ALLOWING ACCESS TO APPLICATIONS BASED ON CAPTURED IMAGES
First Claim
1. A computer-implemented method to authenticate users on user computing devices with images, comprising:
- receiving, by one or more computing devices, a manual authentication input of a user via a user interface of the one or more computing devices, the manual authentication being configured to begin a first user authenticated session with the one or more computing devices;
communicating, by the one or more computing devices, a request for a first image from a camera module associated with the one or more computing devices;
receiving, by the one or more computing devices, the first image captured by the camera module;
extracting, by the one or more computing devices, first image characteristics from the first image;
storing, by the one or more computing devices, the first image characteristics;
ending, by the one or more computing devices, the first user authenticated session;
receiving, by one or more computing devices, an input to begin a second authenticated user session with the user computing device;
communicating, by the one or more computing devices, a request for a second image from the camera module associated with the one or more computing devices;
receiving, by the one or more computing devices, the second image captured by the camera module;
extracting, by the one or more computing devices, second image characteristics from the second image;
comparing, by the one or more computing devices, the first image characteristics to the second image characteristics;
identifying, by the one or more computing devices, a match between the first image characteristics and the second image characteristics; and
initiating, by the one or more computing devices, the second authenticated session in response to identifying the match between the first image characteristics and the second image characteristics.
2 Assignments
0 Petitions
Accused Products
Abstract
Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session.
28 Citations
20 Claims
-
1. A computer-implemented method to authenticate users on user computing devices with images, comprising:
-
receiving, by one or more computing devices, a manual authentication input of a user via a user interface of the one or more computing devices, the manual authentication being configured to begin a first user authenticated session with the one or more computing devices; communicating, by the one or more computing devices, a request for a first image from a camera module associated with the one or more computing devices; receiving, by the one or more computing devices, the first image captured by the camera module; extracting, by the one or more computing devices, first image characteristics from the first image; storing, by the one or more computing devices, the first image characteristics; ending, by the one or more computing devices, the first user authenticated session; receiving, by one or more computing devices, an input to begin a second authenticated user session with the user computing device; communicating, by the one or more computing devices, a request for a second image from the camera module associated with the one or more computing devices; receiving, by the one or more computing devices, the second image captured by the camera module; extracting, by the one or more computing devices, second image characteristics from the second image; comparing, by the one or more computing devices, the first image characteristics to the second image characteristics; identifying, by the one or more computing devices, a match between the first image characteristics and the second image characteristics; and initiating, by the one or more computing devices, the second authenticated session in response to identifying the match between the first image characteristics and the second image characteristics. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product, comprising:
a non-transitory computer-readable storage device having computer-readable program instructions embodied thereon that when executed by a computer cause the computer to authenticate users with images, the computer-readable program instructions comprising; computer-readable program instructions to receive a first image captured by a camera module of the computer during a first authenticated session; computer-readable program instructions to extract first image characteristics from the first image; computer-readable program instructions to end the first authenticated session; computer-readable program instructions to receive an input to begin a second authenticated session with the computer; computer-readable program instructions to receive a second image captured by the camera module of the computer; computer-readable program instructions to extract second image characteristics from the second image; computer-readable program instructions to identify a match between at least a portion of the first image characteristics and the second image characteristics; and computer-readable program instructions to determine one or more applications operating on the computer to which a user is allowed access based on the identified match. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
17. A system to authenticate users on user computing devices with images, comprising:
-
a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; receive a first image captured by a camera module of the system during a first user authenticated session; extract first image characteristics from the first image; end the first user authenticated session; receive a second image captured by the camera module of the system; extract second image characteristics from the second image; identify a match between the first image characteristics and the second image characteristics; and initiate a second authenticated session in response to identifying a match between the first image characteristics and the second image characteristics. - View Dependent Claims (18, 19, 20)
-
Specification