Access control through multi-factor image authentication

Active Publication Date: 2019-07-09
MASSACHUSETTS MUTUAL LIFE INSURANCE COMPANY
View PDF36 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]Disclosed herein are systems and methods for authenticating users accessing financial accounts from user terminals such as automatic teller machines (ATMs). According to an embodiment, a user authentication operates within a system hardware and software architecture and authenticates users to process a requested transaction. According to an embodiment, a system and method of authenticating user access to financial accounts uses multi-factor facial image authentication to decrease the potential for fraudulent transactions. The system and method captures a first facial image of a user and compares this image with stored facial recognition credentials. The method prompts the user via a facial gesture cue to make a facial gesture, captures a second facial image of the user, and compares the second image with stored facial gesture credentials. The user is authorized to perform a transaction in the event the first facial image matches a facial recognition credential for an authorized account, and the second facial image matches a facial gesture credential associated with the authorized account. An additional authentication factor may employ a secondary biometric sensor.

Problems solved by technology

One issue with ATMs and other such secret password authentication based systems is that they are vulnerable to fraud.
Since the customer has already reclaimed his ATM card and has completed the transaction, the customer might vacate the ATM prior to termination of authentication, thus leaving the authenticated session open for potential fraudulent use.
Additionally, malicious users may obtain bank account information by attaching scanning devices to an ATM to read a transaction card and record the embedded account information, and also obtain the user's PIN number by watching or recording video of the user entering the PIN on the ATM keypad.
Other systems in which a user enters a password, PIN, log-in or other private information are similarly susceptible to fraud.
Although customer authentication by facial recognition offers various advantages, it too can be vulnerable to fraud when employed as a stand-alone authentication technique.
Therefore, a malicious user may be able to gain access to an ATM account or other secured system simply by procuring a picture or other artificial representation of an authorized user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control through multi-factor image authentication
  • Access control through multi-factor image authentication
  • Access control through multi-factor image authentication

Examples

Experimental program
Comparison scheme
Effect test

Example

[0031]The present disclosure is here described in detail with reference to embodiments illustrated in the drawings, which form a part hereof. Other embodiments may be used and / or other changes may be made without departing from the spirit or scope of the present disclosure. The illustrative embodiments described in the detailed description are not meant to be limiting of the subject matter presented here.

[0032]Reference will now be made to the exemplary embodiments illustrated in the drawings, and specific language will be used here to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Alterations and further modifications of the inventive features illustrated here, and additional applications of the principles of the inventions as illustrated here, which would occur to one skilled in the relevant art and having possession of this disclosure, are to be considered within the scope of the invention.

System Componen

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and system for authenticating users accessing financial accounts from user terminals via multi-factor image authentication. The system includes an authentication server and a user terminal. The method captures a first facial image of a user and compares this image with stored facial recognition credentials. The method prompts the user via a facial gesture cue to make a facial gesture, captures a second facial image of the user, and compares the second image with stored facial gesture credentials. The user is authorized to perform a transaction in the event the first facial image matches a facial recognition credential for an authorized account, and the second facial image matches a facial gesture credential associated with the authorized account. Facial gesture credentials may be based upon static gestures or dynamic gestures, and may be overt or secret. An additional authentication factor may employ a secondary biometric sensor.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner MASSACHUSETTS MUTUAL LIFE INSURANCE COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products