Mobile device with continuous user authentication
A technology for mobile devices and users, applied in the field of security input/output systems or mobile devices, service tools, can solve problems such as spoofing attacks, not facial recognition, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Security input / output systems or mobile devices, such as service tools carried by a repairman, often include proprietary information and intellectual property that need to be displayed and protected during its display. This is especially true in the particular case of a service tool for an elevator mechanic who may board an elevator in the presence of elevator passengers who may or may not be authorized to view proprietary information or even ride in the elevator and use them service tool.
[0039] Accordingly, as will be described below, a method and safety input / output system or mobile device are provided whereby it is continuously ensured that a user of the safety input / output system or mobile device is authorized to actually use the safety input / output system or mobile device And be the only such user. First, the characteristic signature of the display device required to detect spoofing attacks. Second, ensure that no other faces or irises are present in the relev...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


