18065294. EARBUD FOR AUTHENTICATED SESSIONS IN COMPUTING DEVICES simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

EARBUD FOR AUTHENTICATED SESSIONS IN COMPUTING DEVICES

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Eran Arbel of Netanya (IL)

Gilad Pundak of Rehovot (IL)

Liran Lipa Lyabock of Tel Aviv (IL)

EARBUD FOR AUTHENTICATED SESSIONS IN COMPUTING DEVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18065294 titled 'EARBUD FOR AUTHENTICATED SESSIONS IN COMPUTING DEVICES

Simplified Explanation

The patent application describes a method using an earbud to maintain a user's authenticated session by analyzing ultrasonic signals to determine the earbud's location and proximity to a computing device, enabling the establishment of a second authenticated session.

  • After establishing the user's first authenticated session on a computing device, an initial ultrasonic signal is broadcasted from the earbud's speaker.
  • The subsequent ultrasonic echo signal received at the in-ear microphone is analyzed to confirm the earbud is in the user's ear.
  • The method then determines if the earbud is within a predetermined distance of a second computing device.
  • If the earbud is in the user's ear and within the predetermined distance, a second authenticated session is established on the second computing device.

Key Features and Innovation

  • Use of ultrasonic signals to authenticate the earbud's presence in the user's ear.
  • Proximity analysis to determine the earbud's distance from a computing device.
  • Seamless transition between authenticated sessions on different devices.

Potential Applications

The technology can be applied in:

  • Secure access control systems.
  • Multi-device authentication processes.
  • Wearable technology for seamless user experience.

Problems Solved

  • Ensures secure and convenient authentication.
  • Reduces the risk of unauthorized access.
  • Simplifies the process of switching between devices.

Benefits

  • Enhanced security for user authentication.
  • Improved user experience with seamless session transitions.
  • Efficient and reliable method of maintaining authenticated sessions.

Commercial Applications

  • Secure access control systems for businesses.
  • Multi-device authentication solutions for personal devices.
  • Integration into wearable technology for enhanced user experience.

Prior Art

Readers can explore prior art related to ultrasonic authentication methods and wearable technology in the field of secure access control systems.

Frequently Updated Research

Stay updated on advancements in ultrasonic authentication technology and its applications in user authentication and access control systems.

Questions about Earbud Authentication

How does ultrasonic authentication enhance user security?

Ultrasonic authentication ensures that the earbud is physically present in the user's ear, adding an extra layer of security to the authentication process.

What are the potential drawbacks of using ultrasonic signals for authentication?

While ultrasonic signals offer secure authentication, they may be affected by environmental factors such as background noise or interference. Regular updates and improvements in signal processing can help mitigate these issues.


Original Abstract Submitted

A method of using an earbud to maintain a user's authenticated session comprises, after establishing a user's first authenticated session in a first computing device, broadcasting an initial ultrasonic signal from a speaker of the earbud. At least a subsequent ultrasonic echo signal that is received at an in-ear microphone of the earbud is analyzed to determine if the earbud is located in an ear of the user. The method determines that the earbud is within a predetermined distance of the second computing device. At least on condition of determining that the earbud is located in the ear of the user and that the earbud is within the predetermined distance of the second computing device, a user's second authenticated session in a second computing device is established.