Method to verify identity using a previously collected biometric image/data
First Claim
1. A method for verifying biometric authentication comprising:
- receiving root biometric identity information, corresponding to a user, from a trusted biometric information source to establish the root biometric identity information which is trusted and verified by an entity;
storing the root biometric identity information in a database;
subsequently, during an authentication process;
capturing a first image with an authentication camera, the first image captured when the user is a first distance from the authentication camera;
capturing a second image with the authentication camera, the second image captured when the user is a second distance from the authentication camera, such that the first distance is different than the second distance and the first image and the second image include a face of the user;
processing the first image to create first authentication biometric information;
processing the second image to create second authentication biometric information;
comparing the first authentication biometric information to the second authentication biometric information;
comparing the root biometric identity information with the first authentication biometric information, the second authentication biometric information, or both;
authenticating the user when;
the comparing determines that the first authentication biometric information matches the second authentication biometric information within a threshold, but are not identical due to distortion causing either first image or the second image to be distorted;
the comparing determines that the root biometric identity information matches the first authentication biometric information, the second authentication biometric information, or both within a threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating a user in an authentication system using a computing device configured to capture authentication biometric identity information. The authentication biometric identify information captured during an authentication session. The authentication biometric identify information may comprise or be derived from one or more images of the user being authenticated. The authentication biometric identify information is compared to root identify biometric information. The root identify biometric information is captured from a trusted source, such as trusted devices located at trusted locations, such as a government entity, financial institution, or business. Identity verification may occur by comparing the trusted root identify biometric information to the biometric identify information captured during an authentication session. Liveness determination may also occur to verify the user is a live person. Liveness determination may include comparing two images of the user such that the two images are captured at different distances from the user.
225 Citations
16 Claims
-
1. A method for verifying biometric authentication comprising:
-
receiving root biometric identity information, corresponding to a user, from a trusted biometric information source to establish the root biometric identity information which is trusted and verified by an entity; storing the root biometric identity information in a database; subsequently, during an authentication process; capturing a first image with an authentication camera, the first image captured when the user is a first distance from the authentication camera; capturing a second image with the authentication camera, the second image captured when the user is a second distance from the authentication camera, such that the first distance is different than the second distance and the first image and the second image include a face of the user; processing the first image to create first authentication biometric information; processing the second image to create second authentication biometric information; comparing the first authentication biometric information to the second authentication biometric information; comparing the root biometric identity information with the first authentication biometric information, the second authentication biometric information, or both; authenticating the user when; the comparing determines that the first authentication biometric information matches the second authentication biometric information within a threshold, but are not identical due to distortion causing either first image or the second image to be distorted; the comparing determines that the root biometric identity information matches the first authentication biometric information, the second authentication biometric information, or both within a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for verifying biometric authentication of a user comprising:
-
storing root biometric identity information of the user obtained from a trusted biometric sensing device which is located at a trusted location to establish the root biometric identity information as trusted and verified, the root identity information based on at least one facial image of the user and at least one item of user identity information; during an authentication session; receiving a root biometric identity information at a first computing device; generating authentication biometric identity information from at least a first image captured at a first distance from the user and a second image captured a second distance from the user such that the first image and the second image of the user are captured with an image capture device of the first computing device or of a second computing device during an authentication session; comparing, with the first computing device, the root biometric identity information with at least a portion of the authentication biometric identity information; comparing the first image to the second image to determine if the first image or the second image are distorted due to the change in distance; and authenticating the user when; the root biometric identity information matches the authentication biometric identity information within a predetermined threshold; and the first image or the second image is distorted due to the change in distance between the user and the image capture device from the first distance to the second distance. - View Dependent Claims (9, 10, 11, 12)
-
-
13. An identity authentication system comprising:
-
a first computing device configured to request and receive root biometric identity information;
for a user, from a trusted source, the trusted source comprising a government affiliated entity or a financial institution;a second computing device configured to, during an authentication session; create authentication biometric information captured from the user during the authentication session, wherein the authentication biometric information is derived from at least a first image and a second image which are captured by a camera associated with the second computing device, the first image captured by the camera located at a first distance from the user and the second image captured by the camera located at a second distance from the user, the second distance less than the first distance; compare the at least a portion of the authentication biometric information to the root biometric identity information; perform a liveness determination on the user during the authentication session using the authentication biometric information, wherein one aspect of the liveness determination comprises determining whether the first image or the second image has distortion due to the change in distance; responsive to the comparing and performing, authenticate the user if; the comparing determines the authentication biometric information matches the root biometric identity information within a threshold; and the liveness determination determines the user is a live person. - View Dependent Claims (14, 15, 16)
-
Specification