白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Opportunistically collecting sensor data from a mobile device to facilitate user identification

專利號
US10867025B2
公開日期
2020-12-15
申請人
UnifyID(US CA San Francisco)
發(fā)明人
John C. Whaley
IPC分類
G06F21/31; G06F21/35; H04L29/06; H04W4/38; G06F21/32; H04W12/06; G06K9/00; G06N20/00; H04W12/00
技術領域
sensor,data,user,or,device,in,collection,beacon,can,trigger
地域: CA CA San Francisco

摘要

The inventors recently developed a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to a trigger event, the system collects sensor data from one or more sensors in the electronic device, wherein the sensor data includes movement-related sensor data caused by movement of the portable electronic device while the portable electronic device is in control of the user. Next, the system extracts a feature vector from the sensor data, and analyzes the feature vector to authenticate and/or identify the user. During this process, the feature vector is analyzed using a model trained with sensor data previously obtained from the portable electronic device while the user was in control of the portable electronic device.

說明書

The methods and processes described in the detailed description section can be embodied as code and/or data, which can be stored in a computer-readable storage medium as described above. When a computer system reads and executes the code and/or data stored on the computer-readable storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the computer-readable storage medium. Furthermore, the methods and processes described below can be included in hardware modules. For example, the hardware modules can include, but are not limited to, application-specific integrated circuit (ASIC) chips, field-programmable gate arrays (FPGAs), and other programmable-logic devices now known or later developed. When the hardware modules are activated, the hardware modules perform the methods and processes included within the hardware modules.

Computing Environment

FIG. 1 illustrates various computing devices and associated sensors that comprise a computing environment 100 for a user 102 in accordance with the disclosed embodiments. As illustrated in FIG. 1, the computing environment 100 surrounding user 102 includes a number of portable computing devices, such as a smartphone 104, or a wearable device 108, such as a fitness tracker or a smartwatch. The user 102 may also be operating a laptop computer 106 or possibly a desktop computer (not shown).

權利要求

1
微信群二維碼
意見反饋