This patent application is assigned to
The following quote was obtained by the news editors from the background information supplied by the inventors: "The present invention relates to device authentication and more particularly to image based device authentication.
"Device authentication refers to the testing of an identity of an end user of a device to ensure proper authorization of the end user to access the device. Traditional methods of performing device authentication include general password authentication in which an end user submits in response to a prompt a predetermined password in order to gain access to the device. More advanced forms of password authentication involve the submission of any combination of a user identifier, private key or passphrase in addition to one or more answers to one or more corresponding challenge questions. Even more advanced modes of device authentication involve biometric analysis in which the finger print, voice print or iris scan of an end user can be compared to a pre-stored print in order to assure the authorized access of a submitting end user.
"Imagery has been incorporated previously in the device authentication process. Specifically, an image can be pre-stored by an end user and, during authentication, the pre-stored image can be provided to the end user so that the end user can be assured that the authentication system is genuine and not spoofed. Likewise, imagery has been incorporated into an authentication process by comparing a pre-stored image to that acquired by a device camera. To the extent the imagery matches, access to the device can be granted. Of course, acquiring an image that precisely matches a pre-stored image is not without its apparent complications."
In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventors' summary information for this patent application: "Embodiments of the present invention address deficiencies of the art in respect to image based authentication and provide a novel and non-obvious method, system and computer program product for image meta data driven device authentication. In an embodiment of the invention, a method for image meta data driven device authentication is provided. The method includes acquiring an image in a computing device on behalf of an end user and generating a set of keywords describing the image in image recognition logic coupled to the computing device. The method additionally includes comparing the set of keywords describing the image to keywords in a keyword list stored in connection with the end user. Finally, the method includes authenticating the end user if a threshold number of keywords in the set match keywords in the keyword list, but otherwise denying the end user access to the computing device.
"In another embodiment of the invention, a computer data processing system can be configured for image meta data driven device authentication. The system can include a host computing device with memory and at least one processor and an image sensor coupled to the host computing device. The system also can include a data store of keyword lists each keyword list stored in connection with a different end user. Finally, the system can include an image meta data based authentication module executing in the memory of the host computing device. The module can include program code enabled to generate in image recognition logic a set of keywords describing an image acquired by the image sensor coupled to the computing device, to compare the set of keywords describing the image, to compare the set of keywords describing the image to keywords in a keyword list stored in the data store in connection with the end user, and to authenticate the end user if a threshold number of keywords in the set match keywords in the keyword list, but otherwise to deny the end user access to the computing device.
"Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
"The accompanying drawings, which are incorporated in and constitute part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. The embodiments illustrated herein are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown, wherein:
"FIG. 1 is a pictorial illustration of a process for image meta data driven device authentication;
"FIG. 2 is a schematic illustration of a data processing system configured for image meta data driven device authentication; and,
"FIG. 3 is a flow chart illustrating a process for image meta data driven device authentication."
URL and more information on this patent application, see: Dominic, Joel T.; Loredo, Robert E.; Rodriguez, Adrian X.; Soto,
Keywords for this news article include: Information Technology, Information and Data Processing,
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Islamic State Obliterating Cultural Landmarks in Mosul
- The 2014 Fastest-Growing 100
- 'Lucy's' Super Powers Tops 'Hercules' at Box Office
- Boehner Says Impeachment Talk Is Democrat Scam
- You're So Vain: Microsoft to Launch First 'Selfie Phone'
- VW Site Could Mean Another 2,000 Jobs for Chattanooga
- U.S. Home Price Gains Slow for 6th Month in a Row
- RV Sales See Highest Increase Post Great Recession
- Report: China to Declare Qualcomm a Monopoly
- Insecticides Permeate U.S. Food, Water Supply