(19)
(11)EP 3 143 545 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
29.07.2020 Bulletin 2020/31

(21)Application number: 15726444.1

(22)Date of filing:  13.05.2015
(51)International Patent Classification (IPC): 
G06F 21/32(2013.01)
H04L 29/06(2006.01)
(86)International application number:
PCT/US2015/030527
(87)International publication number:
WO 2015/175634 (19.11.2015 Gazette  2015/46)

(54)

ELECTRONIC DEVICE WITH METHOD FOR CONTROLLING ACCESS TO THE SAME

ELEKTRONISCHE VORRICHTUNG UND VERFAHREN ZUR STEUERUNG DES ZUGRIFFS DARAUF

DISPOSITIF ÉLECTRONIQUE ET PROCÉDÉ POUR COMMANDER UN ACCÈS À CELUI-CI


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 13.05.2014 US 201414276107

(43)Date of publication of application:
22.03.2017 Bulletin 2017/12

(73)Proprietor: Google Technology Holdings LLC
Mountain View, CA 94043 (US)

(72)Inventors:
  • ALAMEH, Rachid, M.
    Crystal Lake, IL 60014 (US)
  • SLABY, Jiri
    Buffalo Grove, IL 60089 (US)

(74)Representative: Hewett, Jonathan Michael Richard 
Venner Shipley LLP 200 Aldersgate
London EC1A 4HD
London EC1A 4HD (GB)


(56)References cited: : 
EP-A1- 1 990 769
US-A1- 2012 038 796
GB-A- 2 474 536
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    TECHNICAL FIELD



    [0001] The present disclosure is related generally to user authentication techniques on electronic devices.

    BACKGROUND



    [0002] Although the potential advantages of using biometric authentication over traditional personal identification number ("PIN") authentication have long been understood, its use in consumer electronic devices has only recently become popular. With biometric authentication, a user does not need to enter a PIN and, under the right conditions, does not even need to touch the device in order to unlock it.

    [0003] Most existing biometric authentication schemes use the same basic access logic that traditional PIN-based systems use. That is, a user is either authenticated or is not. The user either gains full access or no access. Furthermore, they generally do not adjust in real-time for dynamic conditions such as the movement and position of the user.

    [0004] EP-A1-1,990,769 relates to a personal identification device provided with a registered data storage unit for storing registered data containing facial feature data for a registered user, a recognition parameter storage unit for storing recognition parameters, an image determination unit for determining whether or not the image quality of a user facial image input from an imaging device is appropriate, an adjustment unit for adjusting the settings of the imaging device or modifying the recognition parameters, in accordance with the result of determination carried out in the image determination unit, a feature extraction unit for extracting user facial feature data from a facial image, and a face recognition unit for comparing the extracted feature data with the registered data to determine whether or not the user is a registered user based on the result of comparison and the recognition parameters.

    [0005] GB-A-2,474,536 relates to computer vision gesture based control by hand shape recognition and object tracking.

    [0006] US-A1-2012/038796 relates to an apparatus and method providing auto zoom in response to relative movement of target subject matter.

    SUMMARY



    [0007] In accordance with a first aspect of the invention, there is provided a method for controlling access to an electronic device as set out in claim 1. In accordance with a second aspect of the invention, there is provided a method for controlling access to an electronic device as set out in claim 6. In accordance with a further aspect of the invention, there is provided an electronic device as set out in claim 11.

    DRAWINGS



    [0008] While the appended claims set forth the features of the present techniques with particularity, these techniques, together with their objects and advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which:

    FIG. 1A is a front view of an electronic device according to an embodiment;

    FIG. 1B is a rear view of an electronic device according to an embodiment;

    FIG. 2 is a block diagram of the electronic device according to an embodiment;

    FIG. 3 is a diagrammatic view of a scenario in which the electronic device may be used;

    FIG. 4 is a process flow diagram of a method that may be carried out in an embodiment;

    FIG. 5 is a diagrammatic view of another scenario in which the electronic device may be used; and

    FIG. 6 is a process flow diagram of a method that may be carried out in another embodiment.


    DESCRIPTION



    [0009] According to various embodiments of the disclosure, an electronic device (also referred to as "the device") is able to alter one or more settings of its imager (e.g., its camera) based on the motion of a user that the device is attempting to authenticate. In an embodiment, the device captures a first set of image data of the user (e.g., a moving video or still image of the user), alters a setting of the imager based on the motion, captures a second set of image data of the user, and authenticates the user based on the second set of image data.

    [0010] According to an embodiment of the disclosure, the device grants the user a first level of access to the device based on the first set of image data and grants the user second level of access to the device based on the second set of image data. The number of possible access levels is not limited, and the example of two levels discussed herein is only meant to be illustrative. Additionally, the electronic device may capture the two sets of image data with two different imagers, stitch the sets of image data together, and carry out authentication on the stitched sets of image data. The number of imagers that may be used is not limited to two, however.

    [0011] Turning to FIG. 1A and FIG. 1B, an embodiment of the electronic device ("the device"), generally labeled 100, includes a housing 102 having a front side 104 and a rear side 106. Set along the perimeter of the housing are a first imager 110A, a second imager 110B, a third imager 110C, and a fourth imager 110D. Each of the first through fourth imagers has a field of view that extends outwardly from the perimeter of the device 100. Also set along the perimeter of the device 100 are a first motion sensor 116A, a second motion sensor 116B, a third motion sensor 116C, and a fourth motion sensor 116D. Each motion sensor is configured to sense motion external to device 100. Each motion sensor may be implemented as a passive infrared detector, such as a digital thermopile sensor, or as an active sensor that uses reflected light of a light source of the device 100.

    [0012] Set within the front side 104 of the housing 102 is a display 108 (e.g., an organic light-emitting diode display) and a fifth imager 110E (e.g., a front facing camera). Set within the rear side 106 of the housing 102 is a sixth imager 110F (e.g., a rear facing camera). Although depicted in FIGS. 1A and 1B as a smartphone, the electronic device 100 may be implemented as other types of devices, including a tablet computer, portable gaming device, and a wearable device (e.g., a smart watch).

    [0013] Turning to FIG. 2, an embodiment of the electronic device 100 includes a processor 202, network communication hardware 204 (e.g., WiFI chip or a cellular baseband chipset), an audio output 206 (e.g., a speaker), a memory 208 (which can be implemented as volatile memory or non-volatile memory), and a light source 212 (e.g., an infrared light-emitting diode). In various embodiments, the processor 202 retrieves instructions and data from the memory 208 and, using the instructions and data, carries out the methods described herein. Each of the elements of FIG. 2 (including the elements of FIGS. 1A and 1B that appear in FIG. 2) is communicatively linked to one or more other elements via one or more data pathways 226. Possible implementations of the data pathways 226 include wires, conductive pathways on a microchip, and wireless connections. Possible implementations of the processor 202 include a microprocessor and a controller.

    [0014] Turning to FIG. 3 and to the flowchart of FIG. 4, a procedure that the device 100 carries out to authenticate a user in an embodiment will now be described. As shown in FIG. 3, the electronic device 100 is lying on a table in a room 304. A user 302 of the device enters the room 104 at position A and is moving. When the user is at position A, the first motion sensor 116A detects the user 302 and provides data regarding the user to the processor 202 (FIG. 2), including data regarding the user's position, motion (including the user's gait), speed, and context. In response to receiving the data, the processor 202 turns on the first imager 110A and controls the first imager 110A to capture a first set of image data (i.e., a still image, multiple still images, or multiple images organized as a moving image) of the user 302 (block 402) and provides the first set of image data to the processor 202. The processor 202 attempts to authenticate the user 302 using the first set of image data. For example, the processor 202 may attempt to authenticate the user 302 based on biometric data, such as the user's body geometry (e.g., the user's body shape, gender, height, girth, and gait). Thus, if the processor 202 knows that an authorized user is a tall male, and the image data indicates that the user 302 is a tall male, then the processor 202 will determine that it is possible that the user 302 is the authorized user. Conversely, if the image data indicates that the user 302 is a short female, then the authentication will fail.

    [0015] In this scenario, the processor 202 determines, with at least a 50% confidence level (based on its authentication attempt with the first set of image data) that the user 302 is an authorized user. Based on this determination, the processor 202 grants the user 302 a first level of access to the device 100. The first level of access may involve granting the user 302 access to telephone functions or lower security applications of the device 100. For example, the processor 202 may control the audio output 206 to inform that user 302 that "You missed two phone calls and have one voicemail." The processor 202 may also control the display 108 to display the user's access level (e.g., "You are now able to access the phone functions").

    [0016] The processor 202 continues to receive data (position, motion, speed, and context) from the first motion sensor 116A. The processor 202 analyzes the data from the first motion sensor 116A. At block 404, the processor 202 alters a setting of the first imager 116A based on the detected motion. For example, the processor 202 may determine, based on the detected motion, that the user 302 is moving at or above a certain speed threshold (e.g., 3 feet per second), and, based on this fact, may increase the frame rate of the first imager 110A (e.g., from 20 frames per second ("fps") to 50 fps). This increase in frame rate allows the first imager 110A to obtain more detail about the user in order to compensate for the fact that the user 302 is now in motion or is now moving faster. Other ways that the processor 202 can alter a setting of the first imager 110A include controlling the first imager 110A to change one or more of its shutter speed, shutter timing, illumination setting, resolution, aperture, and zoom setting. In various embodiments, any or all of these changes may be triggered by the same motion sensor that prompted the processor 202 to turn on the first imager 202.

    [0017] After the processor 202 alters the setting, the processor 202 controls the first imager 110A to capture a second set of image data of the user 302 (block 406) and provide the second set of image data to the processor 202. For example, the processor 202 may receive a second moving video of the user from the first imager 110A, this time at the higher frame rate.

    [0018] In this example, it is assumed that the processor 202 is able to use the second set of image data (e.g., the second, higher-frame-rate moving video) to authenticate the user 302 (block 408). For example, the processor 202 may authenticate the user 302 with a high enough confidence level to grant the user 302 a second level of access. The processor 214 grants the user 302 the second level of access to the device 100 based on the second set of image data. Granting the second level of access may involve the processor 202 granting the user 302 access to one or more of pictures, files, emails, or higher security applications on the device 100. The processor 202 may also control the display 108 to display the user's access level (e.g., "You are now able to access email").

    [0019] In another embodiment, the device 100 uses multiple imagers to gradually authenticate a user. Referring to FIGS. 5 and 6, a procedure for doing so will now be described.

    [0020] As shown in FIG. 5, the electronic device 100 is lying on a table in a room 504. A user 502 of the device enters the room 504 at position A and is moving. When the user is at position A, the first motion sensor 116A detects the user 502 and provides data regarding the user, such as the user's position, motion (including the user's gait), speed, and context, to the processor 202 (FIG. 2). In response to receiving the data, the processor 202 turns on the first imager 110A and controls the first imager 110A to capture a first set of image data of the user 302 (block 602) and provides the first set of image data to the processor 202. The processor 202 attempts to authenticate the user 502 using the first set of image data. In this scenario, the processor 202 determines, with at least a 50% confidence level based on its authentication attempt with the image data that the user 502 is an authorized user. Based on this determination, the processor 202 grants the user 502 a first level of access to the device 100 (block 604).

    [0021] The processor 202 then receives data regarding the user, including the user's position, motion (including the user's gait), speed, and context, from the second motion sensor 116B. The processor 202 analyzes the data from the second motion sensor 116B and, based on this motion data (and possibly based on further data from the first motion sensor 116A) determines that the user 502 has moved within viewing range of the second imager 110B. The processor 202 reacts by turning on the second imager 110B and controlling the second imager 110B to capture a second set of image data of the user 502 (block 606). The controller 202 then stitches the first set of image data and the second set of image data together (block 608). This stitching process allows the processor 202 to get a more comprehensive view of the user 502 and attempt to authenticate the user 502 on that basis. At block 610, the processor 202 grants the user 502 a second level of access to the electronic device 100 based on the stitched first and second sets of image data. In doing so, the processor 202 may also use the stitched images to assess the environment surrounding the device 100- such as the walls, ceiling, room settings, and table- and grant a level access to the user if the processor 202 determines that the environment is specific to the user (the user's house, office, car, etc.) The processor 202 can also use the surrounding environment to reinforce the biometric data (i.e., the user's gait, etc.) collected regarding the user. In this scenario, the combination of the environmental authentication and the biometric authentication is enough for the processor 202 to raise the level of access from a first level to a second level at block 610.

    [0022] The process described in conjunction with FIG. 6 is not limited to two imagers. For example, if the user 502 continued to walk around the device 100, the third and fourth motion sensors 116C and 116D could detect the motion and signal the processor 202. The processor 202 could react by activating the third imager 1 IOC and the fourth imager HOD, respectively, control the imagers to capture third and fourth sets of video data, and perform stitching (and possibly environmental analysis) in order to grant the second level of access, or even to grant further levels of access.

    [0023] Furthermore, the process described in conjunction with FIG. 6 may also be carried out with sensors of the device 100, such as the motion sensors 116A-116D. For example, as the user walks around the device 100, the processor 202 may stitch the data from the first motion sensor 116A and the second motion sensor 116B together. The stitched data can be used, for example, to map the XY position of the user, and may be part of the basis upon which the processor 202 grants the first or second level of access.

    [0024] It should be understood that the embodiments described herein should be considered in a descriptive sense only and not for purposes of limitation. Descriptions of features or aspects within each embodiment should typically be considered as available for other similar features or aspects in other embodiments.

    [0025] While one or more embodiments of the have been described with reference to the figures, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from their scope of as defined by the following claims. For example, the steps of the flow diagrams of FIGS. 4 and 6 can be reordered in way that will be apparent to those of skill in the art. Steps may also be added to the flow diagrams of FIGS. 4 and 6.


    Claims

    1. A method for controlling access to an electronic device (100), the method carried out by the electronic device, comprising:

    activating an imager (110) of the electronic device (100), based on detected motion of a user, to capture a first set of image data of the user;

    carrying out a first authentication procedure on the user based on the user's body geometry with the first set of image data;

    granting the user a first level of access to the electronic device (100) based on the first set of image data;

    altering a setting of the imager (110) to facilitate user authentication based on further occurrences of the detected motion of the user;

    capturing a second set of image data of the user with the imager (110) after altering the setting;

    carrying out a second authentication procedure on the user based on the user's body geometry with the second set of image data; and

    granting the user a second level of access to the electronic device (100) based on the second set of image data.


     
    2. The method of claim 1, wherein
    granting the first level of access comprises granting the user access to telephone functions or lower security applications of the electronic device (100),
    granting the second level of access comprises granting the user access to one or more of pictures, files, emails, and higher security applications on the electronic device (100).
     
    3. The method of claim 1, wherein the user's body geometry is one or more of the user's body shape, body size, and gait.
     
    4. The method of claim 1, wherein the setting is one or more of the imager's frame rate, shutter speed, shutter timing, illumination, resolution, aperture, and zoom.
     
    5. The method of claim 1, further comprising changing the illumination intensity of a light source (212) on the electronic device (100) based on the further occurrences of the detected motion of the user.
     
    6. A method for controlling access to an electronic device (100), the method carried out by the electronic device, comprising:

    activating a first imager (110A) of the electronic device (100), based on detected motion of a user, to capture a first set of image data of the user;

    granting the user a first level of access to the electronic device (100) based on the first set of image data;

    activating a second imager (110B) of the electronic device (100), based on further detected motion of the user, to capture a second set of image data;

    stitching the first and second sets of image data together; and

    granting the user a second level of access to the electronic device (100) based on the stitched first and second sets of image data.


     
    7. The method of claim 6, wherein the second set of image data is image data of the user.
     
    8. The method of claim 7, further comprising:

    using the stitched first and second sets of image data to assess the environment surrounding the electronic device (100); and

    granting the second level access based on the assessment.


     
    9. The method of claim 8, further comprising:

    using one or more of the first and second sets of image data to make a biometric assessment of the user; and

    granting the second level access based on the combination of the environmental assessment and the biometric assessment.


     
    10. The method of claim 6, further comprising:

    receiving data regarding the user from a first motion sensor (116A) and a second motion sensor (116B); and

    stitching the data from the first motion sensor (116A) and the second motion sensor (116B) together,

    wherein granting the user the second level of access comprises granting the user a second level of access based, at least in part, on the stitched data from the first motion sensor (116A) and the second motion sensor (116B).


     
    11. An electronic device (100) comprising:

    an imager (110) configured to capture a first set of image data of a user; and

    a processor (202), configured to:

    activate the imager (110), based on detected motion of the user, to capture the first set of image data of the user;

    carry out a first authentication procedure on the user based on the user's body geometry with the first set of image data

    grant the user a first level of access to the electronic device (100) based on the first set of image data; and

    alter a setting of the imager (110) to facilitate user authentication based on further occurrences of the detected motion of the user,

    wherein the imager (110) is further configured to capture a second set of image data of the user based on the altered setting, and

    wherein the processor (202) is further configured to:

    activate the imager (110) to capture the second set of image data of the user based on the altered setting;

    carry out a second authentication procedure on the user based on the user's body geometry with the second set of image data; and

    grant the user a second level of access to the electronic device (100) based on the second set of image data.


     
    12. The electronic device (100) of claim 11, wherein
    the processor (202) is further configured to grant the first level of access by granting the user access to telephone functions or lower security applications of the electronic device (100),
    the processor (202) is further configured to grant the second level of access by granting the user access to one or more of pictures, files, emails, and higher security applications on the electronic device (100).
     


    Ansprüche

    1. Verfahren zum Steuern des Zugriffs auf eine elektronische Vorrichtung (100), wobei das von der elektronischen Vorrichtung ausgeführte Verfahren Folgendes umfasst:

    Aktivieren eines Bildgebers (110) der elektronischen Vorrichtung (100), basierend auf der erfassten Bewegung eines Benutzers, um einen ersten Satz von Bilddaten des Benutzers zu erfassen;

    Durchführen eines ersten Authentifizierungsverfahrens bezüglich des Benutzers basierend auf der Körpergeometrie des Benutzers mit dem ersten Satz von Bilddaten;

    Gewähren einer ersten Zugriffsebene auf die elektronische Vorrichtung (100) für den Benutzer basierend auf dem ersten Satz von Bilddaten;

    Ändern einer Einstellung des Bildgebers (110) zum Erleichtern der Benutzerauthentifizierung basierend auf weiteres Auftreten der erfassten Bewegung des Benutzers;

    Erfassen eines zweiten Satzes von Bilddaten des Benutzers mit dem Bildgeber (110) nach dem Ändern der Einstellung;

    Durchführen eines zweiten Authentifizierungsverfahrens bezüglich des Benutzers basierend auf der Körpergeometrie des Benutzers mit dem zweiten Satz von Bilddaten; und

    Gewähren einer zweiten Zugriffsebene auf die elektronische Vorrichtung (100) für den Benutzer basierend auf dem zweiten Satz von Bilddaten.


     
    2. Verfahren nach Anspruch 1, wobei
    das Gewähren der ersten Zugriffsebene das Gewähren des Zugriffs auf Telefonfunktionen oder Anwendungen mit geringer Sicherheit der elektronischen Vorrichtung (100) für den Benutzer umfasst,
    das Gewähren der zweiten Zugriffsebene das Gewähren des Zugriffs auf eines oder mehrere von Bildern, Dateien, E-Mails und Anwendungen mit höherer Sicherheit auf der elektronischen Vorrichtung (100) für den Benutzer umfasst.
     
    3. Verfahren nach Anspruch 1, wobei die Körpergeometrie des Benutzers eine oder mehrere der Körperform, Körpergröße und Gangart des Benutzers ist.
     
    4. Verfahren nach Anspruch 1, wobei die Einstellung eine oder mehrere von Bildfrequenz, Verschlusszeit, Verschlusszeitpunkt, Beleuchtung, Auflösung, Blende und Zoom des Bildgebers ist.
     
    5. Verfahren nach Anspruch 1, ferner umfassend das Ändern der Beleuchtungsintensität einer Lichtquelle (212) der elektronischen Vorrichtung (100) basierend auf dem weiteren Auftreten der erfassten Bewegung des Benutzers.
     
    6. Verfahren zum Steuern des Zugriffs auf eine elektronische Vorrichtung (100), wobei das von der elektronischen Vorrichtung ausgeführte Verfahren Folgendes umfasst:

    Aktivieren eines ersten Bildgebers (110A) der elektronischen Vorrichtung (100), basierend auf der erfassten Bewegung eines Benutzers, um einen ersten Satz von Bilddaten des Benutzers zu erfassen;

    Gewähren einer ersten Zugriffsebene auf die elektronische Vorrichtung (100) für den Benutzer basierend auf dem ersten Satz von Bilddaten;

    Aktivieren eines zweiten Bildgebers (110B) der elektronischen Vorrichtung (100), basierend auf einer weiteren erfassten Bewegung des Benutzers, um einen zweiten Satz von Bilddaten zu erfassen;

    Zusammenfügen des ersten und zweiten Satzes von Bilddaten; und

    Gewähren einer zweiten Zugriffsebene für den Benutzer auf die elektronische Vorrichtung (100) basierend auf dem Zusammenfügen eines ersten und zweiten Satzes von Bilddaten.


     
    7. Verfahren nach Anspruch 6, wobei der zweite Satz von Bilddaten, Bilddaten des Benutzers sind.
     
    8. Verfahren nach Anspruch 7, ferner umfassend:

    Verwenden der zusammengefügten ersten und zweiten Sätze von Bilddaten zur Bewertung der Umgebung der elektronischen Vorrichtung (100); und

    Gewähren der zweiten Zugriffsebene basierend auf der Bewertung.


     
    9. Verfahren nach Anspruch 8, ferner umfassend:

    Verwenden eines oder mehrerer der ersten und zweiten Sätze von Bilddaten, um eine biometrische Bewertung des Benutzers vorzunehmen; und

    Gewähren der zweiten Zugriffsebene basierend auf der Kombination der Umgebungsbewertung und der biometrischen Bewertung.


     
    10. Verfahren nach Anspruch 6, ferner umfassend:

    Empfangen von Daten bezüglich des Benutzers von einem ersten Bewegungssensor (116A) und einem zweiten Bewegungssensor (116B); und

    Zusammenfügen der Daten des ersten Bewegungssensors (116A) und des zweiten Bewegungssensors (116B),

    wobei das Gewähren der zweiten Zugriffsebene für den Benutzer das Gewähren einer zweiten Zugriffsebene für den Benutzer umfasst, zumindest teilweise basierend auf den zusammengefügten Daten von dem ersten Bewegungssensor (116A) und dem zweiten Bewegungssensor (116B).


     
    11. Elektronisches Gerät (100), umfassend:

    Bildgeber (110), konfiguriert, um einen ersten Satz von Bilddaten eines Benutzers zu erfassen; und

    Prozessor (202), konfiguriert zum:

    Aktivieren des Bildgebers (110) basierend auf der erfassten Bewegung des Benutzers, um den ersten Satz von Bilddaten des Benutzers zu erfassen;

    Durchführen eines ersten Authentifizierungsverfahrens bezüglich des Benutzers basierend auf der Körpergeometrie des Benutzers mit dem ersten Satz von Bilddaten

    Gewähren einer ersten Zugriffsebene für den Benutzer auf die elektronische Vorrichtung (100) basierend auf dem ersten Satz von Bilddaten; und

    Ändern einer Einstellung des Bildgebers (110) zum Erleichtern der Benutzerauthentifizierung basierend auf weiteres Auftreten der erfassten Bewegung des Benutzers,

    wobei der Bildgeber (110) ferner konfiguriert ist, um einen zweiten Satz von Bilddaten des Benutzers basierend auf der geänderten Einstellung zu erfassen, und

    wobei der Prozessor (202) ferner konfiguriert ist zum:

    Aktivieren des Bildgebers (110), um einen zweiten Satz von Bilddaten des Benutzers basierend auf der geänderten Einstellung zu erfassen;

    Durchführen eines zweiten Authentifizierungsverfahrens bezüglich des Benutzers basierend auf der Körpergeometrie des Benutzers mit dem zweiten Satz von Bilddaten; und

    Gewähren einer zweiten Zugriffsebene für den Benutzer auf die elektronische Vorrichtung (100) basierend auf dem zweiten Satz von Bilddaten.


     
    12. Elektronische Vorrichtung (100) nach Anspruch 11, wobei
    Prozessor (202) ferner konfiguriert ist, um die erste Zugriffsebene zu gewähren, durch Gewähren des Benutzerzugriffs auf Telefonfunktionen oder Anwendungen mit geringerer Sicherheit der elektronischen Vorrichtung (100),
    Prozessor (202) ferner konfiguriert ist, um die zweite Zugriffsebene zu gewähren, durch Gewähren des Benutzerzugriffs auf eines oder mehrere von Bildern, Dateien, E-Mails und Anwendungen mit höherer Sicherheit auf der elektronischen Vorrichtung (100).
     


    Revendications

    1. Procédé pour le contrôle d'un accès à un dispositif électronique (100), le procédé mis en œuvre par le dispositif électronique, comprenant :

    l'activation d'un imageur (110) du dispositif électronique (100), sur base du mouvement détecté d'un utilisateur, pour capturer un premier ensemble de données d'image de l'utilisateur ;

    la mise en œuvre d'une première procédure d'authentification sur l'utilisateur sur base de la géométrie corporelle de l'utilisateur avec le premier ensemble de données d'image ;

    l'octroi à l'utilisateur d'un premier niveau d'accès au dispositif électronique (100) sur base du premier ensemble de données d'image ;

    la modification d'un réglage de l'imageur (110) pour faciliter une authentification de l'utilisateur sur base d'occurrences supplémentaires du mouvement détecté de l'utilisateur ;

    la capture d'un deuxième ensemble de données d'image de l'utilisateur avec l'imageur (110) après la modification du réglage ;

    la réalisation d'une deuxième procédure d'authentification sur l'utilisateur sur base de la géométrie corporelle de l'utilisateur avec le deuxième ensemble de données d'image ; et

    l'octroi à l'utilisateur d'un deuxième niveau d'accès au dispositif électronique (100) sur base du deuxième ensemble de données d'image.


     
    2. Le procédé selon la revendication 1, dans lequel
    l'octroi du premier niveau d'accès comprend l'octroi de l'accès utilisateur à des fonctions téléphoniques ou à des applications de sécurité inférieures du dispositif électronique (100),
    l'octroi du deuxième niveau d'accès comprend l'octroi de l'accès utilisateur à une ou plusieurs images, fichiers, e-mails et applications de sécurité plus élevées sur le dispositif électronique (100).
     
    3. Le procédé selon la revendication 1, dans lequel la géométrie corporelle de l'utilisateur est une ou plusieurs de la forme corporelle, de la taille de corps et de la démarche de l'utilisateur.
     
    4. Le procédé selon la revendication 1, dans lequel le réglage est un ou plusieurs parmi la fréquence d'images, la vitesse d'obturation, la synchronisation d'obturation, l'éclairage, la résolution, l'ouverture, et le zoom de l'imageur.
     
    5. Le procédé selon la revendication 1, comprenant en outre le changement de l'intensité lumineuse d'une source de lumière (212) sur le dispositif électronique (100) sur base des occurrences supplémentaires du mouvement détecté de l'utilisateur.
     
    6. Procédé pour le contrôle d'un accès à un dispositif électronique (100), le procédé mis en œuvre par le dispositif électronique, comprenant :

    l'activation d'un premier imageur (110A) du dispositif électronique (100), sur base d'un mouvement détecté d'un utilisateur, pour capturer un premier ensemble de données d'image de l'utilisateur ;

    l'octroi à l'utilisateur d'un premier niveau d'accès au dispositif électronique (100) sur base du premier ensemble de données d'image ;

    l'activation d'un deuxième imageur (110B) du dispositif électronique (100), sur base d'un mouvement détecté supplémentaire de l'utilisateur, pour capturer un deuxième ensemble de données d'image ;

    l'assemblage des premier et deuxième ensembles de données d'image ensemble ; et

    l'octroi à l'utilisateur d'un deuxième niveau d'accès au dispositif électronique (100) sur base des premier et deuxième ensembles assemblés de données d'image.


     
    7. Le procédé selon la revendication 6, dans lequel le deuxième ensemble de données d'image consiste en des données d'image de l'utilisateur.
     
    8. Le procédé selon la revendication 7, comprenant en outre :

    l'utilisation des premier et deuxième ensembles de données d'image assemblés pour évaluer l'environnement entourant le dispositif électronique (100) ; et

    l'octroi de l'accès au deuxième niveau sur base de l'évaluation.


     
    9. Le procédé selon la revendication 8, comprenant en outre :

    l'utilisation d'un ou plusieurs des premier et deuxième ensembles de données d'image pour effectuer une évaluation biométrique de l'utilisateur ; et

    l'octroi de l'accès au deuxième niveau sur base de la combinaison de l'évaluation environnementale et l'évaluation biométrique.


     
    10. Le procédé selon la revendication 6, comprenant en outre :

    la réception de données concernant l'utilisateur à partir d'un premier capteur de mouvement (116A) et d'un deuxième capteur de mouvement (116B) ; et

    l'assemblage des données du premier capteur de mouvement (116A) et du deuxième capteur de mouvement (116B) ensemble,

    dans lequel l'octroi à l'utilisateur du deuxième niveau d'accès comprend l'octroi à l'utilisateur d'un deuxième niveau d'accès sur base, au moins partiellement, des données assemblées du premier capteur de mouvement (116A) et du deuxième capteur de mouvement (116B).


     
    11. Dispositif électronique (100) comprenant :

    un imageur (110) configuré pour capturer un premier ensemble de données d'image d'un utilisateur ; et

    un processeur (202), configuré pour :

    activer l'imageur (110), sur base du mouvement détecté de l'utilisateur, pour capturer le premier ensemble de données d'image de l'utilisateur ;

    mettre en œuvre une première procédure d'authentification sur l'utilisateur sur base de la géométrie corporelle de l'utilisateur avec le premier ensemble de données d'image

    octroyer à l'utilisateur un premier niveau d'accès au dispositif électronique (100) sur base du premier ensemble de données d'image ; et

    modifier un réglage de l'imageur (110) pour faciliter l'authentification de l'utilisateur sur base d'occurrences supplémentaires du mouvement détecté de l'utilisateur,

    dans lequel l'imageur (110) est en outre configuré pour capturer un deuxième ensemble de données d'image de l'utilisateur sur base du réglage modifié, et

    dans lequel le processeur (202) est en outre configuré pour :

    activer l'imageur (110) pour capturer le deuxième ensemble de données d'image de l'utilisateur sur base du réglage modifié ;

    mettre en œuvre une deuxième procédure d'authentification sur l'utilisateur sur base de la géométrie corporelle de l'utilisateur avec le deuxième ensemble de données d'image ; et

    octroyer à l'utilisateur un deuxième niveau d'accès au dispositif électronique (100) sur base du deuxième ensemble de données d'image.


     
    12. Dispositif électronique (100) selon la revendication 11, dans lequel
    le processeur (202) est en outre configuré pour octroyer le premier niveau d'accès par l'octroi à l'utilisateur d'un accès aux fonctions téléphoniques ou aux applications de sécurité inférieures du dispositif électronique (100),
    le processeur (202) est en outre configuré pour octroyer le deuxième niveau d'accès par l'octroi à l'utilisateur d'un accès à une ou plusieurs images, fichiers, e-mails et applications de sécurité plus élevées sur le dispositif électronique (100).
     




    Drawing


























    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description