Embedded authentication systems in an electronic device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-021/00
G06F-003/0488
G06F-021/31
G06F-021/32
G06F-021/36
G06K-009/00
H04L-029/06
출원번호
US-0142674
(2013-12-27)
등록번호
US-9038167
(2015-05-19)
발명자
/ 주소
Fadell, Anthony
Hodge, Andrew
Schell, Stephan
Caballero, Ruben
Dorogusker, Jesse Lee
Zadesky, Stephen
Sanford, Emery
출원인 / 주소
Apple Inc.
대리인 / 주소
Morrison & Foerster LLP
인용정보
피인용 횟수 :
11인용 특허 :
180
초록▼
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that t
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
대표청구항▼
1. An electronic device, comprising: a display;a fingerprint sensor;one or more processors;memory; andone or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: disp
1. An electronic device, comprising: a display;a fingerprint sensor;one or more processors;memory; andone or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: displaying a first user interface on the display;while displaying the first user interface on the display, receiving a request to access resources of a first type from a respective user, wherein: the device includes resources of the first type;a first subset of resources of the first type are associated with a first user;the first subset of resources of the first type are secured by an authentication system;a second subset of resources of the first type are associated with a second user;the second subset of resources of the first type are secured by the authentication system;the first user and the second user are members of a predefined group; andthe predefined group has access to one or more group resources; andin response to receiving the request to access resources of the first type: in accordance with a determination that the respective user has been authenticated with the authentication system as the first user, providing access to a first plurality of resources of the first type of resources, including the first subset of resources and the group resources;in accordance with a determination that the respective user has not been authenticated with the authentication system as the first user, providing access to a second plurality of resources of the first type that does not include the first subset of resources;in accordance with a determination that the respective user has been authenticated with the authentication system as the second user, providing access to a third plurality of resources of the first type of resources, including the second subset of resources and the group resources; andin accordance with a determination that the respective user has not been authenticated with the authentication system as the second user, providing access to a plurality of resources of the first type that does not include the second subset of resources,wherein the second user does not have access to the first subset of resources; and the first user does not have access to the second subset of resources. 2. The device of claim 1, wherein: the first subset of resources include electronic communications associated with the first user;the second subset of resources include electronic communications associated with the second user; andthe group resources include shared documents. 3. The device of claim 1, wherein: the device includes resources of a plurality of types, including the first type and a second type; and in addition to the first subset of resources of the first type, a first subset of a plurality of resources of the second type are also associated with the first user. 4. The device of claim 3, wherein: the first type of resources includes contact information; and the second type of resources includes communication history information. 5. The device of claim 1, wherein: providing access to the first plurality of resources includes displaying contact information restricted for use by the first user; and providing access to the second plurality of resources includes displaying contact information does not include contact information restricted for use by the first user. 6. The device of claim 1, wherein: providing access to the first plurality of resources includes displaying communication history information restricted for use by the first user; and providing access to the second plurality of resources includes displaying communication history information that does not include communication history information restricted for use by the first user. 7. The device of claim 1, wherein: providing access to the first plurality of resources includes displaying representations of electronic messages restricted for use by the first user; and providing access to the second plurality of resources includes displaying representations of electronic messages that do not include representations of electronic messages restricted for use by the first user. 8. The device of claim 1, wherein: providing access to the first plurality of resources includes displaying a user interface with an appearance that has been customized in accordance with user preferences of the first user; and providing access to the second plurality of resources includes displaying a user interface that has not been customized in accordance with user preferences of the first user. 9. The device of claim 1, wherein: providing access to the first plurality of resources includes displaying a first set of application icons that includes one or more application icons for applications restricted for use by the first user; and providing access to the second plurality of resources includes displaying a second set of application icons that does not include the one or more application icons for applications restricted for use by the first user. 10. The device of claim 9, wherein: the first set of application icons includes one or more common application icons that are included in the second set of application icons; and the one or more common application icons correspond to applications that are available, by default, for use by any user of the device. 11. The device of claim 10, wherein: the one or more common application icons are displayed in a first arrangement in the first set of application icons; and the one or more common application icons are displayed in a second arrangement that is different from the first arrangement in the second set of application icons. 12. The device of claim 9, wherein: the first set of application icons are displayed on a home screen of the device; and the second set of application icons are displayed on a home screen of the device. 13. A method, comprising: at an electronic device with a fingerprint sensor and a display: displaying a first user interface on the display;while displaying the first user interface on the display, receiving a request to access resources of a first type from a respective user, wherein: the device includes resources of the first type;a first subset of resources of the first type are associated with a first user;the first subset of resources of the first type are secured by an authentication system;a second subset of resources of the first type are associated with a second user;the second subset of resources of the first type are secured by the authentication system;the first user and the second user are members of a predefined group; andthe predefined group has access to one or more group resources; andin response to receiving the request to access resources of the first type: in accordance with a determination that the respective user has been authenticated with the authentication system as the first user, providing access to a first plurality of resources of the first type of resources, including the first subset of resources and the group resources;in accordance with a determination that the respective user has not been authenticated with the authentication system as the first user, providing access to a second plurality of resources of the first type that does not include the first subset of resources;in accordance with a determination that the respective user has been authenticated with the authentication system as the second user, providing access to a third plurality of resources of the first type of resources, including the second subset of resources and the group resources; andin accordance with a determination that the respective user has not been authenticated with the authentication system as the second user, providing access to a plurality of resources of the first type that does not include the second subset of resources,wherein the second user does not have access to the first subset of resources; and the first user does not have access to the second subset of resources. 14. The method of claim 13, wherein: the first subset of resources include electronic communications associated with the first user;the second subset of resources include electronic communications associated with the second user; andthe group resources include shared documents. 15. The method of claim 13, wherein: the device includes resources of a plurality of types, including the first type and a second type; andin addition to the first subset of resources of the first type, a first subset of a plurality of resources of the second type are also associated with the first user. 16. The method of claim 15, wherein: the first type of resources includes contact information; andthe second type of resources includes communication history information. 17. The method of claim 13, wherein: providing access to the first plurality of resources includes displaying contact information restricted for use by the first user; andproviding access to the second plurality of resources includes displaying contact information does not include contact information restricted for use by the first user. 18. The method of claim 13, wherein: providing access to the first plurality of resources includes displaying communication history information restricted for use by the first user; andproviding access to the second plurality of resources includes displaying communication history information that does not include communication history information restricted for use by the first user. 19. The method of claim 13, wherein: providing access to the first plurality of resources includes displaying representations of electronic messages restricted for use by the first user; andproviding access to the second plurality of resources includes displaying representations of electronic messages that do not include representations of electronic messages restricted for use by the first user. 20. The method of claim 13, wherein: providing access to the first plurality of resources includes displaying a user interface with an appearance that has been customized in accordance with user preferences of the first user; andproviding access to the second plurality of resources includes displaying a user interface that has not been customized in accordance with user preferences of the first user. 21. The method of claim 13, wherein: providing access to the first plurality of resources includes displaying a first set of application icons that includes one or more application icons for applications restricted for use by the first user; andproviding access to the second plurality of resources includes displaying a second set of application icons that does not include the one or more application icons for applications restricted for use by the first user. 22. The method of claim 21, wherein: the first set of application icons includes one or more common application icons that are included in the second set of application icons; andthe one or more common application icons correspond to applications that are available, by default, for use by any user of the device. 23. The method of claim 22, wherein: the one or more common application icons are displayed in a first arrangement in the first set of application icons; andthe one or more common application icons are displayed in a second arrangement that is different from the first arrangement in the second set of application icons. 24. The method of claim 21, wherein: the first set of application icons are displayed on a home screen of the device; andthe second set of application icons are displayed on a home screen of the device. 25. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display and a fingerprint sensor, cause the device to: display a first user interface on the display;while displaying the first user interface on the display, receive a request to access resources of a first type from a respective user, wherein: the device includes resources of the first type;a first subset of resources of the first type are associated with a first user;the first subset of resources of the first type are secured by an authentication system;a second subset of resources of the first type are associated with a second user;the second subset of resources of the first type are secured by the authentication system;the first user and the second user are members of a predefined group; andthe predefined group has access to one or more group resources; andin response to receiving the request to access resources of the first type: in accordance with a determination that the respective user has been authenticated with the authentication system as the first user, provide access to a first plurality of resources of the first type of resources, including the first subset of resources and the group resources;in accordance with a determination that the respective user has not been authenticated with the authentication system as the first user, provide access to a second plurality of resources of the first type that does not include the first subset of resources;in accordance with a determination that the respective user has been authenticated with the authentication system as the second user, provide access to a third plurality of resources of the first type of resources, including the second subset of resources and the group resources; andin accordance with a determination that the respective user has not been authenticated with the authentication system as the second user, provide access to a plurality of resources of the first type that does not include the second subset of resources,wherein the second user does not have access to the first subset of resources; and the first user does not have access to the second subset of resources. 26. The non-transitory computer readable storage medium of claim 25, wherein: the first subset of resources include electronic communications associated with the first user;the second subset of resources include electronic communications associated with the second user; andthe group resources include shared documents. 27. The non-transitory computer readable storage medium of claim 25, wherein: the device includes resources of a plurality of types, including the first type and a second type; andin addition to the first subset of resources of the first type, a first subset of a plurality of resources of the second type are also associated with the first user. 28. The non-transitory computer readable storage medium of claim 27, wherein: the first type of resources includes contact information; andthe second type of resources includes communication history information. 29. The non-transitory computer readable storage medium of claim 25, wherein: providing access to the first plurality of resources includes displaying contact information restricted for use by the first user; andproviding access to the second plurality of resources includes displaying contact information does not include contact information restricted for use by the first user. 30. The non-transitory computer readable storage medium of claim 25, wherein: providing access to the first plurality of resources includes displaying communication history information restricted for use by the first user; andproviding access to the second plurality of resources includes displaying communication history information that does not include communication history information restricted for use by the first user. 31. The non-transitory computer readable storage medium of claim 25, wherein: providing access to the first plurality of resources includes displaying representations of electronic messages restricted for use by the first user; andproviding access to the second plurality of resources includes displaying representations of electronic messages that do not include representations of electronic messages restricted for use by the first user. 32. The non-transitory computer readable storage medium of claim 25, wherein: providing access to the first plurality of resources includes displaying a user interface with an appearance that has been customized in accordance with user preferences of the first user; andproviding access to the second plurality of resources includes displaying a user interface that has not been customized in accordance with user preferences of the first user. 33. The non-transitory computer readable storage medium of claim 25, wherein: providing access to the first plurality of resources includes displaying a first set of application icons that includes one or more application icons for applications restricted for use by the first user; andproviding access to the second plurality of resources includes displaying a second set of application icons that does not include the one or more application icons for applications restricted for use by the first user. 34. The non-transitory computer readable storage medium of claim 33, wherein: the first set of application icons includes one or more common application icons that are included in the second set of application icons; andthe one or more common application icons correspond to applications that are available, by default, for use by any user of the device. 35. The non-transitory computer readable storage medium of claim 34, wherein: the one or more common application icons are displayed in a first arrangement in the first set of application icons; andthe one or more common application icons are displayed in a second arrangement that is different from the first arrangement in the second set of application icons. 36. The non-transitory computer readable storage medium of claim 33, wherein: the first set of application icons are displayed on a home screen of the device; andthe second set of application icons are displayed on a home screen of the device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (180)
Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
Joel F. Bartlett, Apparatus and method for detecting and executing positional and gesture commands corresponding to movement of handheld computing device.
Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
Richards, Bruce G.; Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Automated banking machine and system.
Green, Patrick C.; Smith, Mark; Ramachandran, Natarajan; Delaney, Daniel J.; Barker, David A.; Theriault, Franklin M.; Herrera, Elizabeth; Hill, Jeffrey A.; Douglas, Mark, Automated transaction system and method.
Bernstein Robert J. (First Options ; One Financial Plz. 440 S. LaSalle St. Chicago IL 60605), Automatic portable account controller for remotely arranging for payment of debt to a vendor.
Novikov Sergey Olegovich,RUX ; Chernomordik Oleg Mikhailovich,RUX, Biometric system for biometric input, comparison, authentication and access control and method therefor.
Jeanne A. Bayless ; William B. Black ; Gary L. Brannick ; Gene W. Lee ; Lora M. Lloyd ; Larry P. Mason ; Amy L. Mathis ; James E. Steenbergen ; Mark R. Stoldt ; Garrett C. Young ; Gary C. Y, Computer telephone system.
Booth, Kevin E.; Popolow, Harry N.; Ford, Richard R.; Johnson, Edward E.; Loftin, Jon S.; Osborne, Lance C.; Johnson, David W., Electronically-controlled locker system.
Mitsuyu,Norihisa; Higuchi,Teruyuki, Fingerprint authenticating system for carrying out a fingerprint authentication by using a small fingerprint sensor.
Anzures,Freddy Allen; Ording,Bas; Chaudhri,Imran; Van Os,Marcel; Lemay,Stephen O.; Christie,Greg; Forstall,Scott, Indication of progress towards satisfaction of a user input condition.
Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
Fitzpatrick Greg P. (Rochester MN) Haynes Thomas R. (Euless TX) Williams Marvin L. (Lewisville TX), Method and apparatus for accessing touch screen desktop objects via fingerprint recognition.
Prabandham, Harish; Bruner, John D.; Sharma, Rahul; Zhao, Jianliang, Method and apparatus for running different types of applications on a wireless mobile device.
Shieh Johnny Meng-Han ; Maddalozzo ; Jr. John ; McBrearty Gerald Francis, Method and system for calibrating touch screen sensitivities according to particular physical characteristics associated with a user.
Alexander G. Dickinson ; Andrew Cole ; John A. McMorris, III ; Shahin Hadjiabadi ; Fredric F. Derwitsch ; Paul F. Vachris ; Steven J. Marteney ; Ronald S. Smith ; Gregory A. Mullins, Method and system for computer access and cursor control using a relief object image generator.
Bilger Aaron ; Dudgeon Michael ; Finley Michael C. ; Wade John, Method and system for entry of encrypted and non-encrypted information on a touch screen.
Campbell, Bruce S.; Strauss, III, Burton M.; Dolecki, Myron C., Method and system for partitioned service-enablement gateway with utility and consumer services.
Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
Gauthey,Darryl; Farine,Pierre Andre, Method of input of a security code by means of a touch screen for access to a function, an apparatus or a given location, and device for implementing the same.
Drummond, Jay Paul; Blackson, Dale; Cichon, Bob A.; Ess, Joseph C.; Moales, Mark A.; Weis, David W.; Smith, Mark D.; Church, James, Method of using an automated banking machine.
Gopalakrishnan, Ponani S.; Kanevsky, Dimitri; Maes, Stephane Herman, Methods and apparatus for restricting access of a user using random partial biometrics.
Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
Johnson, Richard C., Methods and systems for single sign-on authentication in a multi-vendor e-commerce environment and directory-authenticated bank drafts.
Senga, Masahiro, Object identifying device, mobile phone, object identifying method, program executable on computer for operating the object identifying device and computer-readable medium including the program.
Allard David J. (Boynton Beach FL) Canova ; Jr. Francis J. (Boynton Beach FL) Johnson Debra A. G. (Fort Lauderdale FL) Lanier Charles S. (Delray Beach FL) Lewis James R. (Coconut Creek FL) Tiller Byr, Personal communicator having improved zoom and pan functions for editing information on touch sensitive display.
Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
McClurg, George William; Brunell, David; Scott, Walter Guy, Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface.
Jobs, Steven P.; Forstall, Scott; Christie, Greg; Ording, Bas; Chaudhri, Imran; Lemay, Stephen O.; Van Os, Marcel; Anzures, Freddy Allen; Matas, Mike, Telephone interface for a portable communication device.
Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
Han, Byron; Shepherd, Matthew E.; Chaudhri, Imran; Christie, Gregory N.; Coffman, Patrick L.; Federighi, Craig M.; Gamble, Matthew H.; Paine, Brittany D.; Langoulant, Brendan J.; Marciniak, Craig A.; Pitschel, Donald W.; Schimpf, Daniel O.; Whalley, Andrew R.; Whitney, Christopher R.; Dascola, Jonathan R.; Yang, Lawrence Y., Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs.
Han, Byron; Shepherd, Matthew E.; Chaudhri, Imran; Christie, Gregory N.; Coffman, Patrick L.; Federighi, Craig M.; Gamble, Matthew H.; Paine, Brittany D.; Langoulant, Brendan J.; Marciniak, Craig A.; Pitschel, Donald W.; Schimpf, Daniel O.; Whalley, Andrew R.; Whitney, Christopher R.; Dascola, Jonathan R.; Yang, Lawrence Y., Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs.
Han, Byron; Shepherd, Matthew E.; Chaudhri, Imran; Christie, Gregory N.; Coffman, Patrick L.; Federighi, Craig M.; Gamble, Matthew H.; Paine, Brittany D.; Langoulant, Brendan J.; Marciniak, Craig A.; Pitschel, Donald W.; Schimpf, Daniel O.; Whalley, Andrew R.; Whitney, Christopher R.; Dascola, Jonathan R.; Yang, Lawrence Y., Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs.
Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
Fadell, Anthony M.; Hodge, Andrew Bert; Schell, Stephan V.; Caballero, Ruben; Dorogusker, Jesse Lee; Zadesky, Stephen Paul; Sanford, Emery, Embedded authentication systems in an electronic device.
Chen, Ningguo; Deng, Jianwei; Wang, Songjian; Wu, Ruizhou; Zhang, Yun; Zhao, Lijuan; Fu, Cong; Chen, Ruting, Method, device and system for verifying based on verification diagram, and storage medium.
Van Os, Marcel; Anton, Peter D.; Dicker, George R.; Pitschel, Donald W.; Shearer, Nicholas J.; Alabi, Oluwatomiwa B.; Diederich, Anton K., User interface for a device requesting remote authorization.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.