Verification request authentication machine

ABSTRACT

A device authenticates a request to user. The device accesses a face image that depicts a face of the person and includes a characteristic noise pattern inserted by a camera of the device. The device also accesses a geolocation which the device captured the face image and puts the face image and the geolocation into an artificial intelligence engine that outputs a face score, device score, and a location score. The device next submits the request with the scores to a server machine and obtains an authentication score from the server machine. The device then presents an indication that the request to verify the person is authentic based on a comparison of the obtained authentication score to a threshold authentication score.

TECHNICAL FIELD

The subject matter disclosed herein generally relates to the technicalfield of special-purpose machines that facilitate controlling useraccess to one or more machines (e.g., computers) or networks thereof,including software-configured computerized variants of suchspecial-purpose machines and improvements to such variants, and to thetechnologies by which such special-purpose machines become improvedcompared to other special-purpose machines that facilitate control ofuser access to one or more machines or networks thereof. Specifically,the present disclosure addresses systems and methods to facilitateauthentication of a request to verify a user.

BACKGROUND

A machine may be configured to interact with a user by verifying thatthe user is permitted to access something, such as the machine itself, afeature thereof, or a software application thereon, and then grantingsuch permission or notifying the user that such permission has beengranted. For example, the machine may present a login interface in theform of a graphical user interface configured to accept logincredentials (e.g., a username and a password) entered by a user, submitthe login credentials for local or remote verification, receive resultsof that verification, and present an indication of whether the logincredentials are sufficient to grant the user access to something (e.g.,a feature, an application, or some data) that corresponds to the logininterface.

As used herein, “verification” of a user refers to a determination thatthe user is indeed who he or she purports to be, which elsewhere couldbe described as identifying the user, authenticating the user, orlogging-in the user. In situations where a first machine uses a trustedsecond machine to verify the user, the first machine may send the user'slogin credentials in a request to verify the user, also called a“verification request” herein, to the trusted second machine. However,since some circumstances can be vulnerable to a falsified verificationrequest (e.g., by someone attempting unauthorized access by submittinglegitimate login credentials that belong to someone else), it can behelpful to authenticate the verification request itself (e.g., as aseparate and independent operation from the verifying of the user).Accordingly, as used herein, “authentication” of a request forverification refers to a determination that the request is legitimateand not falsified.

BRIEF DESCRIPTION OF THE DRAWINGS

Some embodiments are illustrated by way of example and not limitation inthe figures of the accompanying drawings.

FIG. 1 is a network diagram illustrating a network environment suitablefor authentication of a verification request, according to some exampleembodiments.

FIG. 2 is a block diagram illustrating components of a server machine,according to some example embodiments.

FIG. 3 is a block diagram illustrating components f a device, accordingto some example embodiments.

FIG. 4 is a diagram illustrating a graphical user interface presented bythe device in authenticating a request to verify a user, according tosome example embodiments.

FIGS. 5 and 6 are flowcharts illustrating operations (e.g., of thedevice in performing a method of authenticating a verification request,according to some example embodiments.

FIGS. 7 and 8 are flowcharts illustrating operations (e.g., of theserver machine) in performing a method of authenticating a verificationrequest, according to some example embodiments.

FIGS. 9 and 10 are flowcharts illustrating operations (e.g., of theserver machine) in performing a method of training an artificialintelligence engine to facilitate authentication of verificationrequests, according to some example embodiments.

FIGS. 11 and 12 are flowcharts illustrating operations (e.g., of thedevice) in performing a method of using the trained artificialintelligence engine in authenticating a verification request, accordingto some example embodiments.

FIG. 13 is a flowchart illustrating operations (e.g., of the servermachine or the device) in performing a method of obtaining acharacteristic noise descriptor of a camera of a device, according tosome example embodiments.

FIG. 14 is a flowchart illustrating operations (e.g., of the servermachine or the device) in performing a method of using thecharacteristic noise descriptor of the camera of the device ingeneration of a device score, according to some example embodiments.

FIG. 15 is a block diagram illustrating components of a machine (e.g.,the server machine or the device), according to some exampleembodiments, able to read instructions from a machine-readable mediumand perform any one or more of the methodologies discussed herein.

DETAILED DESCRIPTION

Example methods (e.g., algorithms) facilitate authentication of arequest to verify a user, and example systems (e.g., special-purposemachines configured by special-purpose software) are configured tofacilitate authentication of a request to verify a user. Examples merelytypify possible variations. Unless explicitly stated otherwise,structures (e.g., structural components, such as modules) are optionaland may be combined or subdivided, and operations (e.g., in a procedure,algorithm, or other function) may vary in sequence or be combined orsubdivided. In the following description, for purposes of explanation,numerous specific details are set forth to provide a thoroughunderstanding of various example embodiments. It will be evident to oneskilled in the art, however, that the present subject matter may bepracticed without these specific details.

A machine in the example form of a device is configured (e.g., bysuitable software, hardware, or both) to perform authentication of auser verification request. Accordingly, the device may access (e.g.,from its memory, local storage, or a remote database) a face image to besubmitted in a request to verify a person, where the face image wascaptured by a camera of the device, depicts a face of the person, andincludes a characteristic noise pattern inserted by the camera intoimages captured by the camera. The device also accesses geolocation datathat represents a geolocation at which the device is located duringcapture of the face image. The device then inputs the face image and thegeolocation data into an artificial intelligence engine that is trainedto generate a face score based on the face image, generate a devicescore based on the characteristic noise pattern, and generate a locationscore based on the geolocation data, and the artificial intelligenceengine indeed generates the face score, the device score, and thelocation score in response to the inputting. The device next obtains anauthentication score from a server machine by providing the verificationrequest with the face score, the device score, and the location score tothe server machine via a communication network, and the server machinegenerates the authentication score based on the face score, the devicescore, and the location score in response to the providing. Afterobtaining the authentication score from the server machine, the devicepresents an indication that the request to verify the person isauthentic based on a comparison of the obtained authentication score toa threshold authentication score.

Correspondingly, the server machine is configured (e.g., by suitablesoftware, hardware, or both) to facilitate authentication of a userverification request. The server machine accesses a face score generatedby a first artificial intelligence engine based on a face imagesubmitted in a request to verify a person, where the face image wascaptured by a camera of a device, depicts a face of the person, andincludes a characteristic noise pattern inserted by the camera intoimages captured by the camera. The server machine also accesses a devicescore generated by the first artificial intelligence engine based on thecharacteristic noise pattern in the face image. The server machineadditionally accesses a location score generated by the first artificialintelligence engine based on geolocation data that specifies ageolocation at which the device is located during capture of the faceimage. The service then generates an authentication score by inputtingthe face score, the device score, and the location score into a secondartificial intelligence engine and obtaining the authentication scoreoutput therefrom. After obtaining the authentication score, the servermachine provides the authentication score to the device via acommunication network, and the providing of authentication score causesthe device to present an indication that the request to verify theperson is authentic based on a comparison of the provided authenticationscore to a threshold authentication score.

In some example embodiments, the server machine is configured to prepare(e.g., train) an artificial intelligence engine (e.g., the firstartificial intelligence engine, mentioned above, which may be or includea neural network). To do this, the server machine accesses a referenceset of obfuscated geolocations that are generated from and correspond toactual geolocations from which a device submitted requests to verify aperson. Details on the manner in which these geolocations have beenobfuscated are provided below. The server machine then groups theobfuscated geolocations from the reference set into geographicalclusters based on a predetermined cluster radius value. The servermachine next determines (e.g., calculates) a correspondingrepresentative geolocation for each geographical cluster among thegeographical clusters and a corresponding variance distance from therepresentative geolocation for each geographical cluster among thegeographical clusters. Accordingly, the server machine then generates areference location score based on the representative geolocations of thegeographical clusters and on the variance distances of the geographicalclusters. After the reference location score is generated, the servermachine trains an artificial intelligence engine to output thatreference location score in response to the reference set of obfuscatedgeolocations being input thereto. The trained artificial intelligenceengine may then be provided (e.g., in executable form) by the servermachine to one or more devices for use thereon.

Correspondingly, in some example embodiments, the device is configuredto utilize the prepared (e.g., trained) artificial intelligence engine.To do this, the device generates an obfuscated geolocation of the deviceby obfuscating an actual geolocation of the device. The device theninputs the obfuscated geolocation into an artificial intelligence enginethat is trained to output a reference location score in response to areference set of obfuscated geolocations being input thereto. As notedabove, the reference set of obfuscated geolocations was generated fromand corresponds to actual geolocations from which the device submittedrequests to verify a person. Based on the inputting of the obfuscatedgeolocation, the artificial intelligence engine generates a candidatelocation score. The device obtains an authentication score from theserver machine by providing the candidate location score to the servermachine in a request to verify the person, and the server machinegenerates the authentication score based on the candidate location scorein response to the providing. After the authentication score is obtainedby the device from the server machine, the device presents an indicationthat the request to verify the person is authentic based on a comparisonof the obtained authentication score to a threshold authenticationscore. Further details are discussed below.

FIG. 1 is a network diagram illustrating a network environment 100suitable for performing authentication of a verification request,according to some example embodiments. The network environment 100includes a server machine 110, a database 115, and devices 130 and 150,all communicatively coupled to each other via a network 190. The servermachine 110, with or without the database 115, may form all or part of acloud 118 (e.g., a geographically distributed set of multiple machinesconfigured to function as a single server), which may form all or partof a network-based system 105 (e.g., a cloud-based server systemconfigured to provide one or more network-based services, such asverification request authentication services, to the devices 130 and150). The server machine 110 and the devices 130 and 150 may each beimplemented in a special-purpose (e.g., specialized) computer system, inwhole or in part, as described below with respect to FIG. 15.

Also shown in FIG. 1 are users 132 and 152, one or both of which may bea person (e.g., a human being). The user 132 is associated with thedevice 130 and may be a user of the device 130. For example, the device130 may be a desktop computer, a vehicle computer, a home media system(e.g., a home theater system or other home entertainment system), atablet computer, a navigational device, a portable media device, a smartphone, or a wearable device (e.g., a smart watch, smart glasses, smartclothing, or smart jewelry) belonging to the user 132. Likewise, theuser 152 is associated with the device 150 and may be a user of thedevice 150. As an example, the device 150 may be a desktop computer, avehicle computer, a home media system (e.g., a home theater system orother home entertainment system), a tablet computer, a navigationaldevice, a portable media device, a smart phone, or a wearable device(e.g., a smart watch, smart glasses, smart clothing, or smart jewelry)belonging to the user 152.

Any of the systems or machines (e.g., databases and devices) shown inFIG. 1 may be, include, or otherwise be implemented in a special-purpose(e.g., specialized or otherwise non-conventional and non-generic)computer that has been modified to perform one or more of the functionsdescribed herein for that system or machine (e.g., configured orprogrammed by special-purpose software, such as one or more softwaremodules of a special-purpose application, operating system, firmware,middleware, or other software program). For example, a special-purposecomputer system able to implement any one or more of the methodologiesdescribed herein is discussed below with respect to FIG. 15, and such aspecial-purpose computer may accordingly be a means for performing anyone or more of the methodologies discussed herein. Within the technicalfield of such special-purpose computers, a special-purpose computer thathas been specially modified (e.g., configured by special-purposesoftware) by the structures discussed herein to perform the functionsdiscussed herein is technically improved compared to otherspecial-purpose computers that lack the structures discussed herein orare otherwise unable to perform the functions discussed herein.Accordingly, a special-purpose machine configured according to thesystems and methods discussed herein provides an improvement to thetechnology of similar special-purpose machines.

As used herein, a “database” is a data storage resource and may storedata structured as a text file, a table, a spreadsheet, a relationaldatabase (e.g., an object-relational database), a triple store, ahierarchical data store, or any suitable combination thereof. Moreover,any two or more of the systems or machines illustrated in FIG. 1 may becombined into a single system or machine, and the functions describedherein for any single system or machine may be subdivided among multiplesystems or machines.

The network 190 may be any network that enables communication between oramong systems, machines, databases, and devices (e.g., between theserver machine 110 and the device 130). Accordingly, the network 190 maybe a wired network, a wireless network (e.g., a mobile or cellularnetwork), or any suitable combination thereof. The network 190 mayinclude one or more portions that constitute a private network, a publicnetwork (e.g., the Internet), or any suitable combination thereof.Accordingly, the network 190 may include one or more portions thatincorporate a local area network (LAN), a wide area network (WAN), theInternet, a mobile telephone network (e.g., a cellular network), a wiredtelephone network (e.g., a plain old telephone service (POTS) network),a wireless data network (e.g., a WiFi network or WiMax network), or anysuitable combination thereof. Any one or more portions of the network190 may communicate information via a transmission medium. As usedherein, “transmission medium” refers to an intangible (e.g., transitory)medium that is capable of communicating (e.g., transmitting)instructions for execution by a machine (e.g., by one or more processorsof such a machine), and includes digital or analog communication signalsor other intangible media to facilitate communication of such software.

FIG. 2 is a block diagram illustrating components of the server machine110, according to some example embodiments. The server machine 110 isshown as including a face analyzer 210, a device analyzer 220, alocation analyzer 230, an authenticator 240, an artificial intelligenceengine trainer 250, and authentication server 260, all configured tocommunicate with each other (e.g., via a bus, shared memory, or aswitch).

The face analyzer 210 may be or include a face score generator orsimilarly suitable code to analyze a face image and generate a facescore therefrom. The device analyzer 220 may be or include a devicescore generator or similarly suitable code to analyze device-specificinformation and generate a device score therefrom. The location analyzer230 may be or include a location score generator or similarly suitablecode to analyze location information (e.g., geolocation information) andgenerate a location score therefrom. The authenticator 240 may be orinclude an authentication score generator or similarly suitable code togenerate an authentication score based on a face score, device score, alocation score, or any suitable combination thereof.

As shown in FIG. 2, the face analyzer 210, the device analyzer 220, andthe location analyzer 230 may form all or part of an artificialintelligence engine 270 (e.g., a neural network, such as a deep neuralnetwork, a deep beliefs neural network, a convolutional neural network,a recurrent neural network, or any suitable combination thereof, oranother form of artificial intelligence, such as an artificiallyintelligent module based on signal processing, machine learning, deeplearning, or any suitable combination thereof) that is stored (e.g.,installed) on the server machine 110 and executable thereon. Similarly,the authenticator 240 may form all or part of another artificialintelligence engine 280 (e.g., a neural network, such as a deep neuralnetwork, a deep beliefs neural network, a convolutional neural network,a recurrent neural network, or any suitable combination thereof, oranother form of artificial intelligence, such as an artificiallyintelligent module based on signal processing, machine learning, deeplearning, or any suitable combination thereof) that is stored on theserver machine 110 and executable thereon.

The artificial intelligence engine trainer 250 is configured to trainone or more artificial intelligence engines (e.g., artificialintelligence engines 270 and 280). The authentication server 260 isconfigured to provide one or more network-based authentication servicesvia the network 190 to one or more clients (e.g., devices 130 and 150).Furthermore, one or more processors 299 (e.g., hardware processors,digital processors, or any suitable combination thereof) may be included(e.g., temporarily or permanently) in the face analyzer 210, the deviceanalyzer 220, the location analyzer 230, the authenticator 240, theartificial intelligence engine trainer 250, the authentication server260, the artificial intelligence engine 270, the artificial intelligenceengine 280, or any suitable combination thereof.

FIG. 3 is a block diagram illustrating components of the device 130,according to some example embodiments. The device 130 is shown asincluding an authentication client 310, an image library 320, a camera330, a geolocation sensor 340, accelerometer 350, and a compass 360, allconfigured to communicate with each other (e.g., via a bus, sharedmemory, or a switch). In some example embodiments, the device 130 alsoincludes the artificial intelligence engine 270 discussed above withrespect to FIG. 2. For example, the artificial intelligence engine 270may be provided to the device 130 via the network 190 (e.g., from theserver machine 110).

As shown in FIG. 3, the authentication client 310 is configured toaccess and use one or more network-based authentication services via thenetwork 190 from one or more servers (e.g., server machine 110). Theimage library 320 is a data repository that stores one or more images,such as face images that depict a face of a user (e.g., user 132). Thecamera 330 is configured to capture one or more images (e.g., faceimages). The geolocation sensor 340 is configured to generategeolocation data (e.g., global positioning system (GPS) coordinates, anInternet Protocol (IP) address, or any suitable combination thereof)that fully or partially indicates the geolocation of the device 130. Theaccelerometer 350 is configured to generate acceleration data that fullyor partially indicates one or more corresponding movements made by thedevice 130. The compass 360 is configured to generate directional datathat fully or partially indicates an orientation in which the device 130is pointed. Furthermore, one or more processors 299 (e.g., hardwareprocessors, digital processors, or any suitable combination thereof) maybe included (e.g., temporarily or permanently) in the authenticationclient, the face analyzer 210, the device analyzer 220, the locationanalyzer 230, the artificial intelligence engine 270, or any suitablecombination thereof.

Any one or more of the components (e.g., modules) described herein maybe implemented using hardware alone (e.g., one or more of the processors299) or a combination of hardware and software. For example, anycomponent described herein may physically include an arrangement of oneor more of the processors 299 (e.g., a subset of or among the processors299) configured to perform the operations described herein for thatcomponent. As another example, any component described herein mayinclude software, hardware, or both, that configure an arrangement ofone or more of the processors 299 to perform the operations describedherein for that component. Accordingly, different components describedherein may include and configure different arrangements of theprocessors 299 at different points in time or a single arrangement ofthe processors 299 at different points in time. Each component (e.g.,module) described herein is an example of a means for performing theoperations described herein for that component. Moreover, any two ormore components described herein may be combined into a singlecomponent, and the functions described herein for a single component maybe subdivided among multiple components. Furthermore, according tovarious example embodiments, components described herein as beingimplemented within a single system or machine (e.g., a single device)may be distributed across multiple systems or machines (e.g., multipledevices).

FIG. 4 is a diagram illustrating a graphical user interface presented bythe device 130 in authenticating a request to verify a user, accordingto some example embodiments. Three appearances of the graphical userinterface are shown in FIG. 4. In the left appearance, a face image thatdepicts the face of a user (e.g., user 132) is captured by the device130 (e.g., using the camera 330). A button marked “Submit” is operable,to submit a request for verification of the user based on the faceimage. For example, the face image may be a selfie of the user 132(e.g., a self-taken image that depicts the face of the user 132), andsubmission of the face image in the request may function as all or partof the verification credentials (e.g., login credentials) for the user132.

In the middle appearance shown in FIG. 4, the graphical user interfaceindicates that the request to verify the user has been authenticated(e.g., has been deemed to be an authentic request) and that,additionally, the user's verification credentials have resulted in asuccessful verification (e.g., successful login). However, in the rightappearance shown in FIG. 4, the graphical user interface indicates thatthe request to verify the user has not been authenticated (e.g., hasbeen deemed to be a falsified or otherwise non-authentic request) andthat—regardless whether the new user's verification credentials wouldhave resulted in a successful verification this attempt to verify theuser has failed.

FIGS. 5 and 6 are flowcharts illustrating operations (e.g., of thedevice 130) in performing a method 500 of authenticating a verificationrequest, according to some example embodiments. Although, for clarityand brevity, the present discussion focuses on performance of the method500 by the device 130, one or more operations of the method 500 may beperformed by the server machine 110 in certain example embodiments.Operations in the method 500 may be performed using components (e.g.,modules) described above with respect to FIG. 3, using one or moreprocessors (e.g., microprocessors or other hardware processors), orusing any suitable combination thereof. As shown in FIG. 5, the method500 includes operations 510, 520, 530, 540, and 550.

In operation 510, the authentication client 310 accesses an image to besubmitted in a request to verify a person (e.g., a request to verify theuser 132). The image may be a face image that depicts the face of theuser 132 and that was captured by the camera 330 of the device 130.Since the image was captured by the camera 330, the image may include acharacteristic noise pattern inserted by the camera 330 into imagescaptured therefrom or otherwise caused by the camera 330 to be presentin images captured therefrom. The characteristic noise pattern indicatesa set of one or more manufacturing deviations that occurred duringmanufacture of the camera 330. For example, the characteristic noisepattern may indicate the presence of one or more manufacturing errors,flaws, or other defects in the camera 330.

In operation 520, the authentication client 310 accesses geolocationdata (e.g., GPS data or IP address data) that represents a geolocationat which the device 130 was located during capture of the image (e.g.,face image) accessed in operation 510.

In operation 530, the authentication client 310 inputs the accessedimage (e.g., face image) and the accessed geolocation data into theartificial intelligence engine 270 (e.g., a neural network). Theartificial intelligence engine 270 is trained to generate an image score(e.g., a face score) based on the inputted image, generate a devicescore based on the characteristic noise pattern in the inputted image,and generate a location score based on the inputted geolocation data.For example, where the image is a face image, the face analyzer 210 maygenerate a face score by performing a facial recognition analysis of theface image; the device analyzer 220 may generate a device score byperforming a noise pattern analysis of the face image; and the locationanalyzer 230 may generate a location score by performing a geolocationanalysis of the geolocation data. Accordingly, the artificialintelligence engine 270 generates and outputs the image score, thedevice score, and the location score, all in response to the inputtingof the image and the geolocation data. As a result, the authenticationclient 310 obtains (e.g., receives) the image score, the device score,and the location score from the artificial intelligence engine 270.

In operation 540, the authentication client 310 sends the obtained imagescore (e.g., face score), the obtained device score, and the obtainedlocation score to the server machine 110 (e.g., to the authenticationserver 260) to obtain an authentication score in response. This may beperformed by providing (e.g., submitting) the verification request tothe server machine 110 via the network 190, where the verificationrequest includes the image score, the device score, and the locationscore. Accordingly, the server machine 110 (e.g., via the artificialintelligence engine 280 and its included authenticator 240) generatesthe authentication score based on the provided image score (e.g., facescore), the provided device score, and the provided location score. As aresult, the authentication client 310 obtains the generatedauthentication score from the server machine 110.

In operation 550, the authentication client 310 presents an indicationthat the verification request is authentic. The presentation of thisindication may be performed using a graphical user interface (e.g.,similar to that described above with respect to FIG. 4), and thepresentation of this indication may be based on a comparison of theobtained authentication score to a threshold authentication score. Inthis sense, the threshold authentication score may define a boundary(e.g., tipping point) between verification requests that will be deemedto be authentic and verification requests that will be deemed to benon-authentic (e.g., falsified).

As shown in FIG. 6, the method 500 may include one or more of operations610, 612, 620, 622, and 630. In some example embodiments, the image(e.g., face image) is obtained from the camera 330 of the device 130,and the geolocation data is obtained from the geolocation sensor 340 ofthe device 130. In such example embodiments, operation 610 may beperformed as part (e.g., a precursor task, a subroutine, or a portion)of operation 510, and operation 620 may be performed as part ofoperation 520.

In operation 610, in accessing the image (e.g., face image), theauthentication client 310 obtains the image from the camera 330 of thedevice 130. For example, this may occur during live capture of the image(e.g., the taking of the selfie of the user 132) by the camera 330.

In operation 620, in accessing the geolocation data, the authenticationclient 310 obtains (e.g., receives) the geolocation data from thegeolocation sensor 340 of the device 130. For example, this maycomplement live capture of the image and accordingly obtain livegeolocation data that indicates the geolocation of the device 130 at thetime that the image is captured.

In certain example embodiments, the image (e.g., face image) is obtainedfrom the image library 320 of the device 130, and the geolocation datais obtained from metadata of the image (e.g., stored in the header ofthe image). In such example embodiments, operation 612 may be performedas part of operation 510, and operation 622 may be performed as part ofoperation 520.

In operation 612, in accessing the image (e.g., face image), theauthentication client 310 obtains the image from the image library 320of the device 130. For example, this may occur when a previouslycaptured image (e.g., a previously taken selfie of the user 132) is tobe submitted in a request to verify the user 132.

In operation 622, in accessing the geolocation data, the authenticationclient 310 obtains (e.g., reads) the geolocation data from the metadataof the image. For example, this may complement the use of a previouslycaptured image and accordingly obtain corresponding geolocation datathat indicates the location of the device 130 at the time that the imagewas captured.

In various example embodiments, one or more movements of the device 130are analyzed by the artificial intelligence engine 280 and used as abasis for determining the authentication score in operation 540. In suchexample embodiments, operation 630 is performed prior to operation 540.

In operation 630, the authentication client 310 accesses accelerometerdata generated by the accelerometer 350 of the device 130. For example,this may occur during live capture of the accelerometer data as the user132 is interacting with the graphical user interface shown in FIG. 4).The accelerometer data indicates one or more movements made by thedevice 130. In example embodiments in which the image (e.g., face image)is captured live from the camera 330 of the device 130, theaccelerometer data may be similarly captured live and indicate one ormore movements made by the device 130 during capture of the image. Inexample embodiments in which the image is obtained from the imagelibrary 320 of the device 130, the accelerometer data may be eithercaptured live and thus indicate one or more live movements made by thedevice 130 or otherwise obtained from the metadata of the image and thusindicate one or more past movements made by the device 130 (e.g., duringcapture of the image).

In example embodiments that include operation 630, the artificialintelligence engine 270 (e.g., device analyzer 220) is trained togenerate the device score based on the accessed accelerometer data. Forexample, the artificial intelligence engine 270 may perform a movementanalysis of the accelerometer data and generate the device score basedon results thereof. Accordingly, in response to performance of operation630, the device score obtained in operation 530 may be generated by theartificial intelligence engine 270 based on results of such a movementanalysis of the accelerometer data.

According to some example embodiments, the artificial intelligenceengine 270 (e.g., face analyzer 210) is trained to generate the imagescore (e.g., face score) based on a liveness analysis of the image(e.g., face image). For example, the artificial intelligence engine 270may perform a liveness analysis of the image and generate the face scorebased on results thereof. Accordingly, in response to performance of theliveness analysis (e.g., an analysis that generates or otherwisedetermines a likelihood that the image depicts a live person), the imagescore (e.g., face score) obtained in operation 530 may be generated bythe artificial intelligence engine 270 based on results of the livenessanalysis of the image.

According to certain example embodiments, the artificial intelligenceengine 270 (e.g., location analyzer 230) is trained to generate thelocation score based on a background analysis of the image (e.g., faceimage). For example, the artificial intelligence engine 270 may segmentthe image into a foreground portion and a background portion, perform abackground analysis of the background portion, and generate the locationscore based on results thereof. Accordingly, in response to performanceof the background analysis, the location score obtained in operation 530may be generated by the artificial intelligence engine 270 based onresults of the background analysis of the image.

According to various example embodiments, the artificial intelligenceengine 270 (e.g., location analyzer 230) is trained to generate thelocation score based on a metadata analysis of the image (e.g., faceimage). For example, the artificial intelligence engine 270 may performa metadata analysis of one or more portions of the metadata (e.g., oneor more descriptors stored in the header of the image) and generate thelocation score based on results thereof. Accordingly, in response toperformance of the metadata analysis, the location score obtained inoperation 530 may be generated by the artificial intelligence engine 270based on results of the metadata analysis.

FIGS. 7 and 8 are flowcharts illustrating operations (e.g., of theserver machine 110) in performing a method 700 of authenticating averification request, according to some example embodiments. Although,for clarity and brevity, the present discussion focuses on performanceof the method 700 by the server machine 110, one or more operations ofthe method 700 may be performed by the device 130 in certain exampleembodiments. Operations in the method 700 may be performed usingcomponents (e.g., modules) described above with respect to FIG. 2, usingone or more processors (e.g., microprocessors or other hardwareprocessors), or using any suitable combination thereof. As shown in FIG.7 the method 700 includes operations 710, 720, 730, 740, and 750.

In operation 710, the authentication server 260 accesses an image score(e.g., face score) generated by the artificial intelligence engine 270,which may be considered a first artificial intelligence engine in thiscontext. For example, the image score may be a face score that isgenerated by the face analyzer 210 in the artificial intelligence engine270 (e.g., located at the device 130 or at the server machine 110) andreceived in a request to verify a person (e.g., a request to verify theuser 132). As noted above, the image may depict the face of the personuser 132), be captured by the camera 330 of the device 130, and includea characteristic noise pattern inserted by the camera 330 into imagescaptured by the camera 330. As an example, the authentication server 260may perform operation 710 by accessing the same image score discussedabove with respect to operation 540.

In operation 720, the authentication server 260 accesses a device scoregenerated by the artificial intelligence engine 270 (e.g., the firstartificial intelligence engine). For example, the device score may begenerated by the device analyzer 220 in the artificial intelligenceengine 270 (e.g., located at the device 130 or at the server machine110) and received in the request to verify the person (e.g., the requestto verify the user 132). The device score may be generated based on thecharacteristic noise pattern included in the image whose image score wasaccessed in operation 710. As an example, the authentication server 260may perform operation 720 by accessing the same device score discussedabove with respect to operation 540.

In operation 730, the authentication server 260 accesses the locationscore generated by the artificial intelligence engine 270 (e.g., thefirst artificial intelligence engine). For example, the location scoremay be generated by the location analyzer 230 in the artificialintelligence engine 270 (e.g., located at the device 130 or at theserver machine 110) and received in the request to verify the person(e.g., the request to verify the user 132). As noted above, the locationscore may be generated based on geolocation data that specifies ageolocation at which the device 130 is located (e.g., during capture ofthe image whose image score was accessed in operation 710). As anexample, the authentication server 260 may perform operation 730 byaccessing the same location score discussed above with respect tooperation 540.

In operation 740, the authentication server 260 generates theauthentication score by inputting the accessed image score (e.g., facescore), the accessed device score, and the accessed location score intothe artificial intelligence engine 280 (e.g., authenticator 240), whichmay be considered a second artificial intelligence engine in thiscontext, and obtaining the authentication score output from thatartificial intelligence engine 280 (e.g., second artificial intelligenceengine). For example, the authentication server 260 may performoperation 740 by inputting the same image score (e.g., face score),device score, and location score discussed above with respect tooperation 540 into the artificial intelligence engine 280 and obtaining(e.g., receiving) the authentication score thus generated.

In operation 750, the authentication server 260 provides the obtainedauthentication score to the device 130 via the network 190. Theproviding of this authentication score to the device 130 may function asa trigger to command or otherwise cause the device 130 (e.g., via theauthentication client 310) to perform operation 550 in which theauthentication client 310 presents an indication that the verificationrequest is authentic. As noted above, the presentation of the indicationmay be based on a comparison of the provided authentication score to athreshold authentication score.

As shown in FIG. 8, the method 700 may include one or more of operations810, 812, 814, 822, 824, 830, 832, and 834. In some example embodiments,the verification request includes an image (e.g., face image) from whichthe image score (e.g., face score) is to be generated, and in suchcases, the device score, the location score, or both, may yet to begenerated as well. Accordingly, operations 810 and 812 may be performedas part of operation 710; the operation 822 may be performed as part ofoperation 720; and operations 830 and 832 may be performed as part ofoperation 730.

In operation 810, in accessing the image score (e.g., face score), theauthentication server 260 obtains (e.g., accesses or receives) thecorresponding image (e.g., face image) from the device 130 via thenetwork 190). As noted above, the image may be a captured live by thecamera 330 of the device 130 or retrieved from the image library 320 ofthe device 130.

In operation 812, in accessing the image score e.g., face score), theauthentication server 260 obtains the image score by inputting the image(e.g., face image) obtained in operation 810 into the artificialintelligence engine 270 the first artificial intelligence engine) andobtaining the image score as output from the artificial intelligenceengine 270.

In operation 822, in accessing the device score, the authenticationserver 260 obtains the device score from the artificial intelligenceengine 270 (e.g., the first artificial intelligence engine). Forexample, the device score may be obtained as an output from theartificial intelligence engine 270 as a result of the image (e.g., faceimage) being input into the artificial intelligence engine 270 (e.g.,during performance of operation 812).

In operation 830, in accessing the location score, the authenticationserver 260 obtains the corresponding geolocation data from the device130 (e.g., via the network 190). As noted above, the geolocation datamay be captured live by the geolocation sensor 340 of the device 130 oraccessed from metadata of the image.

In operation 832, in accessing the location score, the authenticationserver 260 obtains the location score by inputting the geolocation dataobtained in operation 830 into the artificial intelligence engine 270(e.g., the first artificial intelligence engine) and obtaining thelocation score as output from the artificial intelligence engine 270.

In certain example embodiments, the verification request includesprecomputed scores, namely, the image score (e.g., face score), thedevice score, and the location score. In such example embodiments,operation 814 may be performed as part of operation 710; operation 824may be performed as part of operation 720; and operation 834 may beperformed as part of operation 730.

In operation 814, in accessing the image score (e.g., face score), theauthentication server 260 obtains (e.g., accesses or receives) the imagescore from the device 130 (e.g., via the network 190). For example, theauthentication server 260 may receive the image score provided by thedevice 130 in performing operation 540.

In operation 824, in accessing the device score, the authenticationserver 260 obtains the device score from the device 130 (e.g., via thenetwork 190). For example, the authentication server 260 may receive thedevice score provided by the device 130 in performing operation 540.

In operation 834, in accessing the location score, authentication server260 obtains the location score from the device 130 (e.g., via thenetwork 190). For example, the authentication server 260 may receive thelocation score provided by the device 130 in performing operation 540

FIGS. 9 and 10 are flowcharts illustrating operations (e.g., of theserver machine 110) in performing a method 900 of fully or partially(e.g., at least partially) training an artificial intelligence engine(e.g., artificial intelligence engine 270) to facilitate authenticationof verification requests, according to some example embodiments.Although, for clarity and brevity, the present discussion focuses onperformance of the method 900 by the server machine 110, one or moreoperations of the method 900 may be performed by the device 130 incertain example embodiments. Operations in the method 900 may beperformed using components (e.g., modules) described above with respectto FIG. 2, using one or more processors (e.g., microprocessors or otherhardware processors), or using any suitable combination thereof. Asshown in FIG. 9 the method 900 includes operations 910, 920, 930, 940,and 950.

In operation 910, the artificial intelligence engine trainer 250accesses a reference set of obfuscated geolocations (e.g., a trainingset of geolocations that have been obfuscated as described below). Forexample, the reference set may be stored by the server machine 110 andaccessed from its local storage or memory, stored by the database 115and accessed therefrom, stored by the device 130 and accessed therefrom,stored by a different device (e.g., device 150) and accessed therefrom,or any suitable combination thereof. The obfuscated geolocations in thereference set are generated from (e.g., obfuscated based on) actualgeolocations and correspond to these actual geolocations. For example,these actual geolocations may be geolocations from which a device (e.g.,device 130) submitted a set of one or more requests to verify a person(e.g., user 132). According to various example embodiments, thereference set of obfuscated geolocations is generated by quantizing theactual geolocations, adding noise (e.g., random or pseudorandom) to theactual geolocations, encrypting the actual geolocations, or any suitablecombination thereof.

In operation 920, the artificial intelligence engine trainer 250 groups(e.g., clusters) the obfuscated geolocations from the reference set intogeographical clusters, and this grouping (e.g., clustering) of theobfuscated geolocations is based on a cluster radius value (e.g., ageographical distance that defines the radius of the resultingclusters), which may be predetermined (e.g., hardcoded or otherwisedetermined prior to runtime) or dynamically determined at runtime.

In operation 930, the artificial intelligence engine trainer 250determines (e.g., calculates) a corresponding representative geolocationfor each geographical cluster that was grouped in operation 920. As anexample, for each geographical cluster, the artificial intelligenceengine trainer 250 may calculate a corresponding mean geolocation ofthat geographical cluster. As part of operation 930, the artificialintelligence engine trainer 250 also determines a corresponding variancedistance from the representative geolocation for each geographicalcluster that was grouped in operation 920. As an example, for eachgeographical cluster, the artificial intelligence engine trainer 250 maycalculate a corresponding variance distance from the mean geolocation ofthat geographical cluster.

In operation 940, the artificial intelligence engine trainer 250generates a reference location score (e.g., a model location score or amodel enrollment score) based on the representative geolocations of thegeographical clusters and based on the corresponding variance distancesof the geographical clusters that were created in operation 920. In someexample embodiments, the reference location score is generated (e.g.,computed) based on the proportion (e.g., ratio) of non-singletongeographical clusters (e.g., geographical clusters with two or moregeolocations) to the total number of geolocations across all of thegeographical clusters. In alternative example embodiments, thisproportion is not used.

In operation 950, the artificial intelligence engine trainer 250 trainsan artificial intelligence engine (e.g., the artificial intelligenceengine 270) to output the reference location score in response to thereference set of obfuscated geolocations being input into thatartificial intelligence engine. As noted above, the artificialintelligence engine may be trained to output additional information(e.g., a face score and the device score) as well.

As shown in FIG. 10, the method 900 may include one or more ofoperations 1010, 1012, 1030, 1032, 1034, 1050, and 1052. One or both ofoperations 1010 and 1012 may be performed as part of operation 910.

In operation 1010, in accessing the reference set of obfuscatedgeolocations, the artificial intelligence engine trainer 250 accessescorresponding reference accelerometer data that indicates correspondingmovements made by the device 130. The accelerometer data may have beenpreviously captured live by the accelerometer 350 of the device 130 andstored in metadata of one or more images (e.g., in the image library 320of the device 130 or in the database 115), for subsequent accesstherefrom. In example embodiments that include operation 1010, thegenerating of the reference location score in operation 940 may beperformed based on the accessed accelerometer data.

In operation 1012, in accessing the reference set of obfuscatedgeolocations, the artificial intelligence engine trainer 250 accessescorresponding reference compass data that indicates correspondingdirections in which the device 130 was oriented. A compass data may havebeen previously captured live by the compass 360 of the device 130 andstored in metadata of one or more images in the image library 320 of thedevice 130 or in the database 115) for subsequent access therefrom. Inexample embodiments that include operation 1012, the generating of thereference location score in operation 940 may be performed based on theaccessed compass data.

As shown in FIG. 10, one or more of operations 1030, 1032, and 1034 maybe performed between operations 930 and 940. Generally, though, one ormore of operations 1030, 1032, and 1034 may be performed betweenoperations 920 and 940.

In operation 1030, the artificial intelligence engine trainer 250generates cluster weights for the geographical clusters grouped inoperation 920. This may be performed by generating a correspondingweight for each geographical cluster among the geographical clusterscreated in operation 920. Moreover, the corresponding weight for eachgeographical duster may be generated based on a corresponding count ofobfuscated geolocations in that geographical cluster. In exampleembodiments that include operation 1030, the generating of the referencelocation score in operation 940 may be performed based on the generatedcluster weights.

In operation 1032, the artificial intelligence engine trainer 250calculates mean travel distances for the geographical clusters that weregrouped in operation 920. This may be performed by calculating acorresponding mean inter-cluster travel distance between successivegeolocations that lie in different geographical clusters among thegeographical clusters created in operation 920. For example, theartificial intelligence engine trainer 250 may calculate a set ofinter-cluster travel distances between inter-cluster pairs ofgeolocations and then calculate a mean of those inter-cluster traveldistances. In example embodiments that include operation 1032, thegenerating of the reference location score in operation 940 may beperformed based on the calculated mean travel distances.

In operation 1034, the artificial intelligence engine trainer 250calculates variances from the mean travel distances for the geographicalclusters grouped in operation 920. This may be performed by calculatinga corresponding variance of inter-cluster travel distances (e.g., asdeviations from the mean inter-cluster travel distance) for eachgeographical cluster. Thus, the artificial intelligence engine trainer250 may calculate a corresponding variance of inter-cluster traveldistances between successive geolocations in different geographicalclusters among the geographical clusters created in operation 920. Inexample embodiments that include operation 1034, the generating of thereference location score in operation 940 may be performed based on thecalculated variances in the travel distances for the geographicalclusters.

Furthermore, in some example embodiments, the artificial intelligenceengine trainer 250 trains the artificial intelligence engine (e.g.,artificial intelligence engine 270) to output the reference locationscore based on a comparison of a maximum travel speed (e.g., apredetermined maximum travel speed) to one or more travel speeds betweenpairs of successive geolocations. In some implementations, these pairsinclude one or more pairs of successive geolocations that lie indifferent geographical clusters among the geographical clustersdiscussed above with respect to operation 920. For example, theartificial intelligence engine trainer 250 may access or calculateinter-cluster travel times between inter-cluster pairs of geolocations,access or calculate inter-cluster travel distances corresponding tothese inter-cluster travel times, and accordingly train the artificialintelligence engine to calculate inter-cluster travel speeds and thencompare the inter-cluster travel speeds to the maximum travel speed. Incertain implementations, these pairs include one or more pairs ofsuccessive geolocations that lie within the same geographical cluster.For example, the artificial intelligence engine trainer 250 may accessor calculate intra-cluster travel times between intra-cluster pairs ofgeolocations, access or calculate intra-cluster travel distancescorresponding to these intra-cluster travel times, and accordingly trainthe artificial intelligence engine to calculate intra-cluster travelspeeds and then compare the intra-cluster travel speeds to the maximumtravel speed.

As shown in FIG. 10, one or both of operations 1050 and 1052 may beperformed after operation 950. In operation 1050, the artificialintelligence engine trainer 250 generates an executable instance of theartificial intelligence engine (e.g., artificial intelligence engine270) trained in operation 950. This may be performed by compiling thetrained artificial intelligence engine, packaging the resultingexecutable file (e.g., within an automatic installer program),compressing the executable file, or any suitable combination thereof. Insome example embodiments, the authentication server 260 performs thisoperation.

In operation 1052, the artificial intelligence engine trainer 250provides the executable instance of the artificial intelligence engine(e.g., artificial intelligence engine 270) to the device 130 (e.g., viathe network 190). In some example embodiments, the authentication server260 performs this operation. The provision of the executable instance(e.g., within an automatic installer program) may cause the device 130to configure itself to obfuscate an actual geolocation of the device130, input the obfuscated geolocation into the executable instance ofthe artificial intelligence engine, and obtain a corresponding candidatelocation score as output from the artificial intelligence engine, aswell as perform these configured operations.

FIGS. 11 and 12 are flowcharts illustrating operations (e.g., of thedevice 130) in performing a method 1100 of using a trained artificialintelligence engine (e.g., artificial intelligence engine 270, asprovided to the device 130 in operation 1052 of the method 900) inauthenticating a verification request, according to some exampleembodiments. Although, for clarity and brevity, the present discussionfocuses on performance of the method 1100 by the device 130, one or moreoperations of the method 1100 may be performed by the server machine 110in certain example embodiments. Operations in the method 1100 may beperformed using components (e.g., modules) described above with respectto FIG. 3, using one or more processors (e.g., microprocessors or otherhardware processors), or using any suitable combination thereof. Asshown in FIG. 11, the method 1100 includes operations 1110, 1120, 1130,and 1140.

In operation 1110, the authentication client 310 generates an obfuscatedgeolocation of the device 130. This may be performed by obfuscating anactual geolocation of the device 130. For example, the authenticationclient 310 may access (e.g., receive) the actual geolocation of thedevice 130 from the geolocation sensor 340. As examples, the actualgeolocation may take the form of GPS coordinates, an IP address, or anysuitable combination thereof. Examples of obfuscation operations arediscussed below.

In operation 1120, the authentication client 310 obtains a candidatelocation score from a trained artificial intelligence engine (e.g.,artificial intelligence engine 270, which may be called a firstartificial intelligence engine or first AI module in this context). Thismay be performed by inputting the obfuscated geolocation generated inoperation 1110 into the trained artificial intelligence engine andobtaining (e.g., receiving) the candidate location score as an output ofthe trained artificial intelligence engine. As noted above, theartificial intelligence engine is trained to output the referencelocation score in response to the reference set of obfuscatedgeolocations being input into the artificial intelligence engine. Asalso noted above, the reference set of obfuscated geolocations wasgenerated from and corresponds to a set of actual geolocations fromwhich the device 130 submitted requests to verify a person (e.g., user132).

In response to the obfuscated geolocation from operation 1110 beinginput into the trained artificial intelligence engine (e.g., artificialintelligence engine 270), the artificial intelligence engine generatesthe candidate location score based on the inputted obfuscatedgeolocation of the device 130. Moreover, according to various exampleembodiments, the candidate location score may be generated based on thecluster weights discussed above with respect to operation 1030, the meantravel distances discussed above with respect to operation 1032, thevariances discussed above with respect to operation 1034, referenceaccelerometer data accessed in operation 1010, reference compass dataaccessed in operation 1012, or any suitable combination thereof.

Furthermore, in some example embodiments, the artificial intelligenceengine (e.g., artificial intelligence engine 270) is trained (e.g., bythe artificial intelligence engine trainer 250) to output the referencelocation score based on a comparison of a maximum travel speed (e.g., apredetermined maximum travel speed) to one or more travel speeds betweenpairs of successive geolocations (e.g., that lie in differentgeographical clusters or within the same geographical cluster among thegeographical clusters discussed above with respect to operation 920). Insome example embodiments, the artificial intelligence engine may betrained to calculate one or more inter-cluster travel speeds and thencompare the inter-cluster travel speeds to the maximum travel speed.Accordingly, the artificial intelligence engine may generate thecandidate location score based on a comparison of the maximum travelspeed to an inter-cluster travel speed that is calculated based on theobfuscated geolocation of the device 130. In certain exampleembodiments, the artificial intelligence engine may be trained tocalculate one or more intra-cluster travel speeds and then compare theintra-cluster travel speeds to the maximum travel speed. Accordingly,the artificial intelligence engine may generate the candidate locationscore based on a comparison of the maximum travel speed to anintra-cluster travel speed that is calculated based on the obfuscatedgeolocation of the device 130.

In operation 1130, the authentication client 310 obtains anauthentication score based on the candidate location score. Theauthentication score may be obtained from the server machine 110 (e.g.,via the artificial intelligence engine 280, which may be called a secondartificial intelligence engine or second AI module in this context). Forexample, the authentication client may obtain the authentication scorefrom the server machine 110 by providing the candidate location score tothe server machine 110. The candidate location score may be providedwithin a request to verify the person (e.g., a request to verify theuser 132). In response to being provided with the candidate locationscore, the server machine 110 (e.g., the authentication server 260, theartificial intelligence engine 280, the authenticator 240, or anysuitable combination thereof) generates and provides the authenticationscore based on the candidate location score.

In operation 1140, the authentication client 310 presents an indicationthat the request to verify the person is authentic. Operation 1140 maybe performed in a manner similar to that described above with respect tooperation 550. Accordingly, the presentation of this indication may beperformed using a graphical user interface (e.g., similar to thatdescribed above with respect to FIG. 4), and the presentation of thisindication may be based on a comparison of the authentication scoreobtained in operation 1130 to a threshold authentication score. As notedabove, the threshold authentication score may define a boundary betweenverification requests that will be deemed to be authentic andverification requests that will be deemed to be non-authentic (e.g.,falsified).

As shown in FIG. 12, the method 1100 may include one or more ofoperations 1210, 1212, and 1214, any one or more of which may beperformed as part of operation 1110. Operations 1210, 1212, and 1214represent example ways to obfuscate an actual geolocation of the device130 and thus generate an obfuscated geolocation of the device 130.

In operation 1210, the authentication client 310 quantizes the actualgeolocation as all or part of obfuscating the actual geolocation. Thisis one manner in which the obfuscated geolocation can represent theactual geolocation for purposes of authenticating a verificationrequest, without divulging the actual geolocation (e.g., to protect userprivacy).

In operation 1212, the authentication client 310 adds noise (e.g.,random or pseudorandom) to the actual geolocation as all or part ofobfuscating the actual geolocation. This is another manner in which theobfuscated geolocation can represent the actual geolocation for purposesof authenticating the verification request, without divulging the actualgeolocation.

In operation 1214, the authentication client 310 encrypts the actualgeolocation as all or part of obfuscating the actual geolocation. This afurther manner in which the obfuscated geolocation can represent theactual geolocation for purposes of authenticating the verificationrequest, without divulging the actual geolocation.

According to various example embodiments, two or more of operations1210, 1212, and 1214 may be combined (e.g., as serially performedoperations) to obfuscate the actual geolocation and generate theobfuscated geolocation of the device 130.

As shown in FIG. 12, one or more of operations 1216 and 1218 may beperformed prior to operation 1120, in which the authentication client310 obtains a candidate location score from the trained artificialintelligence engine (e.g., artificial intelligence engine 270).

In operation 1216, the authentication client 310 accesses candidateaccelerometer data that indicates a corresponding movement made by thedevice 130. In example embodiments that include operation 1216, thetrained artificial intelligence engine (e.g., artificial intelligenceengine 270) may be trained to output the reference location score basedon reference accelerometer data that indicates corresponding movementsmade by the device 130 (e.g., as discussed above with respect tooperation 1010). In such example embodiments, the trained artificialintelligence engine generates the candidate location score based on thecandidate accelerometer data accessed in operation 1216.

In operation 1218, the authentication client 310 accesses candidatecompass data that indicates a corresponding direction in which thedevice 130 is oriented. In example embodiments that include operation1218, the trained artificial intelligence engine (e.g., artificialintelligence engine 270) may be trained to output the reference locationscore based on reference compass data that indicates correspondingdirections in which the device 130 was oriented (e.g., as discussedabove with respect operation 1012). In such example embodiments, thetrained artificial intelligence engine generates the candidate locationscore based on the candidate compass data accessed in operation 1218.

FIG. 13 is a flowchart illustrating operations (e.g., of the servermachine 110 or the device 130) in performing a method of obtaining acharacteristic noise descriptor of the camera 330 of the device 130,according to some example embodiments. Operations in the method 1300 maybe performed by the artificial intelligence engine trainer 250 describedabove with respect to FIG. 2. In alternative example embodiments, themethod 1300 may be performed by the authentication server 260, theauthentication client 310, or any suitable combination thereof. As shownin FIG. 13, the method 1300 includes operations 1310, 1320, 1330, 1340,1350, and 1360.

In operation 1310, the artificial intelligence engine trainer 250 beginsprocessing an image (e.g., a face image) by cropping the image (e.g., toa predetermined uniform size for processing). For example, each image ina set of images (e.g., stored in the image library 320 of the device130) may be cropped to a predetermined size (e.g., defined bypredetermined pixel dimensions).

In operation 1320, the artificial intelligence engine trainer 250obtains (e.g., generates) luma values of the cropped images. Forexample, this may be performed by calculating a corresponding luma valuefor each pixel in the cropped image, thus resulting in a luma map of thecropped image (e.g., a luma image having the same size as the croppedimage or a luma-only version of the cropped image).

In operation 1330, the artificial intelligence engine trainer 250de-noises the luma map of the cropped image. This may be performed byfiltering the luma map. For example, the artificial intelligence enginetrainer 250 may apply a de-noising filter in the two-dimensionaldiscrete wavelet domain (2D DWD) to the luma map and obtain a de-noisedluma map as output from the de-noising filter.

In operation 1340, the artificial intelligence engine trainer 250subtracts the de-noised luma map from the original luma map prior tode-noising. The difference between these two luma maps is a lumadifference map that represents a characteristic noise pattern insertedinto the original image.

In operation 1350, the artificial intelligence engine trainer 250generates (e.g., computes) a characteristic noise descriptor of theoriginal image, such that the characteristic noise descriptor representsthe characteristic noise pattern in the original image. This may beperformed by calculating a first pointwise product by pointwisemultiplying the luma difference map to the original luma map,calculating a second pointwise product by pointwise multiplying theoriginal luma map to itself, and then calculating a ratio of the firstpointwise product to the second pointwise product (e.g., by dividing thefirst pointwise product by the second pointwise product). The resultingnoise descriptor map (e.g., noise descriptor image) is thus acharacteristic noise descriptor of the original image and represents thecharacteristic noise pattern in the original image.

As shown in FIG. 13, operations 1310, 1320, 1330, 1340, and 1350 may beperformed (e.g., iteratively) for each image in a set of images capturedby the camera 330 of the device 130 (e.g., stored in, and accessed from,the image library 320 of the device 130). Accordingly, a set ofresulting noise descriptor maps can be generated from the set of imagescaptured by the camera 330.

In operation 1360, the artificial intelligence engine trainer 250generates (e.g., computes) an overall characteristic noise descriptorfor the camera 330 of the device 130. As one example, the artificialintelligence engine trainer 250 may compute a representative noisedescriptor map (e.g., a mean noise descriptor map) from the set ofimages captured by the camera 330. As another example, the artificialintelligence engine trainer 250 may compute a first summation of thefirst pointwise products for all individual images, compute a secondsummation of the second pointwise products for all individual images,and then compute a ratio of the first summation to the second summation(e.g., by dividing the first summation by the second summation). Theresulting overall noise descriptor map is thus a characteristic noisedescriptor of the camera 330 and represents the characteristic noisepattern inserted by the camera 330 into images captured by the camera330.

FIG. 14 is a flowchart illustrating operations (e.g., of the servermachine 110 or the device 130) in performing a method of using thecharacteristic noise descriptor of the camera 330 of the device 130 ingeneration of a device score, according to some example embodiments.Operations in the method 1400 may be performed by the device analyzer220 within the artificial intelligence engine 270 (e.g., located at theserver machine 110 or at the device 130). As shown in FIG. 14, themethod 1400 includes operations 1410, 1420, 1422, 1424, 1426, 1428,1430, and 1440.

In operation 1410, the device analyzer 220 accesses the characteristicnoise descriptor of the device 130 (e.g., the overall characteristicnoise descriptor of the camera 330 of the device 130). As rioted above,the characteristic noise descriptor represents a characteristic noisepattern inserted by the camera 330 into images captured thereby. Thecharacteristic noise descriptor of the camera 330 may be stored by theserver machine 110 and accessed from its local storage or memory, storedby the database 115 and accessed therefrom, stored by the device 130 andaccessed therefrom, stored by a different device (e.g., device 150) andaccessed therefrom, or any suitable combination thereof.

In operation 1420, the device analyzer 220 crops a candidate image(e.g., a candidate face image to be submitted in a request to verify aperson, such as the user 132). This may be the same image discussedabove with respect to operation 510. For example, the candidate imagemay be in a manner similar to that described above with respect tooperation 1310.

In operation 1422, the device analyzer 220 obtains a candidate luma mapof the cropped candidate image. This may be performed in a mannersimilar to that described above with respect to operation 1320.

In operation 1424, the device analyzer 220 de-noises the candidate lumamap of the cropped candidate image. This may be performed in a mannersimilar to that described above with respect to operation 1330.

In operation 1426, the device analyzer 220 subtracts the de-noisedcandidate luma map from the original candidate luma map prior tode-noising. The resulting candidate luma difference map represents acharacteristic noise pattern inserted into the candidate image.

In operation 1428, the device analyzer 220 generates (e.g., computes) acandidate characteristic noise descriptor of the candidate image. Thismay be performed in a manner similar to that described above withrespect operation 1350.

In operation 1430, the device analyzer 220 compares the candidatecharacteristic noise descriptor of the candidate image to thecharacteristic noise descriptor of the device 130. This may be performedby calculating an interim pointwise product by pointwise multiplying thecandidate luma map to the characteristic noise descriptor of the device130, computing the Pearson correlation coefficient between the interimpointwise product and the candidate luma difference map, and thencomparing the resulting Pearson correlation coefficient to apredetermined threshold correlation coefficient. The thresholdcorrelation coefficient may thus define a boundary (e.g., tipping point)between candidate images that will be deemed to be captured by thecamera 330 of the device 130 and candidate images that will be deemed tobe captured by some camera other than the camera 330 of the device 130.

In operation 1440, the device analyzer 220 generates a device scorebased on the comparison performed in operation 1430. For example, thiscomparison may be a basis for generating the device score discussedabove with respect to operation 530 or operation 720.

According to various example embodiments, one or more of themethodologies described herein may facilitate authentication of arequest to verify a user (e.g., a person). Moreover, one or more of themethodologies described herein may facilitate interaction betweenmachines (e.g., between the server machine 110 and the device 130) inauthenticating such a verification request. Furthermore, thesemethodologies may be helpful in preparing (e.g., training) and using anexecutable instance of an artificial intelligence engine (e.g., a neuralnetwork) to assist in the authenticating of a request to verify a user.Hence, one or more of the methodologies described herein may facilitategreater precision, accuracy, and efficiency in authenticating userverification requests, as well as provide correspondingly improvedaccess control and data security for computers and networks thereof,compared to capabilities of pre-existing systems and methods.

When these effects are considered in aggregate, one or more of themethodologies described herein may obviate a need for certain efforts orresources that otherwise would be involved in authenticating a requestto verify a user. Efforts expended by a user in submitting logincredentials and obtaining correspondingly appropriate authorizations maybe reduced by use of (e.g., reliance upon) a special-purpose device(e.g., device 130) that implements one or more of the methodologiesdescribed herein. Efforts expended by an administrator in processinglogin credentials, identifying falsified login requests, and providingcorrespondingly appropriate authorizations may be reduced by use of aspecial-purpose machine (e.g., server machine 110) that implements oneor more of the methodologies described herein. Computing resources usedby one or more systems or machines (e.g., within the network environment100) may similarly be reduced (e.g., compared to systems or machinesthat lack the structures discussed herein or are otherwise unable toperform the functions discussed herein). Examples of such computingresources include processor cycles, network traffic, computationalcapacity, main memory usage, graphics rendering capacity, graphicsmemory usage, data storage capacity, power consumption, and coolingcapacity.

FIG. 15 is a block diagram illustrating components of a machine 1500,according to some example embodiments, able to read instructions 1524from a machine-readable medium 1522 (e.g., a non-transitorymachine-readable medium, a machine-readable storage medium, acomputer-readable storage medium, or any suitable combination thereof)and perform any one or more of the methodologies discussed herein, inwhole or in part. Specifically, FIG. 15 shows the machine 1500 in theexample form of a computer system (e.g., a computer) within which theinstructions 1524 (software, a program, an application, an applet, anapp, or other executable code) for causing the machine 1500 to performany one or more of the methodologies discussed herein may be executed,in whole or in part.

In alternative embodiments, the machine 1500 operates as a standalonedevice or may be communicatively coupled (e.g., networked) to othermachines. In a networked deployment, the machine 1500 may operate in thecapacity of a server machine or a client machine in a server-clientnetwork environment, or as a peer machine in a distributed (e.g.,peer-to-peer) network environment. The machine 1500 may be a servercomputer, a client computer, a personal computer (PC), a tabletcomputer, a laptop computer, a netbook, a cellular telephone, a smartphone, a set-top box (STB), a personal digital assistant (PDA), a webappliance, a network router, a network switch, a network bridge, or anymachine capable of executing the instructions 1524, sequentially orotherwise, that specify actions to be taken by that machine. Further,while only a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute the instructions 1524 to perform all or part of any oneor more of the methodologies discussed herein.

The machine 1500 includes a processor 1502 (e.g., one or more centralprocessing units (CPUs), one or more graphics processing units (GPUs),one or more digital signal processors (DSPs), one or more applicationspecific integrated circuits (ASICs), one or more radio-frequencyintegrated circuits (RFICs), or any suitable combination thereof), amain memory 1504, and a static memory 1506, which are configured tocommunicate with each other via a bus 1508. The processor 1502 containssolid-state digital microcircuits (e.g., electronic, optical, or both)that are configurable, temporarily or permanently, by some or all of theinstructions 1524 such that the processor 1502 is configurable toperform any one or more of the methodologies described herein, in wholeor in part. For example, a set of one or more microcircuits of theprocessor 1502 may be configurable to execute one or more modules (e.g.,software modules) described herein. In some example embodiments, theprocessor 1502 is a multicore CPU (e.g., a dual-core CPU, a quad-coreCPU, an 8-core CPU, or a 128-core CPU) within which each of multiplecores behaves as a separate processor that is able to perform any one ormore of the methodologies discussed herein, in whole or in part.Although the beneficial effects described herein may be provided by themachine 1500 with at least the processor 1502, these same beneficialeffects may be provided by a different kind of machine that contains noprocessors (e.g., a purely mechanical system, a purely hydraulic system,or a hybrid mechanical-hydraulic system), if such a processor-lessmachine is configured to perform one or more of the methodologiesdescribed herein.

The machine 1500 may further include a graphics display 1510 (e.g., aplasma display panel (PDP), a light emitting diode (LED) display, aliquid crystal display (LCD), a projector, a cathode ray tube (CRT), orany other display capable of displaying graphics or video). The machine1500 may also include an alphanumeric input device 1512 (e.g., akeyboard or keypad), a pointer input device 1514 (e.g., a mouse, atouchpad, a touchscreen, a trackball, a joystick, a stylus, a motionsensor, an eye tracking device, a data glove, or other pointinginstrument), a data storage 1516, an audio generation device 1518 (e.g.,a sound card, an amplifier, a speaker, a headphone jack, or any suitablecombination thereof), and a network interface device 1520.

The data storage 1516 (e.g., a data storage device) includes themachine-readable medium 1522 (e.g., a tangible and non-transitorymachine-readable storage medium) on which are stored the instructions1524 embodying any one or more of the methodologies or functionsdescribed herein. The instructions 1524 may also reside, completely orat least partially, within the main memory 1504, within the staticmemory 1506, within the processor 1502 (e.g., within the processor'scache memory), or any suitable combination thereof, before or duringexecution thereof by the machine 1500. Accordingly, the main memory1504, the static memory 1506, and the processor 1502 may be consideredmachine-readable media tangible and non-transitory machine-readablemedia). The instructions 1524 may be transmitted or received over thenetwork 190 via the network interface device 1520. For example, thenetwork interface device 1520 may communicate the instructions 1524using any one or more transfer protocols (e.g., hypertext transferprotocol (HTTP)).

In some example embodiments, the machine 1500 may be a portablecomputing device (e.g., a smart phone, a tablet computer, or a wearabledevice), and may have one or more additional input components 1530(e.g., sensors or gauges). Examples of such input components 1530include an image input component (e.g., one or more cameras), an audioinput component (e.g., one or more microphones), a direction inputcomponent (e.g., a compass), a location input component (e.g., a globalpositioning system (GPS) receiver), an orientation component (e.g., agyroscope), a motion detection component (e.g., one or moreaccelerometers), an altitude detection component (e.g., an altimeter), atemperature input component (e.g., a thermometer), and a gas detectioncomponent (e.g., a gas sensor). Input data gathered by any one or moreof these input components 1530 may be accessible and available for useby any of the modules described herein (e.g., with suitable privacynotifications and protections, such as opt-in consent or opt-outconsent, implemented in accordance with user preference, applicableregulations, or any suitable combination thereof).

As used herein, the term “memory” refers to a machine-readable mediumable to store data temporarily or permanently and may be taken toinclude, but not be limited to, random-access memory (RAM), read-onlymemory (ROM), buffer memory, flash memory, and cache memory. While themachine-readable medium 1522 is shown in an example embodiment to be asingle medium, the term “machine-readable medium” should be taken toinclude a single medium or multiple media (e.g., a centralized ordistributed database, or associated caches and servers) able to storeinstructions. The term “machine-readable medium” shall also be taken toinclude any medium, or combination of multiple media, that is capable ofcarrying (e.g., storing or communicating) the instructions 1524 forexecution by the machine 1500, such that the instructions 1524, whenexecuted by one or more processors of the machine 1500 (e.g., processor1502), cause the machine 1500 to perform any one or more of themethodologies described herein, in whole or in part. Accordingly, a“machine-readable medium” refers to a single storage apparatus ordevice, as well as cloud-based storage systems or storage networks thatinclude multiple storage apparatus or devices. The term“machine-readable medium” shall accordingly be taken to include, but notbe limited to, one or more tangible and non-transitory data repositories(e.g., data volumes) in the example form of a solid-state memory chip,an optical disc, a magnetic disc, or any suitable combination thereof.

A “non-transitory” machine-readable medium, as used herein, specificallyexcludes propagating signals per se. According to various exampleembodiments, the instructions 1524 for execution by the machine 1500 canbe communicated via a carrier medium (e.g., a machine-readable carriermedium). Examples of such a carrier medium include a non-transientcarrier medium (e.g., a non-transitory machine-readable storage medium,such as a solid-state memory that is physically movable from one placeto another place) and a transient carrier medium (e.g., a carrier waveor other propagating signal that communicates the instructions 1524).

Certain example embodiments are described herein as including modules.Modules may constitute software modules (e.g., code stored or otherwiseembodied in a machine-readable medium or in a transmission medium),hardware modules, or any suitable combination thereof. A “hardwaremodule” is a tangible (e.g., non-transitory) physical component (e.g., aset of one or more processors) capable of performing certain operationsand may be configured or arranged in a certain physical manner. Invarious example embodiments, one or more computer systems or one or morehardware modules thereof may be configured by software (e.g., anapplication or portion thereof) as a hardware module that operates toperform operations described herein for that module.

In some example embodiments, a hardware module may be implementedmechanically, electronically, hydraulically, or any suitable combinationthereof. For example, a hardware module may include dedicated circuitryor logic that is permanently configured to perform certain operations. Ahardware module may be or include a special-purpose processor, such as afield programmable gate array (FPGA) or an ASIC. A hardware module mayalso include programmable logic or circuitry that is temporarilyconfigured by software to perform certain operations. As an example, ahardware module may include software encompassed within a CPU or otherprogrammable processor. It will be appreciated that the decision toimplement a hardware module mechanically, hydraulically, in dedicatedand permanently configured circuitry, or in temporarily configuredcircuitry (e.g., configured by software) may be driven by cost and timeconsiderations.

Accordingly, the phrase “hardware module” should be understood toencompass a tangible entity that may be physically constructed,permanently configured (e.g., hardwired), or temporarily configured(e.g., programmed) to operate in a certain manner or to perform certainoperations described herein. Furthermore, as used herein, the phrase“hardware-implemented module” refers to a hardware module. Consideringexample embodiments in which hardware modules are temporarily configured(e.g., programmed), each of the hardware modules need not be configuredor instantiated at any one instance in time. For example, where ahardware module includes a CPU configured by software to become aspecial-purpose processor, the CPU may be configured as respectivelydifferent special-purpose processors (e.g., each included in a differenthardware module) at different times. Software (e.g., a software module)may accordingly configure one or more processors, for example, to becomeor otherwise constitute a particular hardware module at one instance oftime and to become or otherwise constitute a different hardware moduleat a different instance of time.

Hardware modules can provide information to, and receive informationfrom, other hardware modules. Accordingly, the described hardwaremodules may be regarded as being communicatively coupled. Where multiplehardware modules exist contemporaneously, communications may be achievedthrough signal transmission (e.g., over circuits and buses) between oramong two or more of the hardware modules. In embodiments in whichmultiple hardware modules are configured or instantiated at differenttimes, communications between such hardware modules may be achieved, forexample, through the storage and retrieval of information in memorystructures to which the multiple hardware modules have access. Forexample, one hardware module may perform an operation and store theoutput of that operation in a memory (e.g., a memory device) to which itis communicatively coupled. A further hardware module may then, at alater time, access the memory to retrieve and process the stored output.Hardware modules may also initiate communications with input or outputdevices, and can operate on a resource (e.g., a collection ofinformation from a computing resource).

The various operations of example methods described herein may beperformed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions describedherein. As used herein, “processor-implemented module” refers to ahardware module in which the hardware includes one or more processors.Accordingly, the operations described herein may be at least partiallyprocessor-implemented, hardware-implemented, or both, since a processoris an example of hardware, and at least some operations within any oneor more of the methods discussed herein may be performed by one or moreprocessor-implemented modules, hardware-implemented modules, or anysuitable combination thereof.

Moreover, such one or more processors may perform operations in a “cloudcomputing” environment or as a service (e.g., within a “software as aservice” (SaaS) implementation). For example, at least some operationswithin any one or more of the methods discussed herein may be performedby a group of computers (e.g., as examples of machines that includeprocessors), with these operations being accessible via a network (e.g.,the Internet) and via one or more appropriate interfaces (e.g., anapplication program interface (API)). The performance of certainoperations may be distributed among the one or more processors, whetherresiding only within a single machine or deployed across a number ofmachines. In some example embodiments, the one or more processors orhardware modules (e.g., processor-implemented modules) may be located ina single geographic location (e.g., within a home environment, an officeenvironment, or a server farm). In other example embodiments, the one ormore processors or hardware modules may be distributed across a numberof geographic locations.

Throughout this specification, plural instances may implementcomponents, operations, or structures described as a single instance.Although individual operations of one or more methods are illustratedand described as separate operations, one or more of the individualoperations may be performed concurrently, and nothing requires that theoperations be performed in the order illustrated. Structures and theirfunctionality presented as separate components and functions in exampleconfigurations may be implemented as a combined structure or componentwith combined functions. Similarly, structures and functionalitypresented as a single component may be implemented as separatecomponents and functions. These and other variations, modifications,additions, and improvements fall within the scope of the subject matterherein.

Some portions of the subject matter discussed herein may be presented interms of algorithms or symbolic representations of operations on datastored as bits or binary digital signals within a memory (e.g., acomputer memory or other machine memory). Such algorithms or symbolicrepresentations are examples of techniques used by those of ordinaryskill in the data processing arts to convey the substance of their workto others skilled in the art. As used herein, an “algorithm” it aself-consistent sequence of operations or similar processing leading toa desired result. In this context, algorithms and operations involvephysical manipulation of physical quantities. Typically, but notnecessarily, such quantities may take the form of electrical, magnetic,or optical signals capable of being stored, accessed, transferred,combined, compared, or otherwise manipulated by a machine. It isconvenient at times, principally for reasons of common usage, to referto such signals using words such as “data,” “content,” “bits,” “values,”“elements,” “symbols,” “characters,” “terms,” “numbers,” “numerals,” orthe like. These words, however, are merely convenient labels and are tobe associated with appropriate physical quantities.

Unless specifically stated otherwise, discussions herein using wordssuch as “accessing,” “processing,” “detecting,” “computing,”“calculating,” “determining,” “generating,” “presenting,” “displaying,”or the like refer to actions or processes performable by a machine(e.g., a computer) that manipulates or transforms data represented asphysical (e.g., electronic, magnetic, or optical) quantities within oneor more memories (e.g., volatile memory, non-volatile memory, or anysuitable combination thereof), registers, or other machine componentsthat receive, store, transmit, or display information. Furthermore,unless specifically stated otherwise, the terms “a” or “an” are hereinused, as is common in patent documents, to include one or more than oneinstance. Finally, as used herein, the conjunction “or” refers to anon-exclusive “or,” unless specifically stated otherwise.

The following enumerated descriptions describe various examples ofmethods, machine-readable media, and systems machines, devices, or otherapparatus) discussed herein.

A first example provides a method comprising:

-   accessing, by one or more processors of a device, a face image to be    submitted in a request to verify a person, the face image being    captured by a camera of the device, depicting a face of the person,    and including a characteristic noise pattern inserted by the camera    into images captured by the camera;-   accessing, by one or more processors of the device, geolocation data    that represents a geolocation at which the device is located during    capture of the face image;-   by one or more processors of the device, inputting the face image    and the geolocation data into an artificial intelligence engine    trained to generate a face score based on the face image, a device    score based on the characteristic noise pattern, and a location    score based on the geolocation data, the artificial intelligence    engine generating the face score, the device score, and the location    score in response to the inputting;-   obtaining, by one or more processors of the device, an    authentication score from a server machine by providing the request    with the face score, the device score, and the location score to the    server machine via a communication network, the server machine    generating the authentication score based on the face score, the    device score, and the location score in response to the providing;    and-   presenting, by one or more processors of the device, an indication    that the request to verify the person is authentic based on a    comparison of the obtained authentication score to a threshold    authentication score.

A second example provides a method according to the first example,wherein:

-   the characteristic noise pattern inserted by the camera into images    captured by the camera indicates a set of manufacturing deviations    that occurred during manufacture of the camera. For example, the    characteristic noise pattern may indicate the presence of one or    more manufacturing errors, flaws, or other defects in the camera.

A third example provides a method according to the first example or thesecond example, wherein:

-   the accessing of the face image includes receiving the face image    from the camera of the device; and-   in response to the face image being received from the camera, the    accessing of the geolocation data includes receiving the geolocation    data from a geolocation sensor included in the device. Such a    situation may occur where the face image is captured live by the    camera.

A fourth example provides a method according to any of the first throughthird examples, wherein:

-   the accessing the face image includes retrieving the face image from    an image library stored by the device; and-   in response to the face image being retrieved from the image    library, the accessing of the geolocation data includes reading the    geolocation data from metadata included in the face image. Such a    situation may occur where the face image was previously captured    (e.g., by the camera), stored with the metadata in the image    library, and retrieved later therefrom.

The fifth example provides a method according to any of the firstthrough fourth examples, wherein:

-   the artificial intelligence engine trained to generate the face    score, the device score, and the location score includes one or more    of a deep neural network, a convolutional neural network, or a    recurrent neural network.

A sixth example provides a method according to any of the first throughfifth examples, wherein:

-   the server machine generates the authentication score by inputting    the face score, the device score, and the location score into a deep    beliefs neural network and obtaining the authentication score output    therefrom.

A seventh example provides a method according to any of the firstthrough sixth examples, further comprising:

-   accessing accelerometer data that indicates a movement made by the    device during the capture of the face image; and wherein:-   the artificial intelligence engine trained to generate the device    score is trained to perform a movement analysis of the accelerometer    data and generate the device score based on the movement analysis of    the accelerometer data; and-   the device score is generated by the artificial intelligence engine    based on the movement analysis of the accelerometer data.

An eighth example provides a method according to any of the firstthrough seventh examples, wherein:

-   the artificial intelligence engine trained to generate the face    score is trained to perform a liveness analysis of the face image    and generate the face score based on the liveness analysis of the    face image; and-   the face score is generated by the artificial intelligence engine    based on the liveness analysis of the face image.

A ninth example provides a method according to any of the first througheighth examples, wherein:

-   the artificial intelligence engine trained to generate the location    score is trained to perform a background analysis of a background of    the face image and generate the location score based on the    background analysis; and-   the location score is generated by the artificial intelligence    engine based on the background analysis of the background of the    face image.

A tenth example provides a method according to any of the first throughninth examples, wherein:

-   the artificial intelligence engine trained to generate the location    score is trained to perform a metadata analysis of metadata of the    face image and generate the location score based on the metadata    analysis; and-   the location score is generated by the artificial intelligence    engine based on the metadata analysis of the metadata of the face    image.

An eleventh example provides a method comprising:

-   accessing, by one or more processors of a machine, a face score    generated by a first artificial intelligence engine based on a face    image submitted in a request to verify a person, the face image    being captured by a camera of a device, depicting a face of the    person, and including a characteristic noise pattern inserted by the    camera into images captured by the camera;-   accessing, by one or more processors of the machine, a device score    generated by the first artificial intelligence engine based on the    characteristic noise pattern in the face image;-   accessing, by one or more processors of the machine, a location    score generated by the first artificial intelligence engine based on    geolocation data that specifies a geolocation at which the device is    located during capture of the face image;-   generating, by one or more processors of the machine, an    authentication score by inputting the face score, the device score,    and the location score into a second artificial intelligence engine    and obtaining the authentication score output therefrom; and-   providing, by one or more processors of the machine, the    authentication score to the device via a communication network, the    providing of the authentication score causing the device to present    an indication that the request to verify the person is authentic    based on a comparison of the provided authentication score to a    threshold authentication score.

A twelfth example provides a method according to the eleventh example,wherein:

-   the accessing of the face score includes receiving the face image    from the device via the communication network, inputting the face    image into the first artificial intelligence engine, and receiving    the face score output therefrom;-   the accessing of the device score includes receiving the device    score from the first artificial intelligence engine;-   the accessing of the location score includes receiving the    geolocation data from the device via the communication network,    inputting the geolocation data into the first artificial    intelligence engine, and receiving the location score output    therefrom. Such a situation may occur where the first artificial    intelligence engine is located in a server machine (e.g., server    machine 110).

A thirteenth example provides a method according to the eleventhexample, wherein:

-   the accessing of the face score includes receiving the face score    from the device via the communication network in response to the    device accessing the face image, inputting the face image into the    first artificial intelligence engine, and providing the face score    output therefrom;-   the accessing of the device score includes receiving the device    score from the device via the communication network;-   the accessing of the location score includes receiving the location    score from the device via the communication network in response to    the device accessing the geolocation data, inputting the geolocation    data into the first artificial intelligence engine, and providing    the location score output therefrom. Such a situation may occur    where the first artificial intelligence engine is located in a    device (e.g., device 130).

A fourteenth example provides a method according to any of the elevenththrough thirteenth examples, wherein:

-   the characteristic noise pattern inserted by the camera into images    captured by the camera indicates a set of manufacturing deviations    that occurred during manufacture of the camera. For example, the    characteristic noise pattern may indicate the presence of one or    more manufacturing errors, flaws, or other defects in the camera.

A fifteenth example provides a method according to any of the elevenththrough fourteenth examples, wherein:

-   the first artificial intelligence engine that generates the face    score, the device score, and the location score includes one or more    of a deep neural network, a convolutional neural network, or a    recurrent neural network.

A sixteenth example provides a method according to any of the elevenththrough fifteenth examples, wherein:

-   the second artificial intelligence engine that outputs the    authentication score includes a deep beliefs neural network.

A seventeenth example provides a machine-readable medium (e.g., anon-transitory machine-readable storage medium) comprising instructionsthat, when executed by one or more processors of a device (e.g., device130), cause the device to perform operations comprising:

-   accessing a face image to be submitted in a request to verify a    person, the face image being captured by a camera of the device,    depicting a face of the person, and including a characteristic noise    pattern inserted by the camera into images captured by the camera;-   accessing geolocation data that represents a geolocation at which    the device is located during capture of the face image;-   inputting the face image and the geolocation data into an artificial    intelligence engine trained to generate a face score based on the    face image, a device score based on the characteristic noise    pattern, and a location score based on the geolocation data, the    artificial intelligence engine generating the face score, the device    score, and the location score in response to the inputting;-   obtaining an authentication score from a server machine by providing    the request with the face score, the device score, and the location    score to the server machine via a communication network, the server    machine generating the authentication score based on the face score,    the device score, and the location score in response to the    providing; and-   presenting an indication that the request to verify the person is    authentic based on a comparison of the obtained authentication score    to a threshold authentication score.

An eighteenth example provides a machine-readable medium (e.g., anon-transitory machine-readable storage medium) comprising instructionsthat, when executed by one or more processors of a server machine (e.g.,server machine 110), cause the server machine to perform operationscomprising:

-   accessing a face score generated by a first artificial intelligence    engine based on a face image submitted in a request to verify a    person, the face image being captured by a camera of a device,    depicting a face of the person, and including a characteristic noise    pattern inserted by the camera into images captured by the camera;-   accessing a device score generated by the first artificial    intelligence engine based on the characteristic noise pattern in the    face image;-   accessing a location score generated by the first artificial    intelligence engine based on geolocation data that specifies a    geolocation at which the device is located during capture of the    face image;-   generating an authentication score by inputting the face score, the    device score, and the location score into a second artificial    intelligence engine and obtaining the authentication score output    therefrom; and-   providing the authentication score to the device via a communication    network, the providing of the authentication score causing the    device to present an indication that the request to verify the    person is authentic based on a comparison of the provided    authentication score to a threshold authentication score.

A nineteenth example provides a device (e.g., device 130) comprising:

-   one or more processors; and-   a memory storing instructions that, when executed by at least one    processor among the one or more processors, cause the device to    perform operations comprising:-   accessing a face image to be submitted in a request to verify a    person, the face image being captured by a camera of the device,    depicting a face of the person, and including a characteristic noise    pattern inserted by the camera into images captured by the camera;-   accessing geolocation data that represents a geolocation at which    the device is located during capture of the face image;-   inputting the face image and the geolocation data into an artificial    intelligence engine trained to generate a face score based on the    face image, a device score based on the characteristic noise    pattern, and a location score based on the geolocation data, the    artificial intelligence engine generating the face score, the device    score, and the location score in response to the inputting;-   obtaining an authentication score from a server machine by providing    the request with the face score, the device score, and the location    score to the server machine via a communication network, the server    machine generating the authentication score based on the face score,    the device score, and the location score in response to the    providing; and-   presenting an indication that the request to verify the person is    authentic based on a comparison of the obtained authentication score    to a threshold authentication score.

A twentieth example provides a server machine (e.g., server machine 110)comprising:

-   one or more processors; and-   a memory storing instructions that, when executed by at least one    processor among the one or more processors, cause the server machine    to perform operations comprising:-   accessing a face score generated by a first artificial intelligence    engine based on a face image submitted in a request to verify a    person, the face image being captured by a camera of a device,    depicting a face of the person, and including a characteristic noise    pattern inserted by the camera into images captured by the camera;-   accessing a device score generated by the first artificial    intelligence engine based on the characteristic noise pattern in the    face image;-   accessing a location score generated by the first artificial    intelligence engine based on geolocation data that specifies a    geolocation at which the device is located during capture of the    face image;-   generating an authentication score by inputting the face score, the    device score, and the location score into a second artificial    intelligence engine and obtaining the authentication score output    therefrom; and-   providing the authentication score to the device via a communication    network, the providing of the authentication score causing the    device to present an indication that the request to verify the    person is authentic based on a comparison of the provided    authentication score to a threshold authentication score.

A twenty-first example provides a method comprising:

-   accessing, by one or more processors of a machine, a reference set    of obfuscated geolocations that are generated from and correspond to    actual geolocations from which a device submitted requests to verify    a person;-   grouping, by one or more processors of the machine, the obfuscated    geolocations from the reference set into geographical clusters based    on a predetermined cluster radius value;-   calculating, by one or more processors of the machine, a    corresponding representative geolocation for each geographical    cluster among the geographical clusters and a corresponding variance    distance from the representative geolocation for each geographical    cluster among the geographical clusters;-   generating, by one or more processors of the machine, a reference    location score based on the representative geolocations of the    geographical clusters and on the variance distances of the    geographical clusters; and-   training, by one or more processors of the machine, an artificial    intelligence engine to output the reference location score in    response to the reference set of obfuscated geolocations being input    thereto.

A twenty-second example provides a method according to the twenty-firstexample, wherein:

-   the reference set of obfuscated geolocations is generated by at    least one of quantizing the actual geolocations, adding noise to the    actual geolocations, or encrypting the actual geolocations.

A twenty-third example provides a method according to the twenty-firstexample or the twenty-second example, further comprising:

-   generating a corresponding weight for each geographical cluster    among the geographical clusters based on a corresponding count of    obfuscated geolocations in that geographical cluster; and wherein:-   the generating of the reference location score is based on the    generated weights that correspond to the geographical clusters.

A twenty-fourth example provides a method according to any of thetwenty-first through twenty-third examples, wherein:

-   the calculating of the corresponding representative geolocation for    each geographical cluster includes calculating a corresponding mean    geolocation for each geographical cluster; and-   the generating of the reference location score is based on the mean    geolocations of the geographical clusters and on the variance    distances from the mean geolocations of the geographical clusters.

A twenty-fifth example provides a method according to any of thetwenty-first to twenty-fourth examples, further comprising:

-   calculating a corresponding mean inter-cluster travel distance    between successive geolocations in different geographical clusters    among the geographical clusters; and wherein:-   the generating of the reference location score is based on the mean    inter-cluster travel distances.

A twenty-sixth example provides a method according to any of thetwenty-first through twenty-fifth examples, further comprising:

-   calculating a corresponding variance of inter-cluster travel    distances between successive geolocations in different geographical    clusters among the geographical clusters; and wherein:-   the generating of the reference location score is based on the    variances of inter-cluster travel distances.

A twenty-seventh example provides a method according to any of thetwenty-first through twenty-sixth examples, further comprising:

-   accessing reference accelerometer data that indicates corresponding    movements made by the device; and wherein:-   the generating of the reference location score is based on the    reference accelerometer data that indicates the corresponding    movements made by the device.

A twenty-eighth example provides a method according to any of thetwenty-first through twenty-seventh examples, further comprising:

-   accessing reference compass data that indicates corresponding    directions in which the device is oriented; and wherein:-   the generating of the reference location score is based on the    reference compass data that indicates the corresponding directions    in which the device is oriented.

A twenty-ninth example provides a method according to any of thetwenty-first through twenty-eighth examples, further comprising:

-   generating an executable instance of the artificial intelligence    engine trained to output the reference location score in response to    the reference set of obfuscated geolocations being input thereto;    and-   providing the executable instance of the trained artificial    intelligence engine to the device via a communication network, the    device being configured to obfuscate an actual geolocation of the    device, input the obfuscated geolocation into the executable    instance of the artificial intelligence engine, and obtain a    corresponding candidate location score output therefrom.

A thirtieth example provides a method comprising:

-   generating, by one or more processors of a device, an obfuscated    geolocation of the device by obfuscating an actual geolocation of    the device;-   by one or more processors of the device, inputting the obfuscated    geolocation of the device into an artificial intelligence engine    trained to output a reference location score in response to a    reference set of obfuscated geolocations being input thereto, the    reference set of obfuscated geolocations being generated from and    corresponding to actual geolocations from which the device submitted    requests to verify a person, the artificial intelligence engine    generating a candidate location score based on the obfuscated    geolocation of the device in response to the inputting;-   obtaining, by one or more processors of the device, an    authentication score from a server machine by providing the    candidate location score to the server machine in a request to    verify the person, the server machine generating the authentication    score based on the candidate location score in response to the    providing; and-   presenting, by one or more processors of the device, an indication    that the request to verify the person is authentic based on a    comparison of the obtained authentication score to a threshold    authentication score.

A thirty-first example provides a method according to the thirtiethexample, wherein:

-   the artificial intelligence engine is trained to output the    reference location score based on weights that correspond to    geographical clusters generated based on a predetermined cluster    radius value, each weight among the weights being generated based on    a corresponding count of obfuscated geolocations in the    corresponding geographical cluster among the geographical clusters;-   the artificial intelligence engine is trained to output the    reference location score based on the generated weights that    correspond to the geographical clusters; and-   the artificial intelligence engine generates the candidate location    score based on the generated weights that correspond to the    geographical clusters.

A thirty-second example provides a method according to the thirtiethexample or the thirty-first example, wherein:

-   the artificial intelligence engine is trained to output the    reference location score based on mean inter-cluster travel    distances between geographical clusters generated based on a    predetermined cluster radius value, each mean inter-cluster travel    distance among the mean inter-cluster travel distances being    calculated between successive geolocations in different geographical    clusters among the geographical clusters; and-   the artificial intelligence engine generates the candidate location    score based on the mean inter-cluster travel distances.

A thirty-third example provides a method according to any of thethirtieth through thirty-second examples, wherein:

-   the artificial intelligence engine is trained to output the    reference location score based on variances of inter-cluster travel    distances between geographical clusters generated based on a    predetermined cluster radius value, each variance among the    variances being calculated based on inter-cluster travel distances    between successive geolocations in different geographical clusters    among the geographical clusters; and-   the artificial intelligence engine generates the candidate location    score based on the variances of inter-cluster travel distances.

A thirty-fourth example provides a method according to any of thethirtieth through thirty-third examples, wherein:

-   the artificial intelligence engine is trained to output the    reference location score based on comparisons of a maximum travel    speed to travel speeds between pairs of successive geolocations,    each travel speed among the travel speeds being calculated based on    travel distances and travel times between a corresponding pair of    successive geolocations; and-   the artificial intelligence engine generates the candidate location    score based on the comparisons of the maximum travel speed to the    travel speeds between the pairs of successive geolocations.

A thirty-fifth example provides a method according to any of thethirtieth through thirty-fourth examples, further comprising:

-   accessing candidate accelerometer data that indicates a    corresponding movement made by the device; and wherein:-   the artificial intelligence engine is trained to output the    reference location score based on reference accelerometer data that    indicates corresponding movements made by the device; and-   the artificial intelligence engine generates the candidate location    score based on the candidate accelerometer data that indicates the    corresponding movement made by the device.

A thirty-sixth example provides a method according to any of thethirtieth through thirty-fifth examples, further comprising:

-   accessing candidate compass data that indicates a corresponding    direction which the device is oriented; and wherein:-   the artificial intelligence engine is trained to output the    reference location score based on reference compass data that    indicates corresponding directions in which the device is oriented;    and-   the artificial intelligence engine generates the candidate location    score based on the candidate compass data that indicates the    corresponding direction in which the device is oriented.

A thirty-seventh example provides a machine-readable medium (e.g., anon-transitory machine-readable storage medium) comprising instructionsthat, when executed by one or more processors of a server machine, causethe server machine to perform operations comprising:

-   accessing a reference set of obfuscated geolocations that are    generated from and correspond to actual geolocations from which a    device submitted requests to verify a person;-   grouping the obfuscated geolocations from the reference set into    geographical clusters based on a predetermined cluster radius value;-   calculating a corresponding representative geolocation for each    geographical cluster among the geographical clusters and a    corresponding variance distance from the representative geolocation    for each geographical cluster among the geographical clusters;-   generating a reference location score based on the representative    geolocations of the geographical clusters and on the variance    distances of the geographical clusters; and-   training an artificial intelligence engine to output the reference    location score in response to the reference set of obfuscated    geolocations being input thereto.

A thirty-eighth example provides a machine-readable medium (e.g., anon-transitory machine-readable storage medium) comprising instructionsthat, when executed by one or more processors of a device, cause thedevice to perform operations comprising:

-   generating an obfuscated geolocation of the device by obfuscating an    actual geolocation of the device;-   inputting the obfuscated geolocation of the device into an    artificial intelligence engine trained to output a reference    location score in response to a reference set of obfuscated    geolocations being input thereto, the reference set of obfuscated    geolocations being generated from and corresponding to actual    geolocations from which the device submitted requests to verify a    person, the artificial intelligence engine generating a candidate    location score based on the obfuscated geolocation of the device in    response to the inputting;-   obtaining an authentication score from a server machine by providing    the candidate location score to the server machine in a request to    verify the person, the server machine generating the authentication    score based on the candidate location score in response to the    providing; and-   presenting an indication that the request to verify the person is    authentic based on a comparison of the obtained authentication score    to a threshold authentication score.

A thirty-ninth example provides a server machine (e.g., server machine110) comprising:

-   one or more processors; and-   a memory storing instructions that, when executed by at least one    processor among the one or more processors, cause the server machine    to perform operations comprising:-   accessing a reference set of obfuscated geolocations that are    generated from and correspond to actual geolocations from which a    device submitted requests to verify a person;-   grouping the obfuscated geolocations from the reference set into    geographical clusters based on a predetermined cluster radius value;-   calculating a corresponding representative geolocation for each    geographical cluster among the geographical clusters and a    corresponding variance distance from the representative geolocation    for each geographical cluster among the geographical clusters;-   generating a reference location score based on the representative    geolocations of the geographical clusters and on the variance    distances of the geographical clusters; and-   training an artificial intelligence engine to output the reference    location score in response to the reference set of obfuscated    geolocations being input thereto.

A fortieth example provides a device (e.g., device 130) comprising:

-   one or more processors; and-   a memory storing instructions that, when executed by at least one    processor among the one or more processors, cause the device to    perform operations comprising:-   generating an obfuscated geolocation of the device by obfuscating an    actual geolocation of the device;-   inputting the obfuscated geolocation of the device into an    artificial intelligence engine trained to output a reference    location score in response to a reference set of obfuscated    geolocations being input thereto, the reference set of obfuscated    geolocations being generated from and corresponding to actual    geolocations from which the device submitted requests to verify a    person, the artificial intelligence engine generating a candidate    location score based on the obfuscated geolocation of the device in    response to the inputting;-   obtaining an authentication score from a server machine by providing    the candidate location score to the server machine in a request to    verify the person, the server machine generating the authentication    score based on the candidate location score in response to the    providing; and-   presenting an indication that the request to verify the person is    authentic based on a comparison of the obtained authentication score    to a threshold authentication score.

A forty-first example provides a carrier medium carryingmachine-readable instructions for controlling a machine to carry out theoperations (e.g., method operations) performed in any one of thepreviously described examples.

What is claimed is:
 1. A method comprising: accessing, by one or moreprocessors of a device, a face image to be submitted in a request toverify a person, the face image being captured by a camera of thedevice, depicting a face of the person, and including a characteristicnoise pattern inserted by the camera into images captured by the camera;accessing, by one or more processors of the device, geolocation datathat represents a geolocation at which the device is located duringcapture of the face image; by one or more processors of the device,inputting the face image and the geolocation data into an artificialintelligence engine trained to generate a face score based on the faceimage, a device score based on the characteristic noise pattern, and alocation score based on the geolocation data, the artificialintelligence engine generating the face score, the device score, and thelocation score in response to the inputting; obtaining, by one or moreprocessors of the device, an authentication score from a server machineby providing the request with the face score, the device score, and thelocation score to the server machine via a communication network, theserver machine generating the authentication score based on the facescore, the device score, and the location score in response to theproviding; and presenting, by one or more processors of the device, anindication that the request to verify the person is authentic based on acomparison of the obtained authentication score to a thresholdauthentication score.
 2. The method of claim 1, wherein: thecharacteristic noise pattern inserted by the camera into images capturedby the camera indicates a set of manufacturing deviations that occurredduring manufacture of the camera.
 3. The method of claim 1, wherein: theaccessing of the face image includes receiving the face image from thecamera of the device; and in response to the face image being receivedfrom the camera, the accessing of the geolocation data includesreceiving the geolocation data from a geolocation sensor included in thedevice.
 4. The method of claim 1, wherein: the accessing the face imageincludes retrieving the face image from an image library stored by thedevice; and in response to the face image being retrieved from the imagelibrary, the accessing of the geolocation data includes reading thegeolocation data from metadata included in the face image.
 5. The methodof claim 1, wherein: the artificial intelligence engine trained togenerate the face score, the device score, and the location scoreincludes one or more of a deep neural network, a convolutional neuralnetwork, or a recurrent neural network.
 6. The method of claim 1,wherein: the server machine generates the authentication score byinputting the face score, the device score, and the location score intoa deep beliefs neural network and obtaining the authentication scoreoutput therefrom.
 7. The method of claim 1, further comprising:accessing accelerometer data that indicates a movement made by thedevice during the capture of the face image; and wherein: the artificialintelligence engine trained to generate the device score is trained toperform a movement analysis of the accelerometer data and generate thedevice score based on the movement analysis of the accelerometer data;and the device score is generated by the artificial intelligence enginebased on the movement analysis of the accelerometer data.
 8. The methodof claim 1, wherein: the artificial intelligence engine trained togenerate the face score is trained to perform a liveness analysis of theface image and generate the face score based on the liveness analysis ofthe face image; and the face score is generated by the artificialintelligence engine based on the liveness analysis of the face image. 9.The method of claim 1, wherein: the artificial intelligence enginetrained to generate the location score is trained to perform abackground analysis of a background of the face image and generate thelocation score based on the background analysis; and the location scoreis generated by the artificial intelligence engine based on thebackground analysis of the background of the face image.
 10. The methodof claim 1, wherein: the artificial intelligence engine trained togenerate the location score is trained to perform a metadata analysis ofmetadata of the face image and generate the location score based on themetadata analysis; and the location score is generated by the artificialintelligence engine based on the metadata analysis of the metadata ofthe face image.
 11. A method comprising: accessing, by one or moreprocessors of a machine, a face score generated by a first artificialintelligence engine based on a face image submitted in a request toverify a person, the face image being captured by a camera of a device,depicting a face of the person, and including a characteristic noisepattern inserted by the camera into images captured by the camera;accessing, by one or more processors of the machine, a device scoregenerated by the first artificial intelligence engine based on thecharacteristic noise pattern in the face image; accessing, by one ormore processors of the machine, a location score generated by the firstartificial intelligence engine based on geolocation data that specifiesa geolocation at which the device is located during capture of the faceimage; generating, by one or more processors of the machine, anauthentication score by inputting the face score, the device score, andthe location score into a second artificial intelligence engine andobtaining the authentication score output therefrom; and providing, byone or more processors of the machine, the authentication score to thedevice via a communication network, the providing of the authenticationscore causing the device to present an indication that the request toverify the person is authentic based on a comparison of the providedauthentication score to a threshold authentication score.
 12. The methodof claim 11, wherein: the accessing of the face score includes receivingthe face image from the device via the communication network, inputtingthe face image into the first artificial intelligence engine, andreceiving the face score output therefrom; the accessing of the devicescore includes receiving the device score from the first artificialintelligence engine; the accessing of the location score includesreceiving the geolocation data from the device via the communicationnetwork, inputting the geolocation data into the first artificialintelligence engine, and receiving the location score output therefrom.13. The method of claim 11, wherein: the accessing of the face scoreincludes receiving the face score from the device via the communicationnetwork in response to the device accessing the face image, inputtingthe face image into the first artificial intelligence engine, andproviding the face score output therefrom; the accessing of the devicescore includes receiving the device score from the device via thecommunication network; the accessing of the location score includesreceiving the location score from the device via the communicationnetwork in response to the device accessing the geolocation data,inputting the geolocation data into the first artificial intelligenceengine, and providing the location score output therefrom.
 14. Themethod of claim 11, wherein: the characteristic noise pattern insertedby the camera into images captured by the camera indicates a set ofmanufacturing deviations that occurred during manufacture of the camera.15. The method of claim 11, wherein: the first artificial intelligenceengine that generates the face score, the device score, and the locationscore includes one or more of a deep neural network, a convolutionalneural network, or a recurrent neural network.
 16. The method of claim11, wherein: the second artificial intelligence engine that outputs theauthentication score includes a deep beliefs neural network.
 17. Anon-transitory machine-readable storage medium comprising instructionsthat, when executed by one or more processors of a device, cause thedevice to perform operations comprising: accessing a face image to besubmitted in a request to verify a person, the face image being capturedby a camera of the device, depicting a face of the person, and includinga characteristic noise pattern inserted by the camera into imagescaptured by the camera; accessing geolocation data that represents ageolocation at which the device is located during capture of the faceimage; inputting the face image and the geolocation data into anartificial intelligence engine trained to generate a face score based onthe face image, a device score based on the characteristic noisepattern, and a location score based on the geolocation data, theartificial intelligence engine generating the face score, the devicescore, and the location score in response to the inputting; obtaining anauthentication score from a server machine by providing the request withthe face score, the device score, and the location score to the servermachine via a communication network, the server machine generating theauthentication score based on the face score, the device score, and thelocation score in response to the providing; and presenting anindication that the request to verify the person is authentic based on acomparison of the obtained authentication score to a thresholdauthentication score.
 18. A non-transitory machine-readable storagemedium comprising instructions that, when executed by one or moreprocessors of a server machine, cause the server machine to performoperations comprising: accessing a face score generated by a firstartificial intelligence engine based on a face image submitted in arequest to verify a person, the face image being captured by a camera ofa device, depicting a face of the person, and including a characteristicnoise pattern inserted by the camera into images captured by the camera;accessing a device score generated by the first artificial intelligenceengine based on the characteristic noise pattern in the face image;accessing a location score generated by the first artificialintelligence engine based on geolocation data that specifies ageolocation at which the device is located during capture of the faceimage; generating an authentication score by inputting the face score,the device score, and the location score into a second artificialintelligence engine and obtaining the authentication score outputtherefrom; and providing the authentication score to the device via acommunication network, the providing of the authentication score causingthe device to present an indication that the request to verify theperson is authentic based on a comparison of the provided authenticationscore to a threshold authentication score.
 19. A device comprising: oneor more processors; and a memory storing instructions that, whenexecuted by at least one processor among the one or more processors,cause the device to perform operations comprising: accessing a faceimage to be submitted in a request to verify a person, the face imagebeing captured by a camera of the device, depicting a face of theperson, and including a characteristic noise pattern inserted by thecamera into images captured by the camera; accessing geolocation datathat represents a geolocation at which the device is located duringcapture of the face image; inputting the face image and the geolocationdata into an artificial intelligence engine trained to generate a facescore based on the face image, a device score based on thecharacteristic noise pattern, and a location score based on the g °location data, the artificial intelligence engine generating the facescore, the device score, and the location score in response to theinputting; obtaining an authentication score from a server machine byproviding the request with the face score, the device score, and thelocation score to the server machine via a communication network, theserver machine generating the authentication score based on the facescore, the device score, and the location score in response to theproviding; and presenting an indication that the request to verify theperson is authentic based on a comparison of the obtained authenticationscore to a threshold authentication score.
 20. A server machinecomprising: one or more processors; and a memory storing instructionsthat, when executed by at least one processor among the one or moreprocessors, cause the server machine to perform operations comprising:accessing a face score generated by a first artificial intelligenceengine based on a face image submitted in a request to verify a person,the face image being captured by a camera of a device, depicting a faceof the person, and including a characteristic noise pattern inserted bythe camera into images captured by the camera; accessing a device scoregenerated by the first artificial intelligence engine based on thecharacteristic noise pattern in the face image; accessing a locationscore generated by the first artificial intelligence engine based ongeolocation data that specifies a geolocation at which the device islocated during capture of the face image; generating an authenticationscore by inputting the face score, the device score, and the locationscore into a second artificial intelligence engine and obtaining theauthentication score output therefrom; and providing the authenticationscore to the device via a communication network, the providing of theauthentication score causing the device to present an indication thatthe request to verify the person is authentic based on a comparison ofthe provided authentication score to a threshold authentication score.