US 12,413,596 B2
Enhanced authentication using a secure document
Erik Neighbour, Arlington, VA (US); Jason Pribble, McLean, VA (US); and Swapnil Patil, Chantilly, VA (US)
Assigned to Capital One Services, LLC, McLean, VA (US)
Filed by Capital One Services, LLC, McLean, VA (US)
Filed on Jun. 5, 2023, as Appl. No. 18/328,939.
Prior Publication US 2024/0406187 A1, Dec. 5, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/107 (2013.01) [H04L 63/08 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for location-based authentication using a document and a device location, the system comprising:
one or more memories; and
one or more processors, communicatively coupled to the one or more memories, configured to:
detect an authentication event associated with an access attempt for an account;
obtain, from a device, a document image based on detecting the authentication event, the document including location information associated with an owner of the document;
process the document image to obtain a location based on the location information associated with the owner of the document, wherein processing the document image includes at least one of:
performing optical character recognition using the document image to obtain the location, or
scanning a machine-readable code depicted in the document image to obtain the location;
obtain location information associated with the device, the location information associated with the device including at least one of:
information indicated via metadata associated with the document image, or
positioning information indicated by the device;
determine a confidence score based on the location information associated with the owner of the document and the location information associated with the device,
wherein the confidence score indicates a likelihood that the device is associated with the owner of the document, and
wherein the confidence score is based on a correlation between the location information associated with the owner of the document and the location information associated with the device; and
authenticate the access attempt based on the confidence score satisfying a threshold.