| CPC G06F 21/36 (2013.01) [G06F 1/163 (2013.01); G06F 21/32 (2013.01); H04N 7/15 (2013.01)] | 20 Claims |

|
1. A computer-implemented method of verifying an authenticity of images in order to protect user resources, the method comprising:
receiving, at a cloud-based authentication system and from a first computing device including a camera, a request to access a secured resource of a first user;
in response to the request, transmitting, from the authentication system, a first control signal to a second computing device associated with the first user, wherein the second computing device is different than the first computing device, the first control signal including a first pattern;
transmitting, from the authentication system, a second control signal to the first computing device, the second control signal triggering first image data captured by the camera of the first computing device;
obtaining, at the authentication system, the first image data captured by the camera of the first computing device when presentation or production of the first pattern via the second computing device was to have occurred, the first image data including both (1) the second computing device, and (2) a face of a person;
determining that the first image data includes a representation of the first pattern by the second computing device;
determining, in response to the first image data including a representation of the first pattern, that the first image data includes an authentic image of the first user; and
thereby granting access to the secured resource of the first user via the first computing device.
|