Patent classifications
G07C2009/00809
AUTHENTICATION THROUGH TISSUE-CONDUCTED SOUND
Systems and methods may provide for sending a sound wave signal and measuring a body conduction characteristic of the sound wave signal. Additionally, a user authentication may be performed based at least in part on the body conduction characteristic. In one example, the body conduction characteristic includes one or more of a timing, a frequency or an amplitude of the sound wave signal after passing through one or more of bone or tissue.
Secured Intrabody Networks and Interfaces for the Internet of Things and Multiple Uses of Ultrasound Wideband
Systems, methods, and computer-readable media are disclosed for secured intrabody networks and interfaces for IoT and ultrasound wideband. Example devices may include a wearable device in contact with a surface of a human body, the wearable device including an ultrasonic wave generator configured to transmit ultrasonic waves, and an external receiver configured to receive the ultrasonic waves and determine data encoded in the ultrasonic waves. The ultrasonic waves may encode a single bit of data in multiple pulses through a pseudorandom time hopping scheme.
Vehicle control system
A vehicle control system includes a terminal device and a vehicle. The terminal device includes a first verification unit that verifies whether the terminal devices matches the vehicle through wireless communication when the terminal device enters an area in which wireless communication between the terminal device and the vehicle is available, and an operation instruction unit that receives an instruction to execute a predetermined operation of the vehicle from the user and the first verification unit has verified that the terminal device matches the vehicle, and transmits a signal according to the instruction to the vehicle, and the vehicle includes a second verification unit that communicates with the first identification unit and verify whether with the vehicle matches the terminal device, and an operation controller that receives the signal from the operation instruction unit and executes the predetermined operation according to the signal.
Authentication through tissue-conducted sound
Systems and methods may provide for sending a sound wave signal and measuring a body conduction characteristic of the sound wave signal. Additionally, a user authentication may be performed based at least in part on the body conduction characteristic. In one example, the body conduction characteristic includes one or more of a timing, a frequency or an amplitude of the sound wave signal after passing through one or more of bone or tissue.
Capacitive through-body communication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for capacitive through-body communication. In one aspect, a method includes capturing, from capacitive through-body communication with an on-body device worn by an individual, a biometric template comprising identification data associated with the individual, comparing the captured identification data of the captured biometric template with reference identification data of a stored biometric template associated with the individual, determining that the captured identification data matches the reference identification data of the stored biometric template; and authenticating identification of the individual.
Authentication based on through-body signals
Techniques are described for user authentication based on a signal that is transmitted through an individual's body, and detected using device(s) in physical contact with the individual. A signal, such as an electrical signal or a vibrational signal, may be transmitted from a first device and received by a second device that is in physical contact with the individual. The received signal may be employed to determine a body signature for the individual. The body signature may identify the individual among a population of individuals, given the particular alterations to the propagating signal caused by the individual's physiology. Accordingly, the body signature may be employed as a form of biometric data that is useable to authenticate the individual to access a secure area, log in to a device or an application, or for other purposes.
PAIRABLE SECURE-ACCESS FACILITIES
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Systems and methods of using implanted or wearable micro electronic devices and for using a mobile device to communicate with and manage such micro electronic devices
A system, apparatus and method utilize a micro electronic device implanted in a person or group of persons, or wearable thereby, to manage a variety of activities, including interrogating an RF microdevice for information. The microdevice has a housing, an antenna, a microprocessor, a tuning capacitor, and a transducer such as a location transponder, a thermometer, a heart rate transducer, a blood pressure transducer, and an information storage element. The method includes the steps of providing the microdevice and attaching it to a person. The person brings the microdevice near a login system having an RF reader and a login processor. The reader communicates with the microdevice via RF signals, and signals the login processor to corroborate an identification code from the microdevice. If the login processor corroborates the identification code, it signals the microdevice to permit access to information from the transducer. If the login processor does not corroborate the identification code, access to the information is not permitted.
ACOUSTIC PERSONAL AUTHENTICATION DEVICE, PERSONAL AUTHENTICATION METHOD, AND RECORDING MEDIUM
Provided is a personal authentication device capable of simply securing security with little psychological and physical burden of a user to be authenticated. Personal authentication device includes: storage that stores first and second identification information for identifying a user; analysis unit that analyzes information inputted to a user and generates the first identification information; transmission unit that transmits a first acoustic signal to a part of a user's head; observation unit that observes a second acoustic signal; calculation unit that calculates acoustic characteristics from the first and the second acoustic signal; extraction unit that extracts an acoustic feature amount from the acoustic characteristics as second identification information; and determination unit that determines the user to be identical when first identification information registered and the first identification information generated coincide with each other and second identification information registered and the second identification information extracted coincide with each other.
Pairable secure-access facilities
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.