US20160094550A1 - Biometric Device Pairing - Google Patents

Biometric Device Pairing Download PDF

Info

Publication number
US20160094550A1
US20160094550A1 US14/871,387 US201514871387A US2016094550A1 US 20160094550 A1 US20160094550 A1 US 20160094550A1 US 201514871387 A US201514871387 A US 201514871387A US 2016094550 A1 US2016094550 A1 US 2016094550A1
Authority
US
United States
Prior art keywords
electronic device
biometric
controller
accessory
controller device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/871,387
Inventor
Bob Bradley
Craig A. Marciniak
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple Inc filed Critical Apple Inc
Priority to US14/871,387 priority Critical patent/US20160094550A1/en
Assigned to APPLE INC. reassignment APPLE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MARCINIAK, CRAIG A., BRADLEY, BOB
Publication of US20160094550A1 publication Critical patent/US20160094550A1/en
Priority to US15/855,954 priority patent/US11012438B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code

Definitions

  • Embodiments disclosed herein relate to biometric data which may be used to authenticate and identify users of various electronic devices and, more particularly, to various biometric data which may be communicated from a first secure electronic device to a second secure electronic device in to allow an identified user to access the second secure electronic device.
  • Biometric identification or authentication may be used in computers and other electronic devices as a form of identification and access control.
  • Biometric identifiers are distinctive, measurable physiological characteristics related to the configuration or characteristics of the body that can be used to identify individuals.
  • Example biometric identifiers include, but are not limited to, a fingerprint, face recognition, DNA, a palm print, hand geometry, iris recognition, retina recognition, and scent.
  • a biometric system may perform an identification comparison against a biometric database in an attempt to establish the identity of an individual. The system will identify the individual by comparing a biometric sample such as a fingerprint to stored fingerprint samples in the database.
  • Biometrics may be used in place of, or in conjunction with, other methods of personal recognition such as passwords, PINs or keys.
  • Fingerprint recognition features may be available on some portable electronic devices, such as smartphones, thereby allowing users to unlock their phone, as well as to make purchases by using fingerprints stored on their device.
  • the use of biometrics may supplement or displace the use of a password to access a portable electronic device.
  • a biometric sensor may, for example, be built into the home or start button of a smartphone (or any other input device or region) to sense or detect a user's fingerprint and grant or deny access based on that fingerprint.
  • Biometric device pairing uses biometric device pairing to allow biometric identification-equipped devices to be used for pairing with other electronic devices and/or for secure access to the other electronic devices, including non-biometric authentication enabled devices.
  • the biometric identification-equipped device (or simply, “biometric equipped device,” “biometric enabled device” or “biometric device”) may establish a secure connection with a second, different device. The connection is based at least in part on the acquisition and verification of biometric data. Thereafter, the biometric device may access the second device to retrieve data, configure the second device, transmit data, or otherwise interact.
  • a one-time initialization process exchanges credentials between the biometric equipped devices and the non-equipped devices. Once the credentials are exchanged between the devices, the biometric enabled device establishes a secure channel from the credentialed device. The biometric enabled device receives a user's biometric data, verifies the biometric data, and sends a message or signal to the non-enabled device to unlock that device. A password or other authorization is thus not needed to access the non-enabled device and the user may thus access that device securely and conveniently after authentication by the biometric enabled device.
  • the non-enabled device may or may not include biometrics in some embodiments. That is, both the first and subsequent device(s) may be biometrically enabled in some embodiments.
  • the biometric enabled device is a smartphone with a fingerprint sensor to permit a user to unlock the smartphone and, in turn, unlock one or more other devices such as a laptop computer which may or may not be biometric enabled. Because accessing one electronic device of a user allows access to one or more other electronic devices of the user without password or other entry protocol, this system is more convenient, is easier for a user, and contributes to the overall user satisfaction.
  • the biometric pairing system thus allows accessibility to multiple devices with one security verification between the various devices.
  • an electronic device includes a first biometric sensor and a processing device operably connected to the first biometric sensor.
  • the processing device may be configured to receive biometric data from the first biometric sensor and determine if the biometric data matches a biometric template.
  • At least one at least one transmitter device is operably connected to the processing device. The at least one transmitter device is operative to pair the electronic device to a second electronic device across a network and to transmit an authorization message to the second electronic device based on a match between the biometric data and the biometric template.
  • the authorization message permits the electronic device to automatically access the second electronic device.
  • a method for a controller device to pair with an accessory device includes receiving, by the controller device, biometric data associated with a user of the controller device and establishing a secure connection between the controller device and the accessory device.
  • the controller device can generate an asymmetric key pair based on the biometric data to produce a first public key.
  • the controller device and the accessory device may then exchange public keys.
  • the controller device transmits the first public key to the accessory device, and receives a second public key associated with the accessory device.
  • a method for a controller device to access information on an accessory device paired with the controller device can include a controller device receiving first biometric data and generating an authorization message based on a match between the first biometric data and a first biometric template. The authorization message is then communicated from the controller device to the accessory electronic device. The accessory device may be unlocked based on the authorization message. Based on the authorization message, the controller device can access the information on the accessory device.
  • FIG. 1 is a front view of an electronic device
  • FIG. 2 is a schematic illustrating an example biometric sensing system
  • FIG. 3 shows a biometric enabled electronic device accessing a second electronic device
  • FIG. 4 is a flowchart showing example operations for pairing two electronic devices
  • FIG. 5 is a flowchart showing example operations for authorizing a user after the electronic devices have been paired
  • FIG. 6 is a flowchart illustrating initial example operations for pairing two electronic devices
  • FIG. 7 is a flowchart including additional example operations for establishing a secure channel between controller and accessory devices
  • FIG. 8 is a flowchart further illustrating an example pairing process
  • FIG. 9 is a flowchart illustrating example operations in the pairing process
  • FIG. 10 is a flowchart of example initial operations in the process of authorizing an operation on an accessory device.
  • FIG. 11 is a flowchart illustrating example final operations in the process of authorizing an operation on an accessory device.
  • biometric data in the present technology
  • biometric authentication data can be used for convenient access to device features without the use of passwords.
  • user biometric data is collected for providing users with feedback about their health or fitness levels.
  • other uses for personal information data, including biometric data that benefit the user are also contemplated by the present disclosure.
  • the present disclosure further contemplates that the entities responsible for the collection, analysis, disclosure, transfer, storage, or other use of such personal information data will comply with well-established privacy policies and/or privacy practices.
  • such entities should implement and consistently use privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining personal information data private and secure, including the use of data encryption and security methods that meets or exceeds industry or government standards.
  • personal information from users should be collected for legitimate and reasonable uses of the entity and not shared or sold outside of those legitimate uses. Further, such collection should occur only after receiving the informed consent of the users.
  • such entities would take any needed steps for safeguarding and securing access to such personal information data and ensuring that others with access to the personal information data adhere to their privacy policies and procedures. Further, such entities can subject themselves to evaluation by third parties to certify their adherence to widely accepted privacy policies and practices.
  • the present disclosure also contemplates embodiments in which users selectively block the use of, or access to, personal information data, including biometric data. That is, the present disclosure contemplates that hardware and/or software elements can be provided to prevent or block access to such personal information data.
  • the present technology can be configured to allow users to optionally bypass biometric authentication steps by providing secure information such as passwords, personal identification numbers (PINS), touch gestures, or other authentication methods, alone or in combination, known to those of skill in the art.
  • PINS personal identification numbers
  • touch gestures or other authentication methods, alone or in combination, known to those of skill in the art.
  • users can select to remove, disable, or restrict access to certain health-related applications collecting users' personal health or fitness data.
  • Pairing is a process used in computer networking to set up an initial link between computing devices in order to allow communications between them.
  • user authentication e.g., authentication of user based on biometric data
  • pairing is a process used in computer networking to set up an initial link between computing devices in order to allow communications between them.
  • user authentication e.g., authentication of user based on biometric data
  • embodiments described herein may pair two or more devices such that a person possessing one of the devices (a “controller device”) may access data, applications, and the like from the other devices after authorization (e.g., authentication of user based on biometric data) of the controller device is complete.
  • the authorization may be performed wirelessly in many cases, and may last for a set period of time or until some condition is reached. As one non-limiting example, authorization may last until a network or other wireless connection between the paired devices is lost. This may permit a person having the controller device on his or her person, or nearby, to physically access other devices without forcing that person to enter security credentials. As another option, this may allow a person to access data from paired devices remotely through the controller device.
  • the authorization may occur across a secure, encrypted communication channel.
  • the controller device may transmit an acknowledgement or indication that a user or other person associated with the controller device has provided biometric data to the controller device, and that the controller device has recognized the person based on the biometric data.
  • the controller device may serve as a gateway for a user to access the other devices; in such embodiments it is not necessary that all devices have the capability or physical structure to access, receive or interpret biometric data. Nonetheless, the security associated with biometric data acquisition and recognition may be extended to all paired devices insofar as they may rely on the controller device to gather biometric data and recognize an authorized, enrolled person from such data.
  • a low power transmitter device communicates with the controller device and the paired device(s).
  • the low power transmitter device can utilize a wireless personal area network radio wavelength communication technology designed to be used over short distances from fixed and mobile devices.
  • the low power transmitter device can be used to identify device locations in indoor venues where global positioning system (GPS) technologies are not as effective due to interference with overhead satellite communications by the structures defining the indoor venues.
  • GPS global positioning system
  • the low power transmitter device may also be used to provide communications between the electronic devices over these same, relatively short, distances.
  • the biometric data is described as fingerprint data or a fingerprint(s).
  • the biometric data can be other types of biometric data and/or data that is derived from (or based on) the biometric data.
  • Example biometric data includes, but is not limited to, a user's voice, a palm print, veins, face, iris, and/or retina.
  • the data that is derived from, or based on, a user's biometric data can include a histogram, a numerical score, a code, a key, a message, and so on.
  • a portable electronic device 11 is shown, in the form of a smartphone.
  • a user's finger 12 is placed on an input element 13 to unlock and provide convenient and secure access to the electronic device 11 .
  • the input element 13 includes a biometric sensor positioned below, or as a part of, the input element 13 .
  • the input element 13 is a button, while in others it may be a portion of a display 15 , a switch, a region below an ink mask or otherwise inoperative to display data, a portion of a housing, and so on.
  • a fingerprint 14 is sensed by the biometric sensor and may be shown on the display 15 of the electronic device 11 , or an image corresponding to the fingerprint (or portions of the fingerprint) may be displayed.
  • a synthetic fingerprint may be displayed in lieu of the actual fingerprint.
  • the fingerprint 14 may be used to access or unlock the electronic device 11 and to permit a user to make purchases or effectuate other secure transactions on the electronic device 11 .
  • the electronic device 11 may also allow a user to enroll multiple fingerprints from other individuals known to, and trusted by, the user.
  • a portable electronic device may also include capability to allow a user to utilize the same access to certain other of the user's electronic devices such a laptop computer, a tablet computer, a wearable computing device (e.g., smart watch or health assistant), or another portable electronic device which may or may not be biometric access enabled.
  • a laptop computer e.g., a tablet computer
  • a wearable computing device e.g., smart watch or health assistant
  • the low power transmitter device 91 may be a low power transceiver that is separate from the electronic device 11 and communicably coupled to the electronic device 11 .
  • a biometric sensor 10 is the interface between the biometric sensing system and a user's biometric data. As described earlier, the biometric sensor 10 can be placed on, in, or below the input element 13 of the electronic device 11 . In some embodiments, the biometric sensor 10 may be located in portions of the electronic device 11 other than adjacent to input element 13 .
  • the biometric sensor 10 acquires biometric data such as, for example, a fingerprint 14 of a user. While the illustrated biometric sensor 10 is generally an image acquisition system, in other embodiments the biometric sensor can be a voiceprint recognition device, a finger length sensor, a retinal scanner, or other biometric sensor according to the desired user characteristics to be sensed. For example, in some embodiments, the biometric sensor 10 can be a microphone on the electronic device 11 which may identify a voiceprint of a user to be used for biometric access.
  • Pre-processing of the sensed biometric data may be accomplished by a pre-processing component 17 , which may be operative to do one or more of: remove artifacts from the sensed image; enhance the image (for example by removing background noise); and normalize the image data.
  • Data is then transmitted to feature extractor 18 , which may identify certain features of the captured image, such as the whorls and lines in a fingerprint.
  • a vector of numbers or an image with particular properties representing identifying features is used to create a template in a template generator 19 .
  • a template is a synthesis of the relevant identifying characteristics and is extracted from source images or other biometric data. Elements of the biometric measurement that are not used in the comparison algorithm typically are discarded in the template to reduce the data requirements.
  • the template generated in the template generator 19 may be stored in a storage device 21 for future use to allow that user to become a permitted user and access the electronic device 11 .
  • the biometric data e.g., fingerprint
  • a matching identity determined by comparative matching device 22 is sent to the electronic device 11 to verify the identity of the user.
  • multiple biometric templates may be enrolled and stored in the storage device 21 .
  • the storage device 21 can be configured as one or more memories, including, but not limited to, RAM, ROM, flash memory, and removable memory, or combinations thereof.
  • the multiple biometric templates may be from the primary user or they may be from one or more individuals approved by the primary user to allow more than one user to be verified as an approved user and granted access to the electronic device 11 . The user thus controls who may access the electronic device 11 .
  • the electronic device 11 may include a number of other electronic components, such as a processor 89 operative to generally control certain operations of the electronic device.
  • the processor 89 can be operably connected to one or more of the components in the electronic device, such as the biometric sensor 10 , the pre-processing component 17 , the feature extractor 18 , the template generator 19 , the storage device 21 , the comparative matching device 22 , a first transmitter device 90 , and a second transmitter device 91 .
  • the operations of the pre-processing component 17 , the feature extractor 18 , the template generator 19 , and/or the comparative matching device 22 can be performed by the processor 89 .
  • the processor 89 can be implemented with one or more suitable data processing devices, examples of which include a microprocessor, an application-specific integrated circuit (ASIC), and a central processing unit (CPU).
  • the first transmitter device 90 is operative to communicate wired or wirelessly with other devices.
  • the first transmitter device 90 can send and receive data and communications to and from the other devices.
  • Example transmitters include, but are not limited to, Wi-Fi, Bluetooth®, and near field communication.
  • the second transmitter device 90 may be a low power transmitter device that is operative to transmit and receive data and communications (wired or wirelessly) associated with the biometric sensor 10 to other devices, thereby permitting the electronic device to access other electronic devices. Data transmission, wireless and/or wired communication, and other functions of the electronic device will be described in more detail later.
  • a user may choose to store multiple biometric templates in the biometric sensing system of FIG. 2 .
  • a user may choose a fingerprint from an index finger as one template while a ring finger fingerprint or a thumbprint may be used as another template.
  • a user may thus add a level of security for various applications. For example, certain information on the electronic device 11 , or on another paired/authorized electronic device, may be accessible only by using a first authorized fingerprint while other information may be accessed using a second, different authorized fingerprint.
  • a retinal scanner, a voiceprint, or other scanner may also be used as the biometric sensor. In some embodiments, various combinations of these types of sensors and/or indicia could be used to provide various levels of security.
  • certain embodiments permit a user to access a second electronic device 24 from the first electronic device 11 equipped with a biometric identification system, one non-limiting example of which was described above with respect to FIGS. 1 and 2 .
  • Some electronic devices may not have biometric sensors and may require passwords or other security measures to access them.
  • the first electronic device 11 may bypass such security measures by pairing with the second electronic device 24 .
  • a user may enhance or facilitate the user's operation to access the second electronic device 24 and/or information 23 contained in the second electronic device 24 (e.g., a document) without entering any additional security verification into the second electronic device 24 .
  • the user may physically access, without additional security verification, the second electronic device 24 so long as the biometric-enabled first electronic device 11 is on the user's person or near the second electronic device 24 , for example.
  • a user 25 holding the first electronic device 11 may securely access the second electronic device 24 (e.g., a laptop computer) using biometric authentication.
  • the user 25 places his or her finger on or near the input element 13 , which captures an image of the user's fingerprint. That image is validated (for example, as described above) and the user 25 is granted access to the first electronic device 11 .
  • An identification or other authorization message 16 may be transmitted (wired or wirelessly) across a network to the second electronic device 24 (or any other suitable electronic device).
  • a wireless transceiver device 26 may communicatively couple the first electronic device 11 (e.g., smartphone) to the second electronic device 24 (e.g., laptop computer). Any suitable wireless transceiver device may be used.
  • Example wireless transceiver devices include, but are not limited to, beacons, repeaters, range extenders, and relay transmitters.
  • the wireless transceiver device can employ any suitable communication protocol, such as Bluetooth® Low Energy.
  • the wireless transceiver 26 may be the low power transmitter device 91 in FIG. 3 .
  • the first and second electronic devices 11 , 24 may communicate directly with one another.
  • Communicating the authorization message 16 from the first electronic device 11 to the second electronic device 24 generally permits the first electronic device 11 and/or its user to access the second electronic device 24 and some or all of the information 23 contained therein. It should be appreciated that certain embodiments may permit access to the second electronic device 24 only through or by the first electronic device 11 . In other embodiments, the exchange of authorization messages or signals (as described in more detail below) may effectively unlock the second electronic device 24 , thereby permitting access through conventional means such as the second electronic device's keyboard, mouse, or other input.
  • the second electronic device 24 may remain unlocked or otherwise accessible as long as it is in communication with the first electronic device 11 , or the second electronic device 24 may remain accessible only for a period of time after which another authorization operation may be necessary.
  • the second electronic device 24 may further periodically look for the presence of the first electronic device 11 . In some embodiments, if the first electronic device 11 is found, the time before which another authorization is requested may be extended.
  • the first electronic device 11 and the second electronic device 24 can transmit data between functions, applications, operating software, and other software on one or both electronic devices after the second electronic device is unlocked based on the fingerprint.
  • one electronic device e.g., the first electronic device 11
  • can initiate an online purchase that is completed on the other device e.g., the second electronic device 24 .
  • an online purchase of an audio or video file can be initiated on the first electronic device 11 .
  • the payment information e.g., credit card information
  • one electronic device can initiate an operation that is completed or performed by the other device (e.g., the second electronic device 24 ) based on biometric data.
  • the second electronic device 24 can be used to initiate the capture of an image and the first electronic device 11 can then capture the image. Thereafter, in some embodiments the first electronic device 11 may transmit the captured image to the second electronic device 24 .
  • the first electronic device 11 can be used to initiate the sending of an email and the second electronic device 24 may then send the email.
  • the first electronic device can utilize biometric data to pair with the second electronic device. Additionally or alternatively, the first electronic device 11 can set up or change the settings of the second electronic device. For example, based on biometric data, the first electronic device 11 can be used to change a network setting or a password on the second electronic device.
  • the user 25 may wish to retrieve the information 23 from the second electronic device 24 .
  • the information 23 may contain particularly sensitive personal information of the user 25 .
  • the user 25 may thus include an additional level of security on the second electronic device 24 by designating a requirement that a certain fingerprint, for example his or her thumbprint, be required for access to the information 23 while his or her index fingerprint may be used to simply unlock the second electronic device 24 . In this way, an additional layer of security may be added for sensitive information. A user could thus grant access to the second electronic device 24 to certain individuals without granting those individuals access to personal information such as information 23 .
  • various activities may be enabled by one or more stored biometric data.
  • a user may unlock the second electronic device 24 with a fingerprint while a retinal scan or other biometric data can be used to enable additional operations such as authorizing an online purchase.
  • various other actions such as downloading information or documents online, may be enabled by a specific type of biometric data.
  • stored biometric data could be used to enable access to remote storage of data, such as data stored in a cloud computing network.
  • accessing a user's bank account or banking online may require one or more particular types of biometric data to authorize that user and enable access.
  • sensing a user's fingerprint or other biometric data may be required to access that user's account and withdraw money from an automated teller machine.
  • enabling online purchases or use of a credit card could be authorized by sensing particular biometric data of the person on his or her portable electronic device and conveying that information to a paired device such as a vendor computer to authorize the transaction.
  • Suitable electronic devices may first establish communication links to each other. This process is known as “pairing”. Pairing generally is a one-time operation that establishes a communication/data link between two devices; the data link may be wireless in many embodiments and may be cryptographically secured. Once devices are paired in this manner, they can be cryptographically verified on each subsequent use.
  • FIG. 4 is a flowchart showing example operations for pairing two electronic devices.
  • the electronic device with a biometric sensor that is used to authorize operations on another electronic device is referred to as a “controller device”.
  • the electronic device whose operations are being authorized by the controller device (the electronic device that is accessed by the controller device) is referred to as the “accessory device”.
  • the controller device is the first electronic device 11 (e.g., a smartphone) and the accessory device is the second electronic device 24 (e.g., a laptop computer). While these “paired” electronic devices may be in close physical proximity in some embodiments, the electronic devices may also be remote such as a vendor computer or server in other embodiments.
  • a user enters a passcode or otherwise unlocks a controller device.
  • the passcode or unlocking mechanism may be a biometric authorization such as a fingerprint or other biometric data as described earlier.
  • the accessory device is recognized as being in a communication range through the wireless transceiver 26 .
  • the controller device can recognize that the accessory device is within a communication range by itself (without the use of the wireless transceiver 26 ).
  • a secure connection between the controller device and the accessory device is established.
  • the controller device uses the biometric information (e.g., sensed biometric data such as a fingerprint) to generate an encryption key in operation 31 .
  • the controller device and the accessory device exchange public keys over the secured connection established in operation 29 .
  • the controller device and the accessory device are now paired and the process of authorizing the user to securely access the accessory device will be described below with respect to FIG. 5 .
  • the process of authorization may begin.
  • the controller device e.g., first electronic device 11
  • the accessory device e.g., second electronic device 24
  • the process of authorization may begin.
  • the controller device to initiate the authorization process, the controller device must first discover the accessory device is within communication range (operation 33 ).
  • the accessory device transmits a request if an operation, such as access to the accessory device, includes authorization.
  • the request can be transmitted through a wireless transmitter (e.g., wireless transceiver 26 ) to the electronic devices within the communication range.
  • the communication range may be about two (2) meters.
  • the controller device verifies the biometric information from the user of the controller device (operation 35 ).
  • the biometric information includes a fingerprint obtained through a biometric sensor. If the biometric information is verified, the controller device sends an authorization message (e.g., authorization 16 in FIG. 3 ) to the accessory device in operation 36 , which is received by the accessory device in operation 37 . The accessory device then authorizes the user to access the accessory device and notifies the controller device of the authorized access.
  • an authorization message e.g., authorization 16 in FIG. 3
  • the pairing process of FIG. 4 is described in more detail. Specifically, operation 28 of the pairing process shown in FIG. 4 is further described in FIG. 6 .
  • the user enters a passcode or otherwise unlocks the controller device.
  • the passcode or unlocking mechanism may be a biometric authorization such as a fingerprint or other biometric data.
  • the accessory device advertises its availability while the controller device scans for peripherals supporting the pairing function in operation 42 .
  • the controller device discovers the accessory device through a wireless communications device (e.g., wireless transceiver device 26 ) using Bluetooth® Low Energy or another protocol.
  • the controller device displays the electronic devices (including the accessory device) located within a predetermined distance.
  • the predetermined distance is a communication range, which can be approximately 2 meters.
  • a secure connection is established between the controller device and the accessory device (operation 29 of FIG. 4 ).
  • the secure connection can be created as follows.
  • the controller device sends a start request to the accessory device.
  • the start request can include a secure remote password and a personal identification number (PIN).
  • PIN personal identification number
  • the accessory device generates a random PIN and presents it to the user on the accessory device.
  • the accessory device sends a response to the start request of operation 44 .
  • the controller device then prompts the user to enter the PIN from operation 45 .
  • the controller device sends a secure remote password verify request to the accessory device with proof of the PIN.
  • the accessory device verifies the proof of the PIN from operation 48 and responds with another secure remote password to verify the proof of PIN.
  • the controller device verifies the proof of PIN from operation 49 . Thereafter, the secure connection between the accessory device and the controller device is established.
  • the controller device registers for notification of biometric identification.
  • the controller device prompts the user to perform a biometric scan which, in the embodiments described in FIGS. 1-3 , is to touch the user's finger to the input element 13 (positioned above biometric sensor 10 ).
  • the controller device waits for notification of a successful biometric identification. In one embodiment, the controller device waits for notification from the comparative matching device 22 in FIG. 2 . The notification may be sent by the transmitter device 90 and/or the low power transmitter device 91 .
  • a processor e.g., processor 89
  • the processor is a secure enclave processor, which is tamper-resistant processor capable of securely hosting code and data. If the biometric identification of operation 55 is not successful, the pairing of the accessory and controller devices does not occur and the process is terminated (operation 56 ).
  • operation 32 is accomplished in some embodiments by first having each electronic device (e.g., the controller and accessory devices) derive a symmetric key from a secure remote password protocol shared secret key (operation 57 ).
  • each electronic device encrypts a public key and generates an authorization tag with a symmetric cipher.
  • operation 59 the encrypted public key and the authorization tag are exchanged between the controller device and the accessory device (the devices which are to be paired).
  • the accessory device and the controller device each receives the encrypted public key and authorization tag from the other electronic device.
  • the authorization tag is verified and the encrypted public key from the other electronic device is decrypted.
  • each electronic device stores the other device's public key in order to complete the pairing of the controller and accessory devices. After completion of these operations, the controller and accessory devices are paired.
  • the controller device may be used to authorize operations on the accessory device. Referring to FIG. 10 , operations 33 and 34 of FIG. 5 are described in greater detail.
  • the process to authorize an operation on the accessory device begins with the controller device discovering the accessory device using Bluetooth® or other wireless network. In some embodiments, a Bluetooth® Low Energy (BTLE) wireless network may be used.
  • BTLE Bluetooth® Low Energy
  • the accessory device advertises if an operation to be performed on it (such as user log in) needs authorization.
  • the controller device scans for paired devices supporting the biometric authorization. In order for the successful communication and completion of the authorization function, the accessory device must be within a communication range of the controller device, which can be approximately 2 meters in one embodiment. If the controller and accessory devices are not within the communication range, the controller device ignores the accessory device because the accessory device is beyond the predetermined distance or communication range.
  • the station to station pair verification process proceeds in operation 66 with the controller device sending a verify start request including a public key.
  • the a verify start request including a public key may be an Elliptic Curve Diffie-Hellman (ECDH) key agreement protocol public key and long-term public key (LTPK).
  • ECDH Elliptic Curve Diffie-Hellman
  • LTPK long-term public key
  • the accessory device receives the request at operation 67 and searches for the public key of the controller device. The accessory device rejects the request if the public key of the controller device is not found.
  • the accessory device uses its secret key and the controller device's public key to generate a shared secret key in operation 68 .
  • the accessory device uses its long term secret key to sign the concatenation of its public key and the public key of the controller device.
  • the authorization process continues at operation 71 with the accessory device deriving a symmetric key from the shared secret key and encrypting a signature of the shared public keys.
  • the accessory device then responds with its keys and encrypted signature at operation 72 .
  • the controller device receives the response from operation 72 , and at operation 74 searches for the public key of the accessory device and rejects it if not found after searching.
  • the controller device uses its secret key and an ECDH public key to generate a shared secret key which may, in one embodiment, be an ECDH key.
  • the controller device decrypts the signature from operation 72 and verifies the signature using the public key of the accessory device (operation 76 ).
  • the next operation in the authorization process is to have the controller device sign data using its long term secret key and biometric authorization.
  • This process begins with the controller device verifying biometric data from the user in operation 35 ( FIG. 5 ). Referring to FIG. 11 , the controller device registers for notification of biometric identification in operation 77 . The controller device indicates to the user that biometric identification is needed in operation 78 and then waits for a successful biometric identification in operation 79 . The processor (e.g., a secure enclave processor) is then asked to sign concatenation of keys in operation 81 .
  • a secure enclave processor e.g., a secure enclave processor
  • the next operation in the authorization process is verification to the accessory device (operation 37 in FIG. 5 ).
  • the final phase of the station to station protocol for verification of the device pairing begins at operation 82 as the controller device encrypts its signature.
  • the controller device sends a verify finish request with its encrypted signature to the accessory device, which is received by the accessory device at operation 84 .
  • the accessory device decrypts the signature and verifies that it was signed by the public key of the controller device.
  • the final step in the authorization process begins at operation 85 as the controller device builds an authorization message, encrypts the authorization message, and generates an authorization tag.
  • the controller device sends the encrypted authorization message and authorization tag to the accessory device.
  • the accessory device receives the authorization message, verifies the authorization tag and decrypts the authorization message at operation 87 .
  • the biometric authorization is completed at operation 88 when the accessory device performs the authorization and sends a response indicating success or failure of the process.
  • Various encryption algorithms may be used in various embodiments disclosed herein.
  • the algorithm may be Curve25519.
  • the algorithm Ed25519 may be used.
  • the algorithm SHA-512 algorithm may be used.
  • the HKDF-SHA-512 algorithm may be used.
  • the encryption algorithm is preferable ChaCha20 and for message authentication, the Poly1305 algorithm may be used.
  • other encryption algorithms may be used for any of these functions without departing from the scope of the disclosed embodiments.
  • FIGS. 4-11 can be performed by hardware, software, or a combination of hardware and software.
  • Certain aspects of the disclosed embodiments may be provided as a computer program product, or software, that may include a computer-readable storage medium or a non-transitory machine-readable storage medium that stores instructions that may be used to program a processor (or other computing or processing device) to perform a process.
  • any suitable electronic device can be the first electronic device and the second electronic device.
  • the first electronic device may be a smartphone and the second electronic device a wearable computing device, such as a smart watch or a health assistant.
  • Biometric data can be used to pair the smartphone and the wearable computing device. Additionally or alternatively, biometric data may be received to permit the smartphone to unlock the wearable computing device. Additionally or alternatively, biometric data may be used to allow the smartphone (e.g., the user of the smartphone) to access applications, data, and/or functions on the wearable computing device.
  • the first electronic device may be a tablet computing device and the second electronic device a smartphone.
  • the first electronic device may be a digital music player and the second electronic device a tablet computing device.

Abstract

A first electronic device is associated with a biometric sensor. Biometric data received by the biometric sensor is used to permit the first electronic device to pair with, unlock, and/or access a second electronic device.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims the benefit under 35 U.S.C. §119(e) of U.S. Provisional Patent Application No. 62/057,709, filed Sep. 30, 2014, entitled “Biometric Device Pairing,” the entirety of which is incorporated herein by reference as if fully disclosed herein.
  • FIELD
  • Embodiments disclosed herein relate to biometric data which may be used to authenticate and identify users of various electronic devices and, more particularly, to various biometric data which may be communicated from a first secure electronic device to a second secure electronic device in to allow an identified user to access the second secure electronic device.
  • BACKGROUND
  • Biometric identification or authentication may be used in computers and other electronic devices as a form of identification and access control. Biometric identifiers are distinctive, measurable physiological characteristics related to the configuration or characteristics of the body that can be used to identify individuals. Example biometric identifiers include, but are not limited to, a fingerprint, face recognition, DNA, a palm print, hand geometry, iris recognition, retina recognition, and scent. A biometric system may perform an identification comparison against a biometric database in an attempt to establish the identity of an individual. The system will identify the individual by comparing a biometric sample such as a fingerprint to stored fingerprint samples in the database. Biometrics may be used in place of, or in conjunction with, other methods of personal recognition such as passwords, PINs or keys.
  • Fingerprint recognition features may be available on some portable electronic devices, such as smartphones, thereby allowing users to unlock their phone, as well as to make purchases by using fingerprints stored on their device. The use of biometrics may supplement or displace the use of a password to access a portable electronic device. A biometric sensor may, for example, be built into the home or start button of a smartphone (or any other input device or region) to sense or detect a user's fingerprint and grant or deny access based on that fingerprint.
  • SUMMARY
  • Disclosed embodiments use biometric device pairing to allow biometric identification-equipped devices to be used for pairing with other electronic devices and/or for secure access to the other electronic devices, including non-biometric authentication enabled devices. The biometric identification-equipped device (or simply, “biometric equipped device,” “biometric enabled device” or “biometric device”) may establish a secure connection with a second, different device. The connection is based at least in part on the acquisition and verification of biometric data. Thereafter, the biometric device may access the second device to retrieve data, configure the second device, transmit data, or otherwise interact.
  • In certain embodiments, a one-time initialization process exchanges credentials between the biometric equipped devices and the non-equipped devices. Once the credentials are exchanged between the devices, the biometric enabled device establishes a secure channel from the credentialed device. The biometric enabled device receives a user's biometric data, verifies the biometric data, and sends a message or signal to the non-enabled device to unlock that device. A password or other authorization is thus not needed to access the non-enabled device and the user may thus access that device securely and conveniently after authentication by the biometric enabled device. The non-enabled device may or may not include biometrics in some embodiments. That is, both the first and subsequent device(s) may be biometrically enabled in some embodiments.
  • In one embodiment, the biometric enabled device is a smartphone with a fingerprint sensor to permit a user to unlock the smartphone and, in turn, unlock one or more other devices such as a laptop computer which may or may not be biometric enabled. Because accessing one electronic device of a user allows access to one or more other electronic devices of the user without password or other entry protocol, this system is more convenient, is easier for a user, and contributes to the overall user satisfaction. The biometric pairing system thus allows accessibility to multiple devices with one security verification between the various devices.
  • In one aspect, an electronic device includes a first biometric sensor and a processing device operably connected to the first biometric sensor. The processing device may be configured to receive biometric data from the first biometric sensor and determine if the biometric data matches a biometric template. At least one at least one transmitter device is operably connected to the processing device. The at least one transmitter device is operative to pair the electronic device to a second electronic device across a network and to transmit an authorization message to the second electronic device based on a match between the biometric data and the biometric template. The authorization message permits the electronic device to automatically access the second electronic device.
  • In another aspect, a method for a controller device to pair with an accessory device includes receiving, by the controller device, biometric data associated with a user of the controller device and establishing a secure connection between the controller device and the accessory device. The controller device can generate an asymmetric key pair based on the biometric data to produce a first public key. The controller device and the accessory device may then exchange public keys. The controller device transmits the first public key to the accessory device, and receives a second public key associated with the accessory device.
  • In yet another aspect, a method for a controller device to access information on an accessory device paired with the controller device can include a controller device receiving first biometric data and generating an authorization message based on a match between the first biometric data and a first biometric template. The authorization message is then communicated from the controller device to the accessory electronic device. The accessory device may be unlocked based on the authorization message. Based on the authorization message, the controller device can access the information on the accessory device.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The disclosure will be readily understood by the following detailed description in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements, and in which:
  • FIG. 1 is a front view of an electronic device;
  • FIG. 2 is a schematic illustrating an example biometric sensing system;
  • FIG. 3 shows a biometric enabled electronic device accessing a second electronic device;
  • FIG. 4 is a flowchart showing example operations for pairing two electronic devices;
  • FIG. 5 is a flowchart showing example operations for authorizing a user after the electronic devices have been paired;
  • FIG. 6 is a flowchart illustrating initial example operations for pairing two electronic devices;
  • FIG. 7 is a flowchart including additional example operations for establishing a secure channel between controller and accessory devices;
  • FIG. 8 is a flowchart further illustrating an example pairing process;
  • FIG. 9 is a flowchart illustrating example operations in the pairing process;
  • FIG. 10 is a flowchart of example initial operations in the process of authorizing an operation on an accessory device; and
  • FIG. 11 is a flowchart illustrating example final operations in the process of authorizing an operation on an accessory device.
  • DETAILED DESCRIPTION
  • The present disclosure recognizes that personal information data, including biometric data, in the present technology, can be used to the benefit of users. For example, the use of biometric authentication data can be used for convenient access to device features without the use of passwords. In other examples, user biometric data is collected for providing users with feedback about their health or fitness levels. Further, other uses for personal information data, including biometric data that benefit the user are also contemplated by the present disclosure.
  • The present disclosure further contemplates that the entities responsible for the collection, analysis, disclosure, transfer, storage, or other use of such personal information data will comply with well-established privacy policies and/or privacy practices. In particular, such entities should implement and consistently use privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining personal information data private and secure, including the use of data encryption and security methods that meets or exceeds industry or government standards. For example, personal information from users should be collected for legitimate and reasonable uses of the entity and not shared or sold outside of those legitimate uses. Further, such collection should occur only after receiving the informed consent of the users. Additionally, such entities would take any needed steps for safeguarding and securing access to such personal information data and ensuring that others with access to the personal information data adhere to their privacy policies and procedures. Further, such entities can subject themselves to evaluation by third parties to certify their adherence to widely accepted privacy policies and practices.
  • Despite the foregoing, the present disclosure also contemplates embodiments in which users selectively block the use of, or access to, personal information data, including biometric data. That is, the present disclosure contemplates that hardware and/or software elements can be provided to prevent or block access to such personal information data. For example, in the case of biometric authentication methods, the present technology can be configured to allow users to optionally bypass biometric authentication steps by providing secure information such as passwords, personal identification numbers (PINS), touch gestures, or other authentication methods, alone or in combination, known to those of skill in the art. In another example, users can select to remove, disable, or restrict access to certain health-related applications collecting users' personal health or fitness data.
  • Reference will now be made in detail to representative embodiments illustrated in the accompanying drawings and in particular with reference to FIGS. 1-11. It should be understood that the following descriptions are not intended to limit the embodiments to one preferred embodiment. To the contrary, it is intended to cover alternatives, modifications, and equivalents as can be included within the spirit and scope of the described embodiments as defined by the appended claims. Those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes only and should not be construed as limiting. Like reference numerals denote like structure throughout each of the various figures.
  • Pairing is a process used in computer networking to set up an initial link between computing devices in order to allow communications between them. In some embodiments, user authentication (e.g., authentication of user based on biometric data) on one device may be communicated wirelessly to another device to allow that user to access the second device without entering a password or other authentication indicia.
  • Generally, embodiments described herein may pair two or more devices such that a person possessing one of the devices (a “controller device”) may access data, applications, and the like from the other devices after authorization (e.g., authentication of user based on biometric data) of the controller device is complete. The authorization may be performed wirelessly in many cases, and may last for a set period of time or until some condition is reached. As one non-limiting example, authorization may last until a network or other wireless connection between the paired devices is lost. This may permit a person having the controller device on his or her person, or nearby, to physically access other devices without forcing that person to enter security credentials. As another option, this may allow a person to access data from paired devices remotely through the controller device.
  • Generally, the authorization may occur across a secure, encrypted communication channel. As part of the authorization, the controller device may transmit an acknowledgement or indication that a user or other person associated with the controller device has provided biometric data to the controller device, and that the controller device has recognized the person based on the biometric data. Thus, the controller device may serve as a gateway for a user to access the other devices; in such embodiments it is not necessary that all devices have the capability or physical structure to access, receive or interpret biometric data. Nonetheless, the security associated with biometric data acquisition and recognition may be extended to all paired devices insofar as they may rely on the controller device to gather biometric data and recognize an authorized, enrolled person from such data.
  • In some embodiments, a low power transmitter device communicates with the controller device and the paired device(s). The low power transmitter device can utilize a wireless personal area network radio wavelength communication technology designed to be used over short distances from fixed and mobile devices. The low power transmitter device can be used to identify device locations in indoor venues where global positioning system (GPS) technologies are not as effective due to interference with overhead satellite communications by the structures defining the indoor venues. The low power transmitter device may also be used to provide communications between the electronic devices over these same, relatively short, distances.
  • In the disclosed embodiments, the biometric data is described as fingerprint data or a fingerprint(s). However, in some embodiments the biometric data can be other types of biometric data and/or data that is derived from (or based on) the biometric data. Example biometric data includes, but is not limited to, a user's voice, a palm print, veins, face, iris, and/or retina. Additionally or alternatively, the data that is derived from, or based on, a user's biometric data can include a histogram, a numerical score, a code, a key, a message, and so on.
  • Referring to FIG. 1, a portable electronic device 11 is shown, in the form of a smartphone. A user's finger 12 is placed on an input element 13 to unlock and provide convenient and secure access to the electronic device 11. The input element 13 includes a biometric sensor positioned below, or as a part of, the input element 13. In some embodiments, the input element 13 is a button, while in others it may be a portion of a display 15, a switch, a region below an ink mask or otherwise inoperative to display data, a portion of a housing, and so on. A fingerprint 14 is sensed by the biometric sensor and may be shown on the display 15 of the electronic device 11, or an image corresponding to the fingerprint (or portions of the fingerprint) may be displayed. For example, a synthetic fingerprint may be displayed in lieu of the actual fingerprint. The fingerprint 14 may be used to access or unlock the electronic device 11 and to permit a user to make purchases or effectuate other secure transactions on the electronic device 11. The electronic device 11 may also allow a user to enroll multiple fingerprints from other individuals known to, and trusted by, the user.
  • Because this biometric access feature provides convenient and secure access to a device, a portable electronic device may also include capability to allow a user to utilize the same access to certain other of the user's electronic devices such a laptop computer, a tablet computer, a wearable computing device (e.g., smart watch or health assistant), or another portable electronic device which may or may not be biometric access enabled.
  • Referring to FIG. 2, one example of a biometric sensing system is shown as a block diagram, although it should be appreciated that this is only one example and many other systems and implementations may exist. In one embodiment, all of the illustrated components are included in the electronic device 11. In another embodiment, some of the illustrated components are included in the electronic device 11. For example, the low power transmitter device 91 may be a low power transceiver that is separate from the electronic device 11 and communicably coupled to the electronic device 11.
  • A biometric sensor 10 is the interface between the biometric sensing system and a user's biometric data. As described earlier, the biometric sensor 10 can be placed on, in, or below the input element 13 of the electronic device 11. In some embodiments, the biometric sensor 10 may be located in portions of the electronic device 11 other than adjacent to input element 13.
  • The biometric sensor 10 acquires biometric data such as, for example, a fingerprint 14 of a user. While the illustrated biometric sensor 10 is generally an image acquisition system, in other embodiments the biometric sensor can be a voiceprint recognition device, a finger length sensor, a retinal scanner, or other biometric sensor according to the desired user characteristics to be sensed. For example, in some embodiments, the biometric sensor 10 can be a microphone on the electronic device 11 which may identify a voiceprint of a user to be used for biometric access.
  • Pre-processing of the sensed biometric data may be accomplished by a pre-processing component 17, which may be operative to do one or more of: remove artifacts from the sensed image; enhance the image (for example by removing background noise); and normalize the image data. Data is then transmitted to feature extractor 18, which may identify certain features of the captured image, such as the whorls and lines in a fingerprint.
  • In some embodiments, a vector of numbers or an image with particular properties representing identifying features is used to create a template in a template generator 19. A template is a synthesis of the relevant identifying characteristics and is extracted from source images or other biometric data. Elements of the biometric measurement that are not used in the comparison algorithm typically are discarded in the template to reduce the data requirements. In the enrollment process, for a first time user, the template generated in the template generator 19 may be stored in a storage device 21 for future use to allow that user to become a permitted user and access the electronic device 11.
  • In the verification or test process, the biometric data (e.g., fingerprint) sensed by the biometric sensor 10 is compared against stored templates in the storage device 21 and a matching identity determined by comparative matching device 22 is sent to the electronic device 11 to verify the identity of the user. In some embodiments, multiple biometric templates may be enrolled and stored in the storage device 21. The storage device 21 can be configured as one or more memories, including, but not limited to, RAM, ROM, flash memory, and removable memory, or combinations thereof. The multiple biometric templates may be from the primary user or they may be from one or more individuals approved by the primary user to allow more than one user to be verified as an approved user and granted access to the electronic device 11. The user thus controls who may access the electronic device 11.
  • Although particular operations have been discussed and described for enrollment, template generation, testing and authorization, it should be appreciated that many other methods and systems for each such operation exist. Accordingly, the foregoing is intended to provide only one example of various biometric enrollment/sensing operations and is not intended to limit embodiments described herein.
  • The electronic device 11 may include a number of other electronic components, such as a processor 89 operative to generally control certain operations of the electronic device. Although not shown in FIG. 2, the processor 89 can be operably connected to one or more of the components in the electronic device, such as the biometric sensor 10, the pre-processing component 17, the feature extractor 18, the template generator 19, the storage device 21, the comparative matching device 22, a first transmitter device 90, and a second transmitter device 91. In some embodiments, the operations of the pre-processing component 17, the feature extractor 18, the template generator 19, and/or the comparative matching device 22 can be performed by the processor 89. The processor 89 can be implemented with one or more suitable data processing devices, examples of which include a microprocessor, an application-specific integrated circuit (ASIC), and a central processing unit (CPU).
  • The first transmitter device 90 is operative to communicate wired or wirelessly with other devices. The first transmitter device 90 can send and receive data and communications to and from the other devices. Example transmitters include, but are not limited to, Wi-Fi, Bluetooth®, and near field communication. The second transmitter device 90 may be a low power transmitter device that is operative to transmit and receive data and communications (wired or wirelessly) associated with the biometric sensor 10 to other devices, thereby permitting the electronic device to access other electronic devices. Data transmission, wireless and/or wired communication, and other functions of the electronic device will be described in more detail later.
  • A user may choose to store multiple biometric templates in the biometric sensing system of FIG. 2. In one embodiment, a user may choose a fingerprint from an index finger as one template while a ring finger fingerprint or a thumbprint may be used as another template. A user may thus add a level of security for various applications. For example, certain information on the electronic device 11, or on another paired/authorized electronic device, may be accessible only by using a first authorized fingerprint while other information may be accessed using a second, different authorized fingerprint. A retinal scanner, a voiceprint, or other scanner may also be used as the biometric sensor. In some embodiments, various combinations of these types of sensors and/or indicia could be used to provide various levels of security.
  • Referring to FIG. 3, certain embodiments permit a user to access a second electronic device 24 from the first electronic device 11 equipped with a biometric identification system, one non-limiting example of which was described above with respect to FIGS. 1 and 2. Some electronic devices may not have biometric sensors and may require passwords or other security measures to access them. The first electronic device 11 may bypass such security measures by pairing with the second electronic device 24.
  • Alternatively, in some embodiments it may be convenient to access multiple devices from one biometric-enabled device, even if the other devices also have biometric access capability. For example, in a situation where a user has a device, such as electronic device 11, and wishes to access another device, such as electronic device 24, it may enhance or facilitate the user's operation to access the second electronic device 24 and/or information 23 contained in the second electronic device 24 (e.g., a document) without entering any additional security verification into the second electronic device 24. The user may physically access, without additional security verification, the second electronic device 24 so long as the biometric-enabled first electronic device 11 is on the user's person or near the second electronic device 24, for example.
  • Referring to FIG. 3, a user 25 holding the first electronic device 11 (e.g., a smartphone) may securely access the second electronic device 24 (e.g., a laptop computer) using biometric authentication. In this embodiment, the user 25 places his or her finger on or near the input element 13, which captures an image of the user's fingerprint. That image is validated (for example, as described above) and the user 25 is granted access to the first electronic device 11.
  • An identification or other authorization message 16 may be transmitted (wired or wirelessly) across a network to the second electronic device 24 (or any other suitable electronic device). In some embodiments, a wireless transceiver device 26 may communicatively couple the first electronic device 11 (e.g., smartphone) to the second electronic device 24 (e.g., laptop computer). Any suitable wireless transceiver device may be used. Example wireless transceiver devices include, but are not limited to, beacons, repeaters, range extenders, and relay transmitters. The wireless transceiver device can employ any suitable communication protocol, such as Bluetooth® Low Energy. In some embodiments, the wireless transceiver 26 may be the low power transmitter device 91 in FIG. 3. In other embodiments, the first and second electronic devices 11, 24 may communicate directly with one another.
  • Communicating the authorization message 16 from the first electronic device 11 to the second electronic device 24 generally permits the first electronic device 11 and/or its user to access the second electronic device 24 and some or all of the information 23 contained therein. It should be appreciated that certain embodiments may permit access to the second electronic device 24 only through or by the first electronic device 11. In other embodiments, the exchange of authorization messages or signals (as described in more detail below) may effectively unlock the second electronic device 24, thereby permitting access through conventional means such as the second electronic device's keyboard, mouse, or other input. The second electronic device 24 may remain unlocked or otherwise accessible as long as it is in communication with the first electronic device 11, or the second electronic device 24 may remain accessible only for a period of time after which another authorization operation may be necessary. The second electronic device 24 may further periodically look for the presence of the first electronic device 11. In some embodiments, if the first electronic device 11 is found, the time before which another authorization is requested may be extended.
  • For example, in some embodiments the first electronic device 11 and the second electronic device 24 can transmit data between functions, applications, operating software, and other software on one or both electronic devices after the second electronic device is unlocked based on the fingerprint. Additionally or alternatively, one electronic device (e.g., the first electronic device 11) can initiate an online purchase that is completed on the other device (e.g., the second electronic device 24). For example, an online purchase of an audio or video file can be initiated on the first electronic device 11. The payment information (e.g., credit card information) may be transmitted to the online store from the second electronic device 24 and/or the audio or video file can be downloaded to the second electronic device 24.
  • Similarly, one electronic device (e.g., the first electronic device 11) can initiate an operation that is completed or performed by the other device (e.g., the second electronic device 24) based on biometric data. For example, the second electronic device 24 can be used to initiate the capture of an image and the first electronic device 11 can then capture the image. Thereafter, in some embodiments the first electronic device 11 may transmit the captured image to the second electronic device 24. In another example, the first electronic device 11 can be used to initiate the sending of an email and the second electronic device 24 may then send the email.
  • In some embodiments, the first electronic device can utilize biometric data to pair with the second electronic device. Additionally or alternatively, the first electronic device 11 can set up or change the settings of the second electronic device. For example, based on biometric data, the first electronic device 11 can be used to change a network setting or a password on the second electronic device.
  • Referring again to FIG. 3, the user 25 may wish to retrieve the information 23 from the second electronic device 24. In some situations, the information 23 may contain particularly sensitive personal information of the user 25. The user 25 may thus include an additional level of security on the second electronic device 24 by designating a requirement that a certain fingerprint, for example his or her thumbprint, be required for access to the information 23 while his or her index fingerprint may be used to simply unlock the second electronic device 24. In this way, an additional layer of security may be added for sensitive information. A user could thus grant access to the second electronic device 24 to certain individuals without granting those individuals access to personal information such as information 23.
  • In other embodiments, various activities may be enabled by one or more stored biometric data. For example, a user may unlock the second electronic device 24 with a fingerprint while a retinal scan or other biometric data can be used to enable additional operations such as authorizing an online purchase. In other embodiments, various other actions, such as downloading information or documents online, may be enabled by a specific type of biometric data. As another example, stored biometric data could be used to enable access to remote storage of data, such as data stored in a cloud computing network.
  • As yet another example, accessing a user's bank account or banking online may require one or more particular types of biometric data to authorize that user and enable access. Continuing the example, sensing a user's fingerprint or other biometric data may be required to access that user's account and withdraw money from an automated teller machine. In other embodiments, enabling online purchases or use of a credit card could be authorized by sensing particular biometric data of the person on his or her portable electronic device and conveying that information to a paired device such as a vendor computer to authorize the transaction.
  • In order to accomplish the access and authentication activities described above with respect to FIG. 3, suitable electronic devices may first establish communication links to each other. This process is known as “pairing”. Pairing generally is a one-time operation that establishes a communication/data link between two devices; the data link may be wireless in many embodiments and may be cryptographically secured. Once devices are paired in this manner, they can be cryptographically verified on each subsequent use.
  • FIG. 4 is a flowchart showing example operations for pairing two electronic devices. In this embodiment, the electronic device with a biometric sensor that is used to authorize operations on another electronic device is referred to as a “controller device”. The electronic device whose operations are being authorized by the controller device (the electronic device that is accessed by the controller device) is referred to as the “accessory device”. In the example embodiment shown in FIG. 3, the controller device is the first electronic device 11 (e.g., a smartphone) and the accessory device is the second electronic device 24 (e.g., a laptop computer). While these “paired” electronic devices may be in close physical proximity in some embodiments, the electronic devices may also be remote such as a vendor computer or server in other embodiments.
  • Referring to FIG. 4, in operation 27, a user (e.g., user 25) enters a passcode or otherwise unlocks a controller device. The passcode or unlocking mechanism may be a biometric authorization such as a fingerprint or other biometric data as described earlier. In operation 28, the accessory device is recognized as being in a communication range through the wireless transceiver 26. In other embodiments, the controller device can recognize that the accessory device is within a communication range by itself (without the use of the wireless transceiver 26).
  • In operation 29, a secure connection between the controller device and the accessory device is established. Once this secure connection has been established, the controller device uses the biometric information (e.g., sensed biometric data such as a fingerprint) to generate an encryption key in operation 31. In operation 32, the controller device and the accessory device exchange public keys over the secured connection established in operation 29. The controller device and the accessory device are now paired and the process of authorizing the user to securely access the accessory device will be described below with respect to FIG. 5.
  • Once the controller device (e.g., first electronic device 11) and the accessory device (e.g., second electronic device 24) have been paired as described above with respect to FIG. 4, the process of authorization may begin. Referring to FIG. 5, to initiate the authorization process, the controller device must first discover the accessory device is within communication range (operation 33). As will be further described below, the accessory device transmits a request if an operation, such as access to the accessory device, includes authorization. In some embodiments, the request can be transmitted through a wireless transmitter (e.g., wireless transceiver 26) to the electronic devices within the communication range. In one embodiment, the communication range may be about two (2) meters. Once the accessory device has been “discovered” in operation 33, the verification of the public key protocol between the controller and accessory devices occurs in operation 34. The controller device then verifies the biometric information from the user of the controller device (operation 35). In one embodiment, the biometric information includes a fingerprint obtained through a biometric sensor. If the biometric information is verified, the controller device sends an authorization message (e.g., authorization 16 in FIG. 3) to the accessory device in operation 36, which is received by the accessory device in operation 37. The accessory device then authorizes the user to access the accessory device and notifies the controller device of the authorized access.
  • Referring to FIG. 6, the pairing process of FIG. 4 is described in more detail. Specifically, operation 28 of the pairing process shown in FIG. 4 is further described in FIG. 6. In operation 27, the user enters a passcode or otherwise unlocks the controller device. As described in conjunction with FIG. 4, the passcode or unlocking mechanism may be a biometric authorization such as a fingerprint or other biometric data.
  • In operation 41, the accessory device advertises its availability while the controller device scans for peripherals supporting the pairing function in operation 42. In some embodiments, the controller device discovers the accessory device through a wireless communications device (e.g., wireless transceiver device 26) using Bluetooth® Low Energy or another protocol. In operation 43, the controller device displays the electronic devices (including the accessory device) located within a predetermined distance. In one embodiment, the predetermined distance is a communication range, which can be approximately 2 meters.
  • Referring to FIG. 7, after the accessory device is “discovered” through the operations described in FIG. 6, a secure connection is established between the controller device and the accessory device (operation 29 of FIG. 4). In one embodiment, the secure connection can be created as follows. In operation 44, the controller device sends a start request to the accessory device. The start request can include a secure remote password and a personal identification number (PIN). In operation 45, the accessory device generates a random PIN and presents it to the user on the accessory device. In operation 46, the accessory device sends a response to the start request of operation 44. In operation 47, the controller device then prompts the user to enter the PIN from operation 45. In operation 48, the controller device sends a secure remote password verify request to the accessory device with proof of the PIN. In operation 49, the accessory device verifies the proof of the PIN from operation 48 and responds with another secure remote password to verify the proof of PIN. In operation 51, the controller device verifies the proof of PIN from operation 49. Thereafter, the secure connection between the accessory device and the controller device is established.
  • Referring to FIG. 8, operation 31 of the pairing process shown in FIG. 4 is described in greater detail. In operation 52, the controller device registers for notification of biometric identification. In operation 53, the controller device prompts the user to perform a biometric scan which, in the embodiments described in FIGS. 1-3, is to touch the user's finger to the input element 13 (positioned above biometric sensor 10). In operation 54, the controller device waits for notification of a successful biometric identification. In one embodiment, the controller device waits for notification from the comparative matching device 22 in FIG. 2. The notification may be sent by the transmitter device 90 and/or the low power transmitter device 91.
  • If the identification is successful in operation 54, then a processor (e.g., processor 89) generates an asymmetric key pair and returns a public key to the controller device (operation 55). In one embodiment, the processor is a secure enclave processor, which is tamper-resistant processor capable of securely hosting code and data. If the biometric identification of operation 55 is not successful, the pairing of the accessory and controller devices does not occur and the process is terminated (operation 56).
  • The final operation in the example pairing process of FIG. 4 is to have the accessory device and the controller device exchange public keys over a secure channel to establish the pairing of the devices (operation 32 in FIG. 4). Referring to FIG. 9, operation 32 is accomplished in some embodiments by first having each electronic device (e.g., the controller and accessory devices) derive a symmetric key from a secure remote password protocol shared secret key (operation 57). In operation 58, each electronic device encrypts a public key and generates an authorization tag with a symmetric cipher. In operation 59, the encrypted public key and the authorization tag are exchanged between the controller device and the accessory device (the devices which are to be paired). In operation 61, the accessory device and the controller device each receives the encrypted public key and authorization tag from the other electronic device. In operation 62, the authorization tag is verified and the encrypted public key from the other electronic device is decrypted. In operation 63, each electronic device stores the other device's public key in order to complete the pairing of the controller and accessory devices. After completion of these operations, the controller and accessory devices are paired.
  • Once the controller and accessory devices have been paired, the controller device may be used to authorize operations on the accessory device. Referring to FIG. 10, operations 33 and 34 of FIG. 5 are described in greater detail. The process to authorize an operation on the accessory device begins with the controller device discovering the accessory device using Bluetooth® or other wireless network. In some embodiments, a Bluetooth® Low Energy (BTLE) wireless network may be used. In operation 64, the accessory device advertises if an operation to be performed on it (such as user log in) needs authorization. At operation 65, the controller device scans for paired devices supporting the biometric authorization. In order for the successful communication and completion of the authorization function, the accessory device must be within a communication range of the controller device, which can be approximately 2 meters in one embodiment. If the controller and accessory devices are not within the communication range, the controller device ignores the accessory device because the accessory device is beyond the predetermined distance or communication range.
  • Referring again to FIG. 10, the verification operation 34 is described in more detail. The station to station pair verification process proceeds in operation 66 with the controller device sending a verify start request including a public key. In one embodiment, the a verify start request including a public key may be an Elliptic Curve Diffie-Hellman (ECDH) key agreement protocol public key and long-term public key (LTPK). The accessory device receives the request at operation 67 and searches for the public key of the controller device. The accessory device rejects the request if the public key of the controller device is not found.
  • If the public key of the controller device is found, the accessory device uses its secret key and the controller device's public key to generate a shared secret key in operation 68. At operation 69, the accessory device uses its long term secret key to sign the concatenation of its public key and the public key of the controller device.
  • The authorization process continues at operation 71 with the accessory device deriving a symmetric key from the shared secret key and encrypting a signature of the shared public keys. The accessory device then responds with its keys and encrypted signature at operation 72.
  • At operation 73, the controller device receives the response from operation 72, and at operation 74 searches for the public key of the accessory device and rejects it if not found after searching. In operation 75, the controller device uses its secret key and an ECDH public key to generate a shared secret key which may, in one embodiment, be an ECDH key. The controller device decrypts the signature from operation 72 and verifies the signature using the public key of the accessory device (operation 76).
  • The next operation in the authorization process is to have the controller device sign data using its long term secret key and biometric authorization. This process begins with the controller device verifying biometric data from the user in operation 35 (FIG. 5). Referring to FIG. 11, the controller device registers for notification of biometric identification in operation 77. The controller device indicates to the user that biometric identification is needed in operation 78 and then waits for a successful biometric identification in operation 79. The processor (e.g., a secure enclave processor) is then asked to sign concatenation of keys in operation 81.
  • The next operation in the authorization process is verification to the accessory device (operation 37 in FIG. 5). The final phase of the station to station protocol for verification of the device pairing begins at operation 82 as the controller device encrypts its signature. At operation 83, the controller device sends a verify finish request with its encrypted signature to the accessory device, which is received by the accessory device at operation 84. At operation 84, the accessory device decrypts the signature and verifies that it was signed by the public key of the controller device.
  • The final step in the authorization process (operation 38 in FIG. 5) begins at operation 85 as the controller device builds an authorization message, encrypts the authorization message, and generates an authorization tag. At operation 86, the controller device sends the encrypted authorization message and authorization tag to the accessory device. The accessory device receives the authorization message, verifies the authorization tag and decrypts the authorization message at operation 87. The biometric authorization is completed at operation 88 when the accessory device performs the authorization and sends a response indicating success or failure of the process.
  • Various encryption algorithms may be used in various embodiments disclosed herein. For example, for Elliptic-Curve Diffie-Hellman (ECDH encryption), the algorithm may be Curve25519. For signature generation and verification, the algorithm Ed25519 may be used. For hashing, the SHA-512 algorithm may be used. For key derivation, the HKDF-SHA-512 algorithm may be used. The encryption algorithm is preferable ChaCha20 and for message authentication, the Poly1305 algorithm may be used. Of course, other encryption algorithms may be used for any of these functions without departing from the scope of the disclosed embodiments.
  • The various operations shown in FIGS. 4-11 can be performed by hardware, software, or a combination of hardware and software. Certain aspects of the disclosed embodiments may be provided as a computer program product, or software, that may include a computer-readable storage medium or a non-transitory machine-readable storage medium that stores instructions that may be used to program a processor (or other computing or processing device) to perform a process.
  • Additionally, although embodiments have been described in conjunction with a smartphone and a laptop, other embodiments are not limited to these electronic devices. Any suitable electronic device can be the first electronic device and the second electronic device. As one example, the first electronic device may be a smartphone and the second electronic device a wearable computing device, such as a smart watch or a health assistant. Biometric data can be used to pair the smartphone and the wearable computing device. Additionally or alternatively, biometric data may be received to permit the smartphone to unlock the wearable computing device. Additionally or alternatively, biometric data may be used to allow the smartphone (e.g., the user of the smartphone) to access applications, data, and/or functions on the wearable computing device. In another example, the first electronic device may be a tablet computing device and the second electronic device a smartphone. In yet another example, the first electronic device may be a digital music player and the second electronic device a tablet computing device.
  • The foregoing description, for purposes of explanation, used specific nomenclature to provide a thorough understanding of the described embodiments. However, it will be apparent to one skilled in the art that the specific details are not required in order to practice the described embodiments. Thus, the foregoing descriptions of the specific embodiments described herein are presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the embodiments to the precise forms disclosed. It will be apparent to one of ordinary skill in the art that many modifications and variations are possible in view of the above teachings.

Claims (23)

What is claimed is:
1. An electronic device, comprising:
a first biometric sensor;
a processing device operably connected to the first biometric sensor, the processing device configured to receive biometric data from the first biometric sensor and determine if the biometric data matches a biometric template; and
at least one transmitter device operably connected to the processing device, the at least one transmitter device operative to pair the electronic device to a second electronic device across a network and to transmit an authorization message to the second electronic device based on a match between the biometric data and the biometric template, wherein the authorization message permits the electronic device to automatically access the second electronic device.
2. The electronic device of claim 1, wherein the at least one transmitter device comprises:
a first transmitter device operative to pair the electronic device to the second electronic device; and
a low power transmitter device operative to transmit the authorization message to the second electronic device to permit the electronic device to automatically access the second electronic device.
3. The electronic device of claim 2, wherein the first transmitter device is operative to receive a key from the second electronic device when pairing to the second electronic device.
4. The electronic device of claim 1, wherein the first biometric sensor comprises a fingerprint sensor and the biometric data comprises fingerprint data.
5. The electronic device of claim 1, wherein the second electronic device permits automatic access to the second electronic device only while the electronic device is within a communication range of the second electronic device.
6. The electronic device of claim 1, wherein the second electronic device permits automatic access only while the electronic device is paired with the second electronic device.
7. The electronic device of claim 1, wherein the processing device receives additional biometric data from the first biometric sensor to provide access to information on the second electronic device.
8. The electronic device of claim 1, further comprising a second biometric sensor.
9. The electronic device of claim 8, wherein biometric data received from the second biometric sensor provides access to information on the second electronic device.
10. A method for a controller device to pair with an accessory device, comprising:
receiving, by the controller device, biometric data associated with a user of the controller device;
establishing a secure connection between the controller device and the accessory device;
generating, by the controller device, an asymmetric key pair based on the biometric data to produce a first public key;
transmitting, by the controller device, the first public key to the accessory device; and
receiving, by the controller device, a second public key associated with the accessory device.
11. The method of claim 10, further comprising prior to generating, by the controller device, the asymmetric key pair based on the biometric data, verifying the biometric data associated with the user matches a biometric template associated with the user.
12. The method of claim 10, wherein receiving, by the controller device, biometric data associated with a user of the controller device comprises receiving, by the controller device, biometric data associated with the user of the controller device from a biometric sensor associated with the controller device.
13. The method of claim 12, wherein the biometric data comprises fingerprint data and the biometric sensor comprises a fingerprint sensor.
14. The method of claim 10, further comprising prior to establishing the secure connection between the controller device and the accessory device, discovering, by the controller device, the accessory device by scanning for peripherals supporting the pairing function.
15. The method of claim 14, wherein the controller device discovers the accessory device using a low power transmitter device.
16. The method of claim 10, wherein establishing the secure connection comprises:
sending, by the controller device, a start request to the accessory device;
receiving, by the controller device, a response to the start request transmitted by the accessory device;
receiving, by the controller device, a personal identification number associated with the accessory device based on the response to the start request;
transmitting, by the controller device, a secure remote password verify request that includes a proof of the personal identification number;
receiving, by the controller device, a secure remote password response transmitted by the accessory device, wherein the secure remote password response verifies the proof of the personal identification number; and
verifying, by the controller device, the proof of the personal identification number.
17. A method for a controller device to access information on an accessory device paired with the controller device, the method comprising:
receiving, by a controller device, first biometric data;
generating, by the controller device, an authorization message based on a match between the first biometric data and a first biometric template;
communicating the authorization message from the controller device to the accessory electronic device;
unlocking the accessory device based on the authorization message; and
accessing, by the controller device, the information on the accessory device based on the authorization message.
18. The method of claim 17, further comprising:
prior to generating the authorization message, receiving by the controller device second biometric data; and
generating, by the controller device, the authorization message based on the match between the first biometric data and the first biometric template and a match between the second biometric data and a second biometric template.
19. The method of claim 18, wherein the first and second biometric data each comprise fingerprint data.
20. The method of claim 18, wherein the first biometric data comprises fingerprint data and the second biometric data comprises non-fingerprint biometric data.
21. The method of claim 17, wherein communicating the authorization message from the controller device to the accessory electronic device comprises communicating the authorization message from the controller device to the accessory electronic device using a low power transmitter device.
22. The method of claim 17, wherein the authorization message is transmitted from the controller device to the accessory device only when the accessory device is located within a communication range of the controller device.
23. The method of claim 17, further comprising continuing to permit the controller device to access the accessory device only while the controller device is paired with the accessory device.
US14/871,387 2014-09-30 2015-09-30 Biometric Device Pairing Abandoned US20160094550A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/871,387 US20160094550A1 (en) 2014-09-30 2015-09-30 Biometric Device Pairing
US15/855,954 US11012438B2 (en) 2014-09-30 2017-12-27 Biometric device pairing

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201462057709P 2014-09-30 2014-09-30
US14/871,387 US20160094550A1 (en) 2014-09-30 2015-09-30 Biometric Device Pairing

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/855,954 Continuation US11012438B2 (en) 2014-09-30 2017-12-27 Biometric device pairing

Publications (1)

Publication Number Publication Date
US20160094550A1 true US20160094550A1 (en) 2016-03-31

Family

ID=54330884

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/871,387 Abandoned US20160094550A1 (en) 2014-09-30 2015-09-30 Biometric Device Pairing
US15/855,954 Active 2036-04-18 US11012438B2 (en) 2014-09-30 2017-12-27 Biometric device pairing

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/855,954 Active 2036-04-18 US11012438B2 (en) 2014-09-30 2017-12-27 Biometric device pairing

Country Status (3)

Country Link
US (2) US20160094550A1 (en)
CN (2) CN205050141U (en)
WO (1) WO2016054263A1 (en)

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160234174A1 (en) * 2015-02-04 2016-08-11 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
US9590986B2 (en) 2015-02-04 2017-03-07 Aerendir Mobile Inc. Local user authentication with neuro and neuro-mechanical fingerprints
US20170180125A1 (en) * 2015-12-17 2017-06-22 Deutsche Post Ag Device and method for the personalized provision of a key
US20170262625A1 (en) * 2016-03-14 2017-09-14 Ricoh Company, Ltd. Information processing apparatus and information processing method
WO2018013503A1 (en) * 2016-07-13 2018-01-18 Motorola Mobility Llc Electronic device with biometric authentication control of companion devices, and corresponding systems and methods
US20180026975A1 (en) * 2015-01-06 2018-01-25 Samsung Electronics Co., Ltd. Device and method for transmitting message
US20180145956A1 (en) * 2016-11-21 2018-05-24 International Business Machines Corporation Touch-share credential management on multiple devices
US20180232512A1 (en) * 2016-04-28 2018-08-16 Bragi GmbH Biometric Interface System and Method
US10171458B2 (en) 2012-08-31 2019-01-01 Apple Inc. Wireless pairing and communication between devices using biometric data
US10297911B2 (en) 2015-08-29 2019-05-21 Bragi GmbH Antenna for use in a wearable device
US10313781B2 (en) 2016-04-08 2019-06-04 Bragi GmbH Audio accelerometric feedback through bilateral ear worn device system and method
US10344960B2 (en) 2017-09-19 2019-07-09 Bragi GmbH Wireless earpiece controlled medical headlight
US10397690B2 (en) 2016-11-04 2019-08-27 Bragi GmbH Earpiece with modified ambient environment over-ride function
US10397688B2 (en) 2015-08-29 2019-08-27 Bragi GmbH Power control for battery powered personal area network device system and method
US10398374B2 (en) 2016-11-04 2019-09-03 Bragi GmbH Manual operation assistance with earpiece with 3D sound cues
US10412493B2 (en) 2016-02-09 2019-09-10 Bragi GmbH Ambient volume modification through environmental microphone feedback loop system and method
US10412478B2 (en) 2015-08-29 2019-09-10 Bragi GmbH Reproduction of ambient environmental sound for acoustic transparency of ear canal device system and method
US10433788B2 (en) 2016-03-23 2019-10-08 Bragi GmbH Earpiece life monitor with capability of automatic notification system and method
US10448139B2 (en) 2016-07-06 2019-10-15 Bragi GmbH Selective sound field environment processing system and method
US10470709B2 (en) 2016-07-06 2019-11-12 Bragi GmbH Detection of metabolic disorders using wireless earpieces
US10506328B2 (en) 2016-03-14 2019-12-10 Bragi GmbH Explosive sound pressure level active noise cancellation
US10528713B2 (en) 2017-08-01 2020-01-07 Motorola Solutions, Inc. Distributed biometric identification system for a mobile environment
US10546110B2 (en) 2017-10-11 2020-01-28 Qualcomm Incorporated Systems and methods for context-based device address generation
US10582289B2 (en) 2015-10-20 2020-03-03 Bragi GmbH Enhanced biometric control systems for detection of emergency events system and method
US10620698B2 (en) 2015-12-21 2020-04-14 Bragi GmbH Voice dictation systems using earpiece microphone system and method
US10681450B2 (en) 2016-11-04 2020-06-09 Bragi GmbH Earpiece with source selection within ambient environment
US10681449B2 (en) 2016-11-04 2020-06-09 Bragi GmbH Earpiece with added ambient environment
US10708699B2 (en) 2017-05-03 2020-07-07 Bragi GmbH Hearing aid with added functionality
US10848966B1 (en) * 2019-06-12 2020-11-24 Caterpillar Inc. Wireless access system for controlling access to a device
US10893353B2 (en) 2016-03-11 2021-01-12 Bragi GmbH Earpiece with GPS receiver
US10896665B2 (en) 2016-11-03 2021-01-19 Bragi GmbH Selective audio isolation from body generated sound system and method
US10904653B2 (en) 2015-12-21 2021-01-26 Bragi GmbH Microphone natural speech capture voice dictation system and method
US11012438B2 (en) 2014-09-30 2021-05-18 Apple Inc. Biometric device pairing
US11013445B2 (en) 2017-06-08 2021-05-25 Bragi GmbH Wireless earpiece with transcranial stimulation
CN112989306A (en) * 2021-03-11 2021-06-18 读书郎教育科技有限公司 Unlocking method of child tablet
US11064408B2 (en) 2015-10-20 2021-07-13 Bragi GmbH Diversity bluetooth system and method
US11116415B2 (en) 2017-06-07 2021-09-14 Bragi GmbH Use of body-worn radar for biometric measurements, contextual awareness and identification
US11178142B2 (en) 2017-06-23 2021-11-16 Hewlett-Packard Development Company, L.P. Biometric data synchronization devices
US11244526B2 (en) 2015-02-04 2022-02-08 Proprius Technologies S.A.R.L. Keyless access control with neuro and neuromechanical fingerprints
US11272367B2 (en) 2017-09-20 2022-03-08 Bragi GmbH Wireless earpieces for hub communications
US11750603B2 (en) * 2015-05-20 2023-09-05 Verizon Patent And Licensing Inc. System and method for authenticating users across devices

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6717068B2 (en) * 2016-06-13 2020-07-01 コニカミノルタ株式会社 Information processing terminal, information processing system, program, and control method
CN109716854B (en) * 2017-05-31 2021-12-31 华为技术有限公司 Connection establishing method, device, system and medium
CN107426393B (en) * 2017-07-13 2019-08-02 Oppo广东移动通信有限公司 Solve lock control method and Related product
CN107465512B (en) * 2017-07-13 2020-01-14 Oppo广东移动通信有限公司 Authorization processing method and related product
CN108875337A (en) * 2017-12-12 2018-11-23 北京视联动力国际信息技术有限公司 A kind of unlocking method and system
US10819507B2 (en) * 2017-12-28 2020-10-27 Intel Corporation Secure key sharing between a sensor and a computing platform using symmetric key cryptography
CN109086598B (en) * 2018-07-18 2020-08-21 李扬渊 Method, device and system for secure pairing
CN110602309A (en) * 2019-08-02 2019-12-20 华为技术有限公司 Device unlocking method and system and related device
CN110505295B (en) * 2019-08-20 2022-04-29 创新先进技术有限公司 Unlocking information setting method, device and equipment
CN110674486A (en) * 2019-09-25 2020-01-10 珠海格力电器股份有限公司 Terminal security control method, storage medium and terminal equipment
RU2723667C1 (en) * 2020-01-11 2020-06-17 Илья Владимирович Редкокашин Method of transmitting personal information

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070050303A1 (en) * 2005-08-24 2007-03-01 Schroeder Dale W Biometric identification device
US20070106895A1 (en) * 2005-11-04 2007-05-10 Kung-Shiuh Huang Biometric non-repudiation network security systems and methods
US20070150415A1 (en) * 2005-12-22 2007-06-28 Bundy Ross E Method and apparatus for creating and entering a PIN code
US20090325491A1 (en) * 2008-06-05 2009-12-31 Bell Robert T System for utilizing identity based on pairing of wireless devices
US20100138666A1 (en) * 2008-12-01 2010-06-03 Neil Patrick Adams Simplified multi-factor authentication
US20110047384A1 (en) * 2009-08-21 2011-02-24 Qualcomm Incorporated Establishing an ad hoc network using face recognition
US20110191837A1 (en) * 2008-09-26 2011-08-04 Koninklijke Philips Electronics N.V. Authenticating a device and a user
US20130179944A1 (en) * 2012-01-11 2013-07-11 Douglas Everett Kozlay Personal area network (PAN) ID-authenticating systems, apparatus, method
US20140046664A1 (en) * 2012-08-13 2014-02-13 Plantronics, Inc. Secure Device Pairing Using Voice Input
US20140068744A1 (en) * 2012-09-06 2014-03-06 Plantronics, Inc. Surrogate Secure Pairing of Devices
US8694784B1 (en) * 2012-10-09 2014-04-08 Sap Ag Secure client-side key storage for web applications
US20140136720A1 (en) * 2012-11-14 2014-05-15 International Business Machines Corportion Biometric-based wireless device association
US20140325220A1 (en) * 2013-03-17 2014-10-30 David Tunnell "Unpassword": Risk Aware End-to-End Multi-Factor Authentication Via Dynamic Pairing
US20150028996A1 (en) * 2013-07-25 2015-01-29 Bionym Inc. Preauthorized wearable biometric device, system and method for use thereof
US20150077224A1 (en) * 2013-09-19 2015-03-19 Echostar Technologies L.L.C. Apparatus, method and article for security by pairing of devices
US20150163221A1 (en) * 2013-12-05 2015-06-11 Sony Corporation System and method for allowing access to electronic devices using a body area network
US20150186636A1 (en) * 2013-12-28 2015-07-02 Francis M. Tharappel Extending user authentication across a trust group of smart devices
US20150257004A1 (en) * 2014-03-07 2015-09-10 Cellco Partnership D/B/A Verizon Wireless Symbiotic biometric security

Family Cites Families (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2233942A1 (en) 1996-09-18 1998-03-26 Dew Engineering And Development Limited Biometric identification system for providing secure access
US6167517A (en) 1998-04-09 2000-12-26 Oracle Corporation Trusted biometric client authentication
US6178506B1 (en) * 1998-10-23 2001-01-23 Qualcomm Inc. Wireless subscription portability
US20020056043A1 (en) 1999-01-18 2002-05-09 Sensar, Inc. Method and apparatus for securely transmitting and authenticating biometric data over a network
US7155163B2 (en) * 2001-01-09 2006-12-26 Agere Systems Inc. Unified passcode pairing of piconet devices
US20040073795A1 (en) * 2002-10-10 2004-04-15 Jablon David P. Systems and methods for password-based connection
US7023320B2 (en) 2003-06-26 2006-04-04 Motorola, Inc. System and method for preventing unauthorized use of a device
SE0400308L (en) 2004-02-12 2005-06-28 Precise Biometrics Ab Portable data carrier, external setup, system and wireless data transfer method
US7378939B2 (en) 2004-03-30 2008-05-27 Sengupta Uttam K Method and apparatus for providing proximity based authentication, security, and notification in a wireless system
US20060116107A1 (en) * 2004-11-24 2006-06-01 Hulvey Robert W System and method for pairing wireless headsets and headphones
CN101124769A (en) 2004-12-20 2008-02-13 普罗克森斯有限责任公司 Biometric personal data key (PDK) authentication
RU2007127725A (en) 2004-12-20 2009-01-27 ПРОКСЕНС, ЭлЭлСи (US) PERSONAL DATA (PDK) AUTHENTICATION BY BIOMETRIC KEY
US8000502B2 (en) 2005-03-09 2011-08-16 Sandisk Technologies Inc. Portable memory storage device with biometric identification security
US7865140B2 (en) 2005-06-14 2011-01-04 The Invention Science Fund I, Llc Device pairing via intermediary device
US7925022B2 (en) 2005-05-23 2011-04-12 The Invention Science Fund I, Llc Device pairing via device to device contact
US7536304B2 (en) 2005-05-27 2009-05-19 Porticus, Inc. Method and system for bio-metric voice print authentication
US8438647B2 (en) 2005-07-14 2013-05-07 Imation Corp. Recovery of encrypted data from a secure storage device
CA2650662A1 (en) * 2006-04-24 2007-11-08 Encryptakey, Inc. Portable device and methods for performing secure transactions
US20070260876A1 (en) * 2006-05-05 2007-11-08 Research In Motion Limited Method and system for sending secure messages
US7904718B2 (en) 2006-05-05 2011-03-08 Proxense, Llc Personal digital key differentiation for secure transactions
US20080137859A1 (en) * 2006-12-06 2008-06-12 Ramanathan Jagadeesan Public key passing
US8027518B2 (en) 2007-06-25 2011-09-27 Microsoft Corporation Automatic configuration of devices based on biometric data
US8854966B2 (en) 2008-01-10 2014-10-07 Apple Inc. Apparatus and methods for network resource allocation
US8943326B2 (en) 2008-01-29 2015-01-27 Qualcomm Incorporated Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
US8244211B2 (en) 2008-02-07 2012-08-14 Inflexis Llc Mobile electronic security apparatus and method
US9398046B2 (en) * 2008-03-06 2016-07-19 Qualcomm Incorporated Image-based man-in-the-middle protection in numeric comparison association models
US20090287929A1 (en) * 2008-05-15 2009-11-19 Lucent Technologies Inc. Method and apparatus for two-factor key exchange protocol resilient to password mistyping
US20100042841A1 (en) * 2008-08-15 2010-02-18 Neal King Updating and Distributing Encryption Keys
US20110106954A1 (en) 2008-09-26 2011-05-05 Manjirnath Chatterjee System and method for inductively pairing devices to share data or resources
US8850045B2 (en) 2008-09-26 2014-09-30 Qualcomm Incorporated System and method for linking and sharing resources amongst devices
CN102292731A (en) 2009-01-30 2011-12-21 精密生物测定股份公司 Password protected secure device
US8190129B2 (en) 2009-06-22 2012-05-29 Mourad Ben Ayed Systems for three factor authentication
CA2772213A1 (en) * 2009-09-04 2011-03-10 Thomas Szoke A personalized multifunctional access device possessing an individualized form of authenticating and controlling data exchange
US8776215B2 (en) * 2009-11-06 2014-07-08 Microsoft Corporation Credential device pairing
US10104183B2 (en) 2010-06-22 2018-10-16 Microsoft Technology Licensing, Llc Networked device authentication, pairing and resource sharing
EP2518932A3 (en) * 2010-10-05 2015-11-18 Brandenburgische Technische Universität Cottbus-Senftenberg A method of password-based authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system
US20120143707A1 (en) 2010-12-07 2012-06-07 Deepak Jain Executing Reader Application
TWM415369U (en) 2011-03-03 2011-11-01 Pingtung Christian Hospital Biologic feature identification system
US9264897B2 (en) 2011-03-30 2016-02-16 Qualcomm Incorporated Pairing and authentication process between a host device and a limited input wireless device
US9032493B2 (en) 2011-03-31 2015-05-12 Intel Corporation Connecting mobile devices, internet-connected vehicles, and cloud services
US20130036017A1 (en) 2011-08-05 2013-02-07 Ivason Galloway Financial card for online fund transfer and method therefor
CN102263643B (en) 2011-08-22 2014-04-23 盛乐信息技术(上海)有限公司 Data communication system and method based on voiceprint recognition
US8473748B2 (en) 2011-09-27 2013-06-25 George P. Sampas Mobile device-based authentication
EP2786288A2 (en) 2011-10-28 2014-10-08 Debiotech S.A. Communication secured between a medical device and its remote device
US10165440B2 (en) * 2012-01-17 2018-12-25 Entrust, Inc. Method and apparatus for remote portable wireless device authentication
US9344413B2 (en) 2012-01-18 2016-05-17 OneID, Inc. Methods and systems for device disablement
US20140129843A1 (en) * 2012-11-02 2014-05-08 Weidong Shi Methods and Apparatus for Managing Service Access Using a Touch-Display Device Integrated with Fingerprint Imager
US20130298208A1 (en) * 2012-05-06 2013-11-07 Mourad Ben Ayed System for mobile security
US8467770B1 (en) 2012-08-21 2013-06-18 Mourad Ben Ayed System for securing a mobile terminal
US20140068725A1 (en) 2012-08-31 2014-03-06 Apple Inc. Wireless Pairing and Communication Between Devices Using Biometric Data
US10171458B2 (en) 2012-08-31 2019-01-01 Apple Inc. Wireless pairing and communication between devices using biometric data
US9064109B2 (en) * 2012-12-20 2015-06-23 Intel Corporation Privacy enhanced key management for a web service provider using a converged security engine
US20140237256A1 (en) * 2013-02-17 2014-08-21 Mourad Ben Ayed Method for securing data using a disposable private key
CN103310142B (en) 2013-05-22 2015-10-07 复旦大学 Based on the human-computer fusion safety certifying method of wearable device
US9077693B2 (en) * 2013-09-23 2015-07-07 Netflix, Inc. Securely connecting control device to target device
SG2013076898A (en) * 2013-10-16 2015-05-28 Certis Cisco Security Pte Ltd Method and system for controlling access to wireless apparatuses
JP2017507549A (en) * 2013-12-30 2017-03-16 バスコ データ セキュリティー インターナショナル ゲゼルシャフト ミット ベシュレンクテル ハフツング Authentication device with Bluetooth interface
KR102101308B1 (en) * 2014-02-05 2020-04-16 애플 인크. Uniform communication protocols for communication between controllers and accessories
US9628273B2 (en) * 2014-04-30 2017-04-18 Thamir Alshammari Cryptographic method and system for secure authentication and key exchange
CN205050141U (en) 2014-09-30 2016-02-24 苹果公司 Electronic equipment

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070050303A1 (en) * 2005-08-24 2007-03-01 Schroeder Dale W Biometric identification device
US20070106895A1 (en) * 2005-11-04 2007-05-10 Kung-Shiuh Huang Biometric non-repudiation network security systems and methods
US20070150415A1 (en) * 2005-12-22 2007-06-28 Bundy Ross E Method and apparatus for creating and entering a PIN code
US20090325491A1 (en) * 2008-06-05 2009-12-31 Bell Robert T System for utilizing identity based on pairing of wireless devices
US20110191837A1 (en) * 2008-09-26 2011-08-04 Koninklijke Philips Electronics N.V. Authenticating a device and a user
US20100138666A1 (en) * 2008-12-01 2010-06-03 Neil Patrick Adams Simplified multi-factor authentication
US20110047384A1 (en) * 2009-08-21 2011-02-24 Qualcomm Incorporated Establishing an ad hoc network using face recognition
US20130179944A1 (en) * 2012-01-11 2013-07-11 Douglas Everett Kozlay Personal area network (PAN) ID-authenticating systems, apparatus, method
US20140046664A1 (en) * 2012-08-13 2014-02-13 Plantronics, Inc. Secure Device Pairing Using Voice Input
US20140068744A1 (en) * 2012-09-06 2014-03-06 Plantronics, Inc. Surrogate Secure Pairing of Devices
US8694784B1 (en) * 2012-10-09 2014-04-08 Sap Ag Secure client-side key storage for web applications
US20140136720A1 (en) * 2012-11-14 2014-05-15 International Business Machines Corportion Biometric-based wireless device association
US20140325220A1 (en) * 2013-03-17 2014-10-30 David Tunnell "Unpassword": Risk Aware End-to-End Multi-Factor Authentication Via Dynamic Pairing
US20150028996A1 (en) * 2013-07-25 2015-01-29 Bionym Inc. Preauthorized wearable biometric device, system and method for use thereof
US20150077224A1 (en) * 2013-09-19 2015-03-19 Echostar Technologies L.L.C. Apparatus, method and article for security by pairing of devices
US20150163221A1 (en) * 2013-12-05 2015-06-11 Sony Corporation System and method for allowing access to electronic devices using a body area network
US20150186636A1 (en) * 2013-12-28 2015-07-02 Francis M. Tharappel Extending user authentication across a trust group of smart devices
US20150257004A1 (en) * 2014-03-07 2015-09-10 Cellco Partnership D/B/A Verizon Wireless Symbiotic biometric security

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10171458B2 (en) 2012-08-31 2019-01-01 Apple Inc. Wireless pairing and communication between devices using biometric data
US11012438B2 (en) 2014-09-30 2021-05-18 Apple Inc. Biometric device pairing
US10498729B2 (en) * 2015-01-06 2019-12-03 Samsung Electronics Co., Ltd. Device and method for transmitting message
US20180026975A1 (en) * 2015-01-06 2018-01-25 Samsung Electronics Co., Ltd. Device and method for transmitting message
US9577992B2 (en) * 2015-02-04 2017-02-21 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
US9590986B2 (en) 2015-02-04 2017-03-07 Aerendir Mobile Inc. Local user authentication with neuro and neuro-mechanical fingerprints
US20170111359A1 (en) * 2015-02-04 2017-04-20 Aerendir Mobile Inc. Data encryption/decryption using neurological fingerprints
US9853976B2 (en) * 2015-02-04 2017-12-26 Proprius Technologies S.A.R.L. Data encryption/decryption using neurological fingerprints
US11244526B2 (en) 2015-02-04 2022-02-08 Proprius Technologies S.A.R.L. Keyless access control with neuro and neuromechanical fingerprints
US20160234174A1 (en) * 2015-02-04 2016-08-11 Aerendir Mobile Inc. Data encryption/decryption using neuro and neuro-mechanical fingerprints
US11750603B2 (en) * 2015-05-20 2023-09-05 Verizon Patent And Licensing Inc. System and method for authenticating users across devices
US10297911B2 (en) 2015-08-29 2019-05-21 Bragi GmbH Antenna for use in a wearable device
US10397688B2 (en) 2015-08-29 2019-08-27 Bragi GmbH Power control for battery powered personal area network device system and method
US10412478B2 (en) 2015-08-29 2019-09-10 Bragi GmbH Reproduction of ambient environmental sound for acoustic transparency of ear canal device system and method
US11064408B2 (en) 2015-10-20 2021-07-13 Bragi GmbH Diversity bluetooth system and method
US10582289B2 (en) 2015-10-20 2020-03-03 Bragi GmbH Enhanced biometric control systems for detection of emergency events system and method
US11419026B2 (en) 2015-10-20 2022-08-16 Bragi GmbH Diversity Bluetooth system and method
US11683735B2 (en) 2015-10-20 2023-06-20 Bragi GmbH Diversity bluetooth system and method
US20170180125A1 (en) * 2015-12-17 2017-06-22 Deutsche Post Ag Device and method for the personalized provision of a key
US11496827B2 (en) 2015-12-21 2022-11-08 Bragi GmbH Microphone natural speech capture voice dictation system and method
US10904653B2 (en) 2015-12-21 2021-01-26 Bragi GmbH Microphone natural speech capture voice dictation system and method
US10620698B2 (en) 2015-12-21 2020-04-14 Bragi GmbH Voice dictation systems using earpiece microphone system and method
US10412493B2 (en) 2016-02-09 2019-09-10 Bragi GmbH Ambient volume modification through environmental microphone feedback loop system and method
US11336989B2 (en) 2016-03-11 2022-05-17 Bragi GmbH Earpiece with GPS receiver
US10893353B2 (en) 2016-03-11 2021-01-12 Bragi GmbH Earpiece with GPS receiver
US11700475B2 (en) 2016-03-11 2023-07-11 Bragi GmbH Earpiece with GPS receiver
US20170262625A1 (en) * 2016-03-14 2017-09-14 Ricoh Company, Ltd. Information processing apparatus and information processing method
US10506328B2 (en) 2016-03-14 2019-12-10 Bragi GmbH Explosive sound pressure level active noise cancellation
US10433788B2 (en) 2016-03-23 2019-10-08 Bragi GmbH Earpiece life monitor with capability of automatic notification system and method
US10313781B2 (en) 2016-04-08 2019-06-04 Bragi GmbH Audio accelerometric feedback through bilateral ear worn device system and method
US10169561B2 (en) * 2016-04-28 2019-01-01 Bragi GmbH Biometric interface system and method
US20180232512A1 (en) * 2016-04-28 2018-08-16 Bragi GmbH Biometric Interface System and Method
US10448139B2 (en) 2016-07-06 2019-10-15 Bragi GmbH Selective sound field environment processing system and method
US10470709B2 (en) 2016-07-06 2019-11-12 Bragi GmbH Detection of metabolic disorders using wireless earpieces
WO2018013503A1 (en) * 2016-07-13 2018-01-18 Motorola Mobility Llc Electronic device with biometric authentication control of companion devices, and corresponding systems and methods
US10896665B2 (en) 2016-11-03 2021-01-19 Bragi GmbH Selective audio isolation from body generated sound system and method
US11908442B2 (en) 2016-11-03 2024-02-20 Bragi GmbH Selective audio isolation from body generated sound system and method
US11417307B2 (en) 2016-11-03 2022-08-16 Bragi GmbH Selective audio isolation from body generated sound system and method
US10397690B2 (en) 2016-11-04 2019-08-27 Bragi GmbH Earpiece with modified ambient environment over-ride function
US10681449B2 (en) 2016-11-04 2020-06-09 Bragi GmbH Earpiece with added ambient environment
US10681450B2 (en) 2016-11-04 2020-06-09 Bragi GmbH Earpiece with source selection within ambient environment
US10398374B2 (en) 2016-11-04 2019-09-03 Bragi GmbH Manual operation assistance with earpiece with 3D sound cues
US20180145956A1 (en) * 2016-11-21 2018-05-24 International Business Machines Corporation Touch-share credential management on multiple devices
US10667134B2 (en) * 2016-11-21 2020-05-26 International Business Machines Corporation Touch-share credential management on multiple devices
US10708699B2 (en) 2017-05-03 2020-07-07 Bragi GmbH Hearing aid with added functionality
US11116415B2 (en) 2017-06-07 2021-09-14 Bragi GmbH Use of body-worn radar for biometric measurements, contextual awareness and identification
US11013445B2 (en) 2017-06-08 2021-05-25 Bragi GmbH Wireless earpiece with transcranial stimulation
US11911163B2 (en) 2017-06-08 2024-02-27 Bragi GmbH Wireless earpiece with transcranial stimulation
US11178142B2 (en) 2017-06-23 2021-11-16 Hewlett-Packard Development Company, L.P. Biometric data synchronization devices
US10528713B2 (en) 2017-08-01 2020-01-07 Motorola Solutions, Inc. Distributed biometric identification system for a mobile environment
US10344960B2 (en) 2017-09-19 2019-07-09 Bragi GmbH Wireless earpiece controlled medical headlight
US11272367B2 (en) 2017-09-20 2022-03-08 Bragi GmbH Wireless earpieces for hub communications
US11711695B2 (en) 2017-09-20 2023-07-25 Bragi GmbH Wireless earpieces for hub communications
US10546110B2 (en) 2017-10-11 2020-01-28 Qualcomm Incorporated Systems and methods for context-based device address generation
US10848966B1 (en) * 2019-06-12 2020-11-24 Caterpillar Inc. Wireless access system for controlling access to a device
CN112989306A (en) * 2021-03-11 2021-06-18 读书郎教育科技有限公司 Unlocking method of child tablet

Also Published As

Publication number Publication date
US20180205728A1 (en) 2018-07-19
CN205050141U (en) 2016-02-24
WO2016054263A1 (en) 2016-04-07
CN205721792U (en) 2016-11-23
US11012438B2 (en) 2021-05-18

Similar Documents

Publication Publication Date Title
US11012438B2 (en) Biometric device pairing
EP3428818B1 (en) Identity authentication method and system
US9531710B2 (en) Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication
WO2012042775A1 (en) Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
US9030290B2 (en) Vicinity-based multi-factor authentication
US20170316408A1 (en) Bionumerical Authentication Systems
KR101937136B1 (en) System and method for authenticating identity using multi-biometrics
US20150213452A1 (en) Electronic payment system and method
US9465974B2 (en) Electronic device providing downloading of enrollment finger biometric data via short-range wireless communication
US20150016697A1 (en) Finger biometric sensor data synchronization via a cloud computing device and related methods
US20150016698A1 (en) Electronic device providing biometric authentication based upon multiple biometric template types and related methods
KR101345018B1 (en) Teminal and security certification system therewith
KR101219957B1 (en) Authentication method, device and system using biometrics and recording medium for the same
US9465818B2 (en) Finger biometric sensor data synchronization via a cloud computing device and related methods
US8812863B2 (en) Personal biometric system and method for wireless device control
US10679028B2 (en) Method and apparatus for performing authentication based on biometric information
US10785218B2 (en) Authorization authentication method, device and system
WO2019245437A1 (en) Method and electronic device for authenticating a user
KR101674125B1 (en) Method and apparatus for connecting multi-terminal by using authentication
KR20160053852A (en) Method for Operating OTP
KR102596072B1 (en) Method and system for authenticating bio information
CN109005158B (en) Authentication method of dynamic gesture authentication system based on fuzzy safe
US20230344827A1 (en) Multi-user biometric authentication
US20210397687A1 (en) Method for authenticating a user on client equipment
US20220027922A1 (en) Method, Apparatuses and System for Authorizing a Third Party

Legal Events

Date Code Title Description
AS Assignment

Owner name: APPLE INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRADLEY, BOB;MARCINIAK, CRAIG A.;SIGNING DATES FROM 20150911 TO 20151230;REEL/FRAME:037395/0693

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION