US 12,271,462 B1
Secondary device remote signaling-based video authentication method and system
Ruthie D. Lyle, Durham, NC (US); Snehal Desai, Richardson, TX (US); David Joaquin Harris, San Antonio, TX (US); Eric David Schroeder, San Antonio, TX (US); and Jeffrey David Calusinski, San Antonio, TX (US)
Assigned to United Services Automobile Association (USAA), San Antonio, TX (US)
Filed by UIPCO, LLC, San Antonio, TX (US)
Filed on Aug. 31, 2022, as Appl. No. 17/823,551.
Claims priority of provisional application 63/239,074, filed on Aug. 31, 2021.
Int. Cl. G06F 21/36 (2013.01); G06F 1/16 (2006.01); G06F 21/32 (2013.01); H04N 7/15 (2006.01)
CPC G06F 21/36 (2013.01) [G06F 1/163 (2013.01); G06F 21/32 (2013.01); H04N 7/15 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method of verifying an authenticity of images in order to protect user resources, the method comprising:
receiving, at a cloud-based authentication system and from a first computing device including a camera, a request to access a secured resource of a first user;
in response to the request, transmitting, from the authentication system, a first control signal to a second computing device associated with the first user, wherein the second computing device is different than the first computing device, the first control signal including a first pattern;
transmitting, from the authentication system, a second control signal to the first computing device, the second control signal triggering first image data captured by the camera of the first computing device;
obtaining, at the authentication system, the first image data captured by the camera of the first computing device when presentation or production of the first pattern via the second computing device was to have occurred, the first image data including both (1) the second computing device, and (2) a face of a person;
determining that the first image data includes a representation of the first pattern by the second computing device;
determining, in response to the first image data including a representation of the first pattern, that the first image data includes an authentic image of the first user; and
thereby granting access to the secured resource of the first user via the first computing device.