Controlled access to functionality of a wireless device
First Claim
1. At least one non-transitory machine-readable medium comprising instructions which, when executed by one or more processors of a computing device, cause the computing device to:
- provide a first functionality of the computing device;
subsequent to provision of the first functionality, perform biometric authentication based on an input from a camera, to determine if a person attempting to access more functionality of the computing device has been approved to do so;
wherein the biometric authentication is to analyze the input from the camera to recognize at least part of a face of the person;
responsive to authentication success of the biometric authentication, provide access to a second functionality of the computing device;
responsive to authentication failure of the biometric authentication, perform a second authentication based on a PIN or other password; and
responsive to authentication success of the second authentication, provide access to a third functionality of the computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device'"'"'s functionality.
-
Citations
20 Claims
-
1. At least one non-transitory machine-readable medium comprising instructions which, when executed by one or more processors of a computing device, cause the computing device to:
-
provide a first functionality of the computing device; subsequent to provision of the first functionality, perform biometric authentication based on an input from a camera, to determine if a person attempting to access more functionality of the computing device has been approved to do so; wherein the biometric authentication is to analyze the input from the camera to recognize at least part of a face of the person; responsive to authentication success of the biometric authentication, provide access to a second functionality of the computing device; responsive to authentication failure of the biometric authentication, perform a second authentication based on a PIN or other password; and responsive to authentication success of the second authentication, provide access to a third functionality of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
one or more processors; a touchscreen coupled to the one or more processors; a camera coupled to the one or more processors; and one or more non-transitory machine-readable media comprising instructions which, when executed by the one or more processors, cause the one or more processors to; provide a first functionality of the apparatus; subsequent to provision of the first functionality, perform biometric authentication based on an input from the camera, to determine if a person attempting to access more functionality of the apparatus has been approved to do so, wherein the biometric authentication is to analyze the input from the camera to recognize at least part of a face of the person; responsive to authentication success of the biometric authentication, provide access to a second functionality of the apparatus; responsive to authentication failure of the biometric authentication, perform a second authentication based on a PIN or other password; and responsive to authentication success of the second authentication, provide access to a third functionality of the apparatus. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A wireless device comprising:
-
a processor; a touch-sensitive display screen adapted on a first side of the wireless device; a camera having a lens adapted on the first side of the wireless device; at least one non-transitory computer-readable storage medium comprising instructions that when executed enable the wireless device to; provide a first functionality of the wireless device; subsequent to provision of the first functionality, perform biometric authentication based on an input from the camera, to determine if a person attempting to access more functionality of the wireless device has been approved to do so, wherein the biometric authentication is to analyze the input from the camera to recognize at least part of a face of the person; responsive to authentication success of the biometric authentication, provide access to a second functionality of the wireless device; responsive to authentication failure of the biometric authentication, perform a second authentication based on a PIN or other password; and responsive to authentication success of the second authentication, provide access to a third functionality of the wireless device. - View Dependent Claims (17, 18, 19, 20)
-
Specification