One-to-many matching with application to efficient privacy-preserving re-identification
First Claim
1. An authentication system comprising:
- an authenticator comprising;
an electronic data processing device;
a non-transitory storage medium storing instructions readable and executable by the electronic data processing device to perform an authentication process to determine whether a person or object to be authenticated belongs to a set of authorized persons or objects, the authentication process including the operations of;
acquiring a query signature comprising a vector whose elements store values of an ordered set of features for the person or object to be authenticated;
computing a single inner product of the query signature and a single aggregate signature comprising a vector whose elements store values of the ordered set of features for the set of authorized persons or objects wherein the single aggregate signature is not uniquely associated with any particular authorized person or object of the set of authorized persons or objects; and
determining whether the person or object to be authenticated is a member of the set of authorized persons or objects based on the single inner product of the query signature and the single aggregate signature; and
an authenticator training component comprising an electronic data processing device configured to generate the single aggregate signature representing the set of authorized persons or objects by operations including;
generating a set of authorized signatures by acquiring a signature for each authorized person or object comprising a vector whose elements store values of the ordered set of features for that authorized person or object; and
determining the single aggregate signature by whitening the authorized signatures using a set of background signatures that are not labeled as to membership in the set of authorized signatures and aggregating the whitened authorized signatures;
wherein the determining of the single aggregate signature does not use any signature that is labeled to indicate it is an unauthorized signature that is not in the set of authorized signatures.
4 Assignments
0 Petitions
Accused Products
Abstract
Authentication methods are disclosed for determining whether a person or object to be authenticated is a member of a set of authorized persons or objects. A query signature is acquired comprising a vector whose elements store values of an ordered set of features for the person or object to be authenticated. The query signature is compared with an aggregate signature comprising a vector whose elements store values of the ordered set of features for the set of authorized persons or objects. The individual signatures for the authorized persons or objects are not stored; only the aggregate signature. It is determined whether the person or object to be authenticated is a member of the set of authorized persons or objects based on the comparison. The comparing may comprise computing an inner product of the query signature and the aggregate signature, with the determining being based on the inner product.
-
Citations
19 Claims
-
1. An authentication system comprising:
-
an authenticator comprising; an electronic data processing device; a non-transitory storage medium storing instructions readable and executable by the electronic data processing device to perform an authentication process to determine whether a person or object to be authenticated belongs to a set of authorized persons or objects, the authentication process including the operations of; acquiring a query signature comprising a vector whose elements store values of an ordered set of features for the person or object to be authenticated; computing a single inner product of the query signature and a single aggregate signature comprising a vector whose elements store values of the ordered set of features for the set of authorized persons or objects wherein the single aggregate signature is not uniquely associated with any particular authorized person or object of the set of authorized persons or objects; and determining whether the person or object to be authenticated is a member of the set of authorized persons or objects based on the single inner product of the query signature and the single aggregate signature; and an authenticator training component comprising an electronic data processing device configured to generate the single aggregate signature representing the set of authorized persons or objects by operations including; generating a set of authorized signatures by acquiring a signature for each authorized person or object comprising a vector whose elements store values of the ordered set of features for that authorized person or object; and determining the single aggregate signature by whitening the authorized signatures using a set of background signatures that are not labeled as to membership in the set of authorized signatures and aggregating the whitened authorized signatures; wherein the determining of the single aggregate signature does not use any signature that is labeled to indicate it is an unauthorized signature that is not in the set of authorized signatures. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An authentication method for determining whether a person or object to be authenticated is a member of a set of authorized persons or objects, the authentication method comprising:
-
generating a set of authorized signatures for the set of authorized persons or objects by acquiring a signature for each authorized person or object comprising a vector whose elements store values of an ordered set of features for that authorized person or object; determining a single aggregate signature whose elements store values of the ordered set of features for the set of authorized persons or objects by aggregating the authorized signatures of the set of authorized signatures; acquiring a query signature comprising a vector whose elements store values of the ordered set of features for the person or object to be authenticated; performing a single signature comparison comparing the query signature and the single aggregate signature; and determining whether the person or object to be authenticated is a member of the set of authorized persons or objects based on the single signature comparison; wherein one of; (1) the determining of the single aggregate signature comprises determining the single aggregate signature to set the inner product of each authorized signature and the single aggregate signature to a target inner product value and the determining whether the person or object to be authenticated is a member of the set of authorized persons or objects comprises comparing the single inner product of the query signature and the single aggregate signature with the target inner product value;
or(2) the determining of the single aggregate signature comprises sum aggregating the authorized signatures and the determining whether the person or object to be authenticated is a member of the set of authorized persons or objects comprises performing a threshold operation on the single inner product of the query signature and the single aggregate signature. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory storage medium storing instructions readable and executable by an electronic data processing device to perform an authentication method to determine whether a person or object to be authenticated is a member of a set of authorized persons or objects, the authentication method comprising:
-
operating a camera or biometric sensor to acquire data on the person or object to be authenticated; extracting from the acquired data a query signature comprising a vector whose elements store values of an ordered set of features for the person or object to be authenticated; computing a single inner product of the query signature and a single aggregate signature comprising a vector whose elements store values of the ordered set of features for the set of authorized persons or objects; and determining whether the person or object to be authenticated is a member of the set of authorized persons or objects by comparing the single inner product of the query signature and the single aggregate signature with a target inner product value; wherein the authentication method further comprises generating the single aggregate signature representing the set of authorized persons or objects by operations including; operating a camera or biometric sensor to acquire data on each authorized person or object; extracting from the acquired data an authorized signature for each authorized person or object comprising a vector whose elements store values of the ordered set of features for the authorized person or object in order to generate a set of authorized signatures; and determining the single aggregate signature to set an inner product of each authorized signature and the aggregate signature to the target inner product value.
-
Specification