Abstract:
Technologies for authenticating a user to a computing device include determining a hair follicle pattern of a portion of the user's skin and comparing the determined hair follicle pattern to an authenticated hair follicle pattern to authenticate the user. The hair follicle pattern of the portion of the user's skin may, be generated by a camera of the computing device, and the authenticated hair follicle pattern may be stored in a secure storage of the computing device. Features of the computing device may be enabled based on the particular authenticated hair follicle pattern to which the determined hair follicle matches. Additionally, in some embodiments, one or more additional biometric authentications may be used, and the user may be authenticated based on the particular combination of the authenticated hair follicle pattern and the additional biometric authentication(s).