Method and apparatus for authenticating access to a multi-level secure environment of an electronic device

ABSTRACT

An electronic system utilizes a method ( 500 ) for authenticating access to a multi-level secure environment. According embodiments, the system stores ( 501 ) fingerprint data for at least one authorized human user of the system. The fingerprint data for each authorized user includes copies of fingerprints for two or more fingers of the user. Some time after storing the fingerprint data, the system senses ( 503 ) one or more fingers of an individual who is attempting to use the system and compares ( 505 ) the sensed finger data to the stored fingerprint data. When at least some of the sensed finger data matches copies of fingerprints in the stored fingerprint data, the system determines ( 509 ) a quantity of matching fingerprints. The system then determines ( 525 ) a security level for the individual based on the quantity of matching fingerprints and provides access ( 527 ) to particular functionality of the system based on the determined security level.

RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.14/081,167, filed Nov. 15, 2013, the entire contents of each of whichare hereby incorporated by reference.

TECHNICAL FIELD

The present disclosure relates generally to using fingerprint detectiontechnology to authenticate user access to an electronic system and, moreparticularly, to using fingerprint detection technology to authenticateaccess to a multi-level secure environment within an electronic system.

BACKGROUND

Fingerprint authentication systems are well known and typically used insingle level secure environments to either permit or deny access tophysical spaces (e.g., buildings, interior rooms, parking garages,cabinets, and/or safes), equipment (e.g., computers and/or servers), orsoftware/data (e.g., email, encrypted files, secure softwareapplications, secure folders, and/or secure websites). Suchauthentication systems may be wired or wireless and typically include atouchpad, a sensing mechanism, control software, and memory. One suchsystem as embodied in a wireless fob is marketed by Privaris Inc. ofCharlottesville, Va. at the websitewww.privaris.com/authentication_fingerprint.html. Most conventionalsystems sense the fingerprint of one finger or one finger at a time (formultiple fingers); while other less popular systems sense multiplefingers simultaneously.

When desiring access to a protected space, piece of equipment, orsoftware application, the user places the palm-side, distal phalanx of afinger, such as the thumb, onto the touchpad, and the sensing mechanismscans the valleys and ridges in the surface of the user's finger todetect the fingerprint, and the control software compares the detectedfingerprint to fingerprints previously stored in memory. If a matchoccurs, permission to access is granted; otherwise, permission is deniedand the authentication process must be repeated.

There is an opportunity to apply fingerprint detection technology tomulti-level secure environments, whereby access to different levels ofthe environment has correspondingly different authenticationrequirements. Additionally, there is an opportunity to provide userfeedback during the fingerprint detection process.

BRIEF DESCRIPTON OF THE DRAWINGS

FIG. 1 is an electrical block diagram of an electronic system configuredto authenticate access to a multi-level secure environment of thesystem, in accordance with a first exemplary embodiment.

FIG. 2 illustrates an electronic system embodied as a smartphone toillustrate exemplary locations of sensors on human-accessible surfacesof the system, in accordance with an alternative exemplary embodiment.

FIG. 3 illustrates an exemplary arrangement of sensors which, undercontrol of a processing subsystem, facilitates varying resolutions offinger detection, in accordance with another exemplary embodiment.

FIG. 4 is an electrical block diagram of a distributed electronic systemconfigured to authenticate access to a multi-level secure environment ofthe system, in accordance with another exemplary embodiment.

FIG. 5 (FIGS. 5A and 5B) is a logic flow diagram of steps executed by anelectronic system to authenticate access to a multi-level secureenvironment of the system, in accordance with various exemplaryembodiments.

Skilled artisans will appreciate that elements in the figures areillustrated for simplicity and clarity and have not necessarily beendrawn to scale. For example, the dimensions of some of the elements inthe figures may be exaggerated alone or relative to other elements orthe elements may be shown in block diagram form to help improve theunderstanding of the various exemplary embodiments.

DETAILED DESCRIPTION

The present disclosure generally describes a method and apparatus forauthenticating access to a multi-level secure environment of anelectronic system. The electronic system may be a distributedclient-server type system or a self-contained system, such as a portableelectronic device. According to one embodiment, fingerprint data for atleast one authorized human user of the electronic system is stored inmemory of the electronic system to produce stored fingerprint data. Thefingerprint data for each authorized human user includes copies offingerprints for two or more fingers of the authorized human user. Sometime after the fingerprint data is stored, the electronic system sensesor detects (e.g., scans) one or more fingers of an individual who istouching one or more external surfaces of the electronic system andattempting to use the system, to produce sensed finger data. The sensingmay occur on a finger-by-finger basis or, more preferably, two or morefingers may be sensed contemporaneously (e.g., at about the same time orsubstantially simultaneously).

When at least some of the sensed finger data matches copies offingerprints in the stored fingerprint data (e.g., to a degree as iscustomary in the fingerprint matching field), the electronic systemdetermines a quantity of matching fingerprints and a security level forthe individual based on the quantity of matching fingerprints. Theelectronic system then provides access to functionality of theelectronic system based on the determined security level. For example,the electronic system may provide access to one or more softwareapplications and/or data files based on the security level determinedfor the individual. In such a case, each application or data file mayhave a respective security level associated with it. Additionally oralternatively, the electronic system may display information (e.g.,icons or program names) identifying software applications that areaccessible to the individual based on the determined security level.

In an alternative embodiment, the electronic system may provide feedbackto the individual indicating the quantity of matching fingerprints. Suchfeedback may be visual, audible, and/or haptic. For example, theelectronic system may display the quantity of matching fingerprintsand/or provide vibratory pulses indicating the quantity of matchingfingerprints. In a further embodiment, the electronic system maydetermine the fingers of the individual for which the sensed finger datamatches fingerprints in the stored fingerprint data. In other words, theelectronic system may determine the finger types corresponding to whichfingers were sensed by virtue of having detected fingerprints that matchstored fingerprints. In such a case, the security level for theindividual may be determined based on the quantity of matchingfingerprints and the finger types (e.g., right or left index finger,right or left thumb, and so forth) which correspond to the matchingfingerprints. Additionally, the electronic system may provide feedbackto the individual indicating the finger types for which the sensedfinger data matches copies of fingerprints in the stored fingerprintdata. That is, the electronic system may provide feedback indicating thefinger types for which matching fingerprints were detected. The feedbackmay be visual, audible, and/or haptic (e.g., one vibratory pulse for amatching left thumb print, two pulses for a matching left indexfingerprint, and so forth). Alternatively, the electronic system mayprovide feedback indicating the finger types for which matchingfingerprints were not detected (e.g., one vibratory pulse for a missingleft thumb print, two pulses for a missing left index fingerprint, andso forth).

In a further embodiment, the electronic system may sense one or moreadditional fingers of the individual subsequent to provision of thefeedback to produce additional sensed finger data. For example, if theoriginal sensed finger data matches only two finger types of theindividual, the electronic system may indicate such quantity to theindividual (and optionally which two finger types they are), and allot aperiod of time during which the individual can seek to have some, more,or all fingers sensed or re-sensed (e.g., re-scanned) in an attempt tohave additional fingerprints authenticated. When the feedback indicatesonly the quantity of matching fingerprints previously detected, theindividual may have all fingers re-sensed; whereas, when the feedbackindicates which sensed finger types had matching fingerprints, theindividual may have all fingers re-sensed or only the remaining fingersre-sensed (i.e., finger types for which there were no prior matches ofsensed finger data to copies of fingerprints in the stored fingerprintdata). In either event, the sensing or re-sensing may include one ormore additional fingers of the individual, which either were notpreviously sensed or were sensed but did not correspond to anyfingerprints in the stored fingerprint data. The finger sensing orre-sensing may occur on a finger-by-finger basis or two or more fingersmay be sensed contemporaneously. The electronic system compares theadditional sensed finger data to the stored fingerprint data anddetermines a quantity of additional matching fingerprints (andoptionally the finger types to which they correspond) when at least someof the additional sensed finger data matches copies of fingerprints inthe stored fingerprint data. Where all fingers are re-sensed (or as manyfingers as the individual elects to have re-sensed), the quantity ofadditional matching fingerprints is the quantity of matchingfingerprints resulting from re-sensing less the quantity of matchingfingerprints resulting from the original finger sensing or prior fingersensing. The security level for the individual may then be determinedbased on the aggregate quantity of matching fingerprints (e.g., thequantity that originally matched plus the quantity that additionallymatched). In one embodiment, the security level may increase in relationto an increasing quantity of matching fingerprints.

In yet another embodiment, instead of determining a single securitylevel for the individual based on the aggregate quantity of matchingfingerprints, the electronic system may determine one security level(e.g., a base level) based on the quantity of matching fingerprintsdetermined from an original finger sensing and a new or second securitylevel based on the aggregate quantity of matching fingerprintsdetermined from the original plus additional finger sensing. Theelectronic system may then provide access to different functionalitywithin the system based on the different security levels. In this case,the re-sensing of the individual's fingers may occur during a timewindow allotted for sensing fingerprints. For example, the electronicsystem may allot a time period (e.g., 60 seconds) for detectingfingerprints from the time the system detects a touching of an externalsurface of the system (e.g., the housing, touchscreen, or keyboard of aportable electronic device). During the allotted time period, the systemmay provide feedback to the individual indicating the quantity ofmatching fingerprints detected and permit the individual to haveadditional fingers sensed to increase the quantity of matchingfingerprints. However, the system may also allow the individual toaccess functionality of the system during the fingerprint sensing timeperiod. Therefore, the system may determine the first security level forthe individual based on the original quantity of matching fingerprintsand permit access to certain system functionality based on the firstsecurity level.

For instance, where the electronic system is a portable electronicdevice, the device may sense three fingers of the individual's left handon external surfaces of the device's housing (e.g., such as when theindividual picks up the device, as may be sensed by accelerometer,gyroscope, or proximity sensor readings) and determine they match threestored fingerprints. Accordingly, the device may determine a securitylevel based on detecting three fingerprints and provide access tocertain functionality (e.g., a particular group of applications) basedon the determined security level. Additionally, after providing feedbackto the individual indicating that three fingerprints were detected, thedevice may sense additional fingers of the individual during theallotted fingerprint sensing time period (e.g., by re-scanning thehousing sensors and/or sensing one or more touches of the device'stouchscreen) and compare the additional sensed finger data to the storedfingerprint data. When at least some of the additional sensed fingerdata matches copies of fingerprints in the stored fingerprint data, theelectronic device may determine a quantity of additional matchingfingerprints and a new, second security level for the individual basedon the aggregate quantity of matching fingerprints. Accordingly, thedevice may provide access to additional functionality (e.g., access toan additional group of applications) based on the new security level.

According to yet another embodiment, the electronic system may determinea context for an electronic device forming at least part of the systemand which the individual is attempting to use. In such a case, thesystem may determine a security level for the individual based on thecontext of the electronic device and the quantity of matchingfingerprints. Alternatively, the security level may be determined basedon the context of the electronic device, the quantity of matchingfingerprints, and/or which finger types correspond to the matchingfingerprints. The context may relate to internal and/or environmentalconditions in which the electronic device is operating. For example, thecontext of the electronic device may include location, time-of-day,speed (if it's in motion), general environment (e.g., inside oroutside), elevation, altitude, user habits, day-of-week, day-of-year,currently active software application(s), frequented routes, calendarevents, and/or any other information relating to the physicalsurroundings and/or usage of the device.

According to a further embodiment, fingerprint data for at least oneauthorized human user of the electronic system is stored in memory ofthe electronic system to produce stored fingerprint data. Thefingerprint data for each authorized human user includes copies offingerprints for two or more fingers of the authorized human user. Sometime after the fingerprint data is stored, the electronic system sensesor detects (e.g., scans) one or more fingers of an individual who isattempting to use the electronic system to produce sensed finger data.The sensing may occur on a finger-by-finger basis or, more preferably,two or more fingers may be sensed contemporaneously. When at least someof the sensed finger data matches copies of fingerprints in the storedfingerprint data, the electronic system determines fingers of theindividual (finger types) for which the sensed finger data matchesfingerprints in the stored fingerprint data. Based on which finger typesof the individual correspond to the matching fingerprints, theelectronic system determines a security level for the individual. Theelectronic system then provides access to functionality of theelectronic system based on the determined security level. For example,the electronic system may provide access to one or more softwareapplications and/or data files based on the security level determinedfor the individual. Additionally or alternatively, the electronic systemmay display information (e.g., icons or program names) identifying dataand/or software applications that are accessible to the individual basedon the determined security level.

According to a further implementation, an electronic system includesmemory, two or more sensors, and a processing subsystem operably coupledto the sensors and having access to the memory. The memory is operableto store fingerprint data for at least one authorized human user of theelectronic system. The fingerprint data for each authorized human userincludes copies of fingerprints for two or more fingers of theauthorized human user. The sensors are arranged to sense touching of oneor more human-accessible surfaces of the system (e.g., a housing, adisplay screen, a touchscreen, a touchpad, buttons, keys, and so forth).The processing subsystem is operable in accordance with stored operatinginstructions to: control the sensors to sense one or more fingers of anindividual who is touching the human-accessible surfaces and attemptingto use the system; process outputs from the sensors to produce sensedfinger data; compare the sensed finger data to the stored fingerprintdata; determine a quantity of matching fingerprints when at least someof the sensed finger data matches copies of fingerprints in the storedfingerprint data; determine a security level for the individual based onthe quantity of matching fingerprints; and provide access tofunctionality of the electronic system based on the security leveldetermined for the individual.

According to yet another embodiment, an electronic system includesmemory, two or more sensors, and a processing subsystem operably coupledto the sensors and having access to the memory. The memory is operableto store fingerprint data for at least one authorized human user of theelectronic system. The fingerprint data for each authorized human userincludes copies of fingerprints for two or more fingers of theauthorized user. The sensors are arranged to sense touching of one ormore human-accessible surfaces of the system. The processing subsystemis operable in accordance with stored operating instructions to: controlthe sensors to sense one or more fingers of an individual who istouching the human-accessible surfaces and attempting to use the system;process outputs from the sensors to produce sensed finger data; comparethe sensed finger data to the stored fingerprint data; determine fingersof the individual (finger types) for which the sensed finger datamatches fingerprints in the stored fingerprint data to produce fingertype identification data; determine a security level for the individualbased on the finger type identification data; and provide access tofunctionality of the electronic system based on the determined securitylevel.

According to a further version, a portable electronic device includesone or more human accessible surfaces, memory, a display, two or moresensors, and a processing subsystem. The memory is operable to storefingerprint data for at least one authorized human user of theelectronic system. The fingerprint data for each authorized human userincludes copies of fingerprints for two or more fingers of theauthorized user. The sensors are arranged to sense touching of thehuman-accessible surfaces. The processing subsystem is operable inaccordance with stored operating instructions to: control the sensors tosense one or more fingers of an individual who is touching thehuman-accessible surfaces and attempting to use the system; processoutputs from the sensors to produce sensed finger data; compare thesensed finger data to the stored fingerprint data; determine a quantityof matching fingerprints when at least some of the sensed finger datamatches copies of fingerprints in the stored fingerprint data; determinea security level for the individual based on the quantity of matchingfingerprints; and display information on the display based on thedetermined security level. The displayed information may identify atleast one of software applications and data files that are accessible tothe individual based on the determined security level.

According to yet another embodiment, a portable electronic deviceincludes one or more human accessible surfaces, memory, a display, twoor more sensors, and a processing subsystem. The memory is operable tostore fingerprint data for at least one authorized human user of theelectronic system. The fingerprint data for each authorized human userincludes copies of fingerprints for two or more fingers of theauthorized user. The sensors are arranged to sense touching of thehuman-accessible surfaces. The processing subsystem is operable inaccordance with stored operating instructions to: control the sensors tosense one or more fingers of an individual who is touching thehuman-accessible surfaces and attempting to use the system; processoutputs from the sensors to produce sensed finger data; compare thesensed finger data to the stored fingerprint data; determine fingers ofthe individual for which the sensed finger data matches fingerprints inthe stored fingerprint data to produce finger type identification data;determine a security level for the individual based on the finger typeidentification data; and display information on the display based on thedetermined security level. The displayed information may identify atleast one of software applications and data files that are accessible tothe individual based on the determined security level.

By authenticating access to system functionality based on quantities ofmatching fingerprints and/or identifications of finger typescorresponding to matching fingerprints, the disclosed system not onlylimits who can access it but also limits available functionality to thatwhich is best tailored to an authorized user's present circumstances.For example, detection of five or fewer fingers with matchingfingerprints linked to the same hand within a predetermined time period(e.g., 60 seconds) may suggest, either alone or in conjunction with adetermined context for a device being accessed, that an authorized useris holding a device with one hand and, therefore, may be driving orotherwise predisposed. Accordingly, the device may permit the individualto access a telephone application in a hands-free mode and read emailsand texts audibly, but may prohibit the individual from responding toemails or texts or conduct Internet searching via a touchscreen input.On the other hand, detection of more than five fingers (and/orparticular finger types on one or both hands) with matching fingerprintsmay suggest that the authorized user has both hands free and is inposition to use the system to perform a wider variety of functions.

Aspects of the present disclosure can be more readily understood withreference to FIGS. 1-5, in which like reference numerals designate likeitems. FIG. 1 illustrates an electrical block diagram of an electronicsystem 101 configured to authenticate access to a multi-level secureenvironment of the system 101, in accordance with a first exemplaryembodiment. In the embodiment illustrated in FIG. 1, the system 101 iscontained within a single electronic device, such as a smartphone, acellular phone, a tablet computer, a portable multimedia device, apersonal digital assistant, a gaming controller, a portable electronicreading device, a laptop computer, or any other electronic device. Asmartphone embodiment of the electronic system 101 is illustrated inFIG. 2.

According to the exemplary embodiment of FIG. 1, the electronic system101 includes, inter alia, a processing subsystem 103, memory 105, and aplurality of sensors 107 arranged to sense touching of one or morehuman-accessible surfaces of the system 101. The system 101 mayoptionally include various other elements, including a display 109, auser interface 111, a speaker 113, a haptic alerting mechanism 115(e.g., a vibratory alert). The display 109, the speaker 113, and thehaptic alerting mechanism 115 may individually and/or collectively forma user feedback mechanism, as discussed in more detail below. Also, anoptional wireless modem 117 and antenna arrangement 119) may be includedto link the system 101 to other, networked elements.

The processing subsystem 103 may include one or more microprocessors,one or more microcontrollers, one or more digital signal processors(DSPs), a graphics processing unit (GPU), one or more state machines,logic circuitry, or any other device or combination of devices thatprocesses information based on operating or programming instructions 121stored in memory 105 accessible by the processing subsystem 103. One ofordinary skill in the art will appreciate that the processing subsystem103 can be implemented using multiple processors as may be required tohandle the processing requirements of the electronic system 101. One ofordinary skill in the art will further recognize that when theprocessing subsystem 103 has one or more of its functions performed by astate machine or logic circuitry, the memory containing thecorresponding operating instructions 121 can be embedded within thestate machine or logic circuitry as opposed to being external to theprocessing subsystem 103, as shown by the electronic system memory 105illustrated in FIG. 1.

The memory 105 may store a variety of information, including operatinginstructions 121 (e.g., software or computer programs) for execution bythe processing subsystem 103, fingerprint data 123, and a security levellookup table 125. The fingerprint data 123 includes electronicallysearchable copies of fingerprints for fingers of authorized human usersof the electronic system 101. For each authorized user, the fingerprintdata 123 includes copies of fingerprints (full images or mathematicalrepresentations, such as interoperable minutiae templates) for two ormore fingers of the user. The fingerprint data 123 may be indexed byfinger type, which may or may not include an indication of hand type(i.e., right or left hand). Fingerprint data 123 may be captured formore than one user. The fingerprint data 123 may be loaded into thememory 105 during provisioning of the electronic system 101 for use on awireless network (when the electronic system 101 includes applicablewireless communication functionality), and/or at a later time duringwhich security protocols are stored in the system 101, such as after anowner of the electronic system 101 has determined who is permitted touse the electronic system.

The security level lookup table 125 associates security levels withquantities and/or finger type identifications of matching fingerprintsas determined by the processing subsystem 103 during operation of theelectronic system 101. Each authorized user of the electronic system 101may have different security levels for different quantities and/orfinger type identifications of matching fingerprints. For example,matching two fingerprints of a first authorized user may allow accessinto a particular banking application, yet accessing the same bankingapplication in the same system 101 may require five fingerprints of asecond authorized user.

The security level lookup table 125 may also associate security levelswith contexts of an electronic device forming all or part of theelectronic system 101. The contexts may relate to internal and/orenvironmental conditions in which the electronic device is operating andmay include geographic locations (e.g., as determined through use of anavigation subsystem and/or application), velocities, directions oftravel, times of day, general environment (e.g., inside or outside),elevation, altitude, user habits, frequented routes, calendar events,currently active software application(s), and/or any other informationrelating to the physical surroundings and/or usage of the electronicdevice.

Each security level in the lookup table 125 corresponds to a particularamount of system functionality to which the user may be granted access.System functionality may include, but is not limited to, applications,functions within applications (e.g., read, edit, add, delete, etc.),access to data files, interfaces to smart home appliances, interfaces tosocial networks, cloud communication capability, remote downloadcapability, device-to-device communication capability, and/or interfacesto automotive subsystems (e.g., audio and/or navigation subsystems),just to name a few. The security level lookup table 125 may be loadedinto the memory 105 during manufacturing of the electronic system 101 orat a later point in time during which security protocols are stored inthe system 101.

The memory 105 may be separate from the processing subsystem 103 asdepicted in FIG. 1 or may be integrated into the processing subsystem103 as discussed above. The memory 105 can include random access memory(RAM), read-only memory (ROM), flash memory, electrically erasableprogrammable read-only memory (EEPROM), and/or various other forms ofmemory as are well known in the art. It will be appreciated by one ofordinary skill in the art that the various memory components can each bea group of separately located memory areas in the overall or aggregatesystem memory 105 and that the system memory 105 may include one or moreindividual memory elements.

Each touch sensor 107 may be implemented using capacitive contactsensors (e.g., indium tin oxide (ITO) sensors), optical sensors, coppersensors, silicon-based sensors, ultrasonic sensors, or other sensorsarranged to detect when a human-accessible, external surface of thesystem 101 has been touched. For example, as illustrated in FIG. 2,which depicts the electronic system 101 implemented as a smartphone 201,the touch sensors 107 may be integrated into or just below the externalsurfaces 203, 204, 205 of the smartphone's housing, as well as in orjust below the surface of the display screen 206. Those of ordinaryskill in the art will readily recognize and appreciate that thelocations of the touch sensors 107 in the aforementioned exemplarysmartphone embodiment are merely illustrative and that the positioningand quantity of touch sensors 107 may vary to meet the touch andfingerprint detecting sensitivity needs of a particular electronicsystem 101.

When included, the display 109 may be any conventional orfuture-developed display, such as a liquid crystal display (LCD), aplasma display, a light emitting diode (LED) display, an organic LED(OLED) display, or any other display technology. The display 109includes a display screen and appropriate conventional drivers, and mayoptionally include a GPU for illuminating various picture elements(e.g., pixels) of the display screen as instructed by the processingsubsystem 103. Alternatively, the GPU may be separate from the display109 (e.g., in an integrated circuit (IC) that is separate from the ICcontaining the display drivers), or be integrated into the processingsubsystem 103 as discussed above. In some versions, the display 109includes touch sensors 107 so as to form a touchscreen display, wheresuch sensors 107 may be controlled by the processing subsystem 103 tosense a user's fingers in sufficient detail to capture fingerprints.

When included, the user interface 111 may be incorporated into thedisplay 109 as described previously and/or include other user interfacecomponents. For example, the user interface 111 may include rocker keys,buttons, a keypad, a keyboard, a scroll wheel, a thumbwheel, one or moremicrophones and associated speech conversion/processing software, atouchpad, and/or any other now-known or future-developed user interfacetechnology. Thus, touch sensors 107 incorporated into the display 109may form part of the user interface 111, as may the speaker 113.

When included, the speaker 113 may be a conventional speaker or audiotransducer sized, shaped, and positioned to accommodate operation of theparticular electronic system 101. The speaker 113 may also form part ofthe user interface 111 as noted previously. The haptic alertingmechanism 115, when included, may be a conventional vibration system(electrically driven motor connected to an unbalanced weight) that isalso sized, shaped, and positioned to accommodate operation of theparticular electronic system 101. Alternatively, the haptic alertingmechanism 115 may include a piezoelectric vibration system, an acousticsystem, or any other tactile alerting system.

The wireless modem 117 and antenna system 119 may be included where theelectronic system 101 is capable of wireless communications. Thewireless modem 117 is generally used herein to refer to the modems andtransceivers used to provide all wireless communication functionalityfor the electronic system 101. Thus, as used herein, the wireless modem117 may include one or more wireless wide area modems (e.g., such as areused to access cellular or satellite communications systems) and/or oneor more short-range wireless modems (e.g., such as are used to accessshort-range communication networks, including Wi-Fi, Bluetooth, Zigbee,and other short-range networks). The antenna system 119 may be active orpassive and accommodates the wireless communication functionalities ofthe wireless modem 117, as is known in the art.

FIG. 3 illustrates one exemplary arrangement of sensors 107 which, undercontrol of the processing subsystem 103, facilitates varying resolutionsof finger detection. The exemplary arrangement includes two groups ofcapacitive sensors 301, 303. Sensors 301 in the first group are spacedsuch that they perform low resolution sensing when activated alone. Suchsensing would enable the processing subsystem 103 to determine, uponreceiving outputs from the sensors 301, that a touch or swipe hadoccurred, but would not enable the processing subsystem 103 to determinefingerprints of fingers performing the touching. When high resolutionsensing is desired, the second group of sensors 303 may be activatedtogether with the first group of sensors 301. Thus, sensors 303 in thesecond group are spaced much closer together than are the sensors 301 inthe first group. According to one embodiment, the sensors 301 in thefirst group may be spaced about five (5) millimeters apart and sensorsin the second group may be spaced about 50-70 micrometers apart or froma sensor 301 in the first group. The spacing of the sensors 303 in thesecond group are preferably such that ridges and valleys in the surfacesof fingers may be detected so as to capture the fingerprints of fingersthat are in contact with sensors 107 on an external surface of thesystem 101.

According to one embodiment, the processing subsystem 103 may controlthe sensors 107 so as to activate the high and low resolution sensors301, 303 during a time period allotted for sensing fingerprints of anindividual attempting to use the system 101, and activate only the lowresolution sensors 301 during all other time periods so as toefficiently use direct current (DC) power resources of the system 101.Such an approach would be particularly beneficial where the system 101is or includes a portable electronic device and the sensors 107 areintegrated into the portable device's external surfaces. The time periodfor sensing fingerprints may commence after the processing subsystem 103determines that, based upon outputs of the low resolution sensors 301,at least one external surface of the system 101 has been touched. Duringthe fingerprint sensing period, the system 101 may provide feedback tothe user through a user feedback mechanism, such as one or more of thedisplay 109, the speaker 113, and the haptic alerting mechanism 115, toindicate how many fingerprints have been detected and/or identify thefinger types for which fingerprints have been detected. Alternatively,the high and low resolution sensors 301, 303 may remain permanentlyactivated while the electronic system 101 is powered on, where DC powersaving (e.g., battery power saving) is not a concern.

FIG. 4 is an electrical block diagram of a distributed electronic system400 configured to authenticate access to a multi-level secureenvironment, in accordance with another exemplary embodiment. In theembodiment illustrated in FIG. 4, the system 400 includes one or moreservers 401 (one shown for illustration) installed at one or more fixedlocations and at least one portable electronic device 403 (one alsoshown for illustration). The server 401 and the portable device 403communicate through a communication network 405, which may includewireless and wireline links. In the exemplary distributed system 400,the server 401 may include, inter alia, memory 407 that storesfingerprint data 423. The distributed version of the system 400 may beused where the database of fingerprint data 423 has a larger memoryrequirement than can be accommodated by the memory 408 of the portabledevice 403. The server memory 407 may further optionally store operatinginstructions 421 to be executed by the portable device 403 and/or theserver 401 to carry out various functions described herein. Where theserver memory 407 stores the portable device's operating instructions121, the portable device 403 may retrieve the operating instructions 121from the server 401 over the communication network 405 as part of ageneral software download or update, or on an as-needed basis atruntime.

In the distributed system embodiment, the portable device 403 mayinclude, inter alia, a processing subsystem 103, touch sensors 107 andhuman-accessible surfaces to which they are associated, memory 408 forstoring the operating instructions 121 (which may have beenpre-installed or retrieved from the server 401), and a user feedbackmechanism 410. The user feedback mechanism 410 may be implemented by anyone or more of a visual output device (e.g., a display 109), an audiooutput device (e.g., a speaker 113), and a haptic alerting mechanism 115(e.g., an unbalanced motor).

Operation of the electronic system 101, 400 in accordance with exemplaryimplementations may be further understood with reference to FIGS. 1-5.Referring to FIG. 5, a logic flow diagram 500 is depicted illustratingsteps executed by the electronic system 101, 400 to authenticate accessto a multi-level secure environment. The logic flow steps may beexecuted by various components of the electronic system 101, 400,including, but not limited to, the processing subsystem 103, (and itsconstituent hardware and/or software modules), the memory 105, 407, 408,the touch sensors 107, 301, 303, and the user feedback mechanism 410.The steps executed by the processing subsystem 103 are preferablyperformed in accordance with the operating instructions 121, 421 storedin the memory 105, 407, 408. For purposes of the following illustrativedescription of system operation, reference will be primarily made to theportable electronic device embodiment of the system 101 as illustratedin FIGS. 1 and 2, except as may be necessary to describe alternativesthat are specific to the distributed system embodiment as illustrated inFIG. 4.

According to the logic flow of FIG. 5, the electronic system 101 stores(501) fingerprint data 123, 423 for one or more authorized system usersin system memory 105. The fingerprint data 123, 423 may have beenobtained using conventional fingerprint scanning devices that areexternal to the system 101 and loaded into the memory 105 for use inaccordance with the present disclosure.

Some time after the fingerprint data 123 has been stored in memory 105,the system 101 senses (503) fingers of a person who is touching one ormore of the system's external surfaces (e.g., surfaces 203, 204, 205) inan attempt to use the system 101. Such sensing may be performed by thetouch sensors 107 of the system 101, under control of the processingsubsystem 103. The sensing may be performed to sense multiple fingerscontemporaneously and/or to sequentially sense one finger at a time. Forexample, a user may contemporaneously press a left thumb, a left middlefinger, and a left ring finger onto the touch sensors 107 of thesystem's external surfaces 203-205 (such as when the user holds asmartphone 201 or other portable device 403 in his/her left hand) andlater press a right index finger and a right middle finger onto thetouch sensors 107 of the touchscreen display 109 (such as when the userattempts to access the functionality of the smartphone 201 or otherportable device 403).

The touch sensors 107 may be configured and controlled so as tocontinually achieve a sensing resolution that is sufficient to enablethe sensors 107 to produce outputs from which the processing subsystem103 may generate sensed finger data that effectively represents full orpartial fingerprints of the sensed fingers. Alternatively, the touchsensors 107 may be configured and controlled so as to selectivelyachieve, on an as-needed basis, a sensing resolution sufficient toenable the processing subsystem 103 to generate sensed finger data thateffectively represents or re-creates fingerprints of the sensed fingers.The alternative approach may be used in systems 101, such as portableelectronic devices 403, which rely upon limited battery power, so as toincur the additional power consumption required of the higher,fingerprint sensing resolution only when fingerprint sensing is expectedto occur. The system 101 may sense the individual's fingers serially(e.g., one at a time), jointly (e.g., contemporaneously), or somecombination of both (e.g., multiple fingers at one time and thenindividual fingers at later times, or vice versa) as the fingers contactthe external surfaces of the system 101.

In accordance with one exemplary power efficient embodiment, such asshown with reference to FIG. 3, the touch sensors 107 may include spacedapart low resolution sensors 301 and more closely spaced apart highresolution sensors 303. In such a case, the processing subsystem 103 mayinitially control the low resolution sensors 301 to be active and thehigh resolution sensors 303 to be inactive, in order to control andmitigate power consumption. The low resolution sensors 301 may provideoutput voltages corresponding to the capacitances applied at the sensors301. Thus, when a finger comes into close proximity of one or more lowresolution sensors 301, the output voltages of the affected sensors 301change relative to their untouched states, enabling the processingsubsystem 103 to detect a touch is occurring. In this embodiment, thelow resolution sensors 301 may be configured to achieve a sensingresolution that is capable of detecting a touch, but is not necessarilyfine enough to detect fingerprints. Upon determining the occurrence of atouch, the processing subsystem 103 may activate the high resolutionsensors 303 to thereby enable the high resolution sensors 303 alone, ortogether with the low resolution sensors 301, to more finely sense thefingers of the individual who is attempting to use the system 101. Thesensing resolution provided by the high resolution sensors 303 (or thehigh and low resolution sensors 301, 303 together) is such that thepeaks and valleys along the surface of the individual's finger can bedetected to enable the processing subsystem 103 to effectively re-createor otherwise determine one or more fingerprints by processing thesensors' outputs.

Having sensed fingers of an individual attempting to use the system 101,the system 101 compares (505) the sensed finger data to the storedfingerprint data 123 to determine whether the sensed finger data matchescopies of fingerprints in the stored fingerprint data 123. For purposesof the present disclosure, sensed finger data matches a copy of afingerprint in the stored fingerprint data if the two sets of data matchin accordance with customary fingerprint matching criteria (e.g., haveat least a predefined quantity of matching friction ridgecharacteristics or so-called “points”). Alternatively, fingerprintmatching criteria may vary according to the system functionality to beaccessed. For example, access to highly sensitive applications or datamay require closer fingerprint matches (e.g., matches with greaterquantities of matching points); whereas, access to less sensitiveapplications or data may require less robust fingerprint matches (e.g.,matches with lower quantities of matching points).

According to one embodiment, the processing subsystem 103 compares thesensed finger data produced from the outputs of the sensors 107 to thestored fingerprint data 123. If none of the sensed finger data matchesany of the stored fingerprint data 123, the system 101 may optionallyprovide (507) feedback to the individual who is attempting to use thesystem 101 indicating an access authentication failure. The feedback maybe provided through the display 109 or any other user feedback mechanism410. For example, the processing subsystem 103 may cause the display 109to show a message such as “No fingerprints authenticated.” As anotherexample, the processing subsystem 103 may display an access denied orauthentication failed message on the display 109.

On the other hand, if the sensed finger data matches copies of one ormore fingerprints in the stored fingerprint data 123, the system 101determines (509) a quantity of matching fingerprints and/or the fingertype(s) for which matching fingerprints were detected. For example,according to one embodiment, the processing subsystem 103 determines thequantity of fingerprints in the stored fingerprint data 123 that matchesthe fingerprints re-created from or represented by the sensed fingerdata. Alternatively, where the stored fingerprint data 123 includesinformation identifying the individual and the finger type associatedwith each fingerprint in the stored fingerprint data 123 (e.g., left orright thumb, index finger, middle finger, ring finger, and pinky), theprocessing subsystem 103 may determine the finger type or types forwhich one or more matching fingerprints were detected. In yet a furtherembodiment, the processing subsystem 103 may determine both the quantityof matching fingerprints and the finger types for which matchingfingerprints were detected, where the stored fingerprint data 123includes information identifying the individual and the finger typeassociated with each fingerprint in the stored fingerprint data 123.

After determining the quantity of matching fingerprints and/or thefinger types for which matching fingerprints were detected, the system101 may optionally provide (511) feedback to the individual indicatingthe quantity of matching or missing fingerprints and/or the finger typesfor which matching fingerprints were detected or are still missing. Forexample, the processing subsystem 103 may provide feedback by displayingthe applicable information (e.g., quantity of matching or missingfingerprints and/or finger type identifications) on the display 109 ofthe system 101 or through use of another user feedback mechanism 410 orcombination of feedback mechanisms. For example, the processingsubsystem 103 may cause the display 109 to show a message such as “Leftindex finger and left middle finger recognized”, a hand graphic withgreen left index and left middle fingertips, “Three fingerprintsmatched”, or “Right index and middle fingers not recognized, scan againfor higher security level.” As another example, the processing subsystem103 may activate the haptic alerting mechanism 115 an appropriatequantity of times so as to provide vibratory pulses corresponding to thequantity of matching or missing fingerprints or the finger types forwhich matching fingerprints were detected or are missing (e.g., threesuccessive vibration pulses may indicate that three matchingfingerprints were detected or that the fingerprint of the left middlefinger was detected). Those of ordinary skill in the art will readilyrecognize and appreciate that other individual or combinational feedbackapproaches may be used to provide feedback to the individual.

In addition to providing feedback to the individual relating to thequantity and/or finger type identifications of matching fingerprints,the system 101 may determine (513) whether the quantity of fingerprintsand/or the finger types for which matching fingerprints were detectedare sufficient to allow the individual to access all of the systemfunctionality that is permissibly available to the individual. Thefunctionality that is permissibly available to the individual mayinclude all of the system functionality (e.g., where the system 101 isused solely by the individual) or some lesser amount of functionality(e.g., where the system 101 is shared by multiple individuals).

If the result of the “all access” inquiry is negative, the system 101may optionally determine (515) whether a time period allotted forsensing fingerprints has expired. According to one embodiment, theprocessing subsystem 103 may start a fingerprint sensing timer uponsensing that a human-accessible, external surface of the system 101 hasbeen touched. In such a case, the processing subsystem 103 may determinethe quantity of matching fingerprints and/or the finger types for whichmatching fingerprints are detected only during the time period allottedfor sensing fingerprints. For example, the processing subsystem 103 maystart a one minute timer upon sensing when an external surface of thesystem 101 was touched after transitioning from a standby mode to anactive mode of the system 101. Of course, those of ordinary skill in theart will readily recognize and appreciate that other start triggers anddurations of time may be used for the fingerprint sensing time period.Alternatively, the processing system 103 may periodically or evencontinually process outputs of the sensors 107 to produce sensed fingerdata instead of employing a pre-defined fingerprint sensing time period.For example, the processing subsystem 103 may periodically orcontinually activate high resolution sensors 303 integrated into orpositioned proximate (e.g., just below) the human-accessible surfaces ofthe system 101, such as surfaces 203, 204, 205, so as to enable theprocessing subsystem 103 to receive sensor outputs from whichfingerprints of sensed fingers can be determined. In some cases, thesensor outputs may not enable the processing subsystem 103 to determineany fingerprint data because valid fingerprints may not be present(e.g., such as where a side of a finger or a palm is in contact with atouch sensor-monitored system surface 203, 204, 205).

If the time period allotted for sensing fingerprints has not expired,the system 101 may optionally sense (517) additional fingers of theindividual who is attempting to use the system 101. For example, asnoted above, the processing subsystem 103 may maintain activation of thehigh resolution sensors 303 (and possibly the low resolution sensors 301also, depending on the particular sensor configuration) throughout afingerprint sensing time period, or for any other length of time asprovided in the operating instructions 121 executed by the processingsubsystem 103. Thus, the individual may have some or all of his/herfingers sensed or re-sensed during the applicable fingerprint sensingtime period.

When additional fingers are sensed, the processing subsystem 103 mayreceive and process additional outputs from the sensors 107, 301, 303corresponding to the newly sensed or re-sensed fingers to produceadditional sensed finger data. Where fingerprints have been sensed bythe sensors 107, 301, 303, the additional sensed finger data representsthe sensed fingerprints. For example, where the feedback provided to theindividual indicates that the quantity and/or finger type identities ofmatching fingerprints correspond to less than all of the individual'sfingers, the individual may place all of his/her fingers, or only thosefingers for which there were no prior matches of sensed finger data tocopies of fingerprints in the stored fingerprint data 123, on theexternal surfaces of the system 101 to allow the sensors 301, 303 tosense them. In other words, subsequent to the system's provision offeedback to the individual, the individual may seek to have additionalfingers sensed by the system 101 for authentication purposes. The fingeror fingers of the individual may be sensed or re-sensed serially (on afinger-by-finger basis), jointly (e.g., contemporaneously), or somecombination of both (e.g., fingers on the left hand may be sensedcontemporaneously, followed by fingers on the right hand) in the mannergenerally described above with respect to block 503.

After sensing additional fingers of the individual (e.g., during theallotted fingerprint sensing time period, if any), the system 101 mayoptionally compare (519) the additional sensed finger data to the storedfingerprint data 123 to determine whether the additional sensed fingerdata matches copies of fingerprints in the stored fingerprint data 123.As discussed above with respect to block 505, the processing subsystem103 may compare the additional sensed finger data produced based uponthe outputs of the touch sensors 107 (e.g., fingerprint re-creations orrepresentations) to the stored fingerprint data 123.

If at least some of the additional sensed finger data matches copies ofone or more fingerprints in the stored fingerprint data 123, the system101 determines (521) a quantity of additional matching fingerprintsand/or the finger types for which additional matching fingerprints weredetected. For example, according to one embodiment, the processingsubsystem 103 determines the quantity of fingerprints in the storedfingerprint data 123 that matches the fingerprints re-created from orrepresented by the additional sensed finger data. Alternatively, wherethe stored fingerprint data 123 includes information identifying theindividual and the finger type associated which each stored fingerprint,the processing subsystem 103 may determine the finger types for whichadditional matching fingerprints were detected. In yet a furtherembodiment, the processing subsystem 103 may determine both the quantityof additional matching fingerprints and the finger types for whichadditional matching fingerprints were detected, where the storedfingerprint data 123 includes information identifying the individual andthe finger type associated with each stored fingerprint. The quantity ofadditional matching fingerprints therefore represents the quantity offingerprints for which there were no prior matches detected.

After determining the quantity of additional matching fingerprintsand/or the finger types for which additional matching fingerprints weredetected, the system 101 may provide feedback to the individualindicating the quantity of additional matching fingerprints, the totalquantity of matching fingerprints (e.g., the sum of the original andadditional matching fingerprints), the total quantity of still missingfingerprints, the finger types for which additional matchingfingerprints were detected, all the finger types for which matchingfingerprints were detected, and/or the finger types for which matchingfingerprints are still missing. The feedback may be provided through thedisplay 109 or any other user feedback mechanism 410, as discussed abovewith respect to block 511.

According to one embodiment, when the fingerprint sensing periodexpires, the system 101 may control the sensors 107 to achieve a lowersensing resolution to conserve battery power, especially where thesensors 107 form part of a portable electronic device 403. For example,the processing subsystem 103 may deactivate high resolution sensors 303upon expiration of the fingerprint sensing period, thereby leaving onlylow resolution sensors 301 active until commencement of the nextfingerprint sensing period. As discussed above, activation of the lowresolution sensors 301 would allow the processing subsystem 103 todetermine when an external surface has been touched and the general areaor areas of the touch, but would not provide sufficient precision topermit fingerprint determination.

In addition to sensing additional fingers during a fingerprint sensingperiod or otherwise, the system 101 may optionally determine (523) acontext for an electronic device 403 forming part of the system 101,400, where the individual whose fingers are being sensed is attemptingto use the electronic device 403. In the case where the entire system101 is implemented in an electronic device, the system 101 or itsprocessing subsystem 103 may determine a context for itself.Alternatively, where the electronic device 403 forms part of adistributed system 400 as illustrated in an exemplary manner in FIG. 4,the processing subsystem 103 for the system 101 (which may be includedin the electronic device 403) may determine a context for the device403. The context may include the location of the device, either as anabsolute location as determined using any one or more of a variety ofconventional location-determining technologies or as a general location,such as at the beach, in a building, traveling in a car, and so forth.For example, where the system 101 is a wireless communication devicethat includes a global positioning satellite (GPS) receiver andassociated processing software, the system 101 may determine its currentlocation using conventional processing of received GPS signals.Alternatively, the system 101, or its processing subsystem 103, mayestimate the system's location using other conventional techniques, suchas triangulation based on receipt of base station signals from threedifferent fixed base station antennas. The electronic system 101 maydetermine its location repeatedly over time (e.g., continuously,periodically, in response to trigger events (such as, for example, inresponse to placement of the device 403 in a vehicle docking station),or at such other times as may be desired) to facilitate a more accuratecontext. Besides location, the context may include other information,such as day of the week, time of day, speed of travel, direction oftravel, general environment (e.g., inside or outside), elevation,altitude, user habits, frequented routes, currently active softwareapplication(s), calendar events, and/or any other information relatingto the internal and/or environmental conditions foran electronic device403 forming all or part of the electronic system 101, provided that thedevice 403 includes appropriate conventional hardware and software fordetermining such additional context information.

After determining a quantity of matching fingerprints, a quantity ofadditional matching fingerprints (when applicable), identities of fingertypes for which matching fingerprints were detected, and/or an optionalcontext for an electronic device of the system 101, the system 101determines (525) a security level for the individual who is attemptingto use the system 101. The processing subsystem 103 may determine thesecurity level by reading the security level from a lookup table 125stored in memory 105, where each entry of the lookup table 125identifies a security level (or equivalently access level) andassociated requirements. Alternatively, the processing subsystem 103 maydetermine the security/access level by retrieving security levels fromdownloaded or stored functionality (e.g., from applications or datafiles that include designated security levels), where each particularsystem functionality identifies its own security/access level or levelsand associated requirements.

The requirements for a particular security level may include totalquantity of matching fingerprints determined during a fingerprintsensing period or such other time duration as may be desired, identitiesof finger types for which matching fingerprints were detected, and/or acontext for an electronic device 403 in the system 101. For example, thesecurity level lookup table 125 (or stored functionality, such as anapplication or data file) may indicate that an “all access” orequivalent security level includes the requirement of five or morematching fingerprints, a “read only” or equivalent security levelincludes the requirement of three or four matching fingerprints, a“permit eCommerce transaction” or equivalent security level includes therequirement of at least six matching fingerprints, a “place phone call”or equivalent security level includes the requirement of at least onematching fingerprint, a “view text messages” or equivalent securitylevel includes the requirement of at least two matching fingerprints,and a “send email” or equivalent security level includes the requirementof matching right and left thumb fingerprints.

Alternatively, the security level lookup table 125 (or storedfunctionality, such as an application or data file) may indicate that an“all access” or equivalent security level includes the requirement ofmatching fingerprints for all five fingers of one hand and at least anindex finger of the other hand. Still further, the security level lookuptable 125 or the stored functionality may indicate that an “all access”or equivalent security level includes the requirement of at least fivematching fingerprints and matching fingerprints for at least an indexfinger of both hands. As yet another example, the security level lookuptable 125 or stored functionality may indicate that an “all access” orequivalent security level includes the requirement of at least fivematching fingerprints, as well as a context that indicates theelectronic device 101, 403 is not traveling more than three miles perhour (e.g., suggesting that the individual attempting to use the device101, 403 is standing or walking). The security level lookup table 125 ordownloaded/stored functionality may provide other security levels basedon the quantity of matching fingerprints, the finger types for whichmatching fingerprints must be detected, combinations of matchingfingerprint quantities and finger types, combinations of matchingfingerprint quantities and electronic device contexts, combinations ofmatching finger types and electronic device contexts, combinations ofelectronic device contexts and matching fingerprint quantities andfinger types, or any other sets of requirements that include thequantities of matching fingerprints and/or the finger types for whichmatching fingerprints must be detected. The security/access levelexamples provided above are merely illustrative and are not intended tolimit the scope of the disclosed systems and methods. Those of ordinaryskill in the art will readily recognize and appreciate that varioustypes of security levels and their associated requirements may be storedin the security level lookup table 125 or included with downloaded orstored functionality as may be desired under the particularcircumstances.

After a security level has been determined for the individual, thesystem 101 provides (527) access to functionality of the system 101based on the determined security level. The system functionality mayinclude software applications or functionality available therein,operating system functionality, data file viewing and/or modificationfunctionality, and/or any other functionality provided by the system101. For example, the processing subsystem 103 may provide access tosoftware applications and/or data files based on the security leveldetermined for the individual. In such a case, the processing subsystem103 may display information on the display 109 identifying thoseapplications and/or data files that are accessible to the individualbased on the determined security level. For instance, the processingsubsystem 103 may display all applications and/or data files, but grayout, hide, lock, or otherwise de-emphasize those applications and/ordata files to which the individual does not have access based on thedetermined security level. Still further, where the permittedfunctionality relates to functionality or operations within anapplication or data file, the processing subsystem 103 may display onlythe permitted functionality or operations (or de-emphasize thosefunctions or operations that are not permitted based on the securitylevel). Those of ordinary skill in the art will readily recognize andappreciate that various other approaches may be used to indicatepermitted functionality based on the determined security level.

The permitted functionality for a given security level may be includedin the security level lookup table 125 or in another searchable portionof the system memory 105, such as another lookup table or database.Alternatively, system functionalities that are subject to security levelauthentication may include security level identifications ordesignations that are incorporated into the properties or similarparameters for the functionalities. In such a case, the processingsubsystem 103 may search the properties of various systemfunctionalities to determine which functionalities are available for aparticular determined security level.

According to an alternative embodiment where additional matchingfingerprints are detected during a fingerprint sensing period, theprocessing subsystem 103 may determine a first security level for theindividual based upon an initial quantity of matching fingerprints and asecond, new security level for the individual based upon the totalquantity of matching fingerprints (e.g., the sum of the initial quantityof matching fingerprints as determined in block 509 and the quantity ofadditional matching fingerprints as determined in block 521 of FIG. 5).In this case, the first security level may permit access to some systemfunctionality until an additional quantity of matching fingerprints isdetected. For example, the first security level may correspond to asecurity level that permits the user to view email messages, useparticular applications and/or view particular data files, but may notcorrespond to a security level that permits the user to respond to emailmessages, use other applications, and/or view other data files. The newsecurity level determined as a result of summing the initial quantity ofmatching fingerprints with the additional quantity of matchingfingerprints may permit access to greater system functionality than thefirst security level. For instance, the new security level may permitthe user to respond to emails, use previously prohibited applications,view previously prohibited, hidden, or locked data files, and/or accessother system functionality. Such a multi-staged approach to systemfunction accessibility enables the user to access limited systemfunctionality while continuing his/her attempt to obtain authenticationto access fuller system functionality.

In an analogous manner, the processing subsystem 103 may determine afirst security level for the individual based upon an initialdetermination of finger types for which matching fingerprints weredetected and a second, new security level based upon a subsequentdetermination of additional finger types for which matching fingerprintswere detected during the fingerprint sensing period. In such a case, thefirst security level may permit access to some system functionalityuntil matching fingerprints for one or more additional finger types aredetected. The new security level determined as a result of identifyingall finger types for which matching fingerprints were detected duringthe fingerprint sensing period (which may be less than all of the user'sfinger types) may permit access to greater system functionality than thefirst security level. For example, detecting a matching fingerprint fora single (left or right) index finger may cause the processing subsystem103 to determine a first email security level that permits only thereading of emails. On the other hand, detecting matching fingerprintsfor the user's left and right thumbs may cause the processing subsystem103 to determine a second email security level that permits both readingand writing of emails.

In a distributed system embodiment as shown in exemplary form in FIG. 4,the portable electronic device 403 may transmit particular informationto the server 401 over the communication network 405, such as raw sensoroutput data or the sensed finger data (e.g., where the electronic device403 processes the raw sensor output data), as well as optionalinformation detailing a context for the electronic device 403. In such acase, the server 401 may process the raw data into sensed finger data(if necessary), compare (505, 519) the sensed finger data to the storedfingerprint data 123, determine (509, 521) the quantity of matchingfingerprints and/or the finger types for which matching fingerprintshave been detected, determine (523) a context for the electronic device403, and determine (525) a security level for the individual, all inaccordance with the operating instructions 421 (e.g., software) storedin server memory 407. The server 401 may then communicate the securitylevel to the electronic device 403 over the communication network 405 toenable the electronic device 403 to provide (527) access to systemfunctionality based on the received security level. In this embodiment,the processing subsystem 103 of the electronic device 403 may query alookup table to determine the permitted functionality based on thereceived security level. Also in this embodiment, the server 401includes sufficient processing capability (e.g., one or more processors)to handle the processing functions identified above.

In a further alternative embodiment, the operating instructions 121executed by the processing subsystem 103 may cause the processingsubsystem 103 to terminate an individual's present security level if thesystem's external surfaces have not been touched for a predeterminedperiod of time (e.g., as determined by monitoring the outputs of thetouch sensors 107). In other words, the system 101 may include anauthentication time-out for lack of activity as a general accesssecurity measure. If such a time-out was to occur, the system 101 mayrequire re-authentication of the individual before access would beprovided to system functionality having security level requirements.

The present disclosure describes methods and apparatus forauthenticating access to a multi-level secure environment of anelectronic system. In accordance with such disclosure, an electronicsystem (or a processing subsystem used therein) may determine a securitylevel for an individual attempting to use the system by sensing two ormore fingers of the individual, comparing data representative of thesensed fingers to stored fingerprint data, and determining a securitylevel for the individual based on a quantity of matching fingerprints,finger types for which matching fingerprints have been detected, orboth. Thus, instead of merely permitting system access based ondetecting a potential user's fingerprint, disclosure system may providedifferent levels of access depending on how many matching fingerprintsare detected and/or which finger types correspond to the matchingfingerprints. Additionally and contrary to conventional fingerprintdetection systems, one disclosed system embodiment provides feedback tothe potential system user indicating how many matching fingerprints havebeen detected and/or which finger types correspond to the matchingfingerprints that have been detected. Such feedback enables thepotential system user to quickly identify which fingerprint informationis missing from the system's perspective and promptly have missingfingers (or all fingers) re-evaluated for purposes of accessing variousfunctionality of the system. To facilitate such re-evaluation, oneexemplary system embodiment provides for a fingerprint sensing timeperiod to be set in which the potential user can repeatedly placehis/her fingers on external surfaces of the system to allow allfingerprints to be sensed and considered in determining the user'ssecurity level.

The apparatus components and method steps described herein have beenrepresented, where appropriate, by conventional symbols in the drawings,showing only those specific details that are pertinent to understandingthe disclosed exemplary embodiments and so as not to obscure thedisclosure with details that will be readily apparent to those ofordinary skill in the art having the benefit of the description herein.Additionally, while FIG. 5 illustrates one exemplary order forperforming steps of the disclosed method, those skilled in the art willrecognize and appreciate that the order of steps which are not dependentupon other steps may be changed as desired without departing from thespirit and scope of this disclosure.

In this document, relational terms such as “first” and “second,” “top”and “bottom,” and the like may be used solely to distinguish one entityor action from another entity or action without necessarily requiring orimplying any actual relationship or order between such entities oractions. The terms “comprises,” “comprising,” “includes,” “including,”“has,” “having,” “contains,” “containing,” and any other variationsthereof are intended to cover a non-exclusive inclusion, such that aprocess, method, system, article, or apparatus that comprises, includes,has, or contains a list of elements does not include only those elementsbut may include other elements not expressly listed or inherent to suchprocess, method, system, article, or apparatus. The term “plurality of”as used in connection with any object or action means two or more ofsuch object or action. A claim element proceeded by the article “a” or“an” does not, without more constraints, preclude the existence ofadditional identical elements in the process, method, article, orapparatus that includes the element.

It will be appreciated that embodiments of the electronic system 101,400 described herein may be comprised of one or more conventionalprocessors and unique stored program instructions that control theprocessor(s) to implement, in conjunction with certain non-processorcircuits, some, most, or all of the functions of the electronic system101, 400 and its operational methods as described herein. Thenon-processor circuits may include, but are not limited to, storagedevices (such as memories 105, 407, 408), touch sensors 107, the display109, the user interface 111, the user feedback mechanism 410, modems117, antenna systems 119, and hardware portions of the processingsubsystem 103, as well as filters, clock circuits, and various othernon-processor circuits. As such, the functions of the processor andnon-processor circuits may be collectively interpreted as steps of amethod for authenticating access to a multi-level secure environment ofan electronic system. Alternatively, some or all functions could beimplemented by a state machine that has no stored program instructions,or in one or more application specific integrated circuits (ASICs), inwhich each function or some combinations of certain of the functions areimplemented as custom logic. Of course, a combination of the variousapproaches could be used. Thus, methods and means for these functionshave been generally described herein. Further, it is expected that oneof ordinary skill, notwithstanding possibly significant effort and manydesign choices motivated by, for example, available time, currenttechnology, and economic considerations, when guided by the concepts andprinciples disclosed herein will be readily capable of generating suchsoftware instructions or programs and integrated circuits without undueexperimentation.

In the foregoing specification, specific embodiments have beendescribed. However, one of ordinary skill in the art will appreciatethat various modifications and changes can be made without departingfrom the scope of the appended claims. Accordingly, the specificationand figures are to be regarded in an illustrative rather than arestrictive sense, and all such modifications are intended to beincluded within the scope of the appended claims. The benefits,advantages, solutions to problems, and any element(s) that may cause anybenefit, advantage, or solution to occur or become more pronounced arenot to be construed as critical, required, or essential features orelements of any or all the claims. The invention is defined solely bythe appended claims and all equivalents of those claims as issued.

What is claimed is:
 1. A method comprising: storing, by an electronicsystem that provides a multi-level secure environment, fingerprint datato produce stored fingerprint data for an authorized user of theelectronic system; receiving, by the electronic system, sensedfingerprint data that is associated with a plurality of fingerprints ofa user; comparing, by the electronic system, the sensed fingerprint datato the stored fingerprint data; responsive to determining that one ormore fingerprints of the sensed fingerprint data matches one or morecorresponding fingerprints of the stored fingerprint data for theauthorized user, determining, by the electronic system and based on acontext associated with the electronic system, a security level from aplurality of security levels that each corresponds to a particularamount of functionality of the electronic system to which the user maybe provided access within the multi-level secure environment, whereinthe context associated with the electronic system comprises at least oneinternal or environmental condition in which the electronic systemoperates; providing, by the electronic system, audible or hapticfeedback indicative of the security level; determining, by theelectronic system and based on the security level, a correspondingamount of functionality of the electronic system to which the user isprovided access; and providing, by the electronic system, access to thecorresponding amount of functionality of the electronic system at thesecurity level.
 2. The method of claim 1, wherein the security levelcomprises a first security level, and wherein the method furthercomprises: after providing the audible or haptic feedback indicative ofthe first security level, receiving, by the electronic system,additional sensed fingerprint data that is associated with one or moreadditional fingers of the user; comparing, by the electronic system, theadditional sensed fingerprint data to the stored fingerprint data;responsive to determining that one or more fingerprints of theadditional sensed fingerprint data matches one or more additionalcorresponding fingerprints of the stored fingerprint data for theauthorized user, determining, by the electronic system and based on aquantity of additional matching fingerprints, a second security levelfrom the plurality of security levels; providing, by the electronicsystem, audible or haptic feedback indicative of the second securitylevel; and providing, by the electronic system, access to functionalityat the second security level.
 3. The method of claim 2, wherein thesecond security level is higher than the first security level, andwherein providing access to functionality at the second security levelcomprising providing additional functionality at the second securitylevel relative to the first security level.
 4. The method of claim 2,wherein receiving the additional sensed fingerprint data that isassociated with the one or more additional fingers of the user isperformed by the electronic system responsive to determining that aperiod of time allotted for fingerprint sensing has not expired.
 5. Themethod of claim 1, further comprising: determining, by the electronicsystem, at least one finger type of the one or more matchingfingerprints of the sensed fingerprint data, wherein determining thesecurity level from the plurality of security levels is further based onthe at least one finger type.
 6. The method of claim 1, wherein theplurality of fingerprints of the user associated with the sensedfingerprint data are sensed contemporaneously by the electronic system.7. The method of claim 1, wherein providing access to functionality atthe determined security level comprises outputting, by the electronicsystem and for display, information associated with at least one of asoftware application or a data file accessible to the user based on thedetermined security level.
 8. The method of claim 1, wherein the contextassociated with the electronic system comprises one or more of alocation of the electronic system, a current time of day, a currentdate, a speed of travel of the electronic system, a direction of travelof the electronic system, an elevation or altitude of the electronicsystem, calendar events of the user, or currently active softwareapplications executed by the electronic system.
 9. The method of claim1, further comprising: determining, by the electronic system, whetherthe user is operating the electronic system with one hand or both handsof the user, wherein determining the security level is further based onwhether the user is operating the electronic system with one hand orboth hands of the user.
 10. An electronic system, comprising: at leastone processor; at least one sensor; and a memory configured to storeinstructions that are executable by the at least one processor to: storefingerprint data to produce stored fingerprint data for an authorizeduser of the electronic system; receive sensed fingerprint dataresponsive to the at least sensor sensing a plurality of fingers of auser, wherein the sensed fingerprint data is associated with a pluralityof fingerprints that correspond to the plurality of fingers of the user;compare the sensed fingerprint data to the stored fingerprint data;responsive to determining that one or more fingerprints of the sensedfingerprint data matches one or more corresponding fingerprints of thestored fingerprint data for the authorized user, determine, based on acontext associated with the electronic system, a security level from aplurality of security levels that each corresponds to a particularamount of functionality of the electronic system to which the user maybe provided access within the multi-level secure environment, whereinthe context associated with the electronic system comprises at least oneinternal or environmental condition in which the electronic systemoperates; provide audible or haptic feedback indicative of the securitylevel; determine, based on the security level, a corresponding amount offunctionality of the electronic system to which the user is providedaccess; and provide access to the corresponding amount of functionalityof the electronic system at the security level.
 11. The electronicsystem of claim 10, wherein the security level comprises a firstsecurity level, and wherein the instructions stored by the memory arefurther executable by the at least one processor to: after providing theaudible or haptic feedback indicative of the first security level,receive additional sensed fingerprint data that is associated with oneor more additional fingers of the user; compare the additional sensedfingerprint data to the stored fingerprint data; responsive todetermining that one or more fingerprints of the additional sensedfingerprint data matches one or more additional correspondingfingerprints of the stored fingerprint data for the authorized user,determine, based on a quantity of additional matching fingerprints, asecond security level from the plurality of security levels; provideaudible or haptic feedback indicative of the second security level; andprovide access to functionality at the second security level.
 12. Theelectronic system of claim 11, wherein the second security level ishigher than the first security level, and wherein the instructionsstored by the memory that are executable by the at least one processorto provide access to functionality at the second security level arefurther executable by the at least one processor to provide additionalfunctionality at the second security level relative to the firstsecurity level.
 13. The electronic system of claim 11, wherein theinstructions stored by the memory are executable by the at least oneprocessor to receive the additional sensed fingerprint data that isassociated with the one or more additional fingers of the userresponsive to determining that a period of time allotted for fingerprintsensing has not expired.
 14. The electronic system of claim 10, whereinthe instructions stored by the memory are executable by the at least oneprocessor to determine the security level from the plurality of securitylevels further based on at least one finger type of the one or morematching fingerprints of the sensed fingerprint data.
 15. The electronicsystem of claim 10, wherein the instructions stored by the memory thatare executable by the at least one processor to provide access tofunctionality at the determined security level are further executable bythe at least one processor to output, for display, informationassociated with at least one of a software application or a data fileaccessible to the user based on the determined security level.
 16. Theelectronic system of claim 10, wherein the instructions are furtherexecutable by the at least one processor to: determine whether the useris operating the electronic system with one hand or both hands of theuser, wherein the instructions are executable by the at least oneprocessor to determine the security level further based on whether theuser is operating the electronic system with one hand or both hands ofthe user.
 17. A method comprising: storing, by an electronic system thatprovides a multi-level secure environment, fingerprint data to producestored fingerprint data for an authorized user of the electronic system;receiving, by the electronic system, sensed fingerprint data that isassociated with a plurality of fingerprints of a user; comparing, by theelectronic system, the sensed fingerprint data to the stored fingerprintdata; responsive to determining that one or more fingerprints of thesensed fingerprint data matches one or more corresponding fingerprintsof the stored fingerprint data for the authorized user, determining, bythe electronic system and based on one or more finger types of the oneor more matching fingerprints of the sensed fingerprint data, andfurther based on a context associated with the electronic system, asecurity level from a plurality of security levels that each correspondsto a particular amount of functionality of the electronic system towhich the user may be provided access within the multi-level secureenvironment, wherein each of the plurality of security levels isassociated with a respective finger type, and wherein the contextassociated with the electronic system comprises at least one internal orenvironmental condition in which the electronic system operates;providing, by the electronic system, audible or haptic feedbackindicative of the security level; determining, by the electronic systemand based on the security level, a corresponding amount of functionalityof the electronic system to which the user is provided access; andproviding, by the electronic system, access to the corresponding amountof functionality of the electronic system at the security level.
 18. Themethod of claim 17, wherein determining the security level from theplurality of security levels comprises determining a first securitylevel, and wherein the method further comprises: after providing theaudible or haptic feedback indicative of the first security level,receiving, by the electronic system, additional sensed fingerprint datathat is associated with one or more additional fingers of the user;comparing, by the electronic system, the additional sensed fingerprintdata to the stored fingerprint data; responsive to determining that oneor more fingerprints of the additional sensed fingerprint data matchesone or more additional corresponding fingerprints of the storedfingerprint data for the authorized user, determining, by the electronicsystem and based one or more additional finger types of the one or morematching fingerprints of the additional sensed fingerprint data, asecond security level from the plurality of security levels; providing,by the electronic system, audible or haptic feedback indicative of thesecond security level; and providing, by the electronic system, accessto functionality at the second security level.
 19. The method of claim18, wherein the second security level is higher than the first securitylevel, and wherein providing access to functionality at the secondsecurity level comprising providing additional functionality at thesecond security level relative to the first security level.
 20. Themethod of claim 18, wherein receiving the additional sensed fingerprintdata that is associated with the one or more additional fingers of theuser is performed by the electronic system responsive to determiningthat a period of time allotted for fingerprint sensing has not expired.21. The method of claim 17, further comprising: determining, by theelectronic system, whether the user is operating the electronic systemwith one hand or both hands of the user, wherein determining thesecurity level is further based on whether the user is operating theelectronic system with one hand or both hands of the user.