System for electronic authentication with live user determination
First Claim
1. A system for authentication using a live user determination, the system comprising:
- one or more memory devices having computer readable code store thereon; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to;
receive a request from a user through a user application to access an organization application, wherein the user application is located on a user computer system and the request is received from the user computer system;
provide authentication requirements to the user application for the authentication of the user, wherein the authentication requirements include requiring at least a verified identification image and a liveness identification image and providing the user one or more characters, keywords, or phrases to recite in the liveness identification image, and wherein the authentication requirements are provided to the user application through the user computer system;
receive the verified identification image from the user application, wherein the verified identification image is an image of a government issued identification card, wherein the verified identification image is captured using an image capture device of the user computer system, and wherein the verified identification image is received through the user computer system;
receive the liveness identification image from the user application, wherein the liveness identification image is a video of the user and comprises at least an image of the user, wherein the liveness identification image is captured using an image capture device of the user computer system, and wherein the liveness identification image is received through the user computer system;
receive a verified identification image time stamp and a verified identification image location stamp for the verified identification image from the user computer system;
receive a liveness image time stamp and a liveness identification image location stamp from the user computer system; and
determine the authentication of the user based on determining that the verified identification image and the liveness identification image include the user, the verified identification image time stamp and the liveness image time stamp both occur within a time period, the verified identification image location stamp and the liveness identification image location stamp occur within a location requirement, and that the one or more characters, the keywords, or the phrases are included in the video before the authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer products, and methods are described herein for improved authentication utilizing two factor authentication of a user. The two factors include a verified identification and a liveness identification. The verified identification may be a governmental verified identification, and the liveness identification may be a video of the user. The user may capture the verified identification and the liveness identification using the user'"'"'s mobile device. The organization may authenticate the user by identifying the user from the verified identification image and identifying that the user is active by identifying movement from the liveness identification image. Additional authentication may include requiring and/or identifying an identifier from the liveness identification image (e.g., movement, object, characters, or the like), and/or capture image data related to a time or a location at which the images were captured.
115 Citations
16 Claims
-
1. A system for authentication using a live user determination, the system comprising:
-
one or more memory devices having computer readable code store thereon; and one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute the computer readable code to; receive a request from a user through a user application to access an organization application, wherein the user application is located on a user computer system and the request is received from the user computer system; provide authentication requirements to the user application for the authentication of the user, wherein the authentication requirements include requiring at least a verified identification image and a liveness identification image and providing the user one or more characters, keywords, or phrases to recite in the liveness identification image, and wherein the authentication requirements are provided to the user application through the user computer system; receive the verified identification image from the user application, wherein the verified identification image is an image of a government issued identification card, wherein the verified identification image is captured using an image capture device of the user computer system, and wherein the verified identification image is received through the user computer system; receive the liveness identification image from the user application, wherein the liveness identification image is a video of the user and comprises at least an image of the user, wherein the liveness identification image is captured using an image capture device of the user computer system, and wherein the liveness identification image is received through the user computer system; receive a verified identification image time stamp and a verified identification image location stamp for the verified identification image from the user computer system; receive a liveness image time stamp and a liveness identification image location stamp from the user computer system; and determine the authentication of the user based on determining that the verified identification image and the liveness identification image include the user, the verified identification image time stamp and the liveness image time stamp both occur within a time period, the verified identification image location stamp and the liveness identification image location stamp occur within a location requirement, and that the one or more characters, the keywords, or the phrases are included in the video before the authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 16)
-
-
11. A computer implemented method for authentication using a live user determination, the method comprising:
-
receiving, by one or more processors, a request from a user through a user application to access an organization application, wherein the user application is located on a user computer system and the request is received from the user computer system; provide, by the one or more processors, authentication requirements to the user application for the authentication of the user, wherein the authentication requirements include requiring at least a verified identification image and a liveness identification image and providing the user one or more characters, keywords, or phrases to recite in the liveness identification image, and wherein the authentication requirements are provided to the user application through the user computer system; receive, by the one or more processors, the verified identification image from the user application, wherein the verified identification image is an image of a government issued identification card, wherein the verified identification image is captured using an image capture device of the user computer system, and wherein the verified identification image is received through the user computer system; receive, by the one or more processors, the liveness identification image from the user application, wherein the liveness identification image is a video of the user and comprises at least an image of the user, wherein the liveness identification image is captured using an image capture device of the user computer system, and wherein the liveness identification image is received through the user computer system; receive, by the one or more processors, a verified identification image time stamp and a verified identification image location stamp for the verified identification image; receive, by the one or more processors, a liveness image time stamp and a liveness identification image location stamp; and determine, by the one or more processors, the authentication of the user based on determining that the verified identification image and the liveness identification image include the user, the verified identification image time stamp and the liveness image time stamp both occur within a time period, the verified identification image location stamp and the liveness identification image location stamp occur within a location requirement, and that the one or more characters, the keywords, or the phrases are included in the video before the authentication. - View Dependent Claims (12, 13, 14)
-
-
15. A computer program product for authentication using a live user determination, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured to receive a request from a user through a user application to access an organization application, wherein the user application is located on a user computer system and the request is received from the user computer system; an executable portion configured to provide authentication requirements to the user application for the authentication of the user, wherein the authentication requirements include requiring at least a verified identification image and a liveness identification image and providing the user one or more characters, keywords, or phrases to recite in the liveness identification image, and wherein the authentication requirements are provided to the user application through the user computer system; an executable portion configured to receive the verified identification image from the user application, wherein the verified identification image is an image of a government issued identification card, wherein the verified identification image is captured using an image capture device of the user computer system, and wherein the verified identification image is received through the user computer system; an executable portion configured to receive the liveness identification image from the user application, wherein the liveness identification image is a video of the user and comprises at least an image of the user, wherein the liveness identification image is captured using an image capture device of the user computer system, and wherein the liveness identification image is received through the user computer system; and an executable portion configured to receive a verified identification image time stamp and a verified identification image location stamp for the verified identification image; an executable portion configured to receive a liveness image time stamp and a liveness identification image location stamp; an executable portion configured to determine the authentication of the user based on determining that the verified identification image and the liveness identification image include the user, the verified identification image time stamp and the liveness image time stamp both occur within a time period, the verified identification image location stamp and the liveness identification image location stamp occur within a location requirement, and that the one or more characters, the keywords, or the phrases are included in the video before the authentication.
-
Specification