Patent classifications
G06F21/36
Real-world object-based image authentication method and system
A real-world object-based method and system of performing an authentication of a person in order to permit access to a secured resource is disclosed. The system and method are configured to collect image data from an end-user in real-time that includes objects in their environment. At least one object is selected and its image data stored for subsequent authentication sessions, when the system can determine whether there is a match between the new image data and image data previously collected and stored in a database. If there is a match, the system verifies an identity of the person and can further be configured to automatically grant the person access to one or more services, features, or information for which he or she is authorized.
Real-world object-based image authentication method and system
A real-world object-based method and system of performing an authentication of a person in order to permit access to a secured resource is disclosed. The system and method are configured to collect image data from an end-user in real-time that includes objects in their environment. At least one object is selected and its image data stored for subsequent authentication sessions, when the system can determine whether there is a match between the new image data and image data previously collected and stored in a database. If there is a match, the system verifies an identity of the person and can further be configured to automatically grant the person access to one or more services, features, or information for which he or she is authorized.
COMMUNICATION APPARATUS, CONTROL METHOD FOR COMMUNICATION APPARATUS, AND STORAGE MEDIUM
A communication apparatus includes a first execution unit, a second execution unit, and a selecting unit. The first execution unit performs a first process for setting a wireless parameter, based on information obtained from a captured image. The setting of a wireless parameter is performed between the communication apparatus and another communication apparatus that operates as an access point and that is different from the communication apparatus. The second execution unit performs, based on information obtained from a captured image, a second process for setting a wireless parameter to another communication apparatus that operates as a station and that is different from the communication apparatus. The wireless parameter is one for performing wireless communication with an access point. The selecting unit selects whether the first process or the second process is to be performed, in a case where information is obtained from a first captured image.
COMMUNICATION APPARATUS, CONTROL METHOD FOR COMMUNICATION APPARATUS, AND STORAGE MEDIUM
A communication apparatus includes a first execution unit, a second execution unit, and a selecting unit. The first execution unit performs a first process for setting a wireless parameter, based on information obtained from a captured image. The setting of a wireless parameter is performed between the communication apparatus and another communication apparatus that operates as an access point and that is different from the communication apparatus. The second execution unit performs, based on information obtained from a captured image, a second process for setting a wireless parameter to another communication apparatus that operates as a station and that is different from the communication apparatus. The wireless parameter is one for performing wireless communication with an access point. The selecting unit selects whether the first process or the second process is to be performed, in a case where information is obtained from a first captured image.
ELECTRONIC DEVICE AND REMOTE CONTROL SYSTEM
A computer includes an SMS module that communicates with a management server apparatus via a network, a display that displays predetermined information, and a CPU that controls an operation of the display. When the SMS module receives a control command from the management server apparatus via the network, the CPU executes processing corresponding to the control command. Furthermore, the CPU transmits a notification signal including information, which indicates a state of execution of the control program, to the management server apparatus via the network.
Furthermore, the CPU displays, on the display, a state indicator including information which indicates a state of execution of the control program when the notification signal cannot be transmitted to the management server apparatus via the network.
SYSTEMS AND METHODS FOR AUTHENTICATION CODE ENTRY IN TOUCH-SENSITIVE SCREEN ENABLED DEVICES
Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen sensing a first input comprising at least one finger touch; (2) the touch-sensitive screen sensing a release of the first input; (3) the at least one computer processor determining a first number of finger touches in the first input; and (4) the at least one computer processor using the first number of finger touches to identify a first portion of an authentication code.
TURING TEST VIA FAILURE
Current CAPTCHA tests are designed to be difficult for a bot and simple for a human-user to answer; however, as artificial intelligence improves, bots are more capable of using techniques such as optical character recognition to resolve current CAPTCHAs in similar manners as human-users. By providing a CAPTCHA challenge from a library or set of challenges that are designed in a manner that causes or likely causes a human-user to trivially get the answer to the challenge wrong, helps to confirm that a user is a human-user, as a bot would answer the challenge correctly.
TURING TEST VIA FAILURE
Current CAPTCHA tests are designed to be difficult for a bot and simple for a human-user to answer; however, as artificial intelligence improves, bots are more capable of using techniques such as optical character recognition to resolve current CAPTCHAs in similar manners as human-users. By providing a CAPTCHA challenge from a library or set of challenges that are designed in a manner that causes or likely causes a human-user to trivially get the answer to the challenge wrong, helps to confirm that a user is a human-user, as a bot would answer the challenge correctly.
Visual token passwords
Embodiments herein describe using visual passwords to control access to secure information. When a user attempts to access the secure information, she can provide her username to an authentication agent which identifies the visual password corresponding to the received username and selects a first set of images that contains the visual password and a second set of images that does not. The first and second sets of images are then transmitted to a user device. The user device can display the first and second sets of images to the user who selects which images have the visual password. An indication of which images the user selected is then transmitted to the authentication engine which determines whether the user selected all the images in the first set and none of the images in the second set. If so, the user is granted access to the secure information.
Visual token passwords
Embodiments herein describe using visual passwords to control access to secure information. When a user attempts to access the secure information, she can provide her username to an authentication agent which identifies the visual password corresponding to the received username and selects a first set of images that contains the visual password and a second set of images that does not. The first and second sets of images are then transmitted to a user device. The user device can display the first and second sets of images to the user who selects which images have the visual password. An indication of which images the user selected is then transmitted to the authentication engine which determines whether the user selected all the images in the first set and none of the images in the second set. If so, the user is granted access to the secure information.