17671747. METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT simplified abstract (Samsung Electronics Co., Ltd.)

From WikiPatents
Revision as of 03:33, 2 January 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT

Organization Name

Samsung Electronics Co., Ltd.

Inventor(s)

Jiwon Baek of Hwaseong-si (KR)

Seungju Han of Seoul (KR)

Kikyung Kim of Hwaseong-si (KR)

Insoo Kim of Seongnam-si (KR)

Jaejoon Han of Seoul (KR)

METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17671747 titled 'METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT

Simplified Explanation

The abstract describes a method for managing access authority based on an input image of a user's body. Here is a simplified explanation of the patent application:

  • The method receives an input image that includes a region of a user's body.
  • It determines whether the user is a single user or multiple users based on the region of the body.
  • If the user is determined to be a single user, the method performs a verification using the face region in the input image.
  • It then determines whether the input image is a real image or a spoofed image based on the success of the verification.
  • If the input image is determined to be a real image, the method allows access authority to a system for the user.

Potential applications of this technology:

  • Access control systems: The method can be used in systems that require user authentication, such as secure buildings or computer systems.
  • Mobile devices: This technology can be implemented in smartphones or tablets to enhance security and prevent unauthorized access.
  • Online platforms: It can be used in online platforms that require user verification, such as banking or social media websites.

Problems solved by this technology:

  • Spoofing attacks: The method helps prevent unauthorized access by determining whether an input image is a real image or a spoofed image.
  • User identification: By analyzing the region of the user's body and performing face verification, the method ensures that access authority is granted to the correct user.

Benefits of this technology:

  • Enhanced security: By combining body region analysis and face verification, the method provides a more robust authentication process, reducing the risk of unauthorized access.
  • User convenience: The method simplifies the access authority management process by using an input image, eliminating the need for additional authentication methods like passwords or PINs.
  • Real-time verification: The method can perform the verification process in real-time, allowing for quick and efficient access to systems or devices.


Original Abstract Submitted

A method with access authority management includes: receiving an input image comprising a region of at least one portion of a body of a user; determining whether the user corresponds to multiple users or a single user using the region of the at least one portion of the body; performing a verification for the user based on a face region in the input image, in response to the determination that the user is the single user; determining whether the input image is a real image or a spoofed image based on whether the verification is successful; and allowing an access authority to a system to the user, in response to the determination that the input image is the real image.