WO2008091660A1 - System control via characteristic gait signature - Google Patents
System control via characteristic gait signature Download PDFInfo
- Publication number
- WO2008091660A1 WO2008091660A1 PCT/US2008/000928 US2008000928W WO2008091660A1 WO 2008091660 A1 WO2008091660 A1 WO 2008091660A1 US 2008000928 W US2008000928 W US 2008000928W WO 2008091660 A1 WO2008091660 A1 WO 2008091660A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- gait
- acceleration data
- data
- logic
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
- G06V40/23—Recognition of whole body movements, e.g. for sport training
- G06V40/25—Recognition of walking or running movements, e.g. gait recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/12—Classification; Matching
Definitions
- Exemplary embodiments relate generally to the technical field of user identification, and more particularly to user identification via a characteristic gait signature.
- PDAs personal digital assistants
- portable computers portable computers
- cellular telephones digital cameras
- personal gaming devices etc.
- PDAs personal digital assistants
- These devices may have access codes that a user must enter in order for the unit to turn on. Once a device is turned on, and remains on, an unauthorized user can access the devices data or use the device. As long as the device stays powered on (or charged up), it can readily be used by any user, including unauthorized users.
- remembering and entering access codes in devices is tedious and has inherent security flaws as access codes may be forgotten by intended parties or discovered by unintended parties.
- a device includes a control element to compare new acceleration data from an accelerometer with registered gait data associated with registered users of a mobile device to determine the current user of the mobile device.
- Fig. 1 illustrates a block diagram of an exemplary device to control a device via characteristic gait signatures
- FIG. 2 illustrates one embodiment of an exemplary system
- FIG. 3A-B illustrates a flow diagram of an exemplary process
- Fig. 4 illustrates one embodiment of a user interface display.
- the embodiments discussed herein generally relate to an apparatus, system and method to control a device via characteristic gait signatures.
- the control may, in one embodiment, be access control.
- the control may be customization control, for a device which may be utilized by multiple users.
- Fig. 1 illustrates a block diagram of one embodiment of a device 100 that includes logic to control a device via characteristic gait signatures.
- device 100 can be disposed in a cellular telephone, a digital camera, a personal digital assistant (PDA), a handheld gaming device, a palm computer, and other portable devices.
- PDA personal digital assistant
- device 100 includes motion determining logic 1 10.
- motion determining logic 1 10 is an accelerometer.
- the accelerometer is a three-axis accelerometer.
- the motion determining logic 1 10 may be multiple accelerometers.
- the motion determining logic 110 senses three dimensional motion. The sensed motion is then converted to digital representations, which can then be recorded and/or used by the system.
- the three dimensional acceleration data sensed when a user moves e.g., walking, running, jogging, etc. can then be used for identification purposes, as described below.
- the accelerometer is powered on when device 100 is powered on. In another embodiment, the accelerometer is powered on upon motion of device 100. In yet another embodiment, the accelerometer is powered on periodically. In another embodiment, the accelerometer is powered on randomly. In still another embodiment, the accelerometer is powered on intermittently, such as every five (5) minutes, ten (10) minutes, thirty (30) minutes, etc. In one embodiment, the accelerometer is not part of the system of the present invention. Rather, the accelerometer data is received from an external accelerometer.
- device 100 may include a user interface 160 which may include one or more of: a resistive digitizer (touch screen), key pad/board, curser/control device, microphone, speaker(s), display screen, etc. to enable the user to interact with the device.
- the gait identification system is initialized by registration logic 180.
- registration logic 180 requests that a user perform various types of motion. In one embodiment, this request may be made through user interface 160. In another embodiment, this request may be made via a separate instruction set which may be made available to the user, or through other means. In another embodiment, this registration step may be performed automatically during a first period of use.
- the system may log the gait characteristics of the user.
- the types of motion may include styles of gait such as walking, brisk walking, walking up/down stairs, running, jogging, walking in snow/sand, sprinting, walking up/down a hill, etc.
- the user may interact with registration logic 180 at any time. In one embodiment, if the user starts to use different gaits because of environmental or physical changes, the user may record the new gait via registration logic 180.
- Recording logic 120 records the accelerations.
- the data is stored in a temporary buffer.
- the data is stored in a storage device, such as random access memory, flash memory, a hard drive, or other storage.
- Gait signature calculator 130 receives the recorded acceleration data from recording logic 120 and computes/calculates gait signatures from the recorded acceleration data.
- gait signature calculator 130 abstracts the gait data into comparison points.
- the gait comparison points may be a combination of cadence (number of steps per time), step size (vertical v. horizontal acceleration during the step), and speed of downward step (i.e. acceleration on downward movement of step). Alternate comparison points may be utilized.
- Gait signature calculator 130 calculates these comparison points.
- gait signature calculator 130 calculates gait signature comparison points for the various types of gaits recorded for a user.
- the gait signature calculator 130 computes the average acceleration data over a predetermined time.
- the pattern of averaged gait accelerations is stored for the various type of gait.
- the acceleration data for the current gait is calculated by the gait signature calculator 130.
- the gait data for the current motion is then passed to the comparison logic 140.
- Comparison logic 140 compares previously stored gait signatures, or gait comparison points, with current gait data and returns a result.
- comparison logic 140 outputs a result that either indicates that the gait data matches one of the stored gait signatures, or that the gait data does not match any stored gait signature, or that the gait data is inconclusive.
- the output is passed to identification logic 150.
- an error or tolerance off-set is used to account for slight variations in a user's gait, which can be caused by several factors, such as weather conditions, health conditions, ground/street conditions, loading conditions (e.g., carrying packages, backpack, etc.), etc.
- the comparison logic 140 compares the gait data to each of the possible registration gaits.
- the registration gaits may correspond to more than one user.
- the comparison logic 140 performs a preliminary comparison based on cadence, and only those gaits which match the cadence (i.e. amble, slow walk, normal walk, fast walk, very fast walk) are matched with respect to the other data.
- an environmental sensor 145 is used to determine environmental conditions.
- environmental conditions can include temperature, barometric pressure, humidity, wind data, pollen counts, and other data available about the environment.
- the environmental sensor 145 is a temperature sensor used to determine current temperature.
- the environmental data as determined by one or more environmental sensors 145 is converted to data and associated with the new acceleration data.
- the system associates the environmental data with the step data to increases comparison accuracy, as the environment affects gait characteristics. For example, in one embodiment when a gait signature is compared to new acceleration data, if the temperature associated with the gait signature and the temperature associated with the new acceleration data differ by a predetermined temperature range, device 100 determines that a comparison result is inconclusive.
- acceleration data is constantly recorded when device 100 is in motion.
- the gait signatures are compared to the new gait data continuously, as the device moves.
- the gait data is only compared to the gait signatures when a series of steps ⁇ as identified by cadence ⁇ stop. That is, every time the device's motion indicates a change, the current gait data is compared to the gait signatures. Since it is extremely unlikely that someone could steal a device or pass a device to another user in motion, and maintain the same cadence as the original owner, by only verifying gait when the gait changes, the power consumption of the security system is reduced.
- the identification logic 150 processes the comparison result received from comparison logic 140 to determine whether the user of the device is a registered user. In one embodiment, if the user of the device is not one of the registered users, the security logic 170 determines whether or not to lock down the device.
- the identification logic 150 determines that the gait data does not match any of the gait signatures, in one embodiment, it sends the data to the security logic 170 to prohibit access to the device 100.
- the security logic 170 prompts the user through the user interface to enter an access code, instead of prohibiting access. If the user enters the correct access code, the security logic 150 again permits access to the device.
- the system suggests to the user that the new gait signature should be registered. If the user chooses to do so, the registration logic 180 is initialized. In one embodiment, the newly calculated gait data is automatically registered into system as a valid gait signature for the user.
- the identification logic 150 determines the gait signatures are the same, device 100 remains active.
- the identification logic 150 can identify the current user for the device. For example, a mobile communications device may be shared among multiple users. Using the gait signatures of each of the users, the identification logic 150 can identify the actual current user of the device. This may be used, in one embodiment, to configure the device appropriately for the identified user. For example, in a warehouse setting, a supervisor and a worker may both use a handheld reader. However, the supervisor may utilize different tools on the handheld reader than the worker. If the identification logic 150 identifies the current user as the worker, a configuration logic 155 may configure the device to be used by the worker.
- the configuration logic 155 may configure the device to be used by the supervisor.
- a mobile device may be utilized by multiple users such as parents and children.
- the tools available, and in one embodiment, the layout of the screens, the applications available, and the set-up of various applications which can be registered to multiple users may be altered by configuration logic 155.
- the configuration logic 155 may automatically configure the device to log into the instant messaging application with the correct identification.
- a mobile device may be configured to be used by any number of different individuals.
- the applications, settings, and other features associated with each user may be selected.
- once a user is registered he or she may alter the applications and settings associated with that user.
- gait signatures can change with age, injuries, weather, and environment, change of weight, etc., it would not be extraordinary for a user to have to reinitialize gait signatures periodically.
- the user can voluntarily reinitialize the device at any time.
- the system may compare current gait data, within the acceptable range for a match with the gait signature, and update gait signature data. In this way, the user need not reinitialize the device, if the overall gait patterns shift slowly over time. However, if there is a rapid significant change, for example as occasioned by an injury, re-registration may be necessary.
- security logic 170 starts/ends the cycle of obtaining and comparing gait signatures and granting/denying access to the device.
- the security logic 170 determines when it is time to re-verify identity. As noted above, this may be periodic, constant, or depend on changes in motion..
- the security logic 170 randomly chooses a time to prompt the user to initialize gait signatures through the user interface. In this embodiment, a predetermined range is selected (for example, thirty minutes to twenty-four hours and a random number generator is used to select the time to initialize gait signatures. In one embodiment, every time the device's motion indicates a change in the gait, the new/changed gait is evaluated.
- Fig. 2 illustrates an embodiment including system 200.
- System 200 includes device 100 and transmitter/receiver logic 210, both disposed in a portable device 220.
- Portable device 220 can be any portable device, such as a cellular telephone, a digital camera, a PDA, a handheld gaming device, a mobile computer, etc.
- the gait signatures are recoded by recording logic 120 and transmitted through transmission medium 230 to computing device 240 and stored on storage device 250.
- Transmission medium 250 can transmit/receive data through wireless telephony communications, wireless Internet communications, etc.
- Computing device 240 can be a server or any other remote computing device.
- Storage device 250 can be any temporary or permanent storage device, such as databases stored in memory, redundant array of independent disks (RAIDs), flash memory, RAM, etc.
- multiple computing devices 250 and multiple storage devices 250 are used to provide distributed storage.
- the gait signature logic 130 and the comparison logic 140 are disposed on remote computing device 240.
- the comparison of previous gait signatures and new gait data is performed on computing device 240.
- computing device 240 transmits a signal to portable device 220 to lock it.
- the computing device 240 or portable device 220 may provide the ability to remove the lock using an access code. If the access code entered is incorrect, in one embodiment, the system may be locked permanently.
- the computing device 240 may further send an alert through an alternate communications method to the user. In one embodiment, the device may be unlocked only through sending a predetermined message through an alternate channel to the device.
- the alternate channel may be sending an SMS message to the device with a one-time unlock code provided by the computing device 240 via the alternate communication channel to the user.
- portable device 220 once portable device 220 is permanently locked down, a user has to contact the controlling party and provide authentication information to receive/reset the access code and have portable device accessible. In one embodiment if the portable device is shut down, the user is sent a message through a different communications path, called, or otherwise notified of the access failure. In this embodiment, if portable device 220 is locked, the owner would be notified that any unauthorized users are denied access to use the portable device.
- gait signatures are recorded on device 100 and transmitted to computing device 240 when bandwidth is cheap or in low use. In one embodiment, this occurs when the device is not being used. In one embodiment, once the gait signatures are transmitted to computing device 240, the gait signatures are erased from memory in device 100. In one embodiment, when gait signature comparison is required, the previous recorded gait signature is retrieved from the computing device 240 and transmitted to portable device 220, to enable a local comparison to be made. In one embodiment, the cadence comparison may be made on the computing device 240 while the remaining comparisons are made on the device 100. In one embodiment, the comparison of gait signatures is completed by device 100. The steps of the identification described herein may be distributed between portable device 220 and remote computing device 240 in various ways.
- Fig. 3A-B illustrates a flowchart of one embodiment of the process.
- Process 300 starts with a motion device (e.g., an accelerometer) being activated in block 310.
- a motion device e.g., an accelerometer
- this may occur in response to a predetermined event, such as initialization of accelerometer data, a predetermined security criteria, etc.
- the accelerometer may be active otherwise as well, but accelerometer data is forwarded to the identification system only periodically.
- the periodicity may be determined by time, by change in cadence, or by another method.
- acceleration data is processed and recorded/stored.
- the process determines if verification criteria are met (i.e., gait data has been calculated from the acceleration data, and a match is being evaluated.). If at block 325 the process determines that the verification criteria to verify gait signature are met, any previously recorded gait signatures are retrieved. Otherwise, the process returns to block 325 until the security verification criteria is met.
- the verification criteria include having sufficient data. In one embodiment, sufficient data is at least two full strides (gait cycles) having been recorded.
- the process compares currently recorded gait data with the registered gait signatures.
- the process determines whether the current gait data and one of the registered gait signatures match (i.e., within a predetermined range of error). If the gait data matches the gait signature, the process continues to block 342.
- the user associated with the matched gait signature is identified.
- multiple users may have recorded gait signatures for the device.
- the process determines whether the user is the last identified user of the device. If so, the process returns to block 325, to await a next verification cycle. Otherwise, the process, at block 346, configure the device for the newly identified user, and sets the value of the last identified user to the newly identified user. The process then returns to block 325, to await the next verification cycle.
- the process in one embodiment, prompts a user to enter a security/access code.
- the system may simply lock the device.
- the system may send an alert to the user.
- the system may send an alert to the user through another path, i.e. not through the device itself.
- the process determines if the number of entered security/access codes exceeds a predetermined number of tries. If the entry does not exceed the predetermined number of tries, the process continues to block 370, where it is determined whether the security/access code is correct. If the security/access code is correct, the process unlocks the user's system. In one embodiment, the process then returns to block 310 to permit the user to record new gait information. If the security code entered is not correct, process 300 returns to block 350, to query again.
- the process continues to block 380.
- access of a portable device is denied.
- the portable device is shut down, and the user is requested to provide identification through some other means in order to reactivate the device.
- this security implementation may be distributed between a portable device (such as device 220) and a remote computing device (such as device 240) in various ways.
- Fig. 4 illustrates an embodiment of a user display on a user interface where the user either selects the type of gait to initialize a portable device to (e.g., device 100/portable device 220). As illustrated various types of gaits can be entered/maintained.
- device 100 includes a machine-readable medium on which is stored one or more sets of instructions (e.g., software) embodying any one or more of the methodologies or functions described herein.
- the software may also reside, completely or at least partially, within the recording logic 120 and/or another device/machine, such as a processor, during execution thereof by device 100.
- the software may further be transmitted or received over a network via a network interface device (see, e.g., Fig. 2 receiver/transmitter logic 210).
- machine-readable medium should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
- the term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present invention.
- the machine-readable medium includes any mechanism that provides (i.e., stores and/or transmits) information in a form readable by a machine (e.g., a computer, PDA, cellular telephone, etc.).
- a machine-readable medium includes memory (such as described above); magnetic disk storage media; optical storage media; flash memory devices; biological electrical, mechanical systems; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.).
- the device or machine-readable medium may include a micro-electromechanical system (MEMS), nanotechnology devices, organic, holographic, solid-state memory device and/or a rotating magnetic or optical disk.
- MEMS micro-electromechanical system
- the device or machine-readable medium may be distributed when partitions of instructions have been separated into different machines, such as across an interconnection of computers or as different virtual machines.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Social Psychology (AREA)
- Psychiatry (AREA)
- Multimedia (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
A device includes an access control element to compare new acceleration data from an accelerometer with registered gait signature associated with an authorized user of a mobile device to determine the identity of the user of the mobile device.
Description
SYSTEM CONTROL VIA CHARACTERISTIC GAIT SIGNATURE
FIELD OF THE INVENTION
[0001] Exemplary embodiments relate generally to the technical field of user identification, and more particularly to user identification via a characteristic gait signature.
DESCRIPTION OF THE RELATED ART
[0002] There are many types of portable devices that people use for business purposes, entertainment and security. These devices include personal digital assistants (PDAs), portable computers, cellular telephones, digital cameras, personal gaming devices, etc. Along with the portability of these devices comes a risk of loss or theft. These devices " may have access codes that a user must enter in order for the unit to turn on. Once a device is turned on, and remains on, an unauthorized user can access the devices data or use the device. As long as the device stays powered on (or charged up), it can readily be used by any user, including unauthorized users. Furthermore, remembering and entering access codes in devices is tedious and has inherent security flaws as access codes may be forgotten by intended parties or discovered by unintended parties.
[0003] One prior art solution is to ask the user to enter a password or other validation data each time the device is used. However, this is tedious, and most users prefer not to do so.
SUMMARY
[0004] A device includes a control element to compare new acceleration data from an accelerometer with registered gait data associated with registered users of a mobile device to determine the current user of the mobile device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0005] The embodiments are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
[0006] Fig. 1 illustrates a block diagram of an exemplary device to control a device via characteristic gait signatures;
[0007] Fig. 2 illustrates one embodiment of an exemplary system;
[0008] Fig. 3A-B illustrates a flow diagram of an exemplary process; and
[0009] Fig. 4 illustrates one embodiment of a user interface display.
DETAILED DESCRIPTION
[0010] The embodiments discussed herein generally relate to an apparatus, system and method to control a device via characteristic gait signatures. The control may, in one embodiment, be access control. In one embodiment, the control may be customization control, for a device which may be utilized by multiple users. Referring to the Figures, exemplary embodiments will now be described. The exemplary embodiments of the invention are provided to illustrate the embodiments and should not be construed as limiting the scope of the embodiments.
[0011] Fig. 1 illustrates a block diagram of one embodiment of a device 100 that includes logic to control a device via characteristic gait signatures. In one embodiment, device 100 can be disposed in a cellular telephone, a digital camera, a personal digital assistant (PDA), a handheld gaming device, a palm computer, and other portable devices.
[0012] In one embodiment, device 100 includes motion determining logic 1 10. In one embodiment, motion determining logic 1 10 is an accelerometer. In one embodiment, the accelerometer is a three-axis accelerometer. In another embodiment, the motion determining logic 1 10 may be multiple accelerometers. The motion determining logic 110 senses three dimensional motion. The sensed motion is then converted to digital representations, which can then be recorded and/or used by the system. The three dimensional acceleration data sensed when a user moves (e.g., walking, running, jogging, etc.) can then be used for identification purposes, as described below.
[0013] In one embodiment, the accelerometer is powered on when device 100 is powered on. In another embodiment, the accelerometer is powered on upon motion of device 100. In yet another embodiment, the accelerometer is powered on periodically. In another embodiment, the accelerometer is powered on randomly. In still another embodiment, the accelerometer is powered on intermittently, such as every five (5) minutes, ten (10) minutes, thirty (30) minutes, etc. In one embodiment, the accelerometer is not part of the system of the present invention. Rather, the accelerometer data is received from an external accelerometer.
[0014] In one embodiment, device 100 may include a user interface 160 which may include one or more of: a resistive digitizer (touch screen), key pad/board, curser/control device, microphone, speaker(s), display screen, etc. to enable the user to interact with the device.
[0015] In one embodiment, the gait identification system is initialized by registration logic 180. In one embodiment, for initial registration, registration logic 180 requests that a user perform various types of motion. In one embodiment, this request may be made through user interface 160. In another embodiment, this request may be made via a separate instruction set which may be made available to the user, or through other means. In another embodiment, this registration step may be performed automatically during a first period of use. For example, during a first day or week of use, the system may log the gait characteristics of the user. The types of motion may include styles of gait such as walking, brisk walking, walking up/down stairs, running, jogging, walking in snow/sand, sprinting, walking up/down a hill, etc.
[0016] In one embodiment, the user may interact with registration logic 180 at any time. In one embodiment, if the user starts to use different gaits because of environmental or physical changes, the user may record the new gait via registration logic 180.
[0017] Recording logic 120 records the accelerations. In one embodiment, the data is stored in a temporary buffer. In one embodiment, the data is stored in a storage device, such as random access memory, flash memory, a hard drive, or other storage.
[0018] Gait signature calculator 130 receives the recorded acceleration data from recording logic 120 and computes/calculates gait signatures from the recorded acceleration data. In one embodiment, gait signature calculator 130 abstracts the gait data into comparison points. For example, the gait comparison points may be a combination of cadence (number of steps per time), step size (vertical v. horizontal acceleration during the step), and speed of downward step (i.e. acceleration on downward movement of step). Alternate comparison points may be utilized. Gait signature calculator 130 calculates these comparison points. In one embodiment, during the registration phase gait signature calculator 130 calculates gait signature comparison points for the various types of gaits recorded for a user.
[0019] In another embodiment, the gait signature calculator 130 computes the average acceleration data over a predetermined time. In this embodiment, the pattern of averaged gait accelerations is stored for the various type of gait.
[0020] The acceleration data for the current gait is calculated by the gait signature calculator 130. The gait data for the current motion is then passed to the comparison logic 140.
[0021] Comparison logic 140 compares previously stored gait signatures, or gait comparison points, with current gait data and returns a result. In one embodiment, comparison logic 140 outputs a result that either indicates that the gait data matches one of the stored gait signatures, or that the gait data does not match any stored gait signature, or that the gait data is inconclusive. In one embodiment, the output is passed to identification logic 150. In one embodiment an error or tolerance off-set is used to account for slight variations in a user's gait, which can be caused by several factors, such as weather conditions, health conditions, ground/street conditions, loading conditions (e.g., carrying packages, backpack, etc.), etc. In one embodiment, the comparison logic 140 compares the gait data to each of the possible registration gaits. Note that in one embodiment, the registration gaits may correspond to more than one user. In one embodiment, the comparison logic 140 performs a preliminary comparison based on cadence, and only those gaits which match the cadence (i.e. amble, slow walk, normal walk, fast walk, very fast walk) are matched with respect to the other data.
[0022] In one embodiment, an environmental sensor 145 is used to determine environmental conditions. In one embodiment, environmental conditions can include temperature, barometric pressure, humidity, wind data, pollen counts, and other data available about the environment. In one embodiment, the environmental sensor 145 is a temperature sensor used to determine current temperature. The environmental data as determined by one or more environmental sensors 145 is converted to data and associated with the new acceleration data. In this embodiment, the system associates the environmental data with the step data to increases comparison accuracy, as the environment affects gait characteristics. For example, in one embodiment when a gait signature is compared to new acceleration data, if the temperature associated with the gait signature and the temperature associated with the new acceleration data differ by a predetermined temperature range, device 100 determines that a comparison result is inconclusive.
[0023] In one embodiment, acceleration data is constantly recorded when device 100 is in motion. In one embodiment, the gait signatures are compared to the new gait data continuously, as the device moves. In one embodiment, the gait data is only compared to the
gait signatures when a series of steps ~ as identified by cadence ~ stop. That is, every time the device's motion indicates a change, the current gait data is compared to the gait signatures. Since it is extremely unlikely that someone could steal a device or pass a device to another user in motion, and maintain the same cadence as the original owner, by only verifying gait when the gait changes, the power consumption of the security system is reduced.
[0024] The identification logic 150 processes the comparison result received from comparison logic 140 to determine whether the user of the device is a registered user. In one embodiment, if the user of the device is not one of the registered users, the security logic 170 determines whether or not to lock down the device.
[0025] If the identification logic 150 determines that the gait data does not match any of the gait signatures, in one embodiment, it sends the data to the security logic 170 to prohibit access to the device 100. In one embodiment, the security logic 170 prompts the user through the user interface to enter an access code, instead of prohibiting access. If the user enters the correct access code, the security logic 150 again permits access to the device.
[0026] In one embodiment, the system suggests to the user that the new gait signature should be registered. If the user chooses to do so, the registration logic 180 is initialized. In one embodiment, the newly calculated gait data is automatically registered into system as a valid gait signature for the user.
[0027] If the identification logic 150 determines the gait signatures are the same, device 100 remains active. In one embodiment, if the device is a multi-user device, the identification logic 150 can identify the current user for the device. For example, a mobile communications device may be shared among multiple users. Using the gait signatures of each of the users, the identification logic 150 can identify the actual current user of the device. This may be used, in one embodiment, to configure the device appropriately for the identified user. For example, in a warehouse setting, a supervisor and a worker may both use a handheld reader. However, the supervisor may utilize different tools on the handheld reader than the worker. If the identification logic 150 identifies the current user as the worker, a configuration logic 155 may configure the device to be used by the worker. Similarly, if the supervisor is identified, the configuration logic 155 may configure the device to be used by the supervisor. Similarly, in a family setting, a mobile device may be utilized by multiple users such as parents and children. The tools available, and in one embodiment,
the layout of the screens, the applications available, and the set-up of various applications which can be registered to multiple users may be altered by configuration logic 155. For example, if multiple users are registered in an instant messaging application, the configuration logic 155 may automatically configure the device to log into the instant messaging application with the correct identification. In one embodiment, a mobile device may be configured to be used by any number of different individuals. In one embodiment, during registration or set-up, the applications, settings, and other features associated with each user may be selected. In one embodiment, once a user is registered, he or she may alter the applications and settings associated with that user.
[0028] As gait signatures can change with age, injuries, weather, and environment, change of weight, etc., it would not be extraordinary for a user to have to reinitialize gait signatures periodically. In one embodiment, the user can voluntarily reinitialize the device at any time. In one embodiment, the system may compare current gait data, within the acceptable range for a match with the gait signature, and update gait signature data. In this way, the user need not reinitialize the device, if the overall gait patterns shift slowly over time. However, if there is a rapid significant change, for example as occasioned by an injury, re-registration may be necessary.
[0029] In one embodiment, security logic 170 starts/ends the cycle of obtaining and comparing gait signatures and granting/denying access to the device. In one embodiment the security logic 170 determines when it is time to re-verify identity. As noted above, this may be periodic, constant, or depend on changes in motion.. In one embodiment, the security logic 170 randomly chooses a time to prompt the user to initialize gait signatures through the user interface. In this embodiment, a predetermined range is selected (for example, thirty minutes to twenty-four hours and a random number generator is used to select the time to initialize gait signatures. In one embodiment, every time the device's motion indicates a change in the gait, the new/changed gait is evaluated.
[0030] Fig. 2 illustrates an embodiment including system 200. System 200 includes device 100 and transmitter/receiver logic 210, both disposed in a portable device 220. Portable device 220 can be any portable device, such as a cellular telephone, a digital camera, a PDA, a handheld gaming device, a mobile computer, etc. In one embodiment, the gait signatures are recoded by recording logic 120 and transmitted through transmission medium 230 to computing device 240 and stored on storage device 250. Transmission
medium 250 can transmit/receive data through wireless telephony communications, wireless Internet communications, etc. Computing device 240 can be a server or any other remote computing device. Storage device 250 can be any temporary or permanent storage device, such as databases stored in memory, redundant array of independent disks (RAIDs), flash memory, RAM, etc. In one embodiment, multiple computing devices 250 and multiple storage devices 250 are used to provide distributed storage.
[0031] In one embodiment, the gait signature logic 130 and the comparison logic 140 are disposed on remote computing device 240. In this embodiment, the comparison of previous gait signatures and new gait data is performed on computing device 240. In one embodiment if the compared gait signatures do not match, computing device 240 transmits a signal to portable device 220 to lock it. In one embodiment, the computing device 240 or portable device 220 may provide the ability to remove the lock using an access code. If the access code entered is incorrect, in one embodiment, the system may be locked permanently. In one embodiment, the computing device 240 may further send an alert through an alternate communications method to the user. In one embodiment, the device may be unlocked only through sending a predetermined message through an alternate channel to the device. This ensures that even if someone steals the device and has or guesses the access code, the device remains unusable unless the alternate channel is also compromised. In one embodiment, the alternate channel may be sending an SMS message to the device with a one-time unlock code provided by the computing device 240 via the alternate communication channel to the user.
[0032] In one embodiment, once portable device 220 is permanently locked down, a user has to contact the controlling party and provide authentication information to receive/reset the access code and have portable device accessible. In one embodiment if the portable device is shut down, the user is sent a message through a different communications path, called, or otherwise notified of the access failure. In this embodiment, if portable device 220 is locked, the owner would be notified that any unauthorized users are denied access to use the portable device.
[0033] In one embodiment, gait signatures are recorded on device 100 and transmitted to computing device 240 when bandwidth is cheap or in low use. In one embodiment, this occurs when the device is not being used. In one embodiment, once the gait signatures are transmitted to computing device 240, the gait signatures are erased from memory in device 100. In one embodiment, when gait signature comparison is required, the
previous recorded gait signature is retrieved from the computing device 240 and transmitted to portable device 220, to enable a local comparison to be made. In one embodiment, the cadence comparison may be made on the computing device 240 while the remaining comparisons are made on the device 100. In one embodiment, the comparison of gait signatures is completed by device 100. The steps of the identification described herein may be distributed between portable device 220 and remote computing device 240 in various ways.
[0034] Fig. 3A-B illustrates a flowchart of one embodiment of the process. Process 300 starts with a motion device (e.g., an accelerometer) being activated in block 310. In one embodiment, this may occur in response to a predetermined event, such as initialization of accelerometer data, a predetermined security criteria, etc. In one embodiment, the accelerometer may be active otherwise as well, but accelerometer data is forwarded to the identification system only periodically. As noted above, the periodicity may be determined by time, by change in cadence, or by another method.
[0035] After the accelerometer data is received, at block 320 acceleration data is processed and recorded/stored. At block 325 the process determines if verification criteria are met (i.e., gait data has been calculated from the acceleration data, and a match is being evaluated.). If at block 325 the process determines that the verification criteria to verify gait signature are met, any previously recorded gait signatures are retrieved. Otherwise, the process returns to block 325 until the security verification criteria is met. In one embodiment, the verification criteria include having sufficient data. In one embodiment, sufficient data is at least two full strides (gait cycles) having been recorded.
[0036] Once the verification criteria is/are met, at block 330, the process compares currently recorded gait data with the registered gait signatures. At block 340, the process determines whether the current gait data and one of the registered gait signatures match (i.e., within a predetermined range of error). If the gait data matches the gait signature, the process continues to block 342.
[0037] At block 342, the user associated with the matched gait signature is identified. In one embodiment, multiple users may have recorded gait signatures for the device.
[0038] At block 344, the process determines whether the user is the last identified user of the device. If so, the process returns to block 325, to await a next verification cycle.
Otherwise, the process, at block 346, configure the device for the newly identified user, and sets the value of the last identified user to the newly identified user. The process then returns to block 325, to await the next verification cycle.
[0039] If the gait data and the recorded gait signatures are found not to match, at block 350 the process, in one embodiment, prompts a user to enter a security/access code. In an alternative embodiment, the system may simply lock the device. In an alternative embodiment, the system may send an alert to the user. In an alternative embodiment, the system may send an alert to the user through another path, i.e. not through the device itself.
[0040] At block 360, the process determines if the number of entered security/access codes exceeds a predetermined number of tries. If the entry does not exceed the predetermined number of tries, the process continues to block 370, where it is determined whether the security/access code is correct. If the security/access code is correct, the process unlocks the user's system. In one embodiment, the process then returns to block 310 to permit the user to record new gait information. If the security code entered is not correct, process 300 returns to block 350, to query again.
[0041] If the security/access code entry attempts exceed a predetermined number, as determined at block 360, the process continues to block 380. At block 380, access of a portable device is denied. In one embodiment, the portable device is shut down, and the user is requested to provide identification through some other means in order to reactivate the device. In one embodiment this security implementation may be distributed between a portable device (such as device 220) and a remote computing device (such as device 240) in various ways.
[0042] Fig. 4 illustrates an embodiment of a user display on a user interface where the user either selects the type of gait to initialize a portable device to (e.g., device 100/portable device 220). As illustrated various types of gaits can be entered/maintained.
[0043] In one embodiment, device 100 (see also Fig. 2, portable device 220) includes a machine-readable medium on which is stored one or more sets of instructions (e.g., software) embodying any one or more of the methodologies or functions described herein. The software may also reside, completely or at least partially, within the recording logic 120 and/or another device/machine, such as a processor, during execution thereof by device 100. The software may further be transmitted or received over a network via a network interface device (see, e.g., Fig. 2 receiver/transmitter logic 210).
[0044] The term "machine-readable medium" should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term "machine-readable medium" shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present invention. The machine-readable medium includes any mechanism that provides (i.e., stores and/or transmits) information in a form readable by a machine (e.g., a computer, PDA, cellular telephone, etc.). For example, a machine-readable medium includes memory (such as described above); magnetic disk storage media; optical storage media; flash memory devices; biological electrical, mechanical systems; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.). The device or machine-readable medium may include a micro-electromechanical system (MEMS), nanotechnology devices, organic, holographic, solid-state memory device and/or a rotating magnetic or optical disk. The device or machine-readable medium may be distributed when partitions of instructions have been separated into different machines, such as across an interconnection of computers or as different virtual machines.
[0045] While certain exemplary embodiments have been described and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not restrictive on the broad invention, and that this invention not be limited to the specific constructions and arrangements shown and described, since various other modifications may occur to those ordinarily skilled in the art. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
[0046] Reference in the specification to "an embodiment," "one embodiment," "some embodiments," or "other embodiments" means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least some embodiments, but not necessarily all embodiments. The various appearances "an embodiment," "one embodiment," or "some embodiments" are not necessarily all referring to the same embodiments. If the specification states a component, feature, structure, or characteristic "may", "might", or "could" be included, that particular component, feature, structure, or characteristic is not required to be included. If the specification or claim refers to "a" or "an" element, that does not mean there is only one of the element. If the
specification or claims refer to "an additional" element, that does not preclude there being more than one of the additional element.
Claims
1. An apparatus comprising: an identification logic to compare new acceleration data from an accelerometer in a mobile device with a registered gait signature associated with an authorized user of the mobile device to determine an identity of the user of the device.
2. The apparatus of claim 1 , wherein the new acceleration data and the data associated with an authorized user are results of motion of the mobile device caused by a user.
3. The apparatus of claim 1, further comprising a sensor to determine environmental data, wherein the environmental data is associated with the new acceleration data.
4. The apparatus of claim 1 , further comprising: a security logic to grant access to the mobile device when the new acceleration data matches the registered gait signature, and to deny access to the device when the new accelerometer data does not match the registered gait signature.
5. The apparatus of claim 1, wherein the mobile device provides one or more of the following functionalities: personal digital assistant (PDA), cellular telephone, portable gaming device, portable computing device, digital camera, and personal entertainment device.
6. The apparatus of claim 1, further comprising: a configuration logic to configure the mobile device to a preset configuration of the identified user associated with the new acceleration data.
7. A system comprising: a portable device including an accelerometer coupled to a security module and a first memory; a transmitter to transmit acceleration data from the portable device to a server; a comparison logic to determine if the acceleration data matches a characteristic gait signature of the user; and a security logic to restrict access to the device if the acceleration data does not match characteristic gait data.
8. The system of claim 7 wherein the portable device includes the functionality of one or more of the following: personal digital assistant (PDA), a cellular telephone, a portable gaming device, a portable computer device, a digital camera and a personal entertainment device.
9. The system of claim 7, wherein the server transmits a signal to the security module to shut down the portable device.
10. The system of claim 7, wherein acceleration data is stored for a plurality of users.
1 1. The system of claim 10, further comprising: a configuration logic to configure the portable device for a recognized user, the user recognized based on the identified gait signature.
12. A method comprising: registering a gait signature based on acceleration data associated with a gait; collecting acceleration data; determining if the acceleration data matches the gait signature; and authorizing a user to use the device if the acceleration data matches the gait signature.
13 The method of claim 12, further comprising: when the user is not identified as an authorized user of the device, prompting the user to enter a security entry.
14. The method of claim 13, further comprising: updating the gait signature data based on the collected acceleration data, when the security entry is a correct security entry.
15. The method of claim 12, wherein the comparison is performed on a remote computing device.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08724780A EP2127193A4 (en) | 2007-01-23 | 2008-01-23 | System control via characteristic gait signature |
JP2009547290A JP5442451B2 (en) | 2007-01-23 | 2008-01-23 | System control by signature gait signature |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/657,234 US7917768B2 (en) | 2007-01-23 | 2007-01-23 | System control via characteristic gait signature |
US11/657,234 | 2007-01-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008091660A1 true WO2008091660A1 (en) | 2008-07-31 |
Family
ID=39641246
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2008/000928 WO2008091660A1 (en) | 2007-01-23 | 2008-01-23 | System control via characteristic gait signature |
Country Status (4)
Country | Link |
---|---|
US (1) | US7917768B2 (en) |
EP (1) | EP2127193A4 (en) |
JP (1) | JP5442451B2 (en) |
WO (1) | WO2008091660A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102902935A (en) * | 2012-09-26 | 2013-01-30 | 广东欧珀移动通信有限公司 | Mobile terminal privacy protection method and device |
CN102930221A (en) * | 2011-08-09 | 2013-02-13 | 三星电子(中国)研发中心 | Method for protecting data in handheld equipment |
CN105389364A (en) * | 2015-11-06 | 2016-03-09 | 中国科学院自动化研究所 | Digital cultural relic security sharing system |
EP3578426B1 (en) * | 2018-06-06 | 2023-03-29 | Huf Hülsbeck & Fürst GmbH & Co. KG | Method for identifying a person for use in a motor vehicle |
EP4155985A4 (en) * | 2020-05-22 | 2023-11-01 | Sony Group Corporation | Information processing device, information processing method, and computer program |
Families Citing this family (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7182738B2 (en) | 2003-04-23 | 2007-02-27 | Marctec, Llc | Patient monitoring apparatus and method for orthosis and other devices |
US20100264982A1 (en) * | 2007-12-13 | 2010-10-21 | Nxp B.V. | Electronic circuit and method of masking current requirements of an electronic circuit |
US9141974B2 (en) * | 2008-01-16 | 2015-09-22 | Martin Kelly Jones | Systems and methods for determining mobile thing (MT) identification and/or MT motion activity using sensor data of wireless communication device |
US8872646B2 (en) | 2008-10-08 | 2014-10-28 | Dp Technologies, Inc. | Method and system for waking up a device due to motion |
US20100204016A1 (en) * | 2009-02-09 | 2010-08-12 | Inventec Corporation | System and method for editing walking procedure |
US8366642B2 (en) * | 2009-03-02 | 2013-02-05 | The Iams Company | Management program for the benefit of a companion animal |
US8382687B2 (en) * | 2009-03-02 | 2013-02-26 | The Iams Company | Method for determining the biological age of a companion animal |
US9112702B2 (en) * | 2009-04-29 | 2015-08-18 | Microsoft Technology Licensing, Llc | Alternate authentication |
US9255814B2 (en) | 2009-09-02 | 2016-02-09 | Apple Inc. | Systems and methods for transitioning between pedometer modes |
US20110054833A1 (en) * | 2009-09-02 | 2011-03-03 | Apple Inc. | Processing motion sensor data using accessible templates |
FI20096232A0 (en) * | 2009-11-23 | 2009-11-23 | Valtion Teknillinen | Physical activity-based control for a device |
US8907768B2 (en) | 2009-11-25 | 2014-12-09 | Visa International Service Association | Access using a mobile device with an accelerometer |
IT1403435B1 (en) | 2010-12-27 | 2013-10-17 | Conti | USER AUTHENTICATION PROCEDURE FOR ACCESS TO A MOBILE AND CORRESPONDING USER MOBILE TERMINAL TERMINAL. |
WO2012092293A2 (en) | 2010-12-30 | 2012-07-05 | Visa International Service Association | Mixed mode transaction protocol |
US9164957B2 (en) | 2011-01-24 | 2015-10-20 | Lexisnexis Risk Solutions Inc. | Systems and methods for telematics monitoring and communications |
US20120191016A1 (en) * | 2011-01-25 | 2012-07-26 | Harris Corporation | Gait based notification and control of portable devices |
GB201109311D0 (en) | 2011-06-03 | 2011-07-20 | Avimir Ip Ltd | Method and computer program for providing authentication to control access to a computer system |
US9069380B2 (en) | 2011-06-10 | 2015-06-30 | Aliphcom | Media device, application, and content management using sensory input |
US20120316456A1 (en) * | 2011-06-10 | 2012-12-13 | Aliphcom | Sensory user interface |
US20120315382A1 (en) | 2011-06-10 | 2012-12-13 | Aliphcom | Component protective overmolding using protective external coatings |
US8446275B2 (en) | 2011-06-10 | 2013-05-21 | Aliphcom | General health and wellness management method and apparatus for a wellness application using data from a data-capable band |
US20120313746A1 (en) * | 2011-06-10 | 2012-12-13 | Aliphcom | Device control using sensory input |
US9258670B2 (en) | 2011-06-10 | 2016-02-09 | Aliphcom | Wireless enabled cap for a data-capable device |
US20120316458A1 (en) | 2011-06-11 | 2012-12-13 | Aliphcom, Inc. | Data-capable band for medical diagnosis, monitoring, and treatment |
US9201812B2 (en) | 2011-07-25 | 2015-12-01 | Aliphcom | Multiple logical representations of audio functions in a wireless audio transmitter that transmits audio data at different data rates |
US10463300B2 (en) | 2011-09-19 | 2019-11-05 | Dp Technologies, Inc. | Body-worn monitor |
US8886670B2 (en) | 2011-11-11 | 2014-11-11 | International Business Machines Corporation | Securely accessing remote systems |
EP2600319A1 (en) * | 2011-11-29 | 2013-06-05 | Gemalto SA | Pairing system between a terminal and an eGo-type element worn on the wrist or the hand of a user and corresponding method |
US20130231889A1 (en) * | 2012-03-01 | 2013-09-05 | Lockheed Martin Corporation | Method and apparatus for an inertial navigation system |
GB2548738B (en) * | 2013-03-12 | 2018-02-21 | Lexisnexis Risk Solutions Inc | Systems and methods for telematics monitoring and communications |
KR101635109B1 (en) * | 2014-04-08 | 2016-06-30 | 삼성전자주식회사 | Image display apparatus and operating method for the same |
CA2946902C (en) | 2014-04-29 | 2023-11-21 | Tritonwear Inc. | Wireless metric calculating and feedback apparatus, system, and method |
US9288556B2 (en) | 2014-06-18 | 2016-03-15 | Zikto | Method and apparatus for measuring body balance of wearable device |
KR101461464B1 (en) * | 2014-06-18 | 2014-11-18 | 김경태 | Smart band and biometric authentication method thereof |
US10096216B1 (en) * | 2014-12-16 | 2018-10-09 | Amazon Technologies, Inc. | Activation of security mechanisms through accelerometer-based dead reckoning |
US9977884B2 (en) | 2015-02-27 | 2018-05-22 | Plantronics, Inc. | Authentication server for a probability-based user authentication system and method |
CN105117627A (en) * | 2015-07-30 | 2015-12-02 | 努比亚技术有限公司 | Method and device for hiding information |
US10212168B2 (en) * | 2015-08-24 | 2019-02-19 | Beijing Lenovo Software Ltd. | Electronic device and control method thereof |
CN105138252B (en) * | 2015-08-24 | 2020-08-25 | 联想(北京)有限公司 | Control method and electronic equipment |
US10014967B2 (en) * | 2015-11-23 | 2018-07-03 | Huami Inc. | System and method for authenticating a broadcast device using facial recognition |
CN107506684B (en) * | 2016-06-14 | 2022-03-01 | 中兴通讯股份有限公司 | Gait recognition method and device |
US10223848B2 (en) * | 2016-09-19 | 2019-03-05 | Intel Corporation | Internet of things smart entry |
DE102016218351A1 (en) * | 2016-09-23 | 2018-04-12 | Volkswagen Aktiengesellschaft | Method and system for controlling a door of a motor vehicle |
US10395457B2 (en) * | 2017-08-10 | 2019-08-27 | GM Global Technology Operations LLC | User recognition system and methods for autonomous vehicles |
US10346841B2 (en) * | 2017-10-16 | 2019-07-09 | Capital One Services, Llc | Transaction card security device |
US10269017B1 (en) * | 2017-11-21 | 2019-04-23 | Capital One Services, Llc | Transaction confirmation and authentication based on device sensor data |
US10284552B1 (en) | 2018-06-06 | 2019-05-07 | Capital One Services, Llc | Systems and methods for using micro accelerations as a biometric identification factor |
CN108596100A (en) * | 2018-04-25 | 2018-09-28 | 常州大学 | A kind of personal identification method based under multi-pose |
US10587615B2 (en) | 2018-06-06 | 2020-03-10 | Capital One Services, Llc | Systems and methods for using micro accelerations as a biometric identification factor |
US10380813B1 (en) | 2018-07-19 | 2019-08-13 | Capital One Services, Llc | Systems and methods for using motion pattern of a user for authentication |
US10445733B1 (en) | 2018-08-06 | 2019-10-15 | Capital One Service, LLC | Systems and methods active signature detection |
CN111860063B (en) * | 2019-04-30 | 2023-08-11 | 杭州海康威视数字技术股份有限公司 | Gait data construction system, method and device |
DE102020102490A1 (en) | 2020-01-31 | 2021-08-05 | Bayerische Motoren Werke Aktiengesellschaft | Vehicle with automatic opening mechanism for vehicle tailgate |
CN111428690B (en) * | 2020-04-21 | 2022-08-09 | 桂林电子科技大学 | Identity authentication method based on gait signal topology analysis |
WO2023162672A1 (en) * | 2022-02-24 | 2023-08-31 | ソニーグループ株式会社 | Information processing device, information processing method, and program |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060080551A1 (en) * | 2004-09-13 | 2006-04-13 | Jani Mantyjarvi | Recognition of live object in motion |
US20060098097A1 (en) * | 2004-09-13 | 2006-05-11 | Wach Hans B | Iris image capture devices and associated systems |
US20070005988A1 (en) * | 2005-06-29 | 2007-01-04 | Microsoft Corporation | Multimodal authentication |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2358108A (en) * | 1999-11-29 | 2001-07-11 | Nokia Mobile Phones Ltd | Controlling a hand-held communication device |
US6721738B2 (en) | 2000-02-01 | 2004-04-13 | Gaveo Technology, Llc. | Motion password control system |
JP4385274B2 (en) * | 2002-10-29 | 2009-12-16 | ソニー株式会社 | Walking waveform feature extraction method and personal identification device |
US7096619B2 (en) | 2004-02-17 | 2006-08-29 | Jackson Charles L | Equipment operator personalization device |
US8762733B2 (en) * | 2006-01-30 | 2014-06-24 | Adidas Ag | System and method for identity confirmation using physiologic biometrics to determine a physiologic fingerprint |
-
2007
- 2007-01-23 US US11/657,234 patent/US7917768B2/en active Active
-
2008
- 2008-01-23 JP JP2009547290A patent/JP5442451B2/en active Active
- 2008-01-23 EP EP08724780A patent/EP2127193A4/en not_active Withdrawn
- 2008-01-23 WO PCT/US2008/000928 patent/WO2008091660A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060080551A1 (en) * | 2004-09-13 | 2006-04-13 | Jani Mantyjarvi | Recognition of live object in motion |
US20060098097A1 (en) * | 2004-09-13 | 2006-05-11 | Wach Hans B | Iris image capture devices and associated systems |
US20070005988A1 (en) * | 2005-06-29 | 2007-01-04 | Microsoft Corporation | Multimodal authentication |
Non-Patent Citations (1)
Title |
---|
See also references of EP2127193A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930221A (en) * | 2011-08-09 | 2013-02-13 | 三星电子(中国)研发中心 | Method for protecting data in handheld equipment |
CN102902935A (en) * | 2012-09-26 | 2013-01-30 | 广东欧珀移动通信有限公司 | Mobile terminal privacy protection method and device |
CN105389364A (en) * | 2015-11-06 | 2016-03-09 | 中国科学院自动化研究所 | Digital cultural relic security sharing system |
CN105389364B (en) * | 2015-11-06 | 2020-02-04 | 中国科学院自动化研究所 | Digital cultural relic safety sharing system |
EP3578426B1 (en) * | 2018-06-06 | 2023-03-29 | Huf Hülsbeck & Fürst GmbH & Co. KG | Method for identifying a person for use in a motor vehicle |
EP4155985A4 (en) * | 2020-05-22 | 2023-11-01 | Sony Group Corporation | Information processing device, information processing method, and computer program |
Also Published As
Publication number | Publication date |
---|---|
US20080175443A1 (en) | 2008-07-24 |
JP5442451B2 (en) | 2014-03-12 |
JP2010517430A (en) | 2010-05-20 |
EP2127193A1 (en) | 2009-12-02 |
EP2127193A4 (en) | 2011-05-04 |
US7917768B2 (en) | 2011-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7917768B2 (en) | System control via characteristic gait signature | |
US10867025B2 (en) | Opportunistically collecting sensor data from a mobile device to facilitate user identification | |
US9749332B2 (en) | Electronic device with addiction-prevention function and method thereof | |
US11140171B1 (en) | Establishing and verifying identity using action sequences while protecting user privacy | |
US8364120B2 (en) | Identity verification using location over time information | |
AU2005304438B2 (en) | Actuating a security system using a wireless device | |
KR101705472B1 (en) | Pluggable authentication mechanism for mobile device applications | |
US20170334395A1 (en) | Smart key generating device, automobile, and method for controlling the automobile by using the smart key | |
US8055032B2 (en) | Digital camera with fingerprint identification function | |
WO2014005004A1 (en) | Proximity aware security system for portable electronics with multi-factor user authentication and secure device identity verification | |
US20040044897A1 (en) | Biometrics parameters protected computer serial bus interface portable data storage device and method of proprietary biometrics enrollment | |
US20070136796A1 (en) | Wireless authentication | |
US20160224777A1 (en) | User Authentication For Mobile Devices Using Behavioral Analysis | |
US20180114417A1 (en) | Method and apparatus for providing a security mechanism on a mobile device | |
US11641586B2 (en) | Mobile device location determination | |
US20110121943A1 (en) | Biometric remote control device and methods and computer program product for operating the same | |
CN1764884A (en) | Be used to authorize device to the visit of electronic equipment | |
KR20150049075A (en) | Method for certifying user and apparatus for perfoming the same | |
JP5823651B1 (en) | Authentication system, authentication method, and authentication program | |
US20150373051A1 (en) | Dynamic authentication using distributed mobile sensors | |
CN108632758A (en) | Terminal tracing method, processing unit and terminal and storage medium | |
Shila et al. | A multi-faceted approach to user authentication for mobile devices—using human movement, usage, and location patterns | |
Stockinger | Implicit authentication on mobile devices | |
WO2011088579A1 (en) | Apparatus and method for maintaining security and privacy on hand held devices | |
EP3076697A1 (en) | Apparatus and method for providing a security mechanism on a mobile device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08724780 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2009547290 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008724780 Country of ref document: EP |