User authentication and verification through video analysis
First Claim
1. A computing device, comprising:
- at least one processor;
a first camera having a first field of view;
a second camera separated by a distance from the first camera, the second camera having a second field of view that at least partially overlaps the first field of view; and
memory including instructions that, when executed by the computing device, cause the computing device to;
acquire a first image by the first camera;
acquire a second image by the second camera, the first image and the second image being captured over a period of time;
analyze the first image to locate a first representation of a head portion;
analyze the second image to locate a second representation corresponding to the head portion in the second image;
determine, from the first representation and the second representation, at least one of depth or distance information associated with one or more facial features of the head portion;
determine the at least one of depth or distance information corresponds to a physical person within a detectable range of the computing device, and not a representation of the physical person;
detect changes in a red chroma color component of the head portion relative to at least one other chroma color component or luminance value over the period of time;
determine the changes correspond to a signature representative of the physical person, and not a representation of the physical person; and
authenticate the head portion as being that of the physical person in response to determining the at least one of depth or distance information corresponds to the physical person and the red chroma color component relative to the at least one other chroma color component or luminance value corresponds to the signature representative of the physical person.
1 Assignment
0 Petitions
Accused Products
Abstract
Approaches utilize image information to not only identify a user, but also verify that the user is actually a physical person and not a false representation of that user. For example, a computing device can utilize image information with a facial recognition process in order to verify an identity of a current user of the device. A fingerprint or other verification metric can be generated from the image information and can be used to verify that the user is actually a physical human user instead of a representation (e.g., photo) of a human user. The fingerprint can include a number of cues, such as a shape of the face, a stereo disparity signature of the face, facial feature movement, as well as a presence of a human pulse. The cues can be combined and utilized for authenticating a user into the device as well as for verifying that the user is actually a physical person and not a false representation of that user.
151 Citations
19 Claims
-
1. A computing device, comprising:
-
at least one processor; a first camera having a first field of view; a second camera separated by a distance from the first camera, the second camera having a second field of view that at least partially overlaps the first field of view; and memory including instructions that, when executed by the computing device, cause the computing device to; acquire a first image by the first camera; acquire a second image by the second camera, the first image and the second image being captured over a period of time; analyze the first image to locate a first representation of a head portion; analyze the second image to locate a second representation corresponding to the head portion in the second image; determine, from the first representation and the second representation, at least one of depth or distance information associated with one or more facial features of the head portion; determine the at least one of depth or distance information corresponds to a physical person within a detectable range of the computing device, and not a representation of the physical person; detect changes in a red chroma color component of the head portion relative to at least one other chroma color component or luminance value over the period of time; determine the changes correspond to a signature representative of the physical person, and not a representation of the physical person; and authenticate the head portion as being that of the physical person in response to determining the at least one of depth or distance information corresponds to the physical person and the red chroma color component relative to the at least one other chroma color component or luminance value corresponds to the signature representative of the physical person. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method, comprising:
-
acquiring, by cameras of a computing device having at least partially overlapping fields of view, a set of images including a representation of a face, the set of images comprising a first image and a second image; determining at least one of depth or distance information of one or more features of the face represented in the first image and the second image; determining the at least one of depth or distance information corresponds to a physical person within a detectable range of the computing device, and not a representation of the physical person; determining, in at least a subset of the set of images, a change in a red chroma color component of the face relative to at least one other chroma color component or luminance value over a period of time; determining the change corresponds to a signature of the physical person, and not a representation of the physical person; and authenticating the face as being that of the physical person, and not a representation of the face, in response to determining the at least one of depth or distance information corresponds to the physical person and the change corresponds to the signature of the physical person. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable storage medium storing one or more sequences of instructions executable by one or more processors to perform a set of operations comprising:
-
acquiring a first set of images and a second set of images that include at least a representation of a face, the first set of images captured using a first camera and the second set of images captured using a second camera of a computing device, wherein the first camera and the second camera have partially overlapping fields of view; determining at least one of depth or distance information for each of a plurality of corresponding features of the face in the first set of images and the second set of images; determining the at least one of depth or distance information corresponds to a physical person within a detectable range of the computing device, and not a representation of the person; determining, in at least a subset of the first set of images and the second set of images, changes in a red chroma color component of the face relative to at least one other chroma color component or luminance value over a determined period of time; determining the changes correspond to a signature of the physical person, and not a representation of the physical person; and authenticating the face as being that of the physical person, and not a representation of the face of the physical person, when the at least one of depth or distance information corresponds to the physical person and the changes correspond to the signature of the physical person. - View Dependent Claims (17, 18, 19)
-
Specification