Personal familiarity authentication
First Claim
1. A method, implemented by a computer, comprising:
- responsive to a request by a user to access a secured device, a computer performing a first search for facial images of a first human person using a plurality of tags, the plurality of tags having first properties related to the first human person;
selecting, by the computer, a first facial image of the first human person from results retrieved by the first search;
modifying, by the computer, the first properties of the plurality of tags to create second properties that are different from the first properties;
performing, by the computer, a second search for facial images of other human persons based on the second properties;
selecting, by the computer, a plurality of additional facial images of the other human persons retrieved by the second search;
presenting, on a physical display, a palette of randomized facial images including the first facial image together with the plurality of additional facial images;
responsive to selection by the user of the first facial image from the palette, granting the request to access the secured device; and
responsive to selection by the user of any of the plurality of additional facial images, denying the request to access the secured device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for computer security. A gallery comprising a first identity of a first human person is maintained, the first identity associated with a plurality of tags, with first properties, useful for identifying the first human person. A first Internet search for facial images of the first human person is performed using the plurality of tags. A first facial image is selected from the results of this search. A second Internet search is performed for facial images of other human persons based on second properties that are generated by modifying the first properties of the plurality of tags. A plurality of additional facial images of the other human persons retrieved by the second Internet search is selected. A palette of randomized facial images including the first facial image together with the plurality of additional facial images is presented. Access is denied unless the correct facial image is selected.
-
Citations
18 Claims
-
1. A method, implemented by a computer, comprising:
-
responsive to a request by a user to access a secured device, a computer performing a first search for facial images of a first human person using a plurality of tags, the plurality of tags having first properties related to the first human person; selecting, by the computer, a first facial image of the first human person from results retrieved by the first search; modifying, by the computer, the first properties of the plurality of tags to create second properties that are different from the first properties; performing, by the computer, a second search for facial images of other human persons based on the second properties; selecting, by the computer, a plurality of additional facial images of the other human persons retrieved by the second search; presenting, on a physical display, a palette of randomized facial images including the first facial image together with the plurality of additional facial images; responsive to selection by the user of the first facial image from the palette, granting the request to access the secured device; and responsive to selection by the user of any of the plurality of additional facial images, denying the request to access the secured device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer comprising:
-
a hardware processor; and a memory connected to the processor, the memory comprising a non-transitory computer recordable storage medium and storing program code which, when implemented by the processor, performs a computer-implemented method, the program code comprising; computer usable program code for, responsive to a request by a user to access a secured device, a computer performing a first search for facial images of a first human person using a plurality of tags, the plurality of tags having first properties related to the first human person; computer usable program code for selecting, by the computer, a first facial image of the first human person from results retrieved by the first search; computer usable program code for modifying, by the computer, the first properties of the plurality of tags to create second properties that are different from the first properties; computer usable program code for performing, by the computer, a second search for facial images of other human persons based on the second properties; computer usable program code for selecting, by the computer, a plurality of additional facial images of the other human persons retrieved by the second search; computer usable program code for presenting, on a physical display, a palette of randomized facial images including the first facial image together with the plurality of additional facial images; computer usable program code for responsive to selection by the user of the first facial image from the palette, granting the request to access the secured device; and computer usable program code for, responsive to selection by the user of any of the plurality of additional facial images, denying the request to access the secured device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, implemented over a computer network, comprising:
-
responsive to a request by a user to access a remote secured device at a remote location, performing, by a server computer, a first search for facial images of a first human person using a plurality of tags, the plurality of tags having first properties related to the first human person; selecting, by the server computer, a first facial image of the first human person from results retrieved by the first search; modifying, by the server computer, the first properties of the plurality of tags to create second properties that are different from the first properties; performing, by the server computer, a second search for facial images of other human persons based on the second properties; selecting, by the server computer, a plurality of additional facial images of the other human persons retrieved by the second search; transmitting, by the server computer to the remote location, a palette of randomized facial images including the first facial image together with the plurality of additional facial images; and receiving, by the server computer from the remote location, a user selection of the first facial image from the palette, thereafter transmitting, by the server computer, a code to grant access to the remote secured device;
orreceiving, by the server computer from the remote location, a user selection of any of the plurality of additional facial images from the palette, thereafter transmitting, by the server computer, a code to deny access to the remote secured device. - View Dependent Claims (18)
-
Specification