G06F21/83

Method and apparatus for authenticating a user of a computing device

A system for authenticating a user attempting to access a computing device or a software application executing thereon. A data storage device stores one or more digital images or frames of video of face(s) of authorized user(s) of the device. The system subsequently receives from a first video camera one or more digital images or frames of video of a face of the user attempting to access the device and compares the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device. To ensure the received video of the face of the user attempting to access the device is a real-time video of that user, and not a forgery, the system further receives a first photoplethysmogram (PPG) obtained from a first body part (e.g., a face) of the user attempting to access the device, receives a second PPG obtained from a second body part (e.g., a fingertip) of the user attempting to access the device, and compares the first PPG with the second PPG. The system authenticates the user attempting to access the device based on a successful comparison of (e.g., correlation between, consistency of) the first PPG and the second PPG and based on a successful comparison of the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device.

PRIVACY SHIELD DESIGN AND PLACEMENT IN AN INFORMATION HANDLING SYSTEM (IHS)
20230043837 · 2023-02-09 · ·

Embodiments of systems and methods for privacy shield design and placement in an Information Handling System (IHS) are described. In some embodiments, a privacy shield may include a film configured to emit light and a circular aperture in the film, such that the privacy shield is configured to be deployed in front of a lens of a camera coupled to an IHS.

PRIVACY SHIELD DESIGN AND PLACEMENT IN AN INFORMATION HANDLING SYSTEM (IHS)
20230043837 · 2023-02-09 · ·

Embodiments of systems and methods for privacy shield design and placement in an Information Handling System (IHS) are described. In some embodiments, a privacy shield may include a film configured to emit light and a circular aperture in the film, such that the privacy shield is configured to be deployed in front of a lens of a camera coupled to an IHS.

BYSTANDER-CENTRIC PRIVACY CONTROLS FOR RECORDING DEVICES
20230011087 · 2023-01-12 ·

A recording device provides bystander-centric privacy controls for authorizing the storage of a bystander's identifying information (e.g., video or audio recordings of the bystander). Before a recording device can store identifying information of bystanders, the bystanders may indicate to the recording device whether they authorize the storage. If the bystanders do not authorize the storage, the recording device may modify the identifying information captured by sensors, such as a video camera or a microphone, such that the identity of the non-authorizing bystander is not identifiable through the modified identifying information. Thus, bystanders are given increased agency over whether they want to be recorded. Further, if the bystanders do not want to be recorded, sensor data that may identify them is modified by the recording device to prevent unwanted exposure of their identity in recorded content.

Methods and apparatuses for defining authorization rules for peripheral devices based on peripheral device categorization

Method, apparatus and computer program product for detecting vulnerability in an industrial control system, predicting maintenance in an industrial control system, and defining authorization rules for peripheral devices based on peripheral device categorization are described herein.

CRYPTOGRAPHIC KEY EXCHANGE OVER AN ELECTROSTATIC CHANNEL
20180014186 · 2018-01-11 · ·

Various embodiments relating to exchanging a cryptographic key between a display device and an input device via electrostatic communication are disclosed. In one embodiment, an interactive communication device includes one or more electrodes and a radio transceiver. The one or more electrodes may be excited to capacitively couple with one or more electrodes of a proximate communication device so as to capacitively send a cryptographic key from the interactive communication device to the proximate communication device. The radio transceiver may be configured to communicate with a radio transceiver of the proximate communication device via a radio channel. The interactive communication device may be configured to subsequently exchange encrypted communications with the proximate communication device over the radio channel. The encrypted communications may be encrypted using the cryptographic key.

COMMUNICATION CONNECTION APPARATUS AND COMMUNICATION SYSTEM
20180012041 · 2018-01-11 ·

A communication connection apparatus controls connection of a communication line between a first and second communication devices comprising: a first connection port for the first communication device, including a first transmission unit through which a signal from the first communication device passes and a first reception unit through which a signal for the first communication device passes; a second connection port for the second communication device, including a second transmission unit through which a signal from the second communication device passes and a second reception unit through which a signal for the second communication device passes; a first connection line connecting the first transmission unit and the second reception unit; and a simulated-signal input unit that inputs a first signal to the first reception unit. On the first signal being input to the first reception unit, the first reception unit and the second transmission unit are physically disconnected.

COMMUNICATION CONNECTION APPARATUS AND COMMUNICATION SYSTEM
20180012041 · 2018-01-11 ·

A communication connection apparatus controls connection of a communication line between a first and second communication devices comprising: a first connection port for the first communication device, including a first transmission unit through which a signal from the first communication device passes and a first reception unit through which a signal for the first communication device passes; a second connection port for the second communication device, including a second transmission unit through which a signal from the second communication device passes and a second reception unit through which a signal for the second communication device passes; a first connection line connecting the first transmission unit and the second reception unit; and a simulated-signal input unit that inputs a first signal to the first reception unit. On the first signal being input to the first reception unit, the first reception unit and the second transmission unit are physically disconnected.

IRIS AUTHENTICATION METHOD AND DEVICE USING DISPLAY INFORMATION

An electronic device for performing iris authentication, according to various examples of the present invention, can comprise: an image sensor for outputting an image obtained by photographing an eye part; a display for displaying an iris authentication screen image; and a control unit detecting at least a partial region from the captured eye part image so as to perform iris authentication by adjusting display characteristics of the display on the basis of a result obtained by comparing the size of the detected region with the size of a region required for the iris authentication, and various examples are possible.

Hardware device for entering a pin via tapping on a touch screen display
11710126 · 2023-07-25 · ·

A device and associated methods for entering a PIN via tapping are disclosed. The device can be configured to determine a number of taps provided by a PIN holder on a touch sensor in representation of a PIN digit and to store the number of taps as a digit in a sequence that represents the PIN. Indications for interaction with the device can be provided to PIN holders in the form of auditory cues. A visually impaired PIN holder may be able to complete a PIN entry process by following the indications for interaction, tapping on a touch sensor a number of times equal to the value of the digit of the PIN to be entered, and performing gestures mapped to commands for the device.