Dell products l.p. (20240134026). METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR simplified abstract
Contents
- 1 METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR
Organization Name
Inventor(s)
Pedro Fernandez of Shanghai (CN)
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240134026 titled 'METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR
Simplified Explanation
The abstract describes a method involving electronic devices, radar technology, and biological feature signals to determine the trustworthiness of a person accessing the device and deauthenticate them if deemed untrustworthy.
- Determining if a person is accessing an electronic device
- Using radar to detect a person within range
- Analyzing distance and angle between the person and the device
- Assessing the trustworthiness of the person based on biological feature signals
- Deauthenticating the initial user if the person is deemed untrustworthy
Potential Applications
This technology could be applied in security systems, access control, and authentication processes.
Problems Solved
This technology helps in preventing unauthorized access to electronic devices and enhances security measures by assessing the trustworthiness of individuals.
Benefits
The benefits of this technology include improved security, enhanced authentication processes, and better protection of sensitive information.
Potential Commercial Applications
Potential commercial applications of this technology could include integration into smart locks, biometric security systems, and access control solutions.
Possible Prior Art
Prior art in this field may include existing biometric authentication systems, radar-based security technologies, and trustworthiness assessment methods in access control systems.
Unanswered Questions
How does this technology handle false positives in trustworthiness assessment?
The method described in the abstract does not specify how false positives in trustworthiness assessment are addressed. This could be a potential area for further research and development to improve the accuracy of the system.
What are the privacy implications of using biological feature signals for trustworthiness assessment?
The abstract does not delve into the privacy implications of using biological feature signals for trustworthiness assessment. It would be important to consider how this data is collected, stored, and used to ensure the protection of individuals' privacy rights.
Original Abstract Submitted
a method in an illustrative embodiment includes determining that a first object authenticated by an electronic device is accessing the electronic device. the method further includes, in response to a second object being detected within a detection range using a radar of the electronic device, determining, based on a detected signal, that the second object is a person. the method further includes determining a distance and an angle between the second object and the electronic device based on an azimuth signal in the detected signal. the method further includes in response to determining that the distance is less than a distance threshold and the angle is less than an angle threshold, determining, based on the biological feature signal, whether the second object is trustworthy. the method further includes deauthenticating the first object in response to determining that the second object is untrustworthy.