Patent classifications
G06F2221/2133
NEURAL STYLE TRANSFER BASED SLIDER PUZZLE CAPTCHA
Two CAPTCHA variants based on neural style transferred image are described: an option-based CAPTCHA and a slider-based CAPTCHA. In the neural style transfer-based slider puzzle CAPTCHA, a neural style transferred image is used as the background. Multiple missing blocks and a puzzle block to be moved are embedded on the neural style transferred image. The user is presented with a slider, using which they can drag the sliding block and place it on the correct missing block. Since the background image is neural style transferred, it becomes difficult to decipher the original image due to high difference in the texture. Placing multiple missing blocks makes the system more resilient to attacks because the chances of finding the correct missing block position is decreased. In the option-based neural style transfer image CAPTCHA, a neural style transferred image of an object/animal is presented to the user along with multiple options. The user is asked to select the option that best describes the presented image. A neural style transferred image helps the CAPTCHA to be more resilient to automated attacks, since the ability of image being reverse searched and answered is less.
SYSTEMS AND METHODS FOR PROVIDING USER VALIDATION
The system generates a validation tool in response to receiving an indication to initiate validation. The system identifies at least one media content item based on a user profile, and generates at least one question based on the at least one media content item. The at least one media content item may include an image, a video, text, or a combination thereof. The system determines at least one answer corresponding to the at least one question. The question and answer may be determined based on a question template. For example, the template may be selected based on attribute types or values of the at least one media content item. The system generates the at least one question for output on an output device. Upon receiving input indicative to an answer, the system compares the inputted answer to the determined answer to determine whether to validate the user.
Automatic device zeroization
Systems, apparatuses, and methods are described for zeroization of a computing device based on biometric information and vitality information. A computing device may store information associated with a user. The computing device may request biometric information and vitality information from one or more sensing devices. The computing device may determine, based on the requested biometric information and the requested vitality information, whether to zeroize the computing device.
Systems and methods for providing user validation
The system generates a validation tool in response to receiving an indication to initiate validation. The system identifies at least one media content item based on a user profile, and generates at least one question based on the at least one media content item. The at least one media content item may include an image, a video, text, or a combination thereof. The system determines at least one answer corresponding to the at least one question. The question and answer may be determined based on a question template. For example, the template may be selected based on attribute types or values of the at least one media content item. The system generates the at least one question for output on an output device. Upon receiving input indicative to an answer, the system compares the inputted answer to the determined answer to determine whether to validate the user.
Systems and methods for providing security via interactive media
Methods and systems for providing security and verifying a human user and/or an authorized user are described. A system may include a processor and a non-transitory, processor-readable storage medium. The non-transitory, processor-readable storage medium may include one or more programming instructions that, when executed, cause the processor to receive a request to access a secured resource, provide a verification challenge to a user via a user interface, receive at least one input from the user in response to the verification challenge, and determine that the at least one input corresponds to at least one parameter indicative of a human user. The verification challenge may include a game.
Display device
A display device is provided. The display device includes a substrate and a plurality of pixels disposed on the substrate. One of the pixels includes a first light filter layer. The display device also includes a first light shielding layer, a second light shielding layer, and a plurality of light emitting diodes. The first light shielding layer defines a plurality of openings, wherein the first light filter layer is disposed in one of the openings. The second light shielding layer is disposed on the substrate and at least partially overlapped with the first light shielding layer. The second light shielding layer defines another plurality of openings, and the light emitting diodes are disposed in the another plurality of openings. In a direction parallel to an upper surface of the substrate, the second light shielding layer overlaps the plurality of light emitting diodes.
Authenticating a user via a customized image-based challenge
Systems and methods for authenticating a user via a customized image-based challenge are disclosed. In embodiments, a computer-implemented method comprises: receiving an access request from a user requesting access to content; generating a list of items recommended for the user based on computer-based user behavior data; selecting from the list of recommended items: a first set of items and a second set of items, wherein the first set of items are associated with a characteristic and the second set of items are not associated with the characteristic; generating an image-based challenge comprising a test question to be answered by the user and a plurality of selectable images including images of each of the first set of items and images of each of the second set of items; and providing the image-based challenge to a user computer device of the user.
Visual image authentication
Methods and systems described herein authenticate a user and help secure transaction. A display screen presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a user selects a sequence of visual images as a means of authenticating the user and logging into a financial account or other corporate account. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize, and select. In an embodiment, a user presses his or her finger or fingers on a display screen to select images as a method for authenticating and protecting communication from malware. In an embodiment, non-determinism in hardware helps unpredictably vary the image selected, the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.
Facial recognition for user authentication
Systems and methods for utilizing an image capture device to scan facial features of a user, responsive to recognition of a plurality of beam projection points on the face of the user. The first data captured from scanning the facial features may be authenticated against a facial depth map stored as a data structure in a data storage medium. In response to successful authentication, the facial features of the user may be continually scanned to detect facial movements indicative of the user's liveness. Access may be granted to the user, in response to verifying the user's liveness.
Methods and systems for acoustic authentication
Systems and methods are disclosed for generating an acoustic authentication data entry interface. One method comprises generating a random sequence of characters and a visual user interface element comprising a plurality sections, each section of the visual user interface element being associated with a respective character of the generated random sequence of characters. A section of the visual user interface elements is displayed to a user. Concurrently, an audio recording of a character associated with the displayed section is played to the user. Based on determining user selection of the displayed section, the character associated with the displayed section is logged as part of an authentication data. When all of the characters constituting the authentication data are logged, an electronic transaction authorization request is sent to an acquirer processor.