System for provisioning and allowing secure access to a virtual credential
First Claim
1. A system for authentication using a live user determination, the system comprising:
- one or more memory devices having computer readable code stored thereon; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to;
receive a request from a user through a user application to access an organization application to take an action, wherein the user application is located on a mobile device of the user and the request is received from the mobile device;
receive a verified identification image, wherein the verified identification image is captured by the user through the mobile device and received from the mobile device, and wherein the verified identification image includes one or more characters added to the verified identification image;
receive a liveness identification image, wherein the liveness identification image is a video of the user, and wherein the liveness identification image is captured by the user through the mobile device and received from the mobile device, and wherein the video comprises a recitation of the one or more characters added to the verificated identification image; and
determine that the user is authenticated for the action based on the action, the verified identification image, the liveness identification image, and the one or more characters included in the verification identification image and recited in the video.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer products, and methods are described herein for improved authentication utilizing two factor authentication of a user. The two factors include a verified identification and a liveness identification. The verified identification may be a governmental verified identification, and the liveness identification may be a video of the user. The user may capture the verified identification and the liveness identification using the user'"'"'s mobile device. The organization may authenticate the user by identifying the user from the verified identification image and identifying that the user is active by identifying movement from the liveness identification image. Additional authentication may include requiring and/or identifying an identifier from the liveness identification image (e.g., movement, object, characters, or the like), and/or capture image data related to a time or a location at which the images were captured.
-
Citations
20 Claims
-
1. A system for authentication using a live user determination, the system comprising:
-
one or more memory devices having computer readable code stored thereon; and one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to; receive a request from a user through a user application to access an organization application to take an action, wherein the user application is located on a mobile device of the user and the request is received from the mobile device; receive a verified identification image, wherein the verified identification image is captured by the user through the mobile device and received from the mobile device, and wherein the verified identification image includes one or more characters added to the verified identification image; receive a liveness identification image, wherein the liveness identification image is a video of the user, and wherein the liveness identification image is captured by the user through the mobile device and received from the mobile device, and wherein the video comprises a recitation of the one or more characters added to the verificated identification image; and determine that the user is authenticated for the action based on the action, the verified identification image, the liveness identification image, and the one or more characters included in the verification identification image and recited in the video. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented method for authentication using a live user determination, the method comprising:
-
receiving, by one or more processors, a request from a user through a user application to access an organization application to take an action, wherein the user application is located on a mobile device of the user and the request is received from the mobile device; receiving, by the one or more processors, a verified identification image, wherein the verified identification image is captured by the user through the mobile device and received from the mobile device, and wherein the verified identification image includes one or more characters added to the verified identification image; receiving, by the one or more processors, a liveness identification image, wherein the liveness identification image is a video of the user, and wherein the liveness identification image is captured by the user through the mobile device and received from the mobile device, and wherein the video comprises a recitation of the one or more characters added to the verified identification image; and determining, by the one or more processors, that the user is authenticated for the action based on the action, the verified identification image, the liveness identification image and the one or more characters included in the verification identification image and recited in the video. - View Dependent Claims (16, 17, 18)
-
-
19. A computer program product for authentication using a live user determination, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured to receive a request from a user through a user application to access an organization application to take an action, wherein the user application is located on a mobile device of the user and the request is received from the mobile device; an executable portion configured to receive a verified identification image, wherein the verified identification image is captured by the user through the mobile device and received from the mobile device, and wherein the verified identification image includes one or more characters added to the verified identification image; an executable portion configured to receive a liveness identification image, wherein the liveness identification image is a video of the user, and wherein the liveness identification image is captured by the user through the mobile device and received from the mobile device, and wherein the video comprises a recitation of the one or more characters added to the verified identification image; and an executable portion configured to determine that the user is authenticated for the action based on the action, the verified identification image, the liveness identification image, and the one or more characters included in the verification identification image and recited in the video. - View Dependent Claims (20)
-
Specification