WO2022269964A1 - 情報処理装置、情報処理方法およびプログラム - Google Patents
情報処理装置、情報処理方法およびプログラム Download PDFInfo
- Publication number
- WO2022269964A1 WO2022269964A1 PCT/JP2022/002112 JP2022002112W WO2022269964A1 WO 2022269964 A1 WO2022269964 A1 WO 2022269964A1 JP 2022002112 W JP2022002112 W JP 2022002112W WO 2022269964 A1 WO2022269964 A1 WO 2022269964A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication method
- authentication
- information
- gait
- information processing
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 37
- 238000003672 processing method Methods 0.000 title claims description 11
- 238000000034 method Methods 0.000 claims abstract description 118
- 230000005021 gait Effects 0.000 claims abstract description 54
- 230000009471 action Effects 0.000 claims description 51
- 230000000694 effects Effects 0.000 claims description 33
- 238000004458 analytical method Methods 0.000 claims description 12
- 230000000284 resting effect Effects 0.000 claims description 2
- 230000006399 behavior Effects 0.000 description 53
- 230000006870 function Effects 0.000 description 20
- 238000004891 communication Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 10
- 238000013528 artificial neural network Methods 0.000 description 2
- 230000000875 corresponding effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000010079 rubber tapping Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001914 calming effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Definitions
- the present invention relates to an information processing device, an information processing method, and a program.
- Information processing devices equipped with personal authentication functions such as fingerprint authentication and face authentication are known. Although it is useful from the viewpoint of security protection, the user is required to perform an authentication operation for unlocking each time the device is turned on.
- Patent Document 1 proposes a method of automatically switching the authentication method according to the surrounding environment such as noise. However, even if the authentication method is changed, an authentication operation is still required, so the user's burden is not reduced. There is also a survey result that mobile devices such as smartphones are unlocked dozens of times on average per day, and convenience is an issue.
- the present disclosure proposes an information processing device, an information processing method, and a program capable of achieving both security and convenience.
- a behavior estimation library for estimating the behavior of a user, and based on the behavior estimation result, the authentication method for personal authentication is a gait authentication method, an authentication method other than the gait authentication method, and no lock. and an authentication method switching unit that switches between.
- an information processing method in which the information processing of the information processing device is executed by a computer, and a program for causing the computer to implement the information processing of the information processing device.
- FIG. 4 is a diagram illustrating an overview of an unlocking function of the present disclosure
- FIG. 1 illustrates an example architecture of an unlocking system
- FIG. It is a figure which shows the functional structure of an information terminal. It is a figure which shows an example of the setting screen which sets a rule. It is a figure which shows an example of the setting screen which sets a rule. It is a figure which shows an example of the setting screen which sets a rule.
- FIG. 10 is a diagram showing an example of security alert notification; FIG. 10 is a diagram showing an example of presentation of log information of an unauthorized use period; It is a figure which shows an example of the information processing method regarding unlocking. It is a figure which shows the hardware structural example of an information terminal.
- FIG. 1 is a diagram illustrating an overview of the unlocking function of the present disclosure.
- the unlocking system RS implements the unlocking function of the information terminal TM.
- a smart phone SP, a smart watch SW, and the like are shown as examples of the information terminal TM, but the information terminal TM is not limited to these.
- the unlocking function of the present disclosure may be applied to other information processing devices such as tablet terminals and personal computers.
- the unlocking system RS switches the authentication method for personal authentication according to the actions of the user. For example, when walking, a gait authentication method is adopted. During driving operation, no lock is adopted in which security lock is not performed. At rest and sleep, an authentication method (system registered authentication method) other than the gait authentication set by the operating system (OS) is adopted.
- the system registration authentication method is, for example, a knowledge authentication method using an ID and a password, but other authentication methods (fingerprint authentication method, face authentication method, etc.) may be used.
- FIG. 2 shows an example of the architecture of the unlocking system RS.
- the unlocking system RS performs gait authentication using the gait model GM generated by the cloud server SV.
- the gait model GM outputs the degree of matching between the walking style of the registered person (the person himself/herself) and the walking style detected from the walking data as an authentication score.
- the gait model GM is obtained by subjecting a neural network to machine learning of walking features.
- the information terminal TM supplies walking information of the user (himself) to the cloud server SV.
- the cloud server SV learns the user's walking style using the acquired walking information, and generates and updates the gait model GM.
- the information terminal TM is an information processing device that processes various types of information.
- the information terminal TM includes, as application components, a service SC, a broadcast receiver BR, a behavior estimation library BE, a gait authentication library GA and a behavior rule database RD.
- Service SCs run in the background.
- the service SC includes the sensor manager SM and geofencing GF.
- the sensor manager SM acquires sensor data from various sensors built into the information terminal TM.
- the information terminal TM includes, for example, built-in sensors such as a gyro sensor, a GPS (Global Positioning System) sensor, a proximity sensor, a ranging sensor, and an illuminance sensor.
- Geofencing GF creates a virtual perimeter around a pre-set location using, for example, a GPS satellite network or local radio frequency identifiers (such as Wi-Fi nodes or Bluetooth beacons) . Geofencing GF detects when the user moves from outside to inside the virtual boundary and from inside to outside the virtual boundary.
- the behavior estimation library BE estimates user behavior based on sensor data. For example, the behavior estimation library BE detects the user's movement, position, and ambient brightness based on sensor data from the gyro sensor, GPS sensor, and illuminance sensor. The behavior estimation library BE estimates behavior types such as a stationary state, a driving operation state, a walking state, and a sleeping state based on the motion information of the user. The behavior estimation library BE can improve the accuracy of behavior estimation by taking into consideration the user's location information, ambient brightness information, and the like. Known techniques disclosed in Japanese Patent No. 5028751 and Japanese Unexamined Patent Application Publication No. 2010-198595 can be used as techniques for recognizing user behavior.
- the gait authentication library GA acquires, as walking data, sensor data from the sensor data output from the gyro sensor during the period in which the walking state is estimated by the behavior estimation library BE.
- the gait authentication library GA transmits the gait data to the cloud server SV.
- the cloud server SV inputs walking data to a neural network to generate a gait model GM.
- the gait authentication library GA acquires the generated gait model GM from the cloud server SV.
- the gait authentication library GA inputs the gait data to the gait model GM to obtain an authentication score.
- the broadcast receiver BR receives various messages and information sent by the information terminal TM to applications.
- the broadcast receiver BR functions as an authentication scheme switching unit that switches authentication schemes based on received messages and information. For example, the broadcast receiver BR selects a gait authentication method or a system registration authentication method (an authentication method other than the gait authentication method) for personal authentication based on the result of behavior estimation (user behavior type) by the behavior estimation library BE. ), and no lock.
- the broadcast receiver BR can also determine the authentication method based on the user's location transition results detected by the geofencing GF.
- the authentication method is determined using the action rule database RD.
- the action rule database RD defines rules for combinations of action types and authentication methods. For example, the action rule database RD defines an authentication method to be adopted for each action type.
- the broadcast receiver BR determines the authentication method according to the rules defined in the action rule database RD.
- the information terminal TM includes a password reset PR as a component of the device policy manager.
- the password reset PR manages passwords used for knowledge authentication (system registration authentication method).
- the broadcast receiver BR authenticates the user using the password information called from the password reset PR when the lock release operation is performed while still or asleep.
- the information terminal TM performs various processes related to the unlock function. This processing includes rule setting regarding the combination of action type and authentication method, notification based on the authentication result, and the like. A specific description will be given below.
- FIG. 3 is a diagram showing the functional configuration of the information terminal TM.
- 4 to 6 are diagrams showing an example of the setting screen SE for setting rules.
- the information terminal TM has an alert part AL, a behavior analysis part BA, a registration part RG and an action log database LD.
- the action log database LD stores log information of user actions estimated by the action estimation library BE.
- the action log database LD stores the user's action history in association with the position and time at which the action was performed.
- the behavior analysis unit BA estimates the user's activity based on the user's behavior history.
- the behavior analysis unit BA presents the estimated activity as recommendation information RI (see FIG. 6).
- the recommendation information RI is displayed on the touch panel TP mounted on the information terminal TM.
- a user can assign a desired authentication scheme to an activity.
- the registration unit RG registers the authentication method assigned based on the recommendation information RI in the action rule database RD in association with the activity.
- ON/OFF of the unlocking system RS is switched by a toggle switch TS.
- Turning on the unlocking system RS activates the advanced settings tab under the toggle switch TS.
- a setting screen SE as shown in FIG. 5 is displayed.
- An activity add button AB is displayed below the default action type.
- a setting screen SE as shown in FIG. 6 is displayed.
- the user can use the setting screen SE of FIG. 6 to add any routine activity as a new action type.
- Input fields for "activity name”, "time”, "position” and “behavior” are displayed on the setting screen SE.
- a user can give specific activity names to routine behaviors performed within specific temporal and spatial ranges.
- the registration unit RG When the activity input is completed, the registration unit RG adds a new action type specified by "activity name" under the default action type. In the example of FIG. 6, an action type named “commuting” is added. The user can assign the desired authentication scheme to the new action type using the pull-down switch PD. In the example of FIG. 6, since the activity during commuting is traveling by car, "none" is assigned, which means that the security lock is not performed. The registration unit RG associates the assigned authentication method with the activity and registers it in the action rule database RD.
- a delete button DE is displayed to the left of the manually added action type.
- the user can use the delete button DE to delete action types other than the default action types (stationary, driving, walking and sleeping).
- a tab RC for displaying recommendation information RI is displayed. Tapping the tab RC displays a list of one or more routine activities detected by the behavior analysis unit BA. For each activity, the list displays information about "Date", “Time” and “Action”. "Date” indicates information such as the day of the week on which the activity is performed. Tapping a specific activity in the list will add the tapped activity as a new action type. The information about "date”, “time” and “action” displayed in the list is applied to the added action type.
- FIG. 7 is a diagram showing an example of security alert AI notification.
- the alert unit AL displays information (authentication information AU) on the authentication result on the lock screen RO at regular intervals while gait authentication is being performed.
- the alert unit AL notifies a security alert AI on the lock screen RO when the person is not authenticated by the gait authentication method.
- the authentication information AU is displayed on the lock screen RO every 10 minutes. Until 12 o'clock, personal authentication is successful. Therefore, the security lock is released, and the authentication information AU indicates that the owner of the information terminal TM is the user himself/herself. Personal authentication fails during the period from 12:00 to 12:10. The security lock is not released, and the authentication information AU indicates that the owner of the information terminal TM is not the user himself/herself. After 12:10, the personal authentication succeeds again. Therefore, the security lock is released, and the authentication information AU indicates that the owner of the information terminal TM is the user, but a security alert AI regarding unauthorized use is added to the authentication information AU.
- FIG. 8 is a diagram showing a presentation example of log information for an unauthorized use period.
- the alert part AL When the alert part AL detects an operation (tap, etc.) on the security alert AI, it presents log information for the period during which personal authentication was not performed after unlocking. For example, the log information includes time information and location information for a period during which personal authentication was not performed. The log information is displayed on the touch panel TP in the form of a map or the like. In the example of FIG. 8, the alert part AL reflects the log information on the map MP and presents it. The alert part AL displays the walking routes of the period in which the personal authentication is successful and the period in which the personal authentication is unsuccessful in a manner that can be distinguished by changing the type and thickness of the line or by color-coding.
- FIG. 9 is a diagram showing an example of an information processing method regarding unlocking.
- step ST1 When the user takes action with the information terminal TM (step ST1), the information terminal TM determines whether or not the lock release function of the present disclosure described above is ON (step ST2). In step ST2, when it is determined that the unlocking function of the present disclosure is ON (step ST2: Yes), the behavior estimation library BE determines that the currently detected behavior is specified in the setting screen SE. It is determined whether or not it corresponds to the action type (step ST3).
- step ST3 When it is determined in step ST3 that the current action corresponds to a specific action type (step ST3: Yes), the broadcast receiver BR determines whether the authentication method assigned to the corresponding action type is the "existing method”. It is determined whether or not (step ST4).
- step ST4 if the assigned authentication method is the "existing method" (step ST4: Yes), the broadcast receiver BR has successfully authenticated the user using the system registration authentication method set in the OS. It is determined whether or not (step ST5, step ST6). If the personal authentication is successful (step ST6: Yes), the locked state is switched to the unlocked state, or the unlocked state is maintained (step ST7). If the personal authentication fails (step ST6: No), the unlocked state is switched to the locked state, or the locked state is maintained (step ST8).
- step ST4 if the assigned authentication method is not the "existing method" (step ST4: No), the broadcast receiver BR determines whether the authentication method assigned to the action type is "gait authentication”. (step ST9).
- step ST9 if the assigned authentication method is "gait authentication" (step ST9: Yes), the broadcast receiver BR determines whether or not the person has been successfully authenticated using the gait authentication method. (step ST10, step ST6).
- the flow after step ST6 is the same as that described above (steps ST7 and ST8).
- step ST9 if the assigned authentication method is not "gait authentication” (step ST9: No), the broadcast receiver BR determines whether the authentication method assigned to the action type is "none". is determined (step ST11). In step ST11, if the assigned authentication method is "none" (step ST11: Yes), the broadcast receiver BR switches from the locked state to the unlocked state or maintains the unlocked state (step ST7 ).
- step ST11 if the assigned authentication method is not "none" (step ST11: No), the currently detected action is not the default action type, but the action type added on the setting screen SE. .
- the broadcast receiver BR extracts the authentication method corresponding to the added action type from the action rule database RD.
- the broadcast receiver BR determines whether or not the authentication has succeeded with the extracted authentication method (step ST6).
- the flow after step ST6 is the same as that described above (steps ST7 and ST8).
- step ST3 If it is determined in step ST3 that the current behavior does not correspond to a specific behavior type (step ST3: No), and if it is determined in step ST2 that the unlocking function of the present disclosure is OFF (step If ST2: No), the broadcast receiver BR adopts the system registration authentication method (step ST5).
- step ST5 The flow after step ST5 is the same as that described above (steps ST6 to ST8).
- FIG. 10 is a diagram showing a hardware configuration example of the information terminal TM.
- the information terminal TM includes a CPU (Central Processing Unit) 132, a ROM (Read Only Memory) 134, a RAM (Random Access Memory) 136, a bridge 138, a bus 140, an interface 142, and an input device 144. , an output device 146 , a storage device 148 , a drive 150 , a connection port 152 and a communication device 154 .
- a CPU Central Processing Unit
- ROM Read Only Memory
- RAM Random Access Memory
- the CPU 132 functions as an arithmetic processing device and a control device, and cooperates with various programs to realize the operation of each functional unit within the information terminal TM.
- CPU 132 may be a microprocessor.
- the ROM 134 stores programs used by the CPU 132, calculation parameters, and the like.
- the RAM 136 temporarily stores programs used in the execution of the CPU 132, parameters that change as appropriate during execution, and the like.
- the CPU 132, ROM 134 and RAM 136 are interconnected by an internal bus such as a CPU bus.
- the input device 144 is based on input means for the user to input information, such as a mouse, keyboard, touch panel, button, microphone, switch, and lever, information obtained from a sensor provided in the information terminal TM, and input by the user. It is composed of an input control circuit that generates an input signal and outputs it to the CPU 132 . By operating the input device 144, the user of the information terminal TM can input various data to the information terminal TM and instruct processing operations.
- the output device 146 performs output to a device such as a liquid crystal display (LCD) device, an OLED (Organic Light Emitting Diode) device, a lamp, etc., as an example of the display section of the information terminal TM. Further, the output device 146 may provide audio output such as speakers and headphones.
- a device such as a liquid crystal display (LCD) device, an OLED (Organic Light Emitting Diode) device, a lamp, etc.
- the output device 146 may provide audio output such as speakers and headphones.
- the storage device 148 is a device for storing data.
- the storage device 148 may include a storage medium, a recording device that records data on the storage medium, a reading device that reads data from the storage medium, a deletion device that deletes data recorded on the storage medium, and the like.
- the storage device 148 stores programs executed by the CPU 132 and various data. The program is stored, for example, in a non-transitory computer-readable storage medium.
- the drive 150 is a reader/writer for storage media, and is built in or externally attached to the information terminal TM.
- the drive 150 reads information recorded on a removable storage medium such as a magnetic disk, an optical disk, a magneto-optical disk, or a semiconductor memory, and outputs the information to the RAM 136 .
- Drive 150 can also write information to removable storage media.
- connection port 152 is, for example, a bus for connecting with external peripherals of the information terminal TM.
- the connection port 152 may be a USB (Universal Serial Bus).
- the communication device 154 is, for example, a communication interface configured with a communication device for connecting to a network. Whether the communication device 154 is an infrared communication compatible device, a wireless LAN (Local Area Network) compatible communication device, or an LTE (Long Term Evolution) compatible communication device, wire communication that performs wired communication. It may be a device.
- a wireless LAN Local Area Network
- LTE Long Term Evolution
- the information terminal TM has a behavior estimation library BE and a broadcast receiver BR.
- the behavior estimation library BE estimates user behavior.
- the broadcast receiver BR switches the authentication method for personal authentication among the gait authentication method, an authentication method other than the gait authentication method, and no lock, based on the behavior estimation result.
- the processing of the information terminal TM is executed by a computer.
- the program of the present disclosure causes the computer to implement the processing of the information terminal TM.
- the gait authentication method is highly convenient because it does not require a special authentication operation. Under certain conditions where safety is ensured, such as when driving, it may be beneficial to eliminate the security lock and prioritize convenience. By combining gait authentication and no lock, the number of required authentication operations is reduced, and both security and convenience are achieved.
- the information terminal TM has a behavior analysis unit BA and a registration unit RG.
- the behavior analysis unit BA estimates the user's activity based on the user's behavior history.
- the behavior analysis unit BA presents the estimated activity as recommendation information RI.
- the registration unit RG registers the authentication method assigned based on the recommendation information RI in the action rule database RD in association with the activity.
- the broadcast receiver BR adopts a gait authentication method when walking, an authentication method other than the gait authentication method when stationary and sleeping, and no lock when driving.
- the information terminal TM has an alert unit AL.
- the alert unit AL notifies a security alert AI on the lock screen RO when the person is not authenticated by the gait authentication method.
- the alert part AL When the alert part AL detects an operation on the security alert AI, it presents the log information for the period during which the person was not authenticated after unlocking.
- the log information includes time information and location information for the period during which personal authentication was not performed.
- the alert part AL reflects the log information on the map MP and presents it.
- the authentication method for personal authentication is switched based on the behavior of the user.
- behavior-based feature switching techniques can be applied to other areas as well. For example, it is possible to switch music playlists or switch available (restricted) apps/functions according to the user's behavior. For example, in the former example, it is conceivable to select jazz when standing still, driving songs when driving, low-tempo/up-tempo songs when walking/running, and calming songs when sleeping. In the latter example, there are no function restrictions when stationary, all functions that require touch operations are disabled when driving, SNS and browsers are disabled when walking, and YouTube (registered trademark) and browsers are disabled when sleeping. can be considered.
- the present technology can also take the following configuration.
- Information processing device having (2) a behavior analysis unit that estimates the user's activity based on the user's behavior history and presents the estimated activity as recommendation information; a registration unit that associates the authentication method assigned based on the recommendation information with the activity and registers the authentication method in an action rule database;
- the information processing apparatus according to (1) above.
- (3) The authentication method switching unit adopts the gait authentication method when walking, adopts an authentication method other than the gait authentication method when resting and sleeping, and adopts no lock when driving.
- the information processing apparatus according to (1) or (2) above.
- (4) Having an alert unit that notifies a security alert on the lock screen when the person is not authenticated by the gait authentication method, The information processing apparatus according to (3) above.
- the alert unit presents log information for a period during which personal authentication was not performed after unlocking when an operation on the security alert is detected.
- the information processing apparatus according to (4) above.
- the log information includes time information and location information during the period when the person was not authenticated, The information processing apparatus according to (5) above.
- the alert unit reflects and presents the log information on a map; The information processing apparatus according to (6) above.
- a computer-implemented information processing method comprising: (9) infer user behavior, Switching an authentication method for personal authentication between a gait authentication method, an authentication method other than the gait authentication method, and no lock based on the behavior estimation result; A program that makes a computer do something.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Telephone Function (AREA)
Abstract
Description
[1.ロック解除機能の概要]
[2.ロック解除システムのアーキテクチャ]
[3.各種登録・設定機能の説明]
[3-1.行動解析に基づくアクティビティの追加]
[3-2.セキュリティアラートの通知]
[4.情報処理方法]
[5.情報端末のハードウェア構成例]
[6.効果]
[7.その他]
図1は、本開示のロック解除機能の概要を説明する図である。
図2は、ロック解除システムRSのアーキテクチャの一例を示す図である。
情報端末TMは、ロック解除機能に関連した様々な処理を行う。この処理には、行動タイプと認証方式との組み合わせに関するルール設定や、認証結果に基づく通知などが含まれる。以下、具体的に説明する。
図3は、情報端末TMの機能構成を示す図である。図4ないし図6は、ルール設定を行う設定画面SEの一例を示す図である。
図7は、セキュリティアラートAIの通知例を示す図である。
図9は、ロック解除に関する情報処理方法の一例を示す図である。
図10は、情報端末TMのハードウェア構成例を示す図である。
情報端末TMは、行動推定ライブラリBEとブロードキャストレシーバBRとを有する。行動推定ライブラリBEは、ユーザの行動を推定する。ブロードキャストレシーバBRは、行動の推定結果に基づいて、本人認証の認証方式を歩容認証方式、歩容認証方式以外の認証方式、および、ロックなしの間で切り替える。本開示の情報処理方法は、情報端末TMの処理がコンピュータにより実行される。本開示のプログラムは、情報端末TMの処理をコンピュータに実現させる。
上記実施形態では、ユーザの行動に基づいて本人認証の認証方式が切り替えられた。しかし、行動に基づく機能の切り替え手法は、他の分野にも適用できる。例えば、ユーザの行動に応じて、音楽プレイリストを切り替えたり、利用できる(機能制限される)アプリ・機能を切り替えたりすることもできる。例えば、前者の例では、静止時にジャズ、運転操作時にドライブソング、歩行/走行時にローテンポ/アップテンポの曲、睡眠時に落ち着く曲を選択することが考えられる。後者の例では、静止時に機能制限なし、運転操作時に、タッチ操作が必要な機能全般の無効化、歩行時にSNSやブラウザの無効化、睡眠時にYoutube(登録商標)やブラウザの無効化を行うことが考えられる。
なお、本技術は以下のような構成も取ることができる。
(1)
ユーザの行動を推定する行動推定ライブラリと、
前記行動の推定結果に基づいて、本人認証の認証方式を歩容認証方式、歩容認証方式以外の認証方式、および、ロックなしの間で切り替える認証方式切り替え部と、
を有する情報処理装置。
(2)
前記ユーザの行動履歴に基づいて前記ユーザのアクティビティを推定し、推定された前記アクティビティをレコメンド情報として提示する行動解析部と、
前記レコメンド情報に基づいて割り当てられた前記認証方式を前記アクティビティと関連付けて行動ルールデータベースに登録する登録部と、
上記(1)に記載の情報処理装置。
(3)
前記認証方式切り替え部は、歩行時に前記歩容認証方式を採用し、静止時および睡眠時に前記歩容認証方式以外の認証方式を採用し、運転操作時にロックなしを採用する、
上記(1)または(2)に記載の情報処理装置。
(4)
前記歩容認証方式により本人認証がされなかった場合に、ロック画面にセキュリティアラートを通知するアラート部を有する、
上記(3)に記載の情報処理装置。
(5)
前記アラート部は、前記セキュリティアラートに対する操作が検出された場合、ロック解除後に、本人認証がされなかった期間のログ情報を提示する、
上記(4)に記載の情報処理装置。
(6)
前記ログ情報は、本人認証がされなかった期間の時刻情報および位置情報を含む、
上記(5)に記載の情報処理装置。
(7)
前記アラート部は、前記ログ情報をマップに反映して提示する、
上記(6)に記載の情報処理装置。
(8)
ユーザの行動を推定し、
前記行動の推定結果に基づいて、本人認証の認証方式を歩容認証方式、歩容認証方式以外の認証方式、および、ロックなしの間で切り替える、
ことを有する、コンピュータにより実行される情報処理方法。
(9)
ユーザの行動を推定し、
前記行動の推定結果に基づいて、本人認証の認証方式を歩容認証方式、歩容認証方式以外の認証方式、および、ロックなしの間で切り替える、
ことをコンピュータに実現させるプログラム。
AI セキュリティアラート
BA 行動解析部
BE 行動推定ライブラリ
BR ブロードキャストレシーバ(認証方式切り替え部)
MP マップ
RD 行動ルールデータベース
RG 登録部
RI レコメンド情報
TM 情報端末(情報処理装置)
Claims (9)
- ユーザの行動を推定する行動推定ライブラリと、
前記行動の推定結果に基づいて、本人認証の認証方式を歩容認証方式、歩容認証方式以外の認証方式、および、ロックなしの間で切り替える認証方式切り替え部と、
を有する情報処理装置。 - 前記ユーザの行動履歴に基づいて前記ユーザのアクティビティを推定し、推定された前記アクティビティをレコメンド情報として提示する行動解析部と、
前記レコメンド情報に基づいて割り当てられた前記認証方式を前記アクティビティと関連付けて行動ルールデータベースに登録する登録部と、
を有する請求項1に記載の情報処理装置。 - 前記認証方式切り替え部は、歩行時に前記歩容認証方式を採用し、静止時および睡眠時に前記歩容認証方式以外の認証方式を採用し、運転操作時にロックなしを採用する、
請求項1に記載の情報処理装置。 - 前記歩容認証方式により本人認証がされなかった場合に、ロック画面にセキュリティアラートを通知するアラート部を有する、
請求項3に記載の情報処理装置。 - 前記アラート部は、前記セキュリティアラートに対する操作が検出された場合、ロック解除後に、本人認証がされなかった期間のログ情報を提示する、
請求項4に記載の情報処理装置。 - 前記ログ情報は、本人認証がされなかった期間の時刻情報および位置情報を含む、
請求項5に記載の情報処理装置。 - 前記アラート部は、前記ログ情報をマップに反映して提示する、
請求項6に記載の情報処理装置。 - ユーザの行動を推定し、
前記行動の推定結果に基づいて、本人認証の認証方式を歩容認証方式、歩容認証方式以外の認証方式、および、ロックなしの間で切り替える、
ことを有する、コンピュータにより実行される情報処理方法。 - ユーザの行動を推定し、
前記行動の推定結果に基づいて、本人認証の認証方式を歩容認証方式、歩容認証方式以外の認証方式、および、ロックなしの間で切り替える、
ことをコンピュータに実現させるプログラム。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202280043205.0A CN117501262A (zh) | 2021-06-25 | 2022-01-21 | 信息处理装置、信息处理方法和程序 |
EP22827888.3A EP4361854A1 (en) | 2021-06-25 | 2022-01-21 | Information processing device, information processing method, and program |
JP2023529461A JPWO2022269964A1 (ja) | 2021-06-25 | 2022-01-21 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2021-105795 | 2021-06-25 | ||
JP2021105795 | 2021-06-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022269964A1 true WO2022269964A1 (ja) | 2022-12-29 |
Family
ID=84543958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2022/002112 WO2022269964A1 (ja) | 2021-06-25 | 2022-01-21 | 情報処理装置、情報処理方法およびプログラム |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4361854A1 (ja) |
JP (1) | JPWO2022269964A1 (ja) |
CN (1) | CN117501262A (ja) |
WO (1) | WO2022269964A1 (ja) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010198595A (ja) | 2009-01-28 | 2010-09-09 | Sony Corp | 情報処理装置、情報処理方法、プログラム |
JP5028751B2 (ja) | 2005-06-09 | 2012-09-19 | ソニー株式会社 | 行動認識装置 |
JP2015090589A (ja) | 2013-11-06 | 2015-05-11 | ソニー株式会社 | 認証制御システム、認証制御方法およびプログラム |
JP2016523403A (ja) * | 2013-06-04 | 2016-08-08 | ソニー株式会社 | 状況に基づくユーザインターフェイス(ui)の構成 |
JP2016163161A (ja) * | 2015-02-27 | 2016-09-05 | 富士通株式会社 | 移動体端末、歩行判定方法および歩行判定プログラム |
JP2019175090A (ja) * | 2018-03-28 | 2019-10-10 | 京セラ株式会社 | 電子機器、制御装置、制御プログラム及び電子機器の動作方法 |
JP2021510978A (ja) * | 2018-01-12 | 2021-04-30 | ノック ノック ラブズ, インコーポレイテッド | 検証可能なクレームをバインドするシステム及び方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9589118B2 (en) * | 2014-08-20 | 2017-03-07 | Google Technology Holdings LLC | Context-based authentication mode selection |
-
2022
- 2022-01-21 JP JP2023529461A patent/JPWO2022269964A1/ja active Pending
- 2022-01-21 WO PCT/JP2022/002112 patent/WO2022269964A1/ja active Application Filing
- 2022-01-21 EP EP22827888.3A patent/EP4361854A1/en active Pending
- 2022-01-21 CN CN202280043205.0A patent/CN117501262A/zh active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5028751B2 (ja) | 2005-06-09 | 2012-09-19 | ソニー株式会社 | 行動認識装置 |
JP2010198595A (ja) | 2009-01-28 | 2010-09-09 | Sony Corp | 情報処理装置、情報処理方法、プログラム |
JP2016523403A (ja) * | 2013-06-04 | 2016-08-08 | ソニー株式会社 | 状況に基づくユーザインターフェイス(ui)の構成 |
JP2015090589A (ja) | 2013-11-06 | 2015-05-11 | ソニー株式会社 | 認証制御システム、認証制御方法およびプログラム |
JP2016163161A (ja) * | 2015-02-27 | 2016-09-05 | 富士通株式会社 | 移動体端末、歩行判定方法および歩行判定プログラム |
JP2021510978A (ja) * | 2018-01-12 | 2021-04-30 | ノック ノック ラブズ, インコーポレイテッド | 検証可能なクレームをバインドするシステム及び方法 |
JP2019175090A (ja) * | 2018-03-28 | 2019-10-10 | 京セラ株式会社 | 電子機器、制御装置、制御プログラム及び電子機器の動作方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4361854A4 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2022269964A1 (ja) | 2022-12-29 |
EP4361854A4 (en) | 2024-05-01 |
CN117501262A (zh) | 2024-02-02 |
EP4361854A1 (en) | 2024-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11093659B2 (en) | Controlling content visibility on a computing device based on wearable device proximity | |
US20220021734A1 (en) | Systems and methods for synchronizing content and information on multiple computing devices | |
JP6320601B1 (ja) | アクセサリに対応するコンテンツを提供するための方法及びその電子装置 | |
US10296758B2 (en) | Wearable device multi-mode system | |
JP6284576B2 (ja) | 顔認識に基づくコンピューティング・デバイスへのログイン | |
EP2854071B1 (en) | Method, device and apparatus for unlocking a terminal | |
US9706406B1 (en) | Security measures for an electronic device | |
KR102354586B1 (ko) | 전자 장치 상태에 따른 제어 방법 및 그 장치 | |
US9285863B2 (en) | Statistical approach to power management for electronic devices | |
US8325995B1 (en) | Proximity wakeup | |
US20130324081A1 (en) | User proximity control of devices | |
US20180157817A1 (en) | Unlocking method and apparatus, and storage medium | |
US8836530B1 (en) | Proximity wakeup | |
WO2019101096A1 (zh) | 安全验证的方法、装置及移动终端 | |
KR20210125468A (ko) | 조건부 액션에 대한 정보를 공유하기 위한 방법 및 그 전자 장치 | |
US11455411B2 (en) | Controlling content visibility on a computing device based on computing device location | |
KR20180046149A (ko) | 인증을 수행하기 위한 전자 장치 및 방법 | |
WO2022269964A1 (ja) | 情報処理装置、情報処理方法およびプログラム | |
US11334316B2 (en) | Information processing apparatus and information processing method | |
EP4336394A1 (en) | Reporting user device sensor data | |
CN113892114A (zh) | 电子设备的识别系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22827888 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023529461 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18570656 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202280043205.0 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022827888 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022827888 Country of ref document: EP Effective date: 20240125 |