Authentication based on heartbeat detection and facial recognition in video data
First Claim
1. A computer-implemented method performed by at least one processor, the method comprising:
- accessing, by the at least one processor, video data of a user;
accessing, by the at least one processor, at least one image of the user;
comparing, by the at least one processor, the at least one image to an aggregate image of the user that is developed based on previously captured images of the user;
analyzing, by the at least one processor, the video data to attempt to detect a pulse of the user;
determining, by the at least one processor, a score based on a plurality of weights including a first weight that corresponds to detecting the pulse of the user and a second weight that corresponds to determining that the at least one image corresponds to the aggregate image, wherein the first weight is different than the second weight, and wherein the second weight is based at least partly on a number of the previously captured images used to develop the aggregate image of the user; and
providing, by the at least one processor, access to secure information based at least partly on determining that the score is at least a threshold score.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for authenticating a user to access information through an application executing on a computing device. Multiple authentication methods may be used in combination to authenticate the user with greater confidence than authentication provided by a single method, and to verify that the user is a live person and not an image or video. Facial recognition may be used in conjunction with heartbeat detection, via video analysis, to verify the user'"'"'s identity and confirm that the user is live. Facial recognition may include capturing an image of the user'"'"'s face and comparing certain points on the face with previously gathered information regarding the user. Heartbeat detection may include capturing a video segment of the user, stabilizing the captured video data, applying motion magnification techniques to the stabilized video data, and analyzing the stabilized, magnified video data to determine a presence of the user'"'"'s heartbeat.
15 Citations
20 Claims
-
1. A computer-implemented method performed by at least one processor, the method comprising:
-
accessing, by the at least one processor, video data of a user; accessing, by the at least one processor, at least one image of the user; comparing, by the at least one processor, the at least one image to an aggregate image of the user that is developed based on previously captured images of the user; analyzing, by the at least one processor, the video data to attempt to detect a pulse of the user; determining, by the at least one processor, a score based on a plurality of weights including a first weight that corresponds to detecting the pulse of the user and a second weight that corresponds to determining that the at least one image corresponds to the aggregate image, wherein the first weight is different than the second weight, and wherein the second weight is based at least partly on a number of the previously captured images used to develop the aggregate image of the user; and providing, by the at least one processor, access to secure information based at least partly on determining that the score is at least a threshold score. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
at least one processor; and memory communicatively coupled to the at least one processor, the memory storing instructions which, when executed, cause the at least one processor to perform operations comprising; accessing video data of a user; accessing at least one image of the user; comparing the at least one image to an aggregate image of the user that is developed based on previously captured images of the user; analyzing the video data to attempt to detect a pulse of the user; determining a score based on a plurality of weights including a first weight that corresponds to detecting the pulse of the user and a second weight that corresponds to determining that the at least one image corresponds to the aggregate image, wherein the first weight is different than the second weight, and wherein the second weight is based at least partly on a number of the previously captured images used to develop the aggregate image of the user; and providing access to secure information based at least partly on determining that the score is at least a threshold score. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer-readable storage media storing instructions which, when executed, cause at least one processor to perform operations comprising:
-
accessing video data of a user; accessing at least one image of the user; comparing the at least one image to an aggregate image of the user that is developed based on previously captured images of the user; analyzing the video data to attempt to detect a pulse of the user; determining a score based on a plurality of weights including a first weight that corresponds to detecting the pulse of the user and a second weight that corresponds to determining that the at least one image corresponds to the aggregate image, wherein the first weight is different than the second weight, and wherein the second weight is based at least partly on a number of the previously captured images used to develop the aggregate image of the user; and providing access to secure information based at least partly on determining that the score is at least a threshold score. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification