Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and methods for using eye signals with secure mobile communications

An eye and user technology, applied in wireless communication, transmission systems, security devices, etc., can solve the problem of refusing to ensure the ability to use equipment to communicate, unable to refuse, etc.

Inactive Publication Date: 2017-02-22
GOOGLE LLC
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In such a case, the refusal to ensure the ability to use or communicate from a device cannot deny the authenticity of their signature to any use, communication or message initiated by a qualified user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for using eye signals with secure mobile communications
  • Systems and methods for using eye signals with secure mobile communications
  • Systems and methods for using eye signals with secure mobile communications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In the following description, and for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of various aspects of the embodiments. However, it will be understood by those skilled in the relevant art that the devices, systems, and methods herein may be practiced without these specific details. It is to be understood that other embodiments may be utilized and structural and functional changes may be made without departing from the scope of the devices, systems, and methods herein. In other instances, known structures and devices are shown or discussed more generally in order to avoid obscuring the embodiments. In many cases, the description of an operation is sufficient to enable a human to implement the various forms, especially when the operation is implemented in software. It should be noted that there are many different and alternative configurations, devices and techniques in which the disclosed embodiments may...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Apparatus, systems, and methods are provided for secure mobile communications (SMC) by an individual using biometric signals and identification in real time. The apparatus includes a wearable computing device where identification of the user is based on iris recognition, and / or other physiological and anatomical measures. Biometric identity measures can be combined with other security-based information such as passwords, date / time stamps, and device identification. Identity verification can be embedded within information that is transmitted from the device and / or to determine appropriate security measures. SMC addresses security issues associated with the transmission of eye-signal control and biometric identification data using secure interfaces with network devices within a system of systems (SoS) software architecture.

Description

technical field [0001] The present invention relates to portable or wearable biometric-based user identification and authentication for secure distributed and interactive systems and services. Background technique [0002] The widespread use of the Internet and computing / communication devices has led to an explosion in the electronic dissemination of information. However, verifiable control over the recipients of secure information remains an important issue in the field of network security. In addition, the recipient of the information can also become a source of sensitive information, where real-time knowledge of the source's identity can also be an important security concern. An example of such a situation is the knowledge of the identity of an individual entering credit card (or other account) information during the process of an online purchase. Today's techniques commonly used to remotely identify recipients or sources of secure information are vulnerable to deceptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G06F21/32
CPCG06F3/013G06F3/017G06F3/0304G06F21/32H04L63/0861H04W12/06G06F2203/011H04N23/90G06F21/316G06F21/64H04W12/065H04W12/33G06F3/012G06F3/0482G06T19/006G02B27/0093G06V40/18G02B27/017G06V40/19G06V40/193G06V40/197H04N23/80G02B2027/0178G06F3/04817G02B27/0172G02B2027/0138G02B2027/014H04N5/44504
Inventor 纳尔逊·乔治·普布利科弗路易斯·詹姆斯·马格拉夫
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products