18274937. FACE AUTHENTICATION SYSTEM, FACE AUTHENTICATION METHOD, AND PROGRAM simplified abstract (NEC Corporation)

From WikiPatents
Jump to navigation Jump to search

FACE AUTHENTICATION SYSTEM, FACE AUTHENTICATION METHOD, AND PROGRAM

Organization Name

NEC Corporation

Inventor(s)

Makoto Kataoka of Tokyo (JP)

Yohel Itou of Tokyo (JP)

Satoshi Terasawa of Tokyo (JP)

Kazuki Seko of Tokyo (JP)

FACE AUTHENTICATION SYSTEM, FACE AUTHENTICATION METHOD, AND PROGRAM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18274937 titled 'FACE AUTHENTICATION SYSTEM, FACE AUTHENTICATION METHOD, AND PROGRAM

Simplified Explanation

The patent application describes a system for facial recognition authentication using two separate watchlists to compare face feature information of individuals captured in input images.

  • First authentication apparatus: Compares face feature information of a person in an input image with registered face feature information in a first watchlist.
  • Second authentication apparatus: Compares face feature information of unauthenticated individuals with registered face feature information in a second watchlist.
  • Host server: Includes a watchlist updating unit that updates registered face feature information in both watchlists based on priority degrees assigned to each piece of information.

Potential Applications

This technology can be applied in various industries such as security, access control systems, law enforcement, and border control.

Problems Solved

1. Enhanced security through accurate facial recognition authentication. 2. Efficient identification of individuals in large databases.

Benefits

1. Improved authentication accuracy. 2. Streamlined identification processes. 3. Enhanced security measures.

Potential Commercial Applications

Enhancing Security Measures with Facial Recognition Technology

Unanswered Questions

How does the system handle variations in lighting and facial expressions during authentication?

What measures are in place to protect the privacy and security of the stored face feature information?

Original Abstract Submitted

A first authentication apparatus executes authentication of a person captured in an input image by comparing face feature information of the person being acquired from an input image, with registered face feature information in a first watchlist. A second authentication apparatus executes authentication of a person unauthenticated with the first watchlist by comparing face feature information of the face feature information for which matching registered face feature information does not exist in the first watchlist, with registered face feature information in a second watchlist. A host server includes a watchlist updating unit that updates registered face feature information in the first watchlist and registered face feature information in the second watchlist, based on at least one of a priority degree for each piece of registered face feature information in the first watchlist and a priority degree for each piece of registered face feature information in the second watchlist.