17671747. METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT simplified abstract (Samsung Electronics Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT

Organization Name

Samsung Electronics Co., Ltd.

Inventor(s)

Jiwon Baek of Hwaseong-si (KR)

Seungju Han of Seoul (KR)

Kikyung Kim of Hwaseong-si (KR)

Insoo Kim of Seongnam-si (KR)

Jaejoon Han of Seoul (KR)

METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17671747 titled 'METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT

Simplified Explanation

The abstract describes a method for managing access authority based on an input image of a user's body. Here is a simplified explanation of the patent application:

  • The method receives an input image that includes a region of a user's body.
  • It determines whether the user is a single user or multiple users based on the region of the body.
  • If the user is determined to be a single user, the method performs a verification using the face region in the input image.
  • It then determines whether the input image is a real image or a spoofed image based on the success of the verification.
  • If the input image is determined to be a real image, the method allows access authority to a system for the user.

Potential applications of this technology:

  • Access control systems: The method can be used in systems that require user authentication, such as secure buildings or computer systems.
  • Mobile devices: This technology can be implemented in smartphones or tablets to enhance security and prevent unauthorized access.
  • Online platforms: It can be used in online platforms that require user verification, such as banking or social media websites.

Problems solved by this technology:

  • Spoofing attacks: The method helps prevent unauthorized access by determining whether an input image is a real image or a spoofed image.
  • User identification: By analyzing the region of the user's body and performing face verification, the method ensures that access authority is granted to the correct user.

Benefits of this technology:

  • Enhanced security: By combining body region analysis and face verification, the method provides a more robust authentication process, reducing the risk of unauthorized access.
  • User convenience: The method simplifies the access authority management process by using an input image, eliminating the need for additional authentication methods like passwords or PINs.
  • Real-time verification: The method can perform the verification process in real-time, allowing for quick and efficient access to systems or devices.


Original Abstract Submitted

A method with access authority management includes: receiving an input image comprising a region of at least one portion of a body of a user; determining whether the user corresponds to multiple users or a single user using the region of the at least one portion of the body; performing a verification for the user based on a face region in the input image, in response to the determination that the user is the single user; determining whether the input image is a real image or a spoofed image based on whether the verification is successful; and allowing an access authority to a system to the user, in response to the determination that the input image is the real image.