Abstract:
A device may include a secure processor and a secure memory coupled to the secure processor. The secure memory may be inaccessible to other device systems. The secure processor may store some keys and/or entropy values in the secure memory and other keys and/or entropy values outside the secure memory. The keys and/or entropy values stored outside the secure memory may be encrypted using information stored inside the secure memory.
Abstract:
An electronic device may include a finger biometric sensor and a processor and a memory coupled thereto. The processor is capable of performing a first matching to determine a first matching score of sensed finger biometric data against finger biometric template data stored in the memory, and indicating a match and updating the finger biometric template data when the first matching score exceeds a first threshold. The processor is also capable of performing a second matching of the sensed finger biometric data against the stored finger biometric template data to determine a second matching score when the first matching score does not exceed the first threshold and updating the finger biometric template data stored in the memory when the second matching score is above a second threshold. The second matching is slower but more accurate than the first matching.
Abstract:
Techniques are disclosed relating to devices that support biometric authentication. In various embodiments, a device includes a biosensor configured to collect biometric data from a user. An authentication system of the device is configured to perform a user authentication based on the collected biometric data. After performance of the user authentication, the authentication system receives sensor data indicating that the user remains collocated with the device and receives a request to confirm an authentication of the user. Based on the user authentication and the received sensor data, the authentication system confirms that the user has been authenticated. In various embodiments, the authentication system is configured to receive additional sensor data indicating that the user is no longer collocated with the device and, in response to a subsequent authentication request, require the user to perform another biometric authentication using the biosensor.
Abstract:
Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.
Abstract:
Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.
Abstract:
A device may include a secure processor and a secure memory coupled to the secure processor. The secure memory may be inaccessible to other device systems. The secure processor may store some keys and/or entropy values in the secure memory and other keys and/or entropy values outside the secure memory. The keys and/or entropy values stored outside the secure memory may be encrypted using information stored inside the secure memory.