Patents Assigned to ID R&D, INC.
-
Patent number: 11941097Abstract: Methods and devices for spoofing proof authentication of a user by voice to unlock a user device. According to one of its aspects, a method includes performing spoofing proof authentication of a user by voice. According to another aspect, a device is configured for spoofing proof authentication of a user by voice. Implementation of the method provides not only personalized access to the data, but also the highest level of security due to anti-spoofing.Type: GrantFiled: March 1, 2021Date of Patent: March 26, 2024Assignee: ID R&D INC.Inventor: Konstantin Konstantinovich Simonchik
-
Publication number: 20240071393Abstract: Methods and devices identify a speaker by extracting speech features from at least one keyword. A speaker vector is produced by feeding the extracted speech features to a pre-trained neural network. The pre-trained neural network includes a convolutional neural network. The convolutional neural network serves as a backbone and provides a backbone embedding. The pre-trained neural network also includes a neural subnetwork. The produced speaker vector is compared with at least one of registered speaker vectors corresponding to known speakers to identify the speaker.Type: ApplicationFiled: August 22, 2022Publication date: February 29, 2024Applicant: ID R&D INC.Inventors: Konstantin Konstantinovich SIMONCHIK, Rostislav Nikolaevich MAKAROV
-
Patent number: 11783628Abstract: A method for performing a crowdsourcing task is provided. The method executed on a computing device comprises generating a crowdsourcing task to take at least one image of an original face photo; sending the generated crowdsourcing task to a crowdsourcing server to publish it thereon, the crowdsourcing server communicating with at least one user device registered in the crowdsourcing server; receiving at least one confirmation from the crowdsourcing server, each confirmation corresponding to the crowdsourcing task accepted by a particular user with a corresponding one of the registered user devices; providing an original face photo for each user corresponding to one of the received confirmations; sending, through the crowdsourcing server, the original face photo to a particular user device corresponding to the user; and receiving at least one image from the user device, the received images being taken for the original face photo in accordance with the accepted crowdsourcing task.Type: GrantFiled: May 18, 2021Date of Patent: October 10, 2023Assignee: ID R&D Inc.Inventors: Denis Maksimovich Timoshenko, Konstantin Konstantinovich Simonchik
-
Patent number: 11670069Abstract: The present application relates to the field of computer software technologies, and in particular, to a face spoofing attack detection method and system. The suggested method comprises capturing an image; determining a context of the captured image; highlighting a part of the captured image to generate an image with the highlighted part, wherein the highlighted part is a potential spoofing region determined based on the context of the captured image; combining the captured image with the image with the highlighted part to generate a summarized image; performing face spoofing attack detection in the summarized image, wherein only the highlighted part has priority in the face spoofing attack detection, generating a general spoofing score as a result of the face spoofing attack detection; comparing the general spoofing score result with a threshold for face liveness detection.Type: GrantFiled: February 6, 2020Date of Patent: June 6, 2023Assignee: ID R&D, Inc.Inventors: Denis Timoshenko, Konstantin Simonchik, Alexey Khitrov
-
Patent number: 11611581Abstract: Methods and devices for detecting a spoofing attack are provided. The method includes receiving a speech signal; applying a Fast Fourier Transform (FFT) to the speech signal to extract FFT features therefrom and feeding the extracted FFT features to a pre-trained deep neural network to assign a first confidence score to the speech signal; applying a Discrete cosine transform (DCT) to the speech signal to extract DCT features therefrom and feeding the extracted DCT features to a pre-trained deep neural network to assign a second confidence score to the speech signal; applying a pre-trained deep convolutional network (DCN) based on an end-to-end architecture to the speech signal to assign a third confidence score to the speech signal; computing a total confidence score based on the assigned confidence scores; and comparing the computed total confidence score to a predefined threshold to detect whether the received speech signal is spoofed.Type: GrantFiled: August 26, 2020Date of Patent: March 21, 2023Assignee: ID R&D, Inc.Inventors: Konstantin Konstantinovich Simonchik, Anton Andreevich Pimenov, Aleksandr Alekseevich Alenin
-
Patent number: 11514142Abstract: A user authentication method in a messaging application of an electronic device. The method comprises, if at least one text message is typed by a user in the messaging application, collecting image data relating to said user and behavioral data relating to said user, and, if at least one voice message is pronounced by said user in the messaging application, collecting image data relating to said user and voice data relating to said user.Type: GrantFiled: April 26, 2019Date of Patent: November 29, 2022Assignee: ID R&D, Inc.Inventors: Alexey Khitrov, Konstantin Simonchik
-
Publication number: 20220374626Abstract: A method for performing a crowdsourcing task is provided. The method executed on a computing device comprises generating a crowdsourcing task to take at least one image of an original face photo; sending the generated crowdsourcing task to a crowdsourcing server to publish it thereon, the crowdsourcing server communicating with at least one user device registered in the crowdsourcing server; receiving at least one confirmation from the crowdsourcing server, each confirmation corresponding to the crowdsourcing task accepted by a particular user with a corresponding one of the registered user devices; providing an original face photo for each user corresponding to one of the received confirmations; sending, through the crowdsourcing server, the original face photo to a particular user device corresponding to the user; and receiving at least one image from the user device, the received images being taken for the original face photo in accordance with the accepted crowdsourcing task.Type: ApplicationFiled: May 18, 2021Publication date: November 24, 2022Applicant: ID R&D Inc.Inventors: Denis Maksimovich TIMOSHENKO, Konstantin Konstantinovich SIMONCHIK
-
Publication number: 20220277062Abstract: Methods and devices for spoofing proof authentication of a user by voice to unlock a user device. According to one of its aspects, a method includes performing spoofing proof authentication of a user by voice. According to another aspect, a device is configured for spoofing proof authentication of a user by voice. Implementation of the method provides not only personalized access to the data, but also the highest level of security due to anti-spoofing.Type: ApplicationFiled: March 1, 2021Publication date: September 1, 2022Applicant: ID R&D Inc.Inventor: Konstantin Konstantinovich SIMONCHIK
-
Publication number: 20220070207Abstract: Methods and devices for detecting a spoofing attack are provided. The method includes receiving a speech signal; applying a Fast Fourier Transform (FFT) to the speech signal to extract FFT features therefrom and feeding the extracted FFT features to a pre-trained deep neural network to assign a first confidence score to the speech signal; applying a Discrete cosine transform (DCT) to the speech signal to extract DCT features therefrom and feeding the extracted DCT features to a pre-trained deep neural network to assign a second confidence score to the speech signal; applying a pre-trained deep convolutional network (DCN) based on an end-to-end architecture to the speech signal to assign a third confidence score to the speech signal; computing a total confidence score based on the assigned confidence scores; and comparing the computed total confidence score to a predefined threshold to detect whether the received speech signal is spoofed.Type: ApplicationFiled: August 26, 2020Publication date: March 3, 2022Applicant: ID R&D, Inc.Inventors: Konstantin Konstantinovich SIMONCHIK, Anton Andreevich PIMENOV, Aleksandr Alekseevich ALENIN
-
Publication number: 20210248401Abstract: The present application relates to the field of computer software technologies, and in particular, to a face spoofing attack detection method and system. The suggested method comprises capturing an image containing a face of a user; highlighting at least one part of the captured image, which is a potential spoofing region; selecting a method for user liveness detection for a specific highlighted at least one part of the captured image, which is a potential spoofing region; performing user liveness detection using the selected method and based on the highlighted at least one part of the captured image to obtain a general liveness score; and comparing the general liveness score result with a threshold for face spoofing attack detection.Type: ApplicationFiled: February 6, 2020Publication date: August 12, 2021Applicant: ID R&D, Inc.Inventors: Denis TIMOSHENKO, Konstantin SIMONCHIK, Alexey KHITROV
-
Patent number: 11023709Abstract: A system and method and apparatus collect behavioral biometric and facial recognition data for biometric analysis by asking a user to type text to an electronic device. Fusion of knowledge based authentication, behavioral biometrics and facial recognition provides strong authentication and liveness detection, while keeping user experience to simply typing.Type: GrantFiled: April 30, 2018Date of Patent: June 1, 2021Assignee: ID R&D, INC.Inventors: Alexey Khitrov, Konstantin Simonchik
-
Patent number: 10970573Abstract: A method for user authentication based on keystroke dynamics is provided. The user authentication method includes receiving a keystroke input implemented by a user; separating a sequence of pressed keys into a sequence of bigrams having bigram names simultaneously with the user typing free text; collecting a timing information for each bigram of the sequence of bigrams; extracting a feature vector for each bigram based on the timing information; separating feature vectors into subsets according to the bigram names; estimating a GMM user model using subsets of feature vectors for each bigram; providing real time user authentication using the estimated GMM user model for each bigram and bigram features from current real time user keystroke input. The corresponding system is also provided. The GMM based analysis of the keystroke data separated by bigrams provides strong authentication using free text input, while user additional actions (to be verified) are kept at a minimum.Type: GrantFiled: April 26, 2019Date of Patent: April 6, 2021Assignee: ID R&D, INC.Inventors: Alexey Khitrov, Konstantin Simonchik
-
Patent number: 10909991Abstract: A computer-implemented method for verifying identity of a speaker is proposed. A low dimensional p-vector based on a speech of the speaker is extracted from the generated high dimensional speaker model and is then compared with the stored specific speaker's p-vector obtained previously during the enrollment process. The resulting biometric score is then used to determine whether to verify the speaker, or not.Type: GrantFiled: April 24, 2019Date of Patent: February 2, 2021Assignee: ID R&D, INC.Inventors: Alexey Khitrov, Konstantin Simonchik