GAIT-BASED AUTHENTICATION SYSTEM
First Claim
1. A method for determining if a user of a device is an authenticated user, said device having a plurality of sensors for biometric data, the method comprising:
- a) selecting two of said plurality of sensorsb) gathering data from each sensor selected in step a)c) correlating data gathered from said two sensors such that data points gathered at similar instances are matched with one another to result in data pairsd) determining at least one characteristic loop from said data pairs, each characteristic loop being a loop formed when said data point pairs are plottede) retrieving signature characteristic data, said signature characteristic data being derived from data resulting from biometric data from said authenticated userf) determining a signature characteristic loop from said signature characteristic datag) comparing characteristics of said at least one characteristic loop determined in step d) with characteristics of said signature characteristic loop determined in step f)h) in the event a comparison of said characteristics compared in step g) produces results not within predetermined limits, determining that said user is not said authenticated useri) in the event a comparison of said characteristics compared in step g) produces results within predetermined limits, determining that said user is said authenticated user.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating users based on their gait. A sensor module with multiple sensors is placed inside a user'"'"'s shoe and biometric data is gathered from the sensors when the user takes a step. The data gathered from each of the sensors is then received by a data processing module. The data is processed and compared with a stored signature from an authenticated user. If the processed data does not match the stored signature within predetermined limits, then the user using the system is not authenticated. An alarm may then be generated. If, on the other hand, there is a match, the user is authenticated and this authenticated result can be used to give the user access to restricted resources.
-
Citations
17 Claims
-
1. A method for determining if a user of a device is an authenticated user, said device having a plurality of sensors for biometric data, the method comprising:
-
a) selecting two of said plurality of sensors b) gathering data from each sensor selected in step a) c) correlating data gathered from said two sensors such that data points gathered at similar instances are matched with one another to result in data pairs d) determining at least one characteristic loop from said data pairs, each characteristic loop being a loop formed when said data point pairs are plotted e) retrieving signature characteristic data, said signature characteristic data being derived from data resulting from biometric data from said authenticated user f) determining a signature characteristic loop from said signature characteristic data g) comparing characteristics of said at least one characteristic loop determined in step d) with characteristics of said signature characteristic loop determined in step f) h) in the event a comparison of said characteristics compared in step g) produces results not within predetermined limits, determining that said user is not said authenticated user i) in the event a comparison of said characteristics compared in step g) produces results within predetermined limits, determining that said user is said authenticated user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 16)
-
-
8. A system for authenticating a user of said system, the system comprising:
-
a sensor module comprising at least one sensor for gathering gait-based biometric data from said user a data storage module for storing data relating to a signature loop, said signature loop being a loop resulting from a plot of data pairs derived from data gathered from said sensor module when an authenticated user used said system a data processing module for receiving data from said sensor module, said data processing module being for determining characteristic loops from said data received from said sensor module and for comparing characteristics of said characteristic loops with characteristics of said signature loop wherein said user is authenticated when said characteristics of said characteristic loops are within predetermined limits of said characteristics of said signature loops. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 17)
-
Specification