AU2021101726A4 - A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication - Google Patents
A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication Download PDFInfo
- Publication number
- AU2021101726A4 AU2021101726A4 AU2021101726A AU2021101726A AU2021101726A4 AU 2021101726 A4 AU2021101726 A4 AU 2021101726A4 AU 2021101726 A AU2021101726 A AU 2021101726A AU 2021101726 A AU2021101726 A AU 2021101726A AU 2021101726 A4 AU2021101726 A4 AU 2021101726A4
- Authority
- AU
- Australia
- Prior art keywords
- screen
- party
- fingers
- inactive
- finger
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
Abstract
A Novel Approach to Active and Inactive Entire Device's Screen for
Fingers with Fingerprint Authentication
Abstract:
Our gadgets like smart phones, contact screen gadgets, and so on will store a
plenty of delicate data. To ensure this data, gadget working frameworks, for
example, Apple's iOS and Android have locking components. These require
client verification before access is conceded. One of the most widely
recognized components is fingerprint login, a type of biometric innovation
previously presented by Apple.
Fingerprint filtering is utilized in many smart phones as an approach to open
the home screen and approve online exchanges. The client appreciates a fast
and simple cycle and doesn't need to manage the bother of making or
recollecting a secret phrase. In addition, fingerprint filtering is safer than a
secret phrase on the grounds that our one of a kind organic attributes can't be
broken or handily copied.
As a result of present enhancements, it is good to enhance further by
considering entire device's screen rather than just one time login in an active
session. This option can provide us an easier, quick and instant login
experience every time for every finger and every click which will be playing
on the smart mobile screen. Hence, it is fairly good approach to Active the
entire device's screen for unauthorized fingers and Inactive for authorized
fingers in any movement(similar to freeze or unfreeze). This will give a
robust security for our daily devices against misuse in the future! Here,
proposed freezing does not relate to overheating CPU, bad memory or
failing power supply/Hardware problems.
A Novel Approach to Make Active and Inactive Entire Device's Screen
for Fingers with Fingerprint Authentication
First Party Access (Owner)
Finger-Prints Smart-Phone Screen - Active
Second Party Access
Finger-Prints Smart-Phone Screen - InActive
Figure -1: Functionality of smart phones when accessed by first party and second party with
help of set/subset of finger-prints
Description
A Novel Approach to Make Active and Inactive Entire Device's Screen for Fingers with Fingerprint Authentication
First Party Access (Owner)
Finger-Prints Smart-Phone Screen - Active
Second Party Access
Finger-Prints Smart-Phone Screen - InActive
Figure -1: Functionality of smart phones when accessed by first party and second party with help of set/subset of finger-prints
A Novel Approach to Active and Inactive Entire Device's Screen for Fingers with Fingerprint Authentication
[01] The personification herein generally relates to the field of Smart Mobile Devices/Phones. More particularly, the invention provides freezing and unfreezing capabilities for unauthorized and authorized fingers respectively for smart phones.
[02]Biometric security systems can reinstate the habitual method of entering passwords or PINs with a swipe of a finger so that the phone can be unlocked and used. Biometric methods embedded in mobile phones including fingerprint recognition, signature recognition, face recognition, voice recognition, and iris Recognition.
[03] Biometrics are important for the forefront of innovation. Set forth plainly, biometrics are any measurements identified with human highlights. The most widely recognized instances of a biometric acknowledgment framework are the iPhone's fingerprint and facial acknowledgment innovation. As an arising innovation, biometric frameworks can add extraordinary accommodation by supplanting passwords and aiding law authorization get lawbreakers. Biometric identifiers likewise go about as access control in secure conditions, both physical and advanced.
[04] Yet, the primary inquiry: Is my single biometric fingerprint information secure from data fraud? Why donot each time check or moment authentication required whenever left unattended after a login? This is where a new approach is required to protect from unauthorized fingers in any situation even if owner logged in and left unattended. This can give a robust security for our devices against future theft!
[05] The majority common cause of data stealing is, breaking login credentials either by PIN extracting or grabbing mobile which is unattended post login. So unresponsive screen would be an expected behavior.
[06] According to the personification, the existing device is a smart phone where security is a major concern if you'r smart phone is in 2nd party's hand. Our invention is to make screen inactive when a smart phone is accessed by a 2"d party and placing their fingers on the screen. However, then invention too makes to come back to active when an owner places his fingers on the screen. The number of fingers and its finger-prints for a smart phone usage could be configurable by the user and such fingers print will be compared with the 2 party's fingers prints that are unauthorized.
[07] A main objective of the present invention is thus to mitigate the current security lacking in the smart phones. The invention provides a robust security to make screen active and inactive based on set/subset of the fingerprints of the first/second party.
[08] The detailed description is set forth with reference to the accompanying figure. Figure 1 illustrates the smart phone functionality when accessed by first party and second party and identification of finger-prints by comparing one or more fingers(prints) of the owner (first party) with the second party's fingers(prints).
[09] As we all know that data is precious, and gadgets like smart phones, contact screen, and so on will store a plenty of delicate information. Loosing data/records would be a disaster especially with single level security like one finger print usage and login by others(second party). So, this proposes an application to have next level of security where 1 to 10 finger-prints are used to protect the smart phones for making active or inactive screens.
[10] When a screen turns into inactive means, the smart phone is in second party's hand, where as if it turns into active screen means; it is in owner/first party's hand. So, it ensures security is at max.
[11] The application would also include set/subset of finger-prints of the first party's and all of them will be compared on to the second party's finger prints which is not stored but compared dynamically with the stored one which first party's finger prints. So, it ensures, smart phone can turn active or not-active or vice versa depends upon who is using it. This ensures data stealing can be prevented a max.
[12] This option can provide us an easier, quick and instant login experience every time for every finger and every click which will be playing on the screen. Hence, it is fairly good approach to Active the entire device's screen for unauthorized fingers and Inactive for authorized fingers in any movement. This will give a robust security for our daily devices against misuse in the future !
[08] Hence, this is totally a new concept which is unique, compact and robust in design w.r.t security and highly usable application.
Claims (2)
- A Novel Approach to Active and Inactive Entire Device's Screen for Fingers with Fingerprint AuthenticationWE CLAIM 1. An extended security measure has been developed without affecting the existed smart phone functionality and provides a robust security to make screen active and inactive based on set/subset of the fingerprints of the first/second parties. Here, first party's smart phones stores only first party's finger prints and rest finger prints are not stored so when smart phone is accessed by the second party , then it will be in inactive state(nobody can access data from this phone) by comparing first party's finger print v/s second parry's finger prints.
- 2. It also claims that fingers of the first party could be set/subset of his fingers (like 1 tolO fingers) and associated finger-prints. Any combinations can be used to make screen active and inactive, so that second party does not misuse the smart phone. So, nobody can access data from the phone if not authorized.A Novel Approach to Make Active and Inactive Entire Device’s Screen 28 Jun 2021for Fingers with Fingerprint Authentication 2021101726Figure -1: Functionality of smart phones when accessed by first party and second party with help of set/subset of finger-prints
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021101726A AU2021101726A4 (en) | 2021-04-05 | 2021-04-05 | A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021101726A AU2021101726A4 (en) | 2021-04-05 | 2021-04-05 | A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021101726A4 true AU2021101726A4 (en) | 2022-01-06 |
Family
ID=78958449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021101726A Ceased AU2021101726A4 (en) | 2021-04-05 | 2021-04-05 | A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021101726A4 (en) |
-
2021
- 2021-04-05 AU AU2021101726A patent/AU2021101726A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101933051B (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
US6819219B1 (en) | Method for biometric-based authentication in wireless communication for access control | |
US8473748B2 (en) | Mobile device-based authentication | |
JP4578244B2 (en) | Method for performing secure electronic transactions using portable data storage media | |
US20150100485A1 (en) | Biometric confirmation for bank card transaction | |
US20140020074A1 (en) | Methods and systems for improving the security of secret authentication data during authentication transactions | |
US10868672B1 (en) | Establishing and verifying identity using biometrics while protecting user privacy | |
CN110048998B (en) | Token-based identity authentication method and system and intelligent door lock | |
US20140020058A1 (en) | Methods and systems for improving the security of secret authentication data during authentication transactions | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN101313314B (en) | A method and system for transaction validation | |
CN111131202A (en) | Identity authentication method and system based on multiple information authentication | |
CN107733868A (en) | Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium | |
WO2016188230A1 (en) | Unlocking method and device | |
JP2003509771A (en) | Security equipment | |
US20120102565A1 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
US20030014642A1 (en) | Security arrangement | |
AU2021101726A4 (en) | A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication | |
CN112334896B (en) | Unlocking method and equipment of terminal equipment and storage medium | |
CN108122111B (en) | Secure payment method, device, storage medium and computer equipment | |
JP2002074365A (en) | Identity authentication system | |
AU2021101758A4 (en) | A Novel Approach to Login Smart Phones with Sequence of Multiple Finger Prints for Robust Authentication | |
KR102060563B1 (en) | Method and apparatus for providing authentication using voice and facial data | |
JP4760124B2 (en) | Authentication device, registration device, registration method, and authentication method | |
JP2006053808A (en) | Operator authentication management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NB | Applications allowed - extensions of time section 223(2) |
Free format text: THE TIME IN WHICH TO COMPLY WITH A DIRECTION UNDER REG 3.2B HAS BEEN EXTENDED TO 15 JUL 2021 |
|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |