USER AUTHENTICATION AND DATA ENCRYPTION
First Claim
Patent Images
1. ) A method comprising:
- sensing, by the processor, a target of at least one user interacting with a touchscreen of a mobile device;
receiving, by a processor via the touchscreen, interaction data of the target to authorize the user for executing a function with the mobile device;
extracting, by the processor, key frames from the received interaction data;
determining, by the processor, feature data of the target from the extracted key frames;
determining, by the processor, the target from the feature data;
comparing, by the processor, the feature data of the target with pre-stored user information;
identifying upon the comparison, by the processor, the user based on a match between the feature data and at least a portion of the pre-stored user information;
authorizing, by the processor, the user for the function if the user is identified based on the match; and
blocking, by the processor, the user from executing the function if there is no match between the feature data and at least a portion of the pre-stored user information.
9 Assignments
0 Petitions
Accused Products
Abstract
A user is authenticated based on feature data of a target such as a body-part or other object obtained by a touchscreen of a computing device. When the user positions the target to interact with the touchscreen, interaction data is gathered. Feature data of the target is determined from the gathered interaction data. The feature data is used to identify one or more of the target and the user. Various actions are executed based on the identification and authentication of the user.
54 Citations
42 Claims
-
1. ) A method comprising:
-
sensing, by the processor, a target of at least one user interacting with a touchscreen of a mobile device; receiving, by a processor via the touchscreen, interaction data of the target to authorize the user for executing a function with the mobile device; extracting, by the processor, key frames from the received interaction data; determining, by the processor, feature data of the target from the extracted key frames; determining, by the processor, the target from the feature data; comparing, by the processor, the feature data of the target with pre-stored user information; identifying upon the comparison, by the processor, the user based on a match between the feature data and at least a portion of the pre-stored user information; authorizing, by the processor, the user for the function if the user is identified based on the match; and blocking, by the processor, the user from executing the function if there is no match between the feature data and at least a portion of the pre-stored user information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. ) An apparatus comprising:
-
a processor; a touchscreen; and a non-transitory processor readable storage medium having stored thereon programming logic, the programming logic comprising; sensing logic, executed by the processor, for sensing a target of at least one user interacting with the touchscreen; receiving logic, executed by the processor for receiving via the touchscreen, interaction data of the target to authorize the user for executing a function with the apparatus; extracting logic, executed by the processor, for extracting key frames from the received interaction data; determining logic, executed by the processor, for determining feature data of the target from the extracted key frames; target determining logic, executed by the processor, for determining the target associated with the feature data from the extracted key frames; comparing logic, executed by the processor, for comparing the feature data of the target with pre-stored user information; user identifying logic, executed by the processor, for identifying the user based on a match between the feature data and at least a portion of the pre-stored user information; authorizing logic, executed by the processor, for authorizing the user for the function if the user is identified; and blocking logic, executed by the processor, for blocking the user from executing the function if there is no match between the feature data and at least a portion of the pre-stored user information. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. ) A non-transitory computer readable storage medium, comprising processor-executable instructions for:
-
sensing a target of at least one user interacting with a touchscreen of a mobile device; receiving via the touchscreen, interaction data of the target to authorize the user for executing a function with the mobile device; extracting key frames from the received interaction data; determining feature data of the target from the extracted key frames; determining the target associated with the feature data from the extracted key frames; comparing the feature data of the target with pre-stored user information; identifying upon the comparison, the user based on a match between the feature data and at least a portion of the pre-stored user information; authorizing the user for the function if the user is identified based the match; and blocking the user from executing the function if there is no match between the feature data and at least a portion of the pre-stored user information.
-
-
26. ) A method comprising:
-
receiving, by a processor at a device comprising a touchscreen, a document encrypted with feature data of at least one target comprising a first target; receiving, by the processor, a request to open the document; obtaining, by the processor via the touchscreen, feature data of the first target interacting with the touchscreen; providing, by the processor, the feature data of the first target to an application for opening the document; and employing, by the processor, the feature data of the first target to decrypt the document. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. ) An apparatus comprising:
-
a processor; a touchscreen; a processor-readable non-transitory storage medium comprising programming logic, the programming logic comprising; document receiving logic, executed by a processor, for receiving a document encrypted with feature data of at least one target comprising the first target; request receiving logic, executed by a processor, for receiving a request to open the document; obtaining logic, executed by a processor, for obtaining via the touchscreen, interaction data of the first target interacting with the touchscreen; determining logic, executed by the processor, for determining feature data of the first target from the interaction data; providing logic, executed by a processor, for providing the feature data of the first target to an application for opening the document; employing logic, executed by a processor, for employing the feature data of the first target to decrypt the document. - View Dependent Claims (33, 34, 35)
-
-
36. ) A method comprising:
-
receiving, by a processor comprised in a first computing device, user input to connect to at least one disparate second computing device via a communication network; connecting, by the processor, the first computing device with the second computing device through the communication network; determining, by the processor via a touchscreen of the first computing device, feature data of a target interacting with the touchscreen; determining, by the processor, based on the feature data of the target if an information exchange is authorized between the first computing device and the second computing device; receiving, by the processor, a user gesture for initiating the information exchange; and exchanging, by the processor upon receiving the user gesture, the information if it is determined that the information exchange is authorized based on the feature data. - View Dependent Claims (37, 38, 39)
-
-
40. ) An apparatus comprising:
-
a touchscreen; a processor; a processor-readable non-transitory storage medium comprising programming logic, the programming logic comprising; input receiving logic, executed by the processor, for receiving user input to connect to a second computing device via a communication network; connecting logic, executed by the processor, for connecting with the second computing device through the communication network; feature determining logic, executed by the processor, for determining via the touchscreen, feature data of a target interacting with the touchscreen; authorization determining logic, executed by the processor, for determining based on the feature data of the target if an information exchange is authorized between the first computing device and the second computing device; gesture receiving logic, executed by the processor, for receiving a user gesture for initiating the information exchange; and exchanging logic, executed by the processor, for exchanging upon receiving the user gesture, the information if it is determined that the information exchange is authorized based on the feature data.
-
-
41. ) The apparatus of claim 41, wherein exchanging logic further comprises:
transmitting logic, executed by the processor, for transmitting to the second computing device, a document encrypted with the biometric information of the user'"'"'s body part.
-
42. ) A non-transitory computer readable storage medium, comprising processor-executable instructions for:
-
receiving user input to connect to a computing device via a communication network; connecting to the computing device through the communication network; determining, via a touchscreen, feature data of a target interacting with the touchscreen; determining, based on the feature data of the target if an information exchange is authorized between the first computing device and the second computing device; receiving, a user gesture for initiating the information exchange; and exchanging, upon receiving the user gesture, the information if it is determined that the information exchange is authorized based on the feature data.
-
Specification