Image processing
First Claim
Patent Images
1. A method comprising:
- capturing, by an image capture device of a computing device, a digital authentication image of a face of an authenticating user;
generating, by the computing device and based on the digital authentication image, an altered authentication image at least in part by;
using, by the computing device, a mathematical model to represent a lens of the image capture device, the mathematical model representing one or more distortions introduced by the lens with respect to digital authentication image;
determining, by the computing device and based on the mathematical model, one or more transform functions to correct the one or more distortions introduced with respect to the digital authentication image; and
applying the one or more transform functions to the digital authentication image to generate the altered authentication image;
presenting the altered authentication image for display; and
comparing, by the computing device, the digital authentication image, in an unaltered form, to a digital enrollment image to determine whether to unlock the computing device for use by the authenticating user,wherein the digital enrollment image represents a face of an authorized user of the computing device, andwherein the comparison does not include any correction of the one or more distortions introduced into the digital authentication image.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing device includes an image capture device, a display, and at least one processor. The image capture device is configured to capture a digital enrollment image of a face of an authorized user and a digital authentication image of a face of an authenticating user. The display is configured to present the enrollment and authentication images. The at least one processor is configured to automatically alter the authentication image for presentation by the display and compare the authentication image to the enrollment image to unlock the computing device for use by the authenticating user.
51 Citations
19 Claims
-
1. A method comprising:
-
capturing, by an image capture device of a computing device, a digital authentication image of a face of an authenticating user; generating, by the computing device and based on the digital authentication image, an altered authentication image at least in part by; using, by the computing device, a mathematical model to represent a lens of the image capture device, the mathematical model representing one or more distortions introduced by the lens with respect to digital authentication image; determining, by the computing device and based on the mathematical model, one or more transform functions to correct the one or more distortions introduced with respect to the digital authentication image; and applying the one or more transform functions to the digital authentication image to generate the altered authentication image; presenting the altered authentication image for display; and comparing, by the computing device, the digital authentication image, in an unaltered form, to a digital enrollment image to determine whether to unlock the computing device for use by the authenticating user, wherein the digital enrollment image represents a face of an authorized user of the computing device, and wherein the comparison does not include any correction of the one or more distortions introduced into the digital authentication image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device comprising:
-
an image capture device configured to capture a digital enrollment image of a face of an authorized user and a digital authentication image of a face of an authenticating user; and at least one processor configured to; generate, based on the digital authentication image, an altered authentication image, wherein, to generate the altered authentication image, the at least one processor is configured to; use a mathematical model to represent a lens of the image capture device, the mathematical model representing one or more distortions introduced by the lens with respect to the digital authentication image; determine, based on the mathematical model, one or more transform functions to correct the one or more distortions introduced with respect to the digital authentication image; and apply the one or more transform functions to the digital authentication image to generate the altered authentication image;
control the display to present the altered authentication image; andcompare the digital authentication image, in an unaltered form, to the digital enrollment image to determine whether to unlock the computing device for use by the authenticating user, wherein the comparison does not include any correction of the one or more distortions introduced into the digital authentication image. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage device, having stored thereon instructions that, when executed, cause at least one programmable processor to perform operations comprising:
-
capturing, by an image capture device of a computing device, a digital authentication image of a face of an authenticating user, generating, based on the digital authentication image, an altered authentication image, at least in part by; using a mathematical model to represent a lens of the image capture device, the mathematical model representing one or more distortions introduced by the lens with respect to the digital authentication image; determining, based on the mathematical model, one or more transform functions to correct the one or more distortions introduced with respect to the digital authentication image; and applying the one or more transform functions to the digital authentication image to generate the altered authentication image; presenting the altered authentication image for display; and comparing the digital authentication image, in an unaltered form, to a digital enrollment image to determine whether to unlock the computing device for use by the authenticating user, wherein the digital enrollment image represents a face of an authorized user of the computing device, and wherein the comparison does not include any correction of the one or more distortions introduced into the digital authentication image.
-
Specification