Multi-level authentication
First Claim
1. A method for authenticating a user, the method comprising:
- receiving, by one or more computing devices, a request for access to a protected feature;
generating, by the one or more computing devices, depth data based at least in part on a plurality of images;
comparing, by the one or more computing devices, the depth data to pre-stored depth data corresponding to the user in order to authenticate the user as part of a primary authentication;
when the user is not authenticated as part of the primary authentication, identifying, by the one or more computing devices, a single image;
comparing, by the one or more computing devices, the identified image to a pre-stored image of the user in order to authenticate the user as part of a secondary authentication;
when the user is authenticated as part of the secondary authentication, generating, by the one or more computing devices, new depth data corresponding to the user;
comparing, by the one or more computing devices, the new depth data to the pre-stored depth data in order to authenticate the user as part of a tertiary authentication;
when the user is authenticated as part of the tertiary authentication, providing, by the one or more computing devices, access to the protected feature.
2 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the disclosure relate generally to using a primary and secondary authentication to provide a user with access to protected information or features. To do so, a computing device may generate depth data based on a plurality of images of a user. The computing device may then compare the generated depth data to pre-stored depth data that was generated based on a pre-stored plurality of images. If authentication is successful, the user may be granted access to features of the computing device. If authentication is unsuccessful, then a secondary authentication may be performed. The secondary authentication may compare facial features of a captured image of the user to facial features of a pre-stored image of the user. If authentication is successful, then the primary authentication may be performed again. This second time, the user may be granted access if authentication is successful, or denied access if authentication is unsuccessful.
-
Citations
20 Claims
-
1. A method for authenticating a user, the method comprising:
-
receiving, by one or more computing devices, a request for access to a protected feature; generating, by the one or more computing devices, depth data based at least in part on a plurality of images; comparing, by the one or more computing devices, the depth data to pre-stored depth data corresponding to the user in order to authenticate the user as part of a primary authentication; when the user is not authenticated as part of the primary authentication, identifying, by the one or more computing devices, a single image; comparing, by the one or more computing devices, the identified image to a pre-stored image of the user in order to authenticate the user as part of a secondary authentication; when the user is authenticated as part of the secondary authentication, generating, by the one or more computing devices, new depth data corresponding to the user; comparing, by the one or more computing devices, the new depth data to the pre-stored depth data in order to authenticate the user as part of a tertiary authentication; when the user is authenticated as part of the tertiary authentication, providing, by the one or more computing devices, access to the protected feature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising one or more computing devices configured to:
-
receive a request for access to a protected feature; generate depth data based at least in part on a plurality of images; compare the depth data to pre-stored depth data corresponding to the user in order to authenticate the user as part of a primary authentication; when the user is not authenticated as part of the primary authentication, identify a single image; compare the identified image to a pre-stored image of the user in order to authenticate the user as part of a secondary authentication; when the user is authenticated as part of the secondary authentication, generate new depth data corresponding to the user; compare the new depth data to the pre-stored depth data in order to authenticate the user as part of a tertiary authentication; when the user is authenticated as part of the tertiary authentication, provide access to the protected feature. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory tangible computer-readable storage medium on which computer readable instructions of a program are stored, the instructions, when executed by one or more processors, cause the one or more processors to perform a method, the method comprising:
-
receiving, by one or more computing devices, a request for access to a protected feature; generating, by the one or more computing devices, depth data based at least in part on a plurality of images; comparing, by the one or more computing devices, the depth data to pre-stored depth data corresponding to the user in order to authenticate the user as part of a primary authentication; when the user is not authenticated as part of the primary authentication, identifying, by the one or more computing devices, a single image; comparing, by the one or more computing devices, the identified image to a pre-stored image of the user in order to authenticate the user as part of a secondary authentication; when the user is authenticated as part of the secondary authentication, generating, by the one or more computing devices, new depth data corresponding to the user; comparing, by the one or more computing devices, the new depth data to the pre-stored depth data in order to authenticate the user as part of a tertiary authentication; when the user is authenticated as part of the tertiary authentication, providing, by the one or more computing devices, access to the protected feature. - View Dependent Claims (18, 19, 20)
-
Specification