17984886. METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 05:26, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR

Organization Name

Dell Products L.P.

Inventor(s)

Pedro Fernandez of Shanghai (CN)

Qiang Chen of Shanghai (CN)

Zhen Jia of Shanghai (CN)

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR - A simplified explanation of the abstract

This abstract first appeared for US patent application 17984886 titled 'METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR

Simplified Explanation

The method described in the abstract involves using radar technology to detect and authenticate objects accessing an electronic device, specifically determining the trustworthiness of a person based on their distance, angle, and biological features.

  • Radar technology used to detect objects accessing electronic devices
  • Authentication of objects based on distance, angle, and biological features
  • Determination of trustworthiness of a person accessing the device
  • Deauthentication of untrustworthy objects

Potential Applications

This technology could be applied in various industries such as security systems, access control, and smart home devices.

Problems Solved

This technology helps in enhancing security measures by accurately identifying and authenticating individuals accessing electronic devices.

Benefits

The benefits of this technology include improved security, efficient access control, and enhanced user privacy.

Potential Commercial Applications

Potential commercial applications of this technology include smart locks, biometric security systems, and surveillance systems.

Possible Prior Art

Prior art may include existing radar-based authentication systems, biometric security systems, and access control technologies.

Unanswered Questions

How does this technology handle false positives in trustworthiness determination?

The method described in the abstract does not specify how false positives in trustworthiness determination are addressed. Further details on the accuracy of the system in distinguishing trustworthy and untrustworthy individuals would be beneficial.

What is the impact of environmental factors on the accuracy of the radar detection system?

The abstract does not mention how environmental factors such as weather conditions or interference may affect the performance of the radar detection system. Understanding the system's resilience to external factors is crucial for its practical implementation.


Original Abstract Submitted

A method in an illustrative embodiment includes determining that a first object authenticated by an electronic device is accessing the electronic device. The method further includes, in response to a second object being detected within a detection range using a radar of the electronic device, determining, based on a detected signal, that the second object is a person. The method further includes determining a distance and an angle between the second object and the electronic device based on an azimuth signal in the detected signal. The method further includes in response to determining that the distance is less than a distance threshold and the angle is less than an angle threshold, determining, based on the biological feature signal, whether the second object is trustworthy. The method further includes deauthenticating the first object in response to determining that the second object is untrustworthy.