17984886. METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR simplified abstract (Dell Products L.P.)
Contents
- 1 METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR
Organization Name
Inventor(s)
Pedro Fernandez of Shanghai (CN)
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR - A simplified explanation of the abstract
This abstract first appeared for US patent application 17984886 titled 'METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR
Simplified Explanation
The method described in the abstract involves using radar technology to detect and authenticate objects accessing an electronic device, specifically determining the trustworthiness of a person based on their distance, angle, and biological features.
- Radar technology used to detect objects accessing electronic devices
- Authentication of objects based on distance, angle, and biological features
- Determination of trustworthiness of a person accessing the device
- Deauthentication of untrustworthy objects
Potential Applications
This technology could be applied in various industries such as security systems, access control, and smart home devices.
Problems Solved
This technology helps in enhancing security measures by accurately identifying and authenticating individuals accessing electronic devices.
Benefits
The benefits of this technology include improved security, efficient access control, and enhanced user privacy.
Potential Commercial Applications
Potential commercial applications of this technology include smart locks, biometric security systems, and surveillance systems.
Possible Prior Art
Prior art may include existing radar-based authentication systems, biometric security systems, and access control technologies.
Unanswered Questions
How does this technology handle false positives in trustworthiness determination?
The method described in the abstract does not specify how false positives in trustworthiness determination are addressed. Further details on the accuracy of the system in distinguishing trustworthy and untrustworthy individuals would be beneficial.
What is the impact of environmental factors on the accuracy of the radar detection system?
The abstract does not mention how environmental factors such as weather conditions or interference may affect the performance of the radar detection system. Understanding the system's resilience to external factors is crucial for its practical implementation.
Original Abstract Submitted
A method in an illustrative embodiment includes determining that a first object authenticated by an electronic device is accessing the electronic device. The method further includes, in response to a second object being detected within a detection range using a radar of the electronic device, determining, based on a detected signal, that the second object is a person. The method further includes determining a distance and an angle between the second object and the electronic device based on an azimuth signal in the detected signal. The method further includes in response to determining that the distance is less than a distance threshold and the angle is less than an angle threshold, determining, based on the biological feature signal, whether the second object is trustworthy. The method further includes deauthenticating the first object in response to determining that the second object is untrustworthy.