government of the United States of America, as represented by the Secretary of Homeland Security
Inventor: William Hastings
Abstract: Aspects of the present invention relate to machines, systems, and methods for using a zero knowledge hash function to verify validity of an ID. Certain configurations may provide machines, systems, and method for proving the ID is genuine, the information on the ID is correct, and the user presenting the ID is the same as the user in the ID. Some configurations may store a hash based on a one-way function of a data string created from information on the ID in a hashed data string database. Certain variations of the invention may query the database to verify the hashed data string exists in the database. Based on the response of the database to the query, a card authenticator may be configured to send a control transmission to an access control device to cause the access control device change from a first state to a second state.
-
公开(公告)号:US12158935B2
公开(公告)日:2024-12-03
申请号:US18091058
申请日:2022-12-29
Applicant: NEC Corporation
Inventor: Takehiro Ichikawa
Abstract: A facial authentication apparatus comprises: a camera arranged at a position capable of facing an authentication object person and captures a face image of the authentication object person; a display arranged below the camera and displays the face image captured by the camera; a card reader arranged below the display and on a front side as seen from the authentication object person, and reads a card presented by the authentication object person; and a wall member(s) arranged so as to extend to at least a front end portion of the card reader from an upper end portion of the display.
-
公开(公告)号:US12147522B2
公开(公告)日:2024-11-19
申请号:US17530130
申请日:2021-11-18
Applicant: Capital One Services, LLC
Inventor: Lin Ni Lisa Cheng , Asher Smith-Rose , Tyler Maiman , Shabnam Kousha , Joshua Edwards
Abstract: Systems, methods, and non-transitory computer readable medium disclosed herein relate to identity verification and authorization method. In one embodiment, the system can generate and send a message to a device associated with a user based on an initiated request from the user and a determination the user should be authenticated, wherein the message requests a content-based response from the user to authenticate the user. In another embodiment, the system can receive the content-based response from the user in reply to the message, wherein the content-based response comprises SMS (short message service) metadata, emoji, photo, video, audio, or a combination thereof. In another embodiment, the system can authenticate the user based on a determination of a confirmed match between the content-based response from the user and a response key preselected by the user.
-
公开(公告)号:US20240370547A1
公开(公告)日:2024-11-07
申请号:US18400545
申请日:2023-12-29
Applicant: STMicroelectronics International N.V.
Inventor: Frederic GOUABAU , Frederic PIQUET
Abstract: According to one aspect, a method for recording biometric data of a holder on a card including a microcontroller configured to communicate via a secure communication channel with a remote server comprising an account linked to the card holder, the method comprising: authenticating the holder on an application of a device configured to communicate with said server and said card, then authenticating the server by the card via the secure communication channel by means of the application of said device, then recording the biometric data of the holder by a fingerprint reader of the card controlled by the microcontroller of the card if the server is authenticated by the card.
-
-
-
-
-
-
-
-
-