Gesture-based signature authentication
First Claim
Patent Images
1. A mobile device comprising:
- a system on chip (SoC) including a first core and a second core and further including a hardware logic separate from the first core and the second core, and a graphics processor;
a plurality of input devices; and
a storage coupled to the SoC, the storage to store a set of instructions which, if executed by the hardware logic, causes the hardware logic to perform a method comprising;
capturing a first biometric-based input of a user obtained from one or more of the plurality of input devices;
generating a first representation using the first biometric-based input;
storing the first representation in a storage location, the storage location secured by at least one key;
capturing a second biometric-based input of the user obtained from the one or more of the plurality of input devices;
generating a second representation using the second biometric-based input;
comparing the first representation with the second representation;
authenticating the user in response to the first representation matching the second representation; and
after authenticating the user in response to the first representation matching the second representation, automatically entering a password into a password field to gain access to a website accessible by the user with the password, the password stored in another storage location and obtained during a registration.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention are generally directed to systems, methods, devices, and machine-readable mediums for implementing gesture-based signature authentication. In one embodiment, a method may involve recording a first gesture-based signature and storing the recorded first gesture-based signature. Then the method compares the first gesture-based signature with a second gesture-based signature. Then the method verifies the first gesture-based signature as authentic when the first gesture-based signature is substantially similar to the second gesture-based signature.
-
Citations
19 Claims
-
1. A mobile device comprising:
-
a system on chip (SoC) including a first core and a second core and further including a hardware logic separate from the first core and the second core, and a graphics processor; a plurality of input devices; and a storage coupled to the SoC, the storage to store a set of instructions which, if executed by the hardware logic, causes the hardware logic to perform a method comprising; capturing a first biometric-based input of a user obtained from one or more of the plurality of input devices; generating a first representation using the first biometric-based input; storing the first representation in a storage location, the storage location secured by at least one key; capturing a second biometric-based input of the user obtained from the one or more of the plurality of input devices; generating a second representation using the second biometric-based input; comparing the first representation with the second representation; authenticating the user in response to the first representation matching the second representation; and after authenticating the user in response to the first representation matching the second representation, automatically entering a password into a password field to gain access to a website accessible by the user with the password, the password stored in another storage location and obtained during a registration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A mobile device comprising:
-
a system on chip (SoC) including a first core and a second core and further including a hardware logic separate from the first core and the second core, and a graphics processor; a plurality of input devices; and a storage coupled to the SoC, the storage to store a set of instructions which, if executed by the hardware logic, causes the hardware logic to perform a method comprising; capturing a first glyph-based input of a user obtained from one or more of the plurality of input devices; generating a first representation using the first glyph-based input; storing the first representation in a storage location, the storage location secured by at least one key; capturing a second glyph-based input of the user obtained from the one or more of the plurality of input devices; generating a second representation using the second glyph-based input; comparing the first representation with the second representation; authenticating the user in response to the first representation matching the second representation; and after authenticating the user in response to the first representation matching the second representation, automatically entering a password into a password field to gain access to a website accessible by the user with the password, the password stored in another storage location and obtained during a registration. - View Dependent Claims (13, 14, 15)
-
-
16. A mobile device comprising:
-
a processor including a first core and a second core and further including a hardware logic separate from the first core and the second core, and a graphics processor; a plurality of input devices; and a storage coupled to the processor, the storage to store a set of instructions which, if executed by the hardware logic, causes the hardware logic to perform a method comprising; capturing a first gesture-based input of a user obtained from one or more of the plurality of input devices; generating a first representation using the first gesture-based input; storing the first representation in a storage location, the storage location secured by at least one key; capturing a second gesture-based input of the user obtained from the one or more of the plurality of input devices; generating a second representation using the second gesture-based input; comparing the first representation with the second representation; authenticating the user in response to the first representation matching the second representation; and after authenticating the user in response to the first representation matching the second representation, automatically entering a password into a password field to gain access to a website accessible by the user with the password, the password stored in another storage location and obtained during a registration. - View Dependent Claims (17, 18, 19)
-
Specification