User authentication for devices with touch sensitive elements, such as touch sensitive display screens
First Claim
1. A computer-implemented method for authenticating a user, the method comprising:
- a) receiving, by a computer system, finger touch information via a touch sensitive element, the finger touch information including at least a time series of finger touch samples that define a trace of a signature, at least a portion of which includes a continuous touch gesture during which at least one fingertip is always in contact with the touch sensitive element;
b) determining, by the computer system, a similarity between the time series of finger touch samples of the received finger touch information and stored finger touch information including a time series of finger touch samples previously provided by the user; and
c) authenticating, by the computer system, the user using at least the determined similarity by1) receiving the stored finger touch information previously provided by the user,2) determining a location of the computer system,3) receiving a pass-fail threshold,4) adjusting the pass-fail threshold as a function of the determined location of the computer system,5) determining whether the similarity is above the adjusted pass-fail threshold; and
6) responsive to a determination that the similarity is above the adjusted pass-fail threshold, authenticating the user, and otherwise, responsive to a determination that the similarly is not above the adjusted pass-fail threshold, not authenticating the user.
1 Assignment
0 Petitions
Accused Products
Abstract
For user authentication, finger touch information from a user is accepted via a touch sensitive element, the finger touch information including at least a time series of finger touch samples that define a trace of the user'"'"'s signature, and each of the finger touch samples including centroid coordinates and non-centroid information, the non-centroid information including at least one of (A) a shape of the finger touch sample, (B) a size of the finger touch sample, (C) an orientation of the finger touch sample, and (D) characteristics of a multi-touch finger touch sample. A similarity of such finger touch samples with previously entered and stored finger touch samples is determined and compared with a threshold for purposes of user authentication.
-
Citations
20 Claims
-
1. A computer-implemented method for authenticating a user, the method comprising:
-
a) receiving, by a computer system, finger touch information via a touch sensitive element, the finger touch information including at least a time series of finger touch samples that define a trace of a signature, at least a portion of which includes a continuous touch gesture during which at least one fingertip is always in contact with the touch sensitive element; b) determining, by the computer system, a similarity between the time series of finger touch samples of the received finger touch information and stored finger touch information including a time series of finger touch samples previously provided by the user; and c) authenticating, by the computer system, the user using at least the determined similarity by 1) receiving the stored finger touch information previously provided by the user, 2) determining a location of the computer system, 3) receiving a pass-fail threshold, 4) adjusting the pass-fail threshold as a function of the determined location of the computer system, 5) determining whether the similarity is above the adjusted pass-fail threshold; and 6) responsive to a determination that the similarity is above the adjusted pass-fail threshold, authenticating the user, and otherwise, responsive to a determination that the similarly is not above the adjusted pass-fail threshold, not authenticating the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
8. Apparatus for authenticating a user, the apparatus comprising:
-
a) at least one processor; b) a touch sensitive element for receiving finger touch information; and c) at least one storage device storing program instructions which, when executed by the at least one processor, perform a method including 1) receiving finger touch information via the touch sensitive element , the finger touch information including at least a time series of finger touch samples that define a trace of a signature, at least a portion of which includes a continuous touch gesture during which at least one fingertip is always in contact with the touch sensitive element, 2) determining a similarity between the time series of finger touch samples of the received finger touch information and stored finger touch information including a time series of finger touch samples previously provided by the user, and 3) authenticating, by the computer system, the user using at least the determined similarity by A) receiving the stored finger touch information previously provided by the user, B) determining a location of the apparatus, C) receiving a pass-fail threshold, D) adjusting the pass-fail threshold as a function of the determined location of the apparatus, E) determining whether the similarity is above the adjusted pass-fail threshold; and F) responsive to a determination that the similarity is above the adjusted pass-fail threshold, authenticating the user, and otherwise, responsive to a determination that the similarly is not above the adjusted pass-fail threshold, not authenticating the user. - View Dependent Claims (9)
-
Specification