Browse Prior Art Database

Method for Access Control via Gestural Verification

IP.com Disclosure Number: IPCOM000106082D
Original Publication Date: 1993-Sep-01
Included in the Prior Art Database: 2005-Mar-20
Document File: 2 page(s) / 68K

Publishing Venue

IBM

Related People

Fitzpatrick, GP: AUTHOR [+2]

Abstract

This article consists of a method by which a user of a computer system may gain access to that system via presentation of an observable, physical gesture, without physical contact with the computer hardware.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Method for Access Control via Gestural Verification

      This article consists of a method by which a user of a computer
system may gain access to that system via presentation of an
observable, physical gesture, without physical contact with the
computer hardware.

      Current art in password security allows users to present
passwords in the form of keyboard sequences, mouse actions, or an
arbitrary series of actions or processes on the computer.  Other
systems permit identification via fingerprints or other physical
characteristics and even keys, badges or smart cards.  There is,
however, no method to allow users to express a password via physical
gestures.

      In general, there are three ways to identify individuals:

o   unique physical traits
o   unique knowledge
o   unique possession

      As the number of these elements used in a given identification
process is increased, the certainty of the identification is also
increased.

      This article consists of a method which enables users to
present unique knowledge in a novel fashion, via physical gesture(s).
Provided is computer access software (and, in fact, any physical
security system equipped with visual input hardware and
image-processing software) to interpret gestural information as a
component of access control methodology.

      A software component is implemented which utilizes existing
image-recognition and pattern-matching techniques.  It may prompt
users to display a gesture or even a complex sequence of such
gestures.  Alternately, the system implementation may choose not to
prompt the user, expecting that a truly authorized user will know
that gestures are required.  This technique may add an extra e...