Abstract: ABSTRACT A METHOD AND SYSTEM FOR AUTHORIZING ACCESS TO COMPUTING DEVICE The present invention discloses a method and a system for authorizing access to a computing device (200), the system (100) comprises one or more biometric sensors (101) installed at predetermined places on the computing device (200) configured to sense a biometric profile of a user ; a non-volatile memory (102) configured to store a plurality of biometric profiles of a plurality of the users; a biometric authentication hardware (105) configured to execute biometric authentication of the user based on the biometric profile sensed by the sensor (101) and provided to a processor (103); and wherein the by the biometric authentication hardware (105) authenticates the biometric profile of the user continuously or intermittently by comparing the biometric profile received from the sensor (102) and the biometric profile stored in the memory (102). [Figure -1]
DESC:FORM – 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
(SEE SECTION 10, RULE 13)
A METHOD AND SYSTEM FOR AUTHORIZING ACCESS TO COMPUTING DEVICE
BHARAT ELECTRONICS LIMITED
WITH ADDRESS:
OUTER RING ROAD, NAGAVARA, BANGALORE 560045, INDIA
THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES THE INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED.
TECHNICAL FIELD
[0001] The present invention relates to computing devices. The invention, more particularly, relates to techniques for allowing authorized access to any computing devices enabled with biometric sensors.
BACKGROUND
[0002] In general, current computing devices such as smart phones or tablets prevent unauthorized access by providing different types of authentication mechanisms like password, pattern, fingerprint scanner etc. After successful authentication, the device can be used by the user until the device is locked again. However, once the device is unlocked, no further checks are made until the device is locked again. This can allow an unauthorized user to gain access to the device.
[0003] US 2014/0115696A1, discloses a method with an embedded authentication system. The authentication system may include one or more sensors operative to detect biometric information of the user. The sensor may be embedded in at least one of a touch screen, a button (e.g., of a keyboard or mouse), device housing near an input mechanism (e.g., laptop housing near keyboard), or any other suitable location such that the sensing region of the sensor includes expected positions of the user while the user operates the electronic device. The sensor may detect one or more biometric attributes of the user (e.g., facial or eye features) using the sensing component. The user may then be authenticated by comparing the detected biometric attributes with a library of biometric attributes stored by or accessible to the electronic device.
[0004] US 10,839,058 B2, discloses techniques for changing type of authentication required based on detecting a request for a particular type of information by the user or particular user actions that could be associated with unauthorized users. Accordingly a computing device is configured to require a non-default form of authentication e.g. instead of allowing biometric authentication, the device may require manual entry of an authentication credential in order to unlock the device, access the requested information etc., A dedicated Secure Enclave Processor (SEP) handles the authentication requirements of the device.
[0005] WO 2017/129126 A1, discloses under-screen optical sensor module for on-screen fingerprint sensing wherein device and optical sensor modules are provided for on-screen optical sensing of fingerprints by using an under-screen optical sensor module that captures and detects returned light that is emitted by the display screen for displaying images and that is reflected by the top surface of the screen assembly.
[0006] CN 106815548A, discloses an electronic device with multiple fingerprint sensors located at the screen mould in the content display region. The multiple fingerprint sensors are used such that the entire display region is covered. User is authenticated by placing any finger on any part of the screen.
[0007] There is therefore felt a need of an invention which provides a system and method that check authorized access to device every time and not just during unlocking process.
OBJECT OF THE INVENTION
[0008] The principal object of the embodiments herein is to provide a system for authorizing access to a computing device.
[0009] Another object of the embodiments herein is to provide a method for authorizing access to a computing device.
SUMMARY OF THE INVETION
[0010] The present invention provides two types of authentications, namely continuous and intermittent authentication to any computing devices enabled with biometric sensors. In continuous mode, upon each touch event, the system will get finger print verification result, whereas in intermittent mode, the system will check for a flag variable describing whether user is authenticated or not. This flag is updated at a fixed interval by authenticating fingers. In this mode the computing device will respond to any touch event if and only if the authentication flag is set true else device will be locked again. This technique does not just work for touch but any inputs like Mouse or Keyboard. Response to Mouse or keyboard event will be decided based on above modes. Mouse event or keyboard event will be served only when the user authentication is successful.
[0011] In one aspect, a system (100) for authorizing access to a computing device (200), the system (100) comprises one or more biometric sensors (101) installed at predetermined places on the computing device (200) configured to sense a biometric profile of a user ; a non-volatile memory (102) configured to store a plurality of biometric profiles of a plurality of the users; a biometric authentication hardware (105) configured to execute biometric authentication of the user based on the biometric profile sensed by the sensor (101) and provided to a processor (103); and wherein the biometric authentication hardware (105) authenticates the biometric profile of the user continuously or intermittently by comparing the biometric profile received from the sensor (102) and the biometric profile stored in the memory (102)..
[0012] In another aspect, a method for authorizing access to a computing device (200), the method comprises sensing a biometric profile of a user by one or more biometric sensors (101) installed at predetermined places on the computing device (200); storing a plurality of biometric profiles of a plurality of the users in a non-volatile memory (102); executing by a biometric authentication hardware (105), the biometric authentication of the user based on the biometric profile sensed by the sensor (101) and provided to a processor (103); and wherein the biometric profile is authenticated by the biometric authentication hardware (105) continuously or intermittently by comparing the biometric profile received from the one or more sensors (102) and biometric stored in the memory (102).
BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS
[0013] The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the drawings to reference like features and modules.
[0014] Figure 1 illustrates a computing device, according to an exemplary implementation of the present invention.
[0015] Figure 2 illustrates a computing device with a biometric sensor at the back side of the computing device, according to an exemplary implementation of the present invention.
[0016] Figure 3 illustrates a computing device with multiple biometric sensors placed at appropriate places of the computing device, according to an exemplary implementation of the present invention.
[0017] Figure 4 illustrates a computing device with a matrix of biometric sensors placed on entire display of the computing device, according to an exemplary implementation of the present invention.
[0018] Figure 5 illustrates a flowchart of system operation, according to an exemplary implementation of the present invention.
[0019] Figure 6 illustrates a flowchart of authentication module, according to an exemplary implementation of the present invention.
[0020] Figure 7 illustrates a flowchart for intermittent authentication module, according to an exemplary implementation of the present invention.
[0021] It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative methods embodying the principles of the present invention. Similarly, it will be appreciated that any flow charts, flow diagrams, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
DETAILED DESCRIPTION
[0022] The various embodiments of the present invention describe about techniques for allowing authorized access to any computing devices enabled with biometric sensors.
[0023] In the following description, for purpose of explanation, specific details are set forth in order to provide an understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these details. One skilled in the art will recognize that embodiments of the present invention, some of which are described below, may be incorporated into a number of systems.
[0024] However, the systems and methods are not limited to the specific embodiments described herein. Further, structures and devices shown in the figures are illustrative of exemplary embodiments of the present invention and are meant to avoid obscuring of the present invention.
[0025] It should be noted that the description merely illustrates the principles of the present invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described herein, embody the principles of the present invention. Furthermore, all examples recited herein are principally intended expressly to be only for explanatory purposes to help the reader in understanding the principles of the invention and the concepts contributed by the inventor to furthering the art and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.
[0026] In one embodiment, a system (100) for authorizing access to a computing device (200), the system (100) comprises one or more biometric sensors (101) installed at predetermined places on the computing device (200) configured to sense a biometric profile of a user ; a non-volatile memory (102) configured to store a plurality of biometric profiles of a plurality of the users; a biometric authentication hardware (105) configured to execute biometric authentication of the user based on the biometric profile sensed by the sensor (101) and provided to a processor (103); and wherein the biometric authentication hardware (105) authenticates the biometric profile of the user continuously or intermittently by comparing the biometric profile received from the sensor (102) and the biometric profile stored in the memory (102).
[0027] In another embodiment, the one or more biometric sensors (101) are installed on the back side of the computing device (200).
[0028] In another embodiment, the one or more biometric sensors (101) are installed on both side edges of the computing device (200).
[0029] In another embodiment, the one or more biometric sensors (101) are installed in the entire display screen of the computing device (200).
[0030] In another embodiment, in case of the intermittent authentication, the biometric authentication hardware (105) updates a flag to true when the authentication is successful or else sets the flag to false at a fixed time interval.
[0031] In another embodiment, in case of continuous authentication, the biometric authentication hardware (105) authenticates the user for every user input and in the event of successful authentication, the processor (103) services the user inputs else the processor (103) ignores the user input.
[0032] In another embodiment, the display of the computing device (200) is turned off by the processor (103) when the one or more biometric sensors (101) does not sense the biometric profile of the user.
[0033] In another embodiment, the display of the computing device (200) is turned off by the processor (103) when the user authentication fails.
[0034] In another embodiment, a method for authorizing access to a computing device (200), the method comprises sensing a biometric profile of a user by one or more biometric sensors (101) installed at predetermined places on the computing device (200); storing a plurality of biometric profiles of a plurality of the users in a non-volatile memory (102); executing by a biometric authentication hardware (105), the biometric authentication of the user based on the biometric profile sensed by the sensor (101) and provided to a processor (103); and wherein the biometric profile is authenticated by the biometric authentication hardware (105) continuously or intermittently by comparing the biometric profile received from the one or more sensors (102) and biometric stored in the memory (102).
[0035] In another embodiment, installing the one or more biometric sensors (101) on back side of the computing device (200).
[0036] In an embodiment, installing the one or more biometric sensors (101) on both side edges of the computing device (200).
[0037] In another embodiment, installing the one or more of biometric sensors in entire display screen of the computing device (200).
[0038] In another embodiment, in case of the intermittent authentication, the method includes updating by the biometric authentication hardware (105), a flag to true when the authentication is successful or else setting the flag to false at a fixed time interval.
[0039] In another embodiment, in case of continuous authentication, the method includes authenticationg by the biometric authentication hardware (105) every user input of the user and in event of successful authentication, servicing the user inputs by the processor (103) else ignoring the user input by the processor (103).
[0040] Referring to figure 1, the block diagram of system (100) for authorizing access to a computing device (200) as shown in Figure 1. The system (100) consists of a processor(s) (103), memory (102), input/output devices (104) like touch, display and biometric sensor(s) (101) such as fingerprint scanner and biometric authentication hardware (105). Whenever authentication is needed, the biometric sensor (101) gets biometric data and gives it biometric authentication hardware for further processing. Biometric authentication hardware compares the biometric data with the user data stored in the memory returns the status verification successful or failed to central processor. On successful authentication the user can use the device.
[0041] Referring to figure 2, the biometric sensor (101) such as finger print scanner is placed at the back of the computing device (200) as shown in Figure 2. User keeps his/her finger on the sensor for authentication. To improve security, multiple finger print sensors can be used with each sensor being placed at appropriate place as shown in Figure 3. In such case user is authorized using at least 1 (not limited to) of the biometric sensors. Furthermore, the entire display area can be filled with on screen finger print scanner as shown in Figure 4. In this case when the user touches the display, the on screen fingerprint sensor authorizes the user and after successful authorization of the user the device starts responding to user inputs (Eg ., User touching touch screen).
[0042] Referring to figure 1-4, the present invention proposes a system and method to check authorized access to device every time and not just during unlocking process. The system comprises a biometric (Eg .,finger print) sensor placed on the back side of the computing device OR one or more biometric (Eg .,finger print) sensors placed at appropriate places (dependent on the way user holds the device) on the computing device OR a number of biometric (Eg .,finger print) sensors placed on the display such that it covers the entire touch area of the display, a biometric authentication hardware capable of executing the biometric authentication algorithm and a processor to manage all the operations of the system and a non-volatile memory capable of storing biometric profiles of users.
[0043] Referring to figure 5, the operation of the system is as shown in Figure 5. On any user input the biometric authentication will be done and upon successful authentication the user input will be further processed. If authentication fails then the device is locked.
[0044] Referring to figure 6, the authentication can be continuous or intermittent as shown in Figure 6. When authentication module gets command to execute authentication it checks mode of authentication i.e continuous or intermittent. If mode is continuous then biometric data is fetched from biometric sensors and it is verified. If authentication is successful then it returns success else it returns false. If mode of authentication is intermittent then it checks for Auth_Success flag, if the flag is true then the module returns success otherwise it returns false. Furthermore, a biometric authentication hardware isassigned exclusively for authentication operations to speed up the process of authentication.
[0045] In case of biometric (Eg .,finger print) sensor is on the back side of the computing device as shown in Figure 2 user keeps his/her finger on the sensor always and only after successful authentication of the user, the device starts responding to user inputs (Eg ., User touching touch screen).
[0046] For further improvement the biometric (Eg .,finger print) sensors can be placed at appropriate places (dependent on the way user holds the device) on the computing device. User is authorized using at least 1 (not limited to) of the biometric sensors and after successful authentication of the user the device starts responding to user inputs (Eg ., User touching touch screen).
[0047] Furthermore, a number of biometric (Eg .,finger print) sensors can be placed on the display such that it covers the entire touch area of the display. When the user touches the display, the on screen fingerprint sensor authorizes the user and after successful authorization of the user the device starts responding to user inputs (Eg ., User touching touch screen)
[0048] Referring to figure 7, the flowchart for intermittent authentication is shown. In case of intermittent mode of authentication, a separate module runs every fixed interval of seconds and checks biometric authentication and updates Auth_Success flag to true if authentication is successful else sets Auth_Success flag to false. The intermittent mode of authentication is useful on the devices with low processing power as continuous authentication might slow down the device.
[0049] The foregoing description of the invention has been set merely to illustrate the invention and is not intended to be limiting. Since modifications of the disclosed embodiments incorporating the substance of the invention may occur to person skilled in the art, the invention should be construed to include everything within the scope of the invention.
,CLAIMS:We Claim:
1. A system (100) for authorizing access to a computing device (200), the system (100) comprising:
one or more biometric sensors (101) installed at predetermined places on the computing device (200) configured to sense a biometric profile of a user ;
a non-volatile memory (102) configured to store a plurality of biometric profiles of a plurality of the users;
a biometric authentication hardware (105) configured to execute biometric authentication of the user based on the biometric profile sensed by the sensor (101) and provided to a processor (103); and
wherein the biometric authentication hardware (105) authenticates the biometric profile of the user continuously or intermittently by comparing the biometric profile received from the sensor (102) and the biometric profile stored in the memory (102).
2. The system (100) as claimed in claim 1, wherein the one or more biometric sensors (101) are installed on the back side of the computing device (200).
3. The system (100) as claimed in claim 1, wherein the one or more biometric sensors (101) are installed on both side edges of the computing device (200).
4. The system (100) as claimed in claim 1, wherein the one or more biometric sensors (101) are installed in the entire display screen of the computing device (200).
5. The system (100) as claimed in claim 1, wherein in case of the intermittent authentication, the biometric authentication hardware (105) (103) updates a flag to true when the authentication is successful or else sets the flag to false at a fixed time interval.
6. The system (100) as claimed in claim 1, wherein in case of continuous authentication, the biometric authentication hardware (105) authenticates the user for every user input and in the event of successful authentication, the processor (103) services the user inputs else the processor (103) ignores the user input.
7. The system as claimed in claim 6, wherein the display of the computing device (200) is turned off by the processor (103) when the one or more biometric sensors (101) does not sense the biometric profile of the user.
8. The system as claimed in claim 6, wherein the display of the computing device (200) is turned off by the processor (103) when the user authentication fails.
9. A method for authorizing access to a computing device (200), the method comprising:
sensing a biometric profile of a user by one or more biometric sensors (101) installed at predetermined places on the computing device (200);
storing a plurality of biometric profiles of a plurality of the users in a non-volatile memory (102);
executing by a biometric authentication hardware (105) , the biometric authentication of the user based on the biometric profile sensed by the sensor (101) and provided to a processor (103); and
wherein the biometric profile is authenticated by the biometric authentication hardware (105) continuously or intermittently by comparing the biometric profile received from the one or more sensors (102) and biometric stored in the memory (102).
10. The method as claimed in claim 9, wherein
installing the one or more biometric sensors (101) on back side of the computing device (200).
11. The method as claimed in claim 9, wherein
installing the one or more biometric sensors (101) on both side edges of the computing device (200).
12. The system as claimed in claims 9, wherein
installing the one or more of biometric sensors in entire display screen of the computing device (200).
13. The method as claimed in claim 9, wherein, in case of the intermittent authentication, the method includes updating by the biometric authentication hardware (105), a flag to true when the authentication is successful or else setting the flag to false at a fixed time interval.
14. The method as claimed in claim 7, wherein in case of continuous authentication, the method includes authenticating by the biometric authentication hardware (105) every user input of the user and in event of successful authentication, servicing the user inputs by the processor (103) else ignoring the user input by the processor (103).
Dated this 04th day of April, 2022
For BHARAT ELECTRONICS LIMITED
(By their Agent)
D. MANOJ KUMAR (IN/PA-2110)
KRISHNA & SAURASTRI ASSOCIATES LLP
| # | Name | Date |
|---|---|---|
| 1 | 202241020275-PROVISIONAL SPECIFICATION [04-04-2022(online)].pdf | 2022-04-04 |
| 2 | 202241020275-FORM 1 [04-04-2022(online)].pdf | 2022-04-04 |
| 3 | 202241020275-DRAWINGS [04-04-2022(online)].pdf | 2022-04-04 |
| 4 | 202241020275-Proof of Right [14-06-2022(online)].pdf | 2022-06-14 |
| 5 | 202241020275-FORM-26 [14-06-2022(online)].pdf | 2022-06-14 |
| 6 | 202241020275-Correspondence_Form1_20-06-2022.pdf | 2022-06-20 |
| 7 | 202241020275-FORM 3 [04-04-2023(online)].pdf | 2023-04-04 |
| 8 | 202241020275-ENDORSEMENT BY INVENTORS [04-04-2023(online)].pdf | 2023-04-04 |
| 9 | 202241020275-DRAWING [04-04-2023(online)].pdf | 2023-04-04 |
| 10 | 202241020275-CORRESPONDENCE-OTHERS [04-04-2023(online)].pdf | 2023-04-04 |
| 11 | 202241020275-COMPLETE SPECIFICATION [04-04-2023(online)].pdf | 2023-04-04 |
| 12 | 202241020275-POA [04-10-2024(online)].pdf | 2024-10-04 |
| 13 | 202241020275-FORM 13 [04-10-2024(online)].pdf | 2024-10-04 |
| 14 | 202241020275-AMENDED DOCUMENTS [04-10-2024(online)].pdf | 2024-10-04 |
| 15 | 202241020275-Response to office action [01-11-2024(online)].pdf | 2024-11-01 |