Methods and Apparatuses for Electronic Message Authentication
2 Assignments
0 Petitions
Accused Products
Abstract
Various methods are provided for facilitating the message recipient authentication using facial detection. One example method may include receiving a message. The message may include a plurality of encoded facial features that identify a message recipient. The method may further include causing an image to be captured of the message recipient in an instance in which the message is accessed. The method may also include authenticating the message recipient based on the captured image and the received plurality of encoded features provided with the received message. Similar and related example apparatuses and example computer program products are also provided.
14 Citations
96 Claims
-
1-64. -64. (canceled)
-
65. A method comprising:
-
receiving a message, wherein the message includes an a plurality of encoded facial features that identify a message recipient; causing an image to be captured of the message recipient in an instance in which the received message is accessed; and authenticating the message recipient based on the captured image and the received plurality of encoded features provided with the received message. - View Dependent Claims (66, 67, 68, 69, 70)
-
-
71. A method comprising:
-
causing an image of a recipient of an electronic message to be located; encoding a plurality of facial features that identify the recipient from the image of the recipient; and causing the plurality of encoded facial features to be made available in an instance in which the electronic message is transmitted to the recipient, wherein the plurality of encoded facial features enables authentication of the recipient. - View Dependent Claims (72, 73, 74, 75)
-
-
76. A method comprising:
-
receiving an indication of a recipient of an electronic message from a first mobile terminal, wherein the indication includes at least one of an image or a name; receiving a captured image of the recipient from a second mobile terminal; and causing a decryption key for the electronic message to be transmitted to the second mobile terminal in an instance in which the received indication of a recipient and the captured image of the recipient enables authentication. - View Dependent Claims (77, 78, 79, 80)
-
-
81. An apparatus comprising a processor and a memory comprising software, the memory and the software configured to, with the processor, cause the apparatus to at least:
-
receive a message, wherein the message includes an a plurality of encoded facial features that identify a message recipient; cause an image to be captured of the message recipient in an instance in which the received message is accessed; and authenticate the message recipient based on the captured image and the received plurality of encoded features provided with the received message. - View Dependent Claims (82, 83, 84, 85, 86)
-
-
87. An apparatus comprising a processor and a memory comprising software, the memory and the software configured to, with the processor, cause the apparatus to at least:
-
cause an image of a recipient of an electronic message to be located; encode a plurality of facial features that identify the recipient from the image of the recipient; and cause the plurality of encoded facial features to be made available in an instance in which the electronic message is transmitted to the recipient, wherein the plurality of encoded facial features enables authentication of the recipient. - View Dependent Claims (88, 89, 90, 91)
-
-
92. An apparatus comprising a processor and a memory comprising software, the memory and the software configured to, with the processor, cause the apparatus to at least:
-
receive an indication of a recipient of an electronic message from a first mobile terminal, wherein the indication includes at least one of an image or a name; receive a captured image of the recipient from a second mobile terminal; and cause a decryption key for the electronic message to be transmitted to the second mobile terminal in an instance in which the received indication of a recipient and the captured image of the recipient enables authentication. - View Dependent Claims (93, 94, 95, 96)
-
Specification