System and method for user authentication for information security
Abstract:
A system receives a request to authorize an interaction between a first avatar associated with a first user and a second avatar associated with a second user within a virtual environment. The system receives a request to verify the identity of the first user. The system receives an image of the first user and extracts facial features from the image. The system identifies a serial number and a user credential associated with the first user. The system generates a token based on the facial features, the serial number, and the user credential. The system verifies the identity of the first user based on the token. If the identity of the first user is verified, the system authorizes the interaction between the first avatar and the second avatar.
Public/Granted literature
Information query
Patent Agency Ranking
0/0