Handheld computer system configured to authenticate a user and power-up in response to a single action by the user
First Claim
Patent Images
1. A method of permitting access to a device, said method comprising:
- receiving, at said device being in a low power mode, a user initiated physical contact with said device;
in response to said user initiated physical contact, processing said user initiated physical contact to authenticate said user;
in response to said processing, causing said device to enter a higher power mode relative to said low power mode if said user is successfully authenticated, and preventing entering of said higher power mode if authentication of said user fails, and wherein said higher power mode provides greater access rights to said device; and
shutting down said device if authentication of said user fails a number of consecutive times.
9 Assignments
0 Petitions
Accused Products
Abstract
A computer system configured to authenticate a user and to power-up in response to a single action by the user is described. In particular, the computer system includes a user verification device which interacts with the user. In an embodiment, the user verification device includes a biometric sensor which captures biometric data from the user. The biometric data can be of any type. The user verification device is configured to capture biometric data in response to an action by the user desiring access to the computer system. The user verification device can have a button-shape for receiving the finger, thumb, or any other part of the user.
17 Citations
20 Claims
-
1. A method of permitting access to a device, said method comprising:
-
receiving, at said device being in a low power mode, a user initiated physical contact with said device; in response to said user initiated physical contact, processing said user initiated physical contact to authenticate said user; in response to said processing, causing said device to enter a higher power mode relative to said low power mode if said user is successfully authenticated, and preventing entering of said higher power mode if authentication of said user fails, and wherein said higher power mode provides greater access rights to said device; and shutting down said device if authentication of said user fails a number of consecutive times. - View Dependent Claims (2, 3, 4, 5, 6, 19, 20)
-
-
7. A method of permitting access to a device, said method comprising:
-
receiving, at said device in a low power mode with limited device accessibility, a user initiated physical contact with said device; in response to said receiving, processing said user initiated physical contact to authenticate said user; and responsive to said processing, causing said device to enter a higher power mode relative to said low power mode with greater device accessibility if said user is successfully authenticated, and preventing entering of said higher power mode if authentication of said user fails; and shutting down said device if authentication of said user fails a number of consecutive times. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A device comprising:
-
a user verification device adapted to respond to a user initiated physical contact with said device; and a processor coupled to said user verification device, wherein said processor is adapted to process said user initiated physical contact, and wherein said processor is adapted to move said device from a low power state to a higher power state if said user is successfully authenticated, and preventing entering of said higher power mode if authentication of said user fails, and wherein said higher power state corresponds to greater access rights to said device than said low power state, and wherein said processor is adapted to shut down said device if authentication of said user fails a number of consecutive times. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification