CPC G06V 40/172 (2022.01) [G06V 40/161 (2022.01)] | 20 Claims |
1. A method for authenticating a user using image recognition in noisy environments using at least one hardware processor, the method comprising:
identifying a failed authentication attempt for the user, the failed authentication attempt identified in response to a comparison between a captured image of the user and a first image template;
identifying a successful authentication attempt for the user, the successful authentication attempt occurring subsequent to the failed authentication attempt and using a credential of the user;
in response to the successful authentication attempt, generating a second image template different than the first image template using the captured image;
in response to generating the second image template, establishing an expiration time of a timer;
subsequent to establishing the expiration time of the timer and prior to the timer reaching the expiration time, receiving a new authentication request for the user;
in response to identifying that the new authentication request occurred prior to the timer reaching the expiration time, using the second image template to authenticate the user;
identifying a successful authentication for the new authentication request using the second image template; and
granting access to a computing device based on the entitled successful authentication for the new authentication request.
|