Biometric control systems and associated methods of use
First Claim
1. A method for controlling an electronic system, the method comprising:
- receiving biometric input from a source to perform a desired function;
as a first condition to performing the desired function, analyzing the biometric input to determine the authenticity of the source;
when the source is determined to be authentic, determining if one or more second conditions to performing the desired function exist;
if one or more second conditions exist, verifying that the one or more second conditions are satisfied; and
if the one or more second conditions are satisfied, performing the desired function.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed herein for controlling various types of electronic systems with biometric input and/or other types of input. A method for controlling an electronic system in accordance with one embodiment of the invention includes receiving biometric input from a source to perform a desired function. As a first condition to performing the desired function, the method includes analyzing the biometric input to determine the authenticity of the source. When the source is determined to be authentic, the method further includes determining if one or more second conditions to performing the desired function exist. If one or more second conditions do exist, then the method includes verifying that the one or more second conditions are satisfied and, if the one or more second conditions are satisfied, performing the desired function.
-
Citations
26 Claims
-
1. A method for controlling an electronic system, the method comprising:
-
receiving biometric input from a source to perform a desired function;
as a first condition to performing the desired function, analyzing the biometric input to determine the authenticity of the source;
when the source is determined to be authentic, determining if one or more second conditions to performing the desired function exist;
if one or more second conditions exist, verifying that the one or more second conditions are satisfied; and
if the one or more second conditions are satisfied, performing the desired function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for controlling an electronic system, the method comprising:
-
receiving biometric input from a source for performing a first function;
analyzing the biometric input to determine the authenticity of the source; and
when the source is determined to be authentic;
performing the first function; and
performing a second function separate from the first function. - View Dependent Claims (10, 11, 12)
-
-
13. A method for monitoring the location of a first device associated with a first person, the method comprising:
-
receiving, in the first device, positional information about the location of the first device;
determining, based on the positional information, whether the first device is within a preset boundary;
when the first device is not within the preset boundary, initiating contact between the first device and a second device;
in response to the initiated contact, receiving, in the second device, biometric input from a second person;
analyzing the biometric input to determine the authenticity of the second person; and
when the second person is determined to be authentic, providing information to the second person relating to the location of the first device. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method for automatically controlling a window system, the method comprising:
-
receiving biometric input from a user, the biometric input being associated with a requested window function;
analyzing the biometric input to determine the authenticity of the user; and
when the user is determined to be authentic, performing the requested window function. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A computer-readable medium including instructions configured to cause a computer to perform a method, the method comprising:
-
receiving biometric input from a person;
analyzing the biometric input to determine the authenticity of the person;
when the person is determined to be authentic, receiving information from a separate device; and
causing an electronic system to perform a desired function based on the determined authenticity of the person and the information from the separate device. - View Dependent Claims (24, 25, 26)
-
Specification