PERSONAL FAMILIARITY AUTHENTICATION
1 Assignment
0 Petitions
Accused Products
Abstract
A method for computer security. A gallery comprising a first identity of a first human person is maintained, the first identity associated with a plurality of tags, with first properties, useful for identifying the first human person. A first Internet search for facial images of the first human person is performed using the plurality of tags. A first facial image is selected from the results of this search. A second Internet search is performed for facial images of other human persons based on second properties that are generated by modifying the first properties of the plurality of tags. A plurality of additional facial images of the other human persons retrieved by the second Internet search is selected. A palette of randomized facial images including the first facial image together with the plurality of additional facial images is presented. Access is denied unless the correct facial image is selected.
23 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method, implemented by a computer, comprising:
-
responsive to a request by a user to access a secured device, a computer performing a first search for facial images of a first human person using a plurality of tags, the plurality of tags having first properties related to the first human person; selecting, by the computer, a first facial image of the first human person from results retrieved by the first search; modifying, by the computer, the first properties of the plurality of tags to create second properties that are different from the first properties; performing, by the computer, a second search for facial images of other human persons based on the second properties; selecting, by the computer, a plurality of additional facial images of the other human persons retrieved by the second search; presenting, on a physical display, a palette of randomized facial images including the first facial image together with the plurality of additional facial images; and responsive to selection by the user of the first facial image from the palette, granting the request to access the secured device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer comprising:
-
a processor; and a memory connected to the processor, the memory comprising a non-transitory computer recordable storage medium and storing program code which, when implemented by the processor, performs a computer-implemented method, the program code comprising; computer usable program code for, responsive to a request by a user to access a secured device, a computer performing a first search for facial images of a first human person using a plurality of tags, the plurality of tags having first properties related to the first human person; computer usable program code for selecting, by the computer, a first facial image of the first human person from results retrieved by the first search; computer usable program code for modifying, by the computer, the first properties of the plurality of tags to create second properties that are different from the first properties; computer usable program code for performing, by the computer, a second search for facial images of other human persons based on the second properties; computer usable program code for selecting, by the computer, a plurality of additional facial images of the other human persons retrieved by the second search; computer usable program code for presenting, on a physical display, a palette of randomized facial images including the first facial image together with the plurality of additional facial images; and computer usable program code for responsive to selection by the user of the first facial image from the palette, granting the request to access the secured device. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method, implemented over a computer network, comprising:
-
responsive to a request by a user to access a remote secured device at a remote location, a server computer performing a first search for facial images of a first human person using a plurality of tags, the plurality of tags having first properties related to the first human person; selecting, by the server computer, a first facial image of the first human person from results retrieved by the first search; modifying, by the server computer, the first properties of the plurality of tags to create second properties that are different from the first properties; performing, by the server computer, a second search for facial images of other human persons based on the second properties; selecting, by the server computer, a plurality of additional facial images of the other human persons retrieved by the second search; transmitting, by the server computer to the remote location, a palette of randomized facial images including the first facial image together with the plurality of additional facial images; receiving, by the server computer from the remote location, a user selection of the first facial image from the palette; and thereafter transmitting, by the server computer, a code to grant access to the remote secured device. - View Dependent Claims (40)
-
Specification