Computer keyboard with secure authentication features

ABSTRACT

A keyboard is disclosed. The keyboard may comprise a biometric sensor configured for authenticating a user; a docking station configured for receiving a security device; and a processor configured for facilitating communication between the biometric sensor and the security device docked in the docking station with a computing device coupled to the keyboard.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation-in-part of application Ser. No.29/468,239 filed Sep. 27, 2013, titled “KEYBOARD,” the disclosure ofwhich is incorporated herein by reference.

BACKGROUND

As information usage becomes more prevalent and valuable, individualsand businesses alike will seek additional ways to process and storeinformation. With the processing and storing of information, comes theneed to properly secure the information and ensure that it is onlyaccessible to authorized users. As keyboards are widely utilized inconnection with information usage, users are increasingly looking to thekeyboard as a solution to issues relating to access of the information.

SUMMARY

Embodiments of the present disclosure are directed to a keyboard. Thekeyboard may comprise a biometric sensor configured for authenticating auser; a docking station configured for receiving a security device; anda processor configured for facilitating communication between thebiometric sensor and the security device docked in the docking stationwith a computing device coupled to the keyboard.

In an embodiment, the biometric sensor is further configured forscanning an image to authenticate the user.

In an embodiment, the biometric sensor may comprise a fingerprintsampling device.

In an embodiment, the biometric sensor is further configured forauthenticating a user to allow access by the user to the computingdevice.

In an embodiment, the biometric sensor is further configured forauthenticating a user to allow access by the user to a software programexecuting on the computing device.

In an embodiment, the docking station is further configured forestablishing a communication link between the security device and thecomputing device.

In an embodiment, the security device is associated with a user and whendocked in the docking station, the security device communicates with thecomputing device to authenticate the user.

In an embodiment, the security device is a biometric security devicecomprising a power button, display screen, and biometric sensing device.

In an embodiment, the docking station is further configured for chargingor recharging the security device.

In an embodiment, the docking station is further configured fortransmitting an update from the computing device to the security device.

In an embodiment, docking of the security device with the dockingstation causes automatic authentication of a user of the computingdevice.

In an embodiment, the processor is further configured for transmittingauthentication signals from the biometric sensor to the computingdevice, allowing access to a user of the computing device.

In an embodiment, the processor is further configured for detecting acharge level of the security device docked in the docking station, anddetermining whether to charge the security device based on the detectedcharge level

In an embodiment, the processor is further configured for detecting acurrent software version of the security device docked in the dockingstation, and determining whether to apply an update to the securitydevice based on the detection. The processor may further be configuredto apply an update to the security device by receiving the update fromthe computing device, and installing the update to the security device.

In an embodiment, the keyboard may further comprise a connectorconfigured for connecting a communication cable between the keyboard andthe computing device, wherein the connector is releasable from thekeyboard.

In another embodiment of the present disclosure, a method forcommunicating between a keyboard and a docked security device isdisclosed. A processor detects a docking of a security device with adocking station of a keyboard. Characteristics of the docked securitydevice are identified. The transmission of a signal to the dockedsecurity device from the keyboard is determined based on the identifiedcharacteristics of the docked security device.

In an embodiment, identifying characteristics of the docked securitydevice may comprise identifying a current power level of the dockedsecurity device. Determining the transmission of a signal may comprisedetermining that the docked security device requires charging based onthe current power level, and transmitting a signal to the dockingstation to charge the docked security device.

In an embodiment, identifying characteristics of the docked securitydevice may comprise determining a current version of firmware installedon the docked security device. Determining the transmission of a signalmay comprise determining an updated version of the firmware, andtransmitting the updated version of the firmware to the docked securitydevice to be updated.

The aforementioned embodiments and other advantages of the embodimentsdescribed herein will be apparent to those of ordinary skill in the artat least by reference to this summary, the following detaileddescription, and the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The systems and methods described herein may be better understood withreference to the following drawings and detailed description.Non-limiting and non-exhaustive embodiments are described with referenceto the following drawings.

FIG. 1 illustrates a perspective view of an embodiment of a keyboard inaccordance with the present disclosure;

FIG. 2 illustrates a perspective view of a security device in accordancewith the embodiments described herein;

FIG. 3 illustrates a view of a computer system comprising a plurality ofkeyboards in accordance with the embodiment described herein;

FIG. 4 illustrates an exemplary block diagram of a keyboard inaccordance with the embodiments described herein;

FIG. 5 illustrates an exemplary flow diagram showing an algorithm inaccordance with the embodiments described herein; and

FIG. 6 illustrates a high-level diagram of a computing device that maybe used to implement various aspects of the present disclosure.

DETAILED DESCRIPTION

Detailed embodiments of the present disclosure are provided herein. Anyand all disclosed embodiments are merely exemplary and may be embodiedin various and alternative forms, and combinations thereof. As usedherein, “exemplary,” and similar terms, may refer expansively toembodiments that serve as an illustration, specimen, model, or pattern.The figures may include exaggerated or minimized features, in order toadequately show details of particular components. In certain instances,well-known components, systems, materials or methods that have not beendescribed in detail in order to avoid obscuring from the focus of thepresent disclosure. Therefore, specific structural and functionaldetails disclosed herein are in no way to be interpreted as limiting,but merely as a basis for the claims and as a representative basisrecognizable to one skilled in the art to employ the present disclosure.

While the detailed description may include a general context ofcomputer-executable instructions, the present disclosure may beimplemented in combination with other program modules and/or as acombination of hardware and software. Thus, terms such as “computer” or“computing device” as used herein are expansive and are meant to includeroutines, program modules, programs, components, data structures,algorithms, and the like. Various systems may also be used for theimplementation of the embodiments described herein, including singleprocessor or multi-processor systems, minicomputers, mainframecomputers, personal computers, hand-held computing devices,microprocessor-based computers, programmable consumer electronics,in-vehicle computing devices, and any of the aforementioned combinationsthereof, and the like.

In various embodiments, the present disclosure describes a keyboardwhich includes a biometric sensor for authenticating a user and adocking station configured for receiving a security device. A processorof the keyboard communicates with the biometric sensor and securitydevice to facilitate user authentication with a computing device.

FIG. 1 illustrates a perspective view of an embodiment of a keyboard inaccordance with the present disclosure. Keyboard 100 comprises, interalia, an array of keys 110, a biometric sensor 111, and a dockingstation 102. Keyboard 100 may communicate with other devices such as acomputing device coupled to the keyboard by a cable (not shown) or viawireless means. Biometric sensor 111 is configured for authenticating auser to provide access to keyboard 100 and/or a computing device thatkeyboard 100 is communicating with or coupled to. Biometric sensor 111may be configured for scanning an image, such as a fingerprint toauthenticate a user. Biometric sensor 111 may thus include or be afingerprint sampling device. Additionally, rather than simply providingaccess to the keyboard 100 or computing device, biometric sensor 111 maybe configured to authenticate a user to allow access by the user to asoftware program executing on the computing device.

Docking station 102 is configured for establishing a communication linkbetween the security device and the computing device. Docking station102 is configured for interacting with and communication with a securitydevice such as that shown in FIG. 2. Docking station 102 facilitatescharging or recharging of a battery of the security device when thesecurity device is docked with docking station 102. Docking station 102also facilitates transmission of updates from the computing device tothe security device. The updates may be, for example, firmware updatesor software updates to the security device. As mentioned, when thesecurity device is docked with docking station 102, authentication of auser may occur. Authentication may be automatic upon insertion ordocking of the security device with docking station 102.

Keyboard 100 also contains a processor (not shown) facilitatingcommunication between the biometric sensor and the security devicedocked in the docking station with a computing device coupled to or incommunication with keyboard 100. The processor may, for example, beconfigured for detecting a charge level of the security device docked inthe docking station, and making a determination regarding whether thesecurity device should be charged based on the detected charge level.The processor may also be responsible for transmitting authenticationsignals from the biometric sensor 111, as a result of receivingbiometric information, to a computing device, to allow a user access tothe computing device.

The processor may also detect a current software version of the securitydevice docked in docking station 102, and perform a determination ofwhether to apply an update to the security device. The processor mayapply the update by receiving an applicable update from the computingdevice and causing installation of the update to the security device.

Keyboard 100 may further be configured for connecting a communicationcable between the keyboard and the computing device, wherein a connectorof the communication is releasable from the keyboard side. Typically,connectors are releasable from the computing device side. A removeablepanel may also be placed on a bottom side of keyboard 100 to house andhide the connector releasable from the keyboard side.

FIG. 2 illustrates a perspective view of an exemplary security device inaccordance with the embodiments described herein. Security device 200 isexemplary and is representative of a security device that may facilitateuser access to a keyboard, terminal, display, or any other comparablecomputing device. Security device 200 may have the features of a device,system or method as described by U.S. Pat. No. 8,203,423, incorporatedby reference, herein. Security device 200 is configured such that it maydock with docking station 102.

Keyboard 100 is suitable for coupling to and communication to acomputing device or other device to facilitate use in controlling andoperating a wide variety of devices, including, for example, generalpurpose computing devices or data processing machines or devices. FIG. 3illustrates a view of a computer system comprising a plurality ofkeyboards in accordance with the embodiment described herein. Forexample, FIG. 3 shows a plurality of keyboards 100 coupled to a varietyof computers or computing devices, which could be stand-alone personalcomputer systems, workstations of a local area network, a local areanetwork server, or server/host system and processor 220, which may belinked by network 210.

Keyboard 100 may provide input to computers or computing devices 202coupled to a corresponding keyboard 100. Input may be accomplished viaoperation of keys 101. Keys 101 may be pressed in various sequences andcombinations to facilitate transmittal of commands, data, and otherinformation to any computing device coupled to the keyboard. Theinformation may be processed by the computing device or other networkedcomputing devices 202 linked through network 210.

Keyboards may provide an array of alphanumeric keys with or withoutadditional numeric, mathematical calculation, and symbol and functionalkeys, special purpose keys or key groupings provided for controllingcomputing devices in special functions, and any other keys consistentwith the embodiments described herein. Keyboard 100 may include certainkeys used to control e-mail and other computer communications.Additional keys may be used to control speaker volume, and other audioor telephony functions. Keyboard 100 may also include an infrared orother type of sensor for facilitating communication between keyboard 100and other devices capable of communicating wirelessly with keyboard 100.

FIG. 4 illustrates an exemplary block diagram of certain internalcomponents of a keyboard in accordance with the embodiments describedherein. Keyboard 400, as shown, includes at least a processor 402,docking station 404, and biometric sensor 406. Biometric sensor 406 isconfigured for authenticating users. Docking station 404 is configuredfor receiving a security device such as that shown in FIG. 2. Processor402 is configured for facilitating communication between the biometricsensor 406 and the security device docked in docking station 404 with acomputing device that is coupled to or in communication with thekeyboard.

Biometric sensor 406 may be at least partially constructed to includeelectrically conductive material to facilitate scanning of an image,such as a portion of a user's body in order to authenticate the user.For example, biometric sensor 406 may be a fingerprint sampling deviceto allow a user to place a digit on biometric sensor 406, andauthenticate the user with a fingerprint image. Successfulauthentication allows a user of keyboard 400 to use a computing devicecoupled to or in communication with keyboard 400. Authentication may notonly allow access by a user to a computing device, but may also beconfigured to allow access by a user to any associated software programsexecuting on the computing device. For example, a software program maybe executing and available for use on the computing device, but accessto certain features will not be granted until a user has beenauthenticated using biometric sensor 406 of keyboard 400.

Docking station 404 establishes a communication link between a securitydevice as shown by FIG. 2 and a computing device. Docking of a securitydevice at docking station 404 may be detected by the computing device incommunication with keyboard 400. As the security device may serve as analternate means of authenticating the user, docking of the securitydevice with docking station 404 may also initiate an authenticationprocedure for authenticating the user of keyboard 400 with associatedcomputing device. Thus, when a particular security device has beenassociated with a user for authentication purposes, and the securitydevice is docked with docking station 404, the security device maycommunicate with the computing device in order to facilitateauthentication of the user.

The security device, as shown by FIG. 2, may include a power button,display screen, and biometric sensing device. Security device 200, asshown, is typically utilized by a user seeking access to a computingdevice or software executing on the computing device. Security device200 may be portable. Security device 200 may further comprise a signalsensor (not shown) for receiving a signal from a computing device (suchas from a display of the computing device). Biometric sensing device 111may comprise a biometric sensor for acquiring information representing abiometric characteristic of a user seeking access to the computingdevice, thus uniquely identifying the user and user's co-location withsecurity device 200. Security device 200 is described by U.S. Pat. No.8,203,423, incorporated by reference herein.

Docking station 404, configured for receiving a security device such assecurity device 200, may further be configured to charge or recharge apower supply of the security device. Docking station 404 may further beconfigured to transmit updates such as firmware updates or softwareupdates affecting the operation of the security device to the securitydevice. Docking station 404 may thereafter send a command to thesecurity device to commence installation of the updates. Upon docking ofa security device with docking station 404, docking station 404 may alsocause automatic authentication of a user of the computing device basedon their association with the particular security device.

Processor 402 facilitates communication between biometric sensor 406and/or docking station 404 with a computing device. Processor 402handles transmission of authentication signals from biometric sensor 406to the computing device, thereby providing access to the computingdevice. Processor 402 may additionally interface with docking station404 to facilitate charging of a security device docked with dockingstation 404, as well as applying software updates to the security devicevia docking station 404.

While facilitating charging, processor 402 is also able to determine aspecific charge level of the security device and based on an analysis ofthe charge level, determine whether to charge the security device basedon the detected charge level. Processor 402 is further configured todetect a current software version of the security device docked indocking station 404, and determining whether to apply an update to thesecurity device based on the detection of the current software version.The update may be received from the computing device attached to or incommunication with the keyboard 400.

Keyboard 400 may additionally include further components (not shown)that assist in the operation of the keyboard, or any of processor 402,docking station 404, and biometric sensor 406. The further componentsmay include a connector configured for connecting a communication cablebetween keyboard 400 and a computing device. The connector may bereleasable from the connector's connection point at keyboard 400 asopposed to the computing device. Keyboard 400 may furthermore include aremoveable panel configured to house and hide the connector releasablefrom the connector's connection point at keyboard 400.

FIG. 5 illustrates an exemplary flow diagram showing an algorithm inaccordance with the embodiments described herein. Method 500, as shown,illustrates an algorithm for communication between a keyboard and adocked security device. In an embodiment, at step 502, a processor 402of a keyboard, such as keyboard 400, may detect a docking of a securitydevice with a docking station 404 of keyboard 400.

At step 504, characteristics of the docked security device may beidentified. Identification of the characteristics may includeidentifying a current power level of the docked security device ordetermining a current version of firmware or software installed on thedocked security device.

At step 506, a determination of the transmission of a signal to thedocked security device from the keyboard 400 based on the identifiedcharacteristics of the docked security device takes place. Thedetermination may include a determination that the docked securitydevice requires charging based on the current power level. Determinationof the transmission of a signal may also include determining there is anupdated version of the firmware, and transmitting the updated version ofthe firmware to the docked security device to be updated.

All systems and methods described herein may be implemented usingdigital circuitry, or using one or more computers using well-knowncomputer processors, memory units, storage devices, computer software,and other components. Typically, a computer includes a processor forexecuting instructions and one or more memories for storing instructionsand data. A computer may also include, or be coupled to, one or moremass storage devices, such as one or more magnetic disks, internal harddisks and removable disks, magneto-optical disks, optical disks, etc.

All systems and methods described herein may also be implemented usingcomputers operating in a client-server relationship. Typically, in sucha system, the client computer is located remotely from the servercomputer and interaction takes place via a network. The client-serverrelationship may be defined and controlled by computer programsexecuting on their respective client and server computers.

All systems and method described herein may also be used within anetwork-based cloud computing system. In such a network-based cloudcomputing system, a server or another processor that is connected to anetwork communicates with one or more client computers via a network. Aclient computer may communicate with the server via a network browserapplication residing and operating on the client computer, for example.A client computer may store data on the server and access the data viathe network. A client computer may transmit requests for data, orrequests for online services, to the server via the network. The servermay perform requested services and provide data to the clientcomputer(s). The server may also transmit data adapted to cause a clientcomputer to perform a specified function, e.g., to perform acalculation, carry out an algorithm, to display specified data on ascreen, etc. For example, the server may perform either at the server orcause a client to perform one or more of the method steps describedherein, including at least the steps of FIG. 5. Certain steps of themethod described herein may be performed by a server or by anotherprocessor in a network-based cloud-computing system. Certain steps ofthe methods described herein may be performed by a client computer in anetwork-based cloud computing system. The steps of the methods describedherein may be performed by a server and/or by a client computer in anetwork-based cloud computing system, in any combination thereof.

All systems and methods described herein may be implemented using acomputer program product tangibly embodied in an information carrier,e.g., in a non-transitory machine-readable storage, for execution by aprogrammable processor; and the method steps described herein may beimplemented using one or more computer programs executable by suchprocessor. A computer program may be a set of computer programinstructions that can be used, directly or indirectly, by a computer toperform a certain activity or bring about a certain result. A computerprogram may be written in any form of programming language, includingcompiled or interpreted languages, and may be deployed in any form,including as a stand-alone program or as a module, component,subroutine, or other unit suitable for use in a computing environment.

FIG. 6 illustrates a high-level diagram of a computing device that maybe used to implement various aspects of the present disclosure.Computing device 600 comprises a processor 610 operatively coupled to adata storage device 620 and a memory 630. Processor 610 controls theoverall operation of computing device 600 by executing computer programinstructions that define such operations. The computer programinstructions may be stored in data storage device 620, or other computerreadable mediums, and loaded into memory 630 when execution of thecomputer program instructions is desired. Thus, at least the methodsteps of FIG. 5 can be defined by the computer program instructionsstored in memory 630 and/or data storage 620 and controlled by processor610 executing the computer program instructions. For example, thecomputer program instructions can be implemented as computer executablecode programmed by one skilled in the art to perform at least thealgorithms defined by the method steps of FIG. 5. Computing device 600also includes one or more network interfaces for communicating withother devices via a network. Computing device 600 also includes one ormore input/output devices 650 that enable user interaction withcomputing device 600 (e.g., display, keyboard, mouse, speakers, buttons,etc.).

Processor 610 may include both general and special purposemicroprocessors, and may be the sole processor or one of multipleprocessors of computing device 600. Processor 610 may comprise one ormore central processing units (CPUs), for example. Processor 610, datastorage device 620, and/or memory 630 may include, be supplemented by,or incorporated in, one or more application-specific integrated circuits(ASICs) and/or one or more field programmable gate arrays (FPGAs).

Data storage 620 and memory 630 each comprise a tangible non-transitorycomputer readable storage medium. Data storage 620, and memory 630, mayeach include high-speed random access memory, such as dynamic randomaccess memory (DRAM), static random access memory (SRAM), double datarate synchronous dynamic random access memory (DDR RAM), or other randomaccess solid state memory devices, and may include non-volatile memory,such as one or more magnetic disk storage devices such as internal harddisks and removable disks, magneto-optical disk storage devices, opticaldisk storage devices, flash memory devices, semiconductor memorydevices, such as erasable programmable read-only memory (EPROM),electrically erasable programmable read-only memory (EEPROM), compactdisc read-only memory (CD-ROM), digital versatile disc read-only memory(DVD-ROM) disks, or other non-volatile solid state storage devices.

Input/output devices 650 may include peripherals, such as a printer,scanner, display screen, etc. For example, input/output devices 650 mayinclude a display device such as a cathode ray tube (CRT) or liquidcrystal display (LCD) monitor for displaying information to the user, akeyboard, and a pointing device such as a mouse or a trackball by whichthe user can provide input to computing device 600.

Any or all of the systems described herein may be implemented usingcomputing device 600 or any equivalent device.

One skilled in the art will readily recognize that any implementation ofan actual computer, computer system, or computing device may have otherstructures and may contain other components, and that computing device600 is merely a high level representation of some of the components forillustrative purposes.

The foregoing detailed description of the present disclosure is to beunderstood as being in every respect illustrative and exemplary, but notrestrictive, and the scope of the present disclosure provided herein isnot to be determined solely from the detailed description, but ratherfrom the claims as interpreted according to the full breadth and scopepermitted by patent laws. It is to be understood that the embodimentsshown and described herein are merely illustrative of the principlesaddressed by the present disclosure and that various modifications maybe implemented by those skilled in the art without departing from thescope and spirit of the present disclosure. Those skilled in the art mayimplement various other feature combinations without departing from thescope and spirit of the present disclosure. The various functionalmodules shown are for illustrative purposes only, and may be combined,rearranged and/or otherwise modified.

The invention claimed is:
 1. A keyboard comprising: a docking stationconfigured for receiving a security device for authenticating a user ona computing device, the computing device being communicatively coupledto, but separate from, the keyboard, the security device transmitting acode for accessing software executing on the computing device inresponse to the security device being docked in the docking station; anda processor configured for: facilitating communication between thesecurity device docked in the docking station and the computing device,detecting a charge level of the security device docked in the dockingstation, and determining whether to charge the security device based onthe detected charge level, and detecting a current software version ofthe security device docked in the docking station, and determiningwhether to apply an update to the security device based on the detectedcurrent software version.
 2. The keyboard of claim 1, further comprisinga biometric sensor for authenticating the user on the computing device,wherein the biometric sensor is further configured for scanning an imageto authenticate the user.
 3. The keyboard of claim 2, wherein thebiometric sensor comprises a fingerprint sampling device.
 4. Thekeyboard of claim 2, wherein the biometric sensor is further configuredfor authenticating the user to allow access by the user to the softwareexecuting on the computing device.
 5. The keyboard of claim 2, whereinthe processor is further configured for transmitting authenticationsignals from the biometric sensor to the computing device, allowingaccess to the user of the computing device.
 6. The keyboard of claim 1,wherein the security device is a biometric security device comprising apower button, display screen, and biometric sensing device.
 7. Thekeyboard of claim 1, wherein the docking station is further configuredfor charging or recharging the security device.
 8. The keyboard of claim1, wherein the docking station is further configured for transmittingthe update from the computing device to the security device.
 9. Thekeyboard of claim 1, further comprising: a connector configured forconnecting a communication cable between the keyboard and the computingdevice, wherein the connector is releasable from the keyboard.
 10. Thekeyboard of claim 9, further comprising: a removeable panel configuredto house and hide the connector releasable from the keyboard.
 11. Thekeyboard of claim 1, wherein the processor is further configured toapply the update to the security device by receiving the update from thecomputing device, and installing the update to the security device. 12.A method comprising: detecting, by a processor, a docking of a securitydevice with a docking station of a keyboard, the security devicetransmitting a code for accessing software executing on a computingdevice in response to the docking, the computing device being separatefrom the keyboard; determining that the docked security device requirescharging based on a current power level and, in response, transmitting asignal to the docking station to charge the docked security device; anddetermining an updated version of firmware for the docked securitydevice and, in response, transmitting the updated version of firmware tothe docked security device to be updated.
 13. The method of claim 12,further comprising: identifying the current power level of the dockedsecurity device.
 14. The method of claim 12, further comprising:determining a current version of firmware installed on the dockedsecurity device.
 15. A system comprising: a computing device; and akeyboard communicatively coupled to, but separate from, the computingdevice, the keyboard comprising: a docking station configured forreceiving a security device for authenticating a user on the computingdevice, the security device transmitting a code for accessing softwareexecuting on the computing device in response to the security devicebeing docked in the docking station; and a processor configured for:facilitating communication between the security device docked in thedocking station and the computing device, detecting a charge level ofthe security device docked in the docking station, and determiningwhether to charge the security device based on the detected chargelevel, and detecting a current software version of the security devicedocked in the docking station, and determining whether to apply anupdate to the security device based on the detected current softwareversion.
 16. The system of claim 15, further comprising: the securitydevice docked in the docking station.