Methods and devices for secure authentication to a compute device
First Claim
1. An apparatus, comprising:
- a memory of a mobile compute device; and
a hardware processor of the mobile compute device, the hardware processor configured to implement an operating system and a native authentication application,the operating system configured to receive an authentication identifier, the operating system configured to authorize use of the mobile compute device based on the authentication identifier meeting a first criterion,the native authentication application configured to, in response to the operating system authorizing use of the mobile compute device, disable at least one function of the mobile compute device and transmit a request for a biometric authentication identifier,the native authentication application configured to receive the biometric authentication identifier via a biometric interface associated with the mobile compute device, the biometric authentication identifier including an indication of biometric information, the native authentication application configured to enable the at least one function in response to the biometric authentication identifier meeting a second criterion,a timeout time period associated with the operating system periodically requesting the authentication identifier is different from a timeout time period associated with the native authentication application periodically requesting the biometric authentication identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus includes a memory of a mobile compute device, and a hardware processor of the mobile compute device. The hardware processor is configured to implement an operating system and an authentication module. The operating system is configured to receive a first authentication identifier, and is also configured to authorize use of the mobile compute device based on the first authentication identifier meeting a first criterion. The authentication module is configured to, in response to the operating system authorizing use of the mobile compute device, disable at least one function of the mobile compute device and request a second authentication identifier. The authentication module is also configured to receive the second authentication identifier. The authentication module is also configured to enable the at least one function in response to the second authentication identifier meeting a second criterion.
-
Citations
19 Claims
-
1. An apparatus, comprising:
-
a memory of a mobile compute device; and a hardware processor of the mobile compute device, the hardware processor configured to implement an operating system and a native authentication application, the operating system configured to receive an authentication identifier, the operating system configured to authorize use of the mobile compute device based on the authentication identifier meeting a first criterion, the native authentication application configured to, in response to the operating system authorizing use of the mobile compute device, disable at least one function of the mobile compute device and transmit a request for a biometric authentication identifier, the native authentication application configured to receive the biometric authentication identifier via a biometric interface associated with the mobile compute device, the biometric authentication identifier including an indication of biometric information, the native authentication application configured to enable the at least one function in response to the biometric authentication identifier meeting a second criterion, a timeout time period associated with the operating system periodically requesting the authentication identifier is different from a timeout time period associated with the native authentication application periodically requesting the biometric authentication identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive, using a native application that is not part of an operating system on a mobile compute device, an indication that the operating system has authorized use of the mobile compute device; disable, at a first time and using the native application and in response to receiving the indication, at least one function of the mobile compute device; request a biometric authentication identifier from a biometric interface associated with the mobile compute device; receive, from the biometric interface and at a second time after the first time, the biometric authentication identifier; and enable the at least one function of the mobile compute device when the biometric authentication identifier meets a predetermined criterion. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, comprising:
-
disabling, via a native authentication application, at least one function of a mobile compute device; receiving, via the native authentication application, at a first time and in response to the disabling, a biometric authentication identifier; receiving via an operating system, at a second time after the first time, and based on the biometric authentication identifier meeting a first criterion, an authentication identifier, authorizing, via the operating system, use of the mobile compute device based on the authentication identifier meeting a second criterion; receiving, via the native authentication application, an indication from the operating system that the operating system has authorized use of the mobile compute device; and enabling, via the native authentication, the at least one function in response to the receiving the indication. - View Dependent Claims (19)
-
Specification