Patent Issued for Real-world object-based image authentication method and system (USPTO 11704398): United Services Automobile Association
2023 AUG 04 (NewsRx) -- By a
The assignee for this patent, patent number 11704398, is
Reporters obtained the following quote from the background information supplied by the inventors: “Organizations may provide authorized end-users with various secured services or resources via multiple communication channels. Examples of such channels include modes of communication (e.g., a communications network) for exchanging data between devices, where such devices may include, but are not limited to, computing devices, such as tablets, personal computers, and smartphones; point of sale devices; ATMs; connected smart devices, such as refrigerators, watches, and laptops; telephones, such as landline telephones or mobile phones; electronically locked spaces managed by computer user interfaces, such as safe deposit box chambers, lockers, cars, offices, homes; and face-to-face contacts, such as interaction between a user and an employee of the organization. Channels may also include software and firmware associated with the devices and communications devices, such as web portals, applications, networks, mobile applications, and instant messaging systems. Channels may also include hardware associated with the computing devices and telephones, such as the network hardware, credit card scanners, and retinal scanners.
“In most scenarios in which an end-user attempts to access a secured resource via one or more of these channels, the end-user will be required to provide some proof of identity, typically associated with an identification card, key-card, fingerprint, or other factor before access is granted. Personal computers (computing devices) pose additional complexities in authenticating users. Computing devices are commonly used by more than one person. It is generally not safe to assume that the identity of the computing device satisfies the ownership factor. Additionally, computing devices have been more easily compromised than other devices. Current solutions increase security, but are often inconvenient for users.
“Thus, authentication (i.e., identifying and verifying) of an end-user can be time-consuming for both the end-user and the organization, as well as burdensome for users who are required to carry and present the necessary identification credentials and/or keys, or memorization of passwords or codes. It may be appreciated that many businesses and other organizations would benefit from mechanisms by which to reduce the costs associated with the authentication and authorization of customers. Furthermore, customers will be attracted by an authentication system that reduces or even eliminates the need to carry or remember multiple unique identification factors, as well as a system that significantly improves account security.
“There is a need in the art for a system and method that addresses the shortcomings discussed above.”
In addition to obtaining background information on this patent, NewsRx editors also obtained the inventors’ summary information for this patent: “In one aspect, a method of authenticating an identity of an individual is disclosed. The method includes obtaining first image data at a first time from a first computing device associated with a first user, the first image data including a virtual representation of a first real-world object that is located in proximity to the first user, and then accessing a first set of one or more records stored in a database, where each record of the first set includes stored image data linked to a first user identity. The method further includes determining that the first image data matches second image data of a first record of the plurality of records, the second image data being linked to the first user identity. In addition, the method includes determining, in response to the first image data matching the second image data, that the first person has the first user identity, and thereby authenticating the first person for access to a first secured resource for which the first user identity is authorized.
“In another aspect, a system for authenticating an identity of an individual includes a processor and machine-readable media. The machine-readable media include instructions which, when executed by the processor, cause the processor to obtain first image data at a first time from a first computing device associated with a first user, the first image data including a virtual representation of a first real-world object that is located in proximity to the first user. In addition, the instructions cause the processor to access a first set of one or more records stored in a database, where each record of the first set includes stored image data linked to a first user identity. The instructions also cause the processor to determine that the first image data matches second image data of a first record of the plurality of records, where the second image data is linked to the first user identity. Furthermore, the instructions cause the processor to determine, in response to the first image data matching the second image data, that the first person has the first user identity, and thereby authenticate the first person for access to a first secured resource for which the first user identity is authorized.
“In another aspect, a system for authenticating an identity of an individual includes means for obtaining first image data at a first time from a first computing device associated with a first user, the first image data including a virtual representation of a first real-world object that is located in proximity to the first user, as well as means for accessing a first set of one or more records stored in a database, wherein each record of the first set includes stored image data linked to a first user identity. The system further includes means for determining that the first image data matches second image data of a first record of the plurality of records, the second image data being linked to the first user identity. In addition, the system includes means for determining, in response to the first image data matching the second image data, that the first person has the first user identity, as well as means for authenticating the first person for access to a first secured resource for which the first user identity is authorized.
“Other systems, methods, features, and advantages of the disclosure will be, or will become, apparent to one of ordinary skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description and this summary, be within the scope of the disclosure, and be protected by the following claims.”
The claims supplied by the inventors are:
“1. A method of authenticating an identity of an individual, the method comprising: obtaining first image data at a first time from a first computing device associated with a first user, the first image data including a virtual representation of a real-world object that is located in proximity to the first user; executing an object recognition protocol to detect one or more objects in a background of the first image data, the one or more objects including the real-world object; receiving, from the first user, a selection of the real-world object; tagging, in response to the selection, the real-world object in the first image data as a verification object token; receiving, at a second time after the first time, a request for access by a first person to a secured resource associated with the first user; obtaining, in response to the request for access, second image data that includes a virtual representation of the real-world object; executing the object recognition protocol to detect one or more objects in a background of the second image data, the one or more objects including the real-world object; tagging the real-world object in the second image data as an object token; determining if the object token and the verification object token sufficiently match; determining, in response to the object token matching the verification object token, the first person is the first user; and thereby authenticating the first person for access to the secured resource.
“2. The method of claim 1, further comprising: employing, prior to the first time, a verification process to verify that the first user is associated with a first user identity; generating a first record that links the verification object token to the first user identity; and storing the first record in a database.
“3. The method of claim 1, further comprising capturing the first image data via an image sensor of the first computing device when the first user is also in range of the image sensor.
“4. The method of claim 1, wherein the secured resource includes one of a service, feature, and information for which access is restricted to one or more authorized persons.
“5. The method of claim 1, wherein the first image data is obtained during a videoconferencing session between the first user and a service representative associated with the secured resource.
“6. The method of claim 1, wherein the selection of the real-world object is made by the first user.
“7. The method of claim 1, wherein the selection of the real-world object is made by a virtual or human agent for a service by which access to the secured resource is managed.
“8. The method of claim 1, further comprising receiving, at a third time before the second time, a prior request for access; obtaining, in response to the prior request for access, third image data; executing the object recognition protocol to detect one or more assorted objects in a background of the third image data; failing to match any of the assorted objects with the verification object token; and generating a message indicating a failed authentication attempt.
“9. The method of claim 8, wherein the first image data was obtained at a first location, and the third image data was obtained at a second location that differs from the first location.
“10. The method of claim 9, wherein the second image data was also obtained in the first location.
“11. A system for authenticating an identity of an individual, the system comprising a processor and machine-readable media including instructions which, when executed by the processor, cause the processor to: obtain first image data at a first time from a first computing device associated with a first user, the first image data including a virtual representation of a real-world object that is located in proximity to the first user; execute an object recognition protocol to detect one or more objects in a background of the first image data, the one or more objects including the real-world object; receive, from the first user, a selection of the real-world object; tag, in response to the selection, the real-world object in the first image data as a verification object token; receive, at a second time after the first time, a request for access by a first person to a secured resource associated with the first user; obtain, in response to the request for access, second image data that includes a virtual representation of the real-world object; execute the object recognition protocol to detect one or more objects in a background of the second image data, the one or more objects including the real-world object; tag the real-world object in the second image data as an object token; determine if the object token and the verification object token sufficiently match; determine, in response to the object token matching the verification object token, the first person is the first user; and thereby authenticate the first person for access to the secured resource.
“12. The system of claim 11, wherein the instructions further cause the processor to: employ, prior to the first time, a verification process to verify that the first user is associated with a first user identity; generate a first record that links the verification object token to the first user identity; and store the first record in a database.
“13. The system of claim 11, wherein the instructions further cause the processor to capture the first image data via an image sensor of the first computing device when the first user is also in range of the image sensor.
“14. The system of claim 11, wherein the secured resource includes one of a service, feature, and information for which access is restricted to one or more authorized persons.
“15. The system of claim 11, wherein the first image data is obtained during a videoconferencing session between the first user and a service representative associated with the secured resource.
“16. The system of claim 11, wherein the selection of the real-world object is made by the first user.
“17. The system of claim 11, wherein the instructions further cause the processor to: receive, at a third time before the second time, a prior request for access; obtain, in response to the prior request for access, third image data; execute the object recognition protocol to detect one or more assorted objects in a background of the third image data; fail to match any of the assorted objects with the verification object token; and generate a message indicating a failed authentication attempt.
“18. The system of claim 17, wherein the first image data was obtained at a first location, and the third image data was obtained at a second location that differs from the first location.
“19. The system of claim 18, wherein the second image data was also obtained in the first location.
“20. A system for authenticating an identity of an individual, the system comprising: means for obtaining first image data at a first time from a first computing device associated with a first user, the first image data including a virtual representation of a real-world object that is located in proximity to the first user; means for executing an object recognition protocol to detect one or more objects in a background of the first image data, the one or more objects including the real-world object; means for receiving, from the first user, a selection of the real-world object; means for tagging, in response to the selection, the real-world object in the first image data as a verification object token; means for receiving, at a second time after the first time, a request for access by a first person to a secured resource associated with the first user; means for obtaining, in response to the request for access, second image data that includes a virtual representation of the real-world object; means for executing the object recognition protocol to detect one or more objects in a background of the second image data, the one or more objects including the real-world object; means for tagging the real-world object in the second image data as an object token; means for determining if the object token and the verification object token sufficiently match; means for determining, in response to the object token matching the verification object token, the first person is the first user; and means for authenticating the first person for access to the secured resource.”
For more information, see this patent: Baker,
(Our reports deliver fact-based news of research and discoveries from around the world.)
Study Data from University of Colorado Update Understanding of Insurance (Non-monetary Obstacles To Medical Care: Evidence From Postpartum Contraceptives): Insurance
Patent Application Titled “Data Processing System With Machine Learning Engine To Provide Output Generating Functions” Published Online (USPTO 20230230131): Patent Application
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News