Drone authentication system
First Claim
1. A method of authentication, the method comprising:
- monitoring a monitored space for a condition to provide an interaction between a drone and an individual;
obtaining, by the drone and in response to the condition to provide the interaction between the drone and the individual being satisfied, a first set of sensor data corresponding to the individual;
determining the individual requires a service, based on the first set of sensor data, that requires authentication of the individual as a user of the service and, in response, determining, based on the first set of sensor data, that the individual is unable to provide a primary authentication response;
obtaining, by the drone, a second set of sensor data corresponding to the individual unable to provide the primary authentication response; and
determining, based on the second set of sensor data and stored identity data, that the individual is a user of the service and, in response, performing the service.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating a user include monitoring a monitored space for a condition to provide an interaction between a drone and an individual. In response to the condition to provide the interaction between the drone and the individual being satisfied, the drone may obtain a first set of sensor data corresponding to the individual. The first set of sensor data may indicate that the individual requires a service that requires authentication of the individual as a user of the service and that the individual is unable to provide a primary authentication response. The drone may then obtain a second set of sensor data corresponding to the individual unable to provide the primary authentication response. The drone authentication system then determines, based on the second set of sensor data and identity data that the individual corresponds to identity data of a user of the service and performs the service.
-
Citations
20 Claims
-
1. A method of authentication, the method comprising:
-
monitoring a monitored space for a condition to provide an interaction between a drone and an individual; obtaining, by the drone and in response to the condition to provide the interaction between the drone and the individual being satisfied, a first set of sensor data corresponding to the individual; determining the individual requires a service, based on the first set of sensor data, that requires authentication of the individual as a user of the service and, in response, determining, based on the first set of sensor data, that the individual is unable to provide a primary authentication response; obtaining, by the drone, a second set of sensor data corresponding to the individual unable to provide the primary authentication response; and determining, based on the second set of sensor data and stored identity data, that the individual is a user of the service and, in response, performing the service. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An authentication system for use in a monitored space comprising:
-
a plurality of sensors, wherein the plurality of sensors includes at least an imaging sensor; and a drone that includes; at least one communications interface; at least one non-transitory memory storing identity data associated with one or more users; one or more processors coupled to the plurality of sensors, communications interface, and non-transitory memory and configured to execute instructions to cause the authentication system to; monitor a monitored space for a condition to provide an interaction between a drone and an individual; obtain, in response to the condition to provide the interaction between the drone and the individual being satisfied, a first set of sensor data corresponding to the individual; determine the individual requires a service based on the first set of sensor data that requires authentication of the individual as a user of the service and, in response, determine, based on the first set of sensor data, that the individual is unable to provide a primary authentication response; obtain, by the drone, a second set of sensor data corresponding to the individual unable to provide the primary authentication response; and determine, based on the second set of sensor data and stored identity data, that the individual is a user of the service and, in response, perform the service. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
monitoring a monitored space for a condition to provide an interaction between a drone and an individual; obtaining, by the drone and in response to the condition to provide the interaction between the drone and the individual being satisfied, a first set of sensor data corresponding to the individual; determining the individual requires a service based on the first set of sensor data that requires authentication of the individual as a user of the service and, in response, determining, based on the first set of sensor data, that the individual is unable to provide a primary authentication response; obtaining, by the drone, a second set of sensor data corresponding to the individual unable to provide the primary authentication response; and determining, based on the second set of sensor data and stored identity data, that the individual is a user of the service and, in response, performing the service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification