Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

180 results about "Personal identity verification" patented technology

Personal Identity Verification (PIV) is a common credentialing and standard background investigation process required by Homeland Security Presidential Directive 12 (HSPD-12).

Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions

All-in-one wireless mobile telecommunication devices, methods and systems providing greater customer-control, instant-response anti-fraud/anti-identity theft protections with instant alarm, messaging and secured true-personal identity verifications for numerous registered customers/users, with biometrics and PIN security, operating with manual, touch-screen and/or voice-controlled commands, achieving secured rapid personal/business e-banking, e-commerce, accurate transactional monetary control and management, having interactive audio-visual alarm/reminder preventing fraudulent usage of legitimate physical and/or virtual credit/debit cards, with cheques anti-forgery means, curtailing medical/health/insurance frauds/identity thefts, having integrated cellular and/or satellite telephonic/internet and multi-media means, equipped with language translations, GPS navigation with transactions tagging, currency converters, with or without NFC components, minimizing potential airport risks/mishaps, providing instant aid against school bullying, kidnapping, car-napping and other crimes, applicable for secured military/immigration/law enforcements, providing guided warning/rescue during emergencies and disasters.
Owner:VILLA REAL ANTONY EUCLID C

Blockchain identity management system based on public identities ledger

The invention describes an identity management system (IDMS) based on the concept of peer-to-peer protocols and the public identities ledger. The system manages digital identities, which are digital objects that contain attributes used for the identification of persons and other entities in an IT system and for making identity claims. The identity objects are encoded and cryptographically encapsulated. Identity management protocols include the creation of identities, the validation of their binding to real-world entities, and their secure and reliable storage, protection, distribution, verification, updates, and use. The identities are included in a specially constructed global, distributed, append-only public identities ledger. They are forward- and backward-linked using the mechanism of digital signatures. The linking of objects and their chaining in the ledger is based on and reflect their mutual validation relationships. The identities of individual members are organized in the form of linked structures called the personal identities chains. Identities of groups of users that validated identities of other users in a group are organized in community identities chains. The ledger and its chains support accurate and reliable validation of identities by other members of the system and by application services providers without the assistance of third parties. The ledger designed in this invention may be either permissioned or unpermissioned. Permissioned ledgers have special entities, called BIX Security Policy Providers, which validate the binding of digital identities to real-world entities based on the rules of a given security policy. In unpermissioned ledgers, community members mutually validate their identities. The identity management system provides security, privacy, and anonymity for digital identities and satisfies the requirements for decentralized, anonymous identities management systems.
Owner:MUFTIC SEAD

Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions

All-in-one wireless mobile telecommunication devices, methods and systems providing greater customer-control, instant-response anti-fraud / anti-identity theft protections with instant alarm, messaging and secured true-personal identity verifications for numerous registered customers / users, with biometrics and PIN security, operating with manual, touch-screen and / or voice-controlled commands, achieving secured rapid personal / business e-banking, e-commerce, accurate transactional monetary control and management, having interactive audio-visual alarm / reminder preventing fraudulent usage of legitimate physical and / or virtual credit / debit cards, with checks anti-forgery means, curtailing medical / health / insurance frauds / identity thefts, having integrated cellular and / or satellite telephonic / internet and multi-media means, equipped with language translations, GPS navigation with transactions tagging, currency converters, with or without NFC components, minimizing potential airport risks / mishaps, providing instant aid against school bullying, kidnapping, car-napping and other crimes, applicable for secured military / immigration / law enforcements, providing guided warning / rescue during emergencies and disasters.
Owner:VILLA REAL ANTONY EUCLID C

Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), methods and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without nfc component and system, with cellular/satellite phone/internet/multi-media functions

All-in-one wireless mobile telecommunication devices, methods and systems providing greater customer-control, instant-response anti-fraud/anti-identity theft protections with instant alarm, messaging and secured true-personal identity verifications for numerous registered customers/users, with biometrics and PIN security, operating with manual, touch-screen and/or voice-controlled commands, achieving secured rapid personal/business e-banking, e-commerce, accurate transactional monetary control and management, having interactive audio-visual alarm/reminder preventing fraudulent usage of legitimate physical and/or virtual credit/debit cards, with cheques anti-forgery means, curtailing medical/health/insurance frauds/identity thefts, having integrated cellular and/or satellite telephonic/internet and multi-media means, equipped with language translations, GPS navigation with transactions tagging, currency converters, with or without NFC components, minimizing potential airport risks/mishaps, providing instant aid against school bullying, kidnapping, car-napping and other crimes, applicable for secured military/immigration/law enforcements, providing guided warning/rescue during emergencies and disasters.
Owner:VILLA REAL ANTONY EUCLID C

Method and system for identity verification of digital certificate based on TEE (Trusted Execution Environment)

ActiveCN105429760AEnsure true willEnsure that the identity verification process can reflect the true willUser identity/authority verificationPasswordPersonal identity verification
The invention discloses a method for identity verification of a digital certificate based on a TEE (Trusted Execution Environment). The method comprises pre-configuration of a digital certificate system through a terminal, a digital certificate signature process and a digital certificate signature verification process. The method is characterized in that the terminal is provided with the TEE; the digital certificate signature process is carried out on the terminal and is used for utilizing a private key of the digital certificate to sign for a user request; the digital certificate signature verification process is used for authenticating identity of a requested user, and the authentication method comprises verification of validity and effectiveness of the digital certificate and integrity and correctness of the signature, wherein the digital certificate signature process is carried out under the TEE; the sensitive information, such as a user key, identity information, biological characteristic information and password information, is stored through a secure storage module, so that the problems that the signature process is carried out in REE and the sensitive information of the user is stored under the REE environment to cause privacy disclosure and stolen hidden danger of property in the prior art are avoided.
Owner:神州融安数字科技(北京)有限公司

Vision detection system for vehicles not yielding to pedestrians at zebra crossing

The invention provides a vision detection system for vehicles not yielding to pedestrians at zebra crossing, comprising a monitoring camera covering the whole zebra crossing area, a HD (high definition) snapshot camera for taking snapshots of vehicles, a traffic cloud server, and a vision detection subsystem. The vision detection subsystem comprises a zebra crossing area detection module, a not-yielding-to-pedestrians behavior detection module, a not-yielding-to-pedestrians behavior vehicle image snapshot module, a vehicle type identification module, a license plate positioning and identifyingmodule, and a violation detection report generating module. The traffic cloud server is used for receiving video data of the whole zebra crossing area obtained by the monitoring camera, and submitting the video data to the vision detection subsystem to conduct not-yielding-to-pedestrians behavior detection and personal identity verification of violation vehicles. A violation detection report canbe automatically generated and stored with the detection and identification result, three snapshots of not-yielding-to-pedestrians vehicle images, and the process video images. The invention is quitehigh in detection precision and robustness.
Owner:ENJOYOR COMPANY LIMITED

Data communication intermediation program and apparatus for promoting authentication processing in cooperation with purchaser portable terminal having personal identification information and communication function

In a personal authentication and a settlement authentication required for the Internet shopping, in order to make above authentication processing executed between a server and a client computer be executed between the server and a purchaser portable terminal equipped with personal identification information and a communication function, a program of the present invention has functions for transferring to the purchaser portable terminal a personal identification information request sent from the server and data associated with the authentication processing and for transferring to the server the data associated with the authentication processing sent from the purchaser portable terminal. Due to the program, while products are selected with a client computer such as a personal computer with a large screen and good operability, personal identification information required for the personal authentication and a settlement authentication is transmitted from the purchaser portable terminal and will not be stored in a hard disk of the client computer. Also, by encrypting communication, leakage of the personal identification information to a third party can be prevented and, as a result, the “spoofing” can be prevented.
Owner:FUJITSU LTD

Driver identity verification system and method

Embodiments of the present invention disclose a driver identity verification system and method, and can overcome the defect that an existing vehicle management technology cannot accurately and timely verify the identity of a driver and determine whether the driver is the vehicle owner or a legally authorizer. The system comprises: a document reading apparatus which is electrically connected to an identity verification apparatus and is used for reading identity information of a driver by a driver identification card inserted into the document reading apparatus and transmitting the identity information to the identity verification apparatus; a camera which is arranged in a cockpit of a vehicle, is electrically connected to the identity verification apparatus and is used for acquiring personal image information at the position of the driver according to an instruction of the identity verification apparatus and transmitting the personal image information to the identity verification apparatus; and the identity verification apparatus which is electrically connected to a vehicle control apparatus and is used for comparing the identity information with the personal image information and sending an unlocking instruction to the vehicle control apparatus when the comparison is successful, so that the vehicle control apparatus unlocks the vehicle and responds to an operation instruction of the driver to control the vehicle operation.
Owner:宝鸡市公安局交通警察支队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products