Systems, methods and apparatus for multivariate authentication
First Claim
Patent Images
1. A non-transitory computer readable medium having instructions stored thereon which when executed by a processor of an authentication computing device cause the processor to:
- receive a request for authentication of a user, wherein the request for authentication comprises collected contextual data and one of an image data of the user captured at a first resolution suitable for a first level of available network resources or an image data of the user captured at a second resolution suitable for a second level of available network resources, wherein the first level of available network resources is lower than the second level of available network resources and the first resolution is lower than the second resolution;
compare the received image data of the user to baseline image data of the user;
compare the collected contextual data to an expected contextual data value; and
determine whether to authenticate the user based on the comparison of the received image data of the user to the baseline image data of the user, the comparison of the collected contextual data to the expected contextual data value, and the determined level of available network resources.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and apparatus are disclosed for user authentication using a plurality of authentication variables, such as biometrics and contextual data. Example contextual data includes the geographical location of the user, a gesture of the user, and the machine identification of the individual'"'"'s user device.
-
Citations
3 Claims
-
1. A non-transitory computer readable medium having instructions stored thereon which when executed by a processor of an authentication computing device cause the processor to:
-
receive a request for authentication of a user, wherein the request for authentication comprises collected contextual data and one of an image data of the user captured at a first resolution suitable for a first level of available network resources or an image data of the user captured at a second resolution suitable for a second level of available network resources, wherein the first level of available network resources is lower than the second level of available network resources and the first resolution is lower than the second resolution; compare the received image data of the user to baseline image data of the user; compare the collected contextual data to an expected contextual data value; and determine whether to authenticate the user based on the comparison of the received image data of the user to the baseline image data of the user, the comparison of the collected contextual data to the expected contextual data value, and the determined level of available network resources.
-
-
2. A method of authenticating a user, the method comprising:
-
receiving, by an authentication computing system and from a requesting computing device, a request for authentication of the user, wherein the request for authentication comprises, collected contextual data and one of an image data of the user captured at a first resolution in response to a determined first level of available network resources or an image data captured of the user at a second resolution in response to a determined second level of available network resources, wherein the determined first level of available network resources is lower than the determined second level of available network resources and the first resolution is lower than the second resolution; selectively comparing, by the authentication computing device in response to receiving the image data of the user captured at the first resolution, the image data of the user captured at the first resolution to baseline image data of the user; and
/orselectively comparing, by the authentication computing device in response to receiving the image data of the user captured at the second resolution, the image data of the user captured at the second resolution, to baseline image data of the user; and
furthercomparing, by the authentication computing device, the collected contextual data to an expected contextual data value; and determining, by the authentication computing device, whether to authenticate the user based on the comparison of the image data of the user captured at the first resolution or the image data of the user captured at the second solution to the baseline image data of the user, the comparison of the collected contextual data to the expected contextual data value, and the determined level of available operational resources.
-
-
3. A method comprising:
-
receiving, by an authentication computing device and from a requesting computing device, an image data of the user captured at a first resolution in response to a determined first level of available network resources;
orreceiving, by the authentication computing device and from the requesting computing device, an image data of the user captured at a second resolution in response to a determined second level of available network resources; wherein the determined first level of available network resources is lower than the determined second level of available network resources and the first resolution is lower than the second resolution; and comparing the image data captured at the first resolution with the baseline biometric data in response to receiving the image data captured at the first resolution or comparing the image data of the user in the image captured at the second resolution with the baseline image data in response to receiving the image data captured at the second resolution;
Andin response to a valid comparison, issuing an authentication signal to said requesting computing device.
-
Specification