G06F2221/2133

Method, apparatus and system for authenticating a user based on eye data and/or facial data

Systems, apparatuses and methods may provide for technology to identify image data, identify eye data from the image data, where the eye data includes one or more of an eye movement of a user or a point of gaze of the user on a display, and determine whether to authenticate the user based on the one or more of the eye movement or the point of gaze.

Systems and methods for detecting liveness in captured image data
11475714 · 2022-10-18 · ·

Systems for detecting liveness in image data may perform a process including receiving, from one or more image capture devices, two-dimensional image data representing two images captured simultaneously and depicting the same human person, including data representing light captured in two spectral bands, such as visible light and infrared light. The received image data may be converted to grayscale or downsampled prior to further processing. The process may include creating a two-dimensional combined image representation of the received image data and analyzing the combined image representation to detect any implied three-dimensional features using a neural network or machine learning. The process may include classifying the received image data as likely to depict a live person or a two-dimensional spoof of a live person, dependent on the analysis, and outputting a classification result indicating a likelihood that the received image data depicts a live person.

Intuition-based challenges

A system can be configured to determine whether a user is a human or a computer based on whether the user is capable of intuitive-based decision making to identify requested features. The system can generate a challenge that includes a question emphasizing mental shortcuts and associations developed through social and cultural interactions. The challenge also includes one or more media objects that are distinguishable to a human user due to the mental shortcuts and associations that permit selection of the correct media object in light of the question. Intuitive connections between statements and media objects are often difficult to implement within computer programs and algorithms due to the two-stage challenge requiring both comprehension and recognition of important features.

INITIATING DIRECT SESSION WITH BANK ACCESS CONTROL SERVER IN A USER VERIFICATION PROCESS
20230122616 · 2023-04-20 ·

A computerized method for securely verifying age of users of remote devices interacting with provider resources includes receiving a request for age verification of the user; providing directly to the user device an interface for input of identifying data; receiving, from the user device, identifying data; providing, to a third party verification source, the identifying data; receiving, from the third party verification source, an indication of confirmation of the identifying data; determining, based on the received indication, whether a confidence level has been met; responsive to determining that a confidence level as been met, causing a token indicative of age verification to be generated; providing the token to the user device; providing a positive indication to the provider system, including identification of the token, and anonymizing user-identifiable data.

ANOMALOUS USER INTERFACE INPUT DETECTION
20230061311 · 2023-03-02 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting anomalous user interface interactions. One of the methods includes receiving, for a user interface element, interaction locations that indicate where interactions with the user interface element occurred when the user interface element was provided on behalf of a first system; determining a difference between (i) a first distribution of the interaction locations for the user interface element when the user interface element was provided on behalf of the first system and (ii) a second distribution of the interaction locations for the user interface element when the user interface element was provided on behalf of a second system; classifying the first distribution of the interaction locations as anomalous in response to the difference not satisfying a condition; and preventing the first system from accessing another system to which the first system was trying to gain access.

ANTIMICROBIAL COATING

An antimicrobial coating is formed from a biocompatible flexible polymer having incorporated therein an active material having a reducible form of silver, where at least a portion of the active material is exposed at the surface of the polymer. The coating can be applied to the surface of a catheter to inhibit bacterial growth and biofilm formation.

MODULAR METRICS BAR FOR AN EXERCISE MACHINE

A system includes an exercise machine and a computing device coupled to the exercise machine. The computing device presents a metrics bar within a graphical user interface in an initial state, detects a start of a first workout experience by a user on the exercise machine, retrieve a first set of metrics from stored user preferences data based on a workout experience type, workout type, and exercise machine type of the first workout experience, and displays the first set of metrics in a display area of the metrics bar during the first workout experience. The computing device detects a start of a second workout experience, determines a second set of metrics from the stored user preferences data based on a workout experience type, workout type, and exercise machine type of the second workout experience, and displays the second set of metrics in the metrics bar during the second workout experience.

SYSTEM TO DETECT AUTOMATED WEB SUBMISSIONS

A system to identify automated submissions of web pages, such as those submitted by bots, in real time. The system comprising a processor configured to update an initial version of a requested web page with at least one hidden field, transmit the updated web page to the client, then, upon receipt parse the completed web page, and identify if a data entry is associated with the at least one hidden field. Where a data entry is associated with the at least one hidden field, the system blocks the transmission of the completed web page to the server. Where a data entry is not associated with the at least one hidden field the system removes the at least one hidden field, and transmits the final web page to the server.

Live data viewing security

The techniques utilize an authentication process to authenticate the user to view protected data and an image monitoring process to monitor the field of view of the image detection component. When a user requests access to the protected data, the authentication process is activated. After a user is authenticated, the data may be displayed and an image monitoring process is activated and may use the image detection component to monitor the field of view to determine whether the user is actively viewing the data or that an additional person is in the field of view. When either event is detected, the protected data is concealed at the display of the user device.

RtCaptcha: a real-time captcha based liveness detection system

Example systems and methods for defending against powerful, automated attacks on facial authentication systems are disclosed. A first verification is performed based at least in part on determining a response time for a response to a CAPTCHA or other challenge. In response to determining that the response time is within a threshold, a second verification is performed based at least in part on extracting a face feature or a voice feature from a plurality of samples associated with the response.