WO2015170139A1 - User authentication based on body tremors - Google Patents

User authentication based on body tremors Download PDF

Info

Publication number
WO2015170139A1
WO2015170139A1 PCT/IB2014/061221 IB2014061221W WO2015170139A1 WO 2015170139 A1 WO2015170139 A1 WO 2015170139A1 IB 2014061221 W IB2014061221 W IB 2014061221W WO 2015170139 A1 WO2015170139 A1 WO 2015170139A1
Authority
WO
WIPO (PCT)
Prior art keywords
computing device
mobile computing
signal
limb
correlation
Prior art date
Application number
PCT/IB2014/061221
Other languages
French (fr)
Inventor
Per ÅSTRAND
Magnus Landqvist
Henrik Bengtsson
Aleksandar RODZEVSKI
Original Assignee
Sony Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corporation filed Critical Sony Corporation
Priority to EP14726779.3A priority Critical patent/EP3140765B1/en
Priority to PCT/IB2014/061221 priority patent/WO2015170139A1/en
Priority to US14/429,983 priority patent/US20160259926A1/en
Priority to CN201480078498.1A priority patent/CN106462682B/en
Publication of WO2015170139A1 publication Critical patent/WO2015170139A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/014Hand-worn input/output arrangements, e.g. data gloves
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0346Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent

Definitions

  • the present disclosure relates to authenticating a user of a mobile computing device, and more particularly to performing such an authentication based on a comparison of body tremors.
  • Wearable computing devices are becoming increasingly popular, and are being used as companion devices for smartphones. For example, interest is increasing in so-called “smart watches” that can communicate with a nearby smartphone to display information to users. Some example information that has been proposed for display on such wearable computing devices includes email and Short Message Service (SMS) notifications, for example.
  • SMS Short Message Service
  • Such wearable computing devices that are worn around a user's wrist are sometimes referred to as "wristlets.”
  • Some wearable computing devices are being used for various health monitoring applications.
  • some "life logger” devices include three-dimensional accelerometers that sense user movement. Measurements from these sensors can be used for various fitness calculations, such as a distance walked, a quantity of steps taken, activity duration and intensity, etc. Such calculations can be accumulated over a time period and then transmitted to a computing device (e.g., a smartphone or desktop computer) for long term storage. However, such data has only been used for fitness purposes.
  • a method is implemented by a mobile computing device to authenticate a user.
  • a first signal indicative of a body tremor of a limb holding the mobile computing device is detected.
  • a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured is also detected.
  • Based on a comparison of the body tremors a determination is made as to whether the limbs are the same limb.
  • a user account associated with the wearable computing device is authenticated based on the determining indicating that the limbs are the same limb.
  • authenticating the user includes granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, authenticating the user includes automatically answering an incoming phone call to the mobile computing device.
  • the first signal is detected by converting accelerometer data from the mobile computing device to the frequency domain to produce the first signal
  • the second signal is detected by converting accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
  • determining whether the limbs are the same is characterized by determining a correlation between the first and second signals, and determining that the limbs are the same limb if the correlation indicates that the first and second signals differ by less than a difference threshold.
  • determining the correlation includes determining a first frequency profile of the first signal within a predefined bandwidth, determining a second frequency profile of the second signal within the predefined bandwidth, and correlating the first frequency profile with the second frequency profile.
  • a mobile computing device includes one or more processing circuits configured to detect a first signal indicative of a body tremor of a limb holding the mobile computing device, and to detect a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured.
  • the one or more processing circuits are further configured to determine, based on a comparison of the body tremors, whether the limbs are the same limb.
  • the one or more processing circuits are further configured to authenticate a user account associated with the wearable computing device based on the determining indicating that the limbs are the same limb.
  • the mobile computing device also includes a communication interface circuit configured to communicate with the wearable computing device to enable the detection of the second signal.
  • the one or more processing circuits are configured to authenticate the user by granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, one or more processing circuits are configured to authenticate the user by automatically answering an incoming phone call to the mobile computing device.
  • the one or more processing circuits are configured to detect the first signal by converting accelerometer data from the mobile computing device to the frequency domain to produce the first signal, and to detect the second signal by converting accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
  • the one or more processing circuits are configured to determine whether the limbs are the same by determining a correlation between the first and second signals, and determining that the limbs are the same limb if the correlation indicates that the first and second signals differ by less than a difference threshold. In some embodiments, the one or more processing circuits are configured to determine the correlation by determining a first frequency profile of the first signal within a predefined bandwidth, determining a second frequency profile of the second signal within the predefined bandwidth, and correlating the first frequency profile with the second frequency profile. According to another aspect of the present disclosure, a computer program product is stored in a non-transitory computer-readable medium for authenticating a user of a mobile computing device.
  • the computer program product includes software instructions which, when run by a processor of the mobile computing device, configures the mobile computing device to detect a first signal indicative of a body tremor of a limb holding the mobile computing device, and detect a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured.
  • the software instructions further configure the mobile computing device to determine, based on a comparison of the body tremors, whether the limbs are the same limb; and authenticate a user account associated with the wearable computing device based on the determining indicating that the limbs are the same limb.
  • the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to grant access to a limited- access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to automatically answer an incoming phone call to the mobile computing device.
  • the software instructions configure the mobile computing device to detect the first signal by configuring the mobile computing device to convert accelerometer data from the mobile computing device to the frequency domain to produce the first signal, and the software instructions configure the mobile computing device to detect the second signal by configuring the mobile computing device to convert accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
  • the software instructions configure the mobile computing device to determine whether the limbs are the same by configuring the mobile computing device to determine a correlation between the first and second signals, and determine that the limbs are the same limb if the correlation indicates that the first and second signals differ by less than a difference threshold. In some embodiments, the software instructions configure the mobile computing device to determine the correlation configuring the mobile computing device to determine a first frequency profile of the first signal within a predefined bandwidth, determine a second frequency profile of the second signal within the predefined bandwidth, and correlate the first frequency profile with the second frequency profile.
  • a method is implemented by a mobile computing device to authenticate a user.
  • a body tremor fingerprint is generated that is indicative of a body tremor of an authorized user.
  • a signal is detected that is indicative of a body tremor of a current user in response to a trigger event.
  • the body tremor of the current user is compared to the body tremor fingerprint for one or more authorized users.
  • the current user is authenticated based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.
  • authenticating the user includes granting access to a limited- access feature on the mobile computing device (e.g., bypassing a lock screen).
  • authenticating the user includes automatically answering an incoming phone call to the mobile computing device.
  • generating the body tremor fingerprint indicative of an authorized user comprises recording first accelerometer data using sensors of the mobile computing device at a first time when a limb of the authorized user is holding the mobile computing device, and converting the first accelerometer data to the frequency domain to generate the body tremor fingerprint.
  • detecting the signal indicative of a body tremor of a current user comprises recording second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb of the current user is holding the mobile computing device; and converting the second accelerometer data to the frequency domain to detect the signal indicative of the body tremor of the current user.
  • Comparing the body tremor of the current user to the body tremor fingerprint for one or more authorized users could include determining a correlation between the signal and the body tremor fingerprint, and if the correlation indicates that the signal and the body tremor fingerprint differ by less than a difference threshold, determining that the current user is an authorized user.
  • Determining a correlation between the signal and the body tremor fingerprint could include: determining a first frequency profile of the body tremor fingerprint within a predefined bandwidth; determining a second frequency profile of the signal indicative of a body tremor of the current user within the predefined bandwidth; and determining a correlation between the first frequency profile and the second frequency profile.
  • the trigger event could include a detected movement of the mobile computing device from a resting position.
  • a mobile computing device includes one or more processing circuits configured to generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of a current user in response to a trigger event.
  • the one or more processing circuits are further configured to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.
  • the mobile computing device also includes a memory circuit configured to store the body tremor fingerprint.
  • the one or more processing circuits are configured to authenticate the user by granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, the one or more processing circuits are configured to authenticate the user by automatically answering an incoming phone call to the mobile computing device.
  • the one or more processing circuits are configured to record first accelerometer data using sensors of the mobile computing device at a first time when a limb of the authorized user is holding the mobile computing device, and convert the first accelerometer data to the frequency domain to generate the body tremor fingerprint.
  • the one or more processing circuits are configured to detect the signal indicative of a body tremor of a current user by recording second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb of the current user is holding the mobile computing device; and converting the second accelerometer data to the frequency domain to detect the signal indicative of the body tremor of the current user.
  • the one or more processing circuits are configured to determine a correlation between the signal and the body tremor fingerprint; and if the correlation indicates that the signal and the body tremor fingerprint differ by less than a difference threshold, determine that the current user is an authorized user.
  • the one or more processing circuits are configured to: determine a first frequency profile of the body tremor fingerprint within a predefined bandwidth; determine a second frequency profile of the signal indicative of a body tremor of the current user within the predefined bandwidth; and determine a correlation between the first frequency profile and the second frequency profile.
  • the trigger event could include a detected movement of the mobile computing device from a resting position.
  • a computer program product is stored in a non-transitory computer-readable medium for authenticating a user of a mobile computing device.
  • the computer program product comprises software instructions which, when run by a processor of a mobile computing device, configures the mobile computing device to generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of a current user in response to a trigger event.
  • the instructions further configure the mobile computing device to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.
  • the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to grant access to a limited- access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to automatically answering an incoming phone call to the mobile computing device.
  • the software instructions configure the mobile computing device to generate the body tremor fingerprint indicative of an authorized user by configuring the mobile computing device to record first accelerometer data using sensors of the mobile computing device at a first time when a limb of the authorized user is holding the mobile computing device, and convert the first accelerometer data to the frequency domain to generate the body tremor fingerprint.
  • the software instructions configure the mobile computing device to detect the signal indicative of a body tremor of a current user by configuring the mobile computing device to record second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb of the current user is holding the mobile computing device; and convert the second accelerometer data to the frequency domain to detect the signal indicative of the body tremor of the current user.
  • the software instructions configure the mobile computing device to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users by configuring the mobile computing device to determine a correlation between the signal and the body tremor fingerprint; and if the correlation indicates that the signal and the body tremor fingerprint differ by less than a difference threshold, determine that the current user is an authorized user.
  • the software instructions configure the mobile computing device to determine a correlation between the signal and the body tremor fingerprint by configuring the mobile computing device to: determine a first frequency profile of the body tremor fingerprint within a predefined bandwidth; determine a second frequency profile of the signal indicative of a body tremor of the current user within the predefined bandwidth; and determine a correlation between the first frequency profile and the second frequency profile.
  • the trigger event could include a detected movement of the mobile computing device from a resting position.
  • Fig. 1 illustrates an example mobile computing device and wearable computing device.
  • Fig. 2 illustrates an example method performed by the mobile computing device to authenticate a user according to one embodiment.
  • Fig. 3 illustrates an example implementation of aspects of the method of Fig. 2.
  • Fig. 4 illustrates an example mobile computing device and wearable computing device ' greater detail.
  • Fig. 5 illustrates an example method performed by a mobile computing device to authenticate a user according to another embodiment.
  • Fig. 6 illustrates an example implementation of aspects of the method of Fig. 5.
  • Fig. 7 illustrates an example mobile computing device operative to implement the method of Fig. 5.
  • body tremors In every human body there are unintentional muscle movements along various body parts, which are known as physiological tremors (referred to as "body tremors" herein).
  • a body tremor is an involuntary, approximately rhythmic and roughly sinusoidal movement which may or may not be noticeable by the human eye.
  • Each person is believed to have a different unique body tremor, in part because the characteristics of body tremors of a person depend on the bone structure and the muscle tone/density of that person.
  • the frequency of tremors in the wrist and hand typically range from 8 to 12 Hz, for example.
  • the present disclosure describes methods and related apparatuses for authenticating a user of a mobile computing device based on an analysis of signals indicative of a body tremor.
  • physiological tremors have been suppressed (see, e.g., "Sensing Physiological Tremor in a Hand-Held Microsurgical Instrument” by Saxena, Abhijit et al. in the publication SBC2013-14185 of the ASME 2013 Summer Bioengineering Conference, June 26-29, Sunriver, Oregon, USA).
  • the techniques discussed herein analyze such tremors for authentication purposes.
  • the user's body tremor acts as a sort of token for authentication.
  • a first signal indicative of a body tremor of a limb holding a mobile computing device is detected, and a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured is also detected. Based on a comparison of the body tremors, a determination is made of whether the limbs are the same limb (i.e., of whether the wearable computing device is secured to a same limb that is holding the mobile computing device). A user account of the mobile computing device that is associated with the wearable computing device is authenticated based on the determining indicating that the limbs are the same limb.
  • a lock screen (e.g., a password protected lock screen) is activated before the user is permitted to access their home screen.
  • the authentication performed based on a determination that a wearable computing device is secured to a limb, and a mobile computing device is being held by the same limb could include bypassing such a lock screen.
  • authenticating the user account may include granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen of the mobile computing device), for example.
  • authenticating the user may include automatically answering an incoming phone call to the mobile computing device.
  • a password may be required to change a security setting or purchase a smartphone application (i.e., a second authentication). That second authentication could be performed without password entry based on the body tremor comparison discussed herein.
  • FIG. 1 schematically illustrates a system 10 for performing
  • the system 10 includes a mobile computing device 12 and a wearable computing device 14.
  • the wearable computing device 14 is secured to a limb 16 which is an arm in the example of Fig. 1 , and the mobile computing device 12 is held by that same limb 16, via a hand 18 of the limb 16.
  • Each of the mobile computing device 12 and wearable computing device 14 includes one or more accelerometers operative to detect movement.
  • the wearable computing device is shown as a wrist-wearable device, it is understood that this is only an example, and that other wearable computing devices could be used (e.g., a ring or armband).
  • Fig. 2 illustrates an example method 100 performed by the mobile computing 12 device to authenticate a user based on body tremors according to one embodiment.
  • a first signal is detected which is indicative of a body tremor of a limb holding the mobile computing device 12 (block 102).
  • a second signal is detected which is indicative of a body tremor of a limb to which the separate wearable computing device 14 is secured (block 104).
  • a determination is made of whether the limbs are the same limb (block 106).
  • a user account associated with the wearable computing device 14 is authenticated based on the determining indicating that the limbs are the same limb (block 108).
  • authenticating the user account includes granting access to a limited-access feature on the mobile computing device 12 (e.g., bypassing a lock screen of the mobile computing device 12) if there is no incoming call.
  • authenticating the user includes automatically answering an incoming phone call to the mobile computing device 12 (e.g., as the mobile computing device 12 is being lifted towards a user's ear) when there is an incoming call.
  • Fig. 3 illustrates an example implementation 150 of aspects of the method 100 of Fig. 2.
  • blocks 152-156 are an example implementation of block 102 from Fig. 2
  • blocks 158-162 are an example implementation of block 104 from Fig. 2
  • blocks 164-166 are an example implementation of block 106 from Fig. 2.
  • accelerometer data is obtained from the mobile computing device 12 (block 152), a low pass filter (LPF) is applied to the accelerometer data (block 154), and a fast Fourier transform (FFT) is performed on the filtered accelerometer data (block 156) to yield the first signal 180.
  • the first signal 180 is indicative of a body tremor of a limb holding the mobile computing device 12.
  • the low pass filter filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors in the wrist and hand).
  • the fast Fourier transform of block 156 converts the filtered accelerometer data from the mobile computing device 12 to the frequency domain so that the frequency of body tremors represented in the accelerometer data of mobile computing device 12 can be determined.
  • accelerometer data is obtained from the wearable computing device 14 (block 158), a low pass filter is applied to the accelerometer data (block 160), and a fast Fourier transform is performed on the filtered accelerometer data (block 162) to yield the second signal 182.
  • the second signal 182 is indicative of a body tremor of a limb to which the wearable computing device 14 is secured.
  • the low pass filter filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors).
  • the fast Fourier transform of block 162 converts the filtered accelerometer data from the wearable computing device 14 to the frequency domain so that the frequency of body tremors represented in the accelerometer data of the wearable computing device 14 can be determined.
  • detecting the first signal 180 comprises converting accelerometer data from the mobile computing device 12 to the frequency domain to produce the first signal 180
  • detecting the second signal 182 comprises converting accelerometer data from the wearable computing device 14 to the frequency domain to produce the second signal 182.
  • a correlation is determined between the first and second signals 180, 182 (block 164), and a determination is made as to whether the correlation differs by less than a difference threshold (block 166). If the correlation indicates that the first and second signals 180, 182 differ by less than a difference threshold (a "YES" to block 166), the mobile computing device 12 determines that the limbs are the same limb, and a user account of the mobile computing device 12 that is associated with the wearable computing device 14 is authenticated (block 108). Otherwise, if the difference is greater than the difference threshold (a "NO" to block 166), then the user account associated with the wearable computing device 14 is not authenticated (block 168).
  • determining a correlation between the first and second signals 180, 182 includes determining a first frequency profile of the first signal 180 within a predefined bandwidth (e.g., 8-12 Hz), determining a second frequency profile of the second signal 182 within the predefined bandwidth, and correlating the first frequency profile with the second frequency profile.
  • a predefined bandwidth e.g. 8-12 Hz
  • the correlation of block 164 can be performed in many different ways. One way to perform such a correlation would be to determine frequency peaks of each of the signals 180, 182 and then compare those peaks. Another way to perform the correlation would be to overlay the signals 180, 182 on top of each other. Of course, these are only examples, and it is understood that other correlation techniques could be used.
  • the accelerometer data from within a given sample interval is transmitted from the wearable computing device 14 to the mobile computing device 12 using a local wireless connection.
  • the local connection may use Bluetooth, Bluetooth Low Energy (BLE), Zigbee, one or more 802.1 1 standards, a 433 MHz home automation band, or any combination thereof, for example.
  • BLE Bluetooth Low Energy
  • Such a local connection can be used to support a pairing between the wearable computing device 14 and the mobile computing device 12.
  • the transfer of the accelerometer data is initiated when the wearable computing device 14 and mobile computing device 12 are within a predefined proximity of each other (e.g., on the order of 1 -2 meters).
  • Fig. 4 illustrates an example mobile computing device 300 and associated wearable computing device 400 that may be used as the mobile computing device 12 and wearable computing device 14 of Fig. 1 .
  • the mobile computing device 300 is configured to perform the method 100 of Fig. 2 (e.g., as further depicted in the implementation of Fig. 3).
  • the mobile computing device 300 includes one or more processing circuits (shown as processor 302), including, for example, one or more microprocessors, microcontrollers, Application Specific Integrated Circuits (ASICs), or the like configured with appropriate software and/or firmware to carry out one or more of the techniques discussed above.
  • processor 302 includes one or more processing circuits (shown as processor 302), including, for example, one or more microprocessors, microcontrollers, Application Specific Integrated Circuits (ASICs), or the like configured with appropriate software and/or firmware to carry out one or more of the techniques discussed above.
  • ASICs Application Specific Integrated Circuits
  • the one or more processing circuits of the processor 302 are configured to detect a first signal indicative of a body tremor of a limb holding the mobile computing device 300, and detect a second signal indicative of a body tremor of a limb to which the separate wearable computing device 400 is secured.
  • the one or more processing circuits of the processor 302 are further configured to determine, based on a comparison of the body tremors, whether the limbs are the same limb, and to authenticate a user account associated with the wearable computing device 400 based on the determining indicating that the limbs are the same limb.
  • the mobile computing device 300 also includes a communication interface circuit (shown as "local connectivity circuit” 304) that is configured to communicate with the wearable computing device 400 to enable the detection of the second signal. In some embodiments, this includes receiving accelerometer data from the wearable computing device over local connection 350 (e.g., as shown in Fig. 3).
  • the local connection 350 could use Bluetooth, Bluetooth Low Energy (BLE), Zigbee, one or more 802.1 1 standards, a 433 MHz home automation band, or any combination thereof, for example.
  • BLE Bluetooth Low Energy
  • Zigbee Zigbee
  • Such a local connection can be used to support a pairing between the wearable computing device 400 and the mobile computing device 300.
  • the mobile computing device 300 also includes a tremor sensor circuit 306 that includes one or more accelerometers configured to provide accelerometer data (e.g., three axis accelerometer data) for a limb holding the mobile computing device 300 (e.g., for performance of blocks 102-104 in Fig. 2).
  • the tremor sensor circuit 306 may perform certain features when the main processor 302 is in a low-power mode. For example, some or all of the features described as being performed by processor 302 above (e.g., detecting the first and/or second signal, and determining if the limbs are the same limb) could be performed by the tremor sensor circuit 306 in some embodiments.
  • the shared memory interface circuit 308 could be used to facilitate communication between the tremor sensor circuit 306 and local connectivity circuit 304 when the processor 302 is in the low-power mode.
  • the mobile computing device 300 includes a non-transitory computer-readable storage medium (shown as memory circuit 310) for storing instructions that configure the processor 302 as discussed above (e.g., a computer program 312 that configures the processor 302 to implement one or more of the techniques described above). Although not shown, the mobile computing device 300 could also include a power supply and electronic display, for example.
  • memory circuit 310 for storing instructions that configure the processor 302 as discussed above (e.g., a computer program 312 that configures the processor 302 to implement one or more of the techniques described above).
  • the mobile computing device 300 could also include a power supply and electronic display, for example.
  • the computer program product 312 includes software instructions which, when run by a processor of the mobile computing device 300 (e.g., processor 302 or possibly tremor sensor circuit 306), configures the mobile computing device 300 to: detect a first signal indicative of a body tremor of a limb holding the mobile computing device 300; detect a second signal indicative of a body tremor of a limb to which the separate wearable computing device 400 is secured.
  • the instructions further configure the mobile computing device 300 to determine, based on a comparison of the body tremors, whether the limbs are the same limb; and authenticate a user account associated with the wearable computing device 400 based on the determining indicating that the limbs are the same limb.
  • Fig. 5 illustrates another example method 500 performed by a mobile computing device 12 to authenticate a user based on body tremors.
  • a body tremor fingerprint indicative of a body tremor of an authorized user is generated (block 502).
  • body tremor fingerprint refers to a representation of a unique body tremor of a user, and not to an image of the contours of that user's fingertip.
  • a signal indicative of a body tremor of current user is detected in response to a trigger event (block 504).
  • the body tremor of the current user is compared to the body tremor fingerprint for one or more authorized users (block 506).
  • the current user is authenticated based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user (block 508).
  • the wearable computing device 14 can be entirely omitted, because the body tremor fingerprint and signal indicative of a body tremor are both obtained based on accelerometer data recorded by the mobile computing device 12.
  • authenticating the user could include granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen) and/or automatically answering an incoming phone call to the mobile computing device.
  • Fig. 6 illustrates an example implementation 250 of aspects of the method 500 of Fig. 5.
  • blocks 552-556 are an example implementation of block 502 from Fig. 5
  • blocks 558-562 are an example implementation of block 504 from Fig. 5
  • blocks 564-566 are an example implementation of block 506 from Fig. 5.
  • accelerometer data is obtained from the mobile computing device 12 at a first time (block 552), a low pass filter is applied to the accelerometer data (block 554), and a fast Fourier transform (FFT) is performed on the filtered accelerometer data (block 556) to yield body tremor fingerprint 580.
  • the low pass filter (LPF) filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors).
  • the fast Fourier transform of block 556 converts the filtered accelerometer data from the mobile computing device 12 to the frequency domain so that the frequency of body tremors represented in the accelerometer data of block 552 can be determined.
  • generating the body tremor fingerprint indicative of an authorized user comprises recording first accelerometer data using sensors of the mobile computing device 12 at a first time when a limb 16 of the authorized user is holding the mobile computing device 12, and converting the first accelerometer data to the frequency domain to produce the body tremor fingerprint 580.
  • accelerometer data is obtained from the mobile computing device 12 at a second time that is subsequent to the first time (block 558), a low pass filter is applied to the accelerometer data (block 560), and a fast Fourier transform is performed on the filtered accelerometer data (block 562) to yield the signal 582 indicative of the current user.
  • the low pass filter filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors).
  • the fast Fourier transform of block 562 converts the filtered accelerometer data from the mobile computing device 12 to the frequency domain so that the frequency of body tremors
  • detecting the signal indicative of a body tremor of a current user in response to a trigger event comprises recording second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb 16 of the current user is holding the mobile computing device 12; and converting the second accelerometer data to the frequency domain to determine the signal 582 indicative of the body tremor of the current user.
  • a correlation is determined between the body tremor of the current user (represented by signal 582) and the body tremor fingerprint 580 (block 564), and a determination is made as to whether the correlation differs by less than a difference threshold (block 566). If the correlation indicates that the difference between the body tremor fingerprint and the signal indicative of the body tremor of the current user is less than a difference threshold (a "YES" to block 566), the mobile computing device 12 determines that the current user is an authorized user, and the current user is authenticated (block 508). Otherwise, if the difference is greater than the difference threshold (a "NO" to block 566), then the current user of the mobile computing device 12 is not authenticated.
  • determining a correlation between the body tremor of the current user and the body tremor fingerprint includes determining a first frequency profile of the body tremor fingerprint 580 within a predefined bandwidth (e.g., 8-12 Hz), determining a second frequency profile of the signal 582 indicative of a body tremor of the current user within the predefined bandwidth, and determining a correlation between the first frequency profile and the second frequency profile.
  • a predefined bandwidth e.g. 8-12 Hz
  • the correlation of block 564 can be performed in many different ways.
  • One way to perform such a correlation would be to determine frequency peaks of each of the signals 580, 582 and then compare those peaks.
  • Another way to perform the correlation would be to overlay the signals 580, 582 on top of each other.
  • the trigger event comprises a detected movement of the mobile computing device from a resting position.
  • Fig. 7 illustrates an example mobile computing device 600 that is configured to perform the method 500 of Fig. 5 (e.g., as further depicted in the implementation of Fig. 6).
  • the mobile computing device 600 includes one or more processing circuits (shown as processor 602), including, for example, one or more microprocessors, microcontrollers, Application Specific Integrated Circuits (ASICs), or the like configured with appropriate software and/or firmware to carry out one or more of the techniques discussed above.
  • the one or more processing circuits of the processor 602 are configured to generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of current user in response to a trigger event.
  • the one or more processing circuits of the processor 602 are further configured to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.
  • the mobile computing device 600 includes a tremor sensor circuit 606 that includes one or more accelerometers configured to provide accelerometer data (e.g., three axis
  • the tremor sensor circuit 506 may perform certain features when the main processor 602 is in a low-power mode. For example, some or all of the features described as being performed by processor 502 above (e.g., detecting a signal indicative of a body tremor of a current user in response to a trigger event) could be performed by the tremor sensor circuit 606 in some embodiments (e.g., when the main processor 302 is in the low-power mode).
  • the mobile computing device 600 includes a non-transitory computer-readable storage medium (shown as memory circuit 610) configured to store configured to store the body tremor fingerprint.
  • the memory circuit 610 is further configured to store instructions that configure the processor 602 as discussed above (e.g., a computer program 612 that configures the processor 602 to implement the method 500 described above).
  • the mobile computing device 600 could also include a power supply and electronic display, for example.
  • the mobile computing device 600 optionally includes a communication interface circuit 604 (shown as "local connectivity circuit” 304) that is configured to communicate wirelessly with other devices.
  • the communication interface 604 could be configured to use Bluetooth, Bluetooth Low Energy (BLE), Zigbee, one or more 802.1 1 standards, a 433 MHz home automation band, or any combination thereof, for example.
  • a computer program product 612 is stored in a non- transitory computer-readable medium (e.g., memory circuit 610) for authenticating a user of a mobile computing device 600.
  • the computer program product 612 comprises software instructions which, when run by processor 602 of the mobile computing device 600, configures the mobile computing device 600 to: generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of current user in response to a trigger event.
  • the instructions further configure the mobile computing device 600 to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

According to one aspect of the present disclosure, a method is implemented by a mobile computing device to authenticate a user. A first signal indicative of a body tremor of a limb holding the mobile computing device is detected. A second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured is also detected. Based on a comparison of the body tremors, a determination is made as to whether the limbs are the same limb. A user account associated with the wearable computing device is authenticated based on the determining indicating that the limbs are the same limb.

Description

USER AUTHENTICATION BASED ON BODY TREMORS
TECHNICAL FIELD
The present disclosure relates to authenticating a user of a mobile computing device, and more particularly to performing such an authentication based on a comparison of body tremors.
BACKGROUND
Wearable computing devices are becoming increasingly popular, and are being used as companion devices for smartphones. For example, interest is increasing in so-called "smart watches" that can communicate with a nearby smartphone to display information to users. Some example information that has been proposed for display on such wearable computing devices includes email and Short Message Service (SMS) notifications, for example. Such wearable computing devices that are worn around a user's wrist are sometimes referred to as "wristlets."
Some wearable computing devices are being used for various health monitoring applications. For example, some "life logger" devices include three-dimensional accelerometers that sense user movement. Measurements from these sensors can be used for various fitness calculations, such as a distance walked, a quantity of steps taken, activity duration and intensity, etc. Such calculations can be accumulated over a time period and then transmitted to a computing device (e.g., a smartphone or desktop computer) for long term storage. However, such data has only been used for fitness purposes.
SUMMARY
According to one aspect of the present disclosure, a method is implemented by a mobile computing device to authenticate a user. A first signal indicative of a body tremor of a limb holding the mobile computing device is detected. A second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured is also detected. Based on a comparison of the body tremors, a determination is made as to whether the limbs are the same limb. A user account associated with the wearable computing device is authenticated based on the determining indicating that the limbs are the same limb.
In one or more embodiments, authenticating the user includes granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, authenticating the user includes automatically answering an incoming phone call to the mobile computing device.
In some embodiments, the first signal is detected by converting accelerometer data from the mobile computing device to the frequency domain to produce the first signal, and the second signal is detected by converting accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
In some embodiments, determining whether the limbs are the same is characterized by determining a correlation between the first and second signals, and determining that the limbs are the same limb if the correlation indicates that the first and second signals differ by less than a difference threshold. In some embodiments, determining the correlation includes determining a first frequency profile of the first signal within a predefined bandwidth, determining a second frequency profile of the second signal within the predefined bandwidth, and correlating the first frequency profile with the second frequency profile.
According to another aspect of the present disclosure, a mobile computing device is disclosed that includes one or more processing circuits configured to detect a first signal indicative of a body tremor of a limb holding the mobile computing device, and to detect a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured. The one or more processing circuits are further configured to determine, based on a comparison of the body tremors, whether the limbs are the same limb. The one or more processing circuits are further configured to authenticate a user account associated with the wearable computing device based on the determining indicating that the limbs are the same limb. The mobile computing device also includes a communication interface circuit configured to communicate with the wearable computing device to enable the detection of the second signal.
In some embodiments, the one or more processing circuits are configured to authenticate the user by granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, one or more processing circuits are configured to authenticate the user by automatically answering an incoming phone call to the mobile computing device.
In some embodiments, the one or more processing circuits are configured to detect the first signal by converting accelerometer data from the mobile computing device to the frequency domain to produce the first signal, and to detect the second signal by converting accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
In some embodiments, the one or more processing circuits are configured to determine whether the limbs are the same by determining a correlation between the first and second signals, and determining that the limbs are the same limb if the correlation indicates that the first and second signals differ by less than a difference threshold. In some embodiments, the one or more processing circuits are configured to determine the correlation by determining a first frequency profile of the first signal within a predefined bandwidth, determining a second frequency profile of the second signal within the predefined bandwidth, and correlating the first frequency profile with the second frequency profile. According to another aspect of the present disclosure, a computer program product is stored in a non-transitory computer-readable medium for authenticating a user of a mobile computing device. The computer program product includes software instructions which, when run by a processor of the mobile computing device, configures the mobile computing device to detect a first signal indicative of a body tremor of a limb holding the mobile computing device, and detect a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured. The software instructions further configure the mobile computing device to determine, based on a comparison of the body tremors, whether the limbs are the same limb; and authenticate a user account associated with the wearable computing device based on the determining indicating that the limbs are the same limb.
In some embodiments, the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to grant access to a limited- access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to automatically answer an incoming phone call to the mobile computing device.
In some embodiments, the software instructions configure the mobile computing device to detect the first signal by configuring the mobile computing device to convert accelerometer data from the mobile computing device to the frequency domain to produce the first signal, and the software instructions configure the mobile computing device to detect the second signal by configuring the mobile computing device to convert accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
In some embodiments, the software instructions configure the mobile computing device to determine whether the limbs are the same by configuring the mobile computing device to determine a correlation between the first and second signals, and determine that the limbs are the same limb if the correlation indicates that the first and second signals differ by less than a difference threshold. In some embodiments, the software instructions configure the mobile computing device to determine the correlation configuring the mobile computing device to determine a first frequency profile of the first signal within a predefined bandwidth, determine a second frequency profile of the second signal within the predefined bandwidth, and correlate the first frequency profile with the second frequency profile.
According to another aspect of the present disclosure, a method is implemented by a mobile computing device to authenticate a user. A body tremor fingerprint is generated that is indicative of a body tremor of an authorized user. A signal is detected that is indicative of a body tremor of a current user in response to a trigger event. The body tremor of the current user is compared to the body tremor fingerprint for one or more authorized users. The current user is authenticated based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user. In some embodiments, authenticating the user includes granting access to a limited- access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, authenticating the user includes automatically answering an incoming phone call to the mobile computing device.
In one example, generating the body tremor fingerprint indicative of an authorized user comprises recording first accelerometer data using sensors of the mobile computing device at a first time when a limb of the authorized user is holding the mobile computing device, and converting the first accelerometer data to the frequency domain to generate the body tremor fingerprint. In some implementations of this embodiment, detecting the signal indicative of a body tremor of a current user comprises recording second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb of the current user is holding the mobile computing device; and converting the second accelerometer data to the frequency domain to detect the signal indicative of the body tremor of the current user.
Comparing the body tremor of the current user to the body tremor fingerprint for one or more authorized users could include determining a correlation between the signal and the body tremor fingerprint, and if the correlation indicates that the signal and the body tremor fingerprint differ by less than a difference threshold, determining that the current user is an authorized user.
Determining a correlation between the signal and the body tremor fingerprint could include: determining a first frequency profile of the body tremor fingerprint within a predefined bandwidth; determining a second frequency profile of the signal indicative of a body tremor of the current user within the predefined bandwidth; and determining a correlation between the first frequency profile and the second frequency profile.
The trigger event could include a detected movement of the mobile computing device from a resting position.
According to another aspect of the present disclosure, a mobile computing device includes one or more processing circuits configured to generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of a current user in response to a trigger event. The one or more processing circuits are further configured to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user. The mobile computing device also includes a memory circuit configured to store the body tremor fingerprint.
In some embodiments, the one or more processing circuits are configured to authenticate the user by granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, the one or more processing circuits are configured to authenticate the user by automatically answering an incoming phone call to the mobile computing device.
In some embodiments, to generate the body tremor fingerprint indicative of an authorized user, the one or more processing circuits are configured to record first accelerometer data using sensors of the mobile computing device at a first time when a limb of the authorized user is holding the mobile computing device, and convert the first accelerometer data to the frequency domain to generate the body tremor fingerprint. In some implementations of this embodiment, the one or more processing circuits are configured to detect the signal indicative of a body tremor of a current user by recording second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb of the current user is holding the mobile computing device; and converting the second accelerometer data to the frequency domain to detect the signal indicative of the body tremor of the current user.
In some embodiments, to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, the one or more processing circuits are configured to determine a correlation between the signal and the body tremor fingerprint; and if the correlation indicates that the signal and the body tremor fingerprint differ by less than a difference threshold, determine that the current user is an authorized user.
In some embodiments, to determine a correlation between the signal and the body tremor fingerprint, the one or more processing circuits are configured to: determine a first frequency profile of the body tremor fingerprint within a predefined bandwidth; determine a second frequency profile of the signal indicative of a body tremor of the current user within the predefined bandwidth; and determine a correlation between the first frequency profile and the second frequency profile.
The trigger event could include a detected movement of the mobile computing device from a resting position.
According to another aspect of the present disclosure, a computer program product is stored in a non-transitory computer-readable medium for authenticating a user of a mobile computing device. The computer program product comprises software instructions which, when run by a processor of a mobile computing device, configures the mobile computing device to generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of a current user in response to a trigger event. The instructions further configure the mobile computing device to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.
In some embodiments, the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to grant access to a limited- access feature on the mobile computing device (e.g., bypassing a lock screen). In the same or other embodiments, the software instructions configure the mobile computing device to authenticate the user by configuring the mobile computing device to automatically answering an incoming phone call to the mobile computing device.
In some embodiments, the software instructions configure the mobile computing device to generate the body tremor fingerprint indicative of an authorized user by configuring the mobile computing device to record first accelerometer data using sensors of the mobile computing device at a first time when a limb of the authorized user is holding the mobile computing device, and convert the first accelerometer data to the frequency domain to generate the body tremor fingerprint. In some implementations of this embodiment, the software instructions configure the mobile computing device to detect the signal indicative of a body tremor of a current user by configuring the mobile computing device to record second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb of the current user is holding the mobile computing device; and convert the second accelerometer data to the frequency domain to detect the signal indicative of the body tremor of the current user.
In some embodiments, the software instructions configure the mobile computing device to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users by configuring the mobile computing device to determine a correlation between the signal and the body tremor fingerprint; and if the correlation indicates that the signal and the body tremor fingerprint differ by less than a difference threshold, determine that the current user is an authorized user.
In some embodiments, the software instructions configure the mobile computing device to determine a correlation between the signal and the body tremor fingerprint by configuring the mobile computing device to: determine a first frequency profile of the body tremor fingerprint within a predefined bandwidth; determine a second frequency profile of the signal indicative of a body tremor of the current user within the predefined bandwidth; and determine a correlation between the first frequency profile and the second frequency profile.
The trigger event could include a detected movement of the mobile computing device from a resting position.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 illustrates an example mobile computing device and wearable computing device.
Fig. 2 illustrates an example method performed by the mobile computing device to authenticate a user according to one embodiment.
Fig. 3 illustrates an example implementation of aspects of the method of Fig. 2.
Fig. 4 illustrates an example mobile computing device and wearable computing device ' greater detail. Fig. 5 illustrates an example method performed by a mobile computing device to authenticate a user according to another embodiment.
Fig. 6 illustrates an example implementation of aspects of the method of Fig. 5.
Fig. 7 illustrates an example mobile computing device operative to implement the method of Fig. 5.
DETAILED DESCRIPTION
In every human body there are unintentional muscle movements along various body parts, which are known as physiological tremors (referred to as "body tremors" herein). A body tremor is an involuntary, approximately rhythmic and roughly sinusoidal movement which may or may not be noticeable by the human eye. Each person is believed to have a different unique body tremor, in part because the characteristics of body tremors of a person depend on the bone structure and the muscle tone/density of that person. The frequency of tremors in the wrist and hand typically range from 8 to 12 Hz, for example.
The present disclosure describes methods and related apparatuses for authenticating a user of a mobile computing device based on an analysis of signals indicative of a body tremor. In the prior art, physiological tremors have been suppressed (see, e.g., "Sensing Physiological Tremor in a Hand-Held Microsurgical Instrument" by Saxena, Abhijit et al. in the publication SBC2013-14185 of the ASME 2013 Summer Bioengineering Conference, June 26-29, Sunriver, Oregon, USA). Instead of suppressing such tremors, the techniques discussed herein analyze such tremors for authentication purposes. In this regard, the user's body tremor acts as a sort of token for authentication.
In some embodiments, a first signal indicative of a body tremor of a limb holding a mobile computing device is detected, and a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured is also detected. Based on a comparison of the body tremors, a determination is made of whether the limbs are the same limb (i.e., of whether the wearable computing device is secured to a same limb that is holding the mobile computing device). A user account of the mobile computing device that is associated with the wearable computing device is authenticated based on the determining indicating that the limbs are the same limb.
Typically, when a user presses a power button of a smartphone, a lock screen (e.g., a password protected lock screen) is activated before the user is permitted to access their home screen. The authentication performed based on a determination that a wearable computing device is secured to a limb, and a mobile computing device is being held by the same limb could include bypassing such a lock screen. Thus, authenticating the user account may include granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen of the mobile computing device), for example. As another example, authenticating the user may include automatically answering an incoming phone call to the mobile computing device.
Of course, other types of authentication could be used. For example, various features could be performed that that would otherwise require secondary authentication. For example, once a user is already past the lock screen and has access to their smartphone (i.e., a first authentication was successful), a password may be required to change a security setting or purchase a smartphone application (i.e., a second authentication). That second authentication could be performed without password entry based on the body tremor comparison discussed herein.
With this in mind, Fig. 1 schematically illustrates a system 10 for performing
authentication based on body tremors. The system 10 includes a mobile computing device 12 and a wearable computing device 14. The wearable computing device 14 is secured to a limb 16 which is an arm in the example of Fig. 1 , and the mobile computing device 12 is held by that same limb 16, via a hand 18 of the limb 16. Each of the mobile computing device 12 and wearable computing device 14 includes one or more accelerometers operative to detect movement. Although the wearable computing device is shown as a wrist-wearable device, it is understood that this is only an example, and that other wearable computing devices could be used (e.g., a ring or armband).
Fig. 2 illustrates an example method 100 performed by the mobile computing 12 device to authenticate a user based on body tremors according to one embodiment. A first signal is detected which is indicative of a body tremor of a limb holding the mobile computing device 12 (block 102). A second signal is detected which is indicative of a body tremor of a limb to which the separate wearable computing device 14 is secured (block 104). Based on a comparison of the body tremors, a determination is made of whether the limbs are the same limb (block 106). A user account associated with the wearable computing device 14 is authenticated based on the determining indicating that the limbs are the same limb (block 108).
In one or more embodiments, authenticating the user account includes granting access to a limited-access feature on the mobile computing device 12 (e.g., bypassing a lock screen of the mobile computing device 12) if there is no incoming call. In the same or other embodiments, authenticating the user includes automatically answering an incoming phone call to the mobile computing device 12 (e.g., as the mobile computing device 12 is being lifted towards a user's ear) when there is an incoming call.
Fig. 3 illustrates an example implementation 150 of aspects of the method 100 of Fig. 2. In the example of Fig. 3, blocks 152-156 are an example implementation of block 102 from Fig. 2, blocks 158-162 are an example implementation of block 104 from Fig. 2, and blocks 164-166 are an example implementation of block 106 from Fig. 2. To implement block 102,
accelerometer data is obtained from the mobile computing device 12 (block 152), a low pass filter (LPF) is applied to the accelerometer data (block 154), and a fast Fourier transform (FFT) is performed on the filtered accelerometer data (block 156) to yield the first signal 180. The first signal 180 is indicative of a body tremor of a limb holding the mobile computing device 12. The low pass filter filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors in the wrist and hand). The fast Fourier transform of block 156 converts the filtered accelerometer data from the mobile computing device 12 to the frequency domain so that the frequency of body tremors represented in the accelerometer data of mobile computing device 12 can be determined.
To implement block 104 of Fig. 2, accelerometer data is obtained from the wearable computing device 14 (block 158), a low pass filter is applied to the accelerometer data (block 160), and a fast Fourier transform is performed on the filtered accelerometer data (block 162) to yield the second signal 182. The second signal 182 is indicative of a body tremor of a limb to which the wearable computing device 14 is secured. The low pass filter filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors). The fast Fourier transform of block 162 converts the filtered accelerometer data from the wearable computing device 14 to the frequency domain so that the frequency of body tremors represented in the accelerometer data of the wearable computing device 14 can be determined.
Thus, in the embodiment of Fig. 3, detecting the first signal 180 comprises converting accelerometer data from the mobile computing device 12 to the frequency domain to produce the first signal 180, and detecting the second signal 182 comprises converting accelerometer data from the wearable computing device 14 to the frequency domain to produce the second signal 182.
To implement block 106 of Fig. 2, a correlation is determined between the first and second signals 180, 182 (block 164), and a determination is made as to whether the correlation differs by less than a difference threshold (block 166). If the correlation indicates that the first and second signals 180, 182 differ by less than a difference threshold (a "YES" to block 166), the mobile computing device 12 determines that the limbs are the same limb, and a user account of the mobile computing device 12 that is associated with the wearable computing device 14 is authenticated (block 108). Otherwise, if the difference is greater than the difference threshold (a "NO" to block 166), then the user account associated with the wearable computing device 14 is not authenticated (block 168).
In some embodiments, determining a correlation between the first and second signals 180, 182 (block 164) includes determining a first frequency profile of the first signal 180 within a predefined bandwidth (e.g., 8-12 Hz), determining a second frequency profile of the second signal 182 within the predefined bandwidth, and correlating the first frequency profile with the second frequency profile.
The correlation of block 164 can be performed in many different ways. One way to perform such a correlation would be to determine frequency peaks of each of the signals 180, 182 and then compare those peaks. Another way to perform the correlation would be to overlay the signals 180, 182 on top of each other. Of course, these are only examples, and it is understood that other correlation techniques could be used.
The accelerometer data from within a given sample interval is transmitted from the wearable computing device 14 to the mobile computing device 12 using a local wireless connection. The local connection may use Bluetooth, Bluetooth Low Energy (BLE), Zigbee, one or more 802.1 1 standards, a 433 MHz home automation band, or any combination thereof, for example. Such a local connection can be used to support a pairing between the wearable computing device 14 and the mobile computing device 12.
In one or more embodiments, the transfer of the accelerometer data is initiated when the wearable computing device 14 and mobile computing device 12 are within a predefined proximity of each other (e.g., on the order of 1 -2 meters).
Fig. 4 illustrates an example mobile computing device 300 and associated wearable computing device 400 that may be used as the mobile computing device 12 and wearable computing device 14 of Fig. 1 . The mobile computing device 300 is configured to perform the method 100 of Fig. 2 (e.g., as further depicted in the implementation of Fig. 3). The mobile computing device 300 includes one or more processing circuits (shown as processor 302), including, for example, one or more microprocessors, microcontrollers, Application Specific Integrated Circuits (ASICs), or the like configured with appropriate software and/or firmware to carry out one or more of the techniques discussed above. The one or more processing circuits of the processor 302 are configured to detect a first signal indicative of a body tremor of a limb holding the mobile computing device 300, and detect a second signal indicative of a body tremor of a limb to which the separate wearable computing device 400 is secured. The one or more processing circuits of the processor 302 are further configured to determine, based on a comparison of the body tremors, whether the limbs are the same limb, and to authenticate a user account associated with the wearable computing device 400 based on the determining indicating that the limbs are the same limb.
The mobile computing device 300 also includes a communication interface circuit (shown as "local connectivity circuit" 304) that is configured to communicate with the wearable computing device 400 to enable the detection of the second signal. In some embodiments, this includes receiving accelerometer data from the wearable computing device over local connection 350 (e.g., as shown in Fig. 3). The local connection 350 could use Bluetooth, Bluetooth Low Energy (BLE), Zigbee, one or more 802.1 1 standards, a 433 MHz home automation band, or any combination thereof, for example. Such a local connection can be used to support a pairing between the wearable computing device 400 and the mobile computing device 300.
The mobile computing device 300 also includes a tremor sensor circuit 306 that includes one or more accelerometers configured to provide accelerometer data (e.g., three axis accelerometer data) for a limb holding the mobile computing device 300 (e.g., for performance of blocks 102-104 in Fig. 2). In some embodiments, the tremor sensor circuit 306 may perform certain features when the main processor 302 is in a low-power mode. For example, some or all of the features described as being performed by processor 302 above (e.g., detecting the first and/or second signal, and determining if the limbs are the same limb) could be performed by the tremor sensor circuit 306 in some embodiments. The shared memory interface circuit 308 could be used to facilitate communication between the tremor sensor circuit 306 and local connectivity circuit 304 when the processor 302 is in the low-power mode.
The mobile computing device 300 includes a non-transitory computer-readable storage medium (shown as memory circuit 310) for storing instructions that configure the processor 302 as discussed above (e.g., a computer program 312 that configures the processor 302 to implement one or more of the techniques described above). Although not shown, the mobile computing device 300 could also include a power supply and electronic display, for example.
In some embodiments, the computer program product 312 includes software instructions which, when run by a processor of the mobile computing device 300 (e.g., processor 302 or possibly tremor sensor circuit 306), configures the mobile computing device 300 to: detect a first signal indicative of a body tremor of a limb holding the mobile computing device 300; detect a second signal indicative of a body tremor of a limb to which the separate wearable computing device 400 is secured. The instructions further configure the mobile computing device 300 to determine, based on a comparison of the body tremors, whether the limbs are the same limb; and authenticate a user account associated with the wearable computing device 400 based on the determining indicating that the limbs are the same limb.
Fig. 5 illustrates another example method 500 performed by a mobile computing device 12 to authenticate a user based on body tremors. A body tremor fingerprint indicative of a body tremor of an authorized user is generated (block 502). In this context, "body tremor fingerprint" refers to a representation of a unique body tremor of a user, and not to an image of the contours of that user's fingertip. A signal indicative of a body tremor of current user is detected in response to a trigger event (block 504). The body tremor of the current user is compared to the body tremor fingerprint for one or more authorized users (block 506). The current user is authenticated based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user (block 508). In one or more embodiments of the method 500, the wearable computing device 14 can be entirely omitted, because the body tremor fingerprint and signal indicative of a body tremor are both obtained based on accelerometer data recorded by the mobile computing device 12.
As in the embodiments above, authenticating the user could include granting access to a limited-access feature on the mobile computing device (e.g., bypassing a lock screen) and/or automatically answering an incoming phone call to the mobile computing device. Fig. 6 illustrates an example implementation 250 of aspects of the method 500 of Fig. 5. In the example of Fig. 6, blocks 552-556 are an example implementation of block 502 from Fig. 5, blocks 558-562 are an example implementation of block 504 from Fig. 5, and blocks 564-566 are an example implementation of block 506 from Fig. 5. To implement block 502,
accelerometer data is obtained from the mobile computing device 12 at a first time (block 552), a low pass filter is applied to the accelerometer data (block 554), and a fast Fourier transform (FFT) is performed on the filtered accelerometer data (block 556) to yield body tremor fingerprint 580. The low pass filter (LPF) filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors). The fast Fourier transform of block 556 converts the filtered accelerometer data from the mobile computing device 12 to the frequency domain so that the frequency of body tremors represented in the accelerometer data of block 552 can be determined.
Thus, in the embodiment of Fig. 6, generating the body tremor fingerprint indicative of an authorized user comprises recording first accelerometer data using sensors of the mobile computing device 12 at a first time when a limb 16 of the authorized user is holding the mobile computing device 12, and converting the first accelerometer data to the frequency domain to produce the body tremor fingerprint 580.
To implement block 504 of Fig. 5, accelerometer data is obtained from the mobile computing device 12 at a second time that is subsequent to the first time (block 558), a low pass filter is applied to the accelerometer data (block 560), and a fast Fourier transform is performed on the filtered accelerometer data (block 562) to yield the signal 582 indicative of the current user. The low pass filter filters out unwanted frequencies, so that only frequencies of interest are present (e.g., those on the order of 8-12 Hz which are representative of body tremors). The fast Fourier transform of block 562 converts the filtered accelerometer data from the mobile computing device 12 to the frequency domain so that the frequency of body tremors
represented in the accelerometer data of block 558 can be determined.
Thus, in the embodiment of Fig. 6, detecting the signal indicative of a body tremor of a current user in response to a trigger event comprises recording second accelerometer data using sensors of the mobile computing device at a second time, subsequent to the first time, when a limb 16 of the current user is holding the mobile computing device 12; and converting the second accelerometer data to the frequency domain to determine the signal 582 indicative of the body tremor of the current user.
To implement block 506 of Fig. 5, a correlation is determined between the body tremor of the current user (represented by signal 582) and the body tremor fingerprint 580 (block 564), and a determination is made as to whether the correlation differs by less than a difference threshold (block 566). If the correlation indicates that the difference between the body tremor fingerprint and the signal indicative of the body tremor of the current user is less than a difference threshold (a "YES" to block 566), the mobile computing device 12 determines that the current user is an authorized user, and the current user is authenticated (block 508). Otherwise, if the difference is greater than the difference threshold (a "NO" to block 566), then the current user of the mobile computing device 12 is not authenticated.
In some embodiments, determining a correlation between the body tremor of the current user and the body tremor fingerprint (block 564) includes determining a first frequency profile of the body tremor fingerprint 580 within a predefined bandwidth (e.g., 8-12 Hz), determining a second frequency profile of the signal 582 indicative of a body tremor of the current user within the predefined bandwidth, and determining a correlation between the first frequency profile and the second frequency profile.
The correlation of block 564 can be performed in many different ways. One way to perform such a correlation would be to determine frequency peaks of each of the signals 580, 582 and then compare those peaks. Another way to perform the correlation would be to overlay the signals 580, 582 on top of each other. Of course, these are only examples, and it is understood that other correlation methods could be used.
In one or more embodiments, the trigger event comprises a detected movement of the mobile computing device from a resting position.
Fig. 7 illustrates an example mobile computing device 600 that is configured to perform the method 500 of Fig. 5 (e.g., as further depicted in the implementation of Fig. 6). The mobile computing device 600 includes one or more processing circuits (shown as processor 602), including, for example, one or more microprocessors, microcontrollers, Application Specific Integrated Circuits (ASICs), or the like configured with appropriate software and/or firmware to carry out one or more of the techniques discussed above. The one or more processing circuits of the processor 602 are configured to generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of current user in response to a trigger event. The one or more processing circuits of the processor 602 are further configured to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.
The mobile computing device 600 includes a tremor sensor circuit 606 that includes one or more accelerometers configured to provide accelerometer data (e.g., three axis
accelerometer data) for a limb holding the mobile computing device 600 (e.g., for performance of blocks 502-504 of Fig. 5). In some embodiments, the tremor sensor circuit 506 may perform certain features when the main processor 602 is in a low-power mode. For example, some or all of the features described as being performed by processor 502 above (e.g., detecting a signal indicative of a body tremor of a current user in response to a trigger event) could be performed by the tremor sensor circuit 606 in some embodiments (e.g., when the main processor 302 is in the low-power mode). The mobile computing device 600 includes a non-transitory computer-readable storage medium (shown as memory circuit 610) configured to store configured to store the body tremor fingerprint. The memory circuit 610 is further configured to store instructions that configure the processor 602 as discussed above (e.g., a computer program 612 that configures the processor 602 to implement the method 500 described above). Although not shown, the mobile computing device 600 could also include a power supply and electronic display, for example.
The mobile computing device 600 optionally includes a communication interface circuit 604 (shown as "local connectivity circuit" 304) that is configured to communicate wirelessly with other devices. The communication interface 604 could be configured to use Bluetooth, Bluetooth Low Energy (BLE), Zigbee, one or more 802.1 1 standards, a 433 MHz home automation band, or any combination thereof, for example.
In one or more embodiments, a computer program product 612 is stored in a non- transitory computer-readable medium (e.g., memory circuit 610) for authenticating a user of a mobile computing device 600. The computer program product 612 comprises software instructions which, when run by processor 602 of the mobile computing device 600, configures the mobile computing device 600 to: generate a body tremor fingerprint indicative of a body tremor of an authorized user, and detect a signal indicative of a body tremor of current user in response to a trigger event. The instructions further configure the mobile computing device 600 to compare the body tremor of the current user to the body tremor fingerprint for one or more authorized users, and authenticate the current user based on the comparison indicating that the body tremor of the current user matches the body tremor fingerprint for an authorized user.
Although an example frequency range of 8-12 Hz is discussed herein as being indicative of body tremors, it is understood that other frequency ranges could be used.
The present disclosure may, of course, be carried out in other ways than those specifically set forth herein without departing from essential characteristics of the present disclosure. The present embodiments are to be considered in all respects as illustrative and not restrictive, and all changes coming within the meaning and equivalency range of the appended claims are intended to be embraced therein.

Claims

CLAIMS What is claimed is:
1 . A method implemented by a mobile computing device to authenticate a user, characterized by:
detecting a first signal indicative of a body tremor of a limb holding the mobile computing device;
detecting a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured;
determining, based on a comparison of the body tremors, whether the limbs are the same limb; and
authenticating a user account associated with the wearable computing device based on the determining indicating that the limbs are the same limb.
2. The method of claim 1 , wherein authenticating the user account is characterized by granting access to a limited-access feature on the mobile computing device.
3. The method of claim 2, wherein authenticating the user account is characterized by bypassing a lock screen of the mobile computing device.
4. The method of claim 1 , wherein authenticating the user is characterized by automatically answering an incoming phone call to the mobile computing device.
5. The method of any one of claims 1 -4:
wherein detecting the first signal comprises converting accelerometer data from the mobile computing device to the frequency domain to produce the first signal; and wherein detecting the second signal comprises converting accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
6. The method of any one of claims 1 -5, wherein the determining is characterized by: determining a correlation between the first and second signals; and
if the correlation indicates that the first and second signals differ by less than a
difference threshold, determining that the limbs are the same limb.
7. The method of claim 6, wherein determining a correlation between the first and second signals is characterized by:
determining a first frequency profile of the first signal within a predefined bandwidth; determining a second frequency profile of the second signal within the predefined bandwidth; and
determining a correlation between the first frequency profile and the second frequency profile.
8. A mobile computing device comprising:
one or more processing circuits configured to:
detect a first signal indicative of a body tremor of a limb holding the mobile
computing device;
detect a second signal indicative of a body tremor of a limb to which a separate wearable computing device is secured;
determine, based on a comparison of the body tremors, whether the limbs are the same limb; and
authenticate a user account associated with the wearable computing device based on the determining indicating that the limbs are the same limb; and a communication interface circuit configured to communicate with the wearable
computing device to enable the detection of the second signal.
9. The mobile computing device of claim 8, wherein to authenticate the user account, the one or more processing circuits are configured to grant access to a limited-access feature on the mobile computing device.
10. The mobile computing device of claim 8, wherein to authenticate the user account, the one or more processing circuits are configured to bypass a lock screen of the mobile computing device.
1 1 . The mobile computing device of claim 8, wherein to authenticate the user account, the one or more processing circuits are configured to automatically answer an incoming phone call to the mobile computing device.
12. The mobile computing device of any one of claims 8-1 1 :
wherein to detect the first signal, the one or more processing circuits are configured to convert accelerometer data from the mobile computing device to the frequency domain to produce the first signal; and
wherein to detect the second signal, the one or more processing circuits are configured to convert accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
13. The mobile computing device of any one of claims 8-12, wherein to determine whether the limbs are the same limb, the one or more processing circuits are configured to:
determine a correlation between the first and second signals; and
if the correlation indicates that the first and second signals differ by less than a
difference threshold, determine that the limbs are the same limb.
14. The mobile computing device of claim 13, wherein to determine a correlation between the first and second signals, the one or more processing circuits are configured to:
determine a first frequency profile of the first signal within a predefined bandwidth; determine a second frequency profile of the second signal within the predefined
bandwidth; and
determining a correlation between the first frequency profile and the second frequency profile.
15. A computer program product stored in a non-transitory computer-readable medium for authenticating a user of a mobile computing device, the computer program product comprising software instructions which, when run by a processor of the mobile computing device, configures the mobile computing device to:
detect a first signal indicative of a body tremor of a limb holding the mobile computing device;
detect a second signal indicative of a body tremor of a limb to which a separate
wearable computing device is secured;
determine, based on a comparison of the body tremors, whether the limbs are the same limb; and
authenticate a user account associated with the wearable computing device based on the determining indicating that the limbs are the same limb.
16. The computer program product of claim 15, wherein the software instructions configure the mobile computing device to authenticate the user account by configuring the mobile computing device to grant access to a limited-access feature on the mobile computing device.
17. The computer program product of claim 15, wherein the software instructions configure the mobile computing device to authenticate the user account by configuring the mobile computing device to bypass a lock screen of the mobile computing device.
18. The computer program product of claim 15, wherein the software instructions configure the mobile computing device to authenticate the user account by configuring the mobile computing device to automatically answer an incoming phone call to the mobile computing device.
19. The computer program product of any one of claims 15-18:
wherein to configure the mobile computing device to detect the first signal, the software instructions configure the mobile computing device to convert accelerometer data from the mobile computing device to the frequency domain to produce the first signal; and
wherein to configure the mobile computing device to detect the second signal, the
software instructions configure the mobile computing device to convert accelerometer data from the wearable computing device to the frequency domain to produce the second signal.
20. The computer program product of any one of claims 15-19, wherein to configure the mobile computing device to determine whether the limbs are the same limb, the software instructions configure the mobile computing device to:
determine a correlation between the first and second signals; and
if the correlation indicates that the first and second signals differ by less than a
difference threshold, determine that the limbs are the same limb.
21 . The computer program product of claim 20, wherein to configure the mobile computing device to determine the correlation between the first and second signals, the software instructions configure the mobile computing device to:
determine a first frequency profile of the first signal within a predefined bandwidth; determine a second frequency profile of the second signal within the predefined
bandwidth; and
determining a correlation between the first frequency profile and the second frequency profile.
PCT/IB2014/061221 2014-05-05 2014-05-05 User authentication based on body tremors WO2015170139A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP14726779.3A EP3140765B1 (en) 2014-05-05 2014-05-05 User authentication based on body tremors
PCT/IB2014/061221 WO2015170139A1 (en) 2014-05-05 2014-05-05 User authentication based on body tremors
US14/429,983 US20160259926A1 (en) 2014-05-05 2014-05-05 User Authentication Based on Body Tremors
CN201480078498.1A CN106462682B (en) 2014-05-05 2014-05-05 Authenticate method, the mobile computing device, computer readable storage medium of user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2014/061221 WO2015170139A1 (en) 2014-05-05 2014-05-05 User authentication based on body tremors

Publications (1)

Publication Number Publication Date
WO2015170139A1 true WO2015170139A1 (en) 2015-11-12

Family

ID=50829230

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2014/061221 WO2015170139A1 (en) 2014-05-05 2014-05-05 User authentication based on body tremors

Country Status (4)

Country Link
US (1) US20160259926A1 (en)
EP (1) EP3140765B1 (en)
CN (1) CN106462682B (en)
WO (1) WO2015170139A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105792107A (en) * 2016-03-02 2016-07-20 上海国际汽车城(集团)有限公司 Identity identification compound system based on Bluetooth wearable device and application thereof
EP3448078A1 (en) * 2017-08-21 2019-02-27 Sony Corporation Electronic device, system and method for data communication

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10375081B2 (en) * 2014-08-13 2019-08-06 Intel Corporation Techniques and system for extended authentication
US9977887B2 (en) * 2015-09-17 2018-05-22 Sony Mobile Communications Inc. Electronic device and method for validation of a trusted user
EP3629922B1 (en) 2017-05-26 2022-01-12 Indian Institute of Technology, Guwahati A point-of-care hand tremor detection system
EP3838141A1 (en) * 2019-12-17 2021-06-23 Koninklijke Philips N.V. System and method to determine if a device is worn on a subject's dominant limb

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050008148A1 (en) * 2003-04-02 2005-01-13 Dov Jacobson Mouse performance identification
US20050243061A1 (en) * 2004-04-30 2005-11-03 Hillcrest Communications, Inc. Methods and devices for identifying users based on tremor
EP2378748A1 (en) * 2010-02-26 2011-10-19 Research In Motion Limited Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods
US20120124662A1 (en) * 2010-11-16 2012-05-17 Baca Jim S Method of using device motion in a password
US20130234836A1 (en) * 2008-08-08 2013-09-12 Assa Abloy Ab Directional sensing mechanism and communications authentication
US20140085050A1 (en) * 2012-09-25 2014-03-27 Aliphcom Validation of biometric identification used to authenticate identity of a user of wearable sensors

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120075173A1 (en) * 2010-09-23 2012-03-29 Nokia Corporation Apparatus and method for user input
JP2012113383A (en) * 2010-11-22 2012-06-14 Toshiba Corp Human body communication device and authentication method therefor
EP2600319A1 (en) * 2011-11-29 2013-06-05 Gemalto SA Pairing system between a terminal and an eGo-type element worn on the wrist or the hand of a user and corresponding method
US8863307B2 (en) * 2012-06-05 2014-10-14 Broadcom Corporation Authenticating users based upon an identity footprint
US9907103B2 (en) * 2013-05-31 2018-02-27 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Mobile terminal, wearable device, and equipment pairing method
US9674697B2 (en) * 2013-07-24 2017-06-06 Htc Corporation Method for operating mobile device, mobile device using the same, wearable device using the same, and computer readable medium
KR102193274B1 (en) * 2013-12-05 2020-12-22 삼성전자 주식회사 Unlock method and apparatus
GB2521833A (en) * 2014-01-02 2015-07-08 Nokia Technologies Oy An apparatus, method and computer program for enabling a user to make user inputs
US9826400B2 (en) * 2014-04-04 2017-11-21 Qualcomm Incorporated Method and apparatus that facilitates a wearable identity manager

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050008148A1 (en) * 2003-04-02 2005-01-13 Dov Jacobson Mouse performance identification
US20050243061A1 (en) * 2004-04-30 2005-11-03 Hillcrest Communications, Inc. Methods and devices for identifying users based on tremor
US20130234836A1 (en) * 2008-08-08 2013-09-12 Assa Abloy Ab Directional sensing mechanism and communications authentication
EP2378748A1 (en) * 2010-02-26 2011-10-19 Research In Motion Limited Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods
US20120124662A1 (en) * 2010-11-16 2012-05-17 Baca Jim S Method of using device motion in a password
US20140085050A1 (en) * 2012-09-25 2014-03-27 Aliphcom Validation of biometric identification used to authenticate identity of a user of wearable sensors

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SAXENA, ABHIJIT ET AL.: "Sensing Physiological Tremor in a Hand-Held Microsurgical Instrument", SBC2013-14185 OF THE ASME 2013 SUMMER BIOENGINEERING CONFERENCE

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105792107A (en) * 2016-03-02 2016-07-20 上海国际汽车城(集团)有限公司 Identity identification compound system based on Bluetooth wearable device and application thereof
EP3448078A1 (en) * 2017-08-21 2019-02-27 Sony Corporation Electronic device, system and method for data communication

Also Published As

Publication number Publication date
CN106462682B (en) 2019-09-06
US20160259926A1 (en) 2016-09-08
EP3140765A1 (en) 2017-03-15
CN106462682A (en) 2017-02-22
EP3140765B1 (en) 2019-12-18

Similar Documents

Publication Publication Date Title
EP3140765B1 (en) User authentication based on body tremors
US11720656B2 (en) Live user authentication device, system and method
US11461446B2 (en) Information processing device, application software start-up system, and application software start-up method
CN107667375B (en) Method for determining ingress or egress using a wearable device, access control reader and mobile device
US9472033B2 (en) Preauthorized wearable biometric device, system and method for use thereof
EP3161707B1 (en) Wearable electronic device and method for securing same
EP3254217A1 (en) Asset accessibility with continuous authentication for mobile devices
CN114846527A (en) User state monitoring system and method using motion, and user access authorization system and method employing the same
JP6763821B2 (en) Authentication system, authentication method and authentication program
EP3219171B1 (en) Controlling devices based on collocation of the devices on a user
US20220229895A1 (en) Live user authentication device, system and method and fraud or collusion prevention using same
CN106658259B (en) A kind of headset control method and earphone
JP2018156479A (en) Authentication system, authentication device, and authentication method
JP2018084859A (en) Authentication system, authentication control apparatus, authentication apparatus and program
JP2018042745A (en) Authentication system, authentication device, and authentication method
JP2017038766A (en) Personal authentication device and personal authentication method by biological information
CN106656352A (en) Information transmission method and apparatus, and wearable device
JP2017140070A (en) Authentication system, method, and program
Murali et al. Continuous Authentication Using Human-Induced Electric Potential

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 14429983

Country of ref document: US

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14726779

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2014726779

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014726779

Country of ref document: EP