Abstract:
An electronic device provides a tracking report to a computing device that is located remotely from the electronic device. The tracking report may include location information that identifies the geographical location of the electronic device, and device user information that identifies the user of the electronic device. The electronic device acquires location information for the tracking report through a location awareness capability such as a global positioning system. The electronic device acquires user identification information for the tracking report through a biometric scanning component, such as a finger print sensor or other device that senses biometric properties when a user is touching or in close proximity to the device.
Abstract:
A device has a touch processing module that processes touch screen input to determine if the manner in which the input was entered indicates that the user intends for execution of a particular command. In one embodiment, the module may acquire fingerprint data from the user's input and analyze the data to determine if the input was entered with a particular finger or finger sequence. In another embodiment, the module may also acquire timing data from the user's entry of a plurality of inputs and analyze the timing data to determine if the touch screen input was entered with a particular timing or cadence. In still another embodiment, the module may also acquire force data from the user's entry of a plurality of touch screen inputs and analyze the force data to determine if the touch screen input was entered with a particular force.
Abstract:
A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be receipt of one or more instructions from one or more other computing devices, detection of potential unauthorized use by the computing device, normal operation of the computing device, and so on. The computing device may obtain biometric information and may store such biometric information. Such biometric information may be one or more fingerprints, one or more images of a current user of the computing device, video of the current user, audio of the environment of the computing device, forensic interface use information, and so on. The computing device may then provide the stored biometric information for identification of one or more unauthorized users.
Abstract:
A device has a touch processing module that processes touch screen input to determine if the manner in which the input was entered indicates that the user intends for execution of a particular command. In one embodiment, the module may acquire fingerprint data from the user's input and analyze the data to determine if the input was entered with a particular finger or finger sequence. In another embodiment, the module may also acquire timing data from the user's entry of a plurality of inputs and analyze the timing data to determine if the touch screen input was entered with a particular timing or cadence. In still another embodiment, the module may also acquire force data from the user's entry of a plurality of touch screen inputs and analyze the force data to determine to determine if the touch screen input was entered with a particular force.
Abstract:
A device has a touch processing module that processes touch screen input to determine if the manner in which the input was entered indicates that the user intends for execution of a particular command. In one embodiment, the module may acquire fingerprint data from the user's input and analyze the data to determine if the input was entered with a particular finger or finger sequence. In another embodiment, the module may also acquire timing data from the user's entry of a plurality of inputs and analyze the timing data to determine if the touch screen input was entered with a particular timing or cadence. In still another embodiment, the module may also acquire force data from the user's entry of a plurality of touch screen inputs and analyze the force data to determine to determine if the touch screen input was entered with a particular force.
Abstract:
This application provides techniques, including circuits and designs, which can receive information with respect to fingerprint images, or portions thereof, and which can be incorporated into devices using fingerprint recognition. This application also provides techniques, including devices which perform fingerprint recognition and methods which can be performed by those devices. In one embodiment, techniques can include providing a fingerprint recognition sensor in which one or more portions of each fingerprint can be collected as they are identified, and those portions can be combined into a unified fingerprint template. In this way, collection and enrollment of fingerprints may be simplified for users.
Abstract:
A computing device may determine to capture biometric information in response to the occurrence of one or more trigger conditions. The trigger condition may be receipt of one or more instructions from one or more other computing devices, detection of potential unauthorized use by the computing device, normal operation of the computing device, and so on. The computing device may obtain biometric information and may store such biometric information. Such biometric information may be one or more fingerprints, one or more images of a current user of the computing device, video of the current user, audio of the environment of the computing device, forensic interface use information, and so on. The computing device may then provide the stored biometric information for identification of one or more unauthorized users.
Abstract:
Devices, methods and graphical user interfaces for manipulating user interfaces based on fingerprint sensor inputs are provided. While a display of an electronic device with a fingerprint sensor displays a first user interface, the device may detect movement of a fingerprint on the fingerprint sensor. In accordance with a determination that the movement of the fingerprint is in a first direction, the device allows navigating through the first user interface, and in accordance with a determination that the movement of the fingerprint is in a second direction different from the first direction, the device allows displaying a second user interface different from the first user interface on the display.
Abstract:
A device has a touch processing module that processes touch screen input to determine if the manner in which the input was entered indicates that the user intends for execution of a particular command. In one embodiment, the module may acquire fingerprint data from the user's input and analyze the data to determine if the input was entered with a particular finger or finger sequence. In another embodiment, the module may also acquire timing data from the user's entry of a plurality of inputs and analyze the timing data to determine if the touch screen input was entered with a particular timing or cadence. In still another embodiment, the module may also acquire force data from the user's entry of a plurality of touch screen inputs and analyze the force data to determine to determine if the touch screen input was entered with a particular force.
Abstract:
A computing device may receive authentication information. Within a time-out period, a fingerprint may also be received. The computing device may assign one or more authentication credentials to the fingerprint based on authentication credentials associated with the received authentication information. In some implementations, the computing device may assign the authentication credentials associated with the received authentication information to the biometric. However, in other implementations, the computing device may assign different authentication credentials to the biometric based on one or more user preferences, defaults, security policies, and/or enterprise policies. In various implementations, the authentication credentials assigned to the biometric may be altered, such as by adding and/or removing one or more authentication credentials. Such alteration may be performed in response to a received user request, changed enterprise policy, changed security policy, fraud alert, and/or other such factor.