The present invention relates to robotic devices. More particularly, the invention relates to a method for robotic devices to accurately authenticate one or more users.
The following is a tabulation of some prior art that presently appears relevant:
As robots and electronic computing devices are increasingly used for important and sensitive purposes, authentication methods have become more and more critical. Lock and key systems are a traditional form of protecting information. As technology advanced, digital passwords were introduced. In U.S. Pat. No. 6,078,265 (Nettel Technologies, Inc.), fingerprint readers were introduced which utilized the user's fingerprint instead of a key to access information. In U.S. Pat. No. 5,845,733 (Adam Wolfsen), human retina scanning was proposed.
In prior art, extensive effort has been put toward advancing authentication systems, but all of the described methods worked by opening the system with a more complex method. If an intruder were to somehow overcome the security system, he could then easily change the privileges and grant himself the clearance needed for access to the information. Although these solutions advanced authorization technology, if they are bypassed, the rest of the system becomes vulnerable. A need exists for a method to secure information that cannot be bypassed, overridden, overcome or hacked. A need exists for a method for electronic computing devices to reliably identify users, the method which cannot be maliciously changed by intruders.
It is a goal of the present invention to provide a method for robotic entities to recognize approved operators that is resistant to malicious attacks.
It is a goal of the present invention to provide a method for robotic entities to distinguish between commands from approved users and commands from outside entities.
It is a goal of the present invention to make robots more reliable and secure.
It is a goal of the present invention to make robots more suitable for carrying out highly sensitive tasks.
The present invention achieves the aforementioned goals through an operator recognition system in which a biometric scanner is used to identify the rightful owner of the device. A physical scan monitoring the user's fingerprint, palm print, or blood vessels in the hand yield unique and recognizable results for each individual. Data from each scan is stored in a time-sensitive memory unit wherein memory cells may be written only during a specific timeslot, after which point they become read-only. Written memory cells are thus irreversibly changed. The robotic device keeps a loyalty index to track user recognition. Each time the device receives a correct biometric scan from an authorized user, that user's loyalty metric increases. The device's functions will be operable to users that meet predetermined or configured loyalty index thresholds. Scans will be limited to a certain number within a given time frame, so that malicious attempts to establish loyalty over a short period of time are not possible. Because prior data cannot be altered, malicious attacks cannot succeed in creating a falsely authorized user spontaneously.
In some embodiments, various levels of operating clearance may be assigned to users of various levels of measured loyalty.
In some embodiments, data is stored on a dedicated non-volatile random-access memory unit independent from other parts of the robot's computer system.
The present invention proposes a system for a robotic device to authenticate one or more users.
Briefly, the system works by scanning and storing one or more biometric features of users, which are used to identify the users. A fingerprint, palm print or the hand blood vessel parameters may be scanned with a biometric scanner within the device. During an initial set-up period, authorized users are identified to the system using the biometric scanner. A biometric profile of each authorized user is saved in a database. Each authorized user begins with an initial loyalty metric stored in a loyalty index. Anytime a user is authenticated by matching a biometric scan with one of the saved biometric profiles, that user's loyalty metric is increased. The device's various functions are operable to users based on their loyalty metrics. In some embodiments, the loyalty levels required for different functions may be configured by users during set-up so that the authorized user or users can decide which functions are accessible to users based on their loyalty metric.
In some embodiments, a minimum time interval between scans is imposed to prevent the system from being circumvented by malicious attacks. The system accepts only one scan action within a preset time period. Thus, an intruder would not be able to establish a high loyalty metric over a short period of time in order to gain full access to the system.
A new type of memory storage, referred to as Time Access Memory (TAM) is proposed in the present invention. Unlike currently available memory types, TAM is a form of read-only memory in which memory cells are associated with successive time slots. Each memory cell is usable only within its time slot, after which point the memory cell, if not used, is permanently filled with junk data and becomes unwritable. The next memory cell becomes active in the next time slot, and may be filled only during that time slot. As the process continues, memory cells are either written with data during the time slot, or filled with junk data. Either way, memory cells whose time slots have passed are unchangeable.
Referring to
Referring to
As explained previously, each time a biometric scan is received and matching biometric data is identified within the saved database, the corresponding user's loyalty metric is increased by a predetermined amount. A loyalty index stores the loyalty metric of every authorized user. Thus, users' loyalty metrics increase with each authentication, such that, over time, users may achieve a very high loyalty metric. The various functions of the robotic device may be assigned loyalty metric requirements in order to be commanded by users. Users with less than the predetermined amount of loyalty will be unable to execute certain commands. In this way, the most sensitive functions of the robotic device may be controlled only by users with an adequate amount of loyalty. In some embodiments, the loyalty requirements associated with each function may be configured by users during an initial set-up phase.
Referring to
The system is not limited to humanoid robots, but rather can be implemented in any type of robot. Additionally, the number of users is not limited and be configured during the initial setup. Specialized personnel and/or factory equipment will be required to reset or initialize the related user information data.
This application claims the benefit of provisional patent application Ser. No. 62/041,113, filed Aug. 24, 2014 by the present inventor.
Number | Name | Date | Kind |
---|---|---|---|
7729518 | Awatsu | Jun 2010 | B2 |
9908239 | O'Brien | Mar 2018 | B1 |
20050226468 | Deshpande | Oct 2005 | A1 |
20060036873 | Ho | Feb 2006 | A1 |
20080025118 | Scheuerlein | Jan 2008 | A1 |
20090199264 | Lang | Aug 2009 | A1 |
20100234995 | Zini | Sep 2010 | A1 |
20110063094 | Meiertoberens | Mar 2011 | A1 |
20130182716 | Gemelli | Jul 2013 | A1 |
20140041008 | Roskind | Feb 2014 | A1 |
20150013000 | Linnakangas | Jan 2015 | A1 |
20150242605 | Du | Aug 2015 | A1 |
20150273704 | Inaba | Oct 2015 | A1 |
20150347734 | Beigi | Dec 2015 | A1 |
20160354165 | Uenoyama | Dec 2016 | A1 |
20170149725 | Kuriyama | May 2017 | A1 |
Number | Date | Country | |
---|---|---|---|
62041113 | Aug 2014 | US |