CPC G06F 21/33 (2013.01) [G06F 21/36 (2013.01); G06V 10/443 (2022.01); H04L 12/1822 (2013.01)] | 20 Claims |
1. A method of authenticating an identity of an individual, the method comprising:
obtaining first image data at a first time from a first computing device associated with a first user, the first image data including the first user and a first real-world object;
executing an object recognition protocol to detect one or more objects in a background of the first image data, the one or more objects including the real-world object;
receiving, from the first user, a selection of the real-world object;
tagging, in response to the selection, the real-world object in the first image data as a verification object token;
receiving, at a second time after the first time, a request for access by a first person to a secured resource associated with the first user;
in response to the request for access and independent of further input from the first person, automatically obtaining second image data that includes the first person and a second real-world object; and
automatically authenticating the first person for access to the secured resource when the second real-world object matches the verification object token.
|