Using camera signatures from uploaded images to authenticate users of an online system
First Claim
1. A computer-implemented method for authenticating users of an online system based on cameras associated with the user, the method comprising:
- receiving images from a user of an online system;
analyzing the images to identify a plurality of images with matching information;
associating the plurality of images with a signature of a camera; and
associating the camera with an account for the user;
receiving a request from the user for access to the online system;
responsive to the request from the user, sending a request to the user to authenticate the user'"'"'s account by providing one or more additional images taken from the camera;
receiving the requested one or more additional images from the user;
comparing the one or more additional images to the signature of the camera; and
responsive to the one or more additional images matching the signature of the camera, providing the user with the requested access to the online system.
2 Assignments
0 Petitions
Accused Products
Abstract
Users of an online system are authenticated based on signatures of cameras that were used to capture images uploaded to the online system. Users of an online system upload photos taken from their cameras. The online system extracts characteristic information about the camera that captured the photos. This information includes a mapping of faulty pixels, metadata included with the photos, a naming convention, and the like. The online system stores an association between the user and the camera. This association is used for authentication of the user. For authentication, the user is asked to upload new photos taken from the camera that the user used previously. The information extracted from the newly uploaded photos is matched against stored information of cameras used previously by the user. The user is successfully authenticated if the camera used for the newly uploaded photos matches a previously stored camera.
20 Citations
28 Claims
-
1. A computer-implemented method for authenticating users of an online system based on cameras associated with the user, the method comprising:
-
receiving images from a user of an online system; analyzing the images to identify a plurality of images with matching information; associating the plurality of images with a signature of a camera; and associating the camera with an account for the user; receiving a request from the user for access to the online system; responsive to the request from the user, sending a request to the user to authenticate the user'"'"'s account by providing one or more additional images taken from the camera; receiving the requested one or more additional images from the user; comparing the one or more additional images to the signature of the camera; and responsive to the one or more additional images matching the signature of the camera, providing the user with the requested access to the online system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for authenticating a user of an online system, the method comprising:
-
storing one or more camera signatures associated with the user, wherein each camera signature comprises characteristic information about the camera obtained from images taken from the camera; receiving a request for access to information from a user; sending a request to the user to upload an image; responsive to receiving an uploaded image, matching the uploaded image with a camera signature, wherein matching comprises comparing attributes of the uploaded image with the values of attributes associated with the camera signatures associated with the user; and responsive to the uploaded image matching at least one of the camera signatures associated with the user, granting access to the requested information to the user. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer-implemented system for authenticating users of an online system, the system comprising:
-
a computer processor; and a computer-readable storage medium storing computer program modules configured to execute on the computer processor, the computer program modules comprising; a camera identification module configured to; receiving images from a user of an online system; analyzing the images to identify a plurality of images with matching information; associating the plurality of images with a signature of a camera; and associating the camera with an account for the user; and an authentication module configured to; receiving a request from the user for access to the online system; sending a request to the user to authenticate the user'"'"'s account by providing one or more additional images taken from the camera; receiving the requested one or more additional images from the user; comparing the one or more additional images to the signature of the camera; and responsive to the one or more additional images matching the signature of the camera, providing the user with the requested access to the online system. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification