Multi-person authentication and validation controls for image sharing
First Claim
Patent Images
1. A method for using multi-person authentication and validation for sharing an image, comprising:
- (a) obtaining an image file of an image, wherein the respective faces of one or more individuals are captured in the image;
(b) identifying, with the aid of one or more processors executing one or more facial recognition algorithms, the one or more individuals captured in the image;
(c) inserting a personal identity control key for each of the one or more individuals identified in the image into the image file;
(d) providing a control policy for the image file, wherein the control policy comprises one or more rules associated with the personal identity control key for each of the one or more individuals identified in the image;
(e) receiving a request to perform an action on the image file;
(f) in accordance with the control policy, requesting authorization instructions from each of the one or more individuals identified in the image to perform the action on the image file;
(g) based at least in part on the authorization instructions received from at least one of the one or more individuals identified in the image, validating the satisfaction of the one or more rules in the control policy to perform the action on the image file; and
(h) based on the validation, allowing or denying the action to be performed on the image file.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided herein are methods and systems for multi-person authentication and validation systems for sharing of images. The multi-person authentication and validation system may identify the respective faces of one or more individuals captured in an image, and request authorization for sharing the image from the one or more individuals captured in the image. In some instances, the multi-person authentication and validation system may provide a different image version for sharing if at least one of the one or more individuals denies authorization.
41 Citations
20 Claims
-
1. A method for using multi-person authentication and validation for sharing an image, comprising:
-
(a) obtaining an image file of an image, wherein the respective faces of one or more individuals are captured in the image; (b) identifying, with the aid of one or more processors executing one or more facial recognition algorithms, the one or more individuals captured in the image; (c) inserting a personal identity control key for each of the one or more individuals identified in the image into the image file; (d) providing a control policy for the image file, wherein the control policy comprises one or more rules associated with the personal identity control key for each of the one or more individuals identified in the image; (e) receiving a request to perform an action on the image file; (f) in accordance with the control policy, requesting authorization instructions from each of the one or more individuals identified in the image to perform the action on the image file; (g) based at least in part on the authorization instructions received from at least one of the one or more individuals identified in the image, validating the satisfaction of the one or more rules in the control policy to perform the action on the image file; and (h) based on the validation, allowing or denying the action to be performed on the image file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented system for sharing an image, comprising:
-
one or more computer processors; and a memory, communicatively coupled to the one or more computer processors, including instructions executable by the one or more processors to; obtain an image file of an image, wherein the respective faces of one or more individuals are captured in the image; execute one or more facial recognition algorithms to identify the one or more individuals captured in the image; insert a personal identity control key for each of the one or more individuals identified in the image into the image file; provide a control policy for the image file, wherein the control policy comprises one or more rules associated with the personal identity control key for each of the one or more individuals identified in the image; receive a request to perform an action on the image file; in accordance with the control policy, request authorization instructions from each of the one or more individuals identified in the image to perform the action on the image file; based at least in part on authorization instructions received from at least one of the one or more individuals identified in the image, validate the satisfaction of one or more rules in the control policy to perform the action on the image file; and based on validation, allow or deny the action to be performed on the image file. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification