Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for device-based authentication

A device, certified technology, applied in transmission systems, digital data authentication, instruments, etc., can solve the problems of user computing mobility cannot be realized, constrained, and size presented shortcomings.

Inactive Publication Date: 2019-02-19
SAMSUNG ELECTRONICS CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While the continued shrinking of the form factor of these device types has provided many advantages, in some cases their size still presents disadvantages
In this regard, true computing mobility for the user is often not achieved when in some cases the user has to carry a mobile computer or even a smartphone
For example, a physically active user may find that her degrees of freedom of movement are unduly affected by the weight and bulk of the computing tablet she is carrying
As another example, users requiring significant computing mobility may be undesirably constrained when they need to carry a smartphone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for device-based authentication
  • Systems and methods for device-based authentication
  • Systems and methods for device-based authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Wearable-based authentication

[0032] User authentication on mobile devices such as smartphones is a key security feature because users typically store large amounts of private data on their mobile devices. Additionally, it has been reported that users may access their smartphones as many as 150 times a day. Therefore, authentication every time a user wants to access her mobile device can be a heavy burden on the user. Traditional solutions to this problem may include the use of password patterns or fingerprint sensors. However, these techniques are cumbersome and require dedicated human intervention by the user. This problem is exacerbated by the trend that users today usually own multiple mobile devices (eg smartphones, tablets), and each device has its own authentication method (such as pattern, password, etc.).

[0033] Accordingly, it would be desirable to provide efficient techniques for authenticating a user on her mobile device. In particular, it would be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In some embodiments, computing implements methods, systems, and non-transitory computer-readable media based on a first sensor signature associated with a first set of sensor data of a first device in a first scenario and a first sensor signature associated with a second device's first set of sensor data. A first comparison value is determined by a first comparison between second sensor signatures associated with the two sets of sensor data. The first comparison is associated with a first authentication type. It is determined whether the first comparison value satisfies a first threshold. Based on the satisfaction of the first threshold, it is determined that the user should be authenticated on the second device.

Description

technical field [0001] This technology relates to the field of electronic wearables and mobile devices. More specifically, the technology relates to communications involving wearable and mobile devices. Background technique [0002] The functionality of electronic mobile devices has increased over time. Various types of mobile devices are capable of performing a myriad of tasks. For example, mobile computers, such as laptops and computing tablets, are now capable of performing all or nearly all of the features and utilities traditionally provided by personal computers. Moreover, these mobile devices are associated with progressively more moderate trade-offs regarding the ease of communicating with other devices (eg, access, bandwidth, and reliability). As another example, smartphones are also growing in popularity due to their vastly expanded capabilities. Their capabilities are approaching those of laptop computers and computing tablets. [0003] While the use of mobil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/316H04L63/0861H04L2463/082H04W12/065H04W12/33H04W12/65H04W12/68H04W12/06G06F21/31
Inventor K.K.拉查里E.蒙吉亚-塔皮亚V.斯里尼瓦桑
Owner SAMSUNG ELECTRONICS CO LTD