Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Object Access via Fingerprint Recognition on Telephone Keys

IP.com Disclosure Number: IPCOM000105695D
Original Publication Date: 1993-Sep-01
Included in the Prior Art Database: 2005-Mar-20
Document File: 4 page(s) / 94K

Publishing Venue

IBM

Related People

Fitzpatrick, GP: AUTHOR [+3]

Abstract

Described is a method of employing fingerprint recognition with telephone devices to manipulate graphical objects and/or to access application services and perform certain application functions via a telephone device.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Object Access via Fingerprint Recognition on Telephone Keys

      Described is a method of employing fingerprint recognition with
telephone devices to manipulate graphical objects and/or to access
application services and perform certain application functions via a
telephone device.

      There is a need to allow multiple users to share a given
workstation and to allow secure access to discrete graphical objects
assigned to multiple users.  Currently, there is no method to allow
selection of a subset of a single desktop's objects by multiple users
having varying levels of authorization to disparate objects.

      Prior art utilizes a variety of means by which a user can
textually specify, (e.g., entering passwords) the identity of the
user.  Such methods can be comprised of users' conveying passwords or
other users viewing the secured access process.  It is desirable for
an enterprise to utilize the physical characteristics of the user to
allow secure access to discrete graphical objects and application
services assigned to multiple users.

      Prior art in object selection within a graphical user interface
(GUI) environment is managed by the use of device and program
passwords and is limited by techniques such as keyboard- and
mouse-locking programs.  Further, touch-screen technology has enabled
direct object selection by a user's fingers' contacting a
touch-screen surface directly over a graphical object.  Prior art has
described a method of granting individual desktop objects access via
analysis of the user's fingerprints in contact with a touch screen as
well as mouse devices.  More recent art has described methodologies
for utilizing the telephone as a point and select device.

      The solution to this problem lies in employing existing
fingerprint-recognition technology in an innovative manner to permit
desktop object selection by authorized users via fingerprint
recognition on telephone keys.

      This article describes a method whereby a user's fingerprints
on telephone keys can be used to grant access to given desktop
objects.

      A Fingerprint-Sensitive Telephone Key detects contact at given
points on its surface.  (This component may consist of a
touch-sensitive plate, similar to those used in conventional
fingerprint-sensitive devices.)  The telephone key communicates with
two distinct components:

      A communication protocol is establi...