The features and advantages of the invention will become more apparent from the following detailed description of the preferred embodiment(s) with reference to the attached figures, wherein:
It will be noted that in the attached figures, like features bear similar labels.
Referring to
Referring to
The authenticator 18 includes a controller 20, a transmitter 22, a receiver 24, and a digitizer 26. The controller 20 has access to a memory 30. In
The transmitter 22 is preferably the transmitter used by other functionality of the mobile phone, such as transmission of a received communication signal to the speaker, but may alternatively be dedicated to the authenticator 18.
Broadly, in operation the authenticator 18 generates a trigger signal which is transmitted through the speaker 12. The authenticator 18 receives a received signal through the otoacoustic microphone 14 and generates a generated digital otoacoustic signature from the received signal. The authenticator compares the generated digital otoacoustic signature with each of at least one stored digital otoacoustic signature stored in memory 30. If the generated digital otoacoustic signature matches one of the at least one stored digital otoacoustic signature, then the user is authenticated and the mobile phone is unlocked.
Referring to
At step 42 the controller 20 instructs the transmitter 22 to emit a trigger signal, in the form of a series of clicks, through the speaker 12. At step 44 the controller 20 instructs the digitizer 26 to generate a generated digital otoacoustic signature from a received signal, the received signal having been received through the otoacoustic microphone 14 and the receiver 24. The authenticator may use several seconds worth of received signal to generate the generated digital otoacoustic signature, in order to give the user sufficient time to raise the mobile phone, and hence the otoacoustic microphone 14 and speaker 12, to the user's ear after triggering the authenticator. At step 46 the controller 20 compares the generated digital otoacoustic signature with the stored digital otoacoustic signature stored in memory 30, and determines whether the two digital otoacoustic signatures match. If the digital otoacoustic signatures match, then at step 48 the authenticator unlocks the mobile phone.
The effect of unlocking of the mobile phone will depend on the cause of the triggering of the authenticator, which will depend in turn on the particular implementation of the invention. If the authenticator was triggered because the phone was turned on, then unlocking the phone will enable normal functionality and, if the phone is a smart phone, access to stored information. If the authenticator was triggered because the SEND button was pressed, the dialed digits will be transmitted. If the authenticator was triggered because the OFFHOOK button was pressed in response to an incoming call, the incoming call will be enabled.
If the authenticator determines at step 46 that the digital otoacoustic signatures do not match, then the corresponding action will not be executed. For example, access to stored information will not be granted, or dialed digits will not be transmitted. The authenticator enters a wait state at step 50, and waits for authentication to be triggered again. The user may then attempt to trigger the authenticator again by repeating the triggering event. The authenticator may be configured to only allow a specified number of authentication attempts, after which authentication may only be effected by manual entry of a password.
It is possible, however, that the authenticator is unable to receive a received signal and corresponding digital otoacoustic signature which match the digital otoacoustic signature stored in memory, even from a legitimate user. This may be the case if the user's ear canal is partially obstructed due to illness. In one embodiment, the user may bypass the otoacoustic-based authenticator 18 by entering a password. Because this bypassing will be carried out only rarely, if ever, the password may be lengthy and therefore very secure without being of great inconvenience to the user.
The invention has been described with reference to a mobile phone. More generally, the invention may be implemented in any portable communication device having a phone capability, such as a smart phone, or a personal digital assistant having a phone capability.
The invention has been described in which the digital otoacoustic signature of the owner is recorded at the point of purchase. Alternatively, the digital signature of the owner may be recorded by the phone itself. In such an embodiment, the mobile phone includes an otoacoustic recorder comprising logical instructions for interfacing this functionality with the user and for storing a stored digitized otoacoustic signature in the memory 30 of the phone. However, the otoacoustic microphone 14, speaker 12, and digitizer 26 may be the same as those used by the authenticator.
The invention has been described as storing a single stored digital otoacoustic signature in the memory 30. Alternatively, a number of digital signatures may be stored in the memory 30. This would allow more than one legitimate user to be defined for the mobile phone. The additional digital otoacoustic signatures may be recorded at the point of purchase, or by an otoacoustic recorder within the phone. If the phone includes an otoacoustic recorder, the functionality to add or remove digital signatures may be locked until the password is entered. A primary digital signature may also be defined at the time of purchase, and the functionality to add or remove legitimate digital otoacoustic signatures may be locked until an otoacoustic signal corresponding to the primary digital otoacoustic signature is detected. This allows a mobile phone to be shared by several people, such as a family, with one person maintaining ultimate control over the allowed users.
The embodiments presented are exemplary only and persons skilled in the art would appreciate that variations to the embodiments described above may be made without departing from the spirit of the invention. The scope of the invention is solely defined by the appended claims.