Authentication using individual's inherent expression as secondary signature
First Claim
Patent Images
1. A method, comprising:
- training, by a processor, for one or more secondary signatures of a user;
identifying, by the processor, one or more inherent expressions of the user as the one or more secondary signatures;
authenticating, by the processor, the user using a primary signature and at least one of the one or more secondary signatures; and
unlocking, by the processor, a lock to permit the user access to a locked item responsive to an authentication of the user using the primary signature and one or more of the secondary signatures,wherein the one or more inherent expressions are unintended expressions performed by the user (i) in relation to the user providing the primary signature (ii) while being unrelated directly to the physical, intentional interaction of the user providing the primary signature, and wherein each of the primary signature and the at least one of the one or more secondary signatures are used as separate identification factors in a multi-factor authentication of the user;
wherein the one or more inherent expressions comprise one or more sounds produced by the use.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system are provided. The method includes training for one or more secondary signatures of a user. The method further includes identifying one or more inherent expressions of the user as the one or more secondary signatures. The method also includes authenticating the user using a primary signature and at least one of the one or more secondary signatures. The one or more inherent expressions are unintended expressions performed by the user in relation to the user providing the primary signature.
-
Citations
18 Claims
-
1. A method, comprising:
-
training, by a processor, for one or more secondary signatures of a user; identifying, by the processor, one or more inherent expressions of the user as the one or more secondary signatures; authenticating, by the processor, the user using a primary signature and at least one of the one or more secondary signatures; and unlocking, by the processor, a lock to permit the user access to a locked item responsive to an authentication of the user using the primary signature and one or more of the secondary signatures, wherein the one or more inherent expressions are unintended expressions performed by the user (i) in relation to the user providing the primary signature (ii) while being unrelated directly to the physical, intentional interaction of the user providing the primary signature, and wherein each of the primary signature and the at least one of the one or more secondary signatures are used as separate identification factors in a multi-factor authentication of the user; wherein the one or more inherent expressions comprise one or more sounds produced by the use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory article of manufacture tangibly embodying a computer readable program which when executed causes a computer having a processor to perform the steps of claim k
training, by the processor, for one or more secondary signatures of a user; -
identifying, by the processor, one or more inherent expressions of the user as the one or more secondary signatures; authenticating, by the processor, the user using a primary signature and at least one of the one or more secondary signatures; and unlocking, by the processor, a lock to permit the user access to a locked item responsive to an authentication of the user using the primary signature and one or more of the secondary signatures, wherein the one or more inherent expressions are unintended expressions performed by the user (i) in relation to the user providing the primary signature (ii) while being unrelated directly to the physical, intentional interaction of the user providing the primary signature, and wherein each of the primary signature and the at least one of the one or more secondary signatures are used as separate identification factors in a multi-factor authentication of the user; wherein the one or more inherent expressions comprise one or more sounds produced by the use.
-
-
11. A system, comprising;
- a hardware processor configured to;
train for one or more secondary signatures of a user;
identify one or more inherent expressions of the user as the one or more secondary signatures;authenticate the user using a primary signature, and at least one of the one or more secondary signatures; and unlock a lock to permit the user access to a locked item responsive to an authentication of the user using the primary signature and one or more of the secondary signatures, wherein the one or more inherent expressions are unintended expressions performed by the user (i) in relation to the user providing the primary signature (ii) while being unrelated directly to the physical, intentional interaction of the user providing the primary signature, and wherein each of the primary signature and the at least one of the one or more secondary signatures are used as separate identification factors in a multi-factor authentication of the user; wherein the one or more inherent expressions comprise one or more sounds produced by the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
- a hardware processor configured to;
Specification