A physical camera provenance scoring system issues challenges to a source of video imagery that purports to include a physical camera. The challenges may include requests for camera metadata, requests to change camera parameters, requests to deploy specific camera capabilities, and requests for video imagery. The challenges are designed to elicit responses that can be used to determine a likelihood score that video imagery was captured by a physical camera as opposed to a virtual camera being deployed in an injection attack. The responses may be input to a machine classifier trained on imagery of known provenance to generate the likelihood score. The score may depend on the consistency of responsive camera metadata with received imagery, the behavior and end state of the video source in response to sequences of challenges, the ability of the video source to execute challenges, and the timing and computational load associated with challenge execution.
G06V 10/776 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source Évaluation des performances
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p.ex. des objets vidéo
G06V 10/94 - Architectures logicielles ou matérielles spécialement adaptées à la compréhension d’images ou de vidéos
Methods of verifying a genuine presence and identity of a user of a mobile device include analyzing a stream of data from sensors of the mobile device over a period spanning a user press of a button displayed on a touch screen of the device. Results of the analysis are used to distinguish a genuine user button press from a simulated event generated by device emulation software or other simulation tool. The presence and identity verification are determined in part by the results of the sensor stream analysis, optionally in conjunction with an analysis of biometric data captured by the mobile device when the press of a button on the device touch screen has been elicited. The biometric data may include capture of imagery of a user face or body part by a camera of the mobile device.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
H04W 12/30 - Sécurité des dispositifs mobiles; Sécurité des applications mobiles
Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
H04W 12/30 - Sécurité des dispositifs mobiles; Sécurité des applications mobiles
G07C 9/26 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix utilisant un capteur biométrique intégré au laissez-passer
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software; downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons. Software as a service; software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
H04W 12/30 - Sécurité des dispositifs mobiles; Sécurité des applications mobiles
G07C 9/26 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix utilisant un capteur biométrique intégré au laissez-passer
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons. Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons. Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments.
13.
Document authentication by attitude-independent determination of surface appearance using controlled illumination
A user is guided to move a device equipped with an illuminator and a camera with respect to a document whose genuineness is to be assessed. The motion includes changing the distance between the device and the document by moving the device or moving the document. Imagery of the document is captured during the movement and analyzed to determine a likelihood that the document includes features indicative of genuineness, such as a hologram, an original photograph, and other regions matching those of a genuine document. The analysis may include identifying regions exhibiting large changes in appearance over relatively small distance changes which characterize holograms, and obtaining the spatial extent of document features.
G06T 7/77 - Détermination de la position ou de l'orientation des objets ou des caméras utilisant des procédés statistiques
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G07D 7/00 - Vérification spécialement adaptée à la détermination de l’identité ou de l’authenticité de papiers de valeur ou pour discriminer ceux qui sont inacceptables, p.ex. qui ne correspondent pas à une monnaie
G07D 7/17 - Appareil caractérisé par le moyen de positionnement ou par un moyen sensible au positionnement
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for biometric systems for computer user authentication and verification of persons; recorded computer software for biometric systems for computer user authentication and verification of persons Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Software as a service (SAAS) services featuring software for the authentication and verification of persons for the purpose of controlling digital and physical access to secure networks, facilities and environments; computerized identity authentication services for the purpose of controlling digital and physical access to secure networks, facilities and environments
Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
H04W 12/30 - Sécurité des dispositifs mobiles; Sécurité des applications mobiles
G07C 9/26 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix utilisant un capteur biométrique intégré au laissez-passer
Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.
Methods for authenticating a genuine presence of a human involve directing one or more modulated probes towards a body part of the human, receiving a response to the probes from the body part, and analyzing the response to determine whether it contains spectral characteristics that match a class of responses to such probes for the human body part in a human population. Replay attacks are countered by varying the modulation of the probe temporally, spatially, and spectrally each time authentication is performed. The probes may include electromagnetic radiation, acoustic beams, or particle beams that generate a detected reflection, absorption pattern, scintillation, or fluorescence response of the body part. The analysis of the response may be directed to one or more of temporal, spatial, and spectral variations in accordance with the nature of the probes and the modulation.
G07C 9/37 - Enregistrement de l’entrée ou de la sortie d'une entité isolée ne comportant pas l’utilisation d’un laissez-passer combiné à une vérification d’identité utilisant des données biométriques, p.ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
H04W 12/30 - Sécurité des dispositifs mobiles; Sécurité des applications mobiles
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
21.
Online pseudonym verification and identity validation
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04N 5/33 - Transformation des rayonnements infrarouges
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
22.
Online pseudonym verification and identity validation
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06K 9/46 - Extraction d'éléments ou de caractéristiques de l'image
Systems, methods, and computer program products provide near real-time feedback to a user of a camera-enabled device to guide the user to capture self-imagery when the user is in a desired position with respect the camera and/or the display of the device. The desired position optimizes aspects of self-imagery that is captured for applications in which the imagery is not primarily intended for the user's consumption. One class of such applications includes applications that rely on illuminating the user's face with light from the device's display screen. The feedback is abstracted to avoid biasing the user with aesthetic considerations. The abstracted imagery may include real-time cartoon-like line drawings of edges detected in imagery of the user's head or face.
H04N 5/232 - Dispositifs pour la commande des caméras de télévision, p.ex. commande à distance
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06K 9/46 - Extraction d'éléments ou de caractéristiques de l'image
Systems, methods, and computer program products provide near real-time feedback to a user of a camera-enabled device to guide the user to capture self-imagery when the user is in a desired position with respect the camera and/or the display of the device. The desired position optimizes aspects of self-imagery that is captured for applications in which the imagery is not primarily intended for the user's consumption. One class of such applications includes applications that rely on illuminating the user's face with light from the device's display screen. The feedback is abstracted to avoid biasing the user with aesthetic considerations. The abstracted imagery may include real-time cartoon-like line drawings of edges detected in imagery of the user's head or face.
27.
Real-time visual feedback for user positioning with respect to a camera and a display
Systems, methods, and computer program products provide near real-time feedback to a user of a camera-enabled device to guide the user to capture self-imagery when the user is in a desired position with respect the camera and/or the display of the device. The desired position optimizes aspects of self-imagery that is captured for applications in which the imagery is not primarily intended for the user's consumption. One class of such applications includes applications that rely on illuminating the user's face with light from the device's display screen. The feedback is abstracted to avoid biasing the user with aesthetic considerations. The abstracted imagery may include real-time cartoon-like line drawings of edges detected in imagery of the user's head or face.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
Systems, methods, and computer program products provide near real-time feedback to a user of a camera-enabled device to guide the user to capture self-imagery when the user is in a desired position with respect the camera and/or the display of the device. The desired position optimizes aspects of self-imagery that is captured for applications in which the imagery is not primarily intended for the user's consumption. One class of such applications includes applications that rely on illuminating the user's face with light from the device's display screen. The feedback is abstracted to avoid biasing the user with aesthetic considerations. The abstracted imagery may include real-time cartoon-like line drawings of edges detected in imagery of the user's head or face.
G06V 40/60 - Moyens statiques ou dynamiques permettant d’aider l’utilisateur à positionner une partie du corps pour l’acquisition de données biométriques
Systems, methods, and computer program products provide near real-time feedback to a user of a camera-enabled device to guide the user to capture self-imagery when the user is in a desired position with respect the camera and/or the display of the device. The desired position optimizes aspects of self-imagery that is captured for applications in which the imagery is not primarily intended for the user's consumption. One class of such applications includes applications that rely on illuminating the user's face with light from the device's display screen. The feedback is abstracted to avoid biasing the user with aesthetic considerations. The abstracted imagery may include real-time cartoon-like line drawings of edges detected in imagery of the user's head or face.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software for biometric systems for the identification and authentication of persons Software as a service (SAAS) services featuring software for the identification and authentication of persons
Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
09 - Appareils et instruments scientifiques et électriques
38 - Services de télécommunications
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer programs for accessing and using the internet; Computer software for biometric systems for the identification and authentication of persons. Data communication services accessible by password. Encryption, decryption and authentication of information, messages and data.