PREVENTING FACE-BASED AUTHENTICATION SPOOFING
First Claim
Patent Images
1. A system to prevent face-based authentication spoofing, the system comprising:
- an emitter controller to control a visible light emitter to project a pattern into a field of view for a camera during an authentication attempt using a face;
an image sampler to obtain an image from the camera for the authentication attempt; and
a spoofing detection controller to;
identify a potential spoofing region of the image by finding the pattern within predetermined tolerances in the image; and
prevent the authentication attempt based on a face found in the potential spoofing region.
2 Assignments
0 Petitions
Accused Products
Abstract
System and techniques for preventing face-based authentication spoofing are described herein. A visible light emitter may be controlled to project a pattern into a camera'"'"'s field of view during an authentication attempt. An image may be obtained from the camera for the authentication attempt. A potential spoofing region on image may be identified by finding the pattern. An authentication attempt based on a face found in the potential spoofing region may be prevented.
130 Citations
24 Claims
-
1. A system to prevent face-based authentication spoofing, the system comprising:
-
an emitter controller to control a visible light emitter to project a pattern into a field of view for a camera during an authentication attempt using a face; an image sampler to obtain an image from the camera for the authentication attempt; and a spoofing detection controller to; identify a potential spoofing region of the image by finding the pattern within predetermined tolerances in the image; and prevent the authentication attempt based on a face found in the potential spoofing region. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A machine-implemented method to prevent face-based authentication spoofing, the method comprising:
-
controlling a visible light emitter to project a pattern into a field of view for a camera during an authentication attempt using a face; obtaining an image from the camera for the authentication attempt; identifying a potential spoofing region of the image by finding the pattern within predetermined tolerances in the image; and preventing an authentication attempt based on a face found in the potential spoofing region. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. At least one machine readable medium including instructions to prevent face-based authentication spoofing, the instructions, when executed by a machine, cause the machine to perform operations comprising:
-
controlling a visible light emitter to project a pattern into a field of view for a camera during an authentication attempt using a face; obtaining an image from the camera for the authentication attempt; identifying a potential spoofing region of the image by finding the pattern within predetermined tolerances in the image; and preventing an authentication attempt based on a face found in the potential spoofing region. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification