Visual credential verification
First Claim
1. A method for visual credential verification, the method comprising:
- assigning a security level to a requested action prior to validating an unverified credential;
validating, by a processor, the unverified credential if an image of the unverified credential matches at least one verified credential image to a degree above a first determined threshold, and if the requested action has a low-security level, wherein the validating is performed independently of comparing authentication information of an individual presenting the unverified credential with verified authentication information; and
validating, by the processor, the unverified credential if an image of the unverified credential matches at least one verified credential image to a degree above a second determined threshold, if the requested action has a high-security level, and if the authentication information of the individual presenting the unverified credential is above a third determined threshold when compared to verified authentication information.
1 Assignment
0 Petitions
Accused Products
Abstract
A solution for visual credential verification. The solution includes an apparatus, system, and method embodiment. The apparatus for visual credential verification includes an input module, a comparison module, and a response module. The input module receives from a security official an image of an unverified credential, such as a badge, that an individual has presented to the security official. The comparison module determines whether or not the unverified credential is valid or invalid. The determination includes comparing the image of the unverified credential with known good images of valid credentials. The comparison module may also compare authentication information such as a photo of the individual, a name, or a badge number, with known good authentication information. Based on the comparison module'"'"'s determination, the response module notifies the security official that the unverified credential is either valid or invalid. A system for visual credential verification may be implemented with a server in communication with a security official'"'"'s electronic device, such as a cell phone.
73 Citations
20 Claims
-
1. A method for visual credential verification, the method comprising:
-
assigning a security level to a requested action prior to validating an unverified credential; validating, by a processor, the unverified credential if an image of the unverified credential matches at least one verified credential image to a degree above a first determined threshold, and if the requested action has a low-security level, wherein the validating is performed independently of comparing authentication information of an individual presenting the unverified credential with verified authentication information; and validating, by the processor, the unverified credential if an image of the unverified credential matches at least one verified credential image to a degree above a second determined threshold, if the requested action has a high-security level, and if the authentication information of the individual presenting the unverified credential is above a third determined threshold when compared to verified authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for visual credential verification comprising:
-
an input module configured to receive an image of an unverified credential and authentication information; a comparison module configured to; assign a security level to a requested action prior to validating an unverified credential; and determine that the unverified credential is one of a valid credential and an invalid credential, wherein the determination comprises; validating the unverified credential if the image of the unverified credential is above a first determined threshold when compared to at least one verified credential image and if the requested action has a low-security level, the validating performed independently of comparing the authentication information of an individual presenting the unverified credential with verified authentication information; and validating the unverified credential if the image of the unverified credential is above a second determined threshold when compared to at least one verified credential image, if the requested action has a high-security level, and if the authentication information of the individual presenting the unverified credential is above a third determined threshold when compared to verified authentication information; a response module configured to send a notification that the unverified credential is valid in response to the comparison module determining that the unverified credential is the valid credential. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable storage device with an executable program stored thereon to implement visual credential verification, wherein the program instructs a microprocessor to:
-
assign a security level to a requested action prior to validating an unverified credential; validate the unverified credential if an image of an unverified credential matches at least one verified credential image to a degree above a first determined threshold, and if the requested action has a low-security level, wherein the validating is performed independently of comparing authentication information of an individual presenting the unverified credential with verified authentication information; and validate, by the processor, the unverified credential if an image of an unverified credential matches at least one verified credential image to a degree above a second determined threshold when compared to at least one verified credential image, if the requested action has a high-security level, and if the authentication information of the individual presenting the unverified credential is above a third determined threshold when compared to verified authentication information. - View Dependent Claims (17, 18, 19, 20)
-
Specification