WO2015034149A1 - Wearable device performing user authentication using bio-signals and authentication method of the same - Google Patents
Wearable device performing user authentication using bio-signals and authentication method of the same Download PDFInfo
- Publication number
- WO2015034149A1 WO2015034149A1 PCT/KR2014/001414 KR2014001414W WO2015034149A1 WO 2015034149 A1 WO2015034149 A1 WO 2015034149A1 KR 2014001414 W KR2014001414 W KR 2014001414W WO 2015034149 A1 WO2015034149 A1 WO 2015034149A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- biosignal
- wearable device
- information
- signal
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/065—Continuous authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/33—Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/017—Gesture based interaction, e.g. based on a set of recognized hand gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44213—Monitoring of end-user related data
- H04N21/44218—Detecting physical presence or behaviour of the user, e.g. using sensors to detect if the user is leaving the room or changes his face expression during a TV program
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/68—Gesture-dependent or behaviour-dependent
Definitions
- the following description relates to a wearable device performing user authentication using biosignals and an authentication method of the wearable device.
- a mobile device may provide a great deal of convenience for modern life.
- a growing computing power of the mobile device may enable users to handle tasks previously performed using a personal computer (PC).
- PC personal computer
- protecting personal information stored on the mobile device such as, contact information, personal multimedia contents, for example, photos and videos, messages, and financial information has become more important.
- a user loses a mobile device and another unspecified user uses the mobile device, there is a high risk of personal information of the user being unintentionally exposed. Accordingly, there is a desire for a method of authenticating a user for whom use of a mobile device is intended and controlling an access to various types of personal information stored on the mobile device.
- a wearable device including a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user.
- the device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
- the first biosignal may be generated in response to a muscle movement performed by the user to input the gesture.
- the first biosignal may be at least one of an electromyogram (EMG) signal generated before and after the muscle movement, a light signal penetrating a muscle of the user, and a force signal generated by the muscle.
- EMG electromyogram
- the second biosignal may be at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
- ECG electrocardiogram
- PPG photoplethysmogram
- the stored information may include a piece of feature point information obtained by performing signal processing on the first biosignal and the second biosignal.
- the stored information may be encoded.
- the processor may be configured to determine whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticate the user based on a result of the determining of whether the difference is within the predetermined error range.
- the device may further include an initial authenticator configured to receive the gesture and the second biosignal from the user, and store, in the memory, the first biosignal corresponding to the gesture, and the second biosignal.
- the memory may be further configured to store access right information of a function executable in the wearable device, and in response a command to execute the function being input to the wearable device by the user, the processor may be configured to read, from the memory, the access right information, and provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
- the feedback may be a request for the user authentication.
- the device may further include a wearing detection sensor configured to detect whether the wearable device is detached from the user, and the processor may be configured to control the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
- the wearing detection sensor may be configured to detect a mechanical movement of a band attached to a portion of a body of the user, and/or detect an electrical signal generated by attaching and detaching of the band.
- the memory may be further configured to store device setting information of the at least one user, and in response to the user being authenticated, the processor may be further configured to read, from the memory, the device setting information of the authenticated user, and provide, to the user, a user interface based on the device setting information.
- the wearable device may be a watch-type smartphone.
- a wearable device including a first sensor configured to detect a first biosignal generated in response to a muscle movement performed by a user to input a gesture, and a second sensor configured to detect a second biosignal of the user, the second biosignal being at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
- ECG electrocardiogram
- PPG photoplethysmogram
- the device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to trigger user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
- a user authentication method of a wearable device including detecting a first biosignal generated in response to a gesture performed by a user, and detecting a second biosignal of the user.
- the method further includes storing, with respect to at least one user, information of the first biosignal and the second biosignal, initiating user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticating the user by comparing the detected second biosignal to the stored information.
- the authenticating may include determining whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticating the user based on a result of the determining of whether the difference is within the predetermined error range.
- the method may further include receiving the gesture and the second biosignal from the user, and storing the first biosignal corresponding to the gesture, and the second biosignal.
- the method may further include storing access right information of a function executable in the wearable device.
- the initiating may include reading the access right information, and providing, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
- the method may further include detecting whether the wearable device is detached from the user, and controlling the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
- the detecting may include detecting a mechanical movement of a band attached to a portion of a body of the user, and/or detecting an electrical signal generated by attaching and detaching of the band.
- the method may further include storing device setting information of the at least one user, and in response to the user being authenticated, reading the device setting information of the authenticated user, and providing, to the user, a user interface based on the device setting information.
- a non-transitory computer-readable storage medium may store a program including instructions to cause a computer to perform the method.
- a wearable device including a first sensor configured to detect a first signal of a user, and a second sensor configured to detect a second signal of the user.
- the device further includes a processor configured to initiate user authentication in response to the detected first signal corresponding to information of the first signal, and authenticate the user in response to the detected second signal being within a predetermined range of information of the second signal.
- the information of the first and second signals may be predetermined.
- the processor may be further configured to receive, from the user, a command to execute a function, and provide, to the user, a feedback based on predetermined access right information corresponding to the function, the predetermined access right information indicating a level of the user authentication needed.
- FIG. 1 is a diagram illustrating an example of a wearable device.
- FIG. 2 is a block diagram illustrating an example of a wearable device.
- FIG. 3 is a block diagram illustrating another example of a wearable device.
- FIG. 4 is a flowchart illustrating an example of an authentication method of a wearable device.
- FIG. 5 is a flowchart illustrating another example of an authentication method of a wearable device.
- FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device.
- FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user.
- FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device.
- FIG. 1 is a diagram illustrating an example of a wearable device.
- the wearable device may be attachable to, wearable on, and detachable from a portion of a body of a user, using an arm band, a wrist band, and/or other fixing devices known to one of ordinary skill in the art.
- a surface of the wearable device that is provided with a display visible to the user will be described as a front 130
- another surface of the wearable device that faces the body of the user when the wearable device is attached or worn will be described as a back 150.
- a mechanically or electrically openable and closeable protector may be disposed on the front 130 to protect the display.
- the front 130 may refer to, for example, the surface of the actual display or a surface of the protector, on which a sensor to be described later is provided.
- the wearable device includes a plurality of sensors 131, 151, and 155 provided on the front 130 and the back 150, respectively.
- the wearable device detects, using at least one of the sensors 131, 151, and 155, a trigger signal triggering a process of user authentication, and initiates the user authentication based on the detected trigger signal.
- the user may generate the trigger signal by performing a predetermined gesture, for example, opening a hand, clenching a fist, rotating a wrist, and/or other gestures known to one of ordinary skill in the art.
- the wearable device may detect, using at least one of the sensors 131, 151, and 155, the trigger signal generated in response to the gesture.
- the wearable device may initiate the process of the user authentication.
- the gesture may be intentionally inputted by the user while the user is wearing the wearable device, although the gesture may not be performed by the user in a process of putting on the wearable device.
- the sensor 155 provided on the back 150 of the wearable device may detect a biosignal generated in response to a muscle movement of the user, which is generated by the gesture.
- the biosignal generated in response to the gesture performed by the user may be the trigger signal used to initiate the user authentication, and be referred to as a first biosignal.
- the first biosignal may include, for example, an electromyogram (EMG) signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
- EMG electromyogram
- the first biosignal may be generated only in response to a predetermined gesture input from the user.
- the wearable device may authenticate the user, using a second biosignal detected by the sensor 131 provided on the front 130 and/or the sensor 151 provided on the back 150.
- the second biosignal may be unique to each user, and be distinguished from the first biosignal.
- the second biosignal may include, for example, an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and/or an impedance signal generated by a body of the user.
- ECG electrocardiogram
- PPG photoplethysmogram
- the second biosignal may be unique to each user, and thus, recognizing an iris or a fingerprint may be used to obtain the second biosignal.
- the wearable device may be a watch-type smartphone 110.
- the watch-type smartphone 110 may be an example of the wearable device, and thus, it may be obvious to those skilled in the art that various applications and design modifications may be possible. Described hereinafter is an example of an operation of the wearable device used when the user wears the wearable device around a left wrist.
- the user wearing the wearable device around the left wrist may perform a predetermined gesture, for example, opening a left hand and/or rotating the left hand upwards. Due to the gesture, a first biosignal, as a trigger signal, may be generated, and the wearable device may detect the first biosignal. The wearable device may initiate a process of user authentication in response to the detecting of the first biosignal. The detecting of the first biosignal and the initiating of the process of user authentication may be performed inconsecutively or consecutively in terms of time based on implementation.
- the first biosignal generated in response to a muscle movement of the user, due to the gesture may be detected by the sensor 155 provided on the back 150 of the wearable device.
- the first biosignal detected by the sensor 155 may be compared to a trigger signal stored in a memory of the wearable device and predetermined by the user. As a result of the comparison, when the first biosignal is determined to be identical to the trigger signal or within a predetermined error range of the trigger signal, the process of user authentication may be initiated.
- the user may place a finger of a right hand on the sensor 131 provided on the front 130 of the wearable device, and the wearable device may detect a second biosignal of the user, using the sensor 131.
- the sensor 151 provided on the back 150 of the wearable device and in contact with skin of the user may also detect the second biosignal in the same way as the sensor 131 provided on the front 130.
- the sensor 155 may detect an EMG signal of the user
- the sensor 131 and the sensor 151 may detect an ECG signal of the user.
- a signal detected in at least two different portions of the body of the user may be needed, and thus, the sensors 131 and 151 are provided on the front 130 and on the back 150, respectively.
- a sensor used to receive the second biosignal may be provided on either the front 130 or the back 150. A number of the sensors used to detect the first biosignal and the second biosignal may vary based on need.
- FIG. 2 is a block diagram illustrating an example of a wearable device 200.
- the wearable device 200 may include a first sensor 210, a second sensor 220, a memory 230, and a processor 240.
- the first sensor 210 detects a first biosignal generated in response to a gesture performed by a user.
- the first biosignal may be generated in response to a muscle movement of the user to input the gesture.
- the first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
- the gesture performed by the user may be one of various forms, for example, a wrist rotating, a hand flailing, and/or a fist clenching, which may be performed by the user using a portion of a body on which the user wears the wearable device 200.
- a higher level of user authentication is needed based on implementation, at least two gestures consecutively input by the user may initiate the user authentication.
- the second sensor 220 detects a second biosignal of the user.
- the second biosignal may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by the body of the user.
- the memory 230 stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal.
- the information directly representing the first biosignal and the second biosignal may be information representing at least a portion of a sampled data symbol, or may be a duplicated signal of the first biosignal and the second signal.
- the information indirectly representing the first biosignal and the second biosignal may be information in which the first biosignal and the second biosignal are processed and represented based on various signal processing methods.
- the memory 230 may store at least one piece of feature point information obtained through signal processing performed on the first biosignal and the second biosignal.
- the information to be stored in the memory 230 may be encoded and stored in the memory 230.
- a design to prevent the stored information from being leaked out may be applied.
- various methods may be adopted to prevent a third person from decoding the stored information in an abnormal manner.
- the processor 240 determines, by referring to the memory 230, whether the first biosignal detected by the first sensor 210 corresponds to the information stored in the memory 230, and initiates a process of user authentication when the first biosignal corresponds to the stored information.
- the processor 240 authenticates the user by comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230.
- the processor 240 may operate based on a predetermined error range.
- the error range may be determined by the user or predetermined in the wearable device 200 based on a result of statistics. For example, the error range may be predetermined, by the user, to be 7%.
- the processor 240 may determine that the second biosignal detected by the second sensor 220 corresponds to the information stored in the memory 230 because the 5% error is within the predetermined error range. In this example, the processor 240 may authenticate the user.
- the processor 240 may determine that the second biosignal detected by the second sensor 220 does not correspond to the information stored in the memory 230 because the 10% error is outside the predetermined error range. In this example, the processor 240 may not authenticate the user.
- the processor 240 may notify the user of a result of the user authentication in a visual, audible, and/or tactile manner, for example, on a display of the wearable device 200, through a speaker of the wearable device 200, and/or through a vibration of the wearable device 200.
- FIG. 3 is a block diagram illustrating another example of a wearable device 300.
- the wearable device 300 may include a first sensor 310, a second sensor 320, a memory 330, a processor 340, an initial authenticator 350, and a wearing detection sensor 360.
- the memory 330 stores access right information on at least one function executable in the wearable device 300.
- the access right information on each function may be determined by an external device, for example, a personal computer (PC), a laptop computer, and/or a smartphone, which is connected to the wearable device 300 through a wire or a wireless communication, or may be self-determined by the wearable device 300.
- An example of the access right information on the executable function, which is stored in the memory 330, will be described in detail by referring to following FIG. 8.
- the processor 340 When a command to execute a function is input to the wearable device 300 from the user, the processor 340 reads the access right information on the function, by referring to the memory 330, and provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information. Each form of feedback may be a request for user authentication to the user.
- the wearable device 300 may include various executable functions, for example, performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting a short message service (SMS) message, and/or other executable functions known to one of ordinary skill in the art, and each function may need a different access right.
- the memory 330 may store the access right information on the various functions executable in the wearable device 300. For example, functions such as smartphone banking and opening a personal e-mail may need a relatively high level of the access right information, and functions such as using the Internet and transmitting an SMS message may need a relatively low level of the access right information.
- the processor 340 may read the access right information on the function, by referring to the memory 330.
- the access right information on the function of opening a personal e-mail that is stored in the memory 330 may be at a relatively high level.
- the processor 340 may provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback requesting a high level of user authentication based on the access right information.
- the visual feedback may be feedback indicated on a display of the wearable device 300
- the auditory feedback may be feedback delivered in a form of sound to the user through a speaker of the wearable device 300
- the tactile feedback may be feedback delivered in a form of touch sensation to the user through vibration of the wearable device 300.
- the initial authenticator 350 receives a gesture and/or a first biosignal and a second biosignal from the user through the first sensor 310 and the second sensor 320, respectively, to set up an initial authentication.
- the initial authenticator 350 stores, in the memory 330, the first biosignal corresponding to the input gesture and the second biosignal.
- the wearing detection sensor 360 detects whether the wearable device 300 is detached from the user.
- the wearing detection sensor 360 may detect a mechanical movement of a band attached to a portion of a body of the user, by being connected to the wearable device 300, or may detect an electrical signal generated in association with attaching and detaching of the band.
- the wearing detection sensor 360 may detect, by being connected to the wearable device 300, changes generated when the band attached to the portion of the body of the user is attached and detached. For example, the wearing detection sensor 360 may detect a change in which tension or elasticity of the band attached to a wrist of the user increases or decreases. Also, the wearing detection sensor 360 may detect a change in an amount of light detected by a light receiving unit of a photo sensor attached to a back of the wearable device 300, and may detect a change in which an electrical signal or an impedance signal is intensified or weakened when a contact point between the wearing detection sensor 360 and a skin appears or disappears due to the attaching or detaching of the band. Further, the wearing detection sensor 360 may include various sensors that may detect whether the wearable device 300 is worn or not, and may deliver changes detected by the sensors to the processor 340.
- the processor 340 controls the user authentication to be invalid based on a signal received from the wearing detection sensor 360.
- the signal received from the wearing detection sensor 360 may be a signal such as "the user authentication to be invalid" indicating that a usage right assigned to the user through the process of the user authentication that is performed when the user wears the wearable device 300 is withdrawn or nullified.
- the user authentication is invalid, the user may need to obtain the usage right through the process of the user authentication that is performed again when the user resumes wearing the wearable device 300.
- the memory 330 may further store device setting information on each of at least one user.
- the processor 340 may read the device setting information on the authenticated user, by referring to the memory 330, and may provide a user interface based on the device setting information.
- different device setting information or different configuration information pertaining to user A and user B may be stored in the memory 330.
- the processor 340 may read the device setting information on the user A that is stored in the memory 330, and may provide a main display and/or an icon arrangement for application execution, for the user A.
- FIG. 4 is a flowchart illustrating a user authentication method of a wearable device.
- the wearable device detects a first biosignal generated in response to a gesture performed by a user.
- the first biosignal may be generated in response to a muscle movement of the user to input the gesture.
- the first biosignal may be at least one of an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and a force signal generated by the muscle of the user.
- the wearable device detects a second biosignal of the user.
- the second biosignal may be a signal distinguished from the first biosignal, and at least one of an ECG signal, a PPG signal, a voice of the user, and an impedance signal generated by a body of the user.
- the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in a memory of the wearable device.
- the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 450. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
- the wearable device initiates a process of user authentication.
- the wearable device compares the second biosignal detected by the second sensor to the stored information.
- the wearable device authenticates the user based on a result of the comparison, e.g., when the second biosignal corresponds to the stored information.
- the wearable device may read device setting information of the authenticated user, by referring to the memory, and provide a user interface based on the device setting information.
- the device setting information on each of the at least one user may be stored in the memory of the wearable device.
- FIG. 5 is a flowchart illustrating another example of a user authentication method of a wearable device.
- the wearable device receives a gesture and a second biosignal from a user.
- the wearable device stores, in a memory of the wearable device, a first biosignal corresponding to the gesture, and the second biosignal.
- a process of storing initial user information is performed in operations 510 and 515, and thus, the user information stored in operations 510 and 515 may be used for user authentication in the wearable device.
- the information stored in operations 510 and 515 may be managed with respect to each of the users.
- the wearable device detects the first biosignal generated in response to the gesture performed by the user.
- the first biosignal may be generated in response to a muscle movement of the user to input the gesture.
- the first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
- the wearable device detects the second biosignal of the user.
- the second biosignal may be a biosignal unique to each of users and distinguished from the first biosignal, and may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by a body of the user.
- the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in the memory.
- the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 540. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
- the wearable device initiates a process of user authentication.
- the wearable device compares the second biosignal detected by the second sensor to the information stored in the memory.
- the wearable device determines whether a difference between the second biosignal detected by the second sensor and the information stored in the memory is within a predetermined error range. When the wearable device determines that the difference between the second biosignal and the stored information is within the predetermined error range, the wearable device continues in operation 555. When the wearable device determines that the difference between the second biosignal and the stored information is outside the predetermined error range, the wearable device ends the method.
- the wearable device authenticates the user.
- the wearable device may provide basic information, such as time and day, to the user.
- FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device.
- the wearable device stores the access right information on at least one function executable in the wearable device.
- the wearable device receives, from the user, an input of a command to execute a function of the wearable device of the at least one function executable in the wearable device.
- the wearable device reads, by referring to a memory of the wearable device, the access right information on the function for which the command to execute is input.
- the wearable device provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information.
- Each feedback may be a request sent to the user for authentication.
- FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user. Described hereinafter is an example in which a wearing detection sensor is provided with a sensor detecting a change of impedance.
- the wearable device detects, from the wearing detection sensor, the change of the impedance input to the wearable device.
- the wearable device determines whether the wearable device is detached from the user based on the change of the impedance. When the wearable device determines that the wearable device is detached from the user, the wearable device continues in operation 730. When the wearable device determines that the wearable device is attached to the user, the wearable device continues in operation 740.
- the wearable device may determine that the wearable device is detached from the user.
- the wearable device may determine that the wearable device is not detached from the user.
- the wearable device controls user authentication to be invalid.
- the wearable device controls the user authentication to be maintained.
- the wearing detection sensor may include a photo sensor detecting an amount of light collected on a back of the wearable device, or a sensor detecting tension of a band.
- the wearable device may determine whether the wearable device is detached from the user in a same or a similar manner as described, based on a characteristic of each sensor.
- FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device.
- the access right information on the executable functions may be stored along with a command code for execution of each of the executable functions, such as performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting an SMS message, and providing time (clock) and weather information.
- a different access right determined with respect to each of the executable functions may be stored in the memory.
- the access right of level 4 may be determined for functions relating to important financial information and privacy protection such as performing a financial task, smartphone banking, and opening a personal e-mail.
- the access right of level 3 may be determined for functions such as using the Internet and transmitting an SMS message.
- the access right of level 0 may be determined for basic functions needing no security, such as, providing time or weather information. The functions for which the access right of level 0 is determined, may be provided even when a user does not undergo user authentication or fails the user authentication.
- a processor of the wearing device may verify, by referring to the memory, which function is related to the command based on an input command code for execution, and may read the access right information on the verified function.
- the processor may verify that the function is a function of opening a personal e-mail, and may read that the access right information on the verified function of opening a personal e-mail is of level 4.
- the processor may request, based on the access right information, for example, of level 4, an additional user authentication to the user, using a visual feedback, an auditory feedback, and/or a tactile feedback.
- the access right information on at the executable functions in the wearable device is stored in a form or order of a level of the access right.
- the access right information may be stored in other various forms or orders.
- a hardware component may be, for example, a physical device that physically performs one or more operations, but is not limited thereto.
- hardware components include microphones, amplifiers, low-pass filters, high-pass filters, band-pass filters, analog-to-digital converters, digital-to-analog converters, and processing devices.
- a software component may be implemented, for example, by a processing device controlled by software or instructions to perform one or more operations, but is not limited thereto.
- a computer, controller, or other control device may cause the processing device to run the software or execute the instructions.
- One software component may be implemented by one processing device, or two or more software components may be implemented by one processing device, or one software component may be implemented by two or more processing devices, or two or more software components may be implemented by two or more processing devices.
- a processing device may be implemented using one or more general-purpose or special-purpose computers, such as, for example, a processor, a controller and an arithmetic logic unit, a digital signal processor, a microcomputer, a field-programmable array, a programmable logic unit, a microprocessor, or any other device capable of running software or executing instructions.
- the processing device may run an operating system (OS), and may run one or more software applications that operate under the OS.
- the processing device may access, store, manipulate, process, and create data when running the software or executing the instructions.
- OS operating system
- the singular term "processing device" may be used in the description, but one of ordinary skill in the art will appreciate that a processing device may include multiple processing elements and multiple types of processing elements.
- a processing device may include one or more processors, or one or more processors and one or more controllers.
- different processing configurations are possible, such as parallel processors or multi-core processors.
- a processing device configured to implement a software component to perform an operation A may include a processor programmed to run software or execute instructions to control the processor to perform operation A.
- a processing device configured to implement a software component to perform an operation A, an operation B, and an operation C may have various configurations, such as, for example, a processor configured to implement a software component to perform operations A, B, and C; a first processor configured to implement a software component to perform operation A, and a second processor configured to implement a software component to perform operations B and C; a first processor configured to implement a software component to perform operations A and B, and a second processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operation A, a second processor configured to implement a software component to perform operation B, and a third processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operations A, B, and C, and a second processor configured to implement a software component to perform operations A, B
- Software or instructions for controlling a processing device to implement a software component may include a computer program, a piece of code, an instruction, or some combination thereof, for independently or collectively instructing or configuring the processing device to perform one or more desired operations.
- the software or instructions may include machine code that may be directly executed by the processing device, such as machine code produced by a compiler, and/or higher-level code that may be executed by the processing device using an interpreter.
- the software or instructions and any associated data, data files, and data structures may be embodied permanently or temporarily in any type of machine, component, physical or virtual equipment, computer storage medium or device, or a propagated signal wave capable of providing instructions or data to or being interpreted by the processing device.
- the software or instructions and any associated data, data files, and data structures also may be distributed over network-coupled computer systems so that the software or instructions and any associated data, data files, and data structures are stored and executed in a distributed fashion.
- the software or instructions and any associated data, data files, and data structures may be recorded, stored, or fixed in one or more non-transitory computer-readable storage media.
- a non-transitory computer-readable storage medium may be any data storage device that is capable of storing the software or instructions and any associated data, data files, and data structures so that they can be read by a computer system or processing device.
- Examples of a non-transitory computer-readable storage medium include read-only memory (ROM), random-access memory (RAM), flash memory, CD-ROMs, CD-Rs, CD+Rs, CD-RWs, CD+RWs, DVD-ROMs, DVD-Rs, DVD+Rs, DVD-RWs, DVD+RWs, DVD-RAMs, BD-ROMs, BD-Rs, BD-R LTHs, BD-REs, magnetic tapes, floppy disks, magneto-optical data storage devices, optical data storage devices, hard disks, solid-state disks, or any other non-transitory computer-readable storage medium known to one of ordinary skill in the art.
- ROM read-only memory
- RAM random-access memory
- flash memory CD-ROMs, CD-Rs, CD+Rs, CD-RWs, CD+RWs, DVD-ROMs, DVD-Rs, DVD+Rs, DVD-RWs, DVD+RWs, DVD-RAMs, BD
- a device described herein may refer to mobile devices such as, for example, a cellular phone, a smart phone, a wearable smart device (such as, for example, a ring, a watch, a pair of glasses, a bracelet, an ankle bracket, a belt, a necklace, an earring, a headband, a helmet, a device embedded in the cloths or the like), a personal computer (PC), a tablet personal computer (tablet), a phablet, a personal digital assistant (PDA), a digital camera, a portable game console, an MP3 player, a portable/personal multimedia player (PMP), a handheld e-book, an ultra mobile personal computer (UMPC), a portable lab-top PC, a global positioning system (GPS) navigation, and devices such as a high definition television (HDTV), an optical disc player, a DVD player, a Blue-ray player, a setup box, or any other device capable of wireless communication or network communication consistent with that disclosed here
- a personal computer PC
- the wearable device may be self-mountable on the body of the user, such as, for example, the glasses or the bracelet.
- the wearable device may be mounted on the body of the user through an attaching device, such as, for example, attaching a smart phone or a tablet to the arm of a user using an armband, or hanging the wearable device around the neck of a user using a lanyard.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- User Interface Of Digital Computer (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
A wearable device includes a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
Description
The following description relates to a wearable device performing user authentication using biosignals and an authentication method of the wearable device.
Amid the proliferation of smart phones, a variety of mobile devices are being developed, and a wearable type mobile device has been emerging. A mobile device may provide a great deal of convenience for modern life. A growing computing power of the mobile device may enable users to handle tasks previously performed using a personal computer (PC). However, due to widespread use of the mobile device, protecting personal information stored on the mobile device, such as, contact information, personal multimedia contents, for example, photos and videos, messages, and financial information has become more important. In a case in which a user loses a mobile device and another unspecified user uses the mobile device, there is a high risk of personal information of the user being unintentionally exposed. Accordingly, there is a desire for a method of authenticating a user for whom use of a mobile device is intended and controlling an access to various types of personal information stored on the mobile device.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter
In one general aspect, there is provided a wearable device, including a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
The first biosignal may be generated in response to a muscle movement performed by the user to input the gesture.
The first biosignal may be at least one of an electromyogram (EMG) signal generated before and after the muscle movement, a light signal penetrating a muscle of the user, and a force signal generated by the muscle.
The second biosignal may be at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
The stored information may include a piece of feature point information obtained by performing signal processing on the first biosignal and the second biosignal.
The stored information may be encoded.
The processor may be configured to determine whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticate the user based on a result of the determining of whether the difference is within the predetermined error range.
The device may further include an initial authenticator configured to receive the gesture and the second biosignal from the user, and store, in the memory, the first biosignal corresponding to the gesture, and the second biosignal.
The memory may be further configured to store access right information of a function executable in the wearable device, and in response a command to execute the function being input to the wearable device by the user, the processor may be configured to read, from the memory, the access right information, and provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
The feedback may be a request for the user authentication.
The device may further include a wearing detection sensor configured to detect whether the wearable device is detached from the user, and the processor may be configured to control the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
The wearing detection sensor may be configured to detect a mechanical movement of a band attached to a portion of a body of the user, and/or detect an electrical signal generated by attaching and detaching of the band.
The memory may be further configured to store device setting information of the at least one user, and in response to the user being authenticated, the processor may be further configured to read, from the memory, the device setting information of the authenticated user, and provide, to the user, a user interface based on the device setting information.
The wearable device may be a watch-type smartphone.
In another general aspect, there is provided a wearable device, including a first sensor configured to detect a first biosignal generated in response to a muscle movement performed by a user to input a gesture, and a second sensor configured to detect a second biosignal of the user, the second biosignal being at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to trigger user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information.
In still another general aspect, there is provided a user authentication method of a wearable device, the method including detecting a first biosignal generated in response to a gesture performed by a user, and detecting a second biosignal of the user. The method further includes storing, with respect to at least one user, information of the first biosignal and the second biosignal, initiating user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticating the user by comparing the detected second biosignal to the stored information.
The authenticating may include determining whether a difference between the detected second biosignal and the stored information is within a predetermined error range, and authenticating the user based on a result of the determining of whether the difference is within the predetermined error range.
The method may further include receiving the gesture and the second biosignal from the user, and storing the first biosignal corresponding to the gesture, and the second biosignal.
The method may further include storing access right information of a function executable in the wearable device. In response a command to execute the function being input to the wearable device by the user, the initiating may include reading the access right information, and providing, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
The method may further include detecting whether the wearable device is detached from the user, and controlling the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
The detecting may include detecting a mechanical movement of a band attached to a portion of a body of the user, and/or detecting an electrical signal generated by attaching and detaching of the band.
The method may further include storing device setting information of the at least one user, and in response to the user being authenticated, reading the device setting information of the authenticated user, and providing, to the user, a user interface based on the device setting information.
A non-transitory computer-readable storage medium may store a program including instructions to cause a computer to perform the method.
In yet another general aspect, there is provided a wearable device, including a first sensor configured to detect a first signal of a user, and a second sensor configured to detect a second signal of the user. The device further includes a processor configured to initiate user authentication in response to the detected first signal corresponding to information of the first signal, and authenticate the user in response to the detected second signal being within a predetermined range of information of the second signal.
The information of the first and second signals may be predetermined.
The processor may be further configured to receive, from the user, a command to execute a function, and provide, to the user, a feedback based on predetermined access right information corresponding to the function, the predetermined access right information indicating a level of the user authentication needed.
Other features and aspects will be apparent from the following detailed description, the drawings, and the claims.
FIG. 1 is a diagram illustrating an example of a wearable device.
FIG. 2 is a block diagram illustrating an example of a wearable device.
FIG. 3 is a block diagram illustrating another example of a wearable device.
FIG. 4 is a flowchart illustrating an example of an authentication method of a wearable device.
FIG. 5 is a flowchart illustrating another example of an authentication method of a wearable device.
FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device.
FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user.
FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device.
Throughout the drawings and the detailed description, unless otherwise described or provided, the same drawing reference numerals will be understood to refer to the same elements, features, and structures. The drawings may not be to scale, and the relative size, proportions, and depiction of elements in the drawings may be exaggerated for clarity, illustration, and convenience.
The following detailed description is provided to assist the reader in gaining a comprehensive understanding of the methods, apparatuses, and/or systems described herein. However, various changes, modifications, and equivalents of the systems, apparatuses and/or methods described herein will be apparent to one of ordinary skill in the art. The progression of processing steps and/or operations described is an example; however, the sequence of and/or operations is not limited to that set forth herein and may be changed as is known in the art, with the exception of steps and/or operations necessarily occurring in a certain order. Also, descriptions of functions and constructions that are well known to one of ordinary skill in the art may be omitted for increased clarity and conciseness.
The features described herein may be embodied in different forms, and are not to be construed as being limited to the examples described herein. Rather, the examples described herein have been provided so that this disclosure will be thorough and complete, and will convey the full scope of the disclosure to one of ordinary skill in the art.
FIG. 1 is a diagram illustrating an example of a wearable device. Referring to FIG. 1, the wearable device may be attachable to, wearable on, and detachable from a portion of a body of a user, using an arm band, a wrist band, and/or other fixing devices known to one of ordinary skill in the art.
For convenience of description, a surface of the wearable device that is provided with a display visible to the user, for example, a touch display, will be described as a front 130, and another surface of the wearable device that faces the body of the user when the wearable device is attached or worn will be described as a back 150. Based on a design of the wearable device, a mechanically or electrically openable and closeable protector may be disposed on the front 130 to protect the display. In this example, the front 130 may refer to, for example, the surface of the actual display or a surface of the protector, on which a sensor to be described later is provided.
The wearable device includes a plurality of sensors 131, 151, and 155 provided on the front 130 and the back 150, respectively. The wearable device detects, using at least one of the sensors 131, 151, and 155, a trigger signal triggering a process of user authentication, and initiates the user authentication based on the detected trigger signal.
The user may generate the trigger signal by performing a predetermined gesture, for example, opening a hand, clenching a fist, rotating a wrist, and/or other gestures known to one of ordinary skill in the art. The wearable device may detect, using at least one of the sensors 131, 151, and 155, the trigger signal generated in response to the gesture. When the trigger signal is detected, the wearable device may initiate the process of the user authentication. According to an example, the gesture may be intentionally inputted by the user while the user is wearing the wearable device, although the gesture may not be performed by the user in a process of putting on the wearable device.
When the user performs the gesture while the user is wearing the wearable device, the sensor 155 provided on the back 150 of the wearable device may detect a biosignal generated in response to a muscle movement of the user, which is generated by the gesture. The biosignal generated in response to the gesture performed by the user may be the trigger signal used to initiate the user authentication, and be referred to as a first biosignal. The first biosignal may include, for example, an electromyogram (EMG) signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user. The first biosignal may be generated only in response to a predetermined gesture input from the user.
When the process of user authentication with respect to the user is initiated by the first biosignal detected by the sensor 155 provided on the back 150 of the wearable device, the wearable device may authenticate the user, using a second biosignal detected by the sensor 131 provided on the front 130 and/or the sensor 151 provided on the back 150. The second biosignal may be unique to each user, and be distinguished from the first biosignal. The second biosignal may include, for example, an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and/or an impedance signal generated by a body of the user. Based on implementation, the second biosignal may be unique to each user, and thus, recognizing an iris or a fingerprint may be used to obtain the second biosignal.
As shown in FIG. 1, the wearable device may be a watch-type smartphone 110. The watch-type smartphone 110 may be an example of the wearable device, and thus, it may be obvious to those skilled in the art that various applications and design modifications may be possible. Described hereinafter is an example of an operation of the wearable device used when the user wears the wearable device around a left wrist.
The user wearing the wearable device around the left wrist may perform a predetermined gesture, for example, opening a left hand and/or rotating the left hand upwards. Due to the gesture, a first biosignal, as a trigger signal, may be generated, and the wearable device may detect the first biosignal. The wearable device may initiate a process of user authentication in response to the detecting of the first biosignal. The detecting of the first biosignal and the initiating of the process of user authentication may be performed inconsecutively or consecutively in terms of time based on implementation.
According to an example, the first biosignal generated in response to a muscle movement of the user, due to the gesture, may be detected by the sensor 155 provided on the back 150 of the wearable device. The first biosignal detected by the sensor 155 may be compared to a trigger signal stored in a memory of the wearable device and predetermined by the user. As a result of the comparison, when the first biosignal is determined to be identical to the trigger signal or within a predetermined error range of the trigger signal, the process of user authentication may be initiated.
After the process of user authentication is initiated, the user may place a finger of a right hand on the sensor 131 provided on the front 130 of the wearable device, and the wearable device may detect a second biosignal of the user, using the sensor 131. The sensor 151 provided on the back 150 of the wearable device and in contact with skin of the user may also detect the second biosignal in the same way as the sensor 131 provided on the front 130. For example, the sensor 155 may detect an EMG signal of the user, and the sensor 131 and the sensor 151 may detect an ECG signal of the user.
To detect the ECG signal as an example of the second biosignal, a signal detected in at least two different portions of the body of the user may be needed, and thus, the sensors 131 and 151 are provided on the front 130 and on the back 150, respectively. In an example of detecting a biosignal unique to the user from a body part, for example, a voice of the user and/or an impedance signal generated by the body of the user, aside from the ECG signal, a sensor used to receive the second biosignal may be provided on either the front 130 or the back 150. A number of the sensors used to detect the first biosignal and the second biosignal may vary based on need.
FIG. 2 is a block diagram illustrating an example of a wearable device 200. Referring to FIG. 2, the wearable device 200 may include a first sensor 210, a second sensor 220, a memory 230, and a processor 240.
The first sensor 210 detects a first biosignal generated in response to a gesture performed by a user. The first biosignal may be generated in response to a muscle movement of the user to input the gesture. The first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
The gesture performed by the user may be one of various forms, for example, a wrist rotating, a hand flailing, and/or a fist clenching, which may be performed by the user using a portion of a body on which the user wears the wearable device 200. When a higher level of user authentication is needed based on implementation, at least two gestures consecutively input by the user may initiate the user authentication.
The second sensor 220 detects a second biosignal of the user. The second biosignal may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by the body of the user.
The memory 230 stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal. For example, when sampling the first biosignal and the second biosignal, the information directly representing the first biosignal and the second biosignal may be information representing at least a portion of a sampled data symbol, or may be a duplicated signal of the first biosignal and the second signal. The information indirectly representing the first biosignal and the second biosignal may be information in which the first biosignal and the second biosignal are processed and represented based on various signal processing methods.
The memory 230 may store at least one piece of feature point information obtained through signal processing performed on the first biosignal and the second biosignal. The information to be stored in the memory 230 may be encoded and stored in the memory 230.
Based on implementation, in an example of irregular access to the stored information, a design to prevent the stored information from being leaked out may be applied. When the user loses the wearable device 200, various methods may be adopted to prevent a third person from decoding the stored information in an abnormal manner.
The processor 240 determines, by referring to the memory 230, whether the first biosignal detected by the first sensor 210 corresponds to the information stored in the memory 230, and initiates a process of user authentication when the first biosignal corresponds to the stored information. The processor 240 authenticates the user by comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230. When comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230, the processor 240 may operate based on a predetermined error range. The error range may be determined by the user or predetermined in the wearable device 200 based on a result of statistics. For example, the error range may be predetermined, by the user, to be 7%.
When a 5% error occurs as a result of comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230, the processor 240 may determine that the second biosignal detected by the second sensor 220 corresponds to the information stored in the memory 230 because the 5% error is within the predetermined error range. In this example, the processor 240 may authenticate the user. When a 10% error occurs as a result of comparing the second biosignal detected by the second sensor 220 to the information stored in the memory 230, the processor 240 may determine that the second biosignal detected by the second sensor 220 does not correspond to the information stored in the memory 230 because the 10% error is outside the predetermined error range. In this example, the processor 240 may not authenticate the user. The processor 240 may notify the user of a result of the user authentication in a visual, audible, and/or tactile manner, for example, on a display of the wearable device 200, through a speaker of the wearable device 200, and/or through a vibration of the wearable device 200.
FIG. 3 is a block diagram illustrating another example of a wearable device 300. Referring to FIG. 3, the wearable device 300 may include a first sensor 310, a second sensor 320, a memory 330, a processor 340, an initial authenticator 350, and a wearing detection sensor 360.
The memory 330 stores access right information on at least one function executable in the wearable device 300. The access right information on each function may be determined by an external device, for example, a personal computer (PC), a laptop computer, and/or a smartphone, which is connected to the wearable device 300 through a wire or a wireless communication, or may be self-determined by the wearable device 300. An example of the access right information on the executable function, which is stored in the memory 330, will be described in detail by referring to following FIG. 8.
When a command to execute a function is input to the wearable device 300 from the user, the processor 340 reads the access right information on the function, by referring to the memory 330, and provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information. Each form of feedback may be a request for user authentication to the user.
The wearable device 300 may include various executable functions, for example, performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting a short message service (SMS) message, and/or other executable functions known to one of ordinary skill in the art, and each function may need a different access right. The memory 330 may store the access right information on the various functions executable in the wearable device 300. For example, functions such as smartphone banking and opening a personal e-mail may need a relatively high level of the access right information, and functions such as using the Internet and transmitting an SMS message may need a relatively low level of the access right information.
For example, when the user inputs a command to execute the function of opening a personal e-mail, the processor 340 may read the access right information on the function, by referring to the memory 330. The access right information on the function of opening a personal e-mail that is stored in the memory 330, may be at a relatively high level. The processor 340 may provide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback requesting a high level of user authentication based on the access right information. For example, the visual feedback may be feedback indicated on a display of the wearable device 300, the auditory feedback may be feedback delivered in a form of sound to the user through a speaker of the wearable device 300, and the tactile feedback may be feedback delivered in a form of touch sensation to the user through vibration of the wearable device 300.
The initial authenticator 350 receives a gesture and/or a first biosignal and a second biosignal from the user through the first sensor 310 and the second sensor 320, respectively, to set up an initial authentication. The initial authenticator 350 stores, in the memory 330, the first biosignal corresponding to the input gesture and the second biosignal.
The wearing detection sensor 360 detects whether the wearable device 300 is detached from the user. The wearing detection sensor 360 may detect a mechanical movement of a band attached to a portion of a body of the user, by being connected to the wearable device 300, or may detect an electrical signal generated in association with attaching and detaching of the band.
The wearing detection sensor 360 may detect, by being connected to the wearable device 300, changes generated when the band attached to the portion of the body of the user is attached and detached. For example, the wearing detection sensor 360 may detect a change in which tension or elasticity of the band attached to a wrist of the user increases or decreases. Also, the wearing detection sensor 360 may detect a change in an amount of light detected by a light receiving unit of a photo sensor attached to a back of the wearable device 300, and may detect a change in which an electrical signal or an impedance signal is intensified or weakened when a contact point between the wearing detection sensor 360 and a skin appears or disappears due to the attaching or detaching of the band. Further, the wearing detection sensor 360 may include various sensors that may detect whether the wearable device 300 is worn or not, and may deliver changes detected by the sensors to the processor 340.
The processor 340 controls the user authentication to be invalid based on a signal received from the wearing detection sensor 360. For example, the signal received from the wearing detection sensor 360 may be a signal such as "the user authentication to be invalid" indicating that a usage right assigned to the user through the process of the user authentication that is performed when the user wears the wearable device 300 is withdrawn or nullified. When the user authentication is invalid, the user may need to obtain the usage right through the process of the user authentication that is performed again when the user resumes wearing the wearable device 300.
The memory 330 may further store device setting information on each of at least one user. When the user is authenticated, the processor 340 may read the device setting information on the authenticated user, by referring to the memory 330, and may provide a user interface based on the device setting information.
For example, different device setting information or different configuration information pertaining to user A and user B may be stored in the memory 330. When the authenticated user is the user A, the processor 340 may read the device setting information on the user A that is stored in the memory 330, and may provide a main display and/or an icon arrangement for application execution, for the user A.
Other operations of the first sensor 310, the second sensor 320, the memory 330, and the processor 340 of FIG. 3, which are not described in the foregoing, may be the same as the description of the first sensor 210, the second sensor 220, the memory 230, and the processor 340 of FIG. 2, respectively. Thus, a repeated detailed description of the related operations is omitted here for conciseness and ease of description.
FIG. 4 is a flowchart illustrating a user authentication method of a wearable device. Referring to FIG. 4, in operation 410, the wearable device detects a first biosignal generated in response to a gesture performed by a user. The first biosignal may be generated in response to a muscle movement of the user to input the gesture. The first biosignal may be at least one of an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and a force signal generated by the muscle of the user.
In operation 420, the wearable device detects a second biosignal of the user. The second biosignal may be a signal distinguished from the first biosignal, and at least one of an ECG signal, a PPG signal, a voice of the user, and an impedance signal generated by a body of the user.
In operation 430, the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in a memory of the wearable device.
In operation 440, the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 450. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
In operation 450, the wearable device initiates a process of user authentication.
In operation 460, the wearable device compares the second biosignal detected by the second sensor to the stored information.
In operation 470, the wearable device authenticates the user based on a result of the comparison, e.g., when the second biosignal corresponds to the stored information.
When the user is authenticated, the wearable device may read device setting information of the authenticated user, by referring to the memory, and provide a user interface based on the device setting information. The device setting information on each of the at least one user may be stored in the memory of the wearable device.
FIG. 5 is a flowchart illustrating another example of a user authentication method of a wearable device. Referring to FIG. 5, in operation 510, the wearable device receives a gesture and a second biosignal from a user.
In operation 515, the wearable device stores, in a memory of the wearable device, a first biosignal corresponding to the gesture, and the second biosignal.
A process of storing initial user information is performed in operations 510 and 515, and thus, the user information stored in operations 510 and 515 may be used for user authentication in the wearable device. When two or more users use the wearable device, the information stored in operations 510 and 515 may be managed with respect to each of the users.
In operation 520, the wearable device detects the first biosignal generated in response to the gesture performed by the user. The first biosignal may be generated in response to a muscle movement of the user to input the gesture. The first biosignal may include, for example, an EMG signal generated before and after the muscle movement of the user, a light signal penetrating a muscle of the user, and/or a force signal generated by the muscle of the user.
In operation 525, the wearable device detects the second biosignal of the user. The second biosignal may be a biosignal unique to each of users and distinguished from the first biosignal, and may include, for example, an ECG signal, a PPG signal, a voice of the user, and/or an impedance signal generated by a body of the user.
In operation 530, the wearable device stores, with respect to at least one user, information directly or indirectly representing the first biosignal and the second biosignal, in the memory.
In operation 535, the wearable device determines whether the first biosignal detected by the first sensor corresponds to the information stored in the memory. When the wearable device determines that the first biosignal corresponds to the stored information, the wearable device continues in operation 540. When the wearable device determines that the first biosignal does not correspond to the stored information, the wearable device ends the method.
In operation 540, the wearable device initiates a process of user authentication.
In operation 545, the wearable device compares the second biosignal detected by the second sensor to the information stored in the memory.
In operation 550, the wearable device determines whether a difference between the second biosignal detected by the second sensor and the information stored in the memory is within a predetermined error range. When the wearable device determines that the difference between the second biosignal and the stored information is within the predetermined error range, the wearable device continues in operation 555. When the wearable device determines that the difference between the second biosignal and the stored information is outside the predetermined error range, the wearable device ends the method.
In operation 555, the wearable device authenticates the user.
When the wearable device determines that the difference between the second biosignal and the stored information is beyond the predetermined error range, the wearable device may provide basic information, such as time and day, to the user.
FIG. 6 is a flowchart illustrating an example of an authentication method used to provide different functions based on access right information of a user in a wearable device. Referring to FIG. 6, in operation 610, the wearable device stores the access right information on at least one function executable in the wearable device.
In operation 620, the wearable device receives, from the user, an input of a command to execute a function of the wearable device of the at least one function executable in the wearable device.
In operation 630, the wearable device reads, by referring to a memory of the wearable device, the access right information on the function for which the command to execute is input.
In operation 640, the wearable device provides at least one of a visual feedback, an auditory feedback, and a tactile feedback to the user based on the access right information. Each feedback may be a request sent to the user for authentication.
FIG. 7 is a flowchart illustrating an example of an operational method used when a wearable device is detached from a user. Described hereinafter is an example in which a wearing detection sensor is provided with a sensor detecting a change of impedance.
Referring to FIG. 7, in operation 710, the wearable device detects, from the wearing detection sensor, the change of the impedance input to the wearable device.
In operation 720, the wearable device determines whether the wearable device is detached from the user based on the change of the impedance. When the wearable device determines that the wearable device is detached from the user, the wearable device continues in operation 730. When the wearable device determines that the wearable device is attached to the user, the wearable device continues in operation 740.
For example, when a value of the impedance input to the wearable device is greater than a predetermined level or is changed to be less than the predetermined level, the wearable device may determine that the wearable device is detached from the user. When a value of the impedance input to the wearable device remains at the predetermined level or is increased to be the predetermined level, the wearable device may determine that the wearable device is not detached from the user.
In operation 730, the wearable device controls user authentication to be invalid.
In operation 740, the wearable device controls the user authentication to be maintained.
According to another example, the wearing detection sensor may include a photo sensor detecting an amount of light collected on a back of the wearable device, or a sensor detecting tension of a band. In this example, the wearable device may determine whether the wearable device is detached from the user in a same or a similar manner as described, based on a characteristic of each sensor.
FIG. 8 is a diagram illustrating an example of access right information on executable functions, which are stored in a memory of a wearable device. Referring to FIG. 8, in the memory of the wearable device, the access right information on the executable functions may be stored along with a command code for execution of each of the executable functions, such as performing a financial task, smartphone banking, opening a personal e-mail, using the Internet, transmitting an SMS message, and providing time (clock) and weather information.
A different access right determined with respect to each of the executable functions may be stored in the memory. For example, the access right of level 4 may be determined for functions relating to important financial information and privacy protection such as performing a financial task, smartphone banking, and opening a personal e-mail. The access right of level 3 may be determined for functions such as using the Internet and transmitting an SMS message. Also, the access right of level 0 may be determined for basic functions needing no security, such as, providing time or weather information. The functions for which the access right of level 0 is determined, may be provided even when a user does not undergo user authentication or fails the user authentication.
For example, when a command for execution is input from the user, a processor of the wearing device may verify, by referring to the memory, which function is related to the command based on an input command code for execution, and may read the access right information on the verified function. For example, when the input command code for execution is #00011, the processor may verify that the function is a function of opening a personal e-mail, and may read that the access right information on the verified function of opening a personal e-mail is of level 4. The processor may request, based on the access right information, for example, of level 4, an additional user authentication to the user, using a visual feedback, an auditory feedback, and/or a tactile feedback.
Described in the foregoing is the example in which the access right information on at the executable functions in the wearable device is stored in a form or order of a level of the access right. However, the access right information may be stored in other various forms or orders.
The various units, elements, and methods described above may be implemented using one or more hardware components, one or more software components, or a combination of one or more hardware components and one or more software components.
A hardware component may be, for example, a physical device that physically performs one or more operations, but is not limited thereto. Examples of hardware components include microphones, amplifiers, low-pass filters, high-pass filters, band-pass filters, analog-to-digital converters, digital-to-analog converters, and processing devices.
A software component may be implemented, for example, by a processing device controlled by software or instructions to perform one or more operations, but is not limited thereto. A computer, controller, or other control device may cause the processing device to run the software or execute the instructions. One software component may be implemented by one processing device, or two or more software components may be implemented by one processing device, or one software component may be implemented by two or more processing devices, or two or more software components may be implemented by two or more processing devices.
A processing device may be implemented using one or more general-purpose or special-purpose computers, such as, for example, a processor, a controller and an arithmetic logic unit, a digital signal processor, a microcomputer, a field-programmable array, a programmable logic unit, a microprocessor, or any other device capable of running software or executing instructions. The processing device may run an operating system (OS), and may run one or more software applications that operate under the OS. The processing device may access, store, manipulate, process, and create data when running the software or executing the instructions. For simplicity, the singular term "processing device" may be used in the description, but one of ordinary skill in the art will appreciate that a processing device may include multiple processing elements and multiple types of processing elements. For example, a processing device may include one or more processors, or one or more processors and one or more controllers. In addition, different processing configurations are possible, such as parallel processors or multi-core processors.
A processing device configured to implement a software component to perform an operation A may include a processor programmed to run software or execute instructions to control the processor to perform operation A. In addition, a processing device configured to implement a software component to perform an operation A, an operation B, and an operation C may have various configurations, such as, for example, a processor configured to implement a software component to perform operations A, B, and C; a first processor configured to implement a software component to perform operation A, and a second processor configured to implement a software component to perform operations B and C; a first processor configured to implement a software component to perform operations A and B, and a second processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operation A, a second processor configured to implement a software component to perform operation B, and a third processor configured to implement a software component to perform operation C; a first processor configured to implement a software component to perform operations A, B, and C, and a second processor configured to implement a software component to perform operations A, B, and C, or any other configuration of one or more processors each implementing one or more of operations A, B, and C. Although these examples refer to three operations A, B, C, the number of operations that may implemented is not limited to three, but may be any number of operations required to achieve a desired result or perform a desired task.
Software or instructions for controlling a processing device to implement a software component may include a computer program, a piece of code, an instruction, or some combination thereof, for independently or collectively instructing or configuring the processing device to perform one or more desired operations. The software or instructions may include machine code that may be directly executed by the processing device, such as machine code produced by a compiler, and/or higher-level code that may be executed by the processing device using an interpreter. The software or instructions and any associated data, data files, and data structures may be embodied permanently or temporarily in any type of machine, component, physical or virtual equipment, computer storage medium or device, or a propagated signal wave capable of providing instructions or data to or being interpreted by the processing device. The software or instructions and any associated data, data files, and data structures also may be distributed over network-coupled computer systems so that the software or instructions and any associated data, data files, and data structures are stored and executed in a distributed fashion.
For example, the software or instructions and any associated data, data files, and data structures may be recorded, stored, or fixed in one or more non-transitory computer-readable storage media. A non-transitory computer-readable storage medium may be any data storage device that is capable of storing the software or instructions and any associated data, data files, and data structures so that they can be read by a computer system or processing device. Examples of a non-transitory computer-readable storage medium include read-only memory (ROM), random-access memory (RAM), flash memory, CD-ROMs, CD-Rs, CD+Rs, CD-RWs, CD+RWs, DVD-ROMs, DVD-Rs, DVD+Rs, DVD-RWs, DVD+RWs, DVD-RAMs, BD-ROMs, BD-Rs, BD-R LTHs, BD-REs, magnetic tapes, floppy disks, magneto-optical data storage devices, optical data storage devices, hard disks, solid-state disks, or any other non-transitory computer-readable storage medium known to one of ordinary skill in the art.
Functional programs, codes, and code segments for implementing the examples disclosed herein can be easily constructed by a programmer skilled in the art to which the examples pertain based on the drawings and their corresponding descriptions as provided herein.
As a non-exhaustive illustration only, a device described herein may refer to mobile devices such as, for example, a cellular phone, a smart phone, a wearable smart device (such as, for example, a ring, a watch, a pair of glasses, a bracelet, an ankle bracket, a belt, a necklace, an earring, a headband, a helmet, a device embedded in the cloths or the like), a personal computer (PC), a tablet personal computer (tablet), a phablet, a personal digital assistant (PDA), a digital camera, a portable game console, an MP3 player, a portable/personal multimedia player (PMP), a handheld e-book, an ultra mobile personal computer (UMPC), a portable lab-top PC, a global positioning system (GPS) navigation, and devices such as a high definition television (HDTV), an optical disc player, a DVD player, a Blue-ray player, a setup box, or any other device capable of wireless communication or network communication consistent with that disclosed herein. In a non-exhaustive example, the wearable device may be self-mountable on the body of the user, such as, for example, the glasses or the bracelet. In another non-exhaustive example, the wearable device may be mounted on the body of the user through an attaching device, such as, for example, attaching a smart phone or a tablet to the arm of a user using an armband, or hanging the wearable device around the neck of a user using a lanyard.
While this disclosure includes specific examples, it will be apparent to one of ordinary skill in the art that various changes in form and details may be made in these examples without departing from the spirit and scope of the claims and their equivalents. The examples described herein are to be considered in a descriptive sense only, and not for purposes of limitation. Descriptions of features or aspects in each example are to be considered as being applicable to similar features or aspects in other examples. Suitable results may be achieved if the described techniques are performed in a different order, and/or if components in a described system, architecture, device, or circuit are combined in a different manner and/or replaced or supplemented by other components or their equivalents. Therefore, the scope of the disclosure is defined not by the detailed description, but by the claims and their equivalents, and all variations within the scope of the claims and their equivalents are to be construed as being included in the disclosure.
Claims (26)
- A wearable device, comprising:a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user;a second sensor configured to detect a second biosignal of the user;a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal; anda processor configured toinitiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, andauthenticate the user by comparing the detected second biosignal to the stored information.
- The device of claim 1, wherein the first biosignal is generated in response to a muscle movement performed by the user to input the gesture.
- The device of claim 2, wherein the first biosignal is at least one of an electromyogram (EMG) signal generated before and after the muscle movement, a light signal penetrating a muscle of the user, and a force signal generated by the muscle.
- The device of claim 1, wherein the second biosignal is at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user.
- The device of claim 1, wherein the stored information comprises a piece of feature point information obtained by performing signal processing on the first biosignal and the second biosignal.
- The device of claim 1, wherein the stored information is encoded.
- The device of claim 1, wherein the processor is configured to:determine whether a difference between the detected second biosignal and the stored information is within a predetermined error range; andauthenticate the user based on a result of the determining of whether the difference is within the predetermined error range.
- The device of claim 1, further comprising:an initial authenticator configured toreceive the gesture and the second biosignal from the user; andstore, in the memory, the first biosignal corresponding to the gesture, and the second biosignal.
- The device of claim 1, wherein:the memory is further configured to store access right information of a function executable in the wearable device; andin response a command to execute the function being input to the wearable device by the user, the processor is configured toread, from the memory, the access right information, andprovide, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
- The device of claim 9, wherein the feedback is a request for the user authentication.
- The device of claim 1, further comprising:a wearing detection sensor configured to detect whether the wearable device is detached from the user,wherein the processor is configured to control the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
- The device of claim 11, wherein the wearing detection sensor is configured to:detect a mechanical movement of a band attached to a portion of a body of the user; and/ordetect an electrical signal generated by attaching and detaching of the band.
- The device of claim 1, wherein:the memory is further configured to store device setting information of the at least one user; andin response to the user being authenticated, the processor is further configured toread, from the memory, the device setting information of the authenticated user, andprovide, to the user, a user interface based on the device setting information.
- The device of claim 1, wherein the wearable device is a watch-type smartphone.
- A wearable device, comprising:a first sensor configured to detect a first biosignal generated in response to a muscle movement performed by a user to input a gesture;a second sensor configured to detect a second biosignal of the user, the second biosignal being at least one of an electrocardiogram (ECG) signal, a photoplethysmogram (PPG) signal, a voice of the user, and an impedance signal generated by a body of the user;a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal; anda processor configured totrigger user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, andauthenticate the user by comparing the detected second biosignal to the stored information.
- A user authentication method of a wearable device, the method comprising:detecting a first biosignal generated in response to a gesture performed by a user;detecting a second biosignal of the user;storing, with respect to at least one user, information of the first biosignal and the second biosignal;initiating user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information; andauthenticating the user by comparing the detected second biosignal to the stored information.
- The method of claim 16, wherein the authenticating comprises:determining whether a difference between the detected second biosignal and the stored information is within a predetermined error range; andauthenticating the user based on a result of the determining of whether the difference is within the predetermined error range.
- The method of claim 16, further comprising:receiving the gesture and the second biosignal from the user; andstoring the first biosignal corresponding to the gesture, and the second biosignal.
- The method of claim 16, further comprising:storing access right information of a function executable in the wearable device,wherein, in response a command to execute the function being input to the wearable device by the user, the initiating comprises reading the access right information, and providing, to the user, at least one of a visual feedback, an auditory feedback, and a tactile feedback based on the access right information.
- The method of claim 16, further comprising:detecting whether the wearable device is detached from the user; andcontrolling the user authentication to be invalid in response to the wearable device being detected to be detached from the user.
- The method of claim 20, wherein the detecting comprises:detecting a mechanical movement of a band attached to a portion of a body of the user; and/ordetecting an electrical signal generated by attaching and detaching of the band.
- The method of claim 16, further comprising:storing device setting information of the at least one user; andin response to the user being authenticated, reading the device setting information of the authenticated user, and providing, to the user, a user interface based on the device setting information.
- A non-transitory computer-readable storage medium storing a program comprising instructions to cause a computer to perform the method of claim 16.
- A wearable device, comprising:a first sensor configured to detect a first signal of a user;a second sensor configured to detect a second signal of the user; anda processor configured toinitiate user authentication in response to the detected first signal corresponding to information of the first signal, andauthenticate the user in response to the detected second signal being within a predetermined range of information of the second signal.
- The wearable device of claim 24, wherein the information of the first and second signals are predetermined.
- The wearable device of claim 24, wherein the processor is further configured to:receive, from the user, a command to execute a function; andprovide, to the user, a feedback based on predetermined access right information corresponding to the function, the predetermined access right information indicating a level of the user authentication needed.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201480043822.6A CN105556529B (en) | 2013-09-09 | 2014-02-21 | The wearable device and its authentication method of user authentication are executed using bio signal |
EP14842116.7A EP3044715B1 (en) | 2013-09-09 | 2014-02-21 | Wearable device performing user authentication using bio-signals and authentication method of the same |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2013-0107833 | 2013-09-09 | ||
KR1020130107833A KR102136836B1 (en) | 2013-09-09 | 2013-09-09 | Wearable device performing user authentication by using bio-signals and authentication method of the wearable device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015034149A1 true WO2015034149A1 (en) | 2015-03-12 |
Family
ID=52626896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2014/001414 WO2015034149A1 (en) | 2013-09-09 | 2014-02-21 | Wearable device performing user authentication using bio-signals and authentication method of the same |
Country Status (5)
Country | Link |
---|---|
US (1) | US9811648B2 (en) |
EP (1) | EP3044715B1 (en) |
KR (1) | KR102136836B1 (en) |
CN (1) | CN105556529B (en) |
WO (1) | WO2015034149A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105068658A (en) * | 2015-08-19 | 2015-11-18 | 天津先驱领域科技有限公司 | Man-machine interaction device capable of performing virtual environment control |
CN105554043A (en) * | 2016-03-07 | 2016-05-04 | 炫彩互动网络科技有限公司 | Wearable equipment identity authentication method based on cross bit operation |
US11988995B2 (en) | 2015-03-08 | 2024-05-21 | Apple Inc. | Compressible seal for rotatable and translatable input mechanisms |
US12023139B1 (en) | 2008-07-03 | 2024-07-02 | Masimo Corporation | User-worn device for noninvasively measuring a physiological parameter of a user |
US12066795B2 (en) | 2017-07-18 | 2024-08-20 | Apple Inc. | Tri-axis force sensor |
US12086331B2 (en) | 2016-07-15 | 2024-09-10 | Apple Inc. | Capacitive gap sensor ring for an input device |
US12092996B2 (en) | 2021-07-16 | 2024-09-17 | Apple Inc. | Laser-based rotation sensor for a crown of an electronic watch |
US12105479B2 (en) | 2016-07-25 | 2024-10-01 | Apple Inc. | Force-detecting input structure |
US12105480B2 (en) | 2018-06-25 | 2024-10-01 | Apple Inc. | Crown for an electronic watch |
US12114974B2 (en) | 2020-01-13 | 2024-10-15 | Masimo Corporation | Wearable device with physiological parameters monitoring |
Families Citing this family (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10234941B2 (en) | 2012-10-04 | 2019-03-19 | Microsoft Technology Licensing, Llc | Wearable sensor for tracking articulated body-parts |
WO2015047032A1 (en) * | 2013-09-30 | 2015-04-02 | 삼성전자 주식회사 | Method for processing contents on basis of bio-signal and device therefor |
US9965761B2 (en) * | 2014-01-07 | 2018-05-08 | Nod, Inc. | Methods and apparatus for providing secure identification, payment processing and/or signing using a gesture-based input device |
KR20160108491A (en) * | 2014-01-31 | 2016-09-19 | 애플 인크. | Wearing dependent operation of wearable device |
US20150288687A1 (en) * | 2014-04-07 | 2015-10-08 | InvenSense, Incorporated | Systems and methods for sensor based authentication in wearable devices |
CN106462778A (en) * | 2014-05-13 | 2017-02-22 | 惠普发展公司,有限责任合伙企业 | Wearable authentication |
USD771035S1 (en) * | 2014-08-11 | 2016-11-08 | Apple Inc. | Wearable device |
US10375081B2 (en) * | 2014-08-13 | 2019-08-06 | Intel Corporation | Techniques and system for extended authentication |
KR20160034065A (en) * | 2014-09-19 | 2016-03-29 | 엘지전자 주식회사 | Mobile terminal and method for controlling the same |
US10488936B2 (en) | 2014-09-30 | 2019-11-26 | Apple Inc. | Motion and gesture input from a wearable device |
US9953148B2 (en) * | 2014-12-23 | 2018-04-24 | Ebay Inc. | System and method for unlocking devices associated with a carrying bag |
KR101627545B1 (en) * | 2015-04-30 | 2016-06-07 | 연세대학교 산학협력단 | Apparatus and Method for instantaneous biometrics authentication in wearable device |
KR101657005B1 (en) * | 2015-06-11 | 2016-09-12 | 전문석 | Method for electrocardiogram authentication |
US11903680B2 (en) | 2015-06-14 | 2024-02-20 | Facense Ltd. | Wearable-based health state verification for physical access authorization |
KR101646567B1 (en) * | 2015-06-18 | 2016-08-08 | 계명대학교 산학협력단 | User authentication method and system via the tattoo recognition in the bio-electrical signal measurement environment |
KR101646566B1 (en) * | 2015-06-18 | 2016-08-08 | 계명대학교 산학협력단 | User authentication method and system via the ecg signal acquisition in the bio-electrical signal measurement environment using wearable sensors |
US10289239B2 (en) | 2015-07-09 | 2019-05-14 | Microsoft Technology Licensing, Llc | Application programming interface for multi-touch input detection |
KR20170008996A (en) * | 2015-07-15 | 2017-01-25 | 엘지전자 주식회사 | Electronic device and method for controlling the same |
US9930034B2 (en) * | 2015-07-29 | 2018-03-27 | International Business Machines Corporation | Authenticating applications using a temporary password |
KR102398716B1 (en) * | 2015-08-12 | 2022-05-17 | 삼성전자주식회사 | Method for detecting biometric information and an electronic device thereof |
KR102523605B1 (en) | 2015-09-11 | 2023-04-19 | 삼성디스플레이 주식회사 | A wearable liquid crystal display device using the bio-signal and control method for that |
US9924265B2 (en) | 2015-09-15 | 2018-03-20 | Intel Corporation | System for voice capture via nasal vibration sensing |
US10348355B2 (en) | 2015-09-16 | 2019-07-09 | Intel Corporation | Techniques for gesture recognition using photoplethysmographic (PPMG) sensor and low-power wearable gesture recognition device using the same |
US9939899B2 (en) | 2015-09-25 | 2018-04-10 | Apple Inc. | Motion and gesture input from a wearable device |
US9824287B2 (en) | 2015-09-29 | 2017-11-21 | Huami Inc. | Method, apparatus and system for biometric identification |
US10467548B2 (en) | 2015-09-29 | 2019-11-05 | Huami Inc. | Method, apparatus and system for biometric identification |
US9787676B2 (en) | 2015-09-29 | 2017-10-10 | Anhui Huami Information Technology Co., Ltd. | Multi-modal biometric identification |
CN106571918A (en) * | 2015-10-12 | 2017-04-19 | 广州杰赛科技股份有限公司 | Communication link and information multiple verification and encryption method |
CN106572060A (en) * | 2015-10-12 | 2017-04-19 | 广州杰赛科技股份有限公司 | Communication authentication system based on biological characteristics |
US10137777B2 (en) | 2015-11-03 | 2018-11-27 | GM Global Technology Operations LLC | Systems and methods for vehicle system control based on physiological traits |
KR102570068B1 (en) * | 2015-11-20 | 2023-08-23 | 삼성전자주식회사 | Gesture recognition method, gesture recognition apparatus, wearable device |
US10324494B2 (en) | 2015-11-25 | 2019-06-18 | Intel Corporation | Apparatus for detecting electromagnetic field change in response to gesture |
KR102437106B1 (en) | 2015-12-01 | 2022-08-26 | 삼성전자주식회사 | Device and method for using friction sound |
US20170185759A1 (en) * | 2015-12-23 | 2017-06-29 | Michael L. Schmidt | Emg-based liveness detection |
US20170225690A1 (en) * | 2016-02-09 | 2017-08-10 | General Motors Llc | Wearable device controlled vehicle systems |
WO2017144768A1 (en) * | 2016-02-26 | 2017-08-31 | Nokia Technologies Oy | Behavioural biometric authentication |
USD781853S1 (en) * | 2016-03-07 | 2017-03-21 | Apple Inc. | Wearable device |
USD777163S1 (en) * | 2016-03-07 | 2017-01-24 | Apple Inc. | Wearable device |
US20170270462A1 (en) * | 2016-03-16 | 2017-09-21 | Triax Technologies, Inc. | System and interfaces for managing workplace events |
US11810032B2 (en) | 2016-03-16 | 2023-11-07 | Triax Technologies, Inc. | Systems and methods for low-energy wireless applications using networked wearable sensors |
US10769562B2 (en) | 2016-03-16 | 2020-09-08 | Triax Technologies, Inc. | Sensor based system and method for authorizing operation of worksite equipment using a locally stored access control list |
US11170616B2 (en) | 2016-03-16 | 2021-11-09 | Triax Technologies, Inc. | System and interfaces for managing workplace events |
US10206620B2 (en) | 2016-03-23 | 2019-02-19 | Intel Corporation | User's physiological context measurement method and apparatus |
CN107295028B (en) * | 2016-03-30 | 2020-10-09 | 深圳富泰宏精密工业有限公司 | Interactive communication system, method and wearable device thereof |
US20170310673A1 (en) * | 2016-04-20 | 2017-10-26 | Huami Inc. | Security system with gesture-based access control |
US10332111B2 (en) * | 2016-05-19 | 2019-06-25 | Visa International Service Association | Authentication with smartwatch |
US10298282B2 (en) | 2016-06-16 | 2019-05-21 | Intel Corporation | Multi-modal sensing wearable device for physiological context measurement |
WO2018000396A1 (en) * | 2016-06-30 | 2018-01-04 | 华为技术有限公司 | Authentication method and communication terminal |
KR20180009979A (en) | 2016-07-20 | 2018-01-30 | 삼성전자주식회사 | Method for secure synchronization and pairing of devices and device supporting the same |
GB2552721A (en) * | 2016-08-03 | 2018-02-07 | Cirrus Logic Int Semiconductor Ltd | Methods and apparatus for authentication in an electronic device |
KR20180017690A (en) | 2016-08-10 | 2018-02-21 | 삼성전자주식회사 | Apparatus and method for detecting information of living body and wearable device including the apparatus |
CN106236051A (en) * | 2016-08-19 | 2016-12-21 | 深圳市前海领创智能科技有限公司 | A kind of intelligence based on PPG Yu ECG is without Tail cuff blood pressure health monitoring wrist-watch |
US10241583B2 (en) | 2016-08-30 | 2019-03-26 | Intel Corporation | User command determination based on a vibration pattern |
US10478099B2 (en) | 2016-09-22 | 2019-11-19 | Apple Inc. | Systems and methods for determining axial orientation and location of a user's wrist |
KR20180050127A (en) * | 2016-11-04 | 2018-05-14 | (주)아이티 노매즈 | System and method for monitoring momentum of wearable device using M2M communication |
WO2018093183A1 (en) * | 2016-11-16 | 2018-05-24 | 삼성전자 주식회사 | Electronic device and control method thereof |
KR102410998B1 (en) * | 2016-11-16 | 2022-06-21 | 삼성전자주식회사 | Electronic apparatus and control method thereof |
KR20180055661A (en) | 2016-11-16 | 2018-05-25 | 삼성전자주식회사 | Electronic apparatus and control method thereof |
US11496463B2 (en) * | 2016-11-22 | 2022-11-08 | Sony Corporation | Information processing terminal, information processing device, information processing method, and information processing system |
GB2561537B (en) | 2017-02-27 | 2022-10-12 | Emteq Ltd | Optical expression detection |
US10684693B2 (en) | 2017-03-02 | 2020-06-16 | Samsung Electronics Co., Ltd. | Method for recognizing a gesture and an electronic device thereof |
USD837206S1 (en) * | 2017-04-24 | 2019-01-01 | Huawei Technologies Co., Ltd. | Smart watch |
CN107424637A (en) * | 2017-05-24 | 2017-12-01 | 王金锁 | A kind of fingerprint ring music player |
USD838716S1 (en) * | 2017-08-23 | 2019-01-22 | Lite-On Technology Corporation | Smart watch |
GB2566101A (en) * | 2017-09-05 | 2019-03-06 | B Secur Ltd | Wearable authentication device |
FI20175862A1 (en) | 2017-09-28 | 2019-03-29 | Kipuwex Oy | System for determining sound source |
US10225737B1 (en) * | 2017-10-31 | 2019-03-05 | Konica Minolta Laboratory U.S.A., Inc. | Method and system for authenticating a user using a mobile device having plural sensors |
CA2992333C (en) * | 2018-01-19 | 2020-06-02 | Nymi Inc. | User access authorization system and method, and physiological user sensor and authentication device therefor |
KR102488001B1 (en) * | 2018-01-22 | 2023-01-13 | 삼성전자주식회사 | An electronic device and method for authenricating a user by using an audio signal |
KR102608633B1 (en) * | 2018-02-08 | 2023-12-04 | 삼성전자주식회사 | Electronic device and control method thereof |
CN110529987B (en) * | 2018-05-24 | 2023-05-23 | 开利公司 | Biological characteristic air conditioner control system |
CN110531627A (en) * | 2018-05-25 | 2019-12-03 | 九阳股份有限公司 | A kind of control method and device of household electrical appliances permission |
SG10201909659QA (en) * | 2018-10-17 | 2020-05-28 | Tata Consultancy Services Ltd | System and method for authenticating humans based on behavioral pattern |
EP3651057B1 (en) * | 2018-11-09 | 2023-06-14 | Tissot S.A. | Procedure for facial authentication of a wearer of a watch |
CN110033772B (en) * | 2019-04-28 | 2021-04-20 | 中国科学院上海高等研究院 | Non-acoustic voice information detection device based on PPG signal |
KR102711155B1 (en) * | 2019-05-03 | 2024-09-30 | 삼성전자주식회사 | Electronic device for establishing a communiation with external electronic device and controlling method thereof |
CA3042361A1 (en) * | 2019-05-06 | 2020-11-06 | Nymi Inc. | Live user authentication device, system and method and fraud or collusion prevention using same |
US11451536B2 (en) | 2019-10-25 | 2022-09-20 | Nymi Inc. | User state monitoring system and method using motion, and a user access authorization system and method employing same |
CN111371951B (en) * | 2020-03-03 | 2021-04-23 | 北京航空航天大学 | Smart phone user authentication method and system based on electromyographic signals and twin neural network |
US12032666B2 (en) | 2020-03-23 | 2024-07-09 | Capital One Services, Llc | Wearable devices and related systems for authenticating a user with surface electromyogram (sEMG)-signals |
US11275479B2 (en) * | 2020-04-24 | 2022-03-15 | Electronics And Telecommunications Research Institute | Frequency-based ratiometric feature extraction device for user authentication |
US11605255B2 (en) | 2020-05-14 | 2023-03-14 | Nymi Inc. | User activity-related monitoring system and method, and a user access authorization system and method employing same |
US11886559B2 (en) * | 2020-08-31 | 2024-01-30 | Harlock Creative Llc | Biometric identification and control systems and methods for providing customizable security through authentication of biosignal representations of one or more user-specific and user-selected gesture-intentions |
US20230010577A1 (en) * | 2021-07-06 | 2023-01-12 | Capital One Services, Llc | Computer-Based System for Locking User Account Access |
US11877218B1 (en) | 2021-07-13 | 2024-01-16 | T-Mobile Usa, Inc. | Multi-factor authentication using biometric and subscriber data systems and methods |
EP4369153A1 (en) | 2021-12-09 | 2024-05-15 | Samsung Electronics Co., Ltd. | Gesture recognition method using wearable device, and device therefor |
CN114795147A (en) * | 2022-04-27 | 2022-07-29 | 四川更喜科技有限公司 | Cluster type vital sign monitoring system and monitoring method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR0120590Y1 (en) * | 1995-07-29 | 1998-08-01 | 김광호 | Pager |
US6720860B1 (en) * | 2000-06-30 | 2004-04-13 | International Business Machines Corporation | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
US20060215883A1 (en) * | 2005-03-25 | 2006-09-28 | Samsung Electronics Co., Ltd. | Biometric identification apparatus and method using bio signals and artificial neural network |
US20100331649A1 (en) * | 2008-02-05 | 2010-12-30 | Chang-An Chou | Interactive analysis method for biosignals |
US20130159705A1 (en) * | 2006-06-26 | 2013-06-20 | Mlr, Llc | Security system for handheld wireless devices using time-variable encryption keys |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7430025B2 (en) | 2000-08-23 | 2008-09-30 | Semiconductor Energy Laboratory Co., Ltd. | Portable electronic device |
DE10100617A1 (en) * | 2001-01-09 | 2002-07-18 | Siemens Ag | Controllable arrangement with user authentication |
AU2003275134A1 (en) * | 2002-09-19 | 2004-04-08 | The Penn State Research Foundation | Prosody based audio/visual co-analysis for co-verbal gesture recognition |
JP4633347B2 (en) * | 2003-08-27 | 2011-02-16 | ソニー株式会社 | Electronics |
US7577974B2 (en) * | 2004-05-28 | 2009-08-18 | Microsoft Corporation | Movies channel |
US7492943B2 (en) * | 2004-10-29 | 2009-02-17 | George Mason Intellectual Properties, Inc. | Open set recognition using transduction |
KR100713490B1 (en) | 2005-08-29 | 2007-04-30 | 삼성전자주식회사 | Input device of portable communication terminal using biomagnetic measurement |
KR100848604B1 (en) | 2006-05-29 | 2008-07-28 | 건양대학교산학협력단 | Portable device for measuring blood flow |
US7874011B2 (en) * | 2006-12-01 | 2011-01-18 | International Business Machines Corporation | Authenticating user identity when resetting passwords |
US7971156B2 (en) * | 2007-01-12 | 2011-06-28 | International Business Machines Corporation | Controlling resource access based on user gesturing in a 3D captured image stream of the user |
JP2008198028A (en) * | 2007-02-14 | 2008-08-28 | Sony Corp | Wearable device, authentication method and program |
KR100897526B1 (en) | 2007-09-19 | 2009-05-15 | 한국전자통신연구원 | Apparatus for inputting data using finger movement |
KR20090061179A (en) | 2007-12-11 | 2009-06-16 | 한국전자통신연구원 | Data input apparatus and data processing method using by it |
KR100981137B1 (en) | 2008-03-17 | 2010-09-10 | 한국전기연구원 | Wristwatch-type health monitoring system |
US9082117B2 (en) * | 2008-05-17 | 2015-07-14 | David H. Chin | Gesture based authentication for wireless payment by a mobile electronic device |
KR20100011562A (en) | 2008-07-25 | 2010-02-03 | 신성중 | Specific function security device in a mobile communication terminal |
KR20100076136A (en) | 2008-12-26 | 2010-07-06 | 주식회사 에스디엔 | Apparatus for recognizing biometric informations |
JP5287550B2 (en) * | 2009-07-01 | 2013-09-11 | 富士通株式会社 | Biometric authentication system, biometric authentication method, biometric authentication device, biometric information processing device, biometric authentication program, and biometric information processing program |
US9174123B2 (en) * | 2009-11-09 | 2015-11-03 | Invensense, Inc. | Handheld computer systems and techniques for character and command recognition related to human movements |
KR101192932B1 (en) | 2009-12-22 | 2012-10-18 | 삼성전자주식회사 | Method and apparatus for recognizing identification in portable terminal using touchscreen |
KR20110079161A (en) | 2009-12-31 | 2011-07-07 | 삼성전자주식회사 | Method and apparatus for verifying speaker in mobile terminal |
US9557814B2 (en) * | 2010-04-22 | 2017-01-31 | Sony Interactive Entertainment Inc. | Biometric interface for a handheld device |
EP2385450A1 (en) * | 2010-05-07 | 2011-11-09 | Research In Motion Limited | Portable electronic device and method of controlling same |
US9136980B2 (en) * | 2010-09-10 | 2015-09-15 | Qualcomm Incorporated | Method and apparatus for low complexity compression of signals |
KR20120122587A (en) | 2011-04-29 | 2012-11-07 | 이청종 | Apparatus and method of mobile terminal security using fingerprint and face recognition |
US9323912B2 (en) * | 2012-02-28 | 2016-04-26 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication |
US8922481B1 (en) * | 2012-03-16 | 2014-12-30 | Google Inc. | Content annotation |
US9170674B2 (en) * | 2012-04-09 | 2015-10-27 | Qualcomm Incorporated | Gesture-based device control using pressure-sensitive sensors |
-
2013
- 2013-09-09 KR KR1020130107833A patent/KR102136836B1/en active IP Right Grant
-
2014
- 2014-02-21 EP EP14842116.7A patent/EP3044715B1/en active Active
- 2014-02-21 WO PCT/KR2014/001414 patent/WO2015034149A1/en active Application Filing
- 2014-02-21 CN CN201480043822.6A patent/CN105556529B/en active Active
- 2014-03-06 US US14/199,481 patent/US9811648B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR0120590Y1 (en) * | 1995-07-29 | 1998-08-01 | 김광호 | Pager |
US6720860B1 (en) * | 2000-06-30 | 2004-04-13 | International Business Machines Corporation | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
US20060215883A1 (en) * | 2005-03-25 | 2006-09-28 | Samsung Electronics Co., Ltd. | Biometric identification apparatus and method using bio signals and artificial neural network |
US20130159705A1 (en) * | 2006-06-26 | 2013-06-20 | Mlr, Llc | Security system for handheld wireless devices using time-variable encryption keys |
US20100331649A1 (en) * | 2008-02-05 | 2010-12-30 | Chang-An Chou | Interactive analysis method for biosignals |
Non-Patent Citations (1)
Title |
---|
See also references of EP3044715A4 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12023139B1 (en) | 2008-07-03 | 2024-07-02 | Masimo Corporation | User-worn device for noninvasively measuring a physiological parameter of a user |
US12036009B1 (en) | 2008-07-03 | 2024-07-16 | Masimo Corporation | User-worn device for noninvasively measuring a physiological parameter of a user |
US11988995B2 (en) | 2015-03-08 | 2024-05-21 | Apple Inc. | Compressible seal for rotatable and translatable input mechanisms |
CN105068658A (en) * | 2015-08-19 | 2015-11-18 | 天津先驱领域科技有限公司 | Man-machine interaction device capable of performing virtual environment control |
CN105554043A (en) * | 2016-03-07 | 2016-05-04 | 炫彩互动网络科技有限公司 | Wearable equipment identity authentication method based on cross bit operation |
US12086331B2 (en) | 2016-07-15 | 2024-09-10 | Apple Inc. | Capacitive gap sensor ring for an input device |
US12105479B2 (en) | 2016-07-25 | 2024-10-01 | Apple Inc. | Force-detecting input structure |
US12066795B2 (en) | 2017-07-18 | 2024-08-20 | Apple Inc. | Tri-axis force sensor |
US12105480B2 (en) | 2018-06-25 | 2024-10-01 | Apple Inc. | Crown for an electronic watch |
US12114974B2 (en) | 2020-01-13 | 2024-10-15 | Masimo Corporation | Wearable device with physiological parameters monitoring |
US12092996B2 (en) | 2021-07-16 | 2024-09-17 | Apple Inc. | Laser-based rotation sensor for a crown of an electronic watch |
Also Published As
Publication number | Publication date |
---|---|
CN105556529B (en) | 2018-11-16 |
EP3044715B1 (en) | 2020-10-21 |
KR20150029105A (en) | 2015-03-18 |
CN105556529A (en) | 2016-05-04 |
KR102136836B1 (en) | 2020-08-13 |
US9811648B2 (en) | 2017-11-07 |
EP3044715A4 (en) | 2017-02-22 |
US20150074797A1 (en) | 2015-03-12 |
EP3044715A1 (en) | 2016-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015034149A1 (en) | Wearable device performing user authentication using bio-signals and authentication method of the same | |
US10325083B2 (en) | Wearable electronic devices | |
WO2018101639A1 (en) | Method for detecting wrong positioning of earphone, and electronic device and storage medium therefor | |
WO2016032124A1 (en) | Rotary device and electronic device having the same | |
WO2015126179A1 (en) | Curved body and wearable device therewith | |
WO2016108537A1 (en) | Electronic device comprising rotating body and control method therefor | |
WO2017039191A1 (en) | Cradle for wireless charging and electronic device applied to same | |
WO2016032206A2 (en) | Authentication method and apparatus using biometric information and context information | |
WO2018070718A1 (en) | Output device outputting audio signal and control method thereof | |
WO2015030301A1 (en) | Smartwatch and control method thereof | |
WO2015137673A1 (en) | Method for determining data source | |
WO2015126091A1 (en) | Controlling input/output devices | |
WO2018135693A1 (en) | In-ear headset device for measuring stress, and method for measuring stress using same | |
WO2017010819A1 (en) | Wearable device and method of operating the same | |
WO2016129936A1 (en) | Security message transmission apparatus and processing method therefor | |
WO2018080198A1 (en) | Electronic device and method for performing authentication | |
WO2017074064A1 (en) | Internal coil structure and method for operating the same in a wireless terminal | |
WO2019039716A1 (en) | Electronic device and stress measurement method thereof | |
JP6227379B2 (en) | Wearable device and authentication method | |
WO2016064041A1 (en) | User terminal using hash value to detect whether application program has been tampered and method for tamper detection using the user terminal | |
WO2016165667A1 (en) | Warning method utilizing motion-sensing control device for preventing loss of smart electronic device | |
WO2017099340A1 (en) | Electronic device, signal processing method thereof, biological signal measurement system, and non-transitory computer readable recording medium | |
WO2020209618A1 (en) | Electronic device and method for providing information for stress relief by same | |
WO2021080369A1 (en) | User verification device using electrocardiogram data and method thereof | |
EP3516843A1 (en) | Electronic device and method for operating the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201480043822.6 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14842116 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2014842116 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014842116 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |