Image analysis for user authentication
First Claim
1. A mobile phone, comprising:
- a processor; and
memory storing instructions that, when executed by the processor, cause the mobile phone to;
obtain a request to authorize a transaction;
capture, using a camera on the mobile phone, a two dimensional infrared image of at least a portion of a face of a user interacting with the mobile phone;
project a pattern of infrared dots from the mobile phone onto a face of the user;
obtain a reflection of at least a subset of the infrared dots using an infrared detector;
analyze the reflection of the infrared dots to verify that the user is in proximity of the mobile phone;
identify the user based at least in part on the two dimensional infrared image and the reflection of at least a subset of the infrared dots;
authenticate the user as a result of the identity of the user being recognized as an authorized user and as a result of the user'"'"'s face being in the proximity of the mobile phone; and
allow a transaction to be performed as a result of the user being authenticated.
1 Assignment
0 Petitions
Accused Products
Abstract
A user can be authenticated to any of a number of computing devices using an authentication process that recognizes the user and verifies that an actual human being is attempting to be authenticated, in order to minimize the ability of another person to spoof the authentication process. A model of a user can be generated and stored in the cloud, enabling that model to be synchronized across various devices. A user accessing one of these devices can have image information captured, which can be used with a facial recognition process, to recognize the user, and with a human verification process, to verify that the facial information corresponds to a human user. Various approaches such as visual analysis, three-dimensional imaging, and thermal imaging can be used to verify that the human user being recognized is interactive with the device.
195 Citations
20 Claims
-
1. A mobile phone, comprising:
-
a processor; and memory storing instructions that, when executed by the processor, cause the mobile phone to; obtain a request to authorize a transaction; capture, using a camera on the mobile phone, a two dimensional infrared image of at least a portion of a face of a user interacting with the mobile phone; project a pattern of infrared dots from the mobile phone onto a face of the user; obtain a reflection of at least a subset of the infrared dots using an infrared detector; analyze the reflection of the infrared dots to verify that the user is in proximity of the mobile phone; identify the user based at least in part on the two dimensional infrared image and the reflection of at least a subset of the infrared dots; authenticate the user as a result of the identity of the user being recognized as an authorized user and as a result of the user'"'"'s face being in the proximity of the mobile phone; and allow a transaction to be performed as a result of the user being authenticated. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method of authenticating a user of a mobile device, comprising:
-
capturing, using an image sensor associated with the mobile device, an image of at least a portion of a face of the user of the mobile device; projecting a pattern of infrared dots from the mobile device onto the face of the user; obtaining a reflection of a subset of the infrared dots using an infrared detector; determining, based at least in part on the reflection, that the user corresponds to a physical being within proximity of the mobile device; determining an identity of the user by at least analyzing a portion of the image and the reflection; and authenticating the user as a result of the identity of the user being recognized as an authorized user and as a result of the user corresponding to a physical being in the proximity of the mobile device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium storing instructions that, as a result of being executed by a processor on a mobile computing device cause the mobile computing device to:
-
capture, using an infrared camera on the mobile device, an infrared image of at least a portion of a face of a user of the mobile device; project a pattern of infrared dots from the mobile device onto the face of the user; obtain a reflection of a subset of the projected infrared dots using the infrared camera on the mobile device; determine, using the reflection of the subset of the projected infrared dots, that the user represented in the image matches a three-dimensional model of an authorized user stored in a memory on the mobile device; and authorize a request as a result of having determined that the user is the authorized user. - View Dependent Claims (18, 19, 20)
-
Specification