WO2015034149A1 - Wearable device performing user authentication using bio-signals and authentication method of the same - Google Patents

Wearable device performing user authentication using bio-signals and authentication method of the same Download PDF

Info

Publication number
WO2015034149A1
WO2015034149A1 PCT/KR2014/001414 KR2014001414W WO2015034149A1 WO 2015034149 A1 WO2015034149 A1 WO 2015034149A1 KR 2014001414 W KR2014001414 W KR 2014001414W WO 2015034149 A1 WO2015034149 A1 WO 2015034149A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
biosignal
wearable device
information
signal
Prior art date
Application number
PCT/KR2014/001414
Other languages
French (fr)
Inventor
Chang Mok Choi
Sang Joon Kim
Seung Keun Yoon
Original Assignee
Samsung Electronics Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co., Ltd. filed Critical Samsung Electronics Co., Ltd.
Priority to CN201480043822.6A priority Critical patent/CN105556529B/en
Priority to EP14842116.7A priority patent/EP3044715B1/en
Publication of WO2015034149A1 publication Critical patent/WO2015034149A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/33Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/017Gesture based interaction, e.g. based on a set of recognized hand gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44213Monitoring of end-user related data
    • H04N21/44218Detecting physical presence or behaviour of the user, e.g. using sensors to detect if the user is leaving the room or changes his face expression during a TV program
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent

Definitions

  • the following description relates to a wearable device performing user authentication using biosignals and an authentication method of the wearable device.
  • a mobile device may provide a great deal of convenience for modern life.
  • a growing computing power of the mobile device may enable users to handle tasks previously performed using a personal computer (PC).
  • PC personal computer
  • protecting personal information stored on the mobile device such as, contact information, personal multimedia contents, for example, photos and videos, messages, and financial information has become more important.
  • a user loses a mobile device and another unspecified user uses the mobile device, there is a high risk of personal information of the user being unintentionally exposed. Accordingly, there is a desire for a method of authenticating a user for whom use of a mobile device is intended and controlling an access to various types of personal information stored on the mobile device.
  • a wearable device including a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user.
  • the device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
  • the first biosignal may be generated in response to a muscle movement performed by the user to input the gesture.
  • the first biosignal may be at least one of an electromyogram (EMG) signal generated before and after the muscle movement, a light signal penetrating a muscle of the user, and a force signal generated by the muscle.
  • EMG electromyogram
  • the second biosignal may be at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
  • ECG electrocardiogram
  • PPG photoplethysmogram
  • the stored information may include a piece of feature point information obtained by performing signal processing on the first biosignal and the second biosignal.
  • the stored information may be encoded.
  • the processor may be configured to determine whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticate the user based on a result of the determining of whether the difference is within the predetermined error range.
  • the device may further include an initial authenticator configured to receive the gesture and the second biosignal from the user, and store, in the memory, the first biosignal corresponding to the gesture, and the second biosignal.
  • the memory may be further configured to store access right information of a function executable in the wearable device, and in response a command to execute the function being input to the wearable device by the user, the processor may be configured to read, from the memory, the access right information, and provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
  • the feedback may be a request for the user authentication.
  • the device may further include a wearing detection sensor configured to detect whether the wearable device is detached from the user, and the processor may be configured to control the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
  • the wearing detection sensor may be configured to detect a mechanical movement of a band attached to a portion of a body of the user, and/or detect an electrical signal generated by attaching and detaching of the band.
  • the memory may be further configured to store device setting information of the at least one user, and in response to the user being authenticated, the processor may be further configured to read, from the memory, the device setting information of the authenticated user, and provide, to the user, a user interface based on the device setting information.
  • the wearable device may be a watch-type smartphone.
  • a wearable device including a first sensor configured to detect a first biosignal generated in response to a muscle movement performed by a user to input a gesture, and a second sensor configured to detect a second biosignal of the user, the second biosignal being at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
  • ECG electrocardiogram
  • PPG photoplethysmogram
  • the device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to trigger user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
  • a user authentication method of a wearable device including detecting a first biosignal generated in response to a gesture performed by a user, and detecting a second biosignal of the user.
  • the method further includes storing, with respect to at least one user, information of the first biosignal and the second biosignal, initiating user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticating the user by comparing the detected second biosignal to the stored information.
  • the authenticating may include determining whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticating the user based on a result of the determining of whether the difference is within the predetermined error range.
  • the method may further include receiving the gesture and the second biosignal from the user, and storing the first biosignal corresponding to the gesture, and the second biosignal.
  • the method may further include storing access right information of a function executable in the wearable device.
  • the initiating may include reading the access right information, and providing, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
  • the method may further include detecting whether the wearable device is detached from the user, and controlling the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
  • the detecting may include detecting a mechanical movement of a band attached to a portion of a body of the user, and/or detecting an electrical signal generated by attaching and detaching of the band.
  • the method may further include storing device setting information of the at least one user, and in response to the user being authenticated, reading the device setting information of the authenticated user, and providing, to the user, a user interface based on the device setting information.
  • a non-transitory computer-readable storage medium may store a program including instructions to cause a computer to perform the method.
  • a wearable device including a first sensor configured to detect a first signal of a user, and a second sensor configured to detect a second signal of the user.
  • the device further includes a processor configured to initiate user authentication in response to the detected first signal corresponding to information of the first signal, and authenticate the user in response to the detected second signal being within a predetermined range of information of the second signal.
  • the information of the first and second signals may be predetermined.
  • the processor may be further configured to receive, from the user, a command to execute a function, and provide, to the user, a feedback based on predetermined access right information corresponding to the function, the predetermined access right information indicating a level of the user authentication needed.
  • FIG. 1 is a diagram illustrating an example of a wearable device.
  • FIG. 2 is a block diagram illustrating an example of a wearable device.
  • FIG. 3 is a block diagram illustrating another example of a wearable device.
  • FIG. 4 is a flowchart illustrating an example of an authentication method of a wearable device.
  • FIG. 5 is a flowchart illustrating another example of an authentication method of a wearable device.
  • FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device.
  • FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user.
  • FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device.
  • FIG. 1 is a diagram illustrating an example of a wearable device.
  • the wearable device may be attachable to, wearable on, and detachable from a portion of a body of a user, using an arm band, a wrist band, and/or other fixing devices known to one of ordinary skill in the art.
  • a surface of the wearable device that is provided with a display visible to the user will be described as a front 130
  • another surface of the wearable device that faces the body of the user when the wearable device is attached or worn will be described as a back 150.
  • a mechanically or electrically openable and closeable protector may be disposed on the front 130 to protect the display.
  • the front 130 may refer to, for example, the surface of the actual display or a surface of the protector, on which a sensor to be described later is provided.
  • the wearable device includes a plurality of sensors 131, 151, and 155 provided on the front 130 and the back 150, respectively.
  • the wearable device detects, using at least one of the sensors 131, 151, and 155, a trigger signal triggering a process of user authentication, and initiates the user authentication based on the detected trigger signal.
  • the user may generate the trigger signal by performing a predetermined gesture, for example, opening a hand, clenching a fist, rotating a wrist, and/or other gestures known to one of ordinary skill in the art.
  • the wearable device may detect, using at least one of the sensors 131, 151, and 155, the trigger signal generated in response to the gesture.
  • the wearable device may initiate the process of the user authentication.
  • the gesture may be intentionally inputted by the user while the user is wearing the wearable device, although the gesture may not be performed by the user in a process of putting on the wearable device.
  • the sensor 155 provided on the back 150 of the wearable device may detect a biosignal generated in response to a muscle movement of the user, which is generated by the gesture.
  • the biosignal generated in response to the gesture performed by the user may be the trigger signal used to initiate the user authentication, and be referred to as a first biosignal.
  • the first biosignal may include, for example, an electromyogram (EMG) signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
  • EMG electromyogram
  • the first biosignal may be generated only in response to a predetermined gesture input from the user.
  • the wearable device may authenticate the user, using a second biosignal detected by the sensor 131 provided on the front 130 and/or the sensor 151 provided on the back 150.
  • the second biosignal may be unique to each user, and be distinguished from the first biosignal.
  • the second biosignal may include, for example, an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and/or an impedance signal generated by a body of the user.
  • ECG electrocardiogram
  • PPG photoplethysmogram
  • the second biosignal may be unique to each user, and thus, recognizing an iris or a fingerprint may be used to obtain the second biosignal.
  • the wearable device may be a watch-type smartphone 110.
  • the watch-type smartphone 110 may be an example of the wearable device, and thus, it may be obvious to those skilled in the art that various applications and design modifications may be possible. Described hereinafter is an example of an operation of the wearable device used when the user wears the wearable device around a left wrist.
  • the user wearing the wearable device around the left wrist may perform a predetermined gesture, for example, opening a left hand and/or rotating the left hand upwards. Due to the gesture, a first biosignal, as a trigger signal, may be generated, and the wearable device may detect the first biosignal. The wearable device may initiate a process of user authentication in response to the detecting of the first biosignal. The detecting of the first biosignal and the initiating of the process of user authentication may be performed inconsecutively or consecutively in terms of time based on implementation.
  • the first biosignal generated in response to a muscle movement of the user, due to the gesture may be detected by the sensor 155 provided on the back 150 of the wearable device.
  • the first biosignal detected by the sensor 155 may be compared to a trigger signal stored in a memory of the wearable device and predetermined by the user. As a result of the comparison, when the first biosignal is determined to be identical to the trigger signal or within a predetermined error range of the trigger signal, the process of user authentication may be initiated.
  • the user may place a finger of a right hand on the sensor 131 provided on the front 130 of the wearable device, and the wearable device may detect a second biosignal of the user, using the sensor 131.
  • the sensor 151 provided on the back 150 of the wearable device and in contact with skin of the user may also detect the second biosignal in the same way as the sensor 131 provided on the front 130.
  • the sensor 155 may detect an EMG signal of the user
  • the sensor 131 and the sensor 151 may detect an ECG signal of the user.
  • a signal detected in at least two different portions of the body of the user may be needed, and thus, the sensors 131 and 151 are provided on the front 130 and on the back 150, respectively.
  • a sensor used to receive the second biosignal may be provided on either the front 130 or the back 150. A number of the sensors used to detect the first biosignal and the second biosignal may vary based on need.
  • FIG. 2 is a block diagram illustrating an example of a wearable device 200.
  • the wearable device 200 may include a first sensor 210, a second sensor 220, a memory 230, and a processor 240.
  • the first sensor 210 detects a first biosignal generated in response to a gesture performed by a user.
  • the first biosignal may be generated in response to a muscle movement of the user to input the gesture.
  • the first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
  • the gesture performed by the user may be one of various forms, for example, a wrist rotating, a hand flailing, and/or a fist clenching, which may be performed by the user using a portion of a body on which the user wears the wearable device 200.
  • a higher level of user authentication is needed based on implementation, at least two gestures consecutively input by the user may initiate the user authentication.
  • the second sensor 220 detects a second biosignal of the user.
  • the second biosignal may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by the body of the user.
  • the memory 230 stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal.
  • the information directly representing the first biosignal and the second biosignal may be information representing at least a portion of a sampled data symbol, or may be a duplicated signal of the first biosignal and the second signal.
  • the information indirectly representing the first biosignal and the second biosignal may be information in which the first biosignal and the second biosignal are processed and represented based on various signal processing methods.
  • the memory 230 may store at least one piece of feature point information obtained through signal processing performed on the first biosignal and the second biosignal.
  • the information to be stored in the memory 230 may be encoded and stored in the memory 230.
  • a design to prevent the stored information from being leaked out may be applied.
  • various methods may be adopted to prevent a third person from decoding the stored information in an abnormal manner.
  • the processor 240 determines, by referring to the memory 230, whether the first biosignal detected by the first sensor 210 corresponds to the information stored in the memory 230, and initiates a process of user authentication when the first biosignal corresponds to the stored information.
  • the processor 240 authenticates the user by comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230.
  • the processor 240 may operate based on a predetermined error range.
  • the error range may be determined by the user or predetermined in the wearable device 200 based on a result of statistics. For example, the error range may be predetermined, by the user, to be 7%.
  • the processor 240 may determine that the second biosignal detected by the second sensor 220 corresponds to the information stored in the memory 230 because the 5% error is within the predetermined error range. In this example, the processor 240 may authenticate the user.
  • the processor 240 may determine that the second biosignal detected by the second sensor 220 does not correspond to the information stored in the memory 230 because the 10% error is outside the predetermined error range. In this example, the processor 240 may not authenticate the user.
  • the processor 240 may notify the user of a result of the user authentication in a visual, audible, and/or tactile manner, for example, on a display of the wearable device 200, through a speaker of the wearable device 200, and/or through a vibration of the wearable device 200.
  • FIG. 3 is a block diagram illustrating another example of a wearable device 300.
  • the wearable device 300 may include a first sensor 310, a second sensor 320, a memory 330, a processor 340, an initial authenticator 350, and a wearing detection sensor 360.
  • the memory 330 stores access right information on at least one function executable in the wearable device 300.
  • the access right information on each function may be determined by an external device, for example, a personal computer (PC), a laptop computer, and/or a smartphone, which is connected to the wearable device 300 through a wire or a wireless communication, or may be self-determined by the wearable device 300.
  • An example of the access right information on the executable function, which is stored in the memory 330, will be described in detail by referring to following FIG. 8.
  • the processor 340 When a command to execute a function is input to the wearable device 300 from the user, the processor 340 reads the access right information on the function, by referring to the memory 330, and provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information. Each form of feedback may be a request for user authentication to the user.
  • the wearable device 300 may include various executable functions, for example, performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting a short message service (SMS) message, and/or other executable functions known to one of ordinary skill in the art, and each function may need a different access right.
  • the memory 330 may store the access right information on the various functions executable in the wearable device 300. For example, functions such as smartphone banking and opening a personal e-mail may need a relatively high level of the access right information, and functions such as using the Internet and transmitting an SMS message may need a relatively low level of the access right information.
  • the processor 340 may read the access right information on the function, by referring to the memory 330.
  • the access right information on the function of opening a personal e-mail that is stored in the memory 330 may be at a relatively high level.
  • the processor 340 may provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback requesting a high level of user authentication based on the access right information.
  • the visual feedback may be feedback indicated on a display of the wearable device 300
  • the auditory feedback may be feedback delivered in a form of sound to the user through a speaker of the wearable device 300
  • the tactile feedback may be feedback delivered in a form of touch sensation to the user through vibration of the wearable device 300.
  • the initial authenticator 350 receives a gesture and/or a first biosignal and a second biosignal from the user through the first sensor 310 and the second sensor 320, respectively, to set up an initial authentication.
  • the initial authenticator 350 stores, in the memory 330, the first biosignal corresponding to the input gesture and the second biosignal.
  • the wearing detection sensor 360 detects whether the wearable device 300 is detached from the user.
  • the wearing detection sensor 360 may detect a mechanical movement of a band attached to a portion of a body of the user, by being connected to the wearable device 300, or may detect an electrical signal generated in association with attaching and detaching of the band.
  • the wearing detection sensor 360 may detect, by being connected to the wearable device 300, changes generated when the band attached to the portion of the body of the user is attached and detached. For example, the wearing detection sensor 360 may detect a change in which tension or elasticity of the band attached to a wrist of the user increases or decreases. Also, the wearing detection sensor 360 may detect a change in an amount of light detected by a light receiving unit of a photo sensor attached to a back of the wearable device 300, and may detect a change in which an electrical signal or an impedance signal is intensified or weakened when a contact point between the wearing detection sensor 360 and a skin appears or disappears due to the attaching or detaching of the band. Further, the wearing detection sensor 360 may include various sensors that may detect whether the wearable device 300 is worn or not, and may deliver changes detected by the sensors to the processor 340.
  • the processor 340 controls the user authentication to be invalid based on a signal received from the wearing detection sensor 360.
  • the signal received from the wearing detection sensor 360 may be a signal such as "the user authentication to be invalid" indicating that a usage right assigned to the user through the process of the user authentication that is performed when the user wears the wearable device 300 is withdrawn or nullified.
  • the user authentication is invalid, the user may need to obtain the usage right through the process of the user authentication that is performed again when the user resumes wearing the wearable device 300.
  • the memory 330 may further store device setting information on each of at least one user.
  • the processor 340 may read the device setting information on the authenticated user, by referring to the memory 330, and may provide a user interface based on the device setting information.
  • different device setting information or different configuration information pertaining to user A and user B may be stored in the memory 330.
  • the processor 340 may read the device setting information on the user A that is stored in the memory 330, and may provide a main display and/or an icon arrangement for application execution, for the user A.
  • FIG. 4 is a flowchart illustrating a user authentication method of a wearable device.
  • the wearable device detects a first biosignal generated in response to a gesture performed by a user.
  • the first biosignal may be generated in response to a muscle movement of the user to input the gesture.
  • the first biosignal may be at least one of an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and a force signal generated by the muscle of the user.
  • the wearable device detects a second biosignal of the user.
  • the second biosignal may be a signal distinguished from the first biosignal, and at least one of an ECG signal, a PPG signal, a voice of the user, and an impedance signal generated by a body of the user.
  • the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in a memory of the wearable device.
  • the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 450. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
  • the wearable device initiates a process of user authentication.
  • the wearable device compares the second biosignal detected by the second sensor to the stored information.
  • the wearable device authenticates the user based on a result of the comparison, e.g., when the second biosignal corresponds to the stored information.
  • the wearable device may read device setting information of the authenticated user, by referring to the memory, and provide a user interface based on the device setting information.
  • the device setting information on each of the at least one user may be stored in the memory of the wearable device.
  • FIG. 5 is a flowchart illustrating another example of a user authentication method of a wearable device.
  • the wearable device receives a gesture and a second biosignal from a user.
  • the wearable device stores, in a memory of the wearable device, a first biosignal corresponding to the gesture, and the second biosignal.
  • a process of storing initial user information is performed in operations 510 and 515, and thus, the user information stored in operations 510 and 515 may be used for user authentication in the wearable device.
  • the information stored in operations 510 and 515 may be managed with respect to each of the users.
  • the wearable device detects the first biosignal generated in response to the gesture performed by the user.
  • the first biosignal may be generated in response to a muscle movement of the user to input the gesture.
  • the first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
  • the wearable device detects the second biosignal of the user.
  • the second biosignal may be a biosignal unique to each of users and distinguished from the first biosignal, and may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by a body of the user.
  • the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in the memory.
  • the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 540. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
  • the wearable device initiates a process of user authentication.
  • the wearable device compares the second biosignal detected by the second sensor to the information stored in the memory.
  • the wearable device determines whether a difference between the second biosignal detected by the second sensor and the information stored in the memory is within a predetermined error range. When the wearable device determines that the difference between the second biosignal and the stored information is within the predetermined error range, the wearable device continues in operation 555. When the wearable device determines that the difference between the second biosignal and the stored information is outside the predetermined error range, the wearable device ends the method.
  • the wearable device authenticates the user.
  • the wearable device may provide basic information, such as time and day, to the user.
  • FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device.
  • the wearable device stores the access right information on at least one function executable in the wearable device.
  • the wearable device receives, from the user, an input of a command to execute a function of the wearable device of the at least one function executable in the wearable device.
  • the wearable device reads, by referring to a memory of the wearable device, the access right information on the function for which the command to execute is input.
  • the wearable device provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information.
  • Each feedback may be a request sent to the user for authentication.
  • FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user. Described hereinafter is an example in which a wearing detection sensor is provided with a sensor detecting a change of impedance.
  • the wearable device detects, from the wearing detection sensor, the change of the impedance input to the wearable device.
  • the wearable device determines whether the wearable device is detached from the user based on the change of the impedance. When the wearable device determines that the wearable device is detached from the user, the wearable device continues in operation 730. When the wearable device determines that the wearable device is attached to the user, the wearable device continues in operation 740.
  • the wearable device may determine that the wearable device is detached from the user.
  • the wearable device may determine that the wearable device is not detached from the user.
  • the wearable device controls user authentication to be invalid.
  • the wearable device controls the user authentication to be maintained.
  • the wearing detection sensor may include a photo sensor detecting an amount of light collected on a back of the wearable device, or a sensor detecting tension of a band.
  • the wearable device may determine whether the wearable device is detached from the user in a same or a similar manner as described, based on a characteristic of each sensor.
  • FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device.
  • the access right information on the executable functions may be stored along with a command code for execution of each of the executable functions, such as performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting an SMS message, and providing time (clock) and weather information.
  • a different access right determined with respect to each of the executable functions may be stored in the memory.
  • the access right of level 4 may be determined for functions relating to important financial information and privacy protection such as performing a financial task, smartphone banking, and opening a personal e-mail.
  • the access right of level 3 may be determined for functions such as using the Internet and transmitting an SMS message.
  • the access right of level 0 may be determined for basic functions needing no security, such as, providing time or weather information. The functions for which the access right of level 0 is determined, may be provided even when a user does not undergo user authentication or fails the user authentication.
  • a processor of the wearing device may verify, by referring to the memory, which function is related to the command based on an input command code for execution, and may read the access right information on the verified function.
  • the processor may verify that the function is a function of opening a personal e-mail, and may read that the access right information on the verified function of opening a personal e-mail is of level 4.
  • the processor may request, based on the access right information, for example, of level 4, an additional user authentication to the user, using a visual feedback, an auditory feedback, and/or a tactile feedback.
  • the access right information on at the executable functions in the wearable device is stored in a form or order of a level of the access right.
  • the access right information may be stored in other various forms or orders.
  • a hardware component may be, for example, a physical device that physically performs one or more operations, but is not limited thereto.
  • hardware components include microphones, amplifiers, low-pass filters, high-pass filters, band-pass filters, analog-to-digital converters, digital-to-analog converters, and processing devices.
  • a software component may be implemented, for example, by a processing device controlled by software or instructions to perform one or more operations, but is not limited thereto.
  • a computer, controller, or other control device may cause the processing device to run the software or execute the instructions.
  • One software component may be implemented by one processing device, or two or more software components may be implemented by one processing device, or one software component may be implemented by two or more processing devices, or two or more software components may be implemented by two or more processing devices.
  • a processing device may be implemented using one or more general-purpose or special-purpose computers, such as, for example, a processor, a controller and an arithmetic logic unit, a digital signal processor, a microcomputer, a field-programmable array, a programmable logic unit, a microprocessor, or any other device capable of running software or executing instructions.
  • the processing device may run an operating system (OS), and may run one or more software applications that operate under the OS.
  • the processing device may access, store, manipulate, process, and create data when running the software or executing the instructions.
  • OS operating system
  • the singular term "processing device" may be used in the description, but one of ordinary skill in the art will appreciate that a processing device may include multiple processing elements and multiple types of processing elements.
  • a processing device may include one or more processors, or one or more processors and one or more controllers.
  • different processing configurations are possible, such as parallel processors or multi-core processors.
  • a processing device configured to implement a software component to perform an operation A may include a processor programmed to run software or execute instructions to control the processor to perform operation A.
  • a processing device configured to implement a software component to perform an operation A, an operation B, and an operation C may have various configurations, such as, for example, a processor configured to implement a software component to perform operations A, B, and C; a first processor configured to implement a software component to perform operation A, and a second processor configured to implement a software component to perform operations B and C; a first processor configured to implement a software component to perform operations A and B, and a second processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operation A, a second processor configured to implement a software component to perform operation B, and a third processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operations A, B, and C, and a second processor configured to implement a software component to perform operations A, B
  • Software or instructions for controlling a processing device to implement a software component may include a computer program, a piece of code, an instruction, or some combination thereof, for independently or collectively instructing or configuring the processing device to perform one or more desired operations.
  • the software or instructions may include machine code that may be directly executed by the processing device, such as machine code produced by a compiler, and/or higher-level code that may be executed by the processing device using an interpreter.
  • the software or instructions and any associated data, data files, and data structures may be embodied permanently or temporarily in any type of machine, component, physical or virtual equipment, computer storage medium or device, or a propagated signal wave capable of providing instructions or data to or being interpreted by the processing device.
  • the software or instructions and any associated data, data files, and data structures also may be distributed over network-coupled computer systems so that the software or instructions and any associated data, data files, and data structures are stored and executed in a distributed fashion.
  • the software or instructions and any associated data, data files, and data structures may be recorded, stored, or fixed in one or more non-transitory computer-readable storage media.
  • a non-transitory computer-readable storage medium may be any data storage device that is capable of storing the software or instructions and any associated data, data files, and data structures so that they can be read by a computer system or processing device.
  • Examples of a non-transitory computer-readable storage medium include read-only memory (ROM), random-access memory (RAM), flash memory, CD-ROMs, CD-Rs, CD+Rs, CD-RWs, CD+RWs, DVD-ROMs, DVD-Rs, DVD+Rs, DVD-RWs, DVD+RWs, DVD-RAMs, BD-ROMs, BD-Rs, BD-R LTHs, BD-REs, magnetic tapes, floppy disks, magneto-optical data storage devices, optical data storage devices, hard disks, solid-state disks, or any other non-transitory computer-readable storage medium known to one of ordinary skill in the art.
  • ROM read-only memory
  • RAM random-access memory
  • flash memory CD-ROMs, CD-Rs, CD+Rs, CD-RWs, CD+RWs, DVD-ROMs, DVD-Rs, DVD+Rs, DVD-RWs, DVD+RWs, DVD-RAMs, BD
  • a device described herein may refer to mobile devices such as, for example, a cellular phone, a smart phone, a wearable smart device (such as, for example, a ring, a watch, a pair of glasses, a bracelet, an ankle bracket, a belt, a necklace, an earring, a headband, a helmet, a device embedded in the cloths or the like), a personal computer (PC), a tablet personal computer (tablet), a phablet, a personal digital assistant (PDA), a digital camera, a portable game console, an MP3 player, a portable/personal multimedia player (PMP), a handheld e-book, an ultra mobile personal computer (UMPC), a portable lab-top PC, a global positioning system (GPS) navigation, and devices such as a high definition television (HDTV), an optical disc player, a DVD player, a Blue-ray player, a setup box, or any other device capable of wireless communication or network communication consistent with that disclosed here
  • a personal computer PC
  • the wearable device may be self-mountable on the body of the user, such as, for example, the glasses or the bracelet.
  • the wearable device may be mounted on the body of the user through an attaching device, such as, for example, attaching a smart phone or a tablet to the arm of a user using an armband, or hanging the wearable device around the neck of a user using a lanyard.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

A wearable device includes a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.

Description

WEARABLE DEVICE PERFORMING USER AUTHENTICATION USING BIO-SIGNALS AND AUTHENTICATION METHOD OF THE SAME
The following description relates to a wearable device performing user authentication using biosignals and an authentication method of the wearable device.
Amid the proliferation of smart phones, a variety of mobile devices are being developed, and a wearable type mobile device has been emerging. A mobile device may provide a great deal of convenience for modern life. A growing computing power of the mobile device may enable users to handle tasks previously performed using a personal computer (PC). However, due to widespread use of the mobile device, protecting personal information stored on the mobile device, such as, contact information, personal multimedia contents, for example, photos and videos, messages, and financial information has become more important. In a case in which a user loses a mobile device and another unspecified user uses the mobile device, there is a high risk of personal information of the user being unintentionally exposed. Accordingly, there is a desire for a method of authenticating a user for whom use of a mobile device is intended and controlling an access to various types of personal information stored on the mobile device.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter
In one general aspect, there is provided a wearable device, including a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
The first biosignal may be generated in response to a muscle movement performed by the user to input the gesture.
The first biosignal may be at least one of an electromyogram (EMG) signal generated before and after the muscle movement, a light signal penetrating a muscle of the user, and a force signal generated by the muscle.
The second biosignal may be at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
The stored information may include a piece of feature point information obtained by performing signal processing on the first biosignal and the second biosignal.
The stored information may be encoded.
The processor may be configured to determine whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticate the user based on a result of the determining of whether the difference is within the predetermined error range.
The device may further include an initial authenticator configured to receive the gesture and the second biosignal from the user, and store, in the memory, the first biosignal corresponding to the gesture, and the second biosignal.
The memory may be further configured to store access right information of a function executable in the wearable device, and in response a command to execute the function being input to the wearable device by the user, the processor may be configured to read, from the memory, the access right information, and provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
The feedback may be a request for the user authentication.
The device may further include a wearing detection sensor configured to detect whether the wearable device is detached from the user, and the processor may be configured to control the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
The wearing detection sensor may be configured to detect a mechanical movement of a band attached to a portion of a body of the user, and/or detect an electrical signal generated by attaching and detaching of the band.
The memory may be further configured to store device setting information of the at least one user, and in response to the user being authenticated, the processor may be further configured to read, from the memory, the device setting information of the authenticated user, and provide, to the user, a user interface based on the device setting information.
The wearable device may be a watch-type smartphone.
In another general aspect, there is provided a wearable device, including a first sensor configured to detect a first biosignal generated in response to a muscle movement performed by a user to input a gesture, and a second sensor configured to detect a second biosignal of the user, the second biosignal being at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to trigger user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
In still another general aspect, there is provided a user authentication method of a wearable device, the method including detecting a first biosignal generated in response to a gesture performed by a user, and detecting a second biosignal of the user. The method further includes storing, with respect to at least one user, information of the first biosignal and the second biosignal, initiating user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticating the user by comparing the detected second biosignal to the stored information.
The authenticating may include determining whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticating the user based on a result of the determining of whether the difference is within the predetermined error range.
The method may further include receiving the gesture and the second biosignal from the user, and storing the first biosignal corresponding to the gesture, and the second biosignal.
The method may further include storing access right information of a function executable in the wearable device. In response a command to execute the function being input to the wearable device by the user, the initiating may include reading the access right information, and providing, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
The method may further include detecting whether the wearable device is detached from the user, and controlling the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
The detecting may include detecting a mechanical movement of a band attached to a portion of a body of the user, and/or detecting an electrical signal generated by attaching and detaching of the band.
The method may further include storing device setting information of the at least one user, and in response to the user being authenticated, reading the device setting information of the authenticated user, and providing, to the user, a user interface based on the device setting information.
A non-transitory computer-readable storage medium may store a program including instructions to cause a computer to perform the method.
In yet another general aspect, there is provided a wearable device, including a first sensor configured to detect a first signal of a user, and a second sensor configured to detect a second signal of the user. The device further includes a processor configured to initiate user authentication in response to the detected first signal corresponding to information of the first signal, and authenticate the user in response to the detected second signal being within a predetermined range of information of the second signal.
The information of the first and second signals may be predetermined.
The processor may be further configured to receive, from the user, a command to execute a function, and provide, to the user, a feedback based on predetermined access right information corresponding to the function, the predetermined access right information indicating a level of the user authentication needed.
Other features and aspects will be apparent from the following detailed description, the drawings, and the claims.
FIG. 1 is a diagram illustrating an example of a wearable device.
FIG. 2 is a block diagram illustrating an example of a wearable device.
FIG. 3 is a block diagram illustrating another example of a wearable device.
FIG. 4 is a flowchart illustrating an example of an authentication method of a wearable device.
FIG. 5 is a flowchart illustrating another example of an authentication method of a wearable device.
FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device.
FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user.
FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device.
Throughout the drawings and the detailed description, unless otherwise described or provided, the same drawing reference numerals will be understood to refer to the same elements, features, and structures. The drawings may not be to scale, and the relative size, proportions, and depiction of elements in the drawings may be exaggerated for clarity, illustration, and convenience.
The following detailed description is provided to assist the reader in gaining a comprehensive understanding of the methods, apparatuses, and/or systems described herein. However, various changes, modifications, and equivalents of the systems, apparatuses and/or methods described herein will be apparent to one of ordinary skill in the art. The progression of processing steps and/or operations described is an example; however, the sequence of and/or operations is not limited to that set forth herein and may be changed as is known in the art, with the exception of steps and/or operations necessarily occurring in a certain order. Also, descriptions of functions and constructions that are well known to one of ordinary skill in the art may be omitted for increased clarity and conciseness.
The features described herein may be embodied in different forms, and are not to be construed as being limited to the examples described herein. Rather, the examples described herein have been provided so that this disclosure will be thorough and complete, and will convey the full scope of the disclosure to one of ordinary skill in the art.
FIG. 1 is a diagram illustrating an example of a wearable device. Referring to FIG. 1, the wearable device may be attachable to, wearable on, and detachable from a portion of a body of a user, using an arm band, a wrist band, and/or other fixing devices known to one of ordinary skill in the art.
For convenience of description, a surface of the wearable device that is provided with a display visible to the user, for example, a touch display, will be described as a front 130, and another surface of the wearable device that faces the body of the user when the wearable device is attached or worn will be described as a back 150. Based on a design of the wearable device, a mechanically or electrically openable and closeable protector may be disposed on the front 130 to protect the display. In this example, the front 130 may refer to, for example, the surface of the actual display or a surface of the protector, on which a sensor to be described later is provided.
The wearable device includes a plurality of sensors 131, 151, and 155 provided on the front 130 and the back 150, respectively. The wearable device detects, using at least one of the sensors 131, 151, and 155, a trigger signal triggering a process of user authentication, and initiates the user authentication based on the detected trigger signal.
The user may generate the trigger signal by performing a predetermined gesture, for example, opening a hand, clenching a fist, rotating a wrist, and/or other gestures known to one of ordinary skill in the art. The wearable device may detect, using at least one of the sensors 131, 151, and 155, the trigger signal generated in response to the gesture. When the trigger signal is detected, the wearable device may initiate the process of the user authentication. According to an example, the gesture may be intentionally inputted by the user while the user is wearing the wearable device, although the gesture may not be performed by the user in a process of putting on the wearable device.
When the user performs the gesture while the user is wearing the wearable device, the sensor 155 provided on the back 150 of the wearable device may detect a biosignal generated in response to a muscle movement of the user, which is generated by the gesture. The biosignal generated in response to the gesture performed by the user may be the trigger signal used to initiate the user authentication, and be referred to as a first biosignal. The first biosignal may include, for example, an electromyogram (EMG) signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user. The first biosignal may be generated only in response to a predetermined gesture input from the user.
When the process of user authentication with respect to the user is initiated by the first biosignal detected by the sensor 155 provided on the back 150 of the wearable device, the wearable device may authenticate the user, using a second biosignal detected by the sensor 131 provided on the front 130 and/or the sensor 151 provided on the back 150. The second biosignal may be unique to each user, and be distinguished from the first biosignal. The second biosignal may include, for example, an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and/or an impedance signal generated by a body of the user. Based on implementation, the second biosignal may be unique to each user, and thus, recognizing an iris or a fingerprint may be used to obtain the second biosignal.
As shown in FIG. 1, the wearable device may be a watch-type smartphone 110. The watch-type smartphone 110 may be an example of the wearable device, and thus, it may be obvious to those skilled in the art that various applications and design modifications may be possible. Described hereinafter is an example of an operation of the wearable device used when the user wears the wearable device around a left wrist.
The user wearing the wearable device around the left wrist may perform a predetermined gesture, for example, opening a left hand and/or rotating the left hand upwards. Due to the gesture, a first biosignal, as a trigger signal, may be generated, and the wearable device may detect the first biosignal. The wearable device may initiate a process of user authentication in response to the detecting of the first biosignal. The detecting of the first biosignal and the initiating of the process of user authentication may be performed inconsecutively or consecutively in terms of time based on implementation.
According to an example, the first biosignal generated in response to a muscle movement of the user, due to the gesture, may be detected by the sensor 155 provided on the back 150 of the wearable device. The first biosignal detected by the sensor 155 may be compared to a trigger signal stored in a memory of the wearable device and predetermined by the user. As a result of the comparison, when the first biosignal is determined to be identical to the trigger signal or within a predetermined error range of the trigger signal, the process of user authentication may be initiated.
After the process of user authentication is initiated, the user may place a finger of a right hand on the sensor 131 provided on the front 130 of the wearable device, and the wearable device may detect a second biosignal of the user, using the sensor 131. The sensor 151 provided on the back 150 of the wearable device and in contact with skin of the user may also detect the second biosignal in the same way as the sensor 131 provided on the front 130. For example, the sensor 155 may detect an EMG signal of the user, and the sensor 131 and the sensor 151 may detect an ECG signal of the user.
To detect the ECG signal as an example of the second biosignal, a signal detected in at least two different portions of the body of the user may be needed, and thus, the sensors 131 and 151 are provided on the front 130 and on the back 150, respectively. In an example of detecting a biosignal unique to the user from a body part, for example, a voice of the user and/or an impedance signal generated by the body of the user, aside from the ECG signal, a sensor used to receive the second biosignal may be provided on either the front 130 or the back 150. A number of the sensors used to detect the first biosignal and the second biosignal may vary based on need.
FIG. 2 is a block diagram illustrating an example of a wearable device 200. Referring to FIG. 2, the wearable device 200 may include a first sensor 210, a second sensor 220, a memory 230, and a processor 240.
The first sensor 210 detects a first biosignal generated in response to a gesture performed by a user. The first biosignal may be generated in response to a muscle movement of the user to input the gesture. The first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
The gesture performed by the user may be one of various forms, for example, a wrist rotating, a hand flailing, and/or a fist clenching, which may be performed by the user using a portion of a body on which the user wears the wearable device 200. When a higher level of user authentication is needed based on implementation, at least two gestures consecutively input by the user may initiate the user authentication.
The second sensor 220 detects a second biosignal of the user. The second biosignal may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by the body of the user.
The memory 230 stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal. For example, when sampling the first biosignal and the second biosignal, the information directly representing the first biosignal and the second biosignal may be information representing at least a portion of a sampled data symbol, or may be a duplicated signal of the first biosignal and the second signal. The information indirectly representing the first biosignal and the second biosignal may be information in which the first biosignal and the second biosignal are processed and represented based on various signal processing methods.
The memory 230 may store at least one piece of feature point information obtained through signal processing performed on the first biosignal and the second biosignal. The information to be stored in the memory 230 may be encoded and stored in the memory 230.
Based on implementation, in an example of irregular access to the stored information, a design to prevent the stored information from being leaked out may be applied. When the user loses the wearable device 200, various methods may be adopted to prevent a third person from decoding the stored information in an abnormal manner.
The processor 240 determines, by referring to the memory 230, whether the first biosignal detected by the first sensor 210 corresponds to the information stored in the memory 230, and initiates a process of user authentication when the first biosignal corresponds to the stored information. The processor 240 authenticates the user by comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230. When comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230, the processor 240 may operate based on a predetermined error range. The error range may be determined by the user or predetermined in the wearable device 200 based on a result of statistics. For example, the error range may be predetermined, by the user, to be 7%.
When a 5% error occurs as a result of comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230, the processor 240 may determine that the second biosignal detected by the second sensor 220 corresponds to the information stored in the memory 230 because the 5% error is within the predetermined error range. In this example, the processor 240 may authenticate the user. When a 10% error occurs as a result of comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230, the processor 240 may determine that the second biosignal detected by the second sensor 220 does not correspond to the information stored in the memory 230 because the 10% error is outside the predetermined error range. In this example, the processor 240 may not authenticate the user. The processor 240 may notify the user of a result of the user authentication in a visual, audible, and/or tactile manner, for example, on a display of the wearable device 200, through a speaker of the wearable device 200, and/or through a vibration of the wearable device 200.
FIG. 3 is a block diagram illustrating another example of a wearable device 300. Referring to FIG. 3, the wearable device 300 may include a first sensor 310, a second sensor 320, a memory 330, a processor 340, an initial authenticator 350, and a wearing detection sensor 360.
The memory 330 stores access right information on at least one function executable in the wearable device 300. The access right information on each function may be determined by an external device, for example, a personal computer (PC), a laptop computer, and/or a smartphone, which is connected to the wearable device 300 through a wire or a wireless communication, or may be self-determined by the wearable device 300. An example of the access right information on the executable function, which is stored in the memory 330, will be described in detail by referring to following FIG. 8.
When a command to execute a function is input to the wearable device 300 from the user, the processor 340 reads the access right information on the function, by referring to the memory 330, and provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information. Each form of feedback may be a request for user authentication to the user.
The wearable device 300 may include various executable functions, for example, performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting a short message service (SMS) message, and/or other executable functions known to one of ordinary skill in the art, and each function may need a different access right. The memory 330 may store the access right information on the various functions executable in the wearable device 300. For example, functions such as smartphone banking and opening a personal e-mail may need a relatively high level of the access right information, and functions such as using the Internet and transmitting an SMS message may need a relatively low level of the access right information.
For example, when the user inputs a command to execute the function of opening a personal e-mail, the processor 340 may read the access right information on the function, by referring to the memory 330. The access right information on the function of opening a personal e-mail that is stored in the memory 330, may be at a relatively high level. The processor 340 may provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback requesting a high level of user authentication based on the access right information. For example, the visual feedback may be feedback indicated on a display of the wearable device 300, the auditory feedback may be feedback delivered in a form of sound to the user through a speaker of the wearable device 300, and the tactile feedback may be feedback delivered in a form of touch sensation to the user through vibration of the wearable device 300.
The initial authenticator 350 receives a gesture and/or a first biosignal and a second biosignal from the user through the first sensor 310 and the second sensor 320, respectively, to set up an initial authentication. The initial authenticator 350 stores, in the memory 330, the first biosignal corresponding to the input gesture and the second biosignal.
The wearing detection sensor 360 detects whether the wearable device 300 is detached from the user. The wearing detection sensor 360 may detect a mechanical movement of a band attached to a portion of a body of the user, by being connected to the wearable device 300, or may detect an electrical signal generated in association with attaching and detaching of the band.
The wearing detection sensor 360 may detect, by being connected to the wearable device 300, changes generated when the band attached to the portion of the body of the user is attached and detached. For example, the wearing detection sensor 360 may detect a change in which tension or elasticity of the band attached to a wrist of the user increases or decreases. Also, the wearing detection sensor 360 may detect a change in an amount of light detected by a light receiving unit of a photo sensor attached to a back of the wearable device 300, and may detect a change in which an electrical signal or an impedance signal is intensified or weakened when a contact point between the wearing detection sensor 360 and a skin appears or disappears due to the attaching or detaching of the band. Further, the wearing detection sensor 360 may include various sensors that may detect whether the wearable device 300 is worn or not, and may deliver changes detected by the sensors to the processor 340.
The processor 340 controls the user authentication to be invalid based on a signal received from the wearing detection sensor 360. For example, the signal received from the wearing detection sensor 360 may be a signal such as "the user authentication to be invalid" indicating that a usage right assigned to the user through the process of the user authentication that is performed when the user wears the wearable device 300 is withdrawn or nullified. When the user authentication is invalid, the user may need to obtain the usage right through the process of the user authentication that is performed again when the user resumes wearing the wearable device 300.
The memory 330 may further store device setting information on each of at least one user. When the user is authenticated, the processor 340 may read the device setting information on the authenticated user, by referring to the memory 330, and may provide a user interface based on the device setting information.
For example, different device setting information or different configuration information pertaining to user A and user B may be stored in the memory 330. When the authenticated user is the user A, the processor 340 may read the device setting information on the user A that is stored in the memory 330, and may provide a main display and/or an icon arrangement for application execution, for the user A.
Other operations of the first sensor 310, the second sensor 320, the memory 330, and the processor 340 of FIG. 3, which are not described in the foregoing, may be the same as the description of the first sensor 210, the second sensor 220, the memory 230, and the processor 340 of FIG. 2, respectively. Thus, a repeated detailed description of the related operations is omitted here for conciseness and ease of description.
FIG. 4 is a flowchart illustrating a user authentication method of a wearable device. Referring to FIG. 4, in operation 410, the wearable device detects a first biosignal generated in response to a gesture performed by a user. The first biosignal may be generated in response to a muscle movement of the user to input the gesture. The first biosignal may be at least one of an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and a force signal generated by the muscle of the user.
In operation 420, the wearable device detects a second biosignal of the user. The second biosignal may be a signal distinguished from the first biosignal, and at least one of an ECG signal, a PPG signal, a voice of the user, and an impedance signal generated by a body of the user.
In operation 430, the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in a memory of the wearable device.
In operation 440, the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 450. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
In operation 450, the wearable device initiates a process of user authentication.
In operation 460, the wearable device compares the second biosignal detected by the second sensor to the stored information.
In operation 470, the wearable device authenticates the user based on a result of the comparison, e.g., when the second biosignal corresponds to the stored information.
When the user is authenticated, the wearable device may read device setting information of the authenticated user, by referring to the memory, and provide a user interface based on the device setting information. The device setting information on each of the at least one user may be stored in the memory of the wearable device.
FIG. 5 is a flowchart illustrating another example of a user authentication method of a wearable device. Referring to FIG. 5, in operation 510, the wearable device receives a gesture and a second biosignal from a user.
In operation 515, the wearable device stores, in a memory of the wearable device, a first biosignal corresponding to the gesture, and the second biosignal.
A process of storing initial user information is performed in operations 510 and 515, and thus, the user information stored in operations 510 and 515 may be used for user authentication in the wearable device. When two or more users use the wearable device, the information stored in operations 510 and 515 may be managed with respect to each of the users.
In operation 520, the wearable device detects the first biosignal generated in response to the gesture performed by the user. The first biosignal may be generated in response to a muscle movement of the user to input the gesture. The first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
In operation 525, the wearable device detects the second biosignal of the user. The second biosignal may be a biosignal unique to each of users and distinguished from the first biosignal, and may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by a body of the user.
In operation 530, the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in the memory.
In operation 535, the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 540. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
In operation 540, the wearable device initiates a process of user authentication.
In operation 545, the wearable device compares the second biosignal detected by the second sensor to the information stored in the memory.
In operation 550, the wearable device determines whether a difference between the second biosignal detected by the second sensor and the information stored in the memory is within a predetermined error range. When the wearable device determines that the difference between the second biosignal and the stored information is within the predetermined error range, the wearable device continues in operation 555. When the wearable device determines that the difference between the second biosignal and the stored information is outside the predetermined error range, the wearable device ends the method.
In operation 555, the wearable device authenticates the user.
When the wearable device determines that the difference between the second biosignal and the stored information is beyond the predetermined error range, the wearable device may provide basic information, such as time and day, to the user.
FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device. Referring to FIG. 6, in operation 610, the wearable device stores the access right information on at least one function executable in the wearable device.
In operation 620, the wearable device receives, from the user, an input of a command to execute a function of the wearable device of the at least one function executable in the wearable device.
In operation 630, the wearable device reads, by referring to a memory of the wearable device, the access right information on the function for which the command to execute is input.
In operation 640, the wearable device provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information. Each feedback may be a request sent to the user for authentication.
FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user. Described hereinafter is an example in which a wearing detection sensor is provided with a sensor detecting a change of impedance.
Referring to FIG. 7, in operation 710, the wearable device detects, from the wearing detection sensor, the change of the impedance input to the wearable device.
In operation 720, the wearable device determines whether the wearable device is detached from the user based on the change of the impedance. When the wearable device determines that the wearable device is detached from the user, the wearable device continues in operation 730. When the wearable device determines that the wearable device is attached to the user, the wearable device continues in operation 740.
For example, when a value of the impedance input to the wearable device is greater than a predetermined level or is changed to be less than the predetermined level, the wearable device may determine that the wearable device is detached from the user. When a value of the impedance input to the wearable device remains at the predetermined level or is increased to be the predetermined level, the wearable device may determine that the wearable device is not detached from the user.
In operation 730, the wearable device controls user authentication to be invalid.
In operation 740, the wearable device controls the user authentication to be maintained.
According to another example, the wearing detection sensor may include a photo sensor detecting an amount of light collected on a back of the wearable device, or a sensor detecting tension of a band. In this example, the wearable device may determine whether the wearable device is detached from the user in a same or a similar manner as described, based on a characteristic of each sensor.
FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device. Referring to FIG. 8, in the memory of the wearable device, the access right information on the executable functions may be stored along with a command code for execution of each of the executable functions, such as performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting an SMS message, and providing time (clock) and weather information.
A different access right determined with respect to each of the executable functions may be stored in the memory. For example, the access right of level 4 may be determined for functions relating to important financial information and privacy protection such as performing a financial task, smartphone banking, and opening a personal e-mail. The access right of level 3 may be determined for functions such as using the Internet and transmitting an SMS message. Also, the access right of level 0 may be determined for basic functions needing no security, such as, providing time or weather information. The functions for which the access right of level 0 is determined, may be provided even when a user does not undergo user authentication or fails the user authentication.
For example, when a command for execution is input from the user, a processor of the wearing device may verify, by referring to the memory, which function is related to the command based on an input command code for execution, and may read the access right information on the verified function. For example, when the input command code for execution is #00011, the processor may verify that the function is a function of opening a personal e-mail, and may read that the access right information on the verified function of opening a personal e-mail is of level 4. The processor may request, based on the access right information, for example, of level 4, an additional user authentication to the user, using a visual feedback, an auditory feedback, and/or a tactile feedback.
Described in the foregoing is the example in which the access right information on at the executable functions in the wearable device is stored in a form or order of a level of the access right. However, the access right information may be stored in other various forms or orders.
The various units, elements, and methods described above may be implemented using one or more hardware components, one or more software components, or a combination of one or more hardware components and one or more software components.
A hardware component may be, for example, a physical device that physically performs one or more operations, but is not limited thereto. Examples of hardware components include microphones, amplifiers, low-pass filters, high-pass filters, band-pass filters, analog-to-digital converters, digital-to-analog converters, and processing devices.
A software component may be implemented, for example, by a processing device controlled by software or instructions to perform one or more operations, but is not limited thereto. A computer, controller, or other control device may cause the processing device to run the software or execute the instructions. One software component may be implemented by one processing device, or two or more software components may be implemented by one processing device, or one software component may be implemented by two or more processing devices, or two or more software components may be implemented by two or more processing devices.
A processing device may be implemented using one or more general-purpose or special-purpose computers, such as, for example, a processor, a controller and an arithmetic logic unit, a digital signal processor, a microcomputer, a field-programmable array, a programmable logic unit, a microprocessor, or any other device capable of running software or executing instructions. The processing device may run an operating system (OS), and may run one or more software applications that operate under the OS. The processing device may access, store, manipulate, process, and create data when running the software or executing the instructions. For simplicity, the singular term "processing device" may be used in the description, but one of ordinary skill in the art will appreciate that a processing device may include multiple processing elements and multiple types of processing elements. For example, a processing device may include one or more processors, or one or more processors and one or more controllers. In addition, different processing configurations are possible, such as parallel processors or multi-core processors.
A processing device configured to implement a software component to perform an operation A may include a processor programmed to run software or execute instructions to control the processor to perform operation A. In addition, a processing device configured to implement a software component to perform an operation A, an operation B, and an operation C may have various configurations, such as, for example, a processor configured to implement a software component to perform operations A, B, and C; a first processor configured to implement a software component to perform operation A, and a second processor configured to implement a software component to perform operations B and C; a first processor configured to implement a software component to perform operations A and B, and a second processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operation A, a second processor configured to implement a software component to perform operation B, and a third processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operations A, B, and C, and a second processor configured to implement a software component to perform operations A, B, and C, or any other configuration of one or more processors each implementing one or more of operations A, B, and C. Although these examples refer to three operations A, B, C, the number of operations that may implemented is not limited to three, but may be any number of operations required to achieve a desired result or perform a desired task.
Software or instructions for controlling a processing device to implement a software component may include a computer program, a piece of code, an instruction, or some combination thereof, for independently or collectively instructing or configuring the processing device to perform one or more desired operations. The software or instructions may include machine code that may be directly executed by the processing device, such as machine code produced by a compiler, and/or higher-level code that may be executed by the processing device using an interpreter. The software or instructions and any associated data, data files, and data structures may be embodied permanently or temporarily in any type of machine, component, physical or virtual equipment, computer storage medium or device, or a propagated signal wave capable of providing instructions or data to or being interpreted by the processing device. The software or instructions and any associated data, data files, and data structures also may be distributed over network-coupled computer systems so that the software or instructions and any associated data, data files, and data structures are stored and executed in a distributed fashion.
For example, the software or instructions and any associated data, data files, and data structures may be recorded, stored, or fixed in one or more non-transitory computer-readable storage media. A non-transitory computer-readable storage medium may be any data storage device that is capable of storing the software or instructions and any associated data, data files, and data structures so that they can be read by a computer system or processing device. Examples of a non-transitory computer-readable storage medium include read-only memory (ROM), random-access memory (RAM), flash memory, CD-ROMs, CD-Rs, CD+Rs, CD-RWs, CD+RWs, DVD-ROMs, DVD-Rs, DVD+Rs, DVD-RWs, DVD+RWs, DVD-RAMs, BD-ROMs, BD-Rs, BD-R LTHs, BD-REs, magnetic tapes, floppy disks, magneto-optical data storage devices, optical data storage devices, hard disks, solid-state disks, or any other non-transitory computer-readable storage medium known to one of ordinary skill in the art.
Functional programs, codes, and code segments for implementing the examples disclosed herein can be easily constructed by a programmer skilled in the art to which the examples pertain based on the drawings and their corresponding descriptions as provided herein.
As a non-exhaustive illustration only, a device described herein may refer to mobile devices such as, for example, a cellular phone, a smart phone, a wearable smart device (such as, for example, a ring, a watch, a pair of glasses, a bracelet, an ankle bracket, a belt, a necklace, an earring, a headband, a helmet, a device embedded in the cloths or the like), a personal computer (PC), a tablet personal computer (tablet), a phablet, a personal digital assistant (PDA), a digital camera, a portable game console, an MP3 player, a portable/personal multimedia player (PMP), a handheld e-book, an ultra mobile personal computer (UMPC), a portable lab-top PC, a global positioning system (GPS) navigation, and devices such as a high definition television (HDTV), an optical disc player, a DVD player, a Blue-ray player, a setup box, or any other device capable of wireless communication or network communication consistent with that disclosed herein. In a non-exhaustive example, the wearable device may be self-mountable on the body of the user, such as, for example, the glasses or the bracelet. In another non-exhaustive example, the wearable device may be mounted on the body of the user through an attaching device, such as, for example, attaching a smart phone or a tablet to the arm of a user using an armband, or hanging the wearable device around the neck of a user using a lanyard.
While this disclosure includes specific examples, it will be apparent to one of ordinary skill in the art that various changes in form and details may be made in these examples without departing from the spirit and scope of the claims and their equivalents. The examples described herein are to be considered in a descriptive sense only, and not for purposes of limitation. Descriptions of features or aspects in each example are to be considered as being applicable to similar features or aspects in other examples. Suitable results may be achieved if the described techniques are performed in a different order, and/or if components in a described system, architecture, device, or circuit are combined in a different manner and/or replaced or supplemented by other components or their equivalents. Therefore, the scope of the disclosure is defined not by the detailed description, but by the claims and their equivalents, and all variations within the scope of the claims and their equivalents are to be construed as being included in the disclosure.

Claims (26)

  1. A wearable device, comprising:
    a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user;
    a second sensor configured to detect a second biosignal of the user;
    a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal; and
    a processor configured to
    initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and
    authenticate the user by comparing the detected second biosignal to the stored information.
  2. The device of claim 1, wherein the first biosignal is generated in response to a muscle movement performed by the user to input the gesture.
  3. The device of claim 2, wherein the first biosignal is at least one of an electromyogram (EMG) signal generated before and after the muscle movement, a light signal penetrating a muscle of the user, and a force signal generated by the muscle.
  4. The device of claim 1, wherein the second biosignal is at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
  5. The device of claim 1, wherein the stored information comprises a piece of feature point information obtained by performing signal processing on the first biosignal and the second biosignal.
  6. The device of claim 1, wherein the stored information is encoded.
  7. The device of claim 1, wherein the processor is configured to:
    determine whether a difference between the detected second biosignal and the stored information is within a predetermined error range; and
    authenticate the user based on a result of the determining of whether the difference is within the predetermined error range.
  8. The device of claim 1, further comprising:
    an initial authenticator configured to
    receive the gesture and the second biosignal from the user; and
    store, in the memory, the first biosignal corresponding to the gesture, and the second biosignal.
  9. The device of claim 1, wherein:
    the memory is further configured to store access right information of a function executable in the wearable device; and
    in response a command to execute the function being input to the wearable device by the user, the processor is configured to
    read, from the memory, the access right information, and
    provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
  10. The device of claim 9, wherein the feedback is a request for the user authentication.
  11. The device of claim 1, further comprising:
    a wearing detection sensor configured to detect whether the wearable device is detached from the user,
    wherein the processor is configured to control the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
  12. The device of claim 11, wherein the wearing detection sensor is configured to:
    detect a mechanical movement of a band attached to a portion of a body of the user; and/or
    detect an electrical signal generated by attaching and detaching of the band.
  13. The device of claim 1, wherein:
    the memory is further configured to store device setting information of the at least one user; and
    in response to the user being authenticated, the processor is further configured to
    read, from the memory, the device setting information of the authenticated user, and
    provide, to the user, a user interface based on the device setting information.
  14. The device of claim 1, wherein the wearable device is a watch-type smartphone.
  15. A wearable device, comprising:
    a first sensor configured to detect a first biosignal generated in response to a muscle movement performed by a user to input a gesture;
    a second sensor configured to detect a second biosignal of the user, the second biosignal being at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user;
    a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal; and
    a processor configured to
    trigger user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and
    authenticate the user by comparing the detected second biosignal to the stored information.
  16. A user authentication method of a wearable device, the method comprising:
    detecting a first biosignal generated in response to a gesture performed by a user;
    detecting a second biosignal of the user;
    storing, with respect to at least one user, information of the first biosignal and the second biosignal;
    initiating user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information; and
    authenticating the user by comparing the detected second biosignal to the stored information.
  17. The method of claim 16, wherein the authenticating comprises:
    determining whether a difference between the detected second biosignal and the stored information is within a predetermined error range; and
    authenticating the user based on a result of the determining of whether the difference is within the predetermined error range.
  18. The method of claim 16, further comprising:
    receiving the gesture and the second biosignal from the user; and
    storing the first biosignal corresponding to the gesture, and the second biosignal.
  19. The method of claim 16, further comprising:
    storing access right information of a function executable in the wearable device,
    wherein, in response a command to execute the function being input to the wearable device by the user, the initiating comprises reading the access right information, and providing, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
  20. The method of claim 16, further comprising:
    detecting whether the wearable device is detached from the user; and
    controlling the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
  21. The method of claim 20, wherein the detecting comprises:
    detecting a mechanical movement of a band attached to a portion of a body of the user; and/or
    detecting an electrical signal generated by attaching and detaching of the band.
  22. The method of claim 16, further comprising:
    storing device setting information of the at least one user; and
    in response to the user being authenticated, reading the device setting information of the authenticated user, and providing, to the user, a user interface based on the device setting information.
  23. A non-transitory computer-readable storage medium storing a program comprising instructions to cause a computer to perform the method of claim 16.
  24. A wearable device, comprising:
    a first sensor configured to detect a first signal of a user;
    a second sensor configured to detect a second signal of the user; and
    a processor configured to
    initiate user authentication in response to the detected first signal corresponding to information of the first signal, and
    authenticate the user in response to the detected second signal being within a predetermined range of information of the second signal.
  25. The wearable device of claim 24, wherein the information of the first and second signals are predetermined.
  26. The wearable device of claim 24, wherein the processor is further configured to:
    receive, from the user, a command to execute a function; and
    provide, to the user, a feedback based on predetermined access right information corresponding to the function, the predetermined access right information indicating a level of the user authentication needed.
PCT/KR2014/001414 2013-09-09 2014-02-21 Wearable device performing user authentication using bio-signals and authentication method of the same WO2015034149A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201480043822.6A CN105556529B (en) 2013-09-09 2014-02-21 The wearable device and its authentication method of user authentication are executed using bio signal
EP14842116.7A EP3044715B1 (en) 2013-09-09 2014-02-21 Wearable device performing user authentication using bio-signals and authentication method of the same

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2013-0107833 2013-09-09
KR1020130107833A KR102136836B1 (en) 2013-09-09 2013-09-09 Wearable device performing user authentication by using bio-signals and authentication method of the wearable device

Publications (1)

Publication Number Publication Date
WO2015034149A1 true WO2015034149A1 (en) 2015-03-12

Family

ID=52626896

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2014/001414 WO2015034149A1 (en) 2013-09-09 2014-02-21 Wearable device performing user authentication using bio-signals and authentication method of the same

Country Status (5)

Country Link
US (1) US9811648B2 (en)
EP (1) EP3044715B1 (en)
KR (1) KR102136836B1 (en)
CN (1) CN105556529B (en)
WO (1) WO2015034149A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105068658A (en) * 2015-08-19 2015-11-18 天津先驱领域科技有限公司 Man-machine interaction device capable of performing virtual environment control
CN105554043A (en) * 2016-03-07 2016-05-04 炫彩互动网络科技有限公司 Wearable equipment identity authentication method based on cross bit operation
US11988995B2 (en) 2015-03-08 2024-05-21 Apple Inc. Compressible seal for rotatable and translatable input mechanisms
US12023139B1 (en) 2008-07-03 2024-07-02 Masimo Corporation User-worn device for noninvasively measuring a physiological parameter of a user
US12066795B2 (en) 2017-07-18 2024-08-20 Apple Inc. Tri-axis force sensor
US12086331B2 (en) 2016-07-15 2024-09-10 Apple Inc. Capacitive gap sensor ring for an input device
US12092996B2 (en) 2021-07-16 2024-09-17 Apple Inc. Laser-based rotation sensor for a crown of an electronic watch
US12105479B2 (en) 2016-07-25 2024-10-01 Apple Inc. Force-detecting input structure
US12105480B2 (en) 2018-06-25 2024-10-01 Apple Inc. Crown for an electronic watch
US12114974B2 (en) 2020-01-13 2024-10-15 Masimo Corporation Wearable device with physiological parameters monitoring

Families Citing this family (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10234941B2 (en) 2012-10-04 2019-03-19 Microsoft Technology Licensing, Llc Wearable sensor for tracking articulated body-parts
WO2015047032A1 (en) * 2013-09-30 2015-04-02 삼성전자 주식회사 Method for processing contents on basis of bio-signal and device therefor
US9965761B2 (en) * 2014-01-07 2018-05-08 Nod, Inc. Methods and apparatus for providing secure identification, payment processing and/or signing using a gesture-based input device
KR20160108491A (en) * 2014-01-31 2016-09-19 애플 인크. Wearing dependent operation of wearable device
US20150288687A1 (en) * 2014-04-07 2015-10-08 InvenSense, Incorporated Systems and methods for sensor based authentication in wearable devices
CN106462778A (en) * 2014-05-13 2017-02-22 惠普发展公司,有限责任合伙企业 Wearable authentication
USD771035S1 (en) * 2014-08-11 2016-11-08 Apple Inc. Wearable device
US10375081B2 (en) * 2014-08-13 2019-08-06 Intel Corporation Techniques and system for extended authentication
KR20160034065A (en) * 2014-09-19 2016-03-29 엘지전자 주식회사 Mobile terminal and method for controlling the same
US10488936B2 (en) 2014-09-30 2019-11-26 Apple Inc. Motion and gesture input from a wearable device
US9953148B2 (en) * 2014-12-23 2018-04-24 Ebay Inc. System and method for unlocking devices associated with a carrying bag
KR101627545B1 (en) * 2015-04-30 2016-06-07 연세대학교 산학협력단 Apparatus and Method for instantaneous biometrics authentication in wearable device
KR101657005B1 (en) * 2015-06-11 2016-09-12 전문석 Method for electrocardiogram authentication
US11903680B2 (en) 2015-06-14 2024-02-20 Facense Ltd. Wearable-based health state verification for physical access authorization
KR101646567B1 (en) * 2015-06-18 2016-08-08 계명대학교 산학협력단 User authentication method and system via the tattoo recognition in the bio-electrical signal measurement environment
KR101646566B1 (en) * 2015-06-18 2016-08-08 계명대학교 산학협력단 User authentication method and system via the ecg signal acquisition in the bio-electrical signal measurement environment using wearable sensors
US10289239B2 (en) 2015-07-09 2019-05-14 Microsoft Technology Licensing, Llc Application programming interface for multi-touch input detection
KR20170008996A (en) * 2015-07-15 2017-01-25 엘지전자 주식회사 Electronic device and method for controlling the same
US9930034B2 (en) * 2015-07-29 2018-03-27 International Business Machines Corporation Authenticating applications using a temporary password
KR102398716B1 (en) * 2015-08-12 2022-05-17 삼성전자주식회사 Method for detecting biometric information and an electronic device thereof
KR102523605B1 (en) 2015-09-11 2023-04-19 삼성디스플레이 주식회사 A wearable liquid crystal display device using the bio-signal and control method for that
US9924265B2 (en) 2015-09-15 2018-03-20 Intel Corporation System for voice capture via nasal vibration sensing
US10348355B2 (en) 2015-09-16 2019-07-09 Intel Corporation Techniques for gesture recognition using photoplethysmographic (PPMG) sensor and low-power wearable gesture recognition device using the same
US9939899B2 (en) 2015-09-25 2018-04-10 Apple Inc. Motion and gesture input from a wearable device
US9824287B2 (en) 2015-09-29 2017-11-21 Huami Inc. Method, apparatus and system for biometric identification
US10467548B2 (en) 2015-09-29 2019-11-05 Huami Inc. Method, apparatus and system for biometric identification
US9787676B2 (en) 2015-09-29 2017-10-10 Anhui Huami Information Technology Co., Ltd. Multi-modal biometric identification
CN106571918A (en) * 2015-10-12 2017-04-19 广州杰赛科技股份有限公司 Communication link and information multiple verification and encryption method
CN106572060A (en) * 2015-10-12 2017-04-19 广州杰赛科技股份有限公司 Communication authentication system based on biological characteristics
US10137777B2 (en) 2015-11-03 2018-11-27 GM Global Technology Operations LLC Systems and methods for vehicle system control based on physiological traits
KR102570068B1 (en) * 2015-11-20 2023-08-23 삼성전자주식회사 Gesture recognition method, gesture recognition apparatus, wearable device
US10324494B2 (en) 2015-11-25 2019-06-18 Intel Corporation Apparatus for detecting electromagnetic field change in response to gesture
KR102437106B1 (en) 2015-12-01 2022-08-26 삼성전자주식회사 Device and method for using friction sound
US20170185759A1 (en) * 2015-12-23 2017-06-29 Michael L. Schmidt Emg-based liveness detection
US20170225690A1 (en) * 2016-02-09 2017-08-10 General Motors Llc Wearable device controlled vehicle systems
WO2017144768A1 (en) * 2016-02-26 2017-08-31 Nokia Technologies Oy Behavioural biometric authentication
USD781853S1 (en) * 2016-03-07 2017-03-21 Apple Inc. Wearable device
USD777163S1 (en) * 2016-03-07 2017-01-24 Apple Inc. Wearable device
US20170270462A1 (en) * 2016-03-16 2017-09-21 Triax Technologies, Inc. System and interfaces for managing workplace events
US11810032B2 (en) 2016-03-16 2023-11-07 Triax Technologies, Inc. Systems and methods for low-energy wireless applications using networked wearable sensors
US10769562B2 (en) 2016-03-16 2020-09-08 Triax Technologies, Inc. Sensor based system and method for authorizing operation of worksite equipment using a locally stored access control list
US11170616B2 (en) 2016-03-16 2021-11-09 Triax Technologies, Inc. System and interfaces for managing workplace events
US10206620B2 (en) 2016-03-23 2019-02-19 Intel Corporation User's physiological context measurement method and apparatus
CN107295028B (en) * 2016-03-30 2020-10-09 深圳富泰宏精密工业有限公司 Interactive communication system, method and wearable device thereof
US20170310673A1 (en) * 2016-04-20 2017-10-26 Huami Inc. Security system with gesture-based access control
US10332111B2 (en) * 2016-05-19 2019-06-25 Visa International Service Association Authentication with smartwatch
US10298282B2 (en) 2016-06-16 2019-05-21 Intel Corporation Multi-modal sensing wearable device for physiological context measurement
WO2018000396A1 (en) * 2016-06-30 2018-01-04 华为技术有限公司 Authentication method and communication terminal
KR20180009979A (en) 2016-07-20 2018-01-30 삼성전자주식회사 Method for secure synchronization and pairing of devices and device supporting the same
GB2552721A (en) * 2016-08-03 2018-02-07 Cirrus Logic Int Semiconductor Ltd Methods and apparatus for authentication in an electronic device
KR20180017690A (en) 2016-08-10 2018-02-21 삼성전자주식회사 Apparatus and method for detecting information of living body and wearable device including the apparatus
CN106236051A (en) * 2016-08-19 2016-12-21 深圳市前海领创智能科技有限公司 A kind of intelligence based on PPG Yu ECG is without Tail cuff blood pressure health monitoring wrist-watch
US10241583B2 (en) 2016-08-30 2019-03-26 Intel Corporation User command determination based on a vibration pattern
US10478099B2 (en) 2016-09-22 2019-11-19 Apple Inc. Systems and methods for determining axial orientation and location of a user's wrist
KR20180050127A (en) * 2016-11-04 2018-05-14 (주)아이티 노매즈 System and method for monitoring momentum of wearable device using M2M communication
WO2018093183A1 (en) * 2016-11-16 2018-05-24 삼성전자 주식회사 Electronic device and control method thereof
KR102410998B1 (en) * 2016-11-16 2022-06-21 삼성전자주식회사 Electronic apparatus and control method thereof
KR20180055661A (en) 2016-11-16 2018-05-25 삼성전자주식회사 Electronic apparatus and control method thereof
US11496463B2 (en) * 2016-11-22 2022-11-08 Sony Corporation Information processing terminal, information processing device, information processing method, and information processing system
GB2561537B (en) 2017-02-27 2022-10-12 Emteq Ltd Optical expression detection
US10684693B2 (en) 2017-03-02 2020-06-16 Samsung Electronics Co., Ltd. Method for recognizing a gesture and an electronic device thereof
USD837206S1 (en) * 2017-04-24 2019-01-01 Huawei Technologies Co., Ltd. Smart watch
CN107424637A (en) * 2017-05-24 2017-12-01 王金锁 A kind of fingerprint ring music player
USD838716S1 (en) * 2017-08-23 2019-01-22 Lite-On Technology Corporation Smart watch
GB2566101A (en) * 2017-09-05 2019-03-06 B Secur Ltd Wearable authentication device
FI20175862A1 (en) 2017-09-28 2019-03-29 Kipuwex Oy System for determining sound source
US10225737B1 (en) * 2017-10-31 2019-03-05 Konica Minolta Laboratory U.S.A., Inc. Method and system for authenticating a user using a mobile device having plural sensors
CA2992333C (en) * 2018-01-19 2020-06-02 Nymi Inc. User access authorization system and method, and physiological user sensor and authentication device therefor
KR102488001B1 (en) * 2018-01-22 2023-01-13 삼성전자주식회사 An electronic device and method for authenricating a user by using an audio signal
KR102608633B1 (en) * 2018-02-08 2023-12-04 삼성전자주식회사 Electronic device and control method thereof
CN110529987B (en) * 2018-05-24 2023-05-23 开利公司 Biological characteristic air conditioner control system
CN110531627A (en) * 2018-05-25 2019-12-03 九阳股份有限公司 A kind of control method and device of household electrical appliances permission
SG10201909659QA (en) * 2018-10-17 2020-05-28 Tata Consultancy Services Ltd System and method for authenticating humans based on behavioral pattern
EP3651057B1 (en) * 2018-11-09 2023-06-14 Tissot S.A. Procedure for facial authentication of a wearer of a watch
CN110033772B (en) * 2019-04-28 2021-04-20 中国科学院上海高等研究院 Non-acoustic voice information detection device based on PPG signal
KR102711155B1 (en) * 2019-05-03 2024-09-30 삼성전자주식회사 Electronic device for establishing a communiation with external electronic device and controlling method thereof
CA3042361A1 (en) * 2019-05-06 2020-11-06 Nymi Inc. Live user authentication device, system and method and fraud or collusion prevention using same
US11451536B2 (en) 2019-10-25 2022-09-20 Nymi Inc. User state monitoring system and method using motion, and a user access authorization system and method employing same
CN111371951B (en) * 2020-03-03 2021-04-23 北京航空航天大学 Smart phone user authentication method and system based on electromyographic signals and twin neural network
US12032666B2 (en) 2020-03-23 2024-07-09 Capital One Services, Llc Wearable devices and related systems for authenticating a user with surface electromyogram (sEMG)-signals
US11275479B2 (en) * 2020-04-24 2022-03-15 Electronics And Telecommunications Research Institute Frequency-based ratiometric feature extraction device for user authentication
US11605255B2 (en) 2020-05-14 2023-03-14 Nymi Inc. User activity-related monitoring system and method, and a user access authorization system and method employing same
US11886559B2 (en) * 2020-08-31 2024-01-30 Harlock Creative Llc Biometric identification and control systems and methods for providing customizable security through authentication of biosignal representations of one or more user-specific and user-selected gesture-intentions
US20230010577A1 (en) * 2021-07-06 2023-01-12 Capital One Services, Llc Computer-Based System for Locking User Account Access
US11877218B1 (en) 2021-07-13 2024-01-16 T-Mobile Usa, Inc. Multi-factor authentication using biometric and subscriber data systems and methods
EP4369153A1 (en) 2021-12-09 2024-05-15 Samsung Electronics Co., Ltd. Gesture recognition method using wearable device, and device therefor
CN114795147A (en) * 2022-04-27 2022-07-29 四川更喜科技有限公司 Cluster type vital sign monitoring system and monitoring method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR0120590Y1 (en) * 1995-07-29 1998-08-01 김광호 Pager
US6720860B1 (en) * 2000-06-30 2004-04-13 International Business Machines Corporation Password protection using spatial and temporal variation in a high-resolution touch sensitive display
US20060215883A1 (en) * 2005-03-25 2006-09-28 Samsung Electronics Co., Ltd. Biometric identification apparatus and method using bio signals and artificial neural network
US20100331649A1 (en) * 2008-02-05 2010-12-30 Chang-An Chou Interactive analysis method for biosignals
US20130159705A1 (en) * 2006-06-26 2013-06-20 Mlr, Llc Security system for handheld wireless devices using time-variable encryption keys

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7430025B2 (en) 2000-08-23 2008-09-30 Semiconductor Energy Laboratory Co., Ltd. Portable electronic device
DE10100617A1 (en) * 2001-01-09 2002-07-18 Siemens Ag Controllable arrangement with user authentication
AU2003275134A1 (en) * 2002-09-19 2004-04-08 The Penn State Research Foundation Prosody based audio/visual co-analysis for co-verbal gesture recognition
JP4633347B2 (en) * 2003-08-27 2011-02-16 ソニー株式会社 Electronics
US7577974B2 (en) * 2004-05-28 2009-08-18 Microsoft Corporation Movies channel
US7492943B2 (en) * 2004-10-29 2009-02-17 George Mason Intellectual Properties, Inc. Open set recognition using transduction
KR100713490B1 (en) 2005-08-29 2007-04-30 삼성전자주식회사 Input device of portable communication terminal using biomagnetic measurement
KR100848604B1 (en) 2006-05-29 2008-07-28 건양대학교산학협력단 Portable device for measuring blood flow
US7874011B2 (en) * 2006-12-01 2011-01-18 International Business Machines Corporation Authenticating user identity when resetting passwords
US7971156B2 (en) * 2007-01-12 2011-06-28 International Business Machines Corporation Controlling resource access based on user gesturing in a 3D captured image stream of the user
JP2008198028A (en) * 2007-02-14 2008-08-28 Sony Corp Wearable device, authentication method and program
KR100897526B1 (en) 2007-09-19 2009-05-15 한국전자통신연구원 Apparatus for inputting data using finger movement
KR20090061179A (en) 2007-12-11 2009-06-16 한국전자통신연구원 Data input apparatus and data processing method using by it
KR100981137B1 (en) 2008-03-17 2010-09-10 한국전기연구원 Wristwatch-type health monitoring system
US9082117B2 (en) * 2008-05-17 2015-07-14 David H. Chin Gesture based authentication for wireless payment by a mobile electronic device
KR20100011562A (en) 2008-07-25 2010-02-03 신성중 Specific function security device in a mobile communication terminal
KR20100076136A (en) 2008-12-26 2010-07-06 주식회사 에스디엔 Apparatus for recognizing biometric informations
JP5287550B2 (en) * 2009-07-01 2013-09-11 富士通株式会社 Biometric authentication system, biometric authentication method, biometric authentication device, biometric information processing device, biometric authentication program, and biometric information processing program
US9174123B2 (en) * 2009-11-09 2015-11-03 Invensense, Inc. Handheld computer systems and techniques for character and command recognition related to human movements
KR101192932B1 (en) 2009-12-22 2012-10-18 삼성전자주식회사 Method and apparatus for recognizing identification in portable terminal using touchscreen
KR20110079161A (en) 2009-12-31 2011-07-07 삼성전자주식회사 Method and apparatus for verifying speaker in mobile terminal
US9557814B2 (en) * 2010-04-22 2017-01-31 Sony Interactive Entertainment Inc. Biometric interface for a handheld device
EP2385450A1 (en) * 2010-05-07 2011-11-09 Research In Motion Limited Portable electronic device and method of controlling same
US9136980B2 (en) * 2010-09-10 2015-09-15 Qualcomm Incorporated Method and apparatus for low complexity compression of signals
KR20120122587A (en) 2011-04-29 2012-11-07 이청종 Apparatus and method of mobile terminal security using fingerprint and face recognition
US9323912B2 (en) * 2012-02-28 2016-04-26 Verizon Patent And Licensing Inc. Method and system for multi-factor biometric authentication
US8922481B1 (en) * 2012-03-16 2014-12-30 Google Inc. Content annotation
US9170674B2 (en) * 2012-04-09 2015-10-27 Qualcomm Incorporated Gesture-based device control using pressure-sensitive sensors

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR0120590Y1 (en) * 1995-07-29 1998-08-01 김광호 Pager
US6720860B1 (en) * 2000-06-30 2004-04-13 International Business Machines Corporation Password protection using spatial and temporal variation in a high-resolution touch sensitive display
US20060215883A1 (en) * 2005-03-25 2006-09-28 Samsung Electronics Co., Ltd. Biometric identification apparatus and method using bio signals and artificial neural network
US20130159705A1 (en) * 2006-06-26 2013-06-20 Mlr, Llc Security system for handheld wireless devices using time-variable encryption keys
US20100331649A1 (en) * 2008-02-05 2010-12-30 Chang-An Chou Interactive analysis method for biosignals

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3044715A4 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12023139B1 (en) 2008-07-03 2024-07-02 Masimo Corporation User-worn device for noninvasively measuring a physiological parameter of a user
US12036009B1 (en) 2008-07-03 2024-07-16 Masimo Corporation User-worn device for noninvasively measuring a physiological parameter of a user
US11988995B2 (en) 2015-03-08 2024-05-21 Apple Inc. Compressible seal for rotatable and translatable input mechanisms
CN105068658A (en) * 2015-08-19 2015-11-18 天津先驱领域科技有限公司 Man-machine interaction device capable of performing virtual environment control
CN105554043A (en) * 2016-03-07 2016-05-04 炫彩互动网络科技有限公司 Wearable equipment identity authentication method based on cross bit operation
US12086331B2 (en) 2016-07-15 2024-09-10 Apple Inc. Capacitive gap sensor ring for an input device
US12105479B2 (en) 2016-07-25 2024-10-01 Apple Inc. Force-detecting input structure
US12066795B2 (en) 2017-07-18 2024-08-20 Apple Inc. Tri-axis force sensor
US12105480B2 (en) 2018-06-25 2024-10-01 Apple Inc. Crown for an electronic watch
US12114974B2 (en) 2020-01-13 2024-10-15 Masimo Corporation Wearable device with physiological parameters monitoring
US12092996B2 (en) 2021-07-16 2024-09-17 Apple Inc. Laser-based rotation sensor for a crown of an electronic watch

Also Published As

Publication number Publication date
CN105556529B (en) 2018-11-16
EP3044715B1 (en) 2020-10-21
KR20150029105A (en) 2015-03-18
CN105556529A (en) 2016-05-04
KR102136836B1 (en) 2020-08-13
US9811648B2 (en) 2017-11-07
EP3044715A4 (en) 2017-02-22
US20150074797A1 (en) 2015-03-12
EP3044715A1 (en) 2016-07-20

Similar Documents

Publication Publication Date Title
WO2015034149A1 (en) Wearable device performing user authentication using bio-signals and authentication method of the same
US10325083B2 (en) Wearable electronic devices
WO2018101639A1 (en) Method for detecting wrong positioning of earphone, and electronic device and storage medium therefor
WO2016032124A1 (en) Rotary device and electronic device having the same
WO2015126179A1 (en) Curved body and wearable device therewith
WO2016108537A1 (en) Electronic device comprising rotating body and control method therefor
WO2017039191A1 (en) Cradle for wireless charging and electronic device applied to same
WO2016032206A2 (en) Authentication method and apparatus using biometric information and context information
WO2018070718A1 (en) Output device outputting audio signal and control method thereof
WO2015030301A1 (en) Smartwatch and control method thereof
WO2015137673A1 (en) Method for determining data source
WO2015126091A1 (en) Controlling input/output devices
WO2018135693A1 (en) In-ear headset device for measuring stress, and method for measuring stress using same
WO2017010819A1 (en) Wearable device and method of operating the same
WO2016129936A1 (en) Security message transmission apparatus and processing method therefor
WO2018080198A1 (en) Electronic device and method for performing authentication
WO2017074064A1 (en) Internal coil structure and method for operating the same in a wireless terminal
WO2019039716A1 (en) Electronic device and stress measurement method thereof
JP6227379B2 (en) Wearable device and authentication method
WO2016064041A1 (en) User terminal using hash value to detect whether application program has been tampered and method for tamper detection using the user terminal
WO2016165667A1 (en) Warning method utilizing motion-sensing control device for preventing loss of smart electronic device
WO2017099340A1 (en) Electronic device, signal processing method thereof, biological signal measurement system, and non-transitory computer readable recording medium
WO2020209618A1 (en) Electronic device and method for providing information for stress relief by same
WO2021080369A1 (en) User verification device using electrocardiogram data and method thereof
EP3516843A1 (en) Electronic device and method for operating the same

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201480043822.6

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14842116

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2014842116

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014842116

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE