Patent application number | Description | Published |
20090046904 | FINGERPRINT RECOGNITION APPARATUS AND METHOD - Provided are a fingerprint recognition apparatus and method which are capable of protecting registered fingerprint data and recognizing a fingerprint more quickly and accurately. In the fingerprint recognition apparatus, a fingerprint image generator generates fingerprint image data of an input fingerprint, and a memory stores registration fingerprint data for authentication. In a registration mode, a fingerprint recognition processor transforms the fingerprint image data into the irreversible registration fingerprint data using a specific transformation scheme, and stores the transformed registration fingerprint data. In an authentication mode, the fingerprint recognition processor transforms the fingerprint image data into comparison fingerprint data using the specific transformation scheme, compares whether the comparison fingerprint data is identical to the registration fingerprint data, and controls the authentication process according to the comparison result. | 02-19-2009 |
20110037563 | APPARATUS AND METHOD FOR BIOMETRIC REGISTRATION AND AUTHENTICATION - A biometric register includes: a feature extraction unit for performing preprocessing for a fingerprint to extract a feature point m for the fingerprint; a transformation function generation unit for generating a transformation function which is composed of an arbitrary rotation matrix and an arbitrary vector; and a template generation unit for transforming a coordinate of the feature point m using the generated transformation function, and organizing a fuzzy vault using a randomly generated fake feature point and a feature point m | 02-17-2011 |
20110123072 | FINGERPRINT VERIFICATION METHOD AND APPARATUS WITH HIGH SECURITY - A fingerprint verification apparatus that adds chaff fingerprint information to real fingerprint information of a user and then, hides and stores the fingerprint information of the user with a polynomial generated by unique information of the individual, thereby safely protecting the important fingerprint information of the user stored in a storing unit from an external attacker and safely managing an private key using the fingerprint information when using the private key as the unique information for making the polynomial. | 05-26-2011 |
20120032781 | REMOTE PERSONAL AUTHENTICATION SYSTEM AND METHOD USING BIOMETRICS - Disclosed herein is a remote personal authentication system and method using biometrics. The remote personal authentication method using biometrics includes receiving a biometric information of a user remotely detected by a biometric information collection device; decrypting, in a hardware security module (HSM) of the user, the received biometric information and biometric information stored in the HSM; and performing personal authentication for the user by comparing the decrypted biometric information with each other in the HSM. | 02-09-2012 |
20120154522 | OBJECT IMAGE CAPTURE APPARATUS AND METHOD - Disclosed herein is an object image capture apparatus. The object image capture apparatus includes a first camera unit, a second camera unit, and a control unit. The first camera unit obtains a wide-area view image by capturing a wide-area view region. The second camera unit obtains a close-up view image by capturing the close-up view region of the wide-area view region. The control unit controls the second camera unit by dividing the wide-area view image into a plurality of blocks, analyzing the resulting blocks, and defining a target block, in which a moving object is detected, as a close-up view region from among the plurality of blocks. | 06-21-2012 |
20130188070 | APPARATUS AND METHOD FOR ACQUIRING FACE IMAGE USING MULTIPLE CAMERAS SO AS TO IDENTIFY HUMAN LOCATED AT REMOTE SITE - An apparatus for acquiring a face image using multiple cameras so as to identify a human being located at a remote site is disclosed. The apparatus for acquiring a face image using multiple cameras allows a PTZ camera to track an interest object from among objects detected/tracked by a fixed camera, and obtains an optimum face image for remote human identification from images generated by the PTZ camera. The apparatus for acquiring the face image using multiple cameras so as to identify a human located at a remote site includes a multi-camera control module for tracking an interest object being detected/tracked by a fixed camera through a Pan-Tilt-Zoom (PTZ) camera, and generating an image of the interest object; and a face-image acquisition module for acquiring a face image appropriate for identifying a face image of the remote human in the interest object image generated by the multi-camera control module. | 07-25-2013 |
20140178030 | VIDEO RECORDING APPARATUS FOR VEHICLE AND VIDEO RECORDING METHOD FOR VEHICLE - Disclosed is a video recording apparatus for a vehicle, which includes a camera unit formed so as to change a capturing direction; a driver's viewing direction detecting unit configured to detect a driver's viewing direction; a control unit configured to control the camera unit so that the detected viewing direction corresponds to the capturing direction; and a storing unit configured to store a video obtained by the camera unit. Therefore, a video in a direction at which the driver views is obtained and stored without mounting a plurality of cameras so that it is possible to obtain a video for a situation of an accident of a vehicle of the driver or a vehicle of another driver occurring not only in the front of the driver's vehicle but also in the side of the driver's vehicle. | 06-26-2014 |
20150220733 | APPARATUS AND METHOD FOR DETECTING A MALICIOUS CODE BASED ON COLLECTING EVENT INFORMATION - The apparatus for detecting a malicious code comprises a feature factor collecting module collecting information of feature factor events from a computing device based on the defined feature factors, a feature factor specification module converting the collected information of feature factor events to feature factor specification data in the form available on the analysis, and a malicious code detection module analyzing if a malicious code is or not by using the specification data. | 08-06-2015 |