Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Biometric authentication techniques

A lighting mode, camera technology, applied in biometric identification, digital data authentication, computing, etc., can solve the problem of incorrectly indicating the correct user, etc.

Active Publication Date: 2019-02-12
APPLE INC
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, devices should be designed to avoid replay and spoofing attacks, such as malicious entities attempting to trick biometric sensors into incorrectly indicating the presence of the correct user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric authentication techniques
  • Biometric authentication techniques
  • Biometric authentication techniques

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Overview of Exemplary Devices

[0027] This disclosure generally relates to techniques for preventing spoofing or replay of biometric data, such as images used for facial recognition. A "replay" attack involves attempting to authenticate an individual using previously captured biometric information, typically valid, such as image data of the face of an authorized person who has previously passed biometric authentication. A malicious entity may attempt to show a previously captured image of a user to, for example, the device's camera in order to pass an authentication process as a registered user of the device. "Spoofing" attacks often use invalid data, such as data from another device or module purporting to be from the device's camera, or images of masks, statues, 3D projections, etc. that are not the actual current image of the known user. For example, a malicious entity could send a signal pretending to be from the device's camera unit to trick the device into think...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The title of the invention is biometric authentication techniques. Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configuredto verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and / or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) beforeauthenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and / or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and / or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and / or replay attacks, in some embodiments.

Description

[0001] This application claims U.S. Provisional Application No. 62 / 540036, filed August 1, 2017, U.S. Provisional Application No. 62 / 540040, filed August 1, 2017, U.S. Provisional Application No. 62, filed September 9, 2017 .62 / 556357, U.S. Provisional Application No. 62 / 556363 filed September 9, 2017, U.S. Provisional Application No. 62 / 556365 filed September 9, 2017, and U.S. Provisional Application No. 62 / 556365 filed September 11, 2017 Benefit of Application No. 62 / 556857; each of these US provisional applications is hereby incorporated by reference in its entirety. technical field [0002] The present disclosure relates generally to user authentication, and more particularly to computing devices that collect biometric data for user authentication. Background technique [0003] Traditional authentication measures typically rely on a user to provide one or more credentials to indicate that the user is an authorized user. For example, a mobile device attempting to authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06V10/145
CPCG06F21/32H04L9/3231H04L9/0866G06F21/46G06V40/166G06V40/40G06V10/145
Inventor L·E·巴拉德J·V·豪客D·S·普拉卡什汤锋E·里特温P·K·A·瓦苏G·里特温T·戈尔诺斯L·库塞罗瓦P·科斯塔S·霍特林E·希尔什T·凯特茨J·珀克帕斯A·克尔林M·拉芬费尔德M·C·瓦尔登T·P·门斯克L·扬斯C·泽莱齐尼克M·马隆尼Z·亨德尔I·科尔斯蒂克A·K·沙玛
Owner APPLE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products