Columbus, OH, United States of America

Jeffrey James Wolf


 

Average Co-Inventor Count = 6.0

ph-index = 1


Company Filing History:


Years Active: 2022

Loading Chart...
Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovations in Identity Verification by Jeffrey James Wolf

Introduction: Jeffrey James Wolf is an inventive mind based in Columbus, Ohio, who has made significant strides in the field of identity and liveness verification technology. With one patent to his name, his contributions have the potential to enhance security measures across various applications.

Latest Patents: Jeffrey's patent focuses on identity and liveness verification. The invention outlines a method that includes receiving both a color image and an infrared (IR) image taken simultaneously. It involves providing a set of facial landmarks shown in the color image and determining depth values for each of these landmarks using data from the IR image. By calculating an average depth difference among a subset of these landmarks and comparing it to a predetermined threshold, the method enables selective authentication of individuals based on the analysis.

Career Highlights: Currently, Jeffrey is affiliated with Accenture Global Solutions Limited, where he applies his innovative mindset to develop cutting-edge solutions. His patent reflects a growing trend in utilizing advanced imaging techniques for enhancing the security of identity verification processes.

Collaborations: Throughout his career, Jeffrey has collaborated with talented colleagues, including Michael James Smith and Christopher J McClellan. Their joint efforts in technology development and research sustain innovation within their organization and the broader industry.

Conclusion: Jeffrey James Wolf's work in identity and liveness verification showcases the importance of innovation in enhancing security measures. As he continues to collaborate with other professionals in the field, his research and developments are poised to make a lasting impact on technology and security protocols.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…