Dell products l.p. (20240134026). METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR simplified abstract

From WikiPatents
Revision as of 02:47, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR

Organization Name

dell products l.p.

Inventor(s)

Pedro Fernandez of Shanghai (CN)

Qiang Chen of Shanghai (CN)

Zhen Jia of Shanghai (CN)

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240134026 titled 'METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AUTHENTICATION BASED ON RADAR

Simplified Explanation

The abstract describes a method involving electronic devices, radar technology, and biological feature signals to determine the trustworthiness of a person accessing the device and deauthenticate them if deemed untrustworthy.

  • Determining if a person is accessing an electronic device
  • Using radar to detect a person within range
  • Analyzing distance and angle between the person and the device
  • Assessing the trustworthiness of the person based on biological feature signals
  • Deauthenticating the initial user if the person is deemed untrustworthy

Potential Applications

This technology could be applied in security systems, access control, and authentication processes.

Problems Solved

This technology helps in preventing unauthorized access to electronic devices and enhances security measures by assessing the trustworthiness of individuals.

Benefits

The benefits of this technology include improved security, enhanced authentication processes, and better protection of sensitive information.

Potential Commercial Applications

Potential commercial applications of this technology could include integration into smart locks, biometric security systems, and access control solutions.

Possible Prior Art

Prior art in this field may include existing biometric authentication systems, radar-based security technologies, and trustworthiness assessment methods in access control systems.

Unanswered Questions

How does this technology handle false positives in trustworthiness assessment?

The method described in the abstract does not specify how false positives in trustworthiness assessment are addressed. This could be a potential area for further research and development to improve the accuracy of the system.

What are the privacy implications of using biological feature signals for trustworthiness assessment?

The abstract does not delve into the privacy implications of using biological feature signals for trustworthiness assessment. It would be important to consider how this data is collected, stored, and used to ensure the protection of individuals' privacy rights.


Original Abstract Submitted

a method in an illustrative embodiment includes determining that a first object authenticated by an electronic device is accessing the electronic device. the method further includes, in response to a second object being detected within a detection range using a radar of the electronic device, determining, based on a detected signal, that the second object is a person. the method further includes determining a distance and an angle between the second object and the electronic device based on an azimuth signal in the detected signal. the method further includes in response to determining that the distance is less than a distance threshold and the angle is less than an angle threshold, determining, based on the biological feature signal, whether the second object is trustworthy. the method further includes deauthenticating the first object in response to determining that the second object is untrustworthy.