APPARATUS, SYSTEM, AND METHOD FOR VISUAL CREDENTIAL VERIFICATION
First Claim
1. A method for visual credential verification comprising:
- comparing a target image of an unverified credential with one or more verified credentials images and identifying a verified credential image that substantially matches the target image of the unverified credential;
assigning a requested action associated with the unverified credential a security level;
notifying the security official that the unverified credential is valid in response to determining that the target image substantially matches at least one verified credential image and the requested action having a low-security level; and
notifying the security official that the unverified credential is invalid in response to determining that the target image does not substantially match at least one verified credential image.
1 Assignment
0 Petitions
Accused Products
Abstract
A solution for visual credential verification. The solution includes an apparatus, system, and method embodiment. The apparatus for visual credential verification includes an input module, a comparison module, and a response module. The input module receives from a security official an image of an unverified credential, such as a badge, that an individual has presented to the security official. The comparison module determines whether or not the unverified credential is valid or invalid. The determination includes comparing the image of the unverified credential with known good images of valid credentials. The comparison module may also compare authentication information such as a photo of the individual, a name, or a badge number, with known good authentication information. Based on the comparison module'"'"'s determination, the response module notifies the security official that the unverified credential is either valid or invalid. A system for visual credential verification may be implemented with a server in communication with a security official'"'"'s electronic device, such as a cell phone.
41 Citations
20 Claims
-
1. A method for visual credential verification comprising:
-
comparing a target image of an unverified credential with one or more verified credentials images and identifying a verified credential image that substantially matches the target image of the unverified credential; assigning a requested action associated with the unverified credential a security level; notifying the security official that the unverified credential is valid in response to determining that the target image substantially matches at least one verified credential image and the requested action having a low-security level; and notifying the security official that the unverified credential is invalid in response to determining that the target image does not substantially match at least one verified credential image. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus for visual credential verification comprising:
-
an input module configured to receive from a security official a target image of an unverified credential presented to the security official; a comparison module configured to determine that the unverified credential is one of a valid credential and an invalid credential, wherein the determination comprises at least comparing the target image to one or more verified credential images and identifying a verified credential image that substantially matches the target image; and a response module configured to send to the security official a notification that the unverified credential is valid in response to the comparison module determining that the unverified credential is the valid credential, and wherein the response module is further configured to send to the security official a notification that the unverified credential is invalid in response to the comparison module determining that the unverified credential is the invalid credential. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product, comprising a computer useable medium having a computer readable program code embodied therein, the computer readable program code adapted to be executed to implement a method for visual credential verification, the method comprising:
-
receiving from a security official a target image of an unverified credential presented to the security official; determining that the unverified credential is one of a valid credential and an invalid credential, wherein the determination comprises at least comparing the target image to a plurality of verified credential images stored in the one or more databases and identifying a verified credential image that substantially matches the target image of the unverified credential; and sending to the security official a notification that the unverified credential is valid in response to determining that the credential is the valid credential, and sending to the security official a notification that the unverified credential is invalid in response to the comparison module determining that the credential is the invalid credential. - View Dependent Claims (18, 19, 20)
-
Specification