CN108875340A - Use the electronic device of remote user's biological characteristic - Google Patents
Use the electronic device of remote user's biological characteristic Download PDFInfo
- Publication number
- CN108875340A CN108875340A CN201810464545.6A CN201810464545A CN108875340A CN 108875340 A CN108875340 A CN 108875340A CN 201810464545 A CN201810464545 A CN 201810464545A CN 108875340 A CN108875340 A CN 108875340A
- Authority
- CN
- China
- Prior art keywords
- electronic equipment
- user
- access
- data
- operation mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Selective Calling Equipment (AREA)
Abstract
The present invention relates to " using the electronic device of remote user's biological characteristic ".The invention discloses a kind of electronic equipment, there is the electronic equipment at least one operation setting such as power supply to be arranged, which has at least first state and the second state.The electronic equipment may also include the access controller that can receive status data and authorization data from external source such as remote controler.Access controller can enable the state of operation setting when receiving from proper authorization data receiving from the output at least one associated biometric sensor of remote controler or relevant with the output.
Description
Cross reference to related applications
Present patent application is entitled " the Electronic Device Operation for being filed on January 23rd, 2014
The part continuation application of the U.S. Patent application 14/162,030 of Using Remote User Biometrics ", the patent
The disclosure full text of application is incorporated herein accordingly.
Technical field
This disclosure relates to electronic device and control, and relate more specifically to using with biometric sensor
Remote input equipment operation electronic equipment.
Background technique
Many electronic equipments include the multiple manual controllable characteristics and setting that user can modify frequently.For example, television set can
Including operational controls, power supply, volume, channel, screen intensity etc..Other electronic equipments such as thermostat may include that operation is empty
It adjusts, the control of heater and fan.Other examples of electronic equipment with manual controllable characteristics and setting may include on knee
Computer and desktop computer, smart phone, tablet computer, home automation controllers, security system, vehicle, household electrical appliance,
Television set, set-top box etc..
The manual controllable characteristics of electronic equipment can provide individualized experience for user.However, many electronic equipments can be intended to
It is enjoyed for multiple users.For example, multiple members of family can share a television set.In many cases, preference can be because of user
And it is different.In some instances, the first user can reduce the Quality of experience of second user to the change that electronic equipment is arranged.This
Outside, some electronic equipments may include the feature or option for being not suitable for certain user's modification or enabling.
In many cases, electronic equipment may include access limited features such as pass code or password with prevent to be arranged into
Row is improperly modified.For example, television set can need pass code to tune specific channel.In other examples, home security system
Password can be needed to cancel false alarm.
Remember and correct conveying pin or pass code are with the limited accass feature for enjoying electronic equipment can reduce authorized user
Quality of experience.In some cases, when being instructed to input pass code or close by Miniature remote control device or compact input panel
When code, user can be by additional setback.
In other examples, the user with limited access authority can not expect that obtain pass code or password does not permit to access
The feature that family allowable is enjoyed.
In addition, if password or pass code are lost, pass into silence or be found, then previously authorized user can need time-consuming
And cumbersome licensing process again.
Therefore, the needs to the electronic equipment with improved limited accass feature may be present at present.
Summary of the invention
The embodiment described herein can be related to at least one operation setting such as power supply setting electronic equipment or
Using the form of the electronic equipment, which has at least first state and the second state.Electronic equipment may also include can
Receive the access controller of status data and authorization data from external source such as remote controler.Receiving correctly authorization number
According to when, access controller can enable the state of operation setting.
In many cases, status data may include the first mode of operation or the second mode of operation corresponding to electronic equipment
Instruction.For example, status data may include the instruction for opening TV set power, or in another embodiment, including mention
The instruction of high thermostat temperature.In another embodiment, status data may include opening the instruction of garage door or deactivating to pacify
The instruction of full alarm.It is appreciated that status data, instruction and operation setting can become substantially between embodiment and embodiment
Change.
In many cases, authorization data can be at least partly from the biology spy for the user for attempting to operate electronic equipment
Intrinsic characteristics.For example, authorization data can be original biological attribute data, such as fingerprint image.In other examples, number is authorized
According to the output that can be using biological characteristic recognition information algorithm as input.It is calculated for example, the algorithm can be message-abstract
Method, the implementation of Advanced Encryption Standard or any other One-Way Encryption or data processing algorithm.
Other embodiments as described herein can be related to the behaviour for controlling the electronic equipment for being similar to above-mentioned electronic equipment
Make the remote controler being arranged or the form using the remote controler.Remote controler may include the biological characteristic characteristic for being configured as detection user
At least one sensor.In some instances, sensor can be fingerprint sensor, or in other examples, sensor
It can be retina or iris sensor, electrocardiography transducer, vein imaging sensor, speech transducer or can objectively survey
Measure any other sensor of the unique biological feature of user.
Remote controler may also include the communication controler communicated with electronic equipment.Remote controler may also include be couple to sensor and
The processor of communication controler.Processor can be configured to the biological characteristic characteristic that reception and analysis detect and template biological is special
The measured value of similitude between intrinsic characteristics.
Template properties are storable in remote controler or in other embodiments, template is storable in different location, all
It is such as stored on the server with processor communication.Once receiving the measured value of similitude, processor just can determine similitude
It whether is more than specific selected threshold value.Such as, it may be unnecessary to the perfection between template and the biological characteristic characteristic detected
Matching.Threshold value can change over time.If similitude is more than threshold value, processor can indicate communication controler to electronics
Equipment sends signal.
Other embodiments as described herein are related to the method or use of a kind of limited accass feature for operating electronic equipment
The form of this method, the described method comprises the following steps:The signal for corresponding at least partially to biological characteristic characteristic is received, is determined
Whether the signal includes authorization data, and once determine that the signal includes authorization data, measure the authorization data with
Similitude between template authorization data.Then, it after determining that similitude is more than selected threshold value, can send instructions to
Electronic equipment is to enable limited accass feature.
Detailed description of the invention
Referring now in the representative embodiment shown in attached drawing.It is not intended to it should be appreciated that being described below by embodiment party
Case is limited to a preferred embodiment.On the contrary, it is intended to cover can be included in the reality being defined by the following claims
Apply alternative alternative form, modification and the equivalent form in the spirit and scope of scheme.
Fig. 1 be the system for the limited accass feature that electronic equipment is operated using the biological attribute data of long range acquisition etc.
Axonometric drawing.
Fig. 2 is the block diagram for showing the emic example of embodiment shown in FIG. 1.
Fig. 3 is the flow chart for showing the method for limited accass feature of operation electronic equipment.
Fig. 4 is the flow chart for showing using biological characteristic characteristic the method for the limited accass feature for operating electronic equipment.
Similar, related or identical project is indicated using the same or similar appended drawing reference in different figures.
Specific embodiment
The embodiment described herein relates to the use of the limited visit of the biological attribute data operation electronic equipment of long range acquisition
The method and apparatus for asking feature.
For example, electronic equipment can be may include operational controls power supply, volume, channel, screen intensity etc. TV
Machine.For another example, thermostat may include the control of operating air conditioner, heater and fan.Electronic equipment with operating characteristics and setting
Other examples may include laptop computer and desktop computer, smart phone, tablet computer, home automation controllers,
Wearable device, health equipment, sports equipment, accessory device, security system, vehicle, household electrical appliance, television set, set-top box etc..
In these and associated exemplary, electronic equipment may include limited access feature.For example, television set can need user
Pass code check specific channel, or in other cases, specific time in one day after or before, turns on TV
Machine.In different examples, thermostat can need physical key to change temperature or setting.In other examples, family
Security system can need fetcher code to equip with arms so as to the system of equiping with arms or deactivation system.Other electronic equipments can have other limited
Access feature.
In certain embodiments, electronic equipment may include the limited accass feature for preventing or allowing to modify electronic equipment
Access controller.Access controller can distinguish candidate user, approved user and be rejected user.As used herein, " candidate uses
Family " includes all unknown subscribers of electronic equipment.As used herein, " approved user " or " authorized user " includes being allowed to visit
Ask and operate all users of the limited accass feature of electronic equipment.Similarly, as used herein, " it is rejected user " or " not
Authorized user " includes all users for not being allowed access to or operating the limited accass feature of electronic equipment.
In some embodiments, access controller can receive the status number of the remote controler from external source such as television set
According to both with authorization data.For example, status data may include the identification requested limited accass channel of candidate user, and authorize
Data may include that candidate user is identified as to the data of approved user for certain.For example, in certain embodiments, authorizing number
According to can be fetcher code.In other cases, authorization data may include the information for identifying approved user.In other situation
Under, authorization data may include information associated with approved user group.
Candidate user can be identified as awarding by other embodiments as described herein by the biological attribute data of long range acquisition
Weigh user.In some cases, biological attribute data can be special from the objective biological characteristic for being configured as detection candidate user
The output or related to the output of the sensor of property.For example, sensor can be fingerprint sensor, the fingerprint sensor is detectable
The ridge of candidate user fingerprint and the unique arrangement of paddy.In another example, sensor can be detectable candidate user eyes
The retina or iris sensor of unique variation in structure.Other examples of biometric sensor may include electrocardiogram sensing
Device, vein imaging sensor, speech transducer, optical sensor, pyroelectric sensor or the uniqueness that user can be objectively measured
Any other sensor of biological characteristic characteristic.
In other examples, more than one sensor and/or more than one sensor type can be synergistically used for from multiple
Candidate user is identified as authorized user for certain by the biological characteristic characteristic of independent measurement.For example, in certain embodiments, it is more
A fingerprint sensor can be used for through multiple fingerprint recognition candidate users.For another example, the output from fingerprint sensor and from quiet
The output of arteries and veins imaging sensor can be used for identifying candidate user by fingerprint and vein pattern.In this way, term " sensor " can
It is understood to cover both single and multiple Sensor Implementations.It in some cases, can be independently or collaboratively using not
The living things feature recognition of candidate user is provided with multiple sensors of living things feature recognition type.
Biometric sensor may include the portable remote controller communicated in the electronic equipment for attempting to operate with candidate user
It is interior.For example, sensor can be included in the remote controler of television set, or in other examples, sensor can be included in control
For being used together with domestic automation system in panel processed.In other examples, sensor may include it is multi-functional just
In the formula electronic equipment of taking such as smart phone, wearable device, health monitor or other similar equipment.It is real in these and correlation
It applies in each of scheme, portable remote controller can receive the biological attribute data from biometric sensor, the biology
Characteristic can be compared with template biological characteristic, candidate user is identified as approved user for certain, or
In alternative form, candidate user is identified as to be rejected user.Template biological characteristic can be pre-recorded in the training process
Or it is otherwise collected from authorized user.For example, template data can be the fingerprint of the authorized user previously measured.
In many related embodiments, it may be determined that between the biological attribute data and template biological characteristic of measurement
Similarity measure.In many examples, similarity measure can be linear.For example, if the biological attribute data of measurement
Identical as template biological characteristic, then similarity measure can be equal to 100.In another example, if the biology of measurement
The half (for example, partial fingerprints matching) of characteristic only matching template data, then similarity measure can be equal to 50.Another
In a example, if the very fraction of the biological attribute data only matching template data of measurement, similarity measure can wait
In 10.Algorithm, method or the process of similitude between biological attribute data and template biological characteristic for determining measurement
It can not be identical between embodiment and embodiment, sensor and sensor or template and template.It can be in various embodiments
Use different scale and measurement method and/or similarity analysis.For example, in certain embodiments, logarithmic scale can be used
Measure similitude.
Once calculating, measured value that is determining or otherwise deriving similitude, certain embodiments can determine measurement
Similitude whether be more than specific selected threshold value.In certain embodiments, the biological attribute data of measurement can be set
The threshold value of the similitude of measurement between template biological characteristic, so that if it exceeds the threshold, the biology of measurement can be ratified
Characteristic.In this way, threshold value, which can limit, is identified as approved user institute associated with specific template for candidate user for certain
The confidence level needed.
For example, threshold value can be set to 90, so that only when the biological attribute data of measurement and template biological characteristic
The biological attribute data that just approval measures when changing less than 10.In another example, threshold value can be set to 51 so that only when
The biological attribute data of measurement is just ratified in the biological attribute data of measurement and the variation of template biological characteristic when being no more than 49.
It should be appreciated that 100 given scales are only example.In certain embodiments, can come without reference to any numerical scale
Determine the matching of the biological attribute data of the measurement for template.For example, matching may depend on the one of matching biological data
A or multiple features, rather than particular percentile or relative quantity.
In certain embodiments, selected threshold value can be set at least partly to consider sensor and/or similar
Error in property measured value.For example, if it is known that the output from specific similarity measurement value-based algorithm have error, then can be specific
Ground selects threshold value to reduce the probability of mistake approval.As used herein, " mistake approval " or " false positive " includes actually
Candidate user is identified as approved user when candidate user should be identified as unauthorized user.By selecting high threshold, through criticizing
Mutatis mutandis family can be sure that candidate user is less likely to be mistaken as approved user.
Although reducing the probability of mistake approval, high threshold can lead to the increase of the False Rejects to approved user.
As used herein, " False Rejects " should be identified as being identified as candidate user when authorized user including actually candidate user
Unauthorized user.
For example, the similitude for 80 measurement is no more than the threshold value for being 90, and without approval.If candidate user is practical
On be authorized user, then this example that can be False Rejects.Similarly, the similitude for 55 measurement is no more than the threshold for being 90
Value.If candidate user is actually unauthorized user, this can be the example really refused.
On the other hand, in the case where threshold value is 51, the similitude for 55 and 80 measurement can go through.In such case
Under, there is the candidate user of the similitude for 80 to go through.If candidate user is actually authorized user, this be can be very
The example just ratified.In addition, if candidate user is actually unauthorized user, then there is the time of the similitude of the measurement for 55
Family is selected to may make up wrong approval.
In this way, reducing the possibility that a possibility that threshold value is allowed to increase mistake approval reduces False Rejects as cost
Property.Equally, a possibility that threshold value is allowed to increase False Rejects is improved as cost come a possibility that reducing mistake approval.
In certain embodiments, it is associated not that limited accass features different from electronic equipment may be selected in authorized user
Same threshold value.For example, user can wish to limit the access to certain television channels and access max volume.In this case, it uses
Family can determine can be for not selecting the false positive of unauthorized channels troublesome for the false positive of louder volume.Similarly, it uses
Family can find, can be than more making us angry to the False Rejects for requesting access to unauthorized channels to the False Rejects for requesting access to louder volume
Fire.In other cases, threshold value can change over time, perhaps in alternative form or can be in limited accass feature
Change between limited accass feature.
Fig. 1 is the system that the limited accass feature of electronic equipment 120 is operated using the biological attribute data of long range acquisition
100 isometric views.System 100 may include electronic equipment 120 and remote controller equipment 110.Remote controller equipment can be set with electronics
Standby 120 communication, and can operate so that one or more instruction is transmitted to electronic equipment.For example, remote controler 110 may include and wrap
Include the wireless communication unit of the wireless communication unit compatibility in electronic equipment 120.For example, wireless communication unit can be used it is red
Outside, visible light, sound, Wi-Fi, bluetooth, near-field communication, power line transmission, radio or any other suitable wireless communication
Agreement or method.
Electronic equipment 120 is only shown as television set as example.In various specific implementations, electronic equipment can be energy
Enough any electronic equipments that instruction is received from remote controller equipment.This class of electronic devices may include one or more television sets, machine
Top box, desk-top calculating equipment, media controller, media player, lap-top computing devices, wearable device, is put down at media center
Plate calculates equipment, mobile computing device, cellular phone, smart phone, kitchen appliance, automobile, IP phone, display
Device, microphone, loudspeaker, video game console, HVAC (heat, ventilation and/or air-conditioning) system, lighting system and/or appoint
What his (one or more) electronic equipment.
Similarly, remote controller equipment 110 is only shown as to as example the special remote control with single control element 140
Device.In various specific implementations and embodiment, remote controller equipment, which can be, to transmit any of instruction to electronic equipment 120
Remote controller equipment.Such remote controller equipment may include one or more portable electronic devices, such as dedicated remote control equipment, just
Take formula electronic equipment, smart phone device, tablet device, stylus equipment, wearable device, health monitor or any other conjunction
Suitable electronic equipment.
Remote controller equipment 110 may include being configured as detecting at least one biological characteristic characteristic from candidate user 130
At least one sensor 140.As shown, sensor can be fingerprint sensor (such as capacitance type sensor, ultrasonic sensing
Device and/or other touch sensors), which can operate to detect at least one fingerprint.However, fingerprint sensor
It is only used as and is shown for example.Sensor 140 may include any amount of being able to detect the biological characteristic from candidate user 130
The biometric sensor of characteristic.For example, in certain embodiments, sensor 140 can be retina or iris sensor,
Electrocardiography transducer, vein imaging sensor, speech transducer or the unique biological spy that candidate user 130 can be objectively measured
Any other sensor of intrinsic characteristics.
In other specific implementations, sensor can (such as one or more cameras, inertia be passed for any kind of sensor
Sensor, photoelectric sensor etc.), the sensor can operate special to detect the unique biological characteristic of at least one of candidate user
Property.Such biological characteristic characteristic may include but be not limited to retina or face-image, palmmprint, gesture pattern, signature and/or candidate
The unique biological feature of any other type of user.In a further embodiment, remote controller equipment 140 may include more
In one element sensor element 140.For example, remote controller equipment may include multiple buttons or sensor, each button or biography
Sensor can result in send to electronic equipment 120 and instruct.Such instruction may include status information and/or authentication information.
In these and related embodiment, sensor element 140, which can receive, to be compared with template biological characteristic
Compared with biological attribute data will be waited candidate user 130 is identified as approved user for certain, or in alternative form
Family is selected to be identified as being rejected user.Template biological characteristic can be pre-recorded in the training process or otherwise from awarding
User is weighed to collect.For example, template data can be the fingerprint of the authorized user previously measured.
In some embodiments, remote controller equipment 140 may include the memory that can store multiple template.In these and phase
In the case of pass, when sensor element 140 is engaged by candidate user 130, each template can with returned by sensor element 140
Biological attribute data is compared.
For example, remote controller equipment 140 may include the memory for storing up to ten independent template datas.Work as candidate user
When 130 engagement transducer element 140, sensor element 140 can measure biological attribute data associated with candidate user.It connects down
Come, candidate biological attribute data can be compared with ten individual template datas.As described above, candidate biological attribute data
It may include the similitude measured between them compared with any specific template biological attribute data.
Once calculating, measured value that is determining or otherwise deriving similitude, certain embodiments can determine measurement
Similitude whether be more than specific selected threshold value.As described above, threshold value can be fixed, can be changed, or can be with
Other modes are edited by end user.In some embodiments, threshold value can be in limited accass feature between limited accass feature
Variation.
In such a way that first is exemplary, candidate user can hold the remote controller equipment with fingerprint sensor.Sensor can be determined
Any position of the position in the outer surface along remote controler.For example, sensor can be positioned in the bottom surface of remote controler, or another
In one example, sensor be can be positioned on the top surface of remote controler.When grasping remote controler, the finger of candidate user can be with
Fingerprint sensor alignment.Then, remote controler can detect finger along sensor surface exist, and can start by fingerprint be stored in
Template fingerprint in remote controler is compared.This process can authenticate candidate user as authorized user.
In this example, when another feature of certified user's operation remote controler, certified user can by
Certification is to operate this feature.However, if another user will hold remote controler and by his/her fingerprint and sensor pair
Standard, then remote controler can determine that second user is not authorized user.Then, certain spies of second user access remote controler are not allowed
Sign.For example, parent can be the authorized user of TV remote controller, so that when parent handles remote controler and by finger and fingerprint sensing
When device is aligned, remote controler can determine that parent is authorized user.Then, parent can be able to access that the limited accass feature of television set,
Without being prompted safety or authorization code.
On the other hand, children can be user only with limited access rights.If children grasp remote controler and by hands
Finger is aligned with the fingerprint sensor of remote controler, then children can not be allowed to pass through remote controller, and to access television set, (or other are electric
Sub- equipment) certain limited accass features.If children attempt to access that the limited accass feature of television set, television set can be prompted
Children input correct fetcher code.
In these and associated exemplary, status data and authentication data can be sent to electronic equipment by remote controler.For example, working as
When parent uses the remote controller operation television set with biometric sensor, remote controler can be when parent presses lower button every time
Television set is sent by status data and authorization data.In one embodiment, each feature of remote controler can lead to transmission
Instruction and authorization.For example, the instruction for turning on television set can issue TV by identification if pressing the power knob on remote controler
The authorization data of the user of machine request is realized.In many cases, the power supply for turning on television set may not be limited access feature.
Therefore, television set can ignore the authentication data sent after instruction.However, when attempting to access that limited accass feature, TV
Authorization data can be passed to access controller to determine whether authorization data allows to access requested feature by machine.
In other embodiments, for special characteristic, authorization data can be identical.In other words, for visiting
Ask that the authorization data of the power source features of television set can be identical for each user.In such example, electronic equipment can completely not
Know the identity of specific user.
In another exemplary embodiment, authorization data may include the living things feature recognition letter for confirming user identity
Breath.For example, if user's select button to be bought (for example, pay per view movie) to the content shown on television set,
The transmittable certification of remote controler and one or more information for buying the associated user identity of accounts to television set.
In a further embodiment, remote controler can send biological characteristic recognition information to third electronic equipment.For example, the
Three electronic equipments can be the certificate server both communicated with remote controler and television set.In this way, remote controler can not necessarily be known
Other specific user, but verification process can be unloaded to third electronic equipment.
Fig. 2 is the block diagram for showing the functional relationship 200 of the component of system 100 of Fig. 1.Remote controller equipment 210 and electronics are set
Standby 290 can operate with communicated with one another by one or more wired, wireless, locals and/or network communication connection and/or with one
Or multiple additional electronic devices 250 (the one or more calculating equipment such as configured in cloud computing configuration) are communicated.
As shown, remote controller equipment 210 may include one or more sensors 215, one or more processing units
220, (it can take but be not limited to magnetic storage medium, optical storage media, Magneto-optical storages and be situated between one or more storage mediums 230
The form of matter, read-only memory, random access memory, erasable and programable memory, flash memories etc.) and/or one
Or multiple communication component 240 (such as one or more wired and or wireless communications components, including but not limited to one or more
Bluetooth communication means, Wi-Fi communication component, infrared communication component, ethernet communication component etc.), communication component 240 can be used for
Electronic equipment 290 and/or one or more additional electronic devices 250 communicate.
Also as shown, electronic equipment 290 may include one or more processing units 280, one or more storage mediums
270, it can be used for the one or more communication units communicated with remote controller equipment 210 and/or one or more additional electronic devices 250
Part 260, and/or one or more input/output components 285 (such as one or more displays, loudspeaker, microphone, touch
Screen, touch tablet, keyboard, dummy keyboard, mouse, printer and/or any other input-output apparatus and/or input/output are set
Standby interface).
Although remote controller equipment 210 and electronic equipment 290 are shown and described as including particular elements such as processing unit
220 and 280, it is to be understood that, these are examples.In all cases, remote controller equipment and/or electronic equipment may include phase
The various arrangements of same, similar or different components are without departing from the scope of the present disclosure.
Fig. 3 is the flow chart for showing the method 300 of limited accass feature of operation electronic equipment.This method can be in frame 310
Place starts, and proceeds to frame 320, can operate electronic equipment in a block 320.During operation at 320, electronic equipment can be 330
Place receives the request of access limited feature.Then, whether electronic equipment can determine requestor's (that is, candidate user) at frame 350
With the permission for accessing requested feature.If requestor is allowed to operate requested feature, electronic equipment can be 350
Place operates requested feature, then proceedes to operate at 320.In alternative form, if user do not access it is requested
The permission of feature, then electronic equipment can be ignored the request and continue to operate at 320.In some embodiments, this method
It can be executed by electronic equipment 120 as shown in Figure 1.
Fig. 4 is the process for showing using biological characteristic characteristic the method 400 for the limited accass feature for operating electronic equipment
Figure.This method can start at frame 410, proceed to frame 420, and remote controler can operate in frame 420.During operation at 420,
Remote controler can receive the input of the biological characteristic from one or more sensors at 430.Then, remote controler can be at frame 450
Determine whether data (that is, candidate user biological attribute data) are associated with limited accass feature.If data and limited accass
Feature is associated, then data associated with the received biological characteristic input of institute can be transferred to electronics at 440 and set by remote controler
It is standby, continue to operate at 420 later.In alternative form, if data are unrelated with limited accass feature, remote controler is negligible
The operation at 420 of data and continuation.
It is appreciated that provided operation and step are it is intended that exemplary although many embodiments are disclosed above
And be therefore not intended to be exhaustive.It is to be further understood that can require or it is expected alternative for specific embodiment
Sequence of steps or less step or additional step.
In one embodiment, the case where wholly or partially using software realization component of the invention or module
Under, these software elements can be implemented as operating using the calculating or processing module that are able to carry out relative to function described in its.
Although describing the present invention according to various exemplary implementation schemes and implementation above, but it is to be understood that, one
Various features, aspect and function described in a or multiple independent embodiments are not limited to they being suitable for what they were described
In specific embodiment, but they can be applied to other embodiment party of the invention individually or with various combinations on the contrary
One or more of case, regardless of whether such embodiment is described and whether such feature is used as the embodiment
A part be provided.Therefore, range of the invention and range should not be limited by any of above exemplary implementation scheme, but phase
Instead limited by claims provided in this article.
The present disclosure recognize that the personal information data in the technology of the present invention including biological attribute data may be used in family
It is benefited.For example, using biological characteristic authentication data can be used for easily access equipment feature without the use of password.In other examples
In, user biological characteristic is collected to provide a user the feedback about its health or body-building level.In addition, the disclosure is also set
Think to include that the personal information data of biological attribute data are beneficial to other purposes of user.
The disclosure it is also contemplated that be responsible for the collection of such personal information data, analysis, openly, transmission, storage or other purposes
Entity will comply with the privacy policy established and/or privacy practice.Specifically, such entity should execute and unanimously use one
As be known as meeting or more than industry or the privacy policy and way of administration request, to safeguard the privately owned of personal information data and peace
Entirely, including using the data encryption and safety method that meet or more than industry or government standard.For example, personal letter from the user
Breath should be collected for the legal and reasonable purposes of entity, and share or sell not except these legal uses.In addition,
Such collection should be carried out only after user's informed consent.In addition, such entity should take any desired step, to ensure and
Access to such personal information data is protected, and ensures that other people of Internet access personal information data abide by their hidden
Private policies and procedures.In addition, such entity can make itself to be subjected to third party's assessment to prove that it abides by the privacy accepted extensively
Policy and practice.
Regardless of afore-mentioned, it includes biological characteristic number that the disclosure, which is contemplated that user selectively prevents to use or access,
According to personal information data embodiment.That is disclosure imagination can provide hardware element and/or software element, to prevent or hinder
Only to the access of such personal information data.For example, this technology can be configured to permit in the case where biometric authentication method
Family allowable by providing security information such as password, personal identity number (PINS), touch gestures or this field alone or in combination
Technical staff known to other authentication methods come selectively around biological characteristic authentication step.For another example, user may be selected to move
Remove, disable or limit the access of the healthy related application to certain personal healths for collecting user or workout data.
Claims (10)
1. a kind of electronic equipment, including:
Component, the component are configured as switching between first operator scheme and second operator scheme;With
Access controller, the access controller are configured as being externally controlled equipment reception operation mode data and authorization number
According to the authorization data at least partly derives from the biological characteristic characteristic of user;
Wherein:
The operation mode data include the finger corresponding to one of the first operator scheme and the second operator scheme
It enables;
The operation mode data and the authorization data are essentially simultaneously received by the access controller;
Based on the operation mode data, the access controller determines whether described instruction needs to access limited accass operation mould
Formula;
If described instruction needs to access limited accass operation mode and the limited accass is grasped in authorization data instruction
The access of operation mode, the then execution of the access controller starting described instruction;
If described instruction needs to access limited accass operation mode and the authorization data does not indicate to the limited accass
The access of operation mode, the then execution of the access controller refusal described instruction;
If described instruction does not need access limited accass operation mode, the access controller abandons the authorization data simultaneously
Start the execution of described instruction;And
The limited accass operation mode includes at least one in the hardware setting of electric source modes, volume mode or the component
Person.
2. electronic equipment according to claim 1, wherein the biological characteristic characteristic includes fingerprint.
3. electronic equipment according to claim 1, wherein the authorization data packets include the biological information of the user.
4. electronic equipment according to claim 3 further includes controller for authentication, the controller for authentication is configured as measuring
Similitude between received biological information and template biological characteristic information.
5. electronic equipment according to claim 4, wherein the controller for authentication is configured as to the access controller
Indicate that the similitude is more than selected threshold value.
6. electronic equipment according to claim 5, wherein the selected threshold value can be modified by the user.
7. electronic equipment according to claim 5, wherein the controller for authentication includes communicating with the electronic equipment
Server.
8. electronic equipment according to claim 5, wherein the controller for authentication includes communicating with the electronic equipment
Second electronic equipment.
9. electronic equipment according to claim 1, wherein the authorization data packets include authorization code.
10. electronic equipment according to claim 9, wherein the authorization code is general to all authorized users.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/596,186 | 2017-05-16 | ||
US15/596,186 US10431024B2 (en) | 2014-01-23 | 2017-05-16 | Electronic device operation using remote user biometrics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108875340A true CN108875340A (en) | 2018-11-23 |
CN108875340B CN108875340B (en) | 2021-04-06 |
Family
ID=64334407
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810464545.6A Active CN108875340B (en) | 2017-05-16 | 2018-05-16 | Electronic device operation using remote user biometrics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108875340B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10806178B1 (en) | 2019-08-06 | 2020-10-20 | Shenzhen GOODIX Technology Co., Ltd. | Bio-traceable electronic consumable device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2388941A (en) * | 2002-05-22 | 2003-11-26 | British Broadcasting Corp | A remote control with a finger print sensor for user identi cation |
CN1972186A (en) * | 2005-11-24 | 2007-05-30 | 中国科学院自动化研究所 | A mobile identity authentication system and its authentication method |
CN101330386A (en) * | 2008-05-19 | 2008-12-24 | 刘洪利 | Authentication system based on biological characteristics and identification authentication method thereof |
WO2009132338A2 (en) * | 2008-04-25 | 2009-10-29 | Aware, Inc. | Biometric identification and verification |
CN101627396A (en) * | 2007-03-09 | 2010-01-13 | 索尼爱立信移动通讯有限公司 | System and method for protecting data based on geographic presence of a restricted device |
CN101796764A (en) * | 2007-07-31 | 2010-08-04 | 国际商业机器公司 | Biometric authentication device, system and method of biometric authentication |
US8648692B2 (en) * | 1999-07-23 | 2014-02-11 | Seong Sang Investments Llc | Accessing an automobile with a transponder |
US8988192B2 (en) * | 2011-02-16 | 2015-03-24 | Cox Communication, Inc. | Remote control biometric user authentication |
CN105844087A (en) * | 2009-04-30 | 2016-08-10 | 麦德托尼克公司 | Patient state detection based on support vector machine based algorithm |
CN105992033A (en) * | 2015-02-10 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Method, device, and system for adjusting application setting of terminal |
-
2018
- 2018-05-16 CN CN201810464545.6A patent/CN108875340B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8648692B2 (en) * | 1999-07-23 | 2014-02-11 | Seong Sang Investments Llc | Accessing an automobile with a transponder |
GB2388941A (en) * | 2002-05-22 | 2003-11-26 | British Broadcasting Corp | A remote control with a finger print sensor for user identi cation |
CN1972186A (en) * | 2005-11-24 | 2007-05-30 | 中国科学院自动化研究所 | A mobile identity authentication system and its authentication method |
CN101627396A (en) * | 2007-03-09 | 2010-01-13 | 索尼爱立信移动通讯有限公司 | System and method for protecting data based on geographic presence of a restricted device |
CN101627396B (en) * | 2007-03-09 | 2011-07-27 | 索尼爱立信移动通讯有限公司 | System and method for protecting data based on geographic presence of a restricted device |
CN101796764A (en) * | 2007-07-31 | 2010-08-04 | 国际商业机器公司 | Biometric authentication device, system and method of biometric authentication |
WO2009132338A2 (en) * | 2008-04-25 | 2009-10-29 | Aware, Inc. | Biometric identification and verification |
CN101330386A (en) * | 2008-05-19 | 2008-12-24 | 刘洪利 | Authentication system based on biological characteristics and identification authentication method thereof |
CN105844087A (en) * | 2009-04-30 | 2016-08-10 | 麦德托尼克公司 | Patient state detection based on support vector machine based algorithm |
US8988192B2 (en) * | 2011-02-16 | 2015-03-24 | Cox Communication, Inc. | Remote control biometric user authentication |
CN105992033A (en) * | 2015-02-10 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Method, device, and system for adjusting application setting of terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10806178B1 (en) | 2019-08-06 | 2020-10-20 | Shenzhen GOODIX Technology Co., Ltd. | Bio-traceable electronic consumable device |
WO2021022781A1 (en) * | 2019-08-06 | 2021-02-11 | Shenzhen GOODIX Technology Co., Ltd. | Bio-traceable electronic consumable device |
Also Published As
Publication number | Publication date |
---|---|
CN108875340B (en) | 2021-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11210884B2 (en) | Electronic device operation using remote user biometrics | |
US11468155B2 (en) | Embedded authentication systems in an electronic device | |
US11012438B2 (en) | Biometric device pairing | |
US20150206366A1 (en) | Electronic Device Operation Using Remote User Biometrics | |
US10735412B2 (en) | Use of a biometric image for authorization | |
Holz et al. | Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication | |
US9183683B2 (en) | Method and system for access to secure resources | |
US20160226865A1 (en) | Motion based authentication systems and methods | |
CN204833267U (en) | Use biological measurement configuration electronic equipment's of remote user system and electronic equipment | |
WO2017067431A1 (en) | Permission control system and method, computer mouse, and computer system | |
US9775044B2 (en) | Systems and methods for use in authenticating individuals, in connection with providing access to the individuals | |
US9779225B2 (en) | Method and system to provide access to secure features of a device | |
US20070140530A1 (en) | Method and apparatus for providing fingerprint authentication and actuation | |
US20180232512A1 (en) | Biometric Interface System and Method | |
US20180349588A1 (en) | Remote fingerprinting sensor | |
JP2007201687A (en) | Equipment control system | |
JP2018525696A5 (en) | ||
CN108875340A (en) | Use the electronic device of remote user's biological characteristic | |
JP2023094976A (en) | Information processor, program, and control method | |
KR20100052261A (en) | Channel control method and system for managing settopbox and similar electronics appliances using face recognition | |
WO2020209802A1 (en) | Enhancing security in home automation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |