Method and system for visual authentication
First Claim
1. A non-transitory computer readable medium comprising instructions that enable a monitoring system to:
- pre-provision the monitoring system with a first reference visual authentication element and a second reference visual authentication element, the first reference visual authentication element comprises a visual feature and a text content element, wherein the first reference visual authentication element and the second reference visual authentication element are obtained from a user;
storing the first reference visual authentication element;
obtain, after the pre-provisioning and, from the user, an image of a first user-presented visual authentication element;
generate a first validation result by validating the first user-presented visual authentication element against the first reference visual authentication element,wherein the first validation result is a matching score that quantifies the goodness of fit obtained from performing matching on the first user-presented visual authentication element with the first reference visual authentication element; and
based on the first validation result;
make a first determination that the first user-presented visual authentication element matches the first reference visual authentication element; and
based on the first determination;
disarm the monitoring system;
obtain, after the pre-provisioning and, from the user, an image of a second user-presented visual authentication element;
generate a second validation result by validating the second user-presented visual authentication element against the second reference visual authentication element; and
based on the second validation result;
make a second determination that the second user-presented visual authentication element matches the second reference visual authentication element; and
based on the second determination;
trigger a silent alarm.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for visual authentication with a monitoring system. The method includes pre-provisioning the monitoring system with a reference visual authentication element, obtaining an image of a user-presented visual authentication element and generating a validation result by validating the user-presented visual authentication element against the reference visual authentication element. The method further includes, based on the validation result, making a determination that the user-presented visual authentication element matches the reference visual authentication element, and taking an action affiliated with the reference visual authentication element.
18 Citations
14 Claims
-
1. A non-transitory computer readable medium comprising instructions that enable a monitoring system to:
-
pre-provision the monitoring system with a first reference visual authentication element and a second reference visual authentication element, the first reference visual authentication element comprises a visual feature and a text content element, wherein the first reference visual authentication element and the second reference visual authentication element are obtained from a user; storing the first reference visual authentication element; obtain, after the pre-provisioning and, from the user, an image of a first user-presented visual authentication element; generate a first validation result by validating the first user-presented visual authentication element against the first reference visual authentication element, wherein the first validation result is a matching score that quantifies the goodness of fit obtained from performing matching on the first user-presented visual authentication element with the first reference visual authentication element; and based on the first validation result; make a first determination that the first user-presented visual authentication element matches the first reference visual authentication element; and based on the first determination;
disarm the monitoring system;obtain, after the pre-provisioning and, from the user, an image of a second user-presented visual authentication element; generate a second validation result by validating the second user-presented visual authentication element against the second reference visual authentication element; and based on the second validation result; make a second determination that the second user-presented visual authentication element matches the second reference visual authentication element; and based on the second determination;
trigger a silent alarm. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for visual authentication with a monitoring system, comprising:
-
pre-provisioning the monitoring system with a first reference visual authentication element and a second reference visual authentication element, the first reference visual authentication element comprises a visual feature and a text content element, wherein the first reference visual authentication element and the second reference visual authentication element are obtained from a user; storing the first reference visual authentication element; obtaining, after the pre-provisioning and, from the user, an image of a first user-presented visual authentication element; generating a first validation result by validating the first user-presented visual authentication element against the first reference visual authentication element, wherein the first validation result is a matching score that quantifies the goodness of fit obtained from performing matching on the first user-presented visual authentication element with the first reference visual authentication element; and based on the first validation result; making a first determination that the first user-presented visual authentication element matches the first reference visual authentication element; and based on the first determination;
disarming the monitoring system;obtaining, after the pre-provisioning and, from the user, an image of a second user-presented visual authentication element; generating a second validation result by validating the second user-presented visual authentication element against the second reference visual authentication element; and based on the second validation result; making a second determination that the second user-presented visual authentication element matches the second reference visual authentication element; and based on the second determination;
triggering a silent alarm. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification