Image authentication and security system and method
First Claim
1. A computer-implemented authentication method for authenticating a customer using a mobile electronic device for engaging in a banking transaction involving a financial institution over a network, the method comprising:
- storing instructions in at least one computer memory of the mobile electronic device;
implementing at least one computer processor for executing the instructions stored in memory to perform steps including;
detecting through the mobile electronic device, a customer activation of a banking application on the mobile electronic device;
triggering image capture of the customer attempting to engage in the transaction upon customer activation of the banking application using an image capturing device integrated with the mobile electronic device, wherein the image capturing device is a front facing camera such that the customer image is captured simultaneously with customer use of the mobile electronic device to conduct the transaction;
retrieving a stored image of the customer from an authentication database;
comparing, using a comparison algorithm executed by computer processing components, the stored image with the captured image to authenticate the customer;
performing a secondary authentication by capturing a biometric parameter and comparing the captured biometric parameter with a stored biometric parameter;
upon authentication, monitoring the captured image during the transaction for an interruption using the computer processing components, wherein monitoring the transaction for an interruption includes detecting an interruption upon detection of a different captured image; and
terminating the transaction if an interruption is detected.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are related to a computer-implemented authentication method and system for authenticating a customer using an electronic device for engaging in a transaction involving a financial institution over a network. Embodiments of the method include capturing an image of the customer engaging in the transaction using an image capturing device integrated with the electronic device and retrieving a stored image of the customer from an authentication database. Embodiments of the invention additionally include comparing, using a comparison algorithm executed by computer processing components, the stored image with the captured image to authenticate the customer and upon authentication, monitoring the captured image during the transaction for an interruption using the computer processing components. The method further includes terminating the transaction if an interruption is detected.
81 Citations
12 Claims
-
1. A computer-implemented authentication method for authenticating a customer using a mobile electronic device for engaging in a banking transaction involving a financial institution over a network, the method comprising:
-
storing instructions in at least one computer memory of the mobile electronic device; implementing at least one computer processor for executing the instructions stored in memory to perform steps including; detecting through the mobile electronic device, a customer activation of a banking application on the mobile electronic device; triggering image capture of the customer attempting to engage in the transaction upon customer activation of the banking application using an image capturing device integrated with the mobile electronic device, wherein the image capturing device is a front facing camera such that the customer image is captured simultaneously with customer use of the mobile electronic device to conduct the transaction; retrieving a stored image of the customer from an authentication database; comparing, using a comparison algorithm executed by computer processing components, the stored image with the captured image to authenticate the customer; performing a secondary authentication by capturing a biometric parameter and comparing the captured biometric parameter with a stored biometric parameter; upon authentication, monitoring the captured image during the transaction for an interruption using the computer processing components, wherein monitoring the transaction for an interruption includes detecting an interruption upon detection of a different captured image; and terminating the transaction if an interruption is detected. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented authentication system for authenticating a customer using a mobile electronic device for engaging in a banking transaction involving a financial institution over a network, the method comprising:
-
at least one computer memory of the mobile electronic device, the computer memory storing instructions; at least one computer processor for executing the instructions stored in memory to perform steps including; detecting through the mobile electronic device, a customer activation of a banking application on the mobile electronic device; triggering image capture of the customer attempting to engage in the transaction upon customer activation of the banking application using an image capturing device integrated with the mobile electronic device, wherein the image capturing device is a front facing camera such that the customer image is captured simultaneously with customer use of the mobile electronic device to conduct the transaction; retrieving a stored image of the customer from an authentication database; comparing, using a comparison algorithm executed by computer processing components, the stored image with the captured image to authenticate the customer; performing a secondary authentication by capturing a biometric parameter and comparing the captured biometric parameter with a stored biometric parameter; upon authentication, monitoring the captured image during the transaction for an interruption using the computer processing components, wherein monitoring the transaction for an interruption includes detecting an interruption upon detection of a different captured image; and terminating the transaction if an interruption is detected. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification