Facial recognition
First Claim
Patent Images
1. A method comprising:
- receiving, by a computing device, an authentication image;
determining, by the computing device, whether a number of pixels positioned between at least two landmarks represented in the authentication image exceeds a threshold number of pixels; and
responsive to determining that the number of pixels positioned between the at least two landmarks represented in the authentication image exceeds the threshold number of pixels, denying, by the computing device, authentication with respect to accessing one or more functionalities controlled by the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
An example method includes capturing, by an image capture device of a computing device, an image of a face of a user. The method further includes detecting, by the computing device, whether a distance between the computing device and an object represented by at least a portion of the image is less than a threshold distance, and, when the detected distance is less than a threshold distance, denying authentication to the user with respect to accessing one or more functionalities controlled by the computing device, where the authentication is denied independent of performing facial recognition based at least in part on the captured image.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a computing device, an authentication image; determining, by the computing device, whether a number of pixels positioned between at least two landmarks represented in the authentication image exceeds a threshold number of pixels; and responsive to determining that the number of pixels positioned between the at least two landmarks represented in the authentication image exceeds the threshold number of pixels, denying, by the computing device, authentication with respect to accessing one or more functionalities controlled by the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A device comprising:
-
a memory; and one or more processors configured to; receive an authentication image; determine whether a number of pixels positioned between at least two landmarks represented in the authentication image exceeds a threshold number of pixels; and responsive to determining that the number of pixels positioned between the at least two landmarks represented in the authentication image exceeds the threshold number of pixels, deny authentication with respect to accessing one or more functionalities controlled by the device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable storage device encoded with instructions that, when executed cause one or more programmable processors of a computing device to:
-
receive an authentication image; determine whether a number of pixels positioned between at least two landmarks represented in the authentication image exceeds a threshold number of pixels; and responsive to determining that the number of pixels positioned between the at least two landmarks represented in the authentication image exceeds the threshold number of pixels, deny authentication with respect to accessing one or more functionalities controlled by the computing device.
-
Specification