Systems and methods for device-based authentication
A device, certified technology, applied in transmission systems, digital data authentication, instruments, etc., can solve the problems of user computing mobility cannot be realized, constrained, and size presented shortcomings.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] Wearable-based authentication
[0032] User authentication on mobile devices such as smartphones is a key security feature because users typically store large amounts of private data on their mobile devices. Additionally, it has been reported that users may access their smartphones as many as 150 times a day. Therefore, authentication every time a user wants to access her mobile device can be a heavy burden on the user. Traditional solutions to this problem may include the use of password patterns or fingerprint sensors. However, these techniques are cumbersome and require dedicated human intervention by the user. This problem is exacerbated by the trend that users today usually own multiple mobile devices (eg smartphones, tablets), and each device has its own authentication method (such as pattern, password, etc.).
[0033] Accordingly, it would be desirable to provide efficient techniques for authenticating a user on her mobile device. In particular, it would be...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


