CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE
First Claim
Patent Images
1. An apparatus, comprising:
- an electronic device comprising a processor, a memory, and a camera, the device to determine whether a person attempting to use the device is authorized to use the device, wherein the device is to;
receive a first input of a first type;
perform a first analysis of the first input to determine if the person attempting to use the device is authorized to use the a first level of functionality in the device based on the first analysis;
receive a second input of a second type different than the first type; and
if the person is authorized to use the first level of functionality based on the first analysis, then perform a second analysis of the second input to determine whether the person is authorized to use the second level of functionality based on the second analysis.
0 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device'"'"'s functionality.
18 Citations
15 Claims
-
1. An apparatus, comprising:
-
an electronic device comprising a processor, a memory, and a camera, the device to determine whether a person attempting to use the device is authorized to use the device, wherein the device is to; receive a first input of a first type; perform a first analysis of the first input to determine if the person attempting to use the device is authorized to use the a first level of functionality in the device based on the first analysis; receive a second input of a second type different than the first type; and if the person is authorized to use the first level of functionality based on the first analysis, then perform a second analysis of the second input to determine whether the person is authorized to use the second level of functionality based on the second analysis. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising
performing operations in an electronic device, the operations comprising: receiving a first input of a first type; performing a first analysis of the first input to determine if the person attempting to use the device is authorized to use the device based on the first analysis; receiving a second input of a second type different than the first type; and if the person is authorized to use the device based on the first analysis, then performing a second analysis of the second input to verify whether the person is authorized to use the device based on the second analysis. - View Dependent Claims (7, 8, 9, 10)
-
11. A tangible computer-readable medium that contains instructions, which when
executed by one or more processors result in performing operations comprising: -
receiving a first input of a first type; performing a first analysis of the first input to determine if the person attempting to use the device is authorized to use the device based on the first analysis; receiving a second input of a second type different than the first type; and if the person is authorized to use the device based on the first analysis, then performing a second analysis of the second input to verify whether the person is authorized to use the device based on the second analysis. - View Dependent Claims (12, 13, 14, 15)
-
Specification