Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile device with continuous user authentication

A technology for mobile devices and users, applied in the field of security input/output systems or mobile devices, service tools, can solve problems such as spoofing attacks, not facial recognition, etc.

Inactive Publication Date: 2018-11-23
OTIS ELEVATOR CO
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, alternative biometric options may not be a reliable alternative to facial recognition since these options typically require very high spatial resolution and potentially suffer from at least some of the same types of spoofing attack flaws as facial recognition systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile device with continuous user authentication
  • Mobile device with continuous user authentication
  • Mobile device with continuous user authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Security input / output systems or mobile devices, such as service tools carried by a repairman, often include proprietary information and intellectual property that need to be displayed and protected during its display. This is especially true in the particular case of a service tool for an elevator mechanic who may board an elevator in the presence of elevator passengers who may or may not be authorized to view proprietary information or even ride in the elevator and use them service tool.

[0039] Accordingly, as will be described below, a method and safety input / output system or mobile device are provided whereby it is continuously ensured that a user of the safety input / output system or mobile device is authorized to actually use the safety input / output system or mobile device And be the only such user. First, the characteristic signature of the display device required to detect spoofing attacks. Second, ensure that no other faces or irises are present in the relev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of operating a secure input / output system or a mobile device is provided. The method includes determining, from refresh rate analysis of facial imagery, whether a spoofing attack of the secure input / output system or the mobile device is underway and outputting information through an output device of the secure input / output system or the mobile device only upon determining that there is nospoofing attack currently underway.

Description

Background technique [0001] The following description relates to secure input / output systems and mobile devices, and more particularly, to secure input / output systems or mobile devices with persistent user authentication capabilities, such as service tools. [0002] Authenticating users is required in many domains and applications, and this can be satisfied by proof of one or more of the following: what you know (e.g., password, etc.), what you have (e.g., token, etc.) ) and / or who you are (e.g., biometrics). In the latter category, facial recognition systems can be used for many applications, including those that require continuous authentication, and can be cheap, convenient, and sufficiently accurate. In particular, facial recognition involves aiming a camera outward from a display screen at an authorized user or other users within the camera's field of view (FoV). The camera then images the faces seen in the FoV, and software is executed to implement a facial recognition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K9/00H04M1/72436
CPCG06F21/32G06V40/172H04L63/0861H04W12/08H04W12/65H04W12/065G06V40/16G06V40/40G07C9/30H04M1/72436G06V40/45G06V40/167
Inventor A.M.芬A.苏
Owner OTIS ELEVATOR CO