18673195. Method and Device for Automatic Authentication simplified abstract (Apple Inc.)

From WikiPatents
Jump to navigation Jump to search

Method and Device for Automatic Authentication

Organization Name

Apple Inc.

Inventor(s)

Thomas G. Salter of Foster City CA (US)

Rahul Nair of Santa Clara CA (US)

Method and Device for Automatic Authentication - A simplified explanation of the abstract

This abstract first appeared for US patent application 18673195 titled 'Method and Device for Automatic Authentication

Simplified Explanation

The patent application describes a method for authenticating a user using a camera, an eye tracker, and a second device in a physical environment. The user's gaze is tracked, and if it is directed towards the second device, authentication credentials are transmitted.

Key Features and Innovation

  • Method involves using a camera, eye tracker, and second device for user authentication.
  • Gaze tracking technology is utilized to determine user's focus.
  • Authentication credentials are sent to the second device when user's gaze is directed towards it.

Potential Applications

This technology could be used in:

  • Secure access control systems
  • Biometric authentication processes
  • User verification in sensitive environments

Problems Solved

  • Enhances security by using gaze tracking for user authentication.
  • Reduces the risk of unauthorized access to devices or systems.
  • Provides a more seamless and intuitive authentication process.

Benefits

  • Improved security measures
  • User-friendly authentication process
  • Enhanced user experience

Commercial Applications

Title: Innovative User Authentication Technology for Secure Access Control Systems This technology could be applied in industries such as:

  • Banking and finance
  • Healthcare
  • Government agencies

Questions about User Authentication Technology

1. How does gaze tracking enhance user authentication?

Gaze tracking allows for a more secure and intuitive authentication process by verifying the user's focus on a specific device.

2. What are the potential drawbacks of using gaze tracking for authentication?

Potential drawbacks could include technical limitations of the eye tracking technology and user discomfort with having their gaze monitored.


Original Abstract Submitted

In one implementation, a method of authenticating a user is performed by a first device including a camera, an eye tracker, one or more processors, and non-transitory memory. The method includes obtaining, via the camera, an image of a physical environment. The method includes detecting, in the image of the physical environment, a second device. The method includes determining, using the eye tracker, a gaze of a user. The method includes determining that the gaze of the user is directed to the second device. The method includes, in response to determining that the gaze of the user is directed to the second device, transmitting authentication credentials to the second device.