| CPC G06F 21/32 (2013.01) [G06V 10/74 (2022.01); G06V 40/10 (2022.01)] | 18 Claims |

|
1. A computer-implemented method of verifying an authenticity of video in order to protect user resources, the method comprising:
receiving, at a cloud-based authentication system and from a first computing device, a request by a first person to access a secured resource of a first user;
receiving at a first time, at the authentication system, first image data captured by a camera of the first computing device, the camera being configured to capture light outside the visible spectrum;
detecting, via an application associated with the authentication system, a visible tattoo in the first image data;
causing, via the authentication system and at the first computing device, the camera to focus on the visible tattoo, such that the first image data includes the visible tattoo;
detecting, at the authentication system, a first cloaked token in the first image data, the first cloaked token being invisible in visible light with a wavelength between 400 nm and 700 nm and only revealed in a particular band of nonvisible light with a wavelength below 400 nm or above 700 nm;
wherein the visible tattoo is overlaid on the first cloaked token and represents a landmark for guiding the authentication system to the position of the first cloaked token;
determining the first cloaked token meets or exceeds a threshold value to a reference pattern so as to be classified as a match;
verifying, in response to the first cloaked token matching the reference pattern, an authenticity of the video; and
thereby granting the first person access to the secured resource for which the first user is authorized.
|