US 11,704,398 B1
Real-world object-based image authentication method and system
Brian Tougas, Spring Branch, TX (US); William Daniel Farmer, Carrollton, TX (US); Ruthie D. Lyle, Durham, NC (US); Kelly Q. Baker, San Antonio, TX (US); Ryan Thomas Russell, The Colony, TX (US); and Noe Alberto Martinez, San Antonio, TX (US)
Assigned to United Services Automobile Association (USAA), San Antonio, TX (US)
Filed by UIPCO, LLC, San Antonio, TX (US)
Filed on May 11, 2021, as Appl. No. 17/317,046.
Claims priority of provisional application 63/022,812, filed on May 11, 2020.
Int. Cl. G06F 21/33 (2013.01); H04L 12/18 (2006.01); G06F 21/36 (2013.01); G06V 10/44 (2022.01)
CPC G06F 21/33 (2013.01) [G06F 21/36 (2013.01); G06V 10/443 (2022.01); H04L 12/1822 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of authenticating an identity of an individual, the method comprising:
obtaining first image data at a first time from a first computing device associated with a first user, the first image data including a virtual representation of a real-world object that is located in proximity to the first user;
executing an object recognition protocol to detect one or more objects in a background of the first image data, the one or more objects including the real-world object;
receiving, from the first user, a selection of the real-world object;
tagging, in response to the selection, the real-world object in the first image data as a verification object token;
receiving, at a second time after the first time, a request for access by a first person to a secured resource associated with the first user;
obtaining, in response to the request for access, second image data that includes a virtual representation of the real-world object;
executing the object recognition protocol to detect one or more objects in a background of the second image data, the one or more objects including the real-world object;
tagging the real-world object in the second image data as an object token;
determining if the object token and the verification object token sufficiently match;
determining, in response to the object token matching the verification object token, the first person is the first user; and
thereby authenticating the first person for access to the secured resource.