System and method for enabling a camera used with an electronic device using detection of a unique motion
First Claim
1. A biometric recognition system configured to provide security for an electronic device in an activated state comprising:
- a digital camera having a field of view configured to provide at least one biometric image from a user of the electronic device where the digital camera, when in an off state, is enabled by providing a definitive movement of the electronic device by the user in a user selectable unique motion to provide first authentication credentials;
a touch screen configured to second authentication credentials;
at least one processor configured to use with the electronic device to;
execute a biometric security application configured to;
elect between using a cloud based database and a local database for matching the first authentication credentials used by the biometric security application to determine whether a user is an authenticated user by comparing the at least one biometric image to those stored in the cloud based database accessed using the Internet or the local database based on the election and further wherein the secondary authentication credentials, different from the first authentication credentials, are used only when the user is not authenticated using the first authentication credential; and
wherein the user is granted access to the electronic device if they are an authenticated user and wherein cloud based means using multiple server computers via a digital network as though they were one computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A biometric recognition system for providing security for an electronic device includes a digital camera for providing a biometric image from a user of the electronic device and a touch screen for entering a user selected screen gesture. A processor is configured for use with the electronic device for comparing the biometric image to biometric image data and the user selected screen gesture with a screen gesture stored in a database. The digital camera can be enabled by providing a definitive movement of the electronic device by the user in a unique motion so to provide secure access to the electronic device when either the biometric image data or screen gesture are authenticated.
72 Citations
24 Claims
-
1. A biometric recognition system configured to provide security for an electronic device in an activated state comprising:
-
a digital camera having a field of view configured to provide at least one biometric image from a user of the electronic device where the digital camera, when in an off state, is enabled by providing a definitive movement of the electronic device by the user in a user selectable unique motion to provide first authentication credentials; a touch screen configured to second authentication credentials; at least one processor configured to use with the electronic device to; execute a biometric security application configured to; elect between using a cloud based database and a local database for matching the first authentication credentials used by the biometric security application to determine whether a user is an authenticated user by comparing the at least one biometric image to those stored in the cloud based database accessed using the Internet or the local database based on the election and further wherein the secondary authentication credentials, different from the first authentication credentials, are used only when the user is not authenticated using the first authentication credential; and wherein the user is granted access to the electronic device if they are an authenticated user and wherein cloud based means using multiple server computers via a digital network as though they were one computer. - View Dependent Claims (2)
-
-
3. An electronic device using facial biometric security configured to provide access comprising:
-
a digital camera configured to provide first authentication credentials based on at least one biometric image; a touch screen configured to enter second authentication credentials based on user input data, wherein the secondary authentication credentials, different from the first authentication credentials, are used only when the user is not authenticated using the first authentication credentials; a memory configured to store the first authentication credentials and second authentication credentials; a microprocessor configured to execute a biometric security application configured to elect between using a cloud based database and a local database for matching the first authentication credentials used by the biometric security application to determine whether a user is an authenticated user by comparing first authentication credentials to those stored in the cloud based database accessed using the Internet or the local database based on the election; and wherein the electronic device, in an on state, detects a definitive movement of the electronic device by the user in a user-selectable unique motion for enabling only the digital camera from an off state, for providing user access to the electronic device in response to a determination the user is an authenticated user using the first authentication credentials or the second authentication credentials and wherein cloud based means using multiple server computers via a digital network as though they were one computer. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. An electronic device using facial biometric security configured to provide access comprising:
-
a digital camera enabled using a definitive movement of the electronic device by the user in a user-selectable unique motion for providing first authentication credentials based on at least one user image; a touch screen configured to enter second authentication credentials based on user input data; a memory configured to store the first authentication credentials and second authentication credentials; a microprocessor configured to execute a biometric security application configured to elect between using a cloud based database and a local database for matching the first authentication credentials used by the biometric security application to determine whether a user is an authenticated user by comparing the first authentication credentials to those stored in the cloud based database accessed using the Internet or the local database based on the election and further wherein the second authentication credentials, different from the first authentication credentials, are used when the user is not authenticated using the first authentication credentials; and wherein the microprocessor is configured to grant the user access to the electronic device after the user is authenticated with valid first authentication credentials or second authentication credentials and wherein cloud based means using multiple server computers via a digital network as though they were one computer. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method for providing security to an electronic device comprising the steps of:
-
providing an electronic device in an activated state; providing at least one camera operating with the electronic device in a deactivated state; activating the at least one camera if the electronic device detects a definitive user-selectable movement by the user in a unique motion; providing first data from the at least one camera for use in access authentication; executing a biometric security application configured to elect between using a cloud based database and a local database for matching the first data used by the biometric security application to determine whether a user is an authenticated user by comparing the first data to that stored in the cloud based database accessed using the Internet or the local database based on the election and further wherein second data, different from the first data, is provided from a touch screen display when the user is not authenticated using the first data; and granting the user access to the electronic device by the biometric security application if authenticated using the first data or second data and wherein cloud based means using multiple server computers via a digital network as though they were one computer. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification