Unlock instant, AI-driven research and patent intelligence for your innovation.

gaze-based authentication

A technology for computing equipment and tracking data, applied in digital data authentication, user identity/authority verification, input/output process of data processing, etc., can solve the problems of complicated authentication technology, unusable, time-consuming, etc. Number of processing operations, eliminating desired effects

Active Publication Date: 2021-06-04
MICROSOFT TECH LICENSING LLC
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these existing authentication techniques are cumbersome, time-consuming, error-prone and distracting to users
Many existing authentication technologies require the use of hands or voice, making these technologies inaccessible to users with disabilities that impair the use of these abilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • gaze-based authentication
  • gaze-based authentication
  • gaze-based authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] As mentioned above, authentication has become a common requirement for almost everything a user does on a computer. For example, a user needs to authenticate himself to access an online banking account, make a payment to an online merchant, log into a computing device, use a local or web-based application or service, enter a building or room, the list goes on. However, existing authentication techniques are burdensome, time-consuming, error-prone, and distracting to users. Many existing authentication techniques require the use of hands or voice, which makes these techniques unavailable to users with disabilities that impair the use of these abilities. Furthermore, many existing authentication techniques require multiple authentication factors in order to increase security and avoid computer or robot attacks.

[0029] This disclosure describes gaze-based authentication techniques for authenticating users to access accounts, computing devices, locations, or other resour...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Gaze tracking can be used to authenticate users to access accounts, computing devices, or other resources. Gaze-based passwords can be established by prompting the user to identify multiple gaze targets within the scene. Gaze-based passwords can be used to authenticate users to access resources. In some examples, a scene may be rendered on a display when a user attempts to access a resource. In some examples, the scene may be a real world scene or a mixed reality scene including the user's real world environment. A user's gaze may be tracked while the user is viewing the scene to generate login gaze tracking data. The login gaze tracking data can be compared to the gaze-based password, and if the login gaze tracking data satisfies the gaze-based password, the user can be authenticated to access the resource.

Description

Background technique [0001] Users are often required to log in to authenticate their identity in order to access online accounts, computing devices, or other computing resources. Many authentication techniques exist. For example, before accessing computing resources, users may be required to provide login names, email addresses, personal identification numbers (PINs), text-based passwords, picture passwords, digital certificates, physical access credentials (e.g., smart cards), phone numbers, biometric Identification information (eg, fingerprints, retinal scans, etc.), answers to one or more security questions, and / or other identifying information. Authentication has become a common requirement for almost everything a user does on a computer. However, these existing authentication techniques are cumbersome, time-consuming, error-prone and distracting to users. Many existing authentication techniques require the use of hands or voice, which makes these techniques unavailable...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36H04L9/32G06K9/00
CPCG06F21/36H04L9/3226G06V40/19G06V40/197G06V40/10G06V40/67G06V10/17G06F3/013H04L63/083H04L63/102
Inventor J·C·戈唐C·科斯金
Owner MICROSOFT TECH LICENSING LLC