BIOMETRIC AUTHENTICATION TECHNIQUES

Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from laser...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: POKRASS, Jonathan, VASU, Pavan Kumar Anasosalu, KAITZ, Tal, KOSTKA, Petr, YOUNGS, Lynn, HAUCK, Jerrold V, WALDON, Matthew C, MENSCH, Thomas P, ZELEZNIK, Chris, LAIFENFELD, Moshe, MALONE, Michael, KOLIN, Andrei, PRAKASH, Deepti Sunder, LITTWIN, Gideon, GERNOTH, Thorsten, HIRSH, Eitan, LITTWIN, Etai, SHARMA, Anup K, BALLARD, Lucia E, KRSTIC, Ivan, KUCEROVA, Lucie, HOTELLING, Steve, HENDEL, Ziv, TANG, Feng
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator POKRASS, Jonathan
VASU, Pavan Kumar Anasosalu
KAITZ, Tal
KOSTKA, Petr
YOUNGS, Lynn
HAUCK, Jerrold V
WALDON, Matthew C
MENSCH, Thomas P
ZELEZNIK, Chris
LAIFENFELD, Moshe
MALONE, Michael
KOLIN, Andrei
PRAKASH, Deepti Sunder
LITTWIN, Gideon
GERNOTH, Thorsten
HIRSH, Eitan
LITTWIN, Etai
SHARMA, Anup K
BALLARD, Lucia E
KRSTIC, Ivan
KUCEROVA, Lucie
HOTELLING, Steve
HENDEL, Ziv
TANG, Feng
description Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3662411B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3662411B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3662411B13</originalsourceid><addsrcrecordid>eNrjZFB28vT3dQ0J8nRWcAwN8XD1C_F0dgzx9PdTCHF19vDzDAx1DeZhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGuAcZmZkYmhoZOhsZEKAEANdkimQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>BIOMETRIC AUTHENTICATION TECHNIQUES</title><source>esp@cenet</source><creator>POKRASS, Jonathan ; VASU, Pavan Kumar Anasosalu ; KAITZ, Tal ; KOSTKA, Petr ; YOUNGS, Lynn ; HAUCK, Jerrold V ; WALDON, Matthew C ; MENSCH, Thomas P ; ZELEZNIK, Chris ; LAIFENFELD, Moshe ; MALONE, Michael ; KOLIN, Andrei ; PRAKASH, Deepti Sunder ; LITTWIN, Gideon ; GERNOTH, Thorsten ; HIRSH, Eitan ; LITTWIN, Etai ; SHARMA, Anup K ; BALLARD, Lucia E ; KRSTIC, Ivan ; KUCEROVA, Lucie ; HOTELLING, Steve ; HENDEL, Ziv ; TANG, Feng</creator><creatorcontrib>POKRASS, Jonathan ; VASU, Pavan Kumar Anasosalu ; KAITZ, Tal ; KOSTKA, Petr ; YOUNGS, Lynn ; HAUCK, Jerrold V ; WALDON, Matthew C ; MENSCH, Thomas P ; ZELEZNIK, Chris ; LAIFENFELD, Moshe ; MALONE, Michael ; KOLIN, Andrei ; PRAKASH, Deepti Sunder ; LITTWIN, Gideon ; GERNOTH, Thorsten ; HIRSH, Eitan ; LITTWIN, Etai ; SHARMA, Anup K ; BALLARD, Lucia E ; KRSTIC, Ivan ; KUCEROVA, Lucie ; HOTELLING, Steve ; HENDEL, Ziv ; TANG, Feng</creatorcontrib><description>Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; PHYSICS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20241009&amp;DB=EPODOC&amp;CC=EP&amp;NR=3662411B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20241009&amp;DB=EPODOC&amp;CC=EP&amp;NR=3662411B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>POKRASS, Jonathan</creatorcontrib><creatorcontrib>VASU, Pavan Kumar Anasosalu</creatorcontrib><creatorcontrib>KAITZ, Tal</creatorcontrib><creatorcontrib>KOSTKA, Petr</creatorcontrib><creatorcontrib>YOUNGS, Lynn</creatorcontrib><creatorcontrib>HAUCK, Jerrold V</creatorcontrib><creatorcontrib>WALDON, Matthew C</creatorcontrib><creatorcontrib>MENSCH, Thomas P</creatorcontrib><creatorcontrib>ZELEZNIK, Chris</creatorcontrib><creatorcontrib>LAIFENFELD, Moshe</creatorcontrib><creatorcontrib>MALONE, Michael</creatorcontrib><creatorcontrib>KOLIN, Andrei</creatorcontrib><creatorcontrib>PRAKASH, Deepti Sunder</creatorcontrib><creatorcontrib>LITTWIN, Gideon</creatorcontrib><creatorcontrib>GERNOTH, Thorsten</creatorcontrib><creatorcontrib>HIRSH, Eitan</creatorcontrib><creatorcontrib>LITTWIN, Etai</creatorcontrib><creatorcontrib>SHARMA, Anup K</creatorcontrib><creatorcontrib>BALLARD, Lucia E</creatorcontrib><creatorcontrib>KRSTIC, Ivan</creatorcontrib><creatorcontrib>KUCEROVA, Lucie</creatorcontrib><creatorcontrib>HOTELLING, Steve</creatorcontrib><creatorcontrib>HENDEL, Ziv</creatorcontrib><creatorcontrib>TANG, Feng</creatorcontrib><title>BIOMETRIC AUTHENTICATION TECHNIQUES</title><description>Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFB28vT3dQ0J8nRWcAwN8XD1C_F0dgzx9PdTCHF19vDzDAx1DeZhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGuAcZmZkYmhoZOhsZEKAEANdkimQ</recordid><startdate>20241009</startdate><enddate>20241009</enddate><creator>POKRASS, Jonathan</creator><creator>VASU, Pavan Kumar Anasosalu</creator><creator>KAITZ, Tal</creator><creator>KOSTKA, Petr</creator><creator>YOUNGS, Lynn</creator><creator>HAUCK, Jerrold V</creator><creator>WALDON, Matthew C</creator><creator>MENSCH, Thomas P</creator><creator>ZELEZNIK, Chris</creator><creator>LAIFENFELD, Moshe</creator><creator>MALONE, Michael</creator><creator>KOLIN, Andrei</creator><creator>PRAKASH, Deepti Sunder</creator><creator>LITTWIN, Gideon</creator><creator>GERNOTH, Thorsten</creator><creator>HIRSH, Eitan</creator><creator>LITTWIN, Etai</creator><creator>SHARMA, Anup K</creator><creator>BALLARD, Lucia E</creator><creator>KRSTIC, Ivan</creator><creator>KUCEROVA, Lucie</creator><creator>HOTELLING, Steve</creator><creator>HENDEL, Ziv</creator><creator>TANG, Feng</creator><scope>EVB</scope></search><sort><creationdate>20241009</creationdate><title>BIOMETRIC AUTHENTICATION TECHNIQUES</title><author>POKRASS, Jonathan ; VASU, Pavan Kumar Anasosalu ; KAITZ, Tal ; KOSTKA, Petr ; YOUNGS, Lynn ; HAUCK, Jerrold V ; WALDON, Matthew C ; MENSCH, Thomas P ; ZELEZNIK, Chris ; LAIFENFELD, Moshe ; MALONE, Michael ; KOLIN, Andrei ; PRAKASH, Deepti Sunder ; LITTWIN, Gideon ; GERNOTH, Thorsten ; HIRSH, Eitan ; LITTWIN, Etai ; SHARMA, Anup K ; BALLARD, Lucia E ; KRSTIC, Ivan ; KUCEROVA, Lucie ; HOTELLING, Steve ; HENDEL, Ziv ; TANG, Feng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3662411B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>POKRASS, Jonathan</creatorcontrib><creatorcontrib>VASU, Pavan Kumar Anasosalu</creatorcontrib><creatorcontrib>KAITZ, Tal</creatorcontrib><creatorcontrib>KOSTKA, Petr</creatorcontrib><creatorcontrib>YOUNGS, Lynn</creatorcontrib><creatorcontrib>HAUCK, Jerrold V</creatorcontrib><creatorcontrib>WALDON, Matthew C</creatorcontrib><creatorcontrib>MENSCH, Thomas P</creatorcontrib><creatorcontrib>ZELEZNIK, Chris</creatorcontrib><creatorcontrib>LAIFENFELD, Moshe</creatorcontrib><creatorcontrib>MALONE, Michael</creatorcontrib><creatorcontrib>KOLIN, Andrei</creatorcontrib><creatorcontrib>PRAKASH, Deepti Sunder</creatorcontrib><creatorcontrib>LITTWIN, Gideon</creatorcontrib><creatorcontrib>GERNOTH, Thorsten</creatorcontrib><creatorcontrib>HIRSH, Eitan</creatorcontrib><creatorcontrib>LITTWIN, Etai</creatorcontrib><creatorcontrib>SHARMA, Anup K</creatorcontrib><creatorcontrib>BALLARD, Lucia E</creatorcontrib><creatorcontrib>KRSTIC, Ivan</creatorcontrib><creatorcontrib>KUCEROVA, Lucie</creatorcontrib><creatorcontrib>HOTELLING, Steve</creatorcontrib><creatorcontrib>HENDEL, Ziv</creatorcontrib><creatorcontrib>TANG, Feng</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>POKRASS, Jonathan</au><au>VASU, Pavan Kumar Anasosalu</au><au>KAITZ, Tal</au><au>KOSTKA, Petr</au><au>YOUNGS, Lynn</au><au>HAUCK, Jerrold V</au><au>WALDON, Matthew C</au><au>MENSCH, Thomas P</au><au>ZELEZNIK, Chris</au><au>LAIFENFELD, Moshe</au><au>MALONE, Michael</au><au>KOLIN, Andrei</au><au>PRAKASH, Deepti Sunder</au><au>LITTWIN, Gideon</au><au>GERNOTH, Thorsten</au><au>HIRSH, Eitan</au><au>LITTWIN, Etai</au><au>SHARMA, Anup K</au><au>BALLARD, Lucia E</au><au>KRSTIC, Ivan</au><au>KUCEROVA, Lucie</au><au>HOTELLING, Steve</au><au>HENDEL, Ziv</au><au>TANG, Feng</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>BIOMETRIC AUTHENTICATION TECHNIQUES</title><date>2024-10-09</date><risdate>2024</risdate><abstract>Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3662411B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
PHYSICS
title BIOMETRIC AUTHENTICATION TECHNIQUES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T20%3A55%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=POKRASS,%20Jonathan&rft.date=2024-10-09&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3662411B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true