Biometric Interface System and Method

ABSTRACT

A system includes a wearable device having at least one sensor configured to determine a user&#39;s fingerprint data, at least one data storage device containing authentication data, and at least one processor configured to compare the user&#39;s fingerprint data with the authentication data in order to authenticate a user. A method of authenticating a wearable device includes producing a fingerprint, determining fingerprint data derived from the fingerprint with one or more sensors, comparing the fingerprint data with authentication data on one or more data storage devices, and authenticating the user if the fingerprint data and the authentication data match.

PRIORITY STATEMENT

This application claims priority to U.S. Provisional Patent Application 62/328,915, filed on Apr. 28, 2016, and entitled Biometric Interface System and Method, hereby incorporated by reference in its entirety.

FIELD OF THE INVENTION

The present invention relates to wearable devices especially earpieces. More particularly, but not exclusively, the present invention relates to authentication of such devices.

BACKGROUND

Data authentication for wearable devices remains a challenge. The limited size of most wearable devices makes it difficult to design a sound and effective data authentication system that is also user friendly. One possible method to overcome this relates to the use of fingerprint analysis.

SUMMARY

It is a primary object, feature, or advantage to improve over the state of the art.

It is a further object, feature, or advantage to use fingerprint analysis to provide data authentication for wearable devices including earpieces.

It is a still further object, feature, or advantage to provide for fingerprint analysis and verification using a contact surface of an earpiece wearable.

It is another object, feature, or advantage to use ultrasound, infrared, or radar sensor units to determine a fingerprint analysis on the surface of the device and in performing the analysis to use data stored on the device or stored elsewhere.

It is a further object, feature, or advantage to allow for access to programming on a device or access to remote programming provided through a device to only be accessible once a verification of identity is provided.

It is a still further object, feature, or advantage to allow for coordination of fingerprint identification with other biometric identity criteria.

Another object, feature, or advantage is to allow for storage of fingerprints in an isolated segment of the device away from capturable data.

Yet another object, feature, or advantage is to allow for biometric data to be stored in the cloud for remove verification of user identity.

A further object, feature, or advantage is to allow for a split verification scheme for user identity so that neither the cloud nor the device alone verify, only the combination of the two can be used to identify a user.

One or more of these and/or other objects, features, or advantages of the present invention will become apparent from the specification and claims that follow. No single embodiment need provide each and every object, feature, or advantage. Different embodiments may have different objects, features, or advantages. Therefore, the present invention is not to be limited to or by an object, feature, or advantage stated herein.

According to another aspect, an earpiece is provided. The earpiece includes an earpiece housing, a processor disposed within the earpiece, and a fingerprint sensor operatively connected to the processor. The processor is configured to receive fingerprint data from the fingerprint sensor and compare the fingerprint data to stored fingerprint data and/or to provide authentication of a user of the earpiece.

According to another aspect, an earpiece wearable includes an earpiece housing, at least, one speaker, at least one microphone, a processor disposed within the earpiece housing and operatively connected to the at least one speaker and the at least one microphone, and a sensor operatively connected to the processor. The processor is configured to receive fingerprint data from the sensor at a contact surface on the earpiece housing and analyze the fingerprint data using stored fingerprint authentication data to make an authentication decision based on the fingerprint data. The earpiece may further include a data storage device disposed within the ear piece housing and operatively connected to the processor, wherein the stored fingerprint authentication data is stored within the data storage device. The earpiece may further include a radio transceiver disposed within the earpiece housing and operatively connected to the processor, wherein the stored fingerprint authentication data is stored at a remote location and accessible over a network through the radio transceiver. The earpiece may include both a data storage device disposed within the ear piece housing and operatively connected to the processor, wherein a first portion of the stored fingerprint authentication data is stored within the data storage device and a radio transceiver disposed within the earpiece housing and operatively connected to the processor, wherein a second portion of the stored fingerprint authentication data is stored at a remote location and accessible aver a network through the radio transceiver. Both the first portion of the stored fingerprint authentication data and the second portion of the stored fingerprint authentication data may be needed by the processor to make the authentication decision based on the fingerprint data. The earpiece may further include a gesture control interface operatively connected to the processor, wherein the gesture control interface is configured to receive gestures. The sensor may be an optical sensor and the optical sensor may be used by the gesture control interface to receive the gestures and to sense the fingerprint data. The sensor may be an Ultrasound sensor, radar sensor or other type of sensor. The processor may be further configured to process audio data from the at least one microphone and wherein the authentication decision is based on the fingerprint data and the audio data. The processor may also be further configured to process pulse oximetry data from a pulse oximeter disposed within the housing and operatively connected to the processor and the authentication decision may be based on the fingerprint data and the pulse oximetry data.

According to another aspect, a method is provided for authenticating of a user of an earpiece having an earpiece housing, at least one speaker, at least one microphone, a processor disposed within the earpiece housing and operatively connected to the at least one speaker and the at least one microphone, and a sensor operatively connected to the processor. The method includes acquiring fingerprint data using the sensor from a finger of a user contacting a fingerprint contact area on the earpiece housing, and analyzing the fingerprint data using stored fingerprint authentication data to make an authentication decision based on the fingerprint data. The stored fingerprint authentication data may be stored within the data storage device. The earpiece may further include a radio transceiver disposed within the earpiece housing and operatively connected to the processor, and the method may include accessing the stored fingerprint authentication data from a remote location over a network and through the radio transceiver. The method may further provide for accessing a first portion of the stored fingerprint authentication from the data storage device and accessing a second portion of the stored fingerprint authentication data from a remote location over a network and through the radio transceiver.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates one example of a system including an earpiece wearable with a fingerprint sensor used for authentication.

FIG. 2 is another block diagram illustrating an earpiece wearable.

DETAILED DESCRIPTION

A wearable device and related systems and methods are shown which allow for the authentication of a user's identity using fingerprint data alone and/or in combination with additional biometric data. FIG. 1 illustrates a wearable device or system which 10 includes a first earpiece 10A with an earpiece housing 12B and a second earpiece 10B with an earpiece housing 10B. A fingerprint contact area 13A is shown for the first earpiece 10A and a fingerprint contact area 131 is shown for the second earpiece 10B. When a finger of a user is presented at one of the finger contact areas 13A, 13B, fingerprint data is acquired which may then be used to perform authentication of a user. One or more sensors are associated with each fingerprint contact area 13A, 13B. Such sensors may also be used for other purposes as well.

To perform authentication, the fingerprint data obtained from a user at the one or more finger contact areas 13A, 13B, may be compared with data stored within the first earpiece 10A or the second earpiece 10B. The data may be stored in an isolated segment of the device away from capturable data to enhance security. The data may be encrypted to enhance security. Alternatively, the fingerprint data may he compared with data stored on another device such as a mobile device 11, or data stored remotely such as in a database 17 in operative communication with a server platform 15 which may be accessible through network 19 such as the Internet. Fingerprint data or other authentication data may be stored either at the wearable device(s) 10, a mobile device 11, at a remote database 17, or at a combination of locations. For example, a portion of the authentication data may be stored at the wearable device 10A, 10B and another portion of the authentication data may be stored at the mobile device 11 or the remote database 17 in order to provide additional security. In this type of split verification scheme for user identity neither the cloud nor the device alone can provide verification, instead only a combination of the two would allow for verification or authentication of a user. Once authentication occurs all or portions of device operations or programming may become accessible to a user.

FIG. 2 illustrates a wearable device such as an earpiece 10 with an ear piece housing 12. A plurality of sensors 14 are operatively connected to one or more processors 18. The sensors 14 may include an ultrasound sensor 34, an infrared sensor 36, a radar sensor unit 38, or other types of sensors. In addition, one or more microphones 20 may be present. The microphones 20 may include one or more bone microphones and/or one or more air conduction microphones. One or more speakers 24 are also present and are operatively connected to the processor(s) 18. A data storage device 16 may also be operatively connected to the processor(s) 18 and may be used for storing fingerprint data or other biometric data which is used as a part of an authentication processor. A gesture control interface 22 may also be operatively connected to the processor(s) 18. The gesture control interface 22 may include one or more emitters 42 and detectors 44. For example, the gesture control interface 22 may include optical emitters and detectors which are used to determine gestures made by a user of the earpiece. Thus, for example, the user may tap the earpiece, with a single tap or multiple taps, swipe across the ear piece, or tap and hold their finger at a surface of the earpiece. The same fingerprint contact area may be used for receiving gestures as well as for reading a fingerprint of a user. The same sensors such as optical emitters and detectors may be used to sense gestures as well as to sense fingerprints.

Instead of using the emitters 42 and detectors 44 of the gesture control interface 22, fingerprints may be detected using other types of sensors such as the ultrasound sensor 34, the infrared sensor 36, or the radar sensor 38. Each of these sensors may also be used for other purposes as well in addition to detecting fingerprints.

One or more LEDs 30 may be operatively connected to the processor(s) 18 and used for conveying information to a user or others. In addition, one or more transceivers may be present and operatively connected to the processor(s) 18. A first transceiver 26 may be a near field magnetic induction (NFMI) or other type of transceiver. One use of such a transceiver is for communication between wearable devices, such as communication between a left earpiece and a right earpiece. A radio transceiver 28 is also present and operatively connected to the processor(s) 18. The radio transceiver 28 may be a Bluetooth transceiver, Wi-Fi transceiver, or other type of radio transceiver.

Returning to the sensors 14, one or more biometric sensors may be present such as a pulse oximeter 35. The pulse oximeter 35 may be used to measure pulse of a user. It is to be further understood that characteristics of the pulse of a user may be used to further authenticate a user. For example, heart rate variability as determined using the pulse oximeter 35 or otherwise may be used to authenticate a user. An inertial sensor 37 is also shown. It is also to be understood that the inertial sensor 37 may be used to detect gait of a user or other motion of a user which may be used in authenticating a user. It is to be further understood that voice samples of a user received at one or more of the microphones 20 may be used to authenticate a user through voice analysis. Thus, in addition to fingerprint data other types of biometric data may be used to provide for further authentication of a user. Although various types of biometric sensors are shown are described, it is to be understood that other types of biometric sensors may be used.

It is to be further understood that additional or secondary authentication may be performed in a number of different ways depending upon the type of wearable device and the sensors present. For example, where voice is used as a type of secondary authentication, a determination can be made as to whether the voice of the user matches the voice of the known user. Alternatively, or in addition, the user may be asked to provide a passphrase. Similarly, where gestures are used, a user may be asked to input a series of gestures which serves as a password or passphrase to authenticate the user. Thus, it is to be understood that voice detection, heart rate variability, predetermined vocal passwords, audio playback tonal password selections, or other types of authentication may be used in addition to the fingerprint analysis. It is to be further understood that different levels of access to data or programming within the earpiece or functionality provided by the earpiece may be provided with different types of authentication. It is further to be understood that user verification at an earpiece or other wearable device may be used within a connected environment.

In operation, a fingerprint is sensed with one or more sensors. For example, a user may press their finger against a fingerprint contact area of an earpiece. Sensors such as optical sensors may be used to acquire fingerprint data such as data sufficient to define an image of a fingerprint or to describe fingerprint features. Once acquired, this data may be compared to other data identifying one or more authorized users of the earpiece. Such data may be present within the earpiece such as in a segregated portion of a memory that is not generally otherwise accessible. If the fingerprint data is a match to an authorized user then the user may be authenticated and provided access to the earpiece, be allowed to modify operational states of the earpiece such as to access a particular program or perform particular functions. If not, then the user will not be able to use the earpiece, have limited access to the earpiece, or be required to otherwise authenticate themselves. The fingerprint authentication may serve as an initial authentication and additional authentication may be required. In addition, a user may be required to re-authenticate when performing various functions if additional security requirements are associated with those functions. Where the gesture interface is used in providing for the fingerprint sensing, at times when the gesture interface is used to provide a gesture, fingerprint data may be collected at that time to re-authenticate a user via fingerprint in the background without requiring any additional activity from the user unless the authentication process fails.

Therefore, various methods, systems, and apparatus have been shown and described. Although various embodiments have been shown the present invention contemplates numerous options, variations, and alternatives including variations in the type of wearable device, whether authentication occurs on board the wearable device or at a remote location, the type of authentication data included such as fingerprint, voiceprint, gesture or gesture sequence, or other type of authentication data, plus other options, variations, and alternatives. 

What is claimed is:
 1. An earpiece comprising: an earpiece housing; at least one speaker; at least one microphone; a processor disposed within the earpiece housing and operatively connected to the at least one speaker and the at least one microphone; a sensor operatively connected to the processor; wherein the processor is configured to receive fingerprint data from the sensor at a fingerprint contact surface on the earpiece housing and analyze the fingerprint data using stored fingerprint authentication data to make an authentication decision based on the fingerprint data.
 2. The earpiece of claim 1 further comprising a data storage device disposed within the ear piece housing and operatively connected to the processor, wherein the stored fingerprint authentication data is stored within the data storage device.
 3. The earpiece of claim 1 further comprising a radio transceiver disposed within the earpiece housing and operatively connected to the processor, wherein the stored fingerprint authentication data is stored at a remote location and accessible over a network through the radio transceiver.
 4. The earpiece of claim further comprising: a data storage device disposed within the ear piece housing and operatively connected to the processor, wherein a first portion of the stored fingerprint authentication data is stored within the data storage device; a radio transceiver disposed within the earpiece housing and operatively connected to the processor, wherein a second portion of the stored fingerprint authentication data is stored at a remote location and accessible over a network through the radio transceiver; wherein both the first portion of the stored fingerprint authentication data and the second portion of the stored fingerprint authentication data is needed by the processor to make the authentication decision based on the fingerprint data
 5. The earpiece of claim 1 wherein the at least one wearable device further comprises a gesture control interface operatively connected to the processor, wherein the gesture control interface is configured to receive gestures.
 6. The earpiece of claim 5 wherein the sensor is an optical sensor and wherein the optical sensor is used by the gesture control interface to receive the gestures and to sense the fingerprint data.
 7. The earpiece of claim 1 wherein the sensor is an ultrasound sensor.
 8. The earpiece of claim 1 wherein the processor is further configured to process audio data from the at least one microphone and wherein the authentication decision is based on the fingerprint data and the audio data.
 9. The earpiece of claim 1 wherein the processor is further configured to process pulse oximetry data from a pulse oximeter disposed within the housing and operatively connected to the processor and wherein the authentication decision is based on the fingerprint data and the pulse oximetry data.
 10. A method for authenticating of a user of an earpiece comprising an earpiece housing, at least one speaker, at least one microphone, a processor disposed within the earpiece housing and operatively connected to the at least one speaker and the at least one microphone, and a sensor operatively connected to the processor, the method comprising: acquiring fingerprint data using the sensor from a finger of a user contacting a fingerprint contact area on the earpiece housing; and analyzing the fingerprint data using stored fingerprint authentication data to make an authentication decision based on the fingerprint data.
 11. The method of claim 10 wherein the stored fingerprint authentication data is stored within the data storage device.
 12. The method of claim 10 wherein the earpiece further comprises a radio transceiver disposed within the earpiece housing and operatively connected to the processor, and wherein the method further comprises accessing the stored fingerprint authentication data from a remote location over a network and through the radio transceiver.
 13. The method of claim 10 wherein a first portion of the stored fingerprint authentication data is stored within the data storage device and wherein the earpiece further comprises a radio transceiver disposed within the earpiece housing and operatively connected to the processor, and wherein the method further comprises accessing the first portion of the stored fingerprint authentication from the data storage device and accessing a second portion of the stored fingerprint authentication data from a remote location over a network and through the radio transceiver. 