System and method for disabling secure access to an electronic device using detection of a predetermined device orientation
First Claim
Patent Images
1. An electronic device comprising:
- at least one sensor for detecting orientation of the electronic device by the user relative to the ground;
a digital camera controlled by a microprocessor such that the digital camera is in either in an on or off state; and
wherein the microprocessor executes the steps of;
detecting the at least one sensor in a predetermined orientation;
starting a biometric security application running on the electronic device based upon the detection of the predetermined orientation;
activating the digital camera from an off to an on state based upon the detection of the predetermined orientation;
utilizing biometric information from the digital camera to provide first authentication credentials to the biometric security application;
deciding, by the biometric security application, between using a cloud based database and a local database for matching the first authentication credentialsdetermining, by the biometric security application, whether a user is an authenticated user by comparing the first authentication credentials to those stored in the cloud based database accessed using the Internet or the local database based upon the decision;
utilizing a secondary authentication credentials, different from the first authentication credentials, on the electronic device when the user is not authenticated using the first authentication credentials; and
providing a user access to the electronic device if the biometric security application determines the user is an authenticated user, wherein cloud based means using multiple server computers via a digital network as though they were one computer.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing secure authorization to an electronic device by combining two or more security features of authentication processed at substantially the same time where at least one of the factors is a “tolerant” factor. By combining two factors such as facial recognition and a screen gesture, these can be analyzed at substantially the same time except when a device is oriented in a predetermined position or a unique or individualized motion is detected.
78 Citations
17 Claims
-
1. An electronic device comprising:
-
at least one sensor for detecting orientation of the electronic device by the user relative to the ground; a digital camera controlled by a microprocessor such that the digital camera is in either in an on or off state; and wherein the microprocessor executes the steps of; detecting the at least one sensor in a predetermined orientation; starting a biometric security application running on the electronic device based upon the detection of the predetermined orientation; activating the digital camera from an off to an on state based upon the detection of the predetermined orientation; utilizing biometric information from the digital camera to provide first authentication credentials to the biometric security application; deciding, by the biometric security application, between using a cloud based database and a local database for matching the first authentication credentials determining, by the biometric security application, whether a user is an authenticated user by comparing the first authentication credentials to those stored in the cloud based database accessed using the Internet or the local database based upon the decision; utilizing a secondary authentication credentials, different from the first authentication credentials, on the electronic device when the user is not authenticated using the first authentication credentials; and providing a user access to the electronic device if the biometric security application determines the user is an authenticated user, wherein cloud based means using multiple server computers via a digital network as though they were one computer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A biometric recognition system for providing security for an electronic device comprising:
-
at least one processor configured to execute a biometric security application; a digital camera having a field of view configured to provide first biometric credentials from a user of the electronic device, where both a biometric security application is initiated on the electronic device by the at least one processor, and the digital camera is activated when the electronic device is in an on state, by holding the electronic device in a predetermined orientation by the user relative to the ground; and wherein the biometric security application is configured to use, with the electronic device, and elect between using a cloud based database and a local database for matching the first authentication credentials used by the biometric security application to determine whether a user is an authenticated user by comparing the first authentication credentials to those stored in the cloud based database accessed using the Internet or the local database based upon the election and further wherein secondary authentication credentials, different from the first authentication credentials, are used when the user is not authenticated using the first authentication credentials. - View Dependent Claims (9, 10)
-
-
11. A method for providing security to an electronic device comprising the steps of:
-
detecting a predetermined orientation of the electronic device by the user relative to the ground while the electronic device is in an on state; initiating a biometric security application on a microprocessor in the electronic device in response to detection of the predetermined orientation; turning on a digital camera on the electronic device from an off state; providing first biometric authentication data from the digital camera to the biometric security application; selecting, by the biometric security application, between using a cloud based database and a local database for matching the first authentication data; determining, by the biometric security application, whether a user is an authenticated user by comparing the first authentication data with that stored in the cloud based database accessed using the Internet or the local database based upon the selection; comparing the biometric authentication data to information stored in a database; comparing data stored in a database with the biometric authentication data; utilizing second authentication data, different from the first authentication data, on the electronic device when the user is not authenticated using the first authentication data; granting access to the electronic device if the first biometric authentication data or second authentication data is verified where the power for the electronic device is managed though enablement of the digital camera. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification