Embodiments of the present invention relate generally to facial detection technology and, more particularly, relate to a method, apparatus, and computer program product for facilitating the authentication of a message recipient using facial detection.
Currently electronic messages, such as electronic mail and text messages, are transmitted by a sender without the ability to ensure that only the intended recipient receives and/or views the message. In some cases, important messages may be addressed to the wrong person or may be sent to a recipient with a compromised inbox. In some instances the recipient is not even aware that their individual mailbox has been compromised. In these situations personal and/or private information may be distributed to the public and/or to wrong recipients in instances in which it was not intended.
Methods, apparatuses, and computer program products are herein provided for facilitating the authentication of a recipient of an electronic message using facial detection. In one embodiment, an image of an intended recipient of an electronic message may be located and/or verified in an instance in which the message is transmitted. Then, prior to allowing the message to be viewed and/or accessed by a user, an image is captured of the user that is attempting to view and/or access the message. Based on the comparison between the image of the intended recipient and the captured image, systems, methods, apparatuses, and computer program products in accordance with various embodiments disclosed herein may determine whether there is a match between the two images. In instances in which there is a match, then the user is determined to be the intended recipient and thus may view the message.
One example method may include receiving a message. The message may include a plurality of encoded facial features that identify a message recipient. The method may further include causing an image to be captured of the message recipient in an instance in which the message is accessed. The method may also include authenticating the message recipient based on the captured image and the received plurality of encoded features provided with the received message.
In another embodiment, an apparatus comprising a processor and a memory comprising software, the memory and the software configured to, with the processor, cause the apparatus to at least receive a message, wherein the message includes an a plurality of encoded facial features that identify a message recipient. The apparatus is further caused to cause an image to be captured of the message recipient in an instance in which the received message is accessed. The apparatus is further caused to authenticate the message recipient based on the captured image and the received plurality of encoded features provided with the received message.
In a further embodiment, a computer program product comprising at least one computer readable non-transitory memory having program code stored thereon, the program code which when executed by an apparatus cause the apparatus at least to: cause an image of a recipient of an electronic message to be located. A computer program product also comprises program code that is further configured to encode a plurality of facial features that identify the recipient from the image of the recipient. A computer program product also comprises program code that is further configured to cause the plurality of encoded facial features to be made available in an instance in which the electronic message is transmitted to the recipient, wherein the plurality of encoded facial features enables authentication of the recipient.
One example apparatus may comprise means for receiving a message, wherein the message includes a plurality of encoded facial features that identify a message recipient. An apparatus may also comprise means for causing an image to be captured of the message recipient in an instance in which the received message is accessed. An apparatus may also comprise means for authenticating the message recipient based on the captured image and the received plurality of encoded features provided with the received message.
One example method may comprise causing an image of a recipient of an electronic message to be located. The method may also comprise encoding a plurality of facial features that identify the recipient from the image of the recipient. The method may also comprise causing the plurality of encoded facial features to be made available in an instance in which the electronic message is transmitted to the recipient, wherein the plurality of encoded facial features enables authentication of the recipient.
In another embodiment, an apparatus comprising a processor and a memory comprising software, the memory and the software configured to, with the processor, cause the apparatus to at least cause an image of a recipient of an electronic message to be located. The apparatus is further caused to encode a plurality of facial features that identify the recipient from the image of the recipient. The apparatus is further caused to cause the plurality of encoded facial features to be made available in an instance in which the electronic message is transmitted to the recipient, wherein the plurality of encoded facial features enables authentication of the recipient.
In a further embodiment, a computer program product comprising at least one computer readable non-transitory memory having program code stored thereon, the program code which when executed by an apparatus cause the apparatus at least to receive a message, wherein the message includes an a plurality of encoded facial features that identify a message recipient. A computer program product also comprises program code that is further configured to cause an image to be captured of the message recipient in an instance in which the received message is accessed. A computer program product also comprises program code that is further configured to authenticate the message recipient based on the captured image and the received plurality of encoded features provided with the received message.
One example apparatus may comprise means for causing an image of a recipient of an electronic message to be located. An apparatus may also comprise means for encoding a plurality of facial features that identify the recipient from the image of the recipient. An apparatus may also comprise means for causing the plurality of encoded facial features to be made available in an instance in which the electronic message is transmitted to the recipient, wherein the plurality of encoded facial features enables authentication of the recipient.
One example method may comprise receiving an indication of a recipient of an electronic message from a first mobile terminal, wherein the indication includes at least one of an image or a name. The method may also comprise receiving a captured image of the recipient from a second mobile terminal. The method may also comprise causing a decryption key for the electronic message to be transmitted to the second mobile terminal in an instance in which the received indication of a recipient and the captured image of the recipient enables authentication.
In another embodiment, an apparatus comprising a processor and a memory comprising software, the memory and the software configured to, with the processor, cause the apparatus to at least receive an indication of a recipient of an electronic message from a first mobile terminal, wherein the indication includes at least one of an image or a name. The apparatus is further caused to receive a captured image of the recipient from a second mobile terminal The apparatus is further caused to cause a decryption key for the electronic message to be transmitted to the second mobile terminal in an instance in which the received indication of a recipient and the captured image of the recipient enables authentication.
In a further embodiment, a computer program product comprising at least one computer readable non-transitory memory having program code stored thereon, the program code which when executed by an apparatus cause the apparatus at least to receive an indication of a recipient of an electronic message from a first mobile terminal, wherein the indication includes at least one of an image or a name. A computer program product also comprises program code that is further configured to receive a captured image of the recipient from a second mobile terminal. A computer program product also comprises program code that is further configured to cause a decryption key for the electronic message to be transmitted to the second mobile terminal in an instance in which the received indication of a recipient and the captured image of the recipient enables authentication.
One example apparatus may comprise means for receiving an indication of a recipient of an electronic message from a first mobile terminal, wherein the indication includes at least one of an image or a name. An apparatus may also comprise means for receiving a captured image of the recipient from a second mobile terminal An apparatus may also comprise means for causing a decryption key for the electronic message to be transmitted to the second mobile terminal in an instance in which the received indication of a recipient and the captured image of the recipient enables authentication.
Having thus described embodiments of the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Example embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments are shown. Indeed, the embodiments may take many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout. The terms “data,” “content,” “information,” and similar terms may be used interchangeably, according to some example embodiments, to refer to data capable of being transmitted, received, operated on, and/or stored. Moreover, the term “exemplary”, as may be used herein, is not provided to convey any qualitative assessment, but instead merely to convey an illustration of an example. Thus, use of any such terms should not be taken to limit the spirit and scope of embodiments of the present invention.
As used herein, the term “circuitry” refers to all of the following: (a) hardware-only circuit implementations (such as implementations in only analog and/or digital circuitry); (b) to combinations of circuits and software (and/or firmware), such as (as applicable): (i) to a combination of processor(s) or (ii) to portions of processor(s)/software (including digital signal processor(s)), software, and memory(ies) that work together to cause an apparatus, such as a mobile phone or server, to perform various functions); and (c) to circuits, such as a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation, even if the software or firmware is not physically present.
This definition of “circuitry” applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term “circuitry” would also cover an implementation of merely a processor (or multiple processors) or portion of a processor and its (or their) accompanying software and/or firmware. The term “circuitry” would also cover, for example and if applicable to the particular claim element, a baseband integrated circuit or application specific integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, or other network device.
As described herein example message recipient authentication systems and methods using facial detection are disclosed. In one embodiment, a sender identifies one or more message recipients. In some example embodiments, once a recipient is identified, the most recent image of the identified recipient is located, thus allowing an encoded image of the recipient to be provided for message recipient authentication at a recipients mobile device and/or at a remote service (e.g. cloud computing system, remote server and/or the like).
In an embodiment and in an instance in which a user attempts to access the message, the systems and methods as described herein may be configured to cause an image to be captured of the user who is attempting to access the message. The received image and the captured image may then be compared to determine whether the user who is attempting to access the message is indeed an intended recipient. In instances in which the user that is attempting to access the message is authenticated as an intended recipient, then the message is opened and/or is made accessible. Otherwise the message remains locked, inaccessible and/or blocked from view until the user can be authenticated.
In alternate embodiments, a recipient's image captured during message authentication may be used to modify the message in some way. For example, a message may change colors, fonts, content, and/or the like based on the identity of the user attempting to access the message.
The facial detection apparatus 102 may be embodied as a desktop computer, laptop computer, mobile terminal, mobile computer, tablet, mobile phone, mobile communication device, one or more servers, one or more network nodes, game device, digital camera/camcorder, audio/video player, television device, radio receiver, digital video recorder, positioning device, any combination thereof, and/or the like. In an example embodiment, the facial detection apparatus 102 may be embodied as a mobile terminal, such as that illustrated in
In this regard,
As shown, the mobile terminal 10 may include an antenna 12 (or multiple antennas 12) in communication with a transmitter 14 and a receiver 16. The mobile terminal 10 may also include a processor 20 configured to provide signals to and receive signals from the transmitter and receiver, respectively. The processor 20 may, for example, be embodied as various means including circuitry, one or more microprocessors with accompanying digital signal processor(s), one or more processor(s) without an accompanying digital signal processor, one or more coprocessors, one or more multi-core processors, one or more controllers, processing circuitry, one or more computers, various other processing elements including integrated circuits such as, for example, an ASIC (application specific integrated circuit) or FPGA (field programmable gate array), or some combination thereof. Accordingly, although illustrated in
Some Narrow-band Advanced Mobile Phone System (NAMPS), as well as Total Access Communication System (TACS), mobile terminals may also benefit from embodiments of this invention, as should dual or higher mode phones (e.g., digital/analog or TDMA/CDMA/analog phones). Additionally, the mobile terminal 10 may be capable of operating according to Wireless Fidelity (Wi-Fi) or Worldwide Interoperability for Microwave Access (WiMAX) protocols.
It is understood that the processor 20 may comprise circuitry for implementing audio/video and logic functions of the mobile terminal 10. For example, the processor 20 may comprise a digital signal processor device, a microprocessor device, an analog-to-digital converter, a digital-to-analog converter, and/or the like. Control and signal processing functions of the mobile terminal 10 may be allocated between these devices according to their respective capabilities. Further, the processor may comprise functionality to operate one or more software programs, which may be stored in memory. For example, the processor 20 may be capable of operating a connectivity program, such as a web browser. The connectivity program may allow the mobile terminal 10 to transmit and receive web content, such as location-based content, according to a protocol, such as Wireless Application Protocol (WAP), hypertext transfer protocol (HTTP), and/or the like. The mobile terminal 10 may be capable of using a Transmission Control Protocol/Internet Protocol (TCP/IP) to transmit and receive web content across the internet or other networks.
The mobile terminal 10 may also comprise a user interface including, for example, an earphone or speaker 24, a ringer 22, a microphone 26, a display 28, a user input interface, and/or the like, which may be operationally coupled to the processor 20. In this regard, the processor 20 may comprise user interface circuitry configured to control at least some functions of one or more elements of the user interface, such as, for example, the speaker 24, the ringer 22, the microphone 26, the display 28, and/or the like. The processor 20 and/or user interface circuitry comprising the processor 20 may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored on a memory accessible to the processor 20 (e.g., volatile memory 40, non-volatile memory 42, and/or the like). Although not shown, the mobile terminal may comprise a battery for powering various circuits related to the mobile terminal, for example, a circuit to provide mechanical vibration as a detectable output. The user input interface may comprise devices allowing the mobile terminal to receive data, such as a keypad 30, a touch display (not shown), a joystick (not shown), and/or other input device. In embodiments including a keypad, the keypad may comprise numeric (0-9) and related keys (#, *), and/or other keys for operating the mobile terminal.
The mobile terminal 10 may include a media capturing element, such as a camera, video and/or audio module, in communication with the processor 20. The media capturing element may comprise any means for capturing an image, video and/or audio for storage, display or transmission. For example, in an example embodiment in which the media capturing element comprises camera circuitry 36, the camera circuitry 36 may include a digital camera configured to form a digital image file from a captured image. In addition, the digital camera of the camera circuitry 36 may be configured to capture a video clip. As such, the camera circuitry 36 may include all hardware, such as a lens or other optical component(s), and software necessary for creating a digital image file from a captured image as well as a digital video file from a captured video clip. Alternatively, the camera circuitry 36 may include only the hardware needed to view an image, while a memory device of the mobile terminal 10 stores instructions for execution by the processor 20 in the form of software necessary to create a digital image file from a captured image. As yet another alternative, an object or objects within a field of view of the camera circuitry 36 may be displayed on the display 28 of the mobile terminal 10 to illustrate a view of an image currently displayed which may be captured if desired by the user. As such, a captured image may, for example, comprise an image captured by the camera circuitry 36 and stored in an image file. As another example, a captured image may comprise an object or objects currently displayed by a display or viewfinder of the mobile terminal 10, but not necessarily stored in an image file. In an example embodiment, the camera circuitry 36 may further include a processing element such as a co-processor configured to assist the processor 20 in processing image data and an encoder and/or decoder for compressing and/or decompressing image data. The encoder and/or decoder may encode and/or decode according to, for example, a joint photographic experts group (JPEG) standard, a moving picture experts group (MPEG) standard, or other format.
The mobile terminal 10 may comprise memory, such as a subscriber identity module (SIM) 38, a removable user identity module (R-UIM), and/or the like, which may store information elements related to a mobile subscriber. In addition to the SIM, the mobile terminal may comprise other removable and/or fixed memory. The mobile terminal 10 may include other non-transitory memory, such as volatile memory 40 and/or non-volatile memory 42. For example, volatile memory 40 may include Random Access Memory (RAM) including dynamic and/or static RAM, on-chip or off-chip cache memory, and/or the like. Non-volatile memory 42, which may be embedded and/or removable, may include, for example, read-only memory, flash memory, magnetic storage devices (e.g., hard disks, floppy disk drives, magnetic tape, etc.), optical disc drives and/or media, non-volatile random access memory (NVRAM), and/or the like. Like volatile memory 40 non-volatile memory 42 may include a cache area for temporary storage of data. The memories may store one or more software programs, instructions, pieces of information, data, and/or the like which may be used by the mobile terminal for performing functions of the mobile terminal For example, the memories may comprise an identifier, such as an international mobile equipment identification (IMEI) code, capable of uniquely identifying the mobile terminal 10.
Returning to
The processor 110 may, for example, be embodied as various means including one or more microprocessors with accompanying digital signal processor(s), one or more processor(s) without an accompanying digital signal processor, one or more coprocessors, one or more multi-core processors, one or more controllers, processing circuitry, one or more computers, various other processing elements including integrated circuits such as, for example, an ASIC or FPGA, or some combination thereof. Accordingly, although illustrated in
The memory 112 may comprise, for example, non-transitory memory, such as volatile memory, non-volatile memory, or some combination thereof. Although illustrated in
The communication interface 114 may be embodied as any device or means embodied in circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (e.g., the memory 112) and executed by a processing device (e.g., the processor 110), or a combination thereof that is configured to receive and/or transmit data to/from another computing device. For example, the communication interface 114 may be configured to receive data representing an image over a network. In this regard, in embodiments wherein the facial detection apparatus 102 comprises a server, network node, or the like, the communication interface 114 may be configured to communicate with a remote mobile terminal (e.g., the remote terminal 304) to allow the mobile terminal and/or a user thereof to access facial detection functionality provided by the facial detection apparatus 102. In an example embodiment, the communication interface 114 is at least partially embodied as or otherwise controlled by the processor 110. In this regard, the communication interface 114 may be in communication with the processor 110, such as via a bus. The communication interface 114 may include, for example, an antenna, a transmitter, a receiver, a transceiver and/or supporting hardware or software for enabling communications with one or more remote computing devices. The communication interface 114 may be configured to receive and/or transmit data using any protocol that may be used for communications between computing devices. In this regard, the communication interface 114 may be configured to receive and/or transmit data using any protocol that may be used for transmission of data over a wireless network, wireline network, some combination thereof, or the like by which the facial detection apparatus 102 and one or more computing devices are in communication. The communication interface 114 may additionally be in communication with the memory 112, user interface 116, image capture circuitry 118, image search module 120, and/or authentication module 122, such as via a bus.
The user interface 116 may be in communication with the processor 110 to receive an indication of a user input and/or to provide an audible, visual, mechanical, or other output to a user. As such, the user interface 116 may include, for example, a keyboard, a mouse, a joystick, a display, a touch screen display, a microphone, a speaker, and/or other input/output mechanisms. In embodiments wherein the facial detection apparatus 102 is embodied as one or more servers, aspects of the user interface 116 may be reduced or the user interface 116 may even be eliminated. The user interface 116 may be in communication with the memory 112, communication interface 114, image capture circuitry 118, image search module 120, and/or authentication module 122, such as via a bus.
The image capture circuitry 118 may be embodied as various means, such as circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (e.g., the memory 112) and executed by a processing device (e.g., the processor 110), or some combination thereof and, in one embodiment, is embodied as or otherwise controlled by the processor 110. In embodiments wherein the image capture circuitry 118 is embodied separately from the processor 110, the image capture circuitry 118 may be in communication with the processor 110. The image capture circuitry 118 may further be in communication with one or more of the memory 112, communication interface 114, user interface 116, image search module 120, and/or authentication module 122, such as via a bus.
The image capture circuitry 118 may comprise hardware configured to capture an image. In this regard, the image capture circuitry 118 may comprise a camera lens and/or other optical components for capturing a digital image. As another example, the image capture circuitry 118 may comprise circuitry, hardware, a computer program product, or some combination thereof that is configured to direct the capture of an image by a separate camera module embodied on or otherwise operatively connected to the facial detection apparatus 102. In embodiments wherein the facial detection apparatus 102 is embodied as a mobile terminal 10, the image capture circuitry 118 may comprise the camera circuitry 36. In embodiments wherein the facial detection apparatus 102 is embodied as one or more servers or other network nodes remote from a mobile terminal configured to provide an image or video to the facial detection apparatus 102 to enable the facial detection apparatus 102 to perform face detection on the image or video, aspects of the image capture circuitry 118 may be reduced or the image capture circuitry 118 may even be eliminated.
The image search module 120 may be embodied as various means, such as circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (e.g., the memory 112) and executed by a processing device (e.g., the processor 110), or some combination thereof and, in one embodiment, is embodied as or otherwise controlled by the processor 110. In embodiments wherein the image search module 120 is embodied separately from the processor 110, the image search module 120 may be in communication with the processor 110. The image search module 120 may further be in communication with one or more of the memory 112, communication interface 114, user interface 116, image capture circuitry 118, and/or the authentication module 122, such as via a bus.
The authentication module 122 may be embodied as various means, such as circuitry, hardware, a computer program product comprising computer readable program instructions stored on a computer readable medium (e.g., the memory 112) and executed by a processing device (e.g., the processor 110), or some combination thereof and, in one embodiment, is embodied as or otherwise controlled by the processor 110. In embodiments wherein the authentication module 122 is embodied separately from the processor 110, the authentication module 122 may be in communication with the processor 110. The authentication module 122 may further be in communication with one or more of the memory 112, communication interface 114, user interface 116, image capture circuitry 118, and/or the image search module 120, such as via a bus.
An example facial detection apparatus 102 for recipient message authentication is configured to transmit and/or receive electronic messages such as by using the communications interface 114, the processor 110 or the like. In instances in which the facial detection apparatus 102 is configured to transmit a message, an image search module 120 may be activated to locate, request and/or capture an image of one or more intended recipients of the message. In instances in which the facial detection apparatus 102 is configured to receive a message, an authentication module 122 may be configured to ensure a user is authenticated as a recipient by using facial detection before allowing the user access to the message.
In some embodiments, the image search module 120 may be configured to locate an image of an intended recipient to an electronic message. For example the image search module 120 may search a local memory, such as memory 112 for an image that identifies the intended recipient. Alternatively or additionally, the image search module 120 may be configured to search, such as over a network, an intranet and/or the Internet for an image that identifies the intended recipient. In instances in which an image is discovered over a network, the image may be provided back to the sender to verify the correct person has been identified. Alternatively or additionally, the image search module 120 may also cause a message to be transmitted such as by the processor 110, the communication interface 114 and/or the like to request a current image of the intended recipients. In some embodiments, the message may be transmitted directly to the recipient. If in response to an image request, an image is received; such a received image may be approved and/or accepted by the sender prior to the transmission of the message that is to be authenticated.
The image search module 120, the processor 110, and/or the like may then be configured to cause the located image to be encoded for transmission with the message. In some embodiments, the image may be transmitted as an attachment and/or by other means that may result in the image be transferred to a recipient device. However in some embodiments, the encoded image may be transmitted to a remote device, such as a remote facial detection apparatus 302 as will be discussed with respect to
In some embodiments, the authentication module 122 may be configured to authenticate a recipient of a message. In an instance in which a message that is to be authenticated is received, the authentication module may be configured to cause an image to be captured of a user attempt to access the image, such as by using the image capture circuitry 118. The image in some embodiments may be captured automatically and/or may be captured based on a prompt such as a prompt over the user interface 116.
The authentication module 122 may then be configured to determine whether there is a match between the intended recipient in a received image and/or a received plurality of facial features and the user in the currently captured image. In some embodiments a match may occur in an instance in which the number of similar features are greater than or equal to a determined authentication threshold. In instances in which the recipient is authenticated then a decryption key may be received to enable a message to be accessed.
Alternatively or additionally, in instances in which the recipient is not authenticated, then the authentication module 122 may be configured to prompt the sender with the captured image of the recipient to allow the sender to determine if indeed it was the intended recipient. Alternatively or additionally, the authentication module 122 may also cause an additional image to be taken for further processing. In either case until a recipient is authenticated, the message may not be accessed.
Alternatively or additionally, the authentication module 122, the processor 110, or the like may be configured to alter a received message based on the authenticated identification of a recipient. For example based on the authenticated recipient, the processor 110, the authentication module 122 and/or the like may be configured to change a theme, text content, and/or the like in the received message.
As described in conjunction with the embodiment of
In the example system illustrated in
In another example embodiment of the system 300, aspects of the image search module 120 and the authentication module 122 may be distributed between the remote terminal 304 and facial detection apparatus 302. In this example embodiment, the facial detection apparatus 302 may handle some of the processing tasks required for performing message recipient authentication. In this regard, the remote terminal 304 may not be required to perform more computationally-intensive steps for performing message recipient authentication. In yet another example embodiment of the system 300, the remote terminal 304 and the facial detection apparatus 302 may be embodied by a single device such as is described with respect to
Accordingly, blocks of the flowchart support combinations of means for performing the specified functions and combinations of operations for performing the specified functions. It will also be understood that one or more blocks of the flowcharts, and combinations of blocks in the flowcharts, can be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer instructions.
In some embodiments, certain ones of the operations herein may be modified or further amplified as described below. Moreover, in some embodiments additional optional operations may also be included. It should be appreciated that each of the modifications, optional additions or amplifications below may be included with the operations above either alone or in combination with any others among the features described herein.
As is shown in operation 404, the apparatus 102 may include means, such as the processor 110, the image capture circuitry 118, the authentication module 122, or the like, for causing an image to be captured of the message recipient in an instance in which the message is accessed. For example, a front facing camera, such as a camera that is facing a user while the user is looking at a display of the device, may be configured to capture an image of the user. In other embodiments, the user may be prompted to cause an image to be captured.
As is shown in operation 406, the apparatus 102 may include means, such as the processor 110, the authentication module 122, or the like, for authenticating the message recipient based on the captured image and the received plurality of encoded features provided with the received message. In order to authenticate the message recipient, as is shown in operation 408, the apparatus 102 may include means, such as the processor 110, the authentication module 122, or the like, for comparing the captured image and the received plurality of encoded features to determine an authentication level.
As is shown in decision block 410 the apparatus 102 may include means, such as the processor 110, the authentication module 122, or the like, for determining if the message recipient is authenticated. In an instance in which a number of similar features between the compared image and the received plurality of encoded features are greater than or equal to a predetermined authentication level, as is shown in operation 414, the apparatus 102 may include means, such as the processor 110, the authentication module 122, or the like, for causing the message to be opened and/or accessible. In an instance in which a number of similar features between the compared image and the received plurality of encoded features do not exceed a predetermined authentication level, as is shown in operation 412, the apparatus 102 may include means, such as the processor 110, the authentication module 122, or the like, for causing the message to remain closed and/or inaccessible.
As is shown in operation 504, the apparatus 102 may include means, such as the processor 110, the image search module 122, or the like, for encoding a plurality of facial features from the image of the recipient. In some embodiments, the image, a partial image, and/or a listing of features found within an image may be transmitted. As is shown in operation 506, the apparatus 102 may include means, such as the processor 110, the communications interface 114, or the like, for causing the plurality of encoded facial features to be made available to the recipient in an instance in which the electronic message is transmitted to the recipient.
As is shown in operation 604, the facial detection apparatus 302, may include means, such as the processor 110, the communications interface 114, or the like, for receiving a captured image of the recipient from a second mobile terminal, such as mobile terminal 10. See also operation 404 of
As is shown in decision block 608 the facial detection apparatus 302 may include means, such as the processor 110, the authentication module 122, or the like, for determining if the message recipient is authenticated. In an instance in which a number of similar features between the compared image and the received plurality of encoded features greater than or equal to a predetermined authentication level, as is shown in operation 610, the facial detection apparatus 302 may include means, such as the processor 110, the authentication module 122, or the like, for causing a decryption key to be transmitted. In some embodiments the decryption key may be received from the sending mobile terminal, and/or may be created by the facial detection apparatus 302. In an instance in which a number of similar features between the compared image and the received plurality of encoded features do not exceed a predetermined authentication level, as is shown in operation 612, the facial detection apparatus 302 may include means, such as the processor 110, the authentication module 122, or the like, for causing the decryption key to not be transmitted.
Advantageously, example message authentication allows the message sender to have control over who reads a message. In some examples, the activation of a send button in a message application may activate the facial detection apparatus 102. Alternatively or additionally, a recipient may not know that authentication has been performed unless the example message authentication as described herein fails. Such processes advantageously allow for ease of use by allowing for authentication to occur at the receiving mobile terminal. In some embodiments, the authentication may be conducted remotely to conserve processing power at the receiving device.
Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Moreover, although the foregoing descriptions and the associated drawings describe example embodiments in the context of certain example combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the scope of the appended claims. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Number | Date | Country | Kind |
---|---|---|---|
3404/CHE/2011 | Sep 2011 | IN | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FI2012/050764 | 8/3/2012 | WO | 00 | 6/13/2014 |