AUTHENTICATION VIA ITEM RECOGNITION
First Claim
Patent Images
1. A system for authenticating a user comprising:
- a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising;
receiving, from a mobile device of a user, an image of an item;
applying one or more image recognition algorithms to the image;
comparing at least a portion of the image to a plurality of stored images of at least one item designated for authentication, wherein the at least one item is associated with a user account; and
granting access to the user account, to the user, in response to determining that the received image matches a stored image of the at least one item.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating a user are provided. A user specifies one or more items for authentication and provides images of the one or more items. When the user opens up a mobile application, a camera on the mobile device is activated and takes a picture of an item in its field of view. If the picture matches one of the images of the items, the user is authenticated.
30 Citations
20 Claims
-
1. A system for authenticating a user comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; receiving, from a mobile device of a user, an image of an item; applying one or more image recognition algorithms to the image; comparing at least a portion of the image to a plurality of stored images of at least one item designated for authentication, wherein the at least one item is associated with a user account; and granting access to the user account, to the user, in response to determining that the received image matches a stored image of the at least one item. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of authenticating a user comprising:
-
receiving a captured image of an item from a rear-facing camera of a mobile device of a user; extracting distinguishable features from the captured image; determining that the captured image and a stored image of a personal item designated for authentication are a match, wherein the item designated for authentication is associated with a user account; and authenticating the user based on the determination that the captured image and stored image match. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
receiving a captured image of an item from a mobile device of a user; detecting features in the captured image; determining that the detected features are similar to features in a reference image of an item designated for authentication, wherein the item designated for authentication is associated with a user account; and authenticating the user based on the determination. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification