Abstract:
One feature pertains to biometric authentication of a user between devices. In one aspect, an ad hoc personal wireless network may include a primary device and one or more secondary devices using grouping policies such proximity policies and other permissions. The primary device shares a biometric authentication value of a user with the one or more secondary devices. Each secondary device may then perform additional authentication of the same user using a relatively low reliability biometric sensor such as a digital camera for facial recognition, a microphone for voice recognition or an accelerometer for gesture recognition. The secondary authentication results may be combined with the biometric authentication score/level from the primary device to form a final authentication score/level of the secondary device, which is used to authenticate the user of the secondary device for one or more transactions such as consumer purchases, secure content access, or secure control.
Abstract:
One feature pertains to biometric authentication of a user between devices. In one aspect, an ad hoc personal wireless network may include a primary device and one or more secondary devices using grouping policies such proximity policies and other permissions. The primary device shares a biometric authentication value of a user with the one or more secondary devices. Each secondary device may then perform additional authentication of the same user using a relatively low reliability biometric sensor such as a digital camera for facial recognition, a microphone for voice recognition or an accelerometer for gesture recognition. The secondary authentication results may be combined with the biometric authentication score/level from the primary device to form a final authentication score/level of the secondary device, which is used to authenticate the user of the secondary device for one or more transactions such as consumer purchases, secure content access, or secure control.
Abstract:
Embodiments of an ultrasonic button and methods for using the ultrasonic button are disclosed. In one embodiment, an ultrasonic button may include an ultrasonic transmitter configured to transmit an ultrasonic wave, a piezoelectric receiver layer configured to receive a reflected wave of the ultrasonic wave, a platen layer configured to protect the ultrasonic transmitter and the piezoelectric receiver layer, a first matching layer configured to match an acoustic impedance of the platen layer with an acoustic impedance of ridges of a finger, and an ultrasonic sensor array configured to detect the finger using the reflected wave.
Abstract:
Embodiments of an ultrasonic button and methods for using the ultrasonic button are disclosed. In one embodiment, an ultrasonic button may include an ultrasonic transmitter configured to transmit an ultrasonic wave, a piezoelectric receiver layer configured to receive a reflected wave of the ultrasonic wave, a platen layer configured to protect the ultrasonic transmitter and the piezoelectric receiver layer, a first matching layer configured to match an acoustic impedance of the platen layer with an acoustic impedance of ridges of a finger, and an ultrasonic sensor array configured to detect the finger using the reflected wave.
Abstract:
Disclosed is a mobile device to provide enhanced security based upon contextual sensor inputs. The mobile device may include: a biometric sensor; a contextual sensor; and a processor. The processor may be configured to: determine an authentication score based upon a biometric input received from the biometric sensor; modulate the authentication score based upon a contextual sensor input from the contextual sensor related to an event; and determine if the modulated authentication score falls below a predetermined threshold. If the authentication score falls below the predetermined threshold, the processor may command that a secondary authentication be performed or the destruction of a biometric template.