The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 23, 2021

Filed:

Dec. 21, 2018
Applicant:

Oath Inc., New York, NY (US);

Inventors:

Lachlan Maxwell, Ashburn, VA (US);

Dante J. Pacella, Charles Town, WV (US);

Mani Tadayon, Leesburg, VA (US);

Saravanan Mallesan, Fairfax, VA (US);

Lee Edward Sattler, Mount Airy, MD (US);

Jean M. McManus, Bernardsville, NJ (US);

Assignee:

VERIZON PATENT AND LICENSING INC., Basking Ridge, NJ (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06K 9/00 (2006.01); G06T 11/00 (2006.01); G06K 9/68 (2006.01); G06T 5/00 (2006.01); G06F 21/32 (2013.01);
U.S. Cl.
CPC ...
G06K 9/00617 (2013.01); G06F 21/32 (2013.01); G06K 9/0061 (2013.01); G06K 9/00906 (2013.01); G06K 9/68 (2013.01); G06T 5/004 (2013.01); G06T 11/001 (2013.01);
Abstract

The present teaching relates to method, system, medium, and implementations for authenticating a user. An authentication session is initiated to authenticate, via iris, a person claiming to be an authorized user. An obfuscation configuration is retrieved with respect to the authorized user and used to determine a sub-obfuscation configuration in accordance with information associated with the authentication session. A set of expected features associated with the sub-obfuscation configuration is obtained. One or more pictures are captured from the iris of the person who is expected to carry out at least one obfuscation measure consistent with the sub-obfuscation configuration for the authorized user in accordance with the information related to the authentication session and are used to determine whether the person is live based on the set of expected features associated with the sub-obfuscation configuration.


Find Patent Forward Citations

Loading…