Using facial data for device authentication or subject identification
First Claim
1. One or more computer-readable storage devices storing computer-executable instructions which when executed by a computer cause the computer to perform a method, the method comprising:
- receiving an image of a user of a device;
identifying one or more facial descriptors of the user from the received image; and
evaluating whether the one or more identified facial descriptors of the user match one or more facial descriptors of a previous user extracted from multiple previously captured images of the previous user,the multiple previously captured images of the previous user being captured under different light sources, at least one image of the previous user being of the previous user illuminated by a low-light source,the evaluating comprising cross verifying the received images against at least one image of a non-user, the cross verifying comprising computing a distance between the received image and the at least one image of a non-user, and determining if the distance between the received image and the at least one image of a non-user is greater than a non-user image threshold value.
2 Assignments
0 Petitions
Accused Products
Abstract
Exemplary methods, apparatus, and systems are disclosed for authenticating a user to computing device. In one exemplary embodiment, an indication of a request by a user to unlock a mobile device in a locked state is received. One or more images of the face of the user are captured. Facial components of the user from the one or more captured images are extracted. A determination is made as to whether the user is an authorized user or a non-authorized user based at least in part on a comparison of the facial components of the user extracted from the one or more captured images to facial components of the authorized user from one or more authentication images of the authorized stored on the mobile device. If the user is determined to be the authorized user, the mobile device unlocked; otherwise, the mobile device is maintained in its locked state.
-
Citations
20 Claims
-
1. One or more computer-readable storage devices storing computer-executable instructions which when executed by a computer cause the computer to perform a method, the method comprising:
-
receiving an image of a user of a device; identifying one or more facial descriptors of the user from the received image; and evaluating whether the one or more identified facial descriptors of the user match one or more facial descriptors of a previous user extracted from multiple previously captured images of the previous user, the multiple previously captured images of the previous user being captured under different light sources, at least one image of the previous user being of the previous user illuminated by a low-light source, the evaluating comprising cross verifying the received images against at least one image of a non-user, the cross verifying comprising computing a distance between the received image and the at least one image of a non-user, and determining if the distance between the received image and the at least one image of a non-user is greater than a non-user image threshold value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable storage devices storing computer-executable instructions which when executed by a computer cause the computer to perform a method, the method comprising:
-
receiving an image of a user of a device; identifying one or more facial descriptors of the user from the received image; and evaluating whether the one or more identified facial descriptors of the user match one or more facial descriptors of an authorized user extracted from a plurality of images of the authorized user, the plurality of images of the authorized user being captured under different light sources, at least one image of the authorized user being of the previous user illuminated by a low-light source, wherein the evaluating comprises cross verifying the received images against at least one image of a non-user, and wherein the method further comprises finding that the one or more facial descriptors of the user in the received image match the one or more facial descriptors of the authorized user if (a) a difference between the facial descriptors of the user in the received image and the facial descriptors of the authorized user from the plurality of images of the authorized user satisfies a first threshold value, and (b) the number of images in the plurality of images satisfies a second threshold. - View Dependent Claims (9, 10)
-
-
11. A computing device having a processor and memory, the computing device being configured to perform operations comprising:
-
receiving an image of a user of the device; identifying one or more facial descriptors of the user from the received image; and evaluating whether the one or more identified facial descriptors of the user match one or more facial descriptors of a previous user extracted from multiple previously captured images of the previous user, the multiple previously captured images of the previous user being captured under different light sources, at least one image of the previous user being of the previous user illuminated by a low-light source, the evaluating comprising cross verifying the received images against at least one image of a non-user, the cross verifying comprising computing a distance between the received image and the at least one image of a non-user, and determining if the distance between the received image and the at least one image of a non-user is greater than a non-user image threshold value. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computing device having a processor and memory, the computing device being configured to perform operations comprising:
-
receiving an image of a user of the device; identifying one or more facial descriptors of the user from the received image; evaluating whether the one or more identified facial descriptors of the user match one or more facial descriptors of an authorized user extracted from a plurality of images of the authorized user, the plurality of images of the authorized user being captured under different light sources, at least one image of the authorized user being of the previous user illuminated by a low-light source, wherein the evaluating comprises cross verifying the received images against at least one image of a non-user; and finding that the one or more facial descriptors of the user in the received image match the one or more facial descriptors of the authorized user if (a) a difference between the facial descriptors of the user in the received image and the facial descriptors of the authorized user from the plurality of images of the authorized user satisfies a first threshold value, and (b) the number of images in the plurality of images satisfies a second threshold. - View Dependent Claims (19, 20)
-
Specification