Allowing access to applications based on captured images
First Claim
1. A computer-implemented method to authenticate users on user computing devices with images, comprising:
- receiving, by one or more computing devices, a manual authentication input of a user via a user interface of the one or more computing devices, the manual authentication being configured to begin a first user authenticated session with the one or more computing devices;
communicating, by the one or more computing devices, a request for a first image from a camera module associated with the one or more computing devices;
receiving, by the one or more computing devices, the first image captured by the camera module;
extracting, by the one or more computing devices, first image characteristics from the first image;
storing, by the one or more computing devices, the first image characteristics;
receiving, by the one or more computing devices, an input from the user to end the first user authenticated session;
ending, by the one or more computing devices, the first user authenticated session;
receiving, by one or more computing devices, an input to begin a second authenticated session with the user computing device;
communicating, by the one or more computing devices, a request for a second image from the camera module associated with the one or more computing devices;
receiving, by the one or more computing devices, the second image captured by the camera module;
extracting, by the one or more computing devices, second image characteristics from the second image;
comparing, by the one or more computing devices, the first image characteristics to the second image characteristics;
generating, by the one or more computing devices, a user authentication rating based on a plurality of the first image characteristics and the second image characteristics that match based on the comparison of the first image characteristics to the second image characteristics, wherein the first and second image characteristics comprise at least two of;
a color of a shirt being worn by the user, a style of facial hair of the user, a style of hair of the user, and objects in the background of the user; and
determining, by the one or more computing devices, one or more applications operating on the one or more computing devices to which the user is allowed access based on a comparison of the generated user authentication rating to a database of applications without an input of a request from the user, the database comprising a particular user authentication rating required for the user to be allowed access to each particular application in the database.
2 Assignments
0 Petitions
Accused Products
Abstract
Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session.
60 Citations
14 Claims
-
1. A computer-implemented method to authenticate users on user computing devices with images, comprising:
-
receiving, by one or more computing devices, a manual authentication input of a user via a user interface of the one or more computing devices, the manual authentication being configured to begin a first user authenticated session with the one or more computing devices; communicating, by the one or more computing devices, a request for a first image from a camera module associated with the one or more computing devices; receiving, by the one or more computing devices, the first image captured by the camera module; extracting, by the one or more computing devices, first image characteristics from the first image; storing, by the one or more computing devices, the first image characteristics; receiving, by the one or more computing devices, an input from the user to end the first user authenticated session; ending, by the one or more computing devices, the first user authenticated session; receiving, by one or more computing devices, an input to begin a second authenticated session with the user computing device; communicating, by the one or more computing devices, a request for a second image from the camera module associated with the one or more computing devices; receiving, by the one or more computing devices, the second image captured by the camera module; extracting, by the one or more computing devices, second image characteristics from the second image; comparing, by the one or more computing devices, the first image characteristics to the second image characteristics; generating, by the one or more computing devices, a user authentication rating based on a plurality of the first image characteristics and the second image characteristics that match based on the comparison of the first image characteristics to the second image characteristics, wherein the first and second image characteristics comprise at least two of;
a color of a shirt being worn by the user, a style of facial hair of the user, a style of hair of the user, and objects in the background of the user; anddetermining, by the one or more computing devices, one or more applications operating on the one or more computing devices to which the user is allowed access based on a comparison of the generated user authentication rating to a database of applications without an input of a request from the user, the database comprising a particular user authentication rating required for the user to be allowed access to each particular application in the database. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising:
-
a non-transitory computer-readable storage device having computer-executable program instructions embodied thereon that when executed by a computer cause the computer to authenticate users with images, the computer-executable program instructions comprising; computer-executable program instructions to receive a manual authentication input of a user via a user interface of the one or more computing devices, the manual authentication being configured to begin a first user authenticated session with the one or more computing devices; computer-executable program instructions to communicate a request for a first image from a camera module associated with the one or more computing devices; computer-executable program instructions to receive the first image captured by the camera module; computer-executable program instructions to extract first image characteristics from the first image; computer-executable program instructions to store the first image characteristics; computer-executable program instructions to receive an input from the user to end the first user authenticated session; computer-executable program instructions to end the first user authenticated session; computer-executable program instructions to receive an input to begin a second authenticated session with the user computing device; computer-executable program instructions to communicate a request for a second image from the camera module associated with the one or more computing devices; computer-executable program instructions to receive the second image captured by the camera module; computer-executable program instructions to extract second image characteristics from the second image; computer-executable program instructions to compare the first image characteristics to the second image characteristics; computer-executable program instructions to generate a user authentication rating based on a plurality of the first image characteristics and the second image characteristics that match based on the comparison of the first image characteristics to the second image characteristics, wherein the first and second image characteristics comprise at least two of;
a color of a shirt being worn by the user, a style of facial hair of the user, a style of hair of the user, and objects in the background of the user; andcomputer-executable program instructions to determine one or more applications operating on the one or more computing devices to which the user is allowed access based on a comparison of the generated user authentication rating to a database of applications without an input of a request from the user, the database comprising a particular user authentication rating required for the user to be allowed access to each particular application in the database. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system to authenticate users on user computing devices with images, comprising:
-
a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; receive a manual authentication input of a user via a user interface of the one or more computing devices, the manual authentication being configured to begin a first user authenticated session with the one or more computing devices; communicate a request for a first image from a camera module associated with the one or more computing devices; receive the first image captured by the camera module; extract first image characteristics from the first image; store the first image characteristics; receive an input from the user to end the first user authenticated session; end the first user authenticated session; receive an input to begin a second authenticated session with the user computing device; communicate a request for a second image from the camera module associated with the one or more computing devices; receive the second image captured by the camera module; extract second image characteristics from the second image; compare the first image characteristics to the second image characteristics; generate a user authentication rating based on a plurality of the first image characteristics and the second image characteristics that match based on the comparison of the first image characteristics to the second image characteristics, wherein the first and second image characteristics comprise at least two of;
a color of a shirt being worn by the user, a style of facial hair of the user, a style of hair of the user, and objects in the background of the user; anddetermine one or more applications operating on the one or more computing devices to which the user is allowed access based on a comparison of the generated user authentication rating to a database of applications without an input of a request from the user, the database comprising a particular user authentication rating required for the user to be allowed access to each particular application in the database. - View Dependent Claims (13, 14)
-
Specification