×

Allowing access to applications based on captured images

  • US 9,639,681 B2
  • Filed: 11/12/2014
  • Issued: 05/02/2017
  • Est. Priority Date: 07/29/2014
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method to authenticate users on user computing devices with images, comprising:

  • receiving, by one or more computing devices, a manual authentication input of a user via a user interface of the one or more computing devices, the manual authentication being configured to begin a first user authenticated session with the one or more computing devices;

    communicating, by the one or more computing devices, a request for a first image from a camera module associated with the one or more computing devices;

    receiving, by the one or more computing devices, the first image captured by the camera module;

    extracting, by the one or more computing devices, first image characteristics from the first image;

    storing, by the one or more computing devices, the first image characteristics;

    receiving, by the one or more computing devices, an input from the user to end the first user authenticated session;

    ending, by the one or more computing devices, the first user authenticated session;

    receiving, by one or more computing devices, an input to begin a second authenticated session with the user computing device;

    communicating, by the one or more computing devices, a request for a second image from the camera module associated with the one or more computing devices;

    receiving, by the one or more computing devices, the second image captured by the camera module;

    extracting, by the one or more computing devices, second image characteristics from the second image;

    comparing, by the one or more computing devices, the first image characteristics to the second image characteristics;

    generating, by the one or more computing devices, a user authentication rating based on a plurality of the first image characteristics and the second image characteristics that match based on the comparison of the first image characteristics to the second image characteristics, wherein the first and second image characteristics comprise at least two of;

    a color of a shirt being worn by the user, a style of facial hair of the user, a style of hair of the user, and objects in the background of the user; and

    determining, by the one or more computing devices, one or more applications operating on the one or more computing devices to which the user is allowed access based on a comparison of the generated user authentication rating to a database of applications without an input of a request from the user, the database comprising a particular user authentication rating required for the user to be allowed access to each particular application in the database.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×