Pressure-sensitive authentication

ABSTRACT

In one or more embodiments described herein, device, computer-implemented methods, and/or computer program products that facilitate biometric authentication. According to an embodiment, a device can comprise a memory that stores computer executable components and a processor that executes the computer executable components. The computer executable components can comprise a sensor component comprising one or more pressure sensors and that measures pressure. The computer executable components can further comprise a pressure processing component that determines a first pressure sequence employed to authenticate the device, wherein the first pressure sequence is determined based on a pressure applied at the one or more pressure sensors. The computer executable components can further comprise an authentication component that authenticates the first pressure sequence by determining that the first pressure sequence matches an authentication pressure sequence.

BACKGROUND

The subject disclosure relates generally to authentication, and moreparticularly, pressure-sensitive authentication systems,computer-implemented methods and computer program products.

SUMMARY

The following presents a summary to provide a basic understanding of oneor more embodiments of the invention. This summary is not intended toidentify key or critical elements or delineate any scope of theparticular embodiments or any scope of the claims. Its sole purpose isto present concepts in a simplified form as a prelude to the moredetailed description that is presented later. In one or more embodimentsdescribed herein, systems, computer-implemented methods, and/or computerprogram products that facilitate the pressure-sensitive authenticationsystem.

According to an embodiment, a device can comprise a memory that storescomputer executable components and a processor that executes thecomputer executable components stored in the memory. The computerexecutable components can comprise a sensor component comprising one ormore pressure sensors that measure a pressure. The computer executablecomponents can further comprise a pressure processing component thatdetermines a first pressure sequence employed to authenticate thedevice, where the first pressure sequence is determined based on apressure applied at the one or more pressure sensors. The computerexecutable components can further comprise an authentication componentthat authenticates the first pressure sequence by determining that thefirst pressure sequence matches an authentication pressure sequence.

According to another embodiment, a computer-implemented method cancomprise measuring, by a sensor component having one or more pressuresensors and operatively coupled to a processor, a pressure. Thecomputer-implemented method can further comprise determining, by apressure processing component operatively coupled to the processor, afirst pressure sequence employed to authenticate a device, where thefirst pressure sequence is determined based on the pressure applied atthe one or more pressure sensors. The computer-implemented method canfurther comprise authenticating, by an authentication componentoperatively coupled to the processor, the first pressure sequence bydetermining that the first pressure sequence matches an authenticationpressure sequence.

According to another embodiment, a computer program product forauthenticating a device by measuring pressure applied on the device, thecomputer program product comprising a computer readable storage mediumhaving program instructions embodied therewith, the program instructionsexecutable by a processor to cause the processor to measure pressure, bythe processor, employing one or more pressure sensors; determine, by theprocessor, a first pressure sequence employed to authenticate thedevice, where the first pressure sequence is determined based on thepressure applied at the sensor component; and authenticate, by theprocessor, the first pressure sequence by determining that the firstpressure sequence matches an authentication pressure sequence.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1A illustrates an example, non-limiting a pressure-sensitive devicein accordance with one or more embodiments described herein.

FIG. 1B illustrates an example, non-limiting top view of a sensorsubstrate in accordance with one or more embodiments described herein.

FIG. 2A illustrates an example, non-limiting cross-sectional view of asensor module in accordance with one or more embodiments describedherein.

FIG. 2B illustrates an example, non-limiting cross-sectional view of asensor module in accordance with one or more embodiments describedherein.

FIG. 2C illustrates an example, non-limiting cross-sectional view of asensor module in accordance with one or more embodiments describedherein.

FIG. 2D illustrates an example, non-limiting cross-sectional view of asensor module in accordance with one or more embodiments describedherein.

FIG. 3 illustrates a block diagram of an example, non-limiting systemthat facilitates pressure-sensitive authentication components inaccordance with one or more embodiments described herein.

FIG. 4 illustrates a block diagram of an example, non-limiting systemthat facilitates of the biometrics authentication system components inaccordance with one or more embodiments described herein.

FIG. 5 illustrates a block diagram of an example, non-limiting systemthat facilitates of the biometrics authentication system components inaccordance with one or more embodiments described herein.

FIG. 6 depicts a diagram of an example, non-limiting computerimplemented method that facilitates using the biometrics authenticationsystem accordance with one or more embodiments describe herein.

FIG. 7 depicts a diagram of an example, non-limiting computerimplemented method that facilitates using the biometrics authenticationsystem accordance with one or more embodiments describe herein.

FIG. 8 depicts a diagram of an example, non-limiting computerimplemented method that facilitates using the biometrics authenticationsystem accordance with one or more embodiments describe herein.

FIG. 9 illustrates a block diagram of an example, non-limiting operatingenvironment in which one or more embodiments described herein can befacilitated.

DETAILED DESCRIPTION

The following detailed description is merely illustrative and is notintended to limit embodiments and/or applications or uses ofembodiments. Furthermore, there is no intention to be bound by anyexpressed or implied information presented in the preceding Summarysection, or in the Detailed Description section.

A pressure-sensitive authentication system is described herein thatprovides authentication via a pressure password (e.g., a sequence ofpresses and/or squeezes applied by an entity). For example, a device,such as a universal bus serial (USB), can be employed to provideauthentication via pressure password. The pressure password can be aprimary security measure or as a secondary security measure (e.g., fortwo password system). In some embodiments, using the pressure passwordas secondary security measure can provide increase confidence level forprotecting data on the device or other systems connected to the device.The biometrics pressure-sensitive authentication system according tosome embodiments described herein can allow for more complexauthentications. For example, the access to data can differentiate whenthe USB is plugged into a computer, memory or electronic device (e.g.,pressure password provided while entity connected to a computer) versuswhen the USB is not plugged into any device (e.g., pressure passwordprovided while entity holding the device in hand).

One or more embodiments are now described with reference to thedrawings, wherein like referenced numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea more thorough understanding of the one or more embodiments. It isevident; however, in various cases, that the one or more embodiments canbe practiced without these specific details.

FIG. 1A illustrates an example, non-limiting a pressure-sensitiveauthentication system 100 in accordance with one or more embodimentsdescribed herein. Repetitive description of like elements employed inrespective embodiments is omitted for sake of brevity. According to someembodiments, a pressure-sensitive authentication system 100 can comprisea pressure-sensitive device 102 (e.g., USB) that can be held orcontrolled by an entity 120 (also referred to as “user”). As usedherein, the entity can be a machine, human, animal or otherwise. Thepressure-sensitive device 102 can be constructed to allow the entity 120to apply pressure while holding the pressure-sensitive device 102. Insome embodiments, the pressure-sensitive device 102 comprises aconnector 104, a sensor module 106 and storage module 114. In someembodiments, a storage module 114 can comprise one or more hardwarecomponents (not shown), for example, but not limited to, flash memory,transistors, resistors and/or processor formed on a substrate to performfunctions of adding, securing, accessing, and/or removing data. In someembodiments, the pressure-sensitive device 102 can include components toconnect to various electronic devices (e.g., a computer or server, notshown for sake of brevity) through the connector 104.

In some embodiments, the sensor module 106 can be electrically and/orwirelessly coupled to the storage module 114. In some embodiments, asensor module 106 can comprise a sensor substrate 108 (described below)that facilitates the operations of the biometrics authentication system302 (FIG. 3 discussed below). The sensor substrate 108 can be embeddedinside the sensor module 106. In some embodiments, the sensor module 106can comprise the storage module 114 by way of incorporating componentsof the storage module 114.

FIG. 1B illustrates an example, non-limiting top view of the sensorsubstrate 108 in accordance with one or more embodiments describedherein. Repetitive description of like elements employed in respectiveembodiments is omitted for sake of brevity. According to someembodiments, the sensor substrate 108 can, for example, comprise one ormore sensors (e.g., an array of sensors). As depicted, in someembodiments, the sensor substrate 108 can comprise one or more touchsensors 110 and pressure sensors 112. As described below, the touchsensors 110 and pressure sensors 112 can provide electronic signals tothe biometrics authentication system 302 (FIG. 3) when actuated. In someembodiments, the one or more pressure sensors 112 can be an electricalcontact, wherein the pressure sensors 112 is actuated when pressure isdetected and/or connects with an electrical conductive surface(discussed in FIGS. 2A-D).

FIG. 2A illustrates an example, non-limiting cross-sectional view of thesensor module 106 in accordance with one or more embodiments describedherein. Repetitive description of like elements employed in respectiveembodiments is omitted for sake of brevity. According to someembodiments, the sensor module 106 can be constructed by employing afirst flexible substrate 202, one or more spacers 206 to form a firstgap 214 between the first flexible substrate 202 and the sensorsubstrate 108. The first flexible substrate 202 can be constructed witha first electrically conductive surface 210 (e.g., patterned withelectrical wires). In some embodiments, the sensor module 106 can befurther constructed employing a second flexible substrate 204, and oneor more spacers 208 to form a second gap 216 between the sensorsubstrate 108 and the second flexible substrate 204. The second flexiblesubstrate 204 can be constructed with a second electrically conductivesurface 212 (e.g., patterned with electrical wires). As depicted, forexample, the sensor module 106 is in idle state.

FIG. 2B illustrates an example, non-limiting cross-sectional view of thesensor module 106 in accordance with one or more embodiments describedherein. Repetitive description of like elements employed in respectiveembodiments is omitted for sake of brevity. According to someembodiments, when pressure is applied (e.g., by user/entity applyingpressure on a side (e.g., a top side, in one example embodiment,although other sides are also possible) of the pressure-sensitive device102, illustrated by arrows), to the first flexible substrate 202, thefirst flexible substrate 202 can bend downward. When the first flexiblesubstrate 202 bends downward, the first flexible substrate 202 actuates(e.g., the first electrically conductive surface 210 comes into contactwith one or more pressure sensors 112) one or more pressure sensors 112formed on the sensor substrate 108 at 220. In some embodiments,intensity level can be measured by determining a number of pressuresensors 112 that are actuated by the press. For example, the biometricsauthentication system 302 determines pressure application value based onnumber of pressure sensors 112 that are actuated.

FIG. 2C illustrates an example, non-limiting cross-sectional view of thesensor module 106 in accordance with one or more embodiments describedherein. Repetitive description of like elements employed in respectiveembodiments is omitted for sake of brevity. According to someembodiments, the pressure sensors 112 can be formed on both sides of thesensor substrate 108. In some embodiments, when pressure is applied(e.g., user/entity applying pressure from the bottom side of thepressure-sensitive device 102, illustrated by arrows) to the secondflexible substrate 204, the second flexible substrate 204 bends upwardand actuates (e.g., the second electrically conductive surface 212 comesinto contact with one or more pressure sensors 112) one or more pressuresensors 112 formed on the sensor substrate 108 at 230. In someembodiments, intensity level can be measured by determining a number ofpressure sensors 112 that are actuated by the press.

FIG. 2D illustrates an example, non-limiting cross-sectional view of thesensor module 106 in accordance with one or more embodiments describedherein. Repetitive description of like elements employed in respectiveembodiments is omitted for sake of brevity. According to someembodiments, the pressure sensors 112 can be formed on both sides of thesensor substrate 108. For example, user can apply pressure on both sides(e.g., squeezing the pressure-sensitive device 102 as illustrated byarrows). In such a case, the first flexible substrate 202 and the secondflexible substrate 204 bend and actuate one or more pressure sensors 112at 240. In some embodiments, an intensity level can be measured bydetermining a number of pressure sensors 112 that are actuated by boththe first flexible substrate 202 and the second flexible substrate 204.

It should be appreciated that it is not critical which type of pressuresensor is employed as long as the sensor is capable of coupling withcomponent the biometrics authentication system 302 to facilitate thefunctions described herein. For example, the sensor module 106 can beconstructed using various techniques, for example, but not limited to,micro plates having electrodes to in indicate connection base onapplication of pressure, or off-the-shelf pressure sensors that arecapable of electrically coupling with components the biometricsauthentication system 302. In some embodiments, the first flexiblesubstrate 202 and second flexible substrate 204 can be constructedemploying a piezoresistive material to detect a press or squeeze of thepressure-sensitive device 102. The piezoresistive substrate can detect achange in electrical resistivity of a semiconductor or metal when strainis applied.

FIG. 3 illustrates a block diagram of an example, non-limiting system300 that facilitates pressure-sensitive authentication components inaccordance with one or more embodiments described herein. Repetitivedescription of like elements employed in respective embodiments isomitted for sake of brevity. According to some embodiments, the system300 can comprise a biometrics authentication system 302 accordance withone or more embodiments described herein. In some embodiments, thebiometrics authentication system 302 can also include or otherwise beassociated with a memory 304, a controller component 306 (also referredto as a “processor”) that executes computer executable components storedin a memory 304. The biometrics authentication system 302 can furtherinclude a system bus 308 that can couple various components including,but not limited to, a sensor component 310, a pressure processingcomponent 312, an authentication component 314, and a wireless component316.

Aspects of systems (e.g., the biometrics authentication system 302 andthe like), apparatuses, or processes explained in this disclosure canconstitute machine-executable component(s) embodied within machine(s),e.g., embodied in one or more computer readable mediums (or media)associated with one or more machines. Such component(s), when executedby the one or more machines, e.g., computer(s), computing device(s),virtual machine(s), etc. can cause the machine(s) to perform theoperations described.

It should be appreciated that the embodiments of the subject disclosuredepicted in various figures disclosed herein are for illustration only,and as such, the architecture of such embodiments are not limited to thesystems, devices, and/or components depicted therein. For example, insome embodiments, the biometrics authentication system 302 and theauthentication component 314 can comprise various computer and/orcomputing-based elements described herein with reference to operatingenvironment 900 and FIG. 9. In several embodiments, such computer and/orcomputing-based elements can be used in connection with implementing oneor more of the systems, devices, and/or components shown and describedin connection with FIG. 3 or other figures disclosed herein.

According to several embodiments, the memory 304 can store one or morecomputer and/or machine readable, writable, and/or executable componentsand/or instructions that, when executed by the controller component 306,can facilitate performance of operations defined by the executablecomponent(s) and/or instruction(s). For example, the memory 304 canstore computer and/or machine readable, writable, and/or executablecomponents and/or instructions that, when executed by the controllercomponent 306, can facilitate execution of the various functionsdescribed herein relating to the authentication component 314, thesensor component 310, and/or the wireless component 316.

In several embodiments, the memory 304 can comprise volatile memory(e.g., random access memory (RAM), static RAM (SRAM), dynamic RAM(DRAM), etc.) and/or non-volatile memory (e.g., read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable programmable ROM (EEPROM), etc.) that can employone or more memory architectures. Further examples of memory 304 aredescribed below with reference to system memory 916 and FIG. 9. Suchexamples of memory 304 can be employed to implement any embodiments ofthe subject disclosure. In some embodiments, content of the memory 304can be protected by various authentication system, including thebiometrics authentication system 302 described herein.

According to some embodiments, the controller component 306 can compriseone or more types of processors and/or electronic circuitry that canimplement one or more computer and/or machine readable, writable, and/orexecutable components and/or instructions that can be stored on thememory 304. For example, the controller component 306 can performvarious operations that can be specified by such computer and/or machinereadable, writable, and/or executable components and/or instructionsincluding, but not limited to, logic, control, input/output (I/O),arithmetic, and/or the like. In some embodiments, controller component306 can comprise one or more central processing unit, multi-coreprocessor, microprocessor, dual microprocessors, microcontroller, Systemon a Chip (SOC), array processor, vector processor, and/or another typeof processor.

In some embodiments, the components of biometrics authentication system302, for example, the controller component 306, the memory 304, thesensor component 310, the pressure processing component 312, theauthentication component 314, and/or the wireless component 316 can becommunicatively, electrically, and/or operatively coupled to one anothervia the bus 308 to perform functions of the biometrics authenticationsystem 302, and/or any components coupled therewith. In severalembodiments, the bus 308 can comprise one or more memory bus, memorycontroller, peripheral bus, external bus, local bus, and/or another typeof bus that can employ various bus architectures. Further examples ofthe bus 308 are described below with reference to a system bus 918 andFIG. 9. Such examples of the bus 308 can be employed to implement anyembodiments of the subject disclosure.

In several embodiments, a biometrics authentication system 302 cancomprise one or more computer and/or machine readable, writable, and/orexecutable components and/or instructions that, when executed by thecontroller component 306, can facilitate performance of operationsdefined by such component(s) and/or instruction(s). Further, in numerousembodiments, any component associated with the biometrics authenticationsystem 302, as described herein with or without reference to the variousfigures of the subject disclosure, can comprise one or more computerand/or machine readable, writable, and/or executable components and/orinstructions that, when executed by the controller component 306, canfacilitate performance of operations defined by such component(s) and/orinstruction(s). For example, the authentication component 314, and/orany other components associated with the biometrics authenticationsystem 302 (e.g., communicatively, electronically, and/or operativelycoupled with and/or employed by biometrics authentication system 302),can comprise such computer and/or machine readable, writable, and/orexecutable component(s) and/or instruction(s). Consequently, accordingto numerous embodiments, the biometrics authentication system 302 and/orany components associated therewith, can employ the controller component306 to execute such computer and/or machine readable, writable, and/orexecutable component(s) and/or instruction(s) to facilitate performanceof one or more operations described herein with reference to thebiometrics authentication system 302 and/or any such componentsassociated therewith.

In some embodiments, the biometrics authentication system 302 canfacilitate performance of operations related to and/or executed by thecomponents of biometrics authentication system 302 (e.g., the controllercomponent 306, the memory 304, the sensor component 310, the pressureprocessing component 312, the authentication component 314, and/or thewireless component 316). For example, as described in detail below, thebiometrics authentication system 302 can facilitate: measuring, (e.g.,by the sensor component 310), pressure by employing one or more pressuresensors (e.g., 112); determining, (e.g., by pressure processingcomponent 312), a first pressure sequence employed to authenticate adevice, wherein the first pressure sequence is determined based on thepressure applied at the one or more pressure sensors; andauthenticating, (e.g., by an authentication component 314) the firstpressure sequence by determining that the first pressure sequencematches an authentication pressure sequence.

In some embodiments, the sensor component 310 can comprise, but may notbe limited to, one or more touch sensors 110 and/or one or more pressuresensors 112. In some embodiments, the sensor component 310 can measurepressure by employing one or more pressure sensors (e.g., 112). Forexample, an entity (e.g., human and/or user), can hold thepressure-sensitive device 102 and apply pressure (e.g., presses and/orsqueezes the pressure-sensitive device 102) which is detected by thepressure sensors 112. The sensor component 310, employing the pressuresensors 112, can measure intensity of the applied press, frequency ofpresses and/or time of each presses. The pressure sensors 112 of thesensor component 310 can be coupled to the other components of thebiometrics authentication system 302, and can communicate the pressurereadings (e.g., pressure measurements) to the coupled components forfurther processing. It should be known that any suitable pressuresensing device that can measure pressure and can communicate thepressure measurements, for example, the one or more pressure sensors 112(described in FIGS. 1B and 2A-D), can be employed for sensing pressurein accordance with some embodiments described herein.

In some embodiments, the pressure processing component 312 can compriseone or more processors, memory, and electrical circuitry. In someembodiments, the pressure processing component 312 can determines afirst pressure sequence (e.g. a series of presses, squeezes, pauses,etc., further described below) used to authenticate thepressure-sensitive device 102. The first pressure sequence, for example,can be determined, but not limited to, based on the pressure applied atthe one or more pressure sensors 112. In some embodiments, the firstpressure sequence can be a sequence made from measuring number ofpresses made by the entity, time of each press, intensity of the press(e.g., level of squeeze), and time between presses (e.g., pause betweenpresses). For example, when an entity, squeezes the pressure-sensitivedevice 102 three times, pauses for one second and squeezes thepressure-sensitive device 102 for three seconds, the pressure processingcomponent 312 determines pressure sequence as “3-press-pause-long press”sequence. In some embodiments, the pressure sequence can comprise afirst pressure application value (e.g. number of presses and/or pauses,intensity value of each press), and a first pressure applicationduration value (e.g., time value for length of time each press wasapplied). For example, the pressure sequence can be a computer-generateddata structure and/or a data table comprising occurrence of each pressand associated intensity and time values. For example, a series of“press-press-press,” each press less than a second, can be translated toa pressure sequence “3-0” (e.g., the first pressure application valueequals 3 and first pressure duration value equals 0).

In some embodiments, the pressure sequence can be any combination ofpressures (e.g., presses), taps, pauses and/or extended squeezes. In anembodiment, for example, a first portion of the pressure sequence can beapplied while the pressure-sensitive device 102 is unplugged (e.g., partof the pressure sequence applied while the user is holding thepressure-sensitive device 102 in their hand prior to plugging in thepressure-sensitive device 102 to a computer). A second of portion of thepressure sequence can be applied after the pressure-sensitive device 102is plugged into the computer. Thus, in accordance with the embodiment,the pressure sequence can be in two stages, a first stage can be whilethe pressure-sensitive device 102 is unplugged and a second stage can bewhile the pressure-sensitive device 102 is plugged. In an embodiment,the pressure processing component 312 can determine the first portion ofthe pressure sequence (e.g., the first stage) and the one or morecomponents of the computer (not shown) can determine the second portionof the pressure sequence (e.g., the second stage). In an embodiment, thepressure processing component 312 can determine both the first portionof the pressure sequence (e.g., the first stage) and the second portionof the pressure sequence (e.g., the second stage after plugging in to acomputer). The advantage of determining the entire pressure sequence(e.g., first and second portions) is that processing only needs to beperform by one device.

In some embodiments, the pressure sequence is composed of one or morevalues, for example but not limited to, a pressure strength value (e.g.,amount of pressure applied), a pressure application rate value (e.g.,how fast the presses were applied), a pressure application durationvalue (e.g., how long the pressure was applied), a frequency of pressureapplication value (e.g., how many times the pressure was applied), aconnection status value (e.g., plugged or unplugged), and an actuationinstrument value (e.g., how many fingers used to apply the pressure).

In some embodiments, the authentication component 314, can comprise oneor more processors, memory, and electrical circuitry. In someembodiments, the authentication component 314 can authenticate the firstpressure sequence by determining that the first pressure sequencematches an authentication pressure sequence (e.g., user providedpassword in a form of a pressure sequence). In some embodiments, duringsecuring phase of data stored on the pressure-sensitive device 102 or onthe computer, one or more authentication sequences are stored in memory.For example, when certain data or region of the file system needs to berestricted, a security password is first provided and stored, forexample, in memory of device and/or computer. In an embodiment, thepassword can be a pressure sequence (e.g., authentication pressuresequence). For example, in order to access the data, the prestoredauthentication pressure sequence must be matched. In an embodiment,authentication pressure sequence can be a secondary authentication. Forexample, the data can be protected with employing various biometricinput for each stage of security. For example, first stageauthentication can be via retina scan, voice recognition, finger print,and/or alphanumerical password. The second stage authentication can bevia biometrics authentication system 302 as disclosed herein.

In some embodiments, artificial intelligence functions can be employedby the authentication component 314 to perform match functions (e.g.,comparing the pressure sequence against the predefined authenticationpressure sequence). In some embodiments, authentication component 314can receive a pressure sequence, for example, upon sensor component 310detecting if there was pressure applied (e.g., at least one of thepressure sensor 112 was actuated). If the pressure sequence is receivedat the moment authentication is required, the authentication component314 can attempt to verify the pressure sequence. Otherwise, the pressuresequence is ignored as being accidental press. The authenticationcomponent 314 can keep track of the accidental presses to better predictwhen authentication is required.

In some embodiments, the biometrics authentication system 302 cancomprise a wireless component 316 to transmit pressure sequences forauthentication by an external or secondary device. For example, once thepressure processing component 312 determines the pressure sequence, thepressure sequence is transmitted to an external device using wirelesstechnology (discussed below). Thereafter, the external device canauthenticate and transmit a grant access message to thepressure-sensitive device 102.

In some embodiments, if the pressure sequence fails to match, theauthentication component 314 can notify one or more components of thebiometrics authentication system 302. In an embodiment, as discussedbelow, although pressure sequence failed to match, access can be grantedto unsecured data. In some embodiments, the user can be offeredalternative methods authentication if the pressure sequence continues tofail. For example, after three attempts, the user will be required toprovide different source of authentication.

In some embodiments, the wireless component 316 can be wirelessprocessor that can interface with one or more sensor devices and thecontroller component 306. According to some embodiments, the wirelesscomponent 316 can include one or more wireless networks, including, butnot limited to, a cellular network, a wide area network (WAN) (e.g., theInternet access through wireless technology) or a local area network(LAN). For example, wireless component 316 can comprise wirelesstechnology including, but not limited to: wireless fidelity (Wi-Fi),global system for mobile communications (GSM), universal mobiletelecommunications system (UMTS), worldwide interoperability formicrowave access (WiMAX), enhanced general packet radio service(enhanced GPRS), third generation partnership project (3GPP) long termevolution (LTE), third generation partnership project 3 (3GPP2) ultramobile broadband (UMB), high speed packet access (HSPA), Zigbee andother 802.XX wireless technologies and/or legacy telecommunicationtechnologies, BLUETOOTH®, Session Initiation Protocol (SIP), ZIGBEE®,RF4CE protocol, WirelessHART protocol, 6LoWPAN (IPv6 over Low powerWireless Area Networks), Z-Wave, an ANT, an ultra-wideband (UWB)standard protocol, and/or other proprietary and non-proprietarycommunication protocols. In some embodiments, the wireless component 316can comprise a transmitter and a receiver for infrared, near-fieldcommunication-NFC, Bluetooth, or any suitable wireless communicationprotocol.

FIG. 4 illustrates a block diagram of an example, non-limiting system400 that facilitates of the biometrics authentication system 302components in accordance with one or more embodiments described herein.Repetitive description of like elements employed in respectiveembodiments is omitted for sake of brevity. According to severalembodiments, the system 400 can comprise biometrics authenticationsystem 302. In some embodiments, biometrics authentication system 302can further comprise an access component 408.

In several embodiments, an access component 408 can grant access toprotected data stored in the memory if pressure sequence isauthenticated. For example, the access component 408 can grant access toprotected data stored in memory (e.g., employing a file system) of thepressure-sensitive device 102 or the computer and/or server thatconnected to the pressure-sensitive device 102. Depending on methodemployed securing the file system, various levels of access can begranted. In some embodiments, the memory 304 comprises one or morepartitions (e.g., data is stored in certain parts of memory havingdifferent levels of security and authentication and/or one or moreregions on a hard disk or other secondary internal/external storage) forstoring data. In some embodiments, the access component 408 can grantaccess to data from one or more partition of the memory 304 based on adetermination that the first pressure sequence is authenticated foraccess to the one more partition of the memory 304. In some embodiments,although the authentication component 314 can have authenticated thepressure sequence, access may only be granted to a portion of filesystem. For example, for additional security, certain data can beprotected with additional authentication (e.g., additional pressuresequences or biometric verification). In some embodiments, the accesscomponent 408 can grant access to unprotected file system if theauthentication fails. For example, the pressure sequence did not matchthe authentication pressure sequence. In this case, access is grantedonly if other form of authentication is provided (e.g., biometric dataor alphamerical password). In some embodiments, the access component 408can communicate with external devices or evaluate prior failures beforegranting access if the pressure sequence failed to match. For example,if biometrics authentication system 302 detects that user pressed thepressure-sensitive device 102 one second longer than required.

In some embodiments, the memory 304 of the pressure sensitive device 102can be partitioned into one or more portions (e.g., parts), whereinsecured data may be stored in predefined parts of the memory 304. Insome embodiments, the one or more partitions of the memory 304 may besecured using a unique authentication sequence. The access component 408can grant access to secured partitions (e.g., part of the memoryrequiring authentication) of the memory 304 based on the type ofauthentication used for each portion. For example, data can bepartitioned into one or more portions and assigned a separate pressuresequence for authentication, wherein access can be granted to one ormore portions if the pressure sequence is authenticated. In someembodiments, different pressure sequence can be required for accessingone or more partitions of the memory 304.

In some embodiments, the access component 408 grants incremental access(e.g., access is granted incrementally after each successfulauthentication one or more security schemes) to one or more partitionsof the memory 304 or to a computing system (e.g., external computerand/or electronic device) in response to authenticating the firstpressure sequence. In some embodiments, the memory 304 or the computingsystem comprises one or more partitions wherein authentication of thefirst pressure sequence can grant access to one or more partitions afterone or more security screening have been authenticated. For example, thefirst pressure sequence is provided after alphanumeric password isprovided and authenticated. The advantage is that requiring a pressuresequence in addition to other authentication increases confidence levelfor the security of the data stored in the memory 304.

FIG. 5 illustrates a block diagram of an example, non-limiting system500 that facilitates of the biometrics authentication system 302components in accordance with one or more embodiments described herein.Repetitive description of like elements employed in respectiveembodiments is omitted for sake of brevity. According to severalembodiments, the system 500 can comprise biometrics authenticationsystem 302. In some embodiments, biometrics authentication system 302can further comprise grip pattern recognition component 508.

In some embodiments, the grip pattern recognition component 508 canrecognize a grip pattern of an entity by measuring the pressure appliedon the one or more pressure sensors. The grip pattern recognitioncomponent 508 can comprise the touch sensors 110 and pressure sensors112. In some embodiments, the touch sensors 110 and pressure sensors 112can be distributed on the outer layer (not shown) of thepressure-sensitive device 102. In an embodiment, when the biometricsauthentication system 302 detects that a user grabbed thepressure-sensitive device 102, both the touch sensors 110 and pressuresensors 112 can be actuated. In some embodiments, the pressure sequencecan be determined based on how the pressure-sensitive device 102 wasgrabbed/held in conjunction with application of pressure. Thereafter,authentication component 314 can authenticate or reject the pressuresequence.

In some embodiments, grip pattern recognition component 508, employingtouch sensors 110 and pressure sensors 112, can recognize variouspatterns. For example, but not limited to, a grip pattern, directions ofswipes, number of fingers used to generate the grip pattern. In someembodiments, access to one or more partitions of the memory 304 or to acomputing system is granted in response to authenticating the grippattern. In some embodiments, access to one or more partitions of thememory 304 or to a computing system is granted in response toauthenticating the grip pattern and direction of swipe. For example,after authenticating the grip pattern, access to a first partition ofmemory is granted if the grip pattern (e.g., swipe) was in firstdirection and access to a second partition of memory is granted if theswipe was in second direction.

FIG. 6 depicts a diagram of an example, non-limiting computerimplemented method that facilitates using the biometrics authenticationsystem 302 accordance with one or more embodiments describe herein.Repetitive description of like elements employed in other embodimentsdescribed herein is omitted for sake of brevity. In some examples, flowdiagram 600 can be implemented by operating environment 900 or 100described below. It can be appreciated that the operations of flowdiagram 600 can be implemented in a different order than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 912) is provided, the device or system comprising one ormore processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 6.As a non-limiting example, the one or more processors can facilitateperformance of the methods by directing or controlling one or moreequipment operable to perform semiconductor fabrication.

Operation 602 depicts measuring, by a sensor component 310 having one ormore pressure sensors 112 and operatively coupled to a processor 306, apressure. Operation 604 depicts determining, by a pressure processingcomponent 312 operatively coupled to the processor 306, a first pressuresequence employed to authenticate a device, wherein the first pressuresequence is determined based on pressure applied at the one or morepressure sensors 112. Operation 606 depicts determining if the firstpressure sequence matched an authentication pressure sequence. If firstpressure sequence matched the authentication sequence, then performoperation 606. Otherwise, continue monitoring. Operation 606 depictsauthenticating, by an authentication component 314 operatively coupledto the processor 306, the first pressure sequence by determining thatthe first pressure sequence matches an authentication pressure sequence.

FIG. 7 depicts a diagram of an example, non-limiting computerimplemented method that facilitates using the biometrics authenticationsystem 302 accordance with one or more embodiments describe herein.Repetitive description of like elements employed in other embodimentsdescribed herein is omitted for sake of brevity. In some examples, flowdiagram 700 can be implemented by operating environment 900 or 100described below. It can be appreciated that the operations of flowdiagram 700 can be implemented in a different order than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 912) is provided, the device or system comprising one ormore processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 7.As a non-limiting example, the one or more processors can facilitateperformance of the methods by directing or controlling one or moreequipment operable to perform semiconductor fabrication.

Operation 702 depicts measuring, by a sensor component 310 having one ormore pressure sensors 112 and operatively coupled to a processor 306, apressure. Operation 704 depicts determining, by a pressure processingcomponent 312 operatively coupled to the processor 306, a first pressuresequence employed to authenticate a device, wherein the first pressuresequence is determined based on pressure applied at the one or morepressure sensors 112. Operation 706 depicts determining if the firstpressure sequence matched an authentication pressure sequence. If firstpressure sequence matched the authentication sequence, then performoperation 706. Otherwise, continue monitoring. Operation 708 depictsauthenticating, by an authentication component 314 operatively coupledto the processor 306, the first pressure sequence by determining thatthe first pressure sequence matches an authentication pressure sequence.Operation 710 depicts granting access, an access component 316operatively coupled to a processor 306, to data from one or morepartitions of the memory 304 based on a determination that the firstpressure sequence is authenticated for access to the one morepartitions, wherein the first pressure sequence comprises a firstpressure application value and a first pressure application durationvalue.

FIG. 8 depicts a diagram of an example, non-limiting computerimplemented method that facilitates using the biometrics authenticationsystem 302 accordance with one or more embodiments describe herein.Repetitive description of like elements employed in other embodimentsdescribed herein is omitted for sake of brevity. In some examples, flowdiagram 800 can be implemented by operating environment 900 or 100described below. It can be appreciated that the operations of flowdiagram 800 can be implemented in a different order than is depicted.

In non-limiting example embodiments, a computing device (or system)(e.g., computer 912) is provided, the device or system comprising one ormore processors and one or more memories that stores executableinstructions that, when executed by the one or more processors, canfacilitate performance of the operations as described herein, includingthe non-limiting methods as illustrated in the flow diagrams of FIG. 8.As a non-limiting example, the one or more processors can facilitateperformance of the methods by directing or controlling one or moreequipment operable to perform semiconductor fabrication.

Operation 802 depicts measuring, by a sensor component 310 having one ormore pressure sensors 112 and operatively coupled to a processor 306, apressure. Operation 804 depicts determining, by a pressure processingcomponent 312 operatively coupled to the processor 306, a first pressuresequence employed to authenticate a device, wherein the first pressuresequence is determined based on pressure applied at the one or morepressure sensors 112. Operation 806 depicts determining if the firstpressure sequence matched an authentication pressure sequence. If firstpressure sequence matched the authentication sequence, then performoperation 806. Otherwise, continue monitoring. Operation 808 depictsauthenticating, by an authentication component 314 operatively coupledto the processor 306, the first pressure sequence by determining thatthe first pressure sequence matches an authentication pressure sequence.Operation 810 depicts recognizing, by a grip pattern recognitioncomponent 318 operatively coupled to a processor 306, a grip pattern ofan entity by detecting the pressure applied on the one or more pressuresensors.

To provide context for the various aspects of the disclosed subjectmatter, FIG. 9 as well as the following discussion are intended toprovide a general description of a suitable environment in which thevarious aspects of the disclosed subject matter can be implemented. FIG.9 illustrates a block diagram of an example, non-limiting operatingenvironment in which one or more embodiments described herein can befacilitated. Repetitive description of like elements employed in otherembodiments described herein is omitted for sake of brevity.

A suitable operating environment 900 for implementing various aspects ofthis disclosure can also include a computer 912. The computer 912 canalso include a processing unit 914, a system memory 916, and a systembus 918. The system bus 918 couples system components including, but notlimited to, the system memory 916 to the processing unit 914. Theprocessing unit 914 can be any of various available processors. Dualmicroprocessors and other multiprocessor architectures also can beemployed as the processing unit 914. The system bus 918 can be any ofseveral types of bus structure(s) including the memory bus or memorycontroller, a peripheral bus or external bus, and/or a local bus usingany variety of available bus architectures including, but not limitedto, Industrial Standard Architecture (ISA), Micro-Channel Architecture(MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESALocal Bus (VLB), Peripheral Component Interconnect (PCI), Card Bus,Universal Serial Bus (USB), Advanced Graphics Port (AGP), Firewire (IEEE994), and Small Computer Systems Interface (SCSI). The system memory 916can also include volatile memory 920 and nonvolatile memory 922. Thebasic input/output system (BIOS), containing the basic routines totransfer information between elements within the computer 912, such asduring start-up, is stored in nonvolatile memory 922. By way ofillustration, and not limitation, nonvolatile memory 922 can includeread only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable programmable ROM(EEPROM), flash memory, or nonvolatile random-access memory (RAM) (e.g.,ferroelectric RAM (FeRAM). Volatile memory 920 can also include randomaccess memory (RAM), which acts as external cache memory. By way ofillustration and not limitation, RAM is available in many forms such asstatic RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), doubledata rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM(SLDRAM), direct Rambus RAM (DRRAM), direct Rambus dynamic RAM (DRDRAM),and Rambus dynamic RAM.

Computer 912 can also include removable/non-removable,volatile/non-volatile computer storage media. FIG. 9 illustrates, forexample, a disk storage 924. Disk storage 924 can also include, but isnot limited to, devices like a magnetic disk drive, floppy disk drive,tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, ormemory stick. The disk storage 924 also can include storage mediaseparately or in combination with other storage media including, but notlimited to, an optical disk drive such as a compact disk ROM device(CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RWDrive) or a digital versatile disk ROM drive (DVD-ROM). To facilitateconnection of the disk storage 924 to the system bus 918, a removable ornon-removable interface is typically used, such as interface 926. FIG. 9also depicts software that acts as an intermediary between users and thebasic computer resources described in the suitable operating environment901. Such software can also include, for example, an operating system928. Operating system 928, which can be stored on disk storage 924, actsto control and allocate resources of the computer 912. Systemapplications 930 take advantage of the management of resources byoperating system 928 through program modules 932 and program data 934,e.g., stored either in system memory 916 or on disk storage 924. It isto be appreciated that this disclosure can be implemented with variousoperating systems or combinations of operating systems. A user enterscommands or information into the computer 912 through input device(s)936. Input devices 936 include, but are not limited to, a pointingdevice such as a mouse, trackball, stylus, touch pad, keyboard,microphone, joystick, game pad, satellite dish, scanner, TV tuner card,digital camera, digital video camera, web camera, and the like. Theseand other input devices connect to the processing unit 914 through thesystem bus 918 via interface port(s) 938. Interface port(s) 938 include,for example, a serial port, a parallel port, a game port, and auniversal serial bus (USB). Output device(s) 940 use some of the sametype of ports as input device(s) 936. Thus, for example, a USB port canbe used to provide input to computer 912, and to output information fromcomputer 912 to an output device 940. Output adapter 942 is provided toillustrate that there are some output devices 940 like monitors,speakers, and printers, among other output devices 940, which requirespecial adapters. The output adapters 942 include, by way ofillustration and not limitation, video and sound cards that provide ameans of connection between the output device 940 and the system bus918. It should be noted that other devices and/or systems of devicesprovide both input and output capabilities such as remote computer(s)944.

Computer 912 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)944. The remote computer(s) 944 can be a computer, a server, a router, anetwork PC, a workstation, a microprocessor-based appliance, a peerdevice or other common network node and the like, and typically can alsoinclude many or all the elements described relative to computer 912. Forpurposes of brevity, only a memory storage device 946 is illustratedwith remote computer(s) 944. Remote computer(s) 944 is logically coupledto computer 912 through a network interface 948 and then physicallycoupled via communication connection 950. Network interface 948encompasses wire and/or wireless communication networks such aslocal-area networks (LAN), wide-area networks (WAN), cellular networks,etc. LAN technologies include Fiber Distributed Data Interface (FDDI),Copper Distributed Data Interface (CDDI), Ethernet, Token Ring and thelike. WAN technologies include, but are not limited to, point-to-pointlinks, circuit switching networks like Integrated Services DigitalNetworks (ISDN) and variations thereon, packet switching networks, andDigital Subscriber Lines (DSL). Communication connection(s) 950 refersto the hardware/software employed to connect the network interface 948to the system bus 918. While communication connection 950 is shown forillustrative clarity inside computer 912, it can also be external tocomputer 912. The hardware/software for connection to the networkinterface 948 can also include, for exemplary purposes only, internaland external technologies such as, modems including regular telephonegrade modems, cable modems and DSL modems, ISDN adapters, and Ethernetcards.

Embodiments of the present innovation can be a system, a method, anapparatus and/or a computer program product at any possible technicaldetail level of integration. The computer program product can include acomputer readable storage medium (or media) having computer readableprogram instructions thereon for causing a processor to carry outaspects of the present innovation. The computer readable storage mediumcan be a tangible device that can retain and store instructions for useby an instruction execution device. The computer readable storage mediumcan be, for example, but is not limited to, an electronic storagedevice, a magnetic storage device, an optical storage device, anelectromagnetic storage device, a semiconductor storage device, or anysuitable combination of the foregoing. A non-exhaustive list of morespecific examples of the computer readable storage medium can alsoinclude the following: a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), a static randomaccess memory (SRAM), a portable compact disc read-only memory (CD-ROM),a digital versatile disk (DVD), a memory stick, a floppy disk, amechanically encoded device such as punch-cards or raised structures ina groove having instructions recorded thereon, and any suitablecombination of the foregoing. A computer readable storage medium, asused herein, is not to be construed as being transitory signals per se,such as radio waves or other freely propagating electromagnetic waves,electromagnetic waves propagating through a waveguide or othertransmission media (e.g., light pulses passing through a fiber-opticcable), or electrical signals transmitted through a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network can comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device. Computer readable programinstructions for carrying out operations of various aspects of thepresent innovation can be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions can executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer can be coupled to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection can be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) can execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to customize the electroniccircuitry, to perform aspects of the present innovation.

Aspects of the present innovation are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinnovation. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions. These computer readable programinstructions can be provided to a processor of a general-purposecomputer, special purpose computer, or other programmable dataprocessing apparatus to produce a machine, such that the instructions,which execute via the processor of the computer or other programmabledata processing apparatus, create means for implementing thefunctions/acts specified in the flowchart and/or block diagram block orblocks. These computer readable program instructions can also be storedin a computer readable storage medium that can direct a computer, aprogrammable data processing apparatus, and/or other devices to functionin a particular manner, such that the computer readable storage mediumhaving instructions stored therein comprises an article of manufactureincluding instructions which implement aspects of the function/actspecified in the flowchart and/or block diagram block or blocks. Thecomputer readable program instructions can also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational acts to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present innovation. In this regard, each block in theflowchart or block diagrams can represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks can occur out of theorder noted in the Figures. For example, two blocks shown in successioncan, in fact, be executed substantially concurrently, or the blocks cansometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

While the subject matter has been described above in the general contextof computer-executable instructions of a computer program product thatruns on a computer and/or computers, those skilled in the art willrecognize that this disclosure also can or can be implemented incombination with other program modules. Generally, program modulesinclude routines, programs, components, data structures, etc. thatperform tasks and/or implement abstract data types. Moreover, thoseskilled in the art will appreciate that the inventivecomputer-implemented methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, mini-computing devices, mainframe computers, as well ascomputers, hand-held computing devices (e.g., PDA, phone),microprocessor-based or programmable consumer or industrial electronics,and the like. The illustrated aspects can also be practiced indistributed computing environments where tasks are performed by remoteprocessing devices that are linked through a communications network.However, some, if not all aspects of this disclosure can be practiced onstand-alone computers. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

As used in this application, the terms “component,” “system,”“platform,” “interface,” and the like, can refer to and/or can include acomputer-related entity or an entity related to an operational machinewith one or more specific functionalities. The entities disclosed hereincan be either hardware, a combination of hardware and software,software, or software in execution. For example, a component can be, butis not limited to being, a process running on a processor, a processor,an object, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components canreside within a process and/or thread of execution and a component canbe localized on one computer and/or distributed between two or morecomputers. In another example, respective components can execute fromvarious computer readable media having various data structures storedthereon. The components can communicate via local and/or remoteprocesses such as in accordance with a signal having one or more datapackets (e.g., data from one component interacting with anothercomponent in a local system, distributed system, and/or across a networksuch as the Internet with other systems via the signal). As anotherexample, a component can be an apparatus with specific functionalityprovided by mechanical parts operated by electric or electroniccircuitry, which is operated by a software or firmware applicationexecuted by a processor. In such a case, the processor can be internalor external to the apparatus and can execute at least a part of thesoftware or firmware application. As yet another example, a componentcan be an apparatus that provides specific functionality throughelectronic components without mechanical parts, wherein the electroniccomponents can include a processor or other means to execute software orfirmware that confers at least in part the functionality of theelectronic components. In an aspect, a component can emulate anelectronic component via a virtual machine, e.g., within a servercomputing system.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form. As used herein, the terms “example”and/or “exemplary” are utilized to mean serving as an example, instance,or illustration. For the avoidance of doubt, the subject matterdisclosed herein is not limited by such examples. In addition, anyaspect or design described herein as an “example” and/or “exemplary” isnot necessarily to be construed as preferred or advantageous over otheraspects or designs, nor is it meant to preclude equivalent exemplarystructures and techniques known to those of ordinary skill in the art.

As it is employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Further, processors can exploit nano-scalearchitectures such as, but not limited to, molecular and quantum-dotbased transistors, switches and gates, in order to optimize space usageor enhance performance of user equipment. A processor can also beimplemented as a combination of computing processing units. In thisdisclosure, terms such as “store,” “storage,” “data store,” datastorage,” “database,” and substantially any other information storagecomponent relevant to operation and functionality of a component areutilized to refer to “memory components,” entities embodied in a“memory,” or components comprising a memory. It is to be appreciatedthat memory and/or memory components described herein can be eithervolatile memory or nonvolatile memory or can include both volatile andnonvolatile memory. By way of illustration, and not limitation,nonvolatile memory can include read only memory (ROM), programmable ROM(PROM), electrically programmable ROM (EPROM), electrically erasable ROM(EEPROM), flash memory, or nonvolatile random access memory (RAM) (e.g.,ferroelectric RAM (FeRAM). Volatile memory can include RAM, which canact as external cache memory, for example. By way of illustration andnot limitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM),direct Rambus RAM (DRRAM), direct Rambus dynamic RAM (DRDRAM), andRambus dynamic RAM (RDRAM). Additionally, the disclosed memorycomponents of systems or computer-implemented methods herein areintended to include, without being limited to including, these and anyother suitable types of memory.

What has been described above include mere examples of systems, computerprogram products, and computer-implemented methods. It is, of course,not possible to describe every conceivable combination of components,products and/or computer-implemented methods for purposes of describingthis disclosure, but one of ordinary skill in the art can recognize thatmany further combinations and permutations of this disclosure arepossible. Furthermore, to the extent that the terms “includes,” “has,”“possesses,” and the like are used in the detailed description, claims,appendices and drawings such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim. The descriptions of thevarious embodiments have been presented for purposes of illustration butare not intended to be exhaustive or limited to the embodimentsdisclosed. Many modifications and variations will be apparent to thoseof ordinary skill in the art without departing from the scope and spiritof the described embodiments. The terminology used herein was chosen tobest explain the principles of the embodiments, the practicalapplication or technical improvement over technologies found in themarketplace, or to enable others of ordinary skill in the art tounderstand the embodiments disclosed herein.

What is claimed is:
 1. A device, comprising: a memory that storescomputer executable components; a processor that executes the computerexecutable components; a sensor component comprising one or morepressure sensors that measure one or more pressures; a pressureprocessing component that determines a first pressure sequence employedto authenticate the device, wherein the first pressure sequence isdetermined based on the one or more pressures applied at the one or morepressure sensors; and an authentication component that authenticates thefirst pressure sequence by determining that the first pressure sequencematches an authentication pressure sequence.
 2. The device of claim 1,further comprising: an access component that grants access to data fromone or more partitions of the memory based on a determination that thefirst pressure sequence is authenticated for accessing the one or morepartitions, wherein the first pressure sequence comprises a firstpressure application value and a first pressure application durationvalue.
 3. The device of claim 1, further comprising: an access componentthat grants access to data from one or more partitions of the memoryincrementally to the one or more partitions of the memory or to acomputing system in response to authenticating the first pressuresequence; and wherein the first pressure sequence is composed of one ormore values selected from a group consisting of: a pressure strengthvalue, a pressure application rate value, a pressure applicationduration value, a frequency of pressure application value, a connectionstatus value, and an actuation instrument value.
 4. The device of claim1, wherein the authentication component employs the authenticationpressure sequence, and wherein the authentication pressure sequencecomprises a first pressure authentication value and a first pressureauthentication duration value.
 5. The device of claim 1, wherein thefirst pressure sequence is composed of one or more values selected froma group consisting of: a pressure strength value, a pressure applicationrate value, a pressure application duration value, a frequency ofpressure application value, a connection status value, and an actuationinstrument value.
 6. The device of claim 1, further comprising: anaccess component that grants access to data from one or more partitionsof the memory based on authenticating a grip pattern determined from thefirst pressure sequence.
 7. The device of claim 1, wherein theauthentication component authenticates the first pressure sequence basedupon respective amounts of time between applications of pressures of theone or more pressures.
 8. A computer-implemented method, comprising:measuring, by a system operatively coupled to a processor, one or morepressures via one or more pressure sensors; determining, by the system,a first pressure sequence employed to authenticate a device, wherein thefirst pressure sequence is determined based on the one or more pressuresapplied at the one or more pressure sensors; and authenticating, by thesystem, the first pressure sequence by determining that the firstpressure sequence matches an authentication pressure sequence.
 9. Thecomputer-implemented method of claim 8, further comprising: granting, bythe system, access to data from one or more partitions of a memory basedon a determination that the first pressure sequence is authenticated foraccess to the one or more partitions, wherein the first pressuresequence comprises a first pressure application value and a firstpressure application duration value.
 10. The computer-implemented methodof claim 8, further comprising: granting, by the system, access to datafrom one or more partitions of a memory incrementally, according to aplurality of security schemes, to the one or more partitions of thememory or to the system in response to authenticating the first pressuresequence; and wherein the first pressure sequence is composed of one ormore values selected from a group consisting of: a pressure strengthvalue, a pressure application rate value, a pressure applicationduration value, a frequency of pressure application value, a connectionstatus value, and an actuation instrument value.
 11. Thecomputer-implemented method of claim 8, wherein authenticating the firstpressure sequence comprises employing the authentication pressuresequence, and wherein the authentication pressure sequence comprises afirst pressure authentication value and a first pressure authenticationduration value.
 12. The computer-implemented method of claim 11, whereinauthenticating the first pressure sequence comprises employing theauthentication pressure sequence, and wherein the authenticationpressure sequence comprises a plurality of pressure authenticationvalues and a plurality of pressure authentication duration values. 13.The computer-implemented method of claim 8, further comprising:granting, by the system, access to data from one or more partitions ofthe memory based on authenticating a grip pattern determined from thefirst pressure sequence.
 14. The computer-implemented method of claim13, wherein the authenticating comprises authenticating the firstpressure sequence based upon respective amounts of time betweenapplications of pressures of the one or more pressures.
 15. A computerprogram product for authenticating a device by measuring pressureapplied on the device, the computer program product comprising acomputer readable storage medium having program instructions embodiedtherewith, the program instructions executable by a processor to causethe processor to: measure, by the processor, one or more pressures viaone or more pressure sensors; determine, by the processor, a firstpressure sequence employed to authenticate the device, wherein the firstpressure sequence is determined based on the one or more pressuresapplied at the one or more pressure sensors; and authenticate, by theprocessor, the first pressure sequence by determining that the firstpressure sequence matches an authentication pressure sequence.
 16. Thecomputer program product of claim 15, further comprising: grant access,by the processor, to data from one or more partitions of a memory basedon a determination that the first pressure sequence is authenticated foraccess to the one or more partitions, wherein the first pressuresequence comprises a first pressure application value and a firstpressure application duration value.
 17. The computer program product ofclaim 15, further comprising: grant access, by the processor, to datafrom one or more partitions of a memory incrementally, according to aplurality of security schemes, to the one or more partitions of thememory or to a computing system in response to authenticating the firstpressure sequence; and wherein the first pressure sequence is composedof one or more values selected from a group consisting of: a pressurestrength value, a pressure application rate value, a pressureapplication duration value, a frequency of pressure application value, aconnection status value, and an actuation instrument value.
 18. Thecomputer program product of claim 15, wherein the first pressuresequence employs the authentication pressure sequence, and wherein theauthentication pressure sequence comprises a first pressureauthentication value and a first pressure authentication duration value.19. The computer program product of claim 15, wherein the authenticationpressure sequence comprises a plurality of pressure authenticationvalues and a plurality of pressure authentication duration values. 20.The computer program product of claim 15, further comprising: grant, bythe processor, access to data from one or more partitions of the memorybased on authenticating a grip pattern determined from the firstpressure sequence.