CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE
First Claim
1. At least one machine-readable medium comprising instructions that when executed by a machine, cause the machine to perform operations comprising:
- receiving a first biometric input of a first type;
performing a first analysis of the first input to determine if the person attempting to use the device is authorized to use the a first level of functionality in the device based on the first analysis;
receiving a second biometric input of a second type different than the first type, wherein the second input is initiated via at least one of manual triggering by the person, automatic triggering by the device upon passing of a predetermined amount of time after the first input has been received, and monitoring of the person by the device via a secondary device;
performing a second analysis of the second biometric input; and
granting access to one or more levels of functionalities associated with the device, wherein the access is granted based on a stage of authorization as determined from the first and second analysis, wherein the state of authorization indicates a level of difficulty in spoofing a security system relating to the device.
0 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device'"'"'s functionality.
-
Citations
21 Claims
-
1. At least one machine-readable medium comprising instructions that when executed by a machine, cause the machine to perform operations comprising:
-
receiving a first biometric input of a first type; performing a first analysis of the first input to determine if the person attempting to use the device is authorized to use the a first level of functionality in the device based on the first analysis; receiving a second biometric input of a second type different than the first type, wherein the second input is initiated via at least one of manual triggering by the person, automatic triggering by the device upon passing of a predetermined amount of time after the first input has been received, and monitoring of the person by the device via a secondary device; performing a second analysis of the second biometric input; and granting access to one or more levels of functionalities associated with the device, wherein the access is granted based on a stage of authorization as determined from the first and second analysis, wherein the state of authorization indicates a level of difficulty in spoofing a security system relating to the device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
an electronic device comprising a processor, a memory, and a camera, the device to determine whether a person attempting to use the device is authorized to use the device, wherein the device is to; receive a first biometric input of a first type; perform a first analysis of the first input to determine if the person attempting to use the device is authorized to use the a first level of functionality in the device based on the first analysis; receive a second biometric input of a second type different than the first type, wherein the second input is initiated via at least one of manual triggering by the person, automatic triggering by the device upon passing of a predetermined amount of time after the first input has been received, and monitoring of the person by the device via a secondary device; perform a second analysis of the second biometric input; and grant access to one or more levels of functionalities associated with the device, wherein the access is granted based on a stage of authorization as determined from the first and second analysis, wherein the state of authorization indicates a level of difficulty in spoofing a security system relating to the device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving a first biometric input of a first type; performing a first analysis of the first input to determine if the person attempting to use the device is authorized to use the a first level of functionality in the device based on the first analysis; receiving a second biometric input of a second type different than the first type, wherein the second input is initiated via at least one of manual triggering by the person, automatic triggering by the device upon passing of a predetermined amount of time after the first input has been received, and monitoring of the person by the device via a secondary device; performing a second analysis of the second biometric input; and granting access to one or more levels of functionalities associated with the device, wherein the access is granted based on a stage of authorization as determined from the first and second analysis, wherein the state of authorization indicates a level of difficulty in spoofing a security system relating to the device. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification