Patent classifications
G06F21/32
METHOD FOR RECOGNIZING IRIS BASED ON USER INTENTION AND ELECTRONIC DEVICE FOR THE SAME
A method and an apparatus include a display, an iris scanning sensor, and a processor functionally coupled with the display, and the iris scanning sensor, wherein the processor activates the iris scanning sensor when receiving a display-on event in a display-off state that is an intended user input.
Methods, systems, and media for secure authentication of users based on a biometric identifier and knowledge-based secondary information
Methods, systems, and media for secure authentication of users using one or more biometric recognition systems are provided. In some embodiments, the method comprises: receiving an indication that a biometric identifier is to be used to authenticate a user to a service; receiving (i) the biometric identifier of the user from a capture device and (ii) knowledge-based secondary information associated with the user from an input device; determining a Voronoi cell identifier that corresponds to the biometric identifier; calculating a hash of the Voronoi cell identifier and the knowledge-based secondary information; transmitting the hash to a server device for verification; in response to transmitting the hash to the server device, receiving a response indicating whether the hash matches a previously stored hash that was stored in the server device; and determining whether to automatically authenticate the user to the service based on the response from the server device.
Methods, systems, and media for secure authentication of users based on a biometric identifier and knowledge-based secondary information
Methods, systems, and media for secure authentication of users using one or more biometric recognition systems are provided. In some embodiments, the method comprises: receiving an indication that a biometric identifier is to be used to authenticate a user to a service; receiving (i) the biometric identifier of the user from a capture device and (ii) knowledge-based secondary information associated with the user from an input device; determining a Voronoi cell identifier that corresponds to the biometric identifier; calculating a hash of the Voronoi cell identifier and the knowledge-based secondary information; transmitting the hash to a server device for verification; in response to transmitting the hash to the server device, receiving a response indicating whether the hash matches a previously stored hash that was stored in the server device; and determining whether to automatically authenticate the user to the service based on the response from the server device.
VOICE CONTROL AND TELECOMMUNICATIONS SERVICE INTEGRATION
This disclosure describes techniques that facilitate selectively interacting with a computing resource based on receipt of an incoming voice command. Particularly, a voice control integration system may parse content of an incoming voice command to authenticate an identity of the client, and further determine an intended meaning of the incoming voice command. In doing so, the voice control integration system may interact with a computing resource to perform an action that fulfills a client request. Computing resources may be associated with service providers or client devices of a client. Further, the voice control integration system may authenticate a client identity based on a one or two-factor authentication protocol, of which one may correspond to a biometric analysis of the incoming voice command. Further, a second-factor of the two-factor authentication protocol may be implemented via a voice interaction device, another client device accessible to the client, or a combination of both.
Earpiece with Digital Rights Management
A wireless earpiece for digital rights management is provided. The wireless earpiece includes a processor disposed within the ear piece housing, a speaker operatively connected to the processor, a storage medium disposed within the ear piece housing and operatively connected to the processor, and a wireless transceiver disposed within the ear piece housing and operatively connected to the processor. The processor may be configured to access audio files stored on the storage medium to play the audio files over the speaker. The processor may be configured to provide a digital rights management feature for one or more of the audio files. The processor may be further configured to access an audio stream conveyed to the earpiece through the wireless transceiver. The processor may be further configured to provide a digital rights management for the audio stream.
Earpiece with Digital Rights Management
A wireless earpiece for digital rights management is provided. The wireless earpiece includes a processor disposed within the ear piece housing, a speaker operatively connected to the processor, a storage medium disposed within the ear piece housing and operatively connected to the processor, and a wireless transceiver disposed within the ear piece housing and operatively connected to the processor. The processor may be configured to access audio files stored on the storage medium to play the audio files over the speaker. The processor may be configured to provide a digital rights management feature for one or more of the audio files. The processor may be further configured to access an audio stream conveyed to the earpiece through the wireless transceiver. The processor may be further configured to provide a digital rights management for the audio stream.
Identity-based display of text
A computing device can receive a communication including text that can be presented on a display screen of the computing device. A camera of the computing device can capture image data. The computing device can determine, from the image data, an identity represented in the image data. The computing device can determine an amount of the communication to present on the display screen based on the identity. The computing device can determine, from the image data, user attention is directed toward the display screen. The computing device can present the amount of the communication on the display screen. In some embodiments, the computing device can determine which content of the communication to display based on the identity. The computing device can display a summary of the communication. The computing device can display an amount of the summary and/or the content of the summary based on the identity.
POINTING DEVICE BIOMETRICS CONTINUOUS USER AUTHENTICATION
There is provided, in accordance with some embodiments, a method comprising using one or more hardware processors for receiving a behavioral biometric model that characterizes a human user according to pointing device data of the human user, where the pointing device data comprises screen coordinate and time stamp pairs. The method comprises an action of monitoring an input data stream from a pointing device in real time, wherein the input data stream covers two or more spatial regions of a display screen, and an action of segregating the input data stream into one or more subset streams that is restricted to one of the plurality of spatial regions. The method comprises an action of computing a similarity score based on one or more comparisons of the behavioral biometric model and the one or more subset streams, and an action of sending the similarity score to a user authorization system.
POINTING DEVICE BIOMETRICS CONTINUOUS USER AUTHENTICATION
There is provided, in accordance with some embodiments, a method comprising using one or more hardware processors for receiving a behavioral biometric model that characterizes a human user according to pointing device data of the human user, where the pointing device data comprises screen coordinate and time stamp pairs. The method comprises an action of monitoring an input data stream from a pointing device in real time, wherein the input data stream covers two or more spatial regions of a display screen, and an action of segregating the input data stream into one or more subset streams that is restricted to one of the plurality of spatial regions. The method comprises an action of computing a similarity score based on one or more comparisons of the behavioral biometric model and the one or more subset streams, and an action of sending the similarity score to a user authorization system.
System, Method, and Apparatus for Personal Identification
A method and system determines a probability that a mobile device is in use by a first user. Sensors of a mobile device are used to detect and quantify human activity and habitual or behavior traits. A collection of such habitual human trait values identifying a first user of the device are memorized during a training and learning period. During subsequent periodic predictive periods, a new collection of like habitual trait values of the current user of the device, when captured and compared with memorized values of the first user of the device relative to time, uniquely identify the person in possession of the mobile device as being or not being the first user of the device. By associating this knowledge with a unique device known to be assigned to the first user of the device, it becomes possible to confirm identity without risk of impersonation.