gaze-based authentication
A technology for computing equipment and tracking data, applied in digital data authentication, user identity/authority verification, input/output process of data processing, etc., can solve the problems of complicated authentication technology, unusable, time-consuming, etc. Number of processing operations, eliminating desired effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] As mentioned above, authentication has become a common requirement for almost everything a user does on a computer. For example, a user needs to authenticate himself to access an online banking account, make a payment to an online merchant, log into a computing device, use a local or web-based application or service, enter a building or room, the list goes on. However, existing authentication techniques are burdensome, time-consuming, error-prone, and distracting to users. Many existing authentication techniques require the use of hands or voice, which makes these techniques unavailable to users with disabilities that impair the use of these abilities. Furthermore, many existing authentication techniques require multiple authentication factors in order to increase security and avoid computer or robot attacks.
[0029] This disclosure describes gaze-based authentication techniques for authenticating users to access accounts, computing devices, locations, or other resour...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


