US 12,346,421 B1
Tattoo detection-based video authentication method and system
Brian Tougas, Spring Branch, TX (US); William Daniel Farmer, Carrollton, TX (US); Ruthie D. Lyle, Durham, NC (US); Kelly Q. Baker, San Antonio, TX (US); Ryan Thomas Russell, Auburn, WA (US); and Noe Alberto Martinez, San Antonio, TX (US)
Assigned to United Services Automobile Association (USAA), San Antonio, TX (US)
Filed by UIPCO, LLC, San Antonio, TX (US)
Filed on Oct. 27, 2022, as Appl. No. 18/050,214.
Claims priority of provisional application 63/273,494, filed on Oct. 29, 2021.
Int. Cl. G06F 21/32 (2013.01); G06V 10/74 (2022.01); G06V 40/10 (2022.01)
CPC G06F 21/32 (2013.01) [G06V 10/74 (2022.01); G06V 40/10 (2022.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method of verifying an authenticity of video in order to protect user resources, the method comprising:
receiving, at a cloud-based authentication system and from a first computing device, a request by a first person to access a secured resource of a first user;
receiving at a first time, at the authentication system, first image data captured by a camera of the first computing device, the camera being configured to capture light outside the visible spectrum;
detecting, via an application associated with the authentication system, a visible tattoo in the first image data;
causing, via the authentication system and at the first computing device, the camera to focus on the visible tattoo, such that the first image data includes the visible tattoo;
detecting, at the authentication system, a first cloaked token in the first image data, the first cloaked token being invisible in visible light with a wavelength between 400 nm and 700 nm and only revealed in a particular band of nonvisible light with a wavelength below 400 nm or above 700 nm;
wherein the visible tattoo is overlaid on the first cloaked token and represents a landmark for guiding the authentication system to the position of the first cloaked token;
determining the first cloaked token meets or exceeds a threshold value to a reference pattern so as to be classified as a match;
verifying, in response to the first cloaked token matching the reference pattern, an authenticity of the video; and
thereby granting the first person access to the secured resource for which the first user is authorized.