42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing online non-downloadable data sets representing facial feature data in the field of biometrics; Providing online non-downloadable image or graphic files representing facial feature data in the field of biometrics; Providing online non-downloadable searchable databases featuring facial feature data in the field of biometrics; Providing online non-downloadable software, for analyzing biometrics, which is used to generate a scannable image or graphic which represents face feature data
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable files representing images or graphics representing face feature vector data in the field of biometrics which are capable of being read by a camera or scanner; Electronic databases, in the field of biometrics, representing face feature vector data recorded on computer media; Computer programs for generating images or graphics representing face feature vector data; Downloadable mobile applications for scanning images or graphics representing face feature vector data; Computer programs, stored on a computer media, for generating face feature vector data derived from an image of a person's face
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing online non-downloadable data sets representing facial feature data in the field of biometrics; Providing online non-downloadable image or graphic files representing face feature vector data in the field of biometrics; Providing online non-downloadable searchable databases featuring face feature vector data in the field of biometrics; Providing online non-downloadable software, for analyzing biometrics, which is used to generate a scannable image or graphic which represents face feature data
Systems and methods for enrolling and authenticating a user in an authentication system via a camera of a computing device include capturing and storing biometric information from at least one first image and at least one second image of the user taken via the camera. Prior to use, the user answers personal questions and the answers are stored as stored answer data. Later, such as at a business, the questions are presented to the user and the user provides their personal answers via a computing device. The answers are processed and uploaded to an authentication server where a comparison occurs against the stored answer data. If a match does not occur, then the authentication/identity verification processes ends. If a match does occur, then the authentication process continues. The questions match may serve as a gate function for accessing authentication data stored in a blockchain.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G06V 40/60 - Static or dynamic means for assisting the user to position a body part for biometric acquisition
G06V 40/70 - Multimodal biometrics, e.g. combining information from different biometric modalities
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing face matching, facial detection, liveness evaluation, age estimation, identification evaluation and matching, and facial feature processing software as a service; developing, maintaining and updating software programs for face matching, facial detection, liveness evaluation, age estimation, identification evaluation and matching, and facial feature processing; design and development of computer software in the fields of face matching, liveness evaluation, and facial feature scanning and processing.
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G06V 40/60 - Static or dynamic means for assisting the user to position a body part for biometric acquisition
G06V 40/70 - Multimodal biometrics, e.g. combining information from different biometric modalities
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G06V 40/60 - Static or dynamic means for assisting the user to position a body part for biometric acquisition
G06V 40/70 - Multimodal biometrics, e.g. combining information from different biometric modalities
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable software for face matching, facial detection, liveness evaluation, and facial feature processing based on biometric data for user authentication for security purposes and for face matching, facial detection and facial feature data collection and analysis. (1) Providing face matching, facial detection, liveness evaluation, and facial feature processing software as a service; developing, maintaining and updating software programs for face matching, facial detection, liveness evaluation, and facial feature processing; design and development of computer software in the fields of face matching, liveness evaluation, and facial scanning.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable data sets in the field of facial biometrics and authentication; Downloadable image or graphic files representing face feature vector data in the field of facial biometrics and authentication. Providing online non-downloadable data sets in the field of facial biometrics and authentication; Providing online non-downloadable image or graphic files representing face feature vector data in the field of facial biometrics and authentication; Providing online non-downloadable searchable databases featuring face feature vector data in the field of facial biometrics and authentication; Providing online non-downloadable software for analyzing facial biometrics and authentication data which is used to create a scannable graphic.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable data sets in the field of facial biometrics and authentication; Downloadable image or graphic files representing face feature vector data in the field of facial biometrics and authentication. Providing online non-downloadable data sets in the field of facial biometrics and authentication; Providing online non-downloadable image or graphic files representing face feature vector data in the field of facial biometrics and authentication; Providing online non-downloadable searchable databases featuring face feature vector data in the field of facial biometrics and authentication; Providing online non-downloadable software for analyzing facial biometrics and authentication data which is used to create a scannable graphic.
13.
Display screen or portion thereof with graphical user interface
A node server for autonomously authenticating a user is disclosed that comprises a node database for storing authentication data associated with the user and an authentication SDK configured to perform authentication using data from the node database. The node server also includes a node API for creating and maintaining the node server and for routing payment to a cloud service that is hosting the node server. A communication interface is configured to process communication with a user device, such that the user device is executing software associated with a user account. An access module is configured to permanently and irrevocably prevent access from external servers or devices not associated with a user account, after creation and activation of the node server.
A method for detecting video feed injection during an authentication session comprising initiating an authentication session which utilizes a video feed from a camera, the camera part of a computing device that is used to capture video of a user during the authentication session. Next, activating the camera to obtain a video feed, monitoring for the requested video feed, and receiving a video feed. Detecting a time delay between activating the camera and to receiving the video feed. Comparing the time delay to an expected delay or range of expected delay, and, if the time delay does not match an expected delay or range of expected delay, terminating the authentication session. Optionally providing a notification that the time delay did not match the expected delay, range of expected delay, or both. The number of times this method occurs may be repeated a random number of times.
A method for detecting video feed injection during an authentication session comprising initiating an authentication session which utilizes a video feed from a camera, the camera part of a computing device that is used to capture video of a user during the authentication session. Next, activating the camera to obtain a video feed, monitoring for the requested video feed, and receiving a video feed. Detecting a time delay between activating the camera and to receiving the video feed. Comparing the time delay to an expected delay or range of expected delay, and, if the time delay does not match an expected delay or range of expected delay, terminating the authentication session. Optionally providing a notification that the time delay did not match the expected delay, range of expected delay, or both. The number of times this method occurs may be repeated a random number of times.
A method for detecting video feed injection during an authentication session comprising initiating an authentication session which utilizes a video feed from a camera, the camera part of a computing device that is used to capture video of a user during the authentication session. Next, activating the camera to obtain a video feed, monitoring for the requested video feed, and receiving a video feed. Detecting a time delay between activating the camera and to receiving the video feed. Comparing the time delay to an expected delay or range of expected delay, and, if the time delay does not match an expected delay or range of expected delay, terminating the authentication session. Optionally providing a notification that the time delay did not match the expected delay, range of expected delay, or both. The number of times this method occurs may be repeated a random number of times.
A node server for autonomously authenticating a user is disclosed that comprises a node database for storing authentication data associated with the user and an authentication SDK configured to perform authentication using data from the node database. The node server also includes a node API for creating and maintaining the node server and for routing payment to a cloud service that is hosting the node server. A communication interface is configured to process communication with a user device, such that the user device is executing software associated with a user account. An access module is configured to permanently and irrevocably prevent access from external servers or devices not associated with a user account, after creation and activation of the node server.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G07C 9/00 - Individual registration on entry or exit
A method for generating a digital ID comprising capturing one or more user images of user's face, transmitting the one or more user images or data derived therefrom to a verification server and determining if the one or more images represent a live person. Capturing an ID image of a photo identification for the user and transmitting the ID image to the verification sever. Comparing at least one of the one or more user images or data derived therefrom to the image of the user on the photo identification to determine if user in the one or more user images is the same person as the image on the photo identification. Responsive to a match from the comparing and a determination that a live person was captured in the one or more user images, generating a user digital ID and transmitting the user digital ID to the user.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06K 9/22 - Image acquisition using hand-held instruments
21.
Facial recognition authentication system including path parameters
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software and downloadable electronic data files featuring transformations of biometric data for authentication, security, and transformations of biometric data collection and analysis Providing user authentication services using biometrics-oriented software, transformations of biometric data files, and analytics for electronic commerce transactions and security point access
Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06K 9/22 - Image acquisition using hand-held instruments
25.
METHOD AND APPARATUS FOR CREATION AND USE OF DIGITAL IDENTIFICATION
A method for generating a digital ID comprising capturing one or more user images of user's face, transmitting the one or more user images or data derived therefrom to a verification server and determining if the one or more images represent a live person. Capturing an ID image of a photo identification for the user and transmitting the ID image to the verification sever. Comparing at least one of the one or more user images or data derived therefrom to the image of the user on the photo identification to determine if user in the one or more user images is the same person as the image on the photo identification. Responsive to a match from the comparing and a determination that a live person was captured in the one or more user images, generating a user digital ID and transmitting the user digital ID to the user.
A method for generating a digital ID comprising capturing one or more user images of user's face, transmitting the one or more user images or data derived therefrom to a verification server and determining if the one or more images represent a live person. Capturing an ID image of a photo identification for the user and transmitting the ID image to the verification sever. Comparing at least one of the one or more user images or data derived therefrom to the image of the user on the photo identification to determine if user in the one or more user images is the same person as the image on the photo identification. Responsive to a match from the comparing and a determination that a live person was captured in the one or more user images, generating a user digital ID and transmitting the user digital ID to the user.
A method for generating a digital ID comprising capturing one or more user images of user's face, transmitting the one or more user images or data derived therefrom to a verification server and determining if the one or more images represent a live person. Capturing an ID image of a photo identification for the user and transmitting the ID image to the verification sever. Comparing at least one of the one or more user images or data derived therefrom to the image of the user on the photo identification to determine if user in the one or more user images is the same person as the image on the photo identification. Responsive to a match from the comparing and a determination that a live person was captured in the one or more user images, generating a user digital ID and transmitting the user digital ID to the user.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/40 - Spoof detection, e.g. liveness detection
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
28.
Method to verify identity using a previously collected biometric image/data
A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G07C 9/00 - Individual registration on entry or exit
Systems and methods for enrolling and authenticating a user in an authentication system via a camera of a computing device include capturing and storing biometric information from at least one first image and at least one second image of the user taken via the camera. Prior to use, the user answers personal questions and the answers are stored as stored answer data. Later, such as at a business, the questions are presented to the user and the user provides their personal answers via a computing device. The answers are processed and uploaded to an authentication server where a comparison occurs against the stored answer data. If a match does not occur, then the authentication/identity verification processes ends. If a match does occur, then the authentication process continues. The questions match may serve as a gate function for accessing authentication data stored in a blockchain.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G06V 40/60 - Static or dynamic means for assisting the user to position a body part for biometric acquisition
G06V 40/70 - Multimodal biometrics, e.g. combining information from different biometric modalities
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G06V 40/60 - Static or dynamic means for assisting the user to position a body part for biometric acquisition
G06V 40/70 - Multimodal biometrics, e.g. combining information from different biometric modalities
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable software and downloadable electronic biometric data files and storage for user authentication for security purposes and for biometric data collection and analysis Providing user authentication services using biometric software and data files; providing online non-downloadable software for user authentication for security purposes and for biometric data collection and analysis
33.
Facial recognition authentication system including path parameters
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
A method for generating a digital ID comprising capturing one or more user images of user's face, transmitting the one or more user images or data derived therefrom to a verification server and determining if the one or more images represent a live person. Capturing an ID image of a photo identification for the user and transmitting the ID image to the verification sever. Comparing at least one of the one or more user images or data derived therefrom to the image of the user on the photo identification to determine if user in the one or more user images is the same person as the image on the photo identification. Responsive to a match from the comparing and a determination that a live person was captured in the one or more user images, generating a user digital ID and transmitting the user digital ID to the user.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06K 9/22 - Image acquisition using hand-held instruments
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
Systems and methods for enrolling and authenticating a user in an authentication system via a camera of a computing device include capturing and storing biometric information from at least one first image and at least one second image of the user taken via the camera. Prior to use, the user answers personal questions and the answers are stored as stored answer data. Later, such as at a business, the questions are presented to the user and the user provides their personal answers via a computing device. The answers are processed and uploaded to an authentication server where a comparison occurs against the stored answer data. If a match does not occur, then the authentication/identity verification processes ends. If a match does occur, then the authentication process continues. The questions match may serve as a gate function for accessing authentication data stored in a blockchain.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06K 9/22 - Image acquisition using hand-held instruments
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G07C 9/00 - Individual registration on entry or exit
H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06K 9/22 - Image acquisition using hand-held instruments
H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06K 9/22 - Image acquisition using hand-held instruments
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06K 9/22 - Image acquisition using hand-held instruments
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
41.
Facial recognition authentication system including path parameters
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
42.
Display screen or portion thereof with graphical user interface
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer application software for mobile phones,
smartphones, portable media players, handheld computers, and
tablets, namely, security software that allows users to
secure and access their mobile devices through
multi-dimensional facial recognition identification.
45.
Display screen or portion thereof with graphical user interface
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing and storing enrollment biometric information from at least one first image of the user taken via the camera of the mobile device, capturing authentication biometric information from at least one second image of the user, capturing, during imaging of the at least one second image, path parameters via at least one movement detecting sensor indicating an authentication movement of the mobile device, comparing the authentication biometric information to the stored enrollment biometric information, and comparing the authentication movement of the mobile device to an expected movement of the mobile device to determine whether the authentication movement sufficiently corresponds to the expected movement.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06K 9/22 - Image acquisition using hand-held instruments
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer application software for mobile phones, smartphones, portable media players, handheld computers, and tablets, namely, security software that allows users to secure and access their mobile devices through multi-dimensional facial recognition identification