Utilizing inputs for accessing devices
First Claim
1. An access control method comprising:
- receiving a first input via a first input interface to determine whether the first input includes valid first authentication data, invalid authentication data, or duress authentication data;
determining that the first input includes the valid first authentication data and, in response to that determination, determining whether the first input also includes the duress authentication data;
in response to determining that the first input includes the valid first authentication data and the duress authentication data, disabling the first input interface and receiving a second input via a second input interface;
determining that the second input includes valid second authentication data; and
in response to determining that the second input includes valid second authentication data, allowing access.
3 Assignments
0 Petitions
Accused Products
Abstract
Devices and methods of access control are provided. A device includes a processor, an input interface coupled to the processor, and a memory coupled to the processor. The device may be configured to receive a first input via a first input interface and determine whether the first input includes valid first authentication data, invalid authentication data, or duress authentication data. Based on the determination, if the first input includes valid authentication data, allow access. If the first input includes invalid authentication data, disallow access. If the first input includes duress authentication data, allow access when a second input received via a second input interface includes valid second authentication data. Example inputs include iris scan input, retinal scan input, fingerprint scan input, handprint input, palm print input, facial recognition input, alphanumeric input, touchscreen gesture input, breathalyzer sample input, facial or hand gesture input, or voice input, among others.
35 Citations
20 Claims
-
1. An access control method comprising:
-
receiving a first input via a first input interface to determine whether the first input includes valid first authentication data, invalid authentication data, or duress authentication data; determining that the first input includes the valid first authentication data and, in response to that determination, determining whether the first input also includes the duress authentication data; in response to determining that the first input includes the valid first authentication data and the duress authentication data, disabling the first input interface and receiving a second input via a second input interface; determining that the second input includes valid second authentication data; and in response to determining that the second input includes valid second authentication data, allowing access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An electronic device comprising:
-
a processor; an input interface including a first input interface and a second input interface coupled to the processor to receive input; and a memory coupled to the processor and storing processor-readable instructions that, when executed, cause the processor to; receive a first input via the first input interface to determine whether the first input includes valid first authentication data, invalid authentication data, or duress authentication data; determine that the first input includes the valid first authentication data and, in response to that determination, determine whether the first input also includes the duress authentication data; in response to determining that the first input includes the valid first authentication data and the duress authentication data, disable the first input interface and receive a second input via the second input interface; determine that the second input includes valid second authentication data; and in response to determining that the second input includes valid second authentication data, allow access. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium comprising processor-executable instructions which, when executed, configure a processor to:
-
receive a first input via a first input interface to determine whether the first input includes valid first authentication data, invalid authentication data, or duress authentication data; determine that the first input includes the valid first authentication data and, in response to that determination, determine whether the first input also includes the duress authentication data; in response to determining that the first input includes the valid first authentication data and the duress authentication data, disable the first input interface and receive a second input via a second input interface; determine that the second input includes valid second authentication data; and in response to determining that the second input includes valid second authentication data, allow access.
-
Specification