Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

161results about How to "Easy authentication" patented technology

System and method for verifying identity

A system and method of identity verification at a point-of-identification verification (POV) using biometric-based identity recognition and an identity verifying score based upon a presenter's initial identification presentment and their subsequent action in the system. The system also provides tracking and evaluates verifier activity within the system through biometric-based identity recognition and a performance score based upon their actions and the results of their actions within the system. System users register at least one biometric identifier and personal and/or business identity-verifying data. Users present a biometric sample obtained from their person and their system ID number to conduct identification transactions. This data is used to authenticate the user's identity to a percentage of reliability and allows a user with consistently positive ID verifications to establish a higher ID score, strengthening their credibility within the system. Once enrolled, the system allows the user to be identified without presenting any token-based information, such as a driver's license or passport. In one embodiment, an identity verification score generated via the system can be employed in conjunction with online transactions, such as purchases, auctions, email, instant messaging, and the like.
Owner:OPEN INVENTION NEWTORK LLC

System and method for authentication in WLAN environment

An authentication system and method in a wireless LAN (WLAN) environment. A terminal transmits an access authentication request to an access point of a WLAN which the terminal desires to access, and transmits its own transmission power information to the access point when receiving a response to the access authentication request from the access point, and the access point measures received signal strength, calculates a path loss value through the use of the received transmission power and the measured received signal strength, and performs access authentication of the terminal according to the calculated path loss value, so that a new terminal can easily access the WLAN where security has been set up.
Owner:SAMSUNG ELECTRONICS CO LTD

System and method for realizing smart card authentication based on voiceprint recognition

The invention relates to a system for realizing smart card authentication based on voiceprint recognition. The system comprises an authentication client and an authentication server, wherein the authentication client comprises a voiceprint sample acquisition module, a voiceprint feature extraction module and an NFC (near field communication) module; the authentication server comprises a server communicating module and a voiceprint feature matching module; the server communicating module is used for receiving authentication request information sent by the authentication client and judging the validity of the authentication request and returning to an authentication result. The invention further relates to a method for realizing the smart card authentication based on the voiceprint recognition. With the adoption of the structure of the system and the method for realizing the smart card authentication based on the voiceprint recognition, related information on a smart card can be read through an NFC function, the irreplaceable, anti-theft and anti-lost characteristics of a voiceprint are used, the authentication can be guaranteed to be finished effectively, and a wider application range is provided.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Method and system for verifying user identity using card features

ActiveUS20160048837A1Facilitates identity verificationEasy authenticationImage enhancementImage analysisComputer hardwareCard image
One embodiment of the present invention provides a system that facilitates identity verification based on various features of a card. During operation, a server receives a request for identity verification, where the request corresponds to an account and includes an image of a verifiable card. The server extracts a card feature from the verifiable card image for use as a verifiable card feature. In response to determining that the verifiable card feature matches a corresponding card feature of a registered card of the account, the server determines successful identity verification.
Owner:ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products