Face-controlled liveness verification
First Claim
1. A method comprising:
- receiving, by a computing device from a user, an indication that the user wishes to access a secured resource on the computing device;
attempting, by the computing device, to authenticate the user a first time based on first facial biometric data presented by the user to a face-based authentication system of the computing device; and
if the attempting to authenticate the user the first time is successful;
directing, by the computing device, the user to look at a reference point in a graphical user interface (GUI) of the computing device, the reference point corresponding to an initial location of a virtual pointer;
capturing, by the computing device, one or more images of a face of the user while the user is looking at the reference point;
determining, by the computing device based on the one or more images, a reference frame for the user indicating a first gaze or a first face pose of the user when looking at the reference point;
presenting, by the computing device to the user, a sequential series of pluralities of targets on the GUI, each target being a visual element designed to direct the user'"'"'s attention to a location in the GUI, wherein at each step in the sequential series the plurality of targets for the step includes a valid target and an invalid target, wherein the valid target corresponds to a secret known to the user, and wherein the number of steps in the sequential series is based upon one or more criteria pertaining to the secured resource;
determining, by the computing device, whether the user has successfully hit the valid targets in the sequential series by checking whether the user has moved the virtual pointer over the valid targets, the checking comprising;
capturing one or more further images tracking movement of the user'"'"'s face; and
comparing a gaze or a face pose of the user in each of the one or more further images against the first gaze or the first face pose in the reference frame in order to determine how far and in which direction the user has moved the virtual pointer from the reference point;
if the user has successfully hit the valid targets, attempting, by the computing device, to authenticate the user a second time based on second facial biometric data presented by the user to the face-based authentication system;
if the attempting to authenticate the user the second time fails, denying, by the computing device, the user access to the secured resource; and
if the attempting to authenticate the user the second time is successful, concluding, by the computing device, that the user is a live subject and granting the user access to the secured resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for implementing face-controlled liveness verification are provided. In one embodiment, a computing device can present, to a user, a sequential series of targets on a graphical user interface (GUI) of the computing device, where each target is a visual element designed to direct the user'"'"'s attention to a location in the GUI. The computing device can further determine whether the user has successfully hit each target, where the determining comprises tracking movement of a virtual pointer controlled by the user'"'"'s gaze or face pose and checking whether the user has moved the virtual pointer over each target. If the user has successfully hit each target, the computing device can conclude that the user is a live subject.
33 Citations
13 Claims
-
1. A method comprising:
-
receiving, by a computing device from a user, an indication that the user wishes to access a secured resource on the computing device; attempting, by the computing device, to authenticate the user a first time based on first facial biometric data presented by the user to a face-based authentication system of the computing device; and if the attempting to authenticate the user the first time is successful; directing, by the computing device, the user to look at a reference point in a graphical user interface (GUI) of the computing device, the reference point corresponding to an initial location of a virtual pointer; capturing, by the computing device, one or more images of a face of the user while the user is looking at the reference point; determining, by the computing device based on the one or more images, a reference frame for the user indicating a first gaze or a first face pose of the user when looking at the reference point; presenting, by the computing device to the user, a sequential series of pluralities of targets on the GUI, each target being a visual element designed to direct the user'"'"'s attention to a location in the GUI, wherein at each step in the sequential series the plurality of targets for the step includes a valid target and an invalid target, wherein the valid target corresponds to a secret known to the user, and wherein the number of steps in the sequential series is based upon one or more criteria pertaining to the secured resource; determining, by the computing device, whether the user has successfully hit the valid targets in the sequential series by checking whether the user has moved the virtual pointer over the valid targets, the checking comprising; capturing one or more further images tracking movement of the user'"'"'s face; and comparing a gaze or a face pose of the user in each of the one or more further images against the first gaze or the first face pose in the reference frame in order to determine how far and in which direction the user has moved the virtual pointer from the reference point; if the user has successfully hit the valid targets, attempting, by the computing device, to authenticate the user a second time based on second facial biometric data presented by the user to the face-based authentication system; if the attempting to authenticate the user the second time fails, denying, by the computing device, the user access to the secured resource; and if the attempting to authenticate the user the second time is successful, concluding, by the computing device, that the user is a live subject and granting the user access to the secured resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium having stored thereon program code executable by a processor of a computing device, the program code comprising:
-
code that causes the processor to receive, from a user, an indication that the user wishes to access a secured resource on the computing device; code that causes the processor to attempt to authenticate the user a first time based on first facial biometric data presented by the user to a face-based authentication system of the computing device; and if the attempt to authenticate the user the first time is successful; code that causes the processor to direct the user to look at a reference point in a graphical user interface (GUI) of the computing device, the reference point corresponding to an initial location of a virtual pointer; code that causes the processor to capture one or more images of a face of the user while the user is looking at the reference point; code that causes the processor to determine, based on the one or more images, a reference frame for the user indicating a first gaze or a first face pose of the user when looking at the reference point; code that causes the processor to present to the user, a sequential series of pluralities of targets on the GUI, each target being a visual element designed to direct the user'"'"'s attention to a location in the GUI, wherein at each step in the sequential series the plurality of targets for the step includes a valid target and an invalid target, wherein the valid target corresponds to a secret known to the user, and wherein the number of steps in the sequential series is based upon one or more criteria pertaining to the secured resource; code that causes the processor to determine whether the user has successfully hit the valid targets in the sequential series by checking whether the user has moved the virtual pointer over the valid targets, the checking comprising; capturing one or more further images tracking movement of the user'"'"'s face; and comparing a gaze or a face pose of the user in each of the one or more further images against the first gaze or the first face pose in the reference frame in order to determine how far and in which direction the user has moved the virtual pointer from the reference point; if the user has successfully hit the valid targets, code that causes the processor to attempt to authenticate the user a second time based on second facial biometric data presented by the user to the face-based authentication system; if the attempt to authenticate the user the second time fails, code that causes the processor to deny the user access to the secured resource; and if the attempt to authenticate the user the second time is successful, code that causes the processor to conclude that the user is a live subject and grant the user access to the secured resource.
-
-
13. A computing device comprising:
-
a camera; a display; a processor; and a memory having stored thereon program code which, when executed by the processor, causes the processor to; receive, from a user, an indication that the user wishes to access a secured resource on the computing device; attempt to authenticate the user a first time based on first facial biometric data presented by the user to a face-based authentication system of the computing device; and if the attempt to authenticate the user the first time is successful; direct the user to look at a reference point in a graphical user interface (GUI) shown on the display, the reference point corresponding to an initial location of a virtual pointer; capture one or more images of a face of the user via the camera while the user is looking at the reference point; determine, based on the one or more images, a reference frame for the user indicating a first gaze or a first face pose of the user when looking at the reference point; present, to the user, a sequential series of pluralities of targets on the GUI, each target being a visual element designed to direct the user'"'"'s attention to a location in the GUI, wherein at each step in the sequential series the plurality of targets for the step includes a valid target and an invalid target, wherein the valid target corresponds to a secret known to the user, and wherein the number of steps in the sequential series is based upon one or more criteria pertaining to the secured resource; determine whether the user has successfully hit the valid targets in the sequential series by checking whether the user has moved the virtual pointer over the valid targets, the checking comprising; capturing one or more further images tracking movement of the user'"'"'s face; and comparing a gaze or a face pose of the user in each of the one or more further images against the first gaze or the first face pose in the reference frame in order to determine how far and in which direction the user has moved the virtual pointer from the reference point; if the user has successfully hit the valid targets, attempt to authenticate the user a second time based on second facial biometric data presented by the user to the face-based authentication system; if the attempt to authenticate the user the second time fails, deny the user access to the secured resource; and if the attempt to authenticate the user the second time is successful, conclude that the user is a live subject and grant the user access to the secured resource.
-
Specification