Method of image-based user authentication
First Claim
1. A method of authenticating a computer user, comprising the steps of:
- a) capturing on a computing device a facial image of a user;
b) assigning on the computing device a user-definable user-name to the user;
c) selecting on the computing device a user-definable image category for the user;
d) selecting on the computing device a user-definable image-offset pattern for the user;
e) selecting on the computing device at least two user-definable locations on the user'"'"'s face;
f) assigning on the computing device a user-definable rotation-value to the user;
g) logging onto the computing device by the user using the user'"'"'s user-name;
h) presenting to the user on the computing device a time and a grid of a plurality of images, where at least two of the images are in the user-definable image category selected in step (c);
i) selecting on the computing device by the user at least two images in the grid of images that are at the offset pattern from each of the at least two images in the image category selected in step (c);
j) calculating on the computing device an image-rotation angle that is a function of the rotation value assigned in step (f) and the time presented in step (h);
k) projecting the images selected in step (i) onto the user'"'"'s face at the at least two locations selected in the step (e), where each projected image is rotated by the image-rotation angle calculated in step (j);
l) capturing on the computing device an image of the user'"'"'s face after the operation of step (k); and
m) authenticating the user on the computing device if the user'"'"'s facial features captured in step (l) match the user'"'"'s face captured in step (a), the images projected onto the use'"'"'s face that were captured in step (l) are images in the grid that are the offset-pattern away from images in the grid that are in the image-category selected in step (c), the images projected onto the user'"'"'s face that were captured in step (l) are at locations on the user'"'"'s face that were selected in step (e), the images projected onto the user'"'"'s face that were captured in step (l) are rotated within a user-definable tolerance from a twelve o'"'"'clock position at the image-rotation angle calculated in step (j), and the images projected onto the user'"'"'s face that were captured in step (l) exhibit a user-definable amount of distortion due to the contour of the user'"'"'s face as compared to how the images would appear on a flat surface.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating a user by capturing an image of the user, assigning a user-name, selecting an image category, selecting a pattern, selecting locations on the user'"'"'s face, assigning a rotation-value, logging onto a computer, presenting images, where some images are in the image category, selecting images that are the pattern away from the images in the image category, calculating a rotation angle, projecting the selected images that are rotated by the rotation angle onto the user'"'"'s face at the locations, capturing an image of the user'"'"'s face with the rotated images projected thereon, and authenticating the user if the user'"'"'s facial features match the user'"'"'s face and the projected images are the pattern away from the images in the image-category, are at the locations, are rotated by the rotation angle, and exhibit distortion consistent with the contour of the user'"'"'s face.
-
Citations
12 Claims
-
1. A method of authenticating a computer user, comprising the steps of:
-
a) capturing on a computing device a facial image of a user; b) assigning on the computing device a user-definable user-name to the user; c) selecting on the computing device a user-definable image category for the user; d) selecting on the computing device a user-definable image-offset pattern for the user; e) selecting on the computing device at least two user-definable locations on the user'"'"'s face; f) assigning on the computing device a user-definable rotation-value to the user; g) logging onto the computing device by the user using the user'"'"'s user-name; h) presenting to the user on the computing device a time and a grid of a plurality of images, where at least two of the images are in the user-definable image category selected in step (c); i) selecting on the computing device by the user at least two images in the grid of images that are at the offset pattern from each of the at least two images in the image category selected in step (c); j) calculating on the computing device an image-rotation angle that is a function of the rotation value assigned in step (f) and the time presented in step (h); k) projecting the images selected in step (i) onto the user'"'"'s face at the at least two locations selected in the step (e), where each projected image is rotated by the image-rotation angle calculated in step (j); l) capturing on the computing device an image of the user'"'"'s face after the operation of step (k); and m) authenticating the user on the computing device if the user'"'"'s facial features captured in step (l) match the user'"'"'s face captured in step (a), the images projected onto the use'"'"'s face that were captured in step (l) are images in the grid that are the offset-pattern away from images in the grid that are in the image-category selected in step (c), the images projected onto the user'"'"'s face that were captured in step (l) are at locations on the user'"'"'s face that were selected in step (e), the images projected onto the user'"'"'s face that were captured in step (l) are rotated within a user-definable tolerance from a twelve o'"'"'clock position at the image-rotation angle calculated in step (j), and the images projected onto the user'"'"'s face that were captured in step (l) exhibit a user-definable amount of distortion due to the contour of the user'"'"'s face as compared to how the images would appear on a flat surface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification