AU2021101726A4 - A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication - Google Patents

A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication Download PDF

Info

Publication number
AU2021101726A4
AU2021101726A4 AU2021101726A AU2021101726A AU2021101726A4 AU 2021101726 A4 AU2021101726 A4 AU 2021101726A4 AU 2021101726 A AU2021101726 A AU 2021101726A AU 2021101726 A AU2021101726 A AU 2021101726A AU 2021101726 A4 AU2021101726 A4 AU 2021101726A4
Authority
AU
Australia
Prior art keywords
screen
party
fingers
inactive
finger
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021101726A
Inventor
Praveen M. V.
Rudresh M.
Chandrakant Naikodi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2021101726A priority Critical patent/AU2021101726A4/en
Application granted granted Critical
Publication of AU2021101726A4 publication Critical patent/AU2021101726A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints

Abstract

A Novel Approach to Active and Inactive Entire Device's Screen for Fingers with Fingerprint Authentication Abstract: Our gadgets like smart phones, contact screen gadgets, and so on will store a plenty of delicate data. To ensure this data, gadget working frameworks, for example, Apple's iOS and Android have locking components. These require client verification before access is conceded. One of the most widely recognized components is fingerprint login, a type of biometric innovation previously presented by Apple. Fingerprint filtering is utilized in many smart phones as an approach to open the home screen and approve online exchanges. The client appreciates a fast and simple cycle and doesn't need to manage the bother of making or recollecting a secret phrase. In addition, fingerprint filtering is safer than a secret phrase on the grounds that our one of a kind organic attributes can't be broken or handily copied. As a result of present enhancements, it is good to enhance further by considering entire device's screen rather than just one time login in an active session. This option can provide us an easier, quick and instant login experience every time for every finger and every click which will be playing on the smart mobile screen. Hence, it is fairly good approach to Active the entire device's screen for unauthorized fingers and Inactive for authorized fingers in any movement(similar to freeze or unfreeze). This will give a robust security for our daily devices against misuse in the future! Here, proposed freezing does not relate to overheating CPU, bad memory or failing power supply/Hardware problems. A Novel Approach to Make Active and Inactive Entire Device's Screen for Fingers with Fingerprint Authentication First Party Access (Owner) Finger-Prints Smart-Phone Screen - Active Second Party Access Finger-Prints Smart-Phone Screen - InActive Figure -1: Functionality of smart phones when accessed by first party and second party with help of set/subset of finger-prints

Description

A Novel Approach to Make Active and Inactive Entire Device's Screen for Fingers with Fingerprint Authentication
First Party Access (Owner)
Finger-Prints Smart-Phone Screen - Active
Second Party Access
Finger-Prints Smart-Phone Screen - InActive
Figure -1: Functionality of smart phones when accessed by first party and second party with help of set/subset of finger-prints
A Novel Approach to Active and Inactive Entire Device's Screen for Fingers with Fingerprint Authentication
FIELD OF INVENTION
[01] The personification herein generally relates to the field of Smart Mobile Devices/Phones. More particularly, the invention provides freezing and unfreezing capabilities for unauthorized and authorized fingers respectively for smart phones.
BACKGROUND AND PRIOR ART:
[02]Biometric security systems can reinstate the habitual method of entering passwords or PINs with a swipe of a finger so that the phone can be unlocked and used. Biometric methods embedded in mobile phones including fingerprint recognition, signature recognition, face recognition, voice recognition, and iris Recognition.
[03] Biometrics are important for the forefront of innovation. Set forth plainly, biometrics are any measurements identified with human highlights. The most widely recognized instances of a biometric acknowledgment framework are the iPhone's fingerprint and facial acknowledgment innovation. As an arising innovation, biometric frameworks can add extraordinary accommodation by supplanting passwords and aiding law authorization get lawbreakers. Biometric identifiers likewise go about as access control in secure conditions, both physical and advanced.
[04] Yet, the primary inquiry: Is my single biometric fingerprint information secure from data fraud? Why donot each time check or moment authentication required whenever left unattended after a login? This is where a new approach is required to protect from unauthorized fingers in any situation even if owner logged in and left unattended. This can give a robust security for our devices against future theft!
SUMMARY OF THE INVENTION
[05] The majority common cause of data stealing is, breaking login credentials either by PIN extracting or grabbing mobile which is unattended post login. So unresponsive screen would be an expected behavior.
[06] According to the personification, the existing device is a smart phone where security is a major concern if you'r smart phone is in 2nd party's hand. Our invention is to make screen inactive when a smart phone is accessed by a 2"d party and placing their fingers on the screen. However, then invention too makes to come back to active when an owner places his fingers on the screen. The number of fingers and its finger-prints for a smart phone usage could be configurable by the user and such fingers print will be compared with the 2 party's fingers prints that are unauthorized.
OBJECTS OF THE INVENTION
[07] A main objective of the present invention is thus to mitigate the current security lacking in the smart phones. The invention provides a robust security to make screen active and inactive based on set/subset of the fingerprints of the first/second party.
BRIEF DESCRIPTIONS OF DRAWINGS
[08] The detailed description is set forth with reference to the accompanying figure. Figure 1 illustrates the smart phone functionality when accessed by first party and second party and identification of finger-prints by comparing one or more fingers(prints) of the owner (first party) with the second party's fingers(prints).
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[09] As we all know that data is precious, and gadgets like smart phones, contact screen, and so on will store a plenty of delicate information. Loosing data/records would be a disaster especially with single level security like one finger print usage and login by others(second party). So, this proposes an application to have next level of security where 1 to 10 finger-prints are used to protect the smart phones for making active or inactive screens.
[10] When a screen turns into inactive means, the smart phone is in second party's hand, where as if it turns into active screen means; it is in owner/first party's hand. So, it ensures security is at max.
[11] The application would also include set/subset of finger-prints of the first party's and all of them will be compared on to the second party's finger prints which is not stored but compared dynamically with the stored one which first party's finger prints. So, it ensures, smart phone can turn active or not-active or vice versa depends upon who is using it. This ensures data stealing can be prevented a max.
[12] This option can provide us an easier, quick and instant login experience every time for every finger and every click which will be playing on the screen. Hence, it is fairly good approach to Active the entire device's screen for unauthorized fingers and Inactive for authorized fingers in any movement. This will give a robust security for our daily devices against misuse in the future !
[08] Hence, this is totally a new concept which is unique, compact and robust in design w.r.t security and highly usable application.

Claims (2)

  1. A Novel Approach to Active and Inactive Entire Device's Screen for Fingers with Fingerprint Authentication
    WE CLAIM 1. An extended security measure has been developed without affecting the existed smart phone functionality and provides a robust security to make screen active and inactive based on set/subset of the fingerprints of the first/second parties. Here, first party's smart phones stores only first party's finger prints and rest finger prints are not stored so when smart phone is accessed by the second party , then it will be in inactive state(nobody can access data from this phone) by comparing first party's finger print v/s second parry's finger prints.
  2. 2. It also claims that fingers of the first party could be set/subset of his fingers (like 1 tolO fingers) and associated finger-prints. Any combinations can be used to make screen active and inactive, so that second party does not misuse the smart phone. So, nobody can access data from the phone if not authorized.
    A Novel Approach to Make Active and Inactive Entire Device’s Screen 28 Jun 2021
    for Fingers with Fingerprint Authentication 2021101726
    Figure -1: Functionality of smart phones when accessed by first party and second party with help of set/subset of finger-prints
AU2021101726A 2021-04-05 2021-04-05 A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication Ceased AU2021101726A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021101726A AU2021101726A4 (en) 2021-04-05 2021-04-05 A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021101726A AU2021101726A4 (en) 2021-04-05 2021-04-05 A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication

Publications (1)

Publication Number Publication Date
AU2021101726A4 true AU2021101726A4 (en) 2022-01-06

Family

ID=78958449

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021101726A Ceased AU2021101726A4 (en) 2021-04-05 2021-04-05 A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication

Country Status (1)

Country Link
AU (1) AU2021101726A4 (en)

Similar Documents

Publication Publication Date Title
CN101933051B (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
US6819219B1 (en) Method for biometric-based authentication in wireless communication for access control
US8473748B2 (en) Mobile device-based authentication
JP4578244B2 (en) Method for performing secure electronic transactions using portable data storage media
US20150100485A1 (en) Biometric confirmation for bank card transaction
US20140020074A1 (en) Methods and systems for improving the security of secret authentication data during authentication transactions
US10868672B1 (en) Establishing and verifying identity using biometrics while protecting user privacy
CN110048998B (en) Token-based identity authentication method and system and intelligent door lock
US20140020058A1 (en) Methods and systems for improving the security of secret authentication data during authentication transactions
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN101313314B (en) A method and system for transaction validation
CN111131202A (en) Identity authentication method and system based on multiple information authentication
CN107733868A (en) Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
WO2016188230A1 (en) Unlocking method and device
JP2003509771A (en) Security equipment
US20120102565A1 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
US20030014642A1 (en) Security arrangement
AU2021101726A4 (en) A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication
CN112334896B (en) Unlocking method and equipment of terminal equipment and storage medium
CN108122111B (en) Secure payment method, device, storage medium and computer equipment
JP2002074365A (en) Identity authentication system
AU2021101758A4 (en) A Novel Approach to Login Smart Phones with Sequence of Multiple Finger Prints for Robust Authentication
KR102060563B1 (en) Method and apparatus for providing authentication using voice and facial data
JP4760124B2 (en) Authentication device, registration device, registration method, and authentication method
JP2006053808A (en) Operator authentication management system

Legal Events

Date Code Title Description
NB Applications allowed - extensions of time section 223(2)

Free format text: THE TIME IN WHICH TO COMPLY WITH A DIRECTION UNDER REG 3.2B HAS BEEN EXTENDED TO 15 JUL 2021

FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry