Abstract: The present invention provides method and apparatus (200, 400, 600) for managing of a device that enables an access control via a plurality of authentication modes. The method comprises receiving a user input, retrieving an authentication mode from the plurality of authentication modes in accordance with the received user input, and activating the retrieved authentication mode in place of a current authentication mode for controlling access of said device.
The present invention relates to authentication mechanism within a computing device and in
particular relates to switching between different authentication mechanisms based on user
preference.
BACKGROUND OF THE INVENTION:
With the advent of usage of portable or hand-held computing device in the form of tablets, smart
phones, laptops, and other daily usage device for business purposes, there is also a growing trend of
their usage in public places. As a safety measure, the device 'lock-unlock' feature is used as a
primary mechanism to prevent unauthorized access by outsiders. However, such mechanism is
quite vulnerable, especially in public places, where people or spy cameras in the vicinity of the user
tend to capture the currently activated authentication modes and corresponding passwords, PIN no,
design pattern, etc. Owing to 'not very complex nature' of such authentication modes unlike those
used in banking industries or organizations maintaining sensitive information, the security of the
device forever remains threatened in public due to prying eyes and eavesdropping.
Accordingly, a prudent and attentive user has to manually and frequently change the access
mechanism in public places, as case the user feels that a passer-by or person in immediate
neighbourhood may hav.e caught or noticed the authentication related parameters. Though,
frequently changing authentication modes may be not be an uphill task, yet the same requires a
considerable amount of navigation through the user· interfaces of the device and accordingly a
substantial consumption of time. In an example, depending upon the complexity of the device and
associated user interfaces, the user may have to perform any number of steps ranging from at least
9 to 21 to change the authentication mode and activate a corresponding password for the selected
authentication mode.
In an example, to change the authentication of a touch screen (non-keypad) based mobile phone
from an existing less secure mode (say swipe mode) to a more robust mode say image/voice based
authentication mode, one needs to unlock the device, launch an application, open settings menu in
terms of device settings, and select the requisite authentication mode. Thereafter, in order to
activate the selected authentication mode, the user has to provide an image or voice as
··J:'"p U ·u-e·L·H:r: 2 G - e··s - ·-:z G 1. "5 ·1 "5 : "57
2
authentication input/password. Furthermore, as a back- up authentication mode that acts in case the
selected image/voice authentication mode fails to authenticate the user, the user needs to select the
back-up authentication mode (for example PIN based or Password based authentication mode) and
set the corresponding authentication inputs. All of these steps take at least require 21 user actions,
thereby consuming a substantial time and mental effort of the user. Generally, the more robust the
authentication mode is, the more efforts are required to activate the same.
Again considering a scenario where a frequent authentication mode is required owing to ever
increasing exposure from the passers-by, e.g. while the device user is travelling in a train, sitting at
an airport lounge for elongated time periods, repeated change of the authentication modes may be
traumatic. Furthermore, users like aged people or lesser educated people that usually have lesser
technical acumen may 'always be disinclined to switch from one authentication mode to another
and accordingly remain highly prone to unauthorized access by unauthorized people. In addition,
device users that are too hard pressed for time to change the authentication modes also remain
equally prone to unauthorized access.
Accordingly, there remains a long felt need to allow a user to switch from one authentication mode
to another with minimum user intervention.
Yet another need of hour is to accomplish a change from one authentication mode to another in
least amount of time.
Yet another need ofthe hour is further allow a user in changing an authentication input with respect
to a particular authentication with least user intervention.
Yet another need of the hour is further allow a user in changing an authentication input with respect
to a particular authentication with mode in a minimum duration.
OBJECT OF THE INVENTION:
Thus, it is an object ofthe present invention to provide a method and system for enabling a user of
a device in selecting a particular authentication mode out of two or more pre-defined authentication
modes of the device through minimum inputs.
It is another object of the present invention to enable a user to switch from one authentication mode
to another mode within the device in a minimum time span, irrespective of the complexity of the
authentication mode.
·xp u ·-o .. ELl~ri ·2 ·s - us - ·2 ·a ·1·-s ·1··s : ··57
3
Yet another object of the present invention is to enable the user in changing the authentication
input of the device in respect of a particular authentication mode via minimum number of user
inputs.
Yet another object of the present invention is to enable changing the authentication input of the
device in respect of a particular authentication mode in shortest possible time.
SUMMARY OF THE INVENTION:
Accordingly, the present invention provides a method managing of a device that enables an access
control via a plurality of authentication modes. The method ·comprises receiving a user input,
retrieving an authentication mode from the plurality of authentication modes in accordance with the
received user input, and activating the retrieved authentication mode in place of a current
authentication mode for controlling access of said device ..
The present invention also provides an apparatus for managing a device that enables an access
control via a plurality of authentication modes, the apparatus comprises a receiver for receiving a
user input, a comparator for retrieving an authentication mode from the plurality of authentication
modes in accordance with the received user input; and an actuator for activating the retrieved
authentication mode in place of a current authentication mode for controlling access of said device.
The present invention further provides a method of managing of a device that enables an access
control via a plurality of authentication modes. The method comprises receiving a user input via a
hardware unit provided in the device, retrieving an authentication mode from the plurality of
authentication modes in accordance with the user input received via the hardware unit; and
activating the retrieved authentication mode in place of a current authentication mode for
controlling access of said device.
The present invention furthermore provide~ an apparatus for managing a device that enables an
access control via a plurality of authentication modes. The apparatus comprises a receiver for
receiving a user input via a hardware unit provided in th~ device, a comparator for retrieving an
authentication mode from the plurality of authentication modes in accordance with the user input
received via the hardware unit, and an actuator for activating the retrieved authentication mode in
place of a current authentication mode for controlling access of said device.
The present invention further provides a method of managing of a device that enables an access
control via a plurality of authentication passwords. The method comprises receiving a user input,
retrieving an authentication password from the plurality of authentication passwords in accordance
with the received user input, activating the retrieved authentication password in place of a current
authentication password for controlling access of said device, receiving an authentication password
from the user; and comparing the authentication password received from the user with the said
retrieved authentication password.
The present invention furthermore provides an apparatus for managing of a device that enables an
access control via a plurality of authentication passwords. The apparatus comprises a first receiver
for receiving a user input, a first comparator for retrieving an authentication password from the
plurality of authentication passwords in accordance with the received user input, an actuator for
activating the retrieved authentication password in place of a current authentication password for
controlling access of said device, a second receiver for receiving an authentication password from
the user; and a second comparator for comparing the authentication password received from the
user with the said retrieved authentication password.
To further clarify advantages and features of the present invention, a more particular description of
the invention will be rendered by reference to specific embodiments thereof, which is illustrated in
the appended drawings. It is appreciated that these drawings depict only typical embodiments of
the invention and are therefore not to be considered limiting of its scope. The invention will be
described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF FIGURES:
These and other features, aspects, and advantages of the present invention will become better
understood when the following detailed description is read with reference to the accompanying
drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 shows a flow chart corresponding to a first embodiment of the invention;
Figure 2 shows a detailed internal construction of the apparatus in accordance with first
embodiment of the present invention;
Figure 3 shows a flow chart corresponding to a second embodiment of the invention;
Figure 4 shows a detailed internal construction of the apparatus in accordance with second
embodiment of the present invention;
Figure 5 shows a flow chart corresponding to a third embodiment of the invention;
Figure 6 shows a detailed internal construction of the apparatus in accordance with third
embodiment of the present invention;
Figure 7 shows a detailed internal construction of the apparatus as described in Fig. 2, 4 and 6;
Figures 8 (a and b) show an exemplary arrangement of a plurality of authentication modes along
with an authentication mode selection mechanism within the apparatus of Fig. 2, Fig. 4 and Fig. 6,
in accordance with the present invention;
Figure 9 depicts an exemplary control flow within the apparatus of Fig. 2, 4 and 6 in accordance
with all the embodiments ofthe present invention.
Figure 10 (a, band c) depicts an exemplary touch screen surface ofthe apparatus of Fig. 2, 4 and 6
in accordance with all the embodiments of the present invention.
Figure 11 depicts an exemplary user actuation over a touch sensitive surface of Fig. 10 to select
any of the pre-defined modes depicted in Fig. 8.
Figure 12 depicts another exemplary user actuation over the touch sensitive surface of Fig. 10 to
select any of the pre-defined modes depicted in Fig. 8.
Figure 13 depicts another exemplary touch screen surface of the apparatus of Fig. 2, 4 and 6 in
accordance with all the embodiments of the present invention.
Figure 14 depicts another exemplary touch screen surface of the apparatus of Fig. 2, 4 and 6 in
accordance with all the embodiments of the present invention.
Figure 15 depicts an exemplary yet another touch screen surface of the apparatus of Fig. 2, 4 and 6
in accordance with all the embodiments ofthe present invention.
Figure 16 depicts an exemplary user actuation over the touch sensitive surface of Fig. 15 to select
any of the pre-defined modes depicted in Fig. 8.
Figure 17 depicts an exemplary yet another touch screen surface of the apparatus of Fig. 2, 4 and 6
in accordance with all the embodiments ofthe present invention;
Figure 18 (a and b) depicts an exemplary authentication mode incorporated within the apparatus of
Fig. 2, 4 and 6 in accordance with the present invention;
Figure 19 (a arid b) depicts another exemplary authentication mode incorporated within the
apparatus of Fig. 2, 4 and 6 in accordance with the present invention;
Figure 20 (a and b) depicts another exemplary authentication mode incorporated within the
apparatus of Fig. 2, 4 and 6 in accordance with the present invention;
Figure 21 (a and b) depicts another exemplary authentication mode incorporated within the
apparatus of Fig. 2, 4 and 6 in accordance with the present invention;
Figure 22 (a and b) depicts another exemplary authentication mode incorporated within the
apparatus of Fig. 2, 4 and 6 in accordance with the present invention;
Figure 23 (a, b and c) depicts another exemplary authentication mode incorporated within the
apparatus of Fig. 2, 4 and 6 in accordance with the present invention;
Figure 24 (a and b) depicts another exemplary authentication mode incorporated within the
apparatus of Fig. 2, 4 and 6 in accordance with the present invention;
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity
and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the
method in terms of the most prominent steps involved to help to improve understanding of aspects
of the present invention. Furthermore, in terms of the construction of the device, one or more
components of the device may have been represented in the drawings by conventional symbols,
and the drawings may show only those specific details that are pertinent to understanding the
embodiments of the present invention so as not to obscure the drawings with details that will be
readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION:
For the purpose of promoting an understanding of the principles of the invention, reference will
now be made to the embodiment illustrated in the drawings and specific language will be used to
describe the same. It will nevertheless be understood that no limitation of the scope of the invention
is thereby intended, such alterations and further modifications in the illustrated system, and such
further applications of the principles of the invention as illustrated therein being contemplated as
would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the
following detailed description are exemplary and explanatory of the invention and are not intended
to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means
that a pa~icular feature, structure, or characteristic described in connection with the embodiment is
included in at least one embodiment of the present invention. Thus, appearances of the phrase "in
an embodiment", "in another embodiment" and similar language throughout this specific.ation may,
but do not necessarily, all refer to the same embodiment.
;
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a nonexclusive
inclusion, such that a process or method that comprises a list of steps does not include
only those steps but may include other steps not expressly listed or inherent to such process or
method. Similarly, one or more devices or sub-systems or elements or structures or components
proceeded by "comprises ... a" does not, without more constraints, preclude the existence of other
devices or other sub-systems or other elements or other structures or other components or
additional devices or additional sub-systems or additional elements or additional structures or
additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as
commonly understood by one of ordinary skill in the art to which this invention belongs. The
system, methods, and examples provided herein are illustrative only and not intended to be
limiting.
Embodiments of the present invention will be described below in detail with reference to the
accompanying drawings.
Now referring to Figure I, it can be seen that the present invention provides method (I 00) of
managing of a device that enables an access control via a plurality of authentication modes, the
method comprising:
receiving (I 02) a user input;
retrieving (I 06) an authentication mode from the plurality of authentication modes m
accordance with the received user input; and
activating (I 08) the retrieved authentication mode in place of a current authentication mode
for controlling access of said device.
In an embodiment, wherein said retrieving comprises determining whether the received user input
matches at least one predetermined user input.
In another embodiment of the invention, wherein the user input is received via a single input unit
and said determining further comprises:
determining whether a number of pressing the single input unit matches at least one
predetermined number;
determining whether a time interval between two or more consecutive pressings of the
single input unit matches a predetermined time interval; or
determining whether an overall time period taken to provide the user input via the single
input unit is within a predetermined threshold limit.
In still another embodiment, wherein the user input is received via a plurality ·of input units and
said determining further comprises:
determining whether the sequence of pressing the plurality of input units matches a
predetermined sequence;
determining whether a time interval between two or more consecutive pressings of the
plurality of input units matches a predetermined time interval; or
determining whether an overall time period taken to provide the user input via the plurality
of input units is within a predetermined threshold limit.
In a further embodiment of the invention, wherein the invention further comprises determining (
step I 02) an applicability of said user input in respect of a current state of the device.
In another embodiment, wherein said current state includes at least one of a stand-by mode, sleep
mode, hibernate mode, power down mode, locked state mode or unlocked state mode of the device.
In yet another embodiment, wherein the plurality of authentication modes include two or more of
• No authentication;
• Swipe based authentication;
Tap based authentication;
•
•
•
•
•
•
•
•
•
•
•
Device proximity based authentication;
User proximity based authentication;
Location proximity based authentication;
Context based authentication;
Image based authentication;
Sound based authentication;
Bio-metric·data based authentication;
Image and Sound based authentication;
Input Pattern based authentication;
PIN based authentication; and
Alpha-numeric password based authentication .
In a further more embodiment of the invention, wherein the plurality of authentication modes are
arranged in an chronological order of security level I security strength and retrieving includes
retrieving an authentication mode from the plurality of authentication modes in accordance with the
chronological order based on the received user input.
In a further embodiment, the present invention further comprises further comprising allowing (step
II 0) the device to be accessed upon receipt of a password from the user for the retrieved
authentication mode.
In a further more embodiment of the invention, wherein the allowing further comprises retrieving a
pre-stored password in accordance with the retrieved authentication mode; and comparing the
password received from the user with the said pre-stored password.
In a further more embodiment of the invention, wherein the invention further comprises intimating
(step 112) the user regarding activation of said retrieved authentication mode within said device
through one or more of a haptic feedback mechanism, a notification, a pop-up window, an alarm, a
beep, a visual display, an audio feedback, an audio-visual mechanism etc.
Referring to Figure 2, the present invention also provides an apparatus (200) for managing a device
that enables an access control via a plurality of authentication modes, the apparatus (200)
comprising:
a receiver (202) for receiving a user input;
a comparator (204) for retrieving an authentication mode from the plurality of
authentication modes in accordance with the received user input; and
an actuator (206) for activating the retrieved authentication mode in place of a current
authentication mode for controlling access of said device.
Now referring to Figure 3, it can be seen that the present invention further provides a method (300)
of managing of a device that enables an access control via a plurality of authentication modes, the
method comprising:
receiving (step 302) a user input via a hardware unit provided in the device;
retrieving (step 304) an authentication mode from the plurality of authentication modes in
accordance with the user input received via the hardware unit; and
activating (step 306) the retrieved authentication mode in place of a current authentication
mode for controlling access of said device.
In an embodiment, wherein the hardware unit is selected from the group comprising one or more
of:
a volume control button;
a camera control button;
a joystick;
a qwerty key pad;
an alphanumeric keypad;
a call-connect button;
a call-disconnect button; and
a power button.
In another embodiment of the invention, wherein the present invention further comprises intimating
(step 308) the user regarding said activation of retrieved authentication mode within the device
through one or more of a haptic feedback mechanism, a notification, a pop-up window, an alarm, a
beep, a visual display, an audio feedback, an audio-visual mechanism etc.
Referring to Figure 4, the present invention also describes an apparatus ( 400) for managing a
device that enables an access control via a plurality of authentication modes, the apparatus (400)
comprising:
a receiver ( 402) for receiving a user input via a hardware unit provided in the device;
a comparator (404) for retrieving an authentication mode from the plurality of authentication
modes in accordance with the user input received via the hardware unit; and
an actuator ( 406) for activating the retrieved authentication mode m place of a current
authentication mode for controlling access of said device.
Now referring to Figure 5, it can be seen that the present invention further provides a method (500)
managing of a device that enables an access control via a plurality of authentication passwords, the
method comprising:
receiving (step 502) a user input;
retrieving (step 504) an authentication password from the plurality of authentication
passwords in accordance with the received user input;
activating (step 506) the retrieved authentication password m place of a current
authentication password for controlling access of said device;
receiving (step 508) an authentication password from the user; and
comparing (step 51 0) the authentication password received from the user with the said
retrieved authentication password.
In another embodiment of the invention, wherein the present invention further comprises intimating
(step 512) the user regarding said activation of retrieved authentication password within the device
through one or more of a haptic feedback mechanism, a notification, a pop-up window, an alarm, a
beep, a visual display, an audio feedback, an audio-visual mechanism etc.
Referring to Figure 6, the present invention also describes an apparatus ( 600) for managing of a
device that enables an access control via a plurality of authentication passwords, the apparatus
(600) comprising:
···:rP U ·u-e·LH""'I 2.6 - U "5 - ·2 "B 1·-s ·1·s : ·-~"1'
a first receiver (602) for receiving a user input;
a first comparator (604) for retrieving an authentication password from the plurality of
authentication passwords in accordance with the received user input;
an actuator (606) for activating the retrieved authentication password in place of a current
authentication password for controlling access of said device;
a second receiver (608) for receiving an authentication password from the user; and
a second comparator (61 0) for comparing the authentication password received from the user
with the said retrieved authentication password
Referring to figure 7, yet another typical hardware configuration of the apparatus 200, 400, 600 in
the form of a computer system 200, 400, 600 is shown. The computer system 200, 400, 600 can
include a set of instructions that can be executed to cause the computer system 200, 400 to perform
any one or more of the methods disclosed. The computer system 200, 400, 600 may operate as a
standalone device or may be connected, e.g., using a network, to other computer systems or
peripheral devices.
In a networked deployment, the computer system 200, 400, 600 may operate in the capacity of a
server or as a client user computer in a server-client user network environment, or as a peer
computer system in a peer-to-peer (ordistributed) network environment. The computer system 200,
400, 600 can also be implemented as or incorporated into various devices, such as a personal
computer (PC), a tablet PC, a personal . digital assistant (PDA), a mobile device, a palmtop
computer, a laptop computer, a desktop computer, a communications device, a wireless telephone,
a land-line telephone, a web appliance, a network router, switch or bridge, or any other machine
capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken
by that machine. Further, while a single computer system 200, 400, 600 is illustrated, the term
"system" shall also be taken to include any collection of systems or sub-systems that individually
or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
The computer system 200, 400, 600 may include a processor 702 e.g., a central processing unit
(CPU), a graphics processing unit (GPU), or both. The processor 702 may be a component in a
variety of systems. For example, the processor 702 may be part of a standard personal computer or
a workstation. The processor 702 may be one or more general processors, digital signal processors,
application specific integrated circuits, field programmable gate arrays, servers, networks, digital
circuits, analog circuits, combinations thereof, or other now known or later developed devices for
analysing and processing data The processor 702 may implement a software program, such as code
generated manually (i.e., programmed).
The computer system 200, 400, 600 may include a memory 704, such as a memory 704 that can
communicate via a bus 708. The memory 704 may be a main mt:mory, a static memory, or a
dynamic memory. The memory 704 may include, but is not limited to computer readable storage
media such as various types of volatile and non-volatile storage media, including but not limited to
random access memory; read-only memory, programmable rend-only memory, electrically
programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic
tape or disk, optical media and the like. In one example, the memory 704 includes a cache or
random access memory for the processor 702. In alternative examples. the memory 704 is separate
from the processor 702, such as a cache memory of a processor, the system memory, o~ other
memory. The memory 704 may be an external storage device or database for storing data.
Examples include a hard drive, compact disc ("CD"), digital video disc ("DVD"), memory card,
memory stick, floppy disc, universal serial bus ("USB") memory device, or any other device
operative to store data. The memory 704 is operable to store instructions executable by the
processor 702. The functions, acts or tasks illustrated in the figures or described may be performed
by the programmed processor 702 executing the ·instructions stored in the memory 704. The
functions, acts or tasks are independent of the particular type of instructions set, storage media,
processor or processing strategy and may be performed by software, hardware, integrated circuits,
firm-ware, micro-code and the like, operating alone or in combination. Likewise, processing
strategies may include multiprocessing, multitasking, parallel processing and the like.
As shown, the computer system 200, 400, 600 may or may not further include a display unit 710,
such as a liquid crystal display (LCD), an organic light emitting diode (OLEO), a flat panel display,
a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later
developed display device for outputting determined information. The display 710 may act as an
interface for the user to see the functioning of the processor 702, or specifically as an interface with
the software stored in the memory 704 or in the drive unit 716.
Additionally, the computer system 200, 400, 600 may include an input device 712 configured to
allow a user to interact with any of the components of system 200, 400, 600. The input device 712
may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch
screen display, remote control or any other device operative to interact with the computer system
200, 400, 600.
The computer system 200, 400, 600 may also include a disk or optical drive unit 716. The disk
drive unit 716 may include a computer-readable medium 722 in which one or more sets of
instructions 724, e.g. software, can be embedded. Further, the instructions 724 may embody one or
more of the methods or logic as described. In a particular example, the instructions 724 may reside
completely, or at least partially, within the memory 704 or within the processor 702 during
execution by the computer system 200, 400, 600. The memory 704 and the processor 702 also may
include computer-readable media as discussed above.
The present invention contemplates a computer-readable medium that includes instructions 724 or
receives and executes instructions 724 responsive to a propagated signal so that a device connected
to a network 726 can communicate voice, video, audio, images or any other data over the network
726. Further, the instructions 724 may be transmitted or received over the network 726 via a
communication port or interface 720 or using a bus 708. The communication port or interface 720
may be a part of the processor 702 or may be a separate component. The communication port 720
may be created in software or may be a physical connection in hardware. The communication port
720 may be configured to connect with a network 726, external media, the display 71 0, or any
other components in system 200, 400, 600 or combinations thereat: The connection with the
network 726 may be a physical connection, such as a wired Ethernet connection or may be
established wirelessly as discussed later. Likewise, the additional connections with other
components of the system 200, 400, 600 may be physical connections or may be established
wirelessly. The network 726 may alternatively be directly connected to the bus 708.
The network 726 may include wired networks, wireless networks, Ethernet A VB networks, or
combinations thereof. The wireless network may be a cellular telephone network, an 802.11,
802.16, 802.20, 802.1 Q or WiMax network. Further, the network 726 may be a public network,
such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize
a variety of networking protocols now available or later developed including, but not limited to
TCP/IP based networking protocols.
In an alternative example, dedicated hardware implementations, such as application specific
integrated circuits, programmable logic arrays and other hardware devices, can be constructed to
implement various parts of the system 200, 400, 600.
Applications that may include the systems can broadly include a variety of electronic and computer
systems. One or more examples described may implement functions using two or more specific
interconnected hardware modules or devices with related control and data signals that can be
communicated between and through the modules, or as portions of an application-specific
integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware
implementations.
The system described may be implemented by software programs executable by a computer
system. Further, in a non-limited example, implementations can include distributed processing,
component/object distributed processing, and parallel processing. Alternatively, virtual computer
system processing can be constructed to implement various parts of the system.
The system is not limited to operation with any particular standards and protocols. For example,
standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP,
HTML, HTTP) may be used. Such standards are periodically superseded by faster or more efficient
equivalents having essentially the same functions. Accordingly, replacement standards and
protocols having the same or similar functions as those disclosed are considered equivalents
thereof.
In the following paragraphs, a detailed description about exemplary implementation of various
features of the invention and a corresponding control flow across associated with such features has
been provided. It should however be understood that every implementation of as claimed method
and apparatus need not follow the exemplary features and steps as described mentioned in the
following paragraphs. Thus, the scope of the claims .is intended to be restricted only on the basis of
the claims and their equivalents and not on the basis of the examples provided herein below.
EXEMPLARY IMPLEMENTATION OF THE PRESENT INVENTION
Figures 8a and 8b show an exemplary arrangement of a plurality of authentication. modes along
with an authentication mode selection mechanism within the apparatus of Fig. 2, Fig. 4 and Fig. 6,
in accordance with the present invention. In the present example, the authentication modes have
been depicted as based on swipe, face recognition, face and voice recognition based, design
pattern, numeric PfN based, alphanumeric password, and finally a 'smart authentication mode'.
The aforesaid authentication modes operate in accordance with their pre-defined configuration
settings while the smart authentication mode incorporates the method as depicted in Fig. I, 3 and
Fig. 5.
Further, the order of arrangement of pre-defined authentication modes in Fig 8(b) may be a
chronological order of security level I security strength. Accordingly, such order may be an
increasing to decreasing order. Other examples of authentication modes not depicted under Fig·.
8(b) include tap based authentication, device proximity based authentication, user proximity based
authentication, location proximity based authentication, context based authentication, image based
authentication, sound based authentication, bio-metric data based authentication, image and Sound
based authentication, etc.
In case of any of the aforesaid authentication modes other than the smart authentication mode is
selected, the apparatus as described in Fig. 2, 4 and 6 functions in a conventional manner. Upon
selection of the smart authentication mode, the user is enabled to switch between aforesaid
authentication modes with a pre-defined way of providing inputs. ln an example, various types of
inputs may be provided via the hardware units present upon the device and operable by a user even
when the device is locked from accessing or operating in a stand-by mode.
Examples of such hardware keys include volume control button, a camera control button, a
joystick, a qwerty key pad, an alphanumeric keypad, a call-connect button etc. In the present
example of Fig. 8, Volume up/down key may be considered as acting as the hardware key to select
any pre-defined authentication mode, wherein the input generated therefrom may be a two bit input
composed of 1 and 0. In case, the Volume Up/ Down=O, it means that button is not pressed by
user, while in case Volume Up/ Down= 1, it means that button is pressed by user.
The selection between different authentication modes is governed by a truth table associated with a
particular pre-defined authentication mode with a particular two bit sequence. The following
exemplary table illustrates different sequences or combinations of two bits 1 and 0 for associating
with different authentication modes.
Volume Volume Output
Up Down
0 0 No change
0 1 Swipe I Shift
I 0 Mode Swap
1 I Pseudo/ Backup Password
1. Going by the above logic, the first row of truth table means that volume-up as well as
volume-down buttons are not pressed by user, and accordingly there is no change of the
authentication mode on the lock screen.
2. Similarly, if volume up button is not pressed by user but volume down is pressed by user,
the result is a change of the current authentication mode on the lock screen to the simple swipe
mode.
3. Similarly, if volume up button is pressed by user but volume down is not pressed by user,
the result is change of the current authentication mode on the lock screen to the shift mode
(explained later in the Figures 20-22).
4. Similarly when volume up as well as volume down buttons is pressed by user, the result is
change of the current authentication mode on the lock screen to the Psuedo/ Backup P·assword
mode.
Likewise even 3 bit sequences may be generated by pressing the volume up/down keys in
accordance with a particular sequence, a pre-determined time interval between any two pressings,
and a pre-determined overall time period of actuating the keys. For example, instead of volume up
and volume down key by 1 and 0, a sequence or order of pressing of volume up/down keys in an
overall time lesser than or equal to a pre-determined threshold limit (say 3 second) may be decide
various 3 bit sequences. Also, a maximum time interval, say 1 sec, is required between any two key
pressings. Accordingly, upon actuating the Volume up button twice and Volume down once, a
truth table may be represented as follows:
Volume Volume Volume Down Output
Up Up
0 0 0 No change
0 0 1 Swipe
0 1 0 Clockwise Shift
0 I I Swap
I 0 0 Anticlockwise Shift
I 0 I Swap
I I 0 Pseudo Password
I I I Future use
Similarly, many other bit sequences for example 4 bit, 5 bit sequences ,etc, may be formulated
based upon a particular order and time intervals of actuation of Volume up/down keys. For
example, various 5 bit sequences may be generated upon pressing the volume up/down in the order
as represented by the following table:
Volume Up Volume Up Volume Volume Output
down Down
Further in order to generate more than 2 bit sequences, volume up/down key may be used in
association with an third hardware unit such camera key or power key, wherein pressing of such
third key may be designated either as logical 0 or logical I.
Further, rather than following the truth table, the hardware units such as the volume up/down may
be used navigational keys as a part of the "smart authentication mode" to select an authentication
mode next in sequence to the present authentication mode. Following may be the conditions
associated with such sequential actuation:
1. Pressing Volume Up key signifies moving to a next higher mode of authentication or a next
higher security level, which means if the user has an existing authentication mode as swipe mode
(least or negligible in security) and wants to move to Face/ voice recognition based mode (next
high security mode), the volume up key may be pushed once and the authentication mode changes
to face/ voice unlock.
3. Pressing Volume Down key signifies moving to the next lower mode of authentication or a
lower security level, which means if the user has an alphanumeric password based authentication
mode (High in Security) and wishes to move to numerical PIN based mode (next low security
mode), the volume up key may be pressed once and the authentication mode changes to PIN.
In other examples, combination of Volume Up and down buttons can be used to move between
authentication modes. In addition, a camera control button, a joystick, a qwerty key pad, an
alphanumeric keypad, a call-connect button, a call-disconnect button, and a power button may be
used for such navigation.
Figure 9 depicts an exemplary control flow within the apparatus of Fig. 2, 4 and 6 in accordance
with all the embodiments of the present invention. Specifically, the control flow depicts that in case
the device is in a locked state, the actuation of hardware unit (e.g. volume up and volume down
keys) selects among pre-defined authentication modes namely swipe authentication, mode swap
authentication, pseudo password authentication, and. activates the selected authentication mode,
depending upon the nature of provided user input. Apart from being in locked state, the device may
also be in a stand-by mode, a sleep mode, a hibernate mode, a power down mode etc, so that the
hardware unit provided inputs are eligible for changing the authentication mode.
However, the inputs provided through hardware units are never allowed to do afores~id selection
and activation, in case the device is in non-locked or functional state and instead the usual
functionality associated with the volume up/down key is performed.
Figure 10 depicts an exemplary touch screen surface of the apparatus of Fig. 2, 4 and 6 in
accordance with all the embodiments of the present invention. Such touch screen surfaces depicted
in Fig lOa, lOb and lOc also acts as base for executing a swiping action in mobile phone, tablet,
computer etc. The present example allows such kind of swiping action to select the pre-defined
modes of Fig. 8 in place of the hardware unit, in such instances wherein the device is already in a
functional or active mode i.e. unlocked mode. Accordingly, such kind of actuation done in
unlocked modes aids the user in directly locking the device and selection of the new authentication
mode.
Further, such actuation or swiping may be executed in a designated area of touch sensitive surface
in Fig 1 Oa , wherein such designated areas are depicted in the present Fig. 1 O(b) and Fig. I 0( c).
In an example, the touch screen surface of in Fig. 1 Oa has a resolution of 240*320 pixels.
Accordingly, the designated area to execute a swiping action is the lowest part of the display screen
as denoted by Fig. 10 (b). As an example, Figure IO(b) corresponds to a resolution of 240*10
pixels, wherein the width is 240 pixels and the height is 10 pixels. Further, a Swipe left and Swipe
Right is used to validate the inputs in a truth table, wherein a swipe left (swiping movement right to
left) and swipe right ( swiping movement from left to right) correspond to logical 1, no swiping
action corresponds to logical 0. Accordingly, either of Swipe left or Swipe Right traversing more
than at least 80% of the width in Fig. 10 (b) or Fig. 10 (c) will be considered as the input, while no
swiping action or a swiping action traversing less than 80% of the width is treated as 'no input'.
As soon as one of the input sequence is entered within a certain period oftime, a binary sequence is
generated and the device will be locked and a password corresponding to the particular bi(
sequence is set to unlock the device at later stages.
Example of truth tables associating the pre-defined authentication modes with respective bit (2-bit
or more) sequencesis shown as follows:
Sample Truth Table for 2x2 inputs
I Swipe Left . . I .Swipe Right I Output
0 0 No Change
0 1 Swipe I Shift
1 0 Mode Swap
1 1 Pseudo Password
The aforesaid truth table has been also pictorially represented through Fig. II that describes
mapping of various pre-defined authentication modes with particular combinations of right and left
swipes. Specifically, Fig. II (a) corresponds to activation of "swipe/shift" mode, Fig. II (b)
corresponds to activation of "mode swap" authentication mode and Fig. II(c) corresponds to
activation of "pseudo password" authentication mode.
Further, not just the sequence of bits, but a sequence of swiping actions is also relevant to
correspond to a particular authentication mode. For example, in respect of 'mode-swap'
authentication mode where the corresponding bit sequence is I 0, an initial Swipe Right and then a
Swipe Left may be also applicable as a sequence to activate the· mode swap mode. Here, although
the 'bit sequence' i.e. 1I, is similar to "pseudo password" authentication mode, but the 'swiping
action sequence' is different, as the swipe right is executed ahead of swipe left as compared to
"pseudo password" authentication mode. Accordingly, "mode swap" mode gets activated in place
of "pseudo password" mode.
Further examples of more than 2 bit truth tables are as follows:
Sample Truth Table for 3x3 Inputs
Swipe Left Swipe Left Swipe Right Output
0 0 0 No Change
0 0 I Swipe
0 I 0 Swap
1 0 0 Clockwise Shift
I 0 I Swap
I I 0 Anticlockwise Shift
I 1 I Future Use
Similarly more than 3 bit sequences may be generated depending on set of inputs. An exem.plary 5
bit sequence may be generated as follows:
,----------------------------- --
Swipe Left Swipe Left Swipe Right Swipe Right Output
Further, the swiping actions (left or right) executed in pre-defined sequences within the designated
area of Fig. 9(b) and in a pre-determined time interval lead to another exemplary truth t.ahle. For
example, making a single left swipe as a mandatory initial swipe followed by any number of right
swipes (0 to 5) is used for setting a new authentication mode. The same has been represented
through the following truth table.
No of left Swipes No of Right Swipes Output
(Precondition)
1 or more 0 No change
1 or more \ 1 Pseudo Password
1 or more 2 Clockwise shift
1 or more 3 Anticlockwise shift
1 or more 4 Mode swap
1 or more 5 Future use
The aforesaid truth table has been pictorially represented through Fig 12. Likewise, making the
right swipe as a mandatory initial swipe followed by any number of left swipes will be considered
to lock the device and set new authentication code. Exemplary format is as follows:
No of Right Swipes No of Left Swipes Output
(Precondition)
The aforesaid truth table is also applicable in respect of the devices that support finger scanner at a
home key. The swipes made at home key also are used to lock the device and set new
authentication mode.
Again going back to representation in Fig. 1 Ob, further truth tables may be contemplated for
selection of authentication modes by focusing. upon the sequence of left swipe and right swipe,
instead of correlating swiping actions with generation of bit sequences. A corresponding truth table
is as follows:
Swipe Input 1 Swipe Input 2 Output
Left .None No change
Left Right Pseudo Password
Right None Mode Swap
Right Left Swipe
Left Left Clol:kwist: Shift
Right Right Anticlockwise Shift
Similarly more outputs can be obtained by adding more input numbers.
Swipe Input 1 Swipe Input 2 Swipe Input 3 Output
Now considering Fig. 1 0( c), wherein the designated area of Fig. 1 O(b) has been further divided into
two vertical parts, a number of taps may be considered rather than swiping actions. A number of
taps on each part, and the sequence of such executed taps may be considered to lock the device and
set new authentication mode.
In an example, taps on the left side of the middle of screen will be considered as left tap, and the
taps on the right side of the middle of screen will be considered as right tap. An exemplary truth
table is as follows
Tap Input 1 Tap Input 2 Output
Left None No change
Left Right Pseudo Password
Right None Mode Swap
Right Left Swipe
Left Left Clockwise Shift
Right Right Anticlockwise Shift
In continuance with the designated area of Fig. 9(c), two right taps are considered as a
prt:condition, to avoid an ambiguous situation in case the user taps inadvertently on the defined
area, without intention of change in authentication mode. Once the precondition is fulfilled and a
pre-deter.mined time interval of providing the inputs is met, output is generated. An exemplary
truth table is as follows:
I No of Right Taps I Output
~~0 UELRI 26-0~-281~
0 No change
1 Pseudo Password
2 Clockwise shift
3 Anticlockwise shift
4 Mode swap
5 Future use
Similarly left taps also can be used to Jock the device and to set new authentication mode. Two left
taps will be considered as precondition, to avoid an ambiguous situation, wherein user taps by
mistake on the defined area without intending to change the authentication mode. Once the
precondition is fulfilled and a pre-determined time interval of providing the inputs is met, output is
generated. An exemplary truth table is as follows:
No of Left Taps Output
0 No change
1 Pseudo Password
2 Clockwise shift
3 Anticlockwise shift
4 Mode swap
5 Future use
Figure 13 depicts an exempl:;try yet another touch screen surface of the apparatus of Fig. 2, 4 and 6
in accordance with all the embodiments of the present invention. Instead of designating a lowest
screen area in Fig. 10 as the swiping or tapping area, a topmost screen area or in other words a
header of the touch screen surface may be used as a base for executing swiping or tapping actions
to eventually lock the device and set new authentication mode.
Accordingly, input is given, for example, at a title bar of the application. The Left swipe I right
swipe input sequence is considered to finalize the output, according to truth table. Such sequence or
order of the swipe is saved to validate a combination present within the input provided by the user.
A sample Truth Table for two swipe inputs is as below:
Swipe Input 1 Swipe Input 2 Output
Left None No change
Left Right Pseudo Password
Right None Mode Swap
Right Left Swipe
Left Left Clockwise Shift
Right Right Anticlockwise Shift
Similarly, more outputs can be contemplated by elongating the. sequence of inputs. A sample
format is as follows:
Swipe Input 1 Swipe Input 2 Swipe Input 3 Output
Figure 14 depicts an exemplary yet another touch screen surface of the apparatus of Fig. 2, 4 and 6
in accordance with all the embodiments of the present invention. The screen area herein has been
divided in 2 or 3 parts, wherein each parts acts as a base to receive tap or swiping action as an
input. Accordingly, small screen areas may be represented as Part], Part2, Part3 etc.
Depending on the type of swipes done in respective areas, corresponding output will be finalized
from Truth Table, device will be locked and a respective authentication mode will be activated.
Swipe covering more than 80% of screen width, towards left or towards right, will be considered as
valid input. Following is an exemplary truth table denoting swipes in two screen areas to select a
particular authentication mode:
Part 1 0 0 1 I
Part 2 0 1 0 1
Output No change Pseudo Password Swipe/ Shift Mode Swap
Similarly, swiping in thee screen areas adds to the variety of outputs and accordingly the variety of
achievable authentication modes. Following is an exemplary truth table denoting role of three
screen areas in receiving the swipes and activating selected authentication modes:
Part I 0 0 0 0 1 I I I
Part 2 0 0 1 I 0 0 I 1
Part 3 0 I 0 I 0 I 0 I
Output No swipe shift Mode shift Mode Pseudo Future
change swap swap Password Use
Figure 15 depicts an exemplary yet another touch screen surface of the apparatus of Fig. 2, 4 and 6
in accordance with all the embodiments of the present invention. Herein, a volume pop up, i.e. a
volume control window, wherein the control is dragged by swiping on touch screen surface in a
particular direction, is used for receiving the user executed swipes to generate inputs so as to lock
the device and set new authentication mode.
I - -~- ~Accordingly; while-using-th-e~~'C>lume~p-dp~indow;-ifuser Wishes to loclnh1rdevice ana change~flie ..
authentication mode, the user has to drag the volume Up/ Volume Down control through swiping.
Again as aforementioned, the swipe action is required to traverse more than 80% of the volume pop
up window.
The swiping actions i.e. right swipes and left swipes have been pictorially represented through Fig.
16, wherein the control is being dragged across the width of the pop up window through left or
right swiping.
Further, the sequence/ order of the right swipe and left swipe to generate various outputs in respect
of Fig. 15 is represented through following truth table:
Swipe Input I Swipe Input 2 Output
Left None No change
Left Right Pseudo Password
Right None Mode Swap
Right Left. Swipe
Left Left Clockwise Shift
Right· Right Anticlockwise Shift
Figure 17 depicts an exemplary yet another touch screeri surface of the apparatus of Fig. 2, 4 and 6
in accordance with all the embodiments of the present invention. For example, right swipes and left
swipes may be made at a notification window to generate the output, lock the device and select a
particular authentication mode. Exemplary truth table is as follows:
Swipe Input 1 Swipe Input 2 Output
Left None No change
Left Right Pseudo Password
Right None Mode Swap
Right Left Swipe
Left Left Clockwise Shift
Right Right Anticlockwise Shift
Similarly, more outputs can be obtained by adding more input numbers.
Swipe Input 1 Swipe Input 2 Swipe Input 3 Output
Now, forthcoming description of Fig. 17-23 depicts various examples of the pre-defined
authentication modes. It may be recollected that such modes may be seleeted through hardware key
input (as described under the description of Fig 8) whenever the device is restricted from access i.e.
the device is under a locked state or stand-by state. On the other hand, when the device is in a
functional mode or in unlocked state and the user wishes to lock the device through a particular
pre-defined authentication mode, then the predefined modes may be otherwise selected through
various touch screen surfaces, swipes (left or right), taps etc as events covered under the
description of Fig.1 0-17.
Figure 18 (a and b) depicts an exemplary authentication mode incorporated within the apparatus of
Fig. 2, 4 and 6 in accordance with the present invention. In the present example, such
authentication mode may be a 'Pseudo password' mode.
During the configuration settings of the 'Pseudo password' authentication mode, the user sets a
main password as well as back up password, so as to enable unlocking by any of the two passwords
at a particular instant. Accordingly, depending upon the input generated through hardware key or
swipes or taps, the pseudo password mode is activated. In addition, still depending upon the nature
of the current input, either of the passwords will be authorize to unlock the device.
For example, while both 110 and 111 as user inputs lead to activation of the pseudo password
mode, 110 will be entitled to activate the main password for unlocking, while 111 will be held
applicable for unlocking by the back-up password. Accordingly, at a particular instant only one
password will be applicable.
Moreover, while the pseudo password authentication mode has been already activated through the
present invention and phone is in locked state, the user may still switch from one password to
another by pressing of hardware unit (e.g. volume up/down key), i.e. to make a transition from 110
to Ill through the hardware unit while the device is still locked.
Fig. 18a represents a numbering pattern while Fig. 18 b depicts switching from main password to
the back-up password, when the pseudo password authentication mode has been activated by the
smart authentication mode by user inputs. Fig. 17b depicts an exemplary scenario where a main
authentication pattern (or main password) set through the numbering pattern of Fig. 17(a) is 3-6-9-
8-5, whereas a Pseudo Pattern (back up password) as set by the,user is 1-4-7-8. Accordingly, either
of the two patterns/passwords will be required at a particular instant to unlock the device,
depending upon the "nature" of the user input to activate the current authentication mode through
smart authentication mode functionality.
Figure 19(a) and Figure 19(b) respectively denote some more examples of pseudo authentication
mode in tenns of alphanumeric password and numerical PIN, respectively.
Figure 20 (a and b) depicts another exemplary authentication mode as 'shift authentication' mode.
This authentication mode is similar in nature to the 'pseudo password authentication' mode and is
activated with a 'particular password' depending upon then nature of user input provided through
hardware units or swipes under the smart authentication mode functionality. However while the
authentication modes described under Figures 18 and 19 require a user to provide two passwords
during configuration settings, the shift mode requires a single password or PIN, and still manages
to set a particular variant of said single password out of many conceivable variants.
As evident from Fig 20(a) and 20(b), many variants of a main password may be automatically
generated by clockwise shifting (or right shift) and anticlockwise shifting (or left shifting) a single
user inputted password. Accordingly, a particular variant of password shall be applicable for
unlocking the device at particular instant, depending upon the nature of user input provided through
the smart authentication mode functionality. E.g. a clockwise shift is caused every time the bit
sequence changes in a particular direction. For example, I 00, 101, 110, 111 causes 4 shifts in
clockwise direction. As a result, based upon a particular type of swiping event (a combination of
number of right swipes and left swipes done in a particular sequence and within a pre-determined
time limit) or a particular sequence of actuation of hardware unit (e.g. volume up and down keys
pressed in a particular sequence in a pre-determined time limit), a particular variant of the
password is applicable.
Moreover, in the scenario where device is already locked through shift authentication mode,
hardware units are pressed in a particular sequence to 'shift' the password during run time. For
1CPU ·oE.Lffl ·26 -B·S- ·2u1··-; 1··s-: -~78
example, twice pressing of volume up key during the locked state ofthe device results in two shifts
in anticlockwise directions to evolve a particular variant of the password different from the original
password by two shifts.
Figure 21 (a and b) and Figure 22 (a and b) represents the 'shift authentication mode' as described
in Fig. 19, wherein the numerical PIN or alphanumeric password undergoes right or left shift.
Figure 23 (a, band c) represents "mode swap" authentication mode, which upon activation selects
a pre.-defined authentication mode next in sequence to the existing authentication mode. The
examples depicted a, b, and c of the present figure describe the events where a currently activated
PIN lock mode is changed to pattern lock mode, a currently activated swipe authentication mode is
changed to either the numerical PIN authentication mode or alphanumeric password authentication
mode.
It may be understood that the mode swap authentication mode is activated based upon the user
inputs through hardware unit and the touch·screen surface as the part of smart authentication mode
functionality. Thereafter, based upon its configuration settings, the mode swap authentication mode
automatically 'in tum activates' a pre-defined authentication mode that is a successor to the
currently activated authentication mode. Accordingly, such "in tum activation" is not dependent
upon the nature of user input and is pre-defined.
Figure 24 (a and b) represents "swipe" authentication mode, which upon activation only and solely
activates the swipe authentication mode to replace a currently active authentication mode. Again
the present authentication mode is activated based upon the nature of user input provided through
hardware unit or swipes upon the touch sensitive surface as part of the smart authentication mode
functionality.
Further, m respect of every authentication mode change or authentication input
(password/PIN/Pattern) as executed under the smart authentication mode through inputs arising
from hardware unit or touch screen surface actuation, a log is maintained to record the date and
time of activation of various authentication modes and inputs. Accordingly, authentication mode or
authentication input appl·icable at any designated time and day may be retrieved. In addition,
whenever there is change in authentication mode or authentication input through the present smart
authentication mode functionality, an indication may be provided to the user through a haptic
feedback mechanism, a notification, a pop-up window, an alarm, a beep, a visual display, an audio
feedback, an audio-visual mechanism etc.
Further, once the authentication mode or password/PIN/pattern has been changed, the device is
allowed to be accessed upon receipt of a password from the user for the retrieved authentication
mode. For such purposes, a pre-stored password is retrieved in accordance with the retrit:vt:d
authentication mode, and the password received from the user is compared with the said pre-stored
password.
While specific language has been used to describe the disclosure, any limitations arising on account
of the same are not intended. As would be apparent to a person in the art, various working
modifications may be made to the method in order to implement the inventive concept as taught
herein.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art
will appreciate that one or more of the described elements may well be combined into a single
functional element. Alternatively, certain elements may be split into multiple functional elements.
Elements from one embodiment may be added to another embodiment. For example, orders of
processes described herein may be changed and are not limited to the manner described herein.
Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all
of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts
may be performed in parallel with the other acts. The scope of embodiments is by no means limited
by these specific examples. Numerous variations, whether explicitly given in the specification or
not, such as differences in structure, dimension, and use of material, are possible. The scope of
embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to .
specific embodiments. However, the benefits, advantages, solutions to problems, and any
component(s) that may cause any benefit, advantage, or solution to occur or become more
pronounced are not to be .construed as a critical, required, or essential feature or component of any
or all the claims.
We Claim:
1. A method of managing of a device that enables an access control via a plurality of
authentication modes, the method comprising:
receiving (step 1 02) a user input;
retrieving (step 1 06) an authentication mode from the plurality of authentication modes in
accordance with the received user input; and
activating (step 1 08) the retrieved authentication mode in place of a current authentication
mode for controlling access of said device.
2. The method as claimed in claim 1, wherein said retrieving comprises:
determining whether the received user input matches at least one predetermined user input.
3. The method as claimed in claim 2, wherein the user input is received via a single input unit
and said determining further comprises:
determining whether a number of pressing the single input unit matches at least one
predetermined number;
determining whether a time interval between two or more consecutive pressings of the
single input unit matches a predetermined time interval; or
determining whether an overall time period taken to provide the user input via the single
input unit is within a predetermined threshold limit.
4. The method as claimed in claim 2, wherein the user input is received via a plurality of input
units and said determining further comprises:
determining whether the sequence of pressing the plurality of input units matches a
predetermined sequence;
determining whether a time interval between two or more consecutive pressings of the
plurality of input units matches a predetermined time interval; or
determining whether an overall time period taken to provide the user input via the plurality
of input units is within a predetermined threshold limit.
5. The method as claimed in claim 1 further comprising determining (step 11 0) an
applicability of said user input in respect of a current state of the device.
6. The method as claimed in claim 5, said current state includes at least one of a stand-by
mode, sleep mode, hibernate mode, power down mode, locked state mode or unlocked state mode
of the device.
7. The method as claimed in claim I, wherein the plurality of authentication modes include
two or more of:
• No authentication;
• Swipe based authentication;
• Tap based authentication;
• Device proximity based authentication;
• User proximity based authentication;
• Location proximity based authentication;
• Context based authentication;
• Image based authentication;
• Sound based authentication;
• Bio-metric data based authentication;
• Image and Sound based authentication;
• Input Pattern based authentication;
• PIN based authentication; and
• Alpha-numeric password based authentication.
8. The method as claimed in claim I, wherein the plurality of authentication modes are
arranged in an chronological order of security level I security strength and retrieving includes
retrieving an authentication mode from the plurality of authentication modes in accordance with
the chronological order based on the received user input.
9. The method as claimed in ·ctaim I, further comprising:
allowing (step II2) the device to be accessed upon receipt of a password from the user for the
retrieved authentication mode.
I 0. The method as claimed in claim 9, wherein said allowing further comprises:
retrieving a pre-stored password in accordance with the retrieved authentication mode; and
comparing the password received from the user with the said pre-stored password.
II. The method as claimed in claim I, further comprising intimating the user regarding
activation of said retrieved authentication mode within said device through one or more of a haptic
feedback mechanism, a notification, a pop-up window, an alarm, a beep, a visual display, an audio
feedback, an audio-visual mechanism etc.
12. An apparatus (200) for managing a device that enables an access control via a plurality of
authentication modes, the apparatus (200) comprising:
a receiver (202) for receiving a user input;
a comparator (204) for retrieving an authentication mode from the plurality of authentication
modes in accordance with the received user input; and
an actuator (206) for activating the retrieved authentication mode in place of a current
authentication mode for controlling access of said device.
13. A method of managing of a device that enables an access control via a plurality of
authentication modes, the method comprising:
receiving (step 302) a user input via a hardware unit provided in the device;
retrieving (step 304) an authentication mode from the plurality of authentication modes in
accordance with the user input received via the hardware unit; and
activating (step 306) the retrieved authentication mode in place of a current authentication
mode for controlling access of said device.
14. The method as claimed in claim 13, wherein the hardware unit is selected from the group
comprising one or more of:
a volume control button;
a camera control button;
a joystick;
a qwerty key pad;
an alphanumeric keypad;
a call-connect button;
a call-disconnect button; and
a power button.
15. The method as claimed in claim 13, further comprising intimating (step 308) the user regarding
said activation of retrieved authentication mode within the device through one or more of a haptic
feedback mechanism, a notification, a pop-up window, an alarm, a beep, a visual display, an audio
feedback, an audio-visual mechanism etc.
16. An apparatus ( 400) for managing a device that enables an access control via a plurality of
authentication modes, the apparatus ( 400) comprising:
a receiver ( 402) for receiving a user input via a hardware unit provided in the device;
a comparator (404) for retrieving an authentication mode from the plurality of
authentication modes in accordance with the user input received via the hardware unit; and
an actuator ( 406) for activating the retrieved authentication mode in place of a current
authentication mode for controlling access of said device.
17. A method of managing of a device that enables an access control via a plurality of
authentication passwords, the method comprising:
receiving (step 502) a user input;
retrieving (step 504) an authentication password from the plurality of authentication
passwords in accordance with the received user input;
activating (step 506) the retrieved authentication password in place of a current
authentication password for controlling access of said device;
receiving (step 508) an authentication password from the user; and
comparing (step 51 0) the authentication password received from the user with the said
retrieved authentication password.
18. The method as claimed in claim 15, further comprising intimating (step 512) the user
regarding said activation of retrieved authentication password within the device through one or
more of a haptic feedback mechanism, a notification, a pop-up window, an alarm, a beep, a visual
display, an audio feedback, an audio-visual mechanism etc.
19. An apparatus (600) for managing of a device that enables an access control via a plurality of
authentication passwords, the apparatus (600) comprising:
a first receiver (602) for receiving a user input;
a first comparator (604) for retrieving an authentication password from the plurality of
authentication passwords in accordance with the received user input;
an actuator (606) for activating the retrieved authentication password in place of a current
authentication password for controlling access of said device;
a second receiver (608) for receiving an authentication password from the user; and
a second comparator ( 61 0) for comparing the authentication password received from the user
with the said retrieved authentication password.
| # | Name | Date |
|---|---|---|
| 1 | 1414-DEL-2015-RELEVANT DOCUMENTS [09-09-2023(online)].pdf | 2023-09-09 |
| 1 | FORM 3.pdf | 2015-05-21 |
| 2 | 1414-del-2015-GPA-(26-05-2015).pdf | 2015-05-26 |
| 2 | 1414-DEL-2015-IntimationOfGrant05-01-2022.pdf | 2022-01-05 |
| 3 | 1414-DEL-2015-PatentCertificate05-01-2022.pdf | 2022-01-05 |
| 3 | 1414-del-2015-Form-5-(26-05-2015).pdf | 2015-05-26 |
| 4 | 1414-del-2015-Form-3-(26-05-2015).pdf | 2015-05-26 |
| 4 | 1414-DEL-2015-ABSTRACT [16-06-2020(online)].pdf | 2020-06-16 |
| 5 | 1414-del-2015-Form-2-(26-05-2015).pdf | 2015-05-26 |
| 5 | 1414-DEL-2015-CLAIMS [16-06-2020(online)].pdf | 2020-06-16 |
| 6 | 1414-del-2015-Form-18-(26-05-2015).pdf | 2015-05-26 |
| 6 | 1414-DEL-2015-DRAWING [16-06-2020(online)].pdf | 2020-06-16 |
| 7 | 1414-del-2015-Form-1-(26-05-2015).pdf | 2015-05-26 |
| 7 | 1414-DEL-2015-FER_SER_REPLY [16-06-2020(online)].pdf | 2020-06-16 |
| 8 | 1414-DEL-2015-OTHERS [16-06-2020(online)].pdf | 2020-06-16 |
| 8 | 1414-del-2015-Drawings-(26-05-2015).pdf | 2015-05-26 |
| 9 | 1414-del-2015-Description (Complete)-(26-05-2015).pdf | 2015-05-26 |
| 9 | 1414-DEL-2015-FER.pdf | 2019-12-18 |
| 10 | 1414-del-2015-Correspondence Others-(26-05-2015).pdf | 2015-05-26 |
| 10 | 1414-DEL-2015-Correspondence-101019.pdf | 2019-10-14 |
| 11 | 1414-del-2015-Claims-(26-05-2015).pdf | 2015-05-26 |
| 11 | 1414-DEL-2015-OTHERS-101019.pdf | 2019-10-14 |
| 12 | 1414-DEL-2015-8(i)-Substitution-Change Of Applicant - Form 6 [18-09-2019(online)].pdf | 2019-09-18 |
| 12 | 1414-del-2015-Abstract-(26-05-2015).pdf | 2015-05-26 |
| 13 | 1414-DEL-2015-ASSIGNMENT DOCUMENTS [18-09-2019(online)].pdf | 2019-09-18 |
| 13 | 1414-DEL-2015-PA [18-09-2019(online)].pdf | 2019-09-18 |
| 14 | 1414-DEL-2015-ASSIGNMENT DOCUMENTS [18-09-2019(online)].pdf | 2019-09-18 |
| 14 | 1414-DEL-2015-PA [18-09-2019(online)].pdf | 2019-09-18 |
| 15 | 1414-DEL-2015-8(i)-Substitution-Change Of Applicant - Form 6 [18-09-2019(online)].pdf | 2019-09-18 |
| 15 | 1414-del-2015-Abstract-(26-05-2015).pdf | 2015-05-26 |
| 16 | 1414-del-2015-Claims-(26-05-2015).pdf | 2015-05-26 |
| 16 | 1414-DEL-2015-OTHERS-101019.pdf | 2019-10-14 |
| 17 | 1414-DEL-2015-Correspondence-101019.pdf | 2019-10-14 |
| 17 | 1414-del-2015-Correspondence Others-(26-05-2015).pdf | 2015-05-26 |
| 18 | 1414-del-2015-Description (Complete)-(26-05-2015).pdf | 2015-05-26 |
| 18 | 1414-DEL-2015-FER.pdf | 2019-12-18 |
| 19 | 1414-del-2015-Drawings-(26-05-2015).pdf | 2015-05-26 |
| 19 | 1414-DEL-2015-OTHERS [16-06-2020(online)].pdf | 2020-06-16 |
| 20 | 1414-DEL-2015-FER_SER_REPLY [16-06-2020(online)].pdf | 2020-06-16 |
| 20 | 1414-del-2015-Form-1-(26-05-2015).pdf | 2015-05-26 |
| 21 | 1414-DEL-2015-DRAWING [16-06-2020(online)].pdf | 2020-06-16 |
| 21 | 1414-del-2015-Form-18-(26-05-2015).pdf | 2015-05-26 |
| 22 | 1414-DEL-2015-CLAIMS [16-06-2020(online)].pdf | 2020-06-16 |
| 22 | 1414-del-2015-Form-2-(26-05-2015).pdf | 2015-05-26 |
| 23 | 1414-DEL-2015-ABSTRACT [16-06-2020(online)].pdf | 2020-06-16 |
| 23 | 1414-del-2015-Form-3-(26-05-2015).pdf | 2015-05-26 |
| 24 | 1414-del-2015-Form-5-(26-05-2015).pdf | 2015-05-26 |
| 24 | 1414-DEL-2015-PatentCertificate05-01-2022.pdf | 2022-01-05 |
| 25 | 1414-DEL-2015-IntimationOfGrant05-01-2022.pdf | 2022-01-05 |
| 25 | 1414-del-2015-GPA-(26-05-2015).pdf | 2015-05-26 |
| 26 | FORM 3.pdf | 2015-05-21 |
| 26 | 1414-DEL-2015-RELEVANT DOCUMENTS [09-09-2023(online)].pdf | 2023-09-09 |
| 1 | 33tposearchreport_26-11-2019.pdf |