17671747. METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT simplified abstract (Samsung Electronics Co., Ltd.)
Contents
METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT
Organization Name
Inventor(s)
Jiwon Baek of Hwaseong-si (KR)
Kikyung Kim of Hwaseong-si (KR)
METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT - A simplified explanation of the abstract
This abstract first appeared for US patent application 17671747 titled 'METHOD AND APPARATUS WITH ACCESS AUTHORITY MANAGEMENT
Simplified Explanation
The abstract describes a method for managing access authority based on an input image of a user's body. Here is a simplified explanation of the patent application:
- The method receives an input image that includes a region of a user's body.
- It determines whether the user is a single user or multiple users based on the region of the body.
- If the user is determined to be a single user, the method performs a verification using the face region in the input image.
- It then determines whether the input image is a real image or a spoofed image based on the success of the verification.
- If the input image is determined to be a real image, the method allows access authority to a system for the user.
Potential applications of this technology:
- Access control systems: The method can be used in systems that require user authentication, such as secure buildings or computer systems.
- Mobile devices: This technology can be implemented in smartphones or tablets to enhance security and prevent unauthorized access.
- Online platforms: It can be used in online platforms that require user verification, such as banking or social media websites.
Problems solved by this technology:
- Spoofing attacks: The method helps prevent unauthorized access by determining whether an input image is a real image or a spoofed image.
- User identification: By analyzing the region of the user's body and performing face verification, the method ensures that access authority is granted to the correct user.
Benefits of this technology:
- Enhanced security: By combining body region analysis and face verification, the method provides a more robust authentication process, reducing the risk of unauthorized access.
- User convenience: The method simplifies the access authority management process by using an input image, eliminating the need for additional authentication methods like passwords or PINs.
- Real-time verification: The method can perform the verification process in real-time, allowing for quick and efficient access to systems or devices.
Original Abstract Submitted
A method with access authority management includes: receiving an input image comprising a region of at least one portion of a body of a user; determining whether the user corresponds to multiple users or a single user using the region of the at least one portion of the body; performing a verification for the user based on a face region in the input image, in response to the determination that the user is the single user; determining whether the input image is a real image or a spoofed image based on whether the verification is successful; and allowing an access authority to a system to the user, in response to the determination that the input image is the real image.