US 12,327,433 B2
Spoof images for user authentication
Rafi Ud Daula Refat, Ann Arbor, MI (US); Hafiz Malik, Canton, MI (US); Ali Hassani, Ann Arbor, MI (US); and Justin Miller, Berkley, MI (US)
Assigned to Ford Global Technologies, LLC, Dearborn, MI (US)
Filed by Ford Global Technologies, LLC, Dearborn, MI (US)
Filed on Aug. 5, 2022, as Appl. No. 17/817,665.
Prior Publication US 2024/0046708 A1, Feb. 8, 2024
Int. Cl. G06V 40/40 (2022.01); G06V 10/82 (2022.01); G06V 40/16 (2022.01); G06V 40/50 (2022.01)
CPC G06V 40/45 (2022.01) [G06V 10/82 (2022.01); G06V 40/171 (2022.01); G06V 40/172 (2022.01); G06V 40/50 (2022.01)] 19 Claims
OG exemplary drawing
 
1. A computer comprising a processor and a memory, the memory storing instructions executable such that the processor is programmed to:
obtain a current image in response to a request for facial recognition authentication of a user;
generate a set of current image features from the current image;
retrieve live image features and spoof image features for the user, wherein retrieving the spoof image features includes retrieving spoof embeddings based on a six-degree of freedom pose of the user identified from the current image; and
output a determination that the input image is one of live or spoofed based on a comparison of the current image features to the live image features and the spoof image features.