Patent application serial number 581633 has not been assigned to a company or institution.
The following quote was obtained by the news editors from the background information supplied by the inventors: "The increase in activity in the security field has highlighted some of the shortcomings of user authentication systems.
"Security authentication systems generally come in a number of categories. Card or fob based systems use cards or fobs which, when swiped or placed near readers, authenticate their holder as being legitimate. Biometric systems require that the user use a biometric reader so that a biometric reading (usually a retina scan, a fingerprint, or any other known biometric based indicia) can be taken. Password/passcode based systems require a user to enter in a password/passcode for authentication. Other systems may use any combination of these general categories of authentication systems.
"Of course, most of the above noted authentication systems have their drawbacks. Specifically, passwords/passcodes can be stolen. Similarly, cards and fobs can also be stolen and/or duplicated. Also, passwords/passcodes can be forgotten while cards and/or fobs can be lost. Biometric based authentication systems, while almost foolproof, require a more active participation from the user. As well, biometric based systems have sometimes been seen as too invasive for some people to use.
"There is therefore a need for an authentication system that is neither invasive nor easy to lose. As well, such an authentication system should also not be vulnerable to theft and, even if stolen, it should not be usable by whoever stole it."
In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventors' summary information for this patent application: "The present invention provides systems and methods for authenticating users based on their gait. A sensor module with multiple sensors is placed inside a user's shoe and biometric data is gathered from the sensors when the user takes a step. The data gathered from each of the sensors is then received by a data processing module. The data is processed and compared with a stored signature from an authenticated user. If the processed data does not match the stored signature within predetermined limits, then the user using the system is not authenticated. An alarm may then be generated. If, on the other hand, there is a match, the user is authenticated and this authenticated result can be used to give the user access to restricted resources.
"In a first aspect, the present invention provides a method for determining if a user of a device is an authenticated user, said device having a plurality of sensors for biometric data, the method comprising:
"a) selecting two of said plurality of sensors;
"b) gathering data from each sensor selected in step a);
"c) correlating data gathered from said two sensors such that data points gathered at similar instances are matched with one another to result in data pairs;
Most Popular Stories
- 15 Myths That Could Ruin Your Hispanic Ad Campaign
- Bitcoin Clones Lurch Onto Financial Scene
- General Motors Names Mary Barra as First Female CEO
- AIG to Create 230 Jobs in Charlotte
- Clinton to Keynote Annual Simmons Leadership Conference
- Pacific Trade Pact Delay Hinders U.S. Pivot to Asia
- Californians Want to Legalize Marijuana
- How Bitcoin and Other Cryptocurrencies Work
- Russia Says Nyet to Canada North Pole Claim
- Budget Deal Sets Off Grumbles in Both Houses