Patents by Inventor Richard Austin Huber
Richard Austin Huber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11615199Abstract: In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that may include designating specific information within a digital identification as secure user information and designating other specific information as non-secure user information, and provisioning user-specific authentication techniques to restrict unauthorized access to the secure user information. For instance, the secure user information may be prevented from being displayed on the digital identification without the submission of an access credential such as a user-specified code or a user biometric identifier.Type: GrantFiled: May 7, 2018Date of Patent: March 28, 2023Assignee: Idemia Identity & Security USA LLCInventors: Daniel Poder, Richard Austin Huber
-
Publication number: 20230009392Abstract: Methods for detecting digital or physical tampering of an imaged physical credential include the actions of: receiving a digital image representing a physical credential having one or more high value regions, the digital image including an array of pixels; processing the digital image with a tamper detector to generate an output corresponding to an intrinsic characteristic of the digital image, the tamper detector configured to perform a pixel-level analysis of the high value regions of the digital image with respect to a predetermined tampering signature; and determining, based on the output from the tamper detector, whether the digital image has been digitally tampered with.Type: ApplicationFiled: September 15, 2022Publication date: January 12, 2023Inventors: Richard Austin Huber, JR., Satya Prakash Mallick, Matthew William Flagg, Koustubh Sinhal
-
Publication number: 20220406029Abstract: Methods for detecting digital or physical tampering of an imaged physical credential include the actions of: receiving a digital image representing a physical credential having one or more high value regions, the digital image including an array of pixels; processing the digital image with a tamper detector to generate an output corresponding to an intrinsic characteristic of the digital image, the tamper detector configured to perform a pixel-level analysis of the high value regions of the digital image with respect to a predetermined tampering signature; and determining, based on the output from the tamper detector, whether the digital image has been digitally tampered with.Type: ApplicationFiled: February 14, 2022Publication date: December 22, 2022Inventors: Richard Austin Huber, JR., Satya Prakash Mallick, Matthew William Flagg, Koustubh Sinhal
-
Patent number: 11509477Abstract: In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that may include validating user data pages extracted from a digital identification in circumstances where a user device that includes the digital identification is either unavailable or presently lacks network connectivity. For instance, an authorized device may be used to extract user data pages from the digital identification by either exchanging communications with the user device using a proximity-based data exchange protocol, or by using a physical identification card to identify the digital identification on a user record. The user data pages may then be validated by comparing checksums associated with user data pages against the checksums within the user record, and decrypting the user data pages using a decryption key that is variably designated by a security status assigned to the digital identification.Type: GrantFiled: October 7, 2019Date of Patent: November 22, 2022Assignee: Idemia Identity & Security USA LLCInventors: Daniel Poder, Richard Austin Huber
-
Publication number: 20220092333Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for an active lighting system. In one aspect, a method includes receiving a first image of the physical document having a first glare signature and a second image of the physical document having a second glare signature that is different from the first glare signature; determining a first glare map of the first image and a second glare map of the second image; comparing the first glare map to the second glare map; and generating the digital image based on the comparison of the first and second glare maps.Type: ApplicationFiled: December 6, 2021Publication date: March 24, 2022Inventors: Richard Austin Huber, JR., Matthew Willliam Flagg, Satya Prakash Mallick
-
Patent number: 11250285Abstract: Methods for detecting digital or physical tampering of an imaged physical credential include the actions of: receiving a digital image representing a physical credential having one or more high value regions, the digital image including an array of pixels; processing the digital image with a tamper detector to generate an output corresponding to an intrinsic characteristic of the digital image, the tamper detector configured to perform a pixel-level analysis of the high value regions of the digital image with respect to a predetermined tampering signature; and determining, based on the output from the tamper detector, whether the digital image has been digitally tampered with.Type: GrantFiled: January 13, 2020Date of Patent: February 15, 2022Assignee: ID Metrics Group IncorporatedInventors: Richard Austin Huber, Jr., Satya Prakash Mallick, Matthew William Flagg, Koustubh Sinhal
-
Publication number: 20210398135Abstract: Methods, systems, and computer programs for transaction verification.Type: ApplicationFiled: June 22, 2021Publication date: December 23, 2021Inventor: Richard Austin Huber, JR.
-
Publication number: 20210398109Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for identification templates for identification search and authentication. In some implementations, obtaining first data that represents a physical document identifying a party to a transaction, providing the first data as an input to a machine learning model that comprises at least one hidden layer that is a trained security feature discriminator layer, obtaining activation data generated by the security feature discriminator layer based on the machine learning model processing the first data, determining based on the obtained activation data, that the transaction is to be denied, and based on determining that the transaction is to be denied, generating a notification that, when processed by the computer, causes the computer to output data indicating that the transaction is to be denied.Type: ApplicationFiled: June 22, 2021Publication date: December 23, 2021Inventor: Richard Austin Huber, JR.
-
Publication number: 20210398128Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for updating a shared database and processing transactions. In some implementations, first data related to a transaction is received by a first enterprise transaction verification system. The first enterprise transaction verification system generates second data by obfuscating the first data using a machine learning model that has been trained to include a security feature discriminator layer and obtaining a set of activations output by a security feature discriminator layer of the machine learning model. The second data includes the set of activations and can be stored on a shared database where it can be compared with other activations from other transactions to aid in authentications and detections of fraud.Type: ApplicationFiled: June 22, 2021Publication date: December 23, 2021Inventor: Richard Austin Huber, JR.
-
Patent number: 11195047Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for an active lighting system. In one aspect, a method includes receiving a first image of the physical document having a first glare signature and a second image of the physical document having a second glare signature that is different from the first glare signature; determining a first glare map of the first image and a second glare map of the second image; comparing the first glare map to the second glare map; and generating the digital image based on the comparison of the first and second glare maps.Type: GrantFiled: June 11, 2019Date of Patent: December 7, 2021Assignee: ID Metrics Group IncorporatedInventors: Richard Austin Huber, Jr., Matthew William Flagg, Satya Prakash Mallick
-
Publication number: 20210158036Abstract: Methods, systems, and apparatuses, including computer programs, for counterfeit document detection. In one aspect, a method includes obtaining first data representing a first image, providing the obtained first data as an input to a machine learning model that has been trained to determine whether data representing an input image deviates from data representing one or more images of a physical document printed in accordance with a particular anticounterfeiting architecture, obtaining second data that represents output data generated, by the machine learning model, based on the machine learning model processing the obtained first data as an input, determining, based on the obtained second data, whether the first image deviates from data representing one or more images of a physical document printed in accordance with a particular anticounterfeiting architecture, and storing third data indicating that a document, from which the first image was obtained, is a counterfeit document.Type: ApplicationFiled: November 25, 2020Publication date: May 27, 2021Inventor: Richard Austin Huber, JR.
-
Patent number: 10826900Abstract: In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that may include designating specific information within a digital identification as secure user information and designating other specific information as non-secure user information, and provisioning user-specific authentication techniques to restrict unauthorized access to the secure user information. For instance, the secure user information may be prevented from being displayed on the digital identification without the submission of an access credential such as a user-specified code or a user biometric identifier.Type: GrantFiled: December 31, 2015Date of Patent: November 3, 2020Assignee: MorphoTrust USA, LLCInventors: Daniel Poder, Richard Austin Huber
-
Publication number: 20200226405Abstract: Methods for detecting digital or physical tampering of an imaged physical credential include the actions of: receiving a digital image representing a physical credential having one or more high value regions, the digital image including an array of pixels; processing the digital image with a tamper detector to generate an output corresponding to an intrinsic characteristic of the digital image, the tamper detector configured to perform a pixel-level analysis of the high value regions of the digital image with respect to a predetermined tampering signature; and determining, based on the output from the tamper detector, whether the digital image has been digitally tampered with.Type: ApplicationFiled: January 13, 2020Publication date: July 16, 2020Inventors: Richard Austin Huber, JR., Satya Prakash Mallick, Matthew William Flagg, Koustubh Sinhal
-
Patent number: 10534971Abstract: Methods for detecting digital or physical tampering of an imaged physical credential include the actions of: receiving a digital image representing a physical credential having one or more high value regions, the digital image including an array of pixels; processing the digital image with a tamper detector to generate an output corresponding to an intrinsic characteristic of the digital image, the tamper detector configured to perform a pixel-level analysis of the high value regions of the digital image with respect to a predetermined tampering signature; and determining, based on the output from the tamper detector, whether the digital image has been digitally tampered with.Type: GrantFiled: October 13, 2017Date of Patent: January 14, 2020Assignee: ID Metrics Group IncorporatedInventors: Richard Austin Huber, Jr., Satya Prakash Mallick, Matthew William Flagg, Koustubh Sinhal
-
Publication number: 20190377970Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for an active lighting system. In one aspect, a method includes receiving a first image of the physical document having a first glare signature and a second image of the physical document having a second glare signature that is different from the first glare signature; determining a first glare map of the first image and a second glare map of the second image; comparing the first glare map to the second glare map; and generating the digital image based on the comparison of the first and second glare maps.Type: ApplicationFiled: June 11, 2019Publication date: December 12, 2019Inventors: Richard Austin Huber, JR., Matthew William Flagg, Satya Prakash Mallick
-
Patent number: 10439815Abstract: In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that may include validating user data pages extracted from a digital identification in circumstances where a user device that includes the digital identification is either unavailable or presently lacks network connectivity. For instance, an authorized device may be used to extract user data pages from the digital identification by either exchanging communications with the user device using a proximity-based data exchange protocol, or by using a physical identification card to identify the digital identification on a user record. The user data pages may then be validated by comparing checksums associated with user data pages against the checksums within the user record, and decrypting the user data pages using a decryption key that is variably designated by a security status assigned to the digital identification.Type: GrantFiled: December 30, 2015Date of Patent: October 8, 2019Assignee: MorphoTrust USA, LLCInventors: Daniel Poder, Richard Austin Huber
-
Patent number: 10432618Abstract: In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that may include verifying a digital identification using embedded encrypted user credential data that is not viewable to human eyes within the digital identification. For instance, the embedded encrypted user credential data may be variably encrypted by an encryption key that is designated by a security status assigned to the digital identification. The embedded encrypted user credential data may be extracted using an authorized device and decrypted using a decryption key that is associated with the encryption key designated by the security status. The decrypted user credential data may then be used to verify user information included in the digital identification.Type: GrantFiled: December 31, 2015Date of Patent: October 1, 2019Assignee: MorphoTrust USA, LLCInventors: Daniel Poder, Richard Austin Huber
-
Patent number: 10331291Abstract: In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that include verifying a digital identification using visual indicators displayed to an authorized user. For instance, the visual indicators may be a set of graphical representations that are variably selected to be displayed on the digital identification. The visual indicator information may be provided to the authorized user to enable verification of the digital identification without any additional detector devices.Type: GrantFiled: December 31, 2015Date of Patent: June 25, 2019Assignee: Morpho Trust USA, LLCInventors: Daniel Poder, Richard Austin Huber
-
Patent number: 10257495Abstract: In general, one innovative aspect of the subject matter described in this specification may be embodied in methods that include generating a three-dimensional composite image of a user from a set of two dimensional facial images. For instance, a depth map may initially be generated for each of the two dimensional facial images based on depth information. The depth maps may be used to identify matching elements that are used to combine multiple two-dimensional images. The generated three-dimensional composite image may then be displayed on a digital identification of a user device. In some instances, the rendering of the three-dimensional composite image on the user device may be adjusted based on tilting motions.Type: GrantFiled: December 31, 2015Date of Patent: April 9, 2019Assignee: MorphoTrust USA, LLCInventors: Daniel Poder, Brian Martin, Richard Austin Huber
-
Publication number: 20180107887Abstract: Methods for detecting digital or physical tampering of an imaged physical credential include the actions of: receiving a digital image representing a physical credential having one or more high value regions, the digital image including an array of pixels; processing the digital image with a tamper detector to generate an output corresponding to an intrinsic characteristic of the digital image, the tamper detector configured to perform a pixel-level analysis of the high value regions of the digital image with respect to a predetermined tampering signature; and determining, based on the output from the tamper detector, whether the digital image has been digitally tampered with.Type: ApplicationFiled: October 13, 2017Publication date: April 19, 2018Inventors: Richard Austin Huber, JR., Satya Prakash Mallick, Matthew William Flagg, Koustubh Sinhal