Embedded authentication systems in an electronic device
First Claim
1. A method for authenticating a user of an electronic device, comprising:
- while access to one or more resources of the electronic device is restricted;
displaying a plurality of shapes on a display of the electronic device;
receiving a user selection that includes detecting a plurality of inputs selecting a subset of the plurality of shapes displayed on the display of the electronic device;
while receiving the user selection, detecting time delays between consecutive inputs in the plurality of inputs;
after receiving the user selection, determining whether the selected subset of the plurality of shapes meet visual pattern criteria based on which shapes in the plurality of shapes were selected and whether the user selection meets temporal pattern criteria based on one or more time delays between inputs in the plurality of inputs; and
in response to the determining;
in accordance with a determination that the user selection meets the visual pattern criteria and the temporal pattern criteria, providing access to the one or more restricted resources; and
in accordance with a determination that the user selection does not meet both the visual pattern criteria and the temporal pattern criteria, forgoing providing access to the one or more restricted resources.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
258 Citations
21 Claims
-
1. A method for authenticating a user of an electronic device, comprising:
-
while access to one or more resources of the electronic device is restricted; displaying a plurality of shapes on a display of the electronic device; receiving a user selection that includes detecting a plurality of inputs selecting a subset of the plurality of shapes displayed on the display of the electronic device; while receiving the user selection, detecting time delays between consecutive inputs in the plurality of inputs; after receiving the user selection, determining whether the selected subset of the plurality of shapes meet visual pattern criteria based on which shapes in the plurality of shapes were selected and whether the user selection meets temporal pattern criteria based on one or more time delays between inputs in the plurality of inputs; and in response to the determining; in accordance with a determination that the user selection meets the visual pattern criteria and the temporal pattern criteria, providing access to the one or more restricted resources; and in accordance with a determination that the user selection does not meet both the visual pattern criteria and the temporal pattern criteria, forgoing providing access to the one or more restricted resources. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic device, comprising:
-
a touch-sensitive display; one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; while access to one or more resources of the electronic device is restricted; displaying a plurality of shapes on the display of the electronic device; receiving a user selection that includes detecting a plurality of inputs selecting a subset of the plurality of shapes displayed on the display of the electronic device; while receiving the user selection, detecting time delays between consecutive inputs in the plurality of inputs; after receiving the user selection, determining whether the selected subset of the plurality of shapes meet visual pattern criteria based on which shapes in the plurality of shapes were selected and whether the user selection meets temporal pattern criteria based on one or more time delays between inputs in the plurality of inputs; and in response to the determining; in accordance with a determination that the user selection meets the visual pattern criteria and the temporal pattern criteria, providing access to the one or more restricted resources; and in accordance with a determination that the user selection does not meet both the visual pattern criteria and the temporal pattern criteria, forgoing providing access to the one or more restricted resources. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a touch-sensitive display, cause the device to:
-
while access to one or more resources of the electronic device is restricted; display a plurality of shapes on a display of the electronic device; receive a user selection that includes detecting a plurality of inputs selecting a first subset of the plurality of shapes displayed on the display of the electronic device; after receiving the user selection, determine meet visual pattern criteria based on which shapes in the plurality of shapes were selected and whether the user selection meets temporal pattern criteria based on one or more time delays between inputs in the plurality of inputs; and in response to the determining; in accordance with a determination that the user selection meets the visual pattern criteria and the temporal pattern criteria, provide access to the one or more restricted resources; and in accordance with a determination that the user selection does not meet both the visual pattern criteria and the temporal pattern criteria, forgo providing access to the one or more restricted resources. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification