Multi-person authentication and validation controls for image sharing
First Claim
Patent Images
1. A method for using multi-person authentication and validation for sharing an image, comprising:
- (a) obtaining an image file of an image, wherein respective representations of one or more individuals are captured in the image, wherein the image file is associated with a control policy;
(b) initiating an authentication and validation session upon a trigger event;
(c) identifying, with aid of one or more processors executing one or more identity recognition algorithms, the one or more individuals captured in the image;
(d) receiving a request to perform an action on the image file;
(e) requesting authorization instructions from at least one of the one or more individuals identified in the image to perform the action on the image file; and
(f) based at least in part on the control policy and the authorization instructions received from the at least one of the one or more individuals identified in the image, allowing or denying the action to be performed on the file.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided herein are methods and systems for multi-person authentication and validation systems for sharing of images. The multi-person authentication and validation system may identify the respective representations of one or more individuals captured in an image, and request authorization for sharing the image from the one or more individuals captured in the image. In some instances, the multi-person authentication and validation system may provide a different image version for sharing if at least one of the one or more individuals denies authorization.
46 Citations
19 Claims
-
1. A method for using multi-person authentication and validation for sharing an image, comprising:
-
(a) obtaining an image file of an image, wherein respective representations of one or more individuals are captured in the image, wherein the image file is associated with a control policy; (b) initiating an authentication and validation session upon a trigger event; (c) identifying, with aid of one or more processors executing one or more identity recognition algorithms, the one or more individuals captured in the image; (d) receiving a request to perform an action on the image file; (e) requesting authorization instructions from at least one of the one or more individuals identified in the image to perform the action on the image file; and (f) based at least in part on the control policy and the authorization instructions received from the at least one of the one or more individuals identified in the image, allowing or denying the action to be performed on the file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented system for sharing an image, comprising:
-
one or more computer processors; and a memory, communicatively coupled to the one or more computer processors, including instructions executable by the one or more processors to; obtain an image file of an image, wherein respective representations of one or more individuals are captured in the image, wherein the image file is associated with a control policy; execute one or more identity recognition algorithms to identify the one or more individuals captured in the image; receive a request to perform an action on the image file; request authorization instructions from at least one of the one or more individuals identified in the image to perform the action on the image file; and based at least in part on the control policy and the authorization instructions received from the at least one of the one or more individuals identified in the image, allow or deny the action to be performed on the image file. - View Dependent Claims (19)
-
Specification