Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication control using ultrasound

A technology of ultrasound and ultrasound signals, applied in general control systems, program control, computer control, etc., can solve problems such as delays, and achieve the effects of fast access, time saving, and smooth user experience

Active Publication Date: 2020-05-01
ELLIPTIC LAB
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, users may experience an undesired delay when unlocking their device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication control using ultrasound
  • User authentication control using ultrasound

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] figure 1 A flowchart 100 is shown illustrating a method for initiating an authentication process on an electronic device. Once started 101, as a first step 102, an ultrasound signal is transmitted by an ultrasound transmitter. In a subsequent step 103, an echo signal of the ultrasonic signal is received by the ultrasonic receiver. If there is an object in the field of view of the ultrasound transmitter and ultrasound receiver, the echo signal will include at least one echo reflected by the object. The ultrasound receiver generates a measurement signal correlated to the received echo signal. In a subsequent step 104, the echo signal is analyzed by processing the measurement signal. This processing is performed by a computer processor. During processing, the processor extracts parameters related to the object. The parameters include one or more of: distance, position, velocity, direction, motion, or a characteristic or posture exhibited by the object. One or more of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Present teachings relate to a method for initiating an authentication process on an electronic device, the method comprising transmitting an ultrasound signal from an ultrasound transmitter, generating a measured signal by receiving at an ultrasound receiver an echo of the ultrasound signal being reflected by an object, analyzing the echo by processing the measured signal, and initiating the authentication process on the electronic device based on the processing of the measured signal. The present teachings also relate to a method for maintaining an authenticated state of an object. The present teachings also relate to an electronic device comprising an ultrasound system for initiating an authenticating process. The present teaching also relate to an electronic device comprising an ultrasound system for retaining an authenticated state of an object. The present teachings also relate to a computer software product for implementing any method steps disclosed herein.

Description

technical field [0001] The present teachings relate to user identification for electronic devices. Background technique [0002] Many authentication technologies exist for authenticating legitimate users of electronic devices, including fingerprint sensing, iris scanning, passwords or identification codes, voice recognition, and facial recognition, or identification based on any other unique characteristic of a legitimate user. When using most of these techniques, there is a certain delay associated with the authentication process. In addition to this, there may also be delays associated with the initiation of the authentication process. For example, in a fingerprint scanning system on a mobile device, the user pressing the home button of the mobile device may be used to trigger the authentication process. [0003] In some authentication systems, such as facial recognition-based authentication systems, especially those without dedicated buttons, an electronic device, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06G05B19/00G06V10/143
CPCG06F21/32G06F21/44G06F21/577G06F2221/2111H04W12/02H04W12/40H04W12/67H04W12/65H04W12/68H04W12/065H04W12/63G06V40/16G06V40/40G06V10/143G06V20/95H04W12/30G06V40/45G01S15/42G01S15/88
Inventor 莱拉·丹尼尔森霍尔格·胡斯曼格内尔·托马斯·斯特拉特
Owner ELLIPTIC LAB