Embedded authentication systems in an electronic device
First Claim
1. An electronic device, comprising:
- a display;
a fingerprint sensor;
one or more processors;
memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for;
displaying a first user interface on the display;
while displaying the first user interface on the display, receiving a request to access resources of a first type from a respective user, wherein;
the device includes resources of the first type;
a first subset of resources of the first type are associated with a first user;
the first subset of resources of the first type are secured by an authentication system;
a second subset of resources of the first type are associated with a second user;
the second subset of resources of the first type are secured by the authentication system;
the first user and the second user are members of a predefined group; and
the predefined group has access to one or more group resources; and
in response to receiving the request to access resources of the first type;
in accordance with a determination that the respective user has been authenticated with the authentication system as the first user, providing access to a first plurality of resources of the first type of resources, including the first subset of resources and the group resources;
in accordance with a determination that the respective user has not been authenticated with the authentication system as the first user, providing access to a second plurality of resources of the first type that does not include the first subset of resources;
in accordance with a determination that the respective user has been authenticated with the authentication system as the second user, providing access to a third plurality of resources of the first type of resources, including the second subset of resources and the group resources; and
in accordance with a determination that the respective user has not been authenticated with the authentication system as the second user, providing access to a plurality of resources of the first type that does not include the second subset of resources,wherein the second user does not have access to the first subset of resources; and
the first user does not have access to the second subset of resources.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
-
Citations
36 Claims
-
1. An electronic device, comprising:
-
a display; a fingerprint sensor; one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; displaying a first user interface on the display; while displaying the first user interface on the display, receiving a request to access resources of a first type from a respective user, wherein; the device includes resources of the first type; a first subset of resources of the first type are associated with a first user; the first subset of resources of the first type are secured by an authentication system; a second subset of resources of the first type are associated with a second user; the second subset of resources of the first type are secured by the authentication system; the first user and the second user are members of a predefined group; and the predefined group has access to one or more group resources; and in response to receiving the request to access resources of the first type; in accordance with a determination that the respective user has been authenticated with the authentication system as the first user, providing access to a first plurality of resources of the first type of resources, including the first subset of resources and the group resources; in accordance with a determination that the respective user has not been authenticated with the authentication system as the first user, providing access to a second plurality of resources of the first type that does not include the first subset of resources; in accordance with a determination that the respective user has been authenticated with the authentication system as the second user, providing access to a third plurality of resources of the first type of resources, including the second subset of resources and the group resources; and in accordance with a determination that the respective user has not been authenticated with the authentication system as the second user, providing access to a plurality of resources of the first type that does not include the second subset of resources, wherein the second user does not have access to the first subset of resources; and
the first user does not have access to the second subset of resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
at an electronic device with a fingerprint sensor and a display; displaying a first user interface on the display; while displaying the first user interface on the display, receiving a request to access resources of a first type from a respective user, wherein; the device includes resources of the first type; a first subset of resources of the first type are associated with a first user; the first subset of resources of the first type are secured by an authentication system; a second subset of resources of the first type are associated with a second user; the second subset of resources of the first type are secured by the authentication system; the first user and the second user are members of a predefined group; and the predefined group has access to one or more group resources; and in response to receiving the request to access resources of the first type; in accordance with a determination that the respective user has been authenticated with the authentication system as the first user, providing access to a first plurality of resources of the first type of resources, including the first subset of resources and the group resources; in accordance with a determination that the respective user has not been authenticated with the authentication system as the first user, providing access to a second plurality of resources of the first type that does not include the first subset of resources; in accordance with a determination that the respective user has been authenticated with the authentication system as the second user, providing access to a third plurality of resources of the first type of resources, including the second subset of resources and the group resources; and in accordance with a determination that the respective user has not been authenticated with the authentication system as the second user, providing access to a plurality of resources of the first type that does not include the second subset of resources, wherein the second user does not have access to the first subset of resources; and
the first user does not have access to the second subset of resources.- View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
25. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display and a fingerprint sensor, cause the device to:
-
display a first user interface on the display; while displaying the first user interface on the display, receive a request to access resources of a first type from a respective user, wherein; the device includes resources of the first type; a first subset of resources of the first type are associated with a first user; the first subset of resources of the first type are secured by an authentication system; a second subset of resources of the first type are associated with a second user; the second subset of resources of the first type are secured by the authentication system; the first user and the second user are members of a predefined group; and the predefined group has access to one or more group resources; and in response to receiving the request to access resources of the first type; in accordance with a determination that the respective user has been authenticated with the authentication system as the first user, provide access to a first plurality of resources of the first type of resources, including the first subset of resources and the group resources; in accordance with a determination that the respective user has not been authenticated with the authentication system as the first user, provide access to a second plurality of resources of the first type that does not include the first subset of resources; in accordance with a determination that the respective user has been authenticated with the authentication system as the second user, provide access to a third plurality of resources of the first type of resources, including the second subset of resources and the group resources; and in accordance with a determination that the respective user has not been authenticated with the authentication system as the second user, provide access to a plurality of resources of the first type that does not include the second subset of resources, wherein the second user does not have access to the first subset of resources; and
the first user does not have access to the second subset of resources. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification