US-12619701-B2 - User interfaces for authenticating to perform secure operations
Abstract
The present disclosure generally relates to methods and user interfaces for authentication, including providing authentication at a computer system in accordance with some embodiments.
Inventors
- Sung Chang Lee
- Qiuji Zhao
- Wendong ZHONG
- Bowen Cheng
- Yue HANG
- Weiqi PAN
- Yue Shen
- XiaoGuang Yang
- Xiaofeng Yu
- Feng Zhang
- Liang Zhao
Assignees
- APPLE INC.
Dates
- Publication Date
- 20260505
- Application Date
- 20240926
Claims (18)
- 1 . A computer system that is configured to communicate with one or more biometric sensors and one or more input devices that include a voice input device, the computer system comprising: one or more processors; and memory storing one or more programs configured to be executed by the one or more processors, the one or more programs including instructions for: receiving, via the one or more input devices, a request to unlock the computer system while the computer system is in a locked state; in response to receiving the request to unlock the computer system: in accordance with a determination that a first set of biometric identification criteria is satisfied, wherein the first set of biometric identification criteria is satisfied when a detected biometric feature detected in conjunction with the request to unlock the computer system is consistent with an enrolled biometric feature of a set of one or more enrolled biometric features, transitioning the computer system from the locked state to an unlocked state; and in accordance with a determination that a second set of biometric identification criteria is satisfied without satisfying the first set of biometric identification criteria, wherein the second set of biometric identification criteria is satisfied when the detected biometric feature detected in conjunction with the request to unlock the computer system is partially consistent with an enrolled biometric feature of the set of one or more enrolled biometric features, causing an output of a prompt that indicates that voice input is required to unlock the computer system; after causing the output of the prompt, receiving, via the voice input device, an indication that voice input has been detected; and in response to receiving the indication that voice input has been detected: in accordance with a determination that detected voice input matches an authorized voice profile, transitioning the computer system from the locked state to the unlocked state; and in accordance with a determination that the detected voice input does not match the authorized voice profile, maintaining the computer system in the locked state.
- 2 . The computer system of claim 1 , wherein: the one or more biometric sensors include one or more microphones; and the detected voice input is detected via the one or more microphones.
- 3 . The computer system of claim 1 , the one or more programs further including instructions for: in response to receiving the request to unlock the computer system: in accordance with a determination that the second set of biometric identification criteria and the first set of biometric identification criteria are not satisfied, maintaining the computer system in the locked state without causing the output of the prompt.
- 4 . The computer system of claim 1 , wherein the prompt includes an instruction to recite a predefined set of words.
- 5 . The computer system of claim 1 , wherein the second set of biometric identification criteria includes a criterion that is satisfied when a gaze of a user directed toward a predetermined portion of the computer system has been detected.
- 6 . The computer system of claim 1 , the one or more programs further including instructions for: in accordance with a determination that the detected voice input does not match the authorized voice profile, providing limited access privileges to a second user of the computer system.
- 7 . A non-transitory computer-readable storage medium storing one or more programs configured to be executed by one or more processors of a computer system that is in communication with one or more biometric sensors, one or more input devices that include a voice input device, the one or more programs including instructions for: receiving, via the one or more input devices, a request to unlock the computer system while the computer system is in a locked state; in response to receiving the request to unlock the computer system: in accordance with a determination that a first set of biometric identification criteria is satisfied, wherein the first set of biometric identification criteria is satisfied when a detected biometric feature detected in conjunction with the request to unlock the computer system is consistent with an enrolled biometric feature of a set of one or more enrolled biometric features, transitioning the computer system from the locked state to an unlocked state; and in accordance with a determination that a second set of biometric identification criteria is satisfied without satisfying the first set of biometric identification criteria, wherein the second set of biometric identification criteria is satisfied when the detected biometric feature detected in conjunction with the request to unlock the computer system is partially consistent with an enrolled biometric feature of the set of one or more enrolled biometric features, causing an output of a prompt that indicates that voice input is required to unlock the computer system; after causing the output of the prompt, receiving, via the voice input device, an indication that voice input has been detected; and in response to receiving the indication that voice input has been detected: in accordance with a determination that detected voice input matches an authorized voice profile, transitioning the computer system from the locked state to the unlocked state; and in accordance with a determination that the detected voice input does not match the authorized voice profile, maintaining the computer system in the locked state.
- 8 . The non-transitory computer-readable storage medium of claim 7 , wherein: the one or more biometric sensors include one or more microphones; and the detected voice input is detected via the one or more microphones.
- 9 . The non-transitory computer-readable storage medium of claim 7 , the one or more programs further including instructions for: in response to receiving the request to unlock the computer system: in accordance with a determination that the second set of biometric identification criteria and the first set of biometric identification criteria are not satisfied, maintaining the computer system in the locked state without causing the output of the prompt.
- 10 . The non-transitory computer-readable storage medium of claim 7 , wherein the prompt includes an instruction to recite a predefined set of words.
- 11 . The non-transitory computer-readable storage medium of claim 7 , wherein the second set of biometric identification criteria includes a criterion that is satisfied when a gaze of a user directed toward a predetermined portion of the computer system has been detected.
- 12 . The non-transitory computer-readable storage medium of claim 7 , the one or more programs further including instructions for: in accordance with a determination that the detected voice input does not match the authorized voice profile, providing limited access privileges to a second user of the computer system.
- 13 . A method, comprising: at a computer system that is in communication with one or more biometric sensors and one or more input devices that include a voice input device: receiving, via the one or more input devices, a request to unlock the computer system while the computer system is in a locked state; in response to receiving the request to unlock the computer system: in accordance with a determination that a first set of biometric identification criteria is satisfied, wherein the first set of biometric identification criteria is satisfied when a detected biometric feature detected in conjunction with the request to unlock the computer system is consistent with an enrolled biometric feature of a set of one or more enrolled biometric features, transitioning the computer system from the locked state to an unlocked state; and in accordance with a determination that a second set of biometric identification criteria is satisfied without satisfying the first set of biometric identification criteria, wherein the second set of biometric identification criteria is satisfied when the detected biometric feature detected in conjunction with the request to unlock the computer system is partially consistent with an enrolled biometric feature of the set of one or more enrolled biometric features, causing an output of a prompt that indicates that voice input is required to unlock the computer system; after causing the output of the prompt, receiving, via the voice input device, an indication that voice input has been detected; and in response to receiving the indication that voice input has been detected: in accordance with a determination that detected voice input matches an authorized voice profile, transitioning the computer system from the locked state to the unlocked state; and in accordance with a determination that the detected voice input does not match the authorized voice profile, maintaining the computer system in the locked state.
- 14 . The method of claim 13 , wherein: the one or more biometric sensors include one or more microphones; and the detected voice input is detected via the one or more microphones.
- 15 . The method of claim 13 , further comprising: in response to receiving the request to unlock the computer system: in accordance with a determination that the second set of biometric identification criteria and the first set of biometric identification criteria are not satisfied, maintaining the computer system in the locked state without causing the output of the prompt.
- 16 . The method of claim 13 , wherein the prompt includes an instruction to recite a predefined set of words.
- 17 . The method of claim 13 , wherein the second set of biometric identification criteria includes a criterion that is satisfied when a gaze of a user directed toward a predetermined portion of the computer system has been detected.
- 18 . The method of claim 13 , further comprising: in accordance with a determination that the detected voice input does not match the authorized voice profile, providing limited access privileges to a second user of the computer system.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS This application is a continuation of U.S. non-Provisional patent application Ser. No. 17/732,222, entitled “USER INTERFACES FOR AUTHENTICATING TO PERFORM SECURE OPERATIONS,” filed on Apr. 28, 2022, now U.S. Pat. No. 12,216,754, which claims priority to U.S. Provisional Patent Application Ser. No. 63/186,694, entitled “USER INTERFACES FOR AUTHENTICATING TO PERFORM SECURE OPERATIONS,” filed on May 10, 2021, the contents of which is hereby incorporated by reference in its entirety. FIELD The present disclosure generally relates to authentication and, more specifically, to computer user interfaces and techniques for providing one or more alternative authentication methods after a first authentication method (e.g., biometric authentication) is unsuccessful. BACKGROUND Biometric authentication, for instance, of a face, iris, or fingerprint, using electronic devices is a convenient, efficient, and secure method of authenticating users of electronic devices. Biometric authentication allows a device to quickly, easily, and securely verify the identity of any number of users. BRIEF SUMMARY Some techniques for implementing authentication using computer systems (e.g., electronic computing devices), however, are generally cumbersome and inefficient. For example, some existing techniques use a complex and time-consuming user interface, which may include multiple key presses or keystrokes. Existing techniques require more time than necessary, wasting user time and device energy. This latter consideration is particularly important in battery-operated devices. Accordingly, the present technique provides electronic devices with faster, more efficient methods and interfaces for implementing authentication. Such methods and interfaces optionally complement or replace other methods for implementing authentication. Such methods and interfaces reduce the cognitive burden on a user and produce a more efficient human-machine interface. For battery-operated computing devices, such methods and interfaces conserve power and increase the time between battery charges. In accordance with some embodiments, a method performed at a computer system that is in communication with one or more biometric sensors, one or more input devices, and an external accessory device is described. The method comprises receiving, via the one or more input devices, a request to unlock the computer system while the computer system is in a locked state; in response to receiving the request to unlock the computer system: in accordance with a determination that a first set of biometric identification criteria is satisfied, wherein the first set of biometric identification criteria is satisfied when a detected biometric feature detected in conjunction with the request to unlock the computer system is consistent with an enrolled biometric feature, transitioning the computer system from the locked state to an unlocked state; and in accordance with a determination that a second set of biometric identification criteria is satisfied without satisfying the first set of biometric identification criteria, wherein the second set of biometric identification criteria is satisfied when the detected biometric feature detected in conjunction with the request to unlock the computer system is partially consistent with an enrolled biometric feature, causing an output of a prompt that indicates that one or more interactions with the external accessory device can be used to unlock the computer system; and after causing the output of the prompt: in accordance with a determination that the one or more interactions with the external accessory device have been detected, transitioning the computer system from the locked state to the unlocked state; and in accordance with a determination that the one or more interactions with the external accessory device have not been detected, maintaining the computer system in the locked state. In accordance with some embodiments, a non-transitory computer-readable storage medium is described. The non-transitory computer-readable storage medium stores one or more programs configured to be executed by one or more processors of a computer system that is in communication with one or more biometric sensors, one or more input devices, and an external accessory device, the one or more programs including instructions for: receiving, via the one or more input devices, a request to unlock the computer system while the computer system is in a locked state; in response to receiving the request to unlock the computer system: in accordance with a determination that a first set of biometric identification criteria is satisfied, wherein the first set of biometric identification criteria is satisfied when a detected biometric feature detected in conjunction with the request to unlock the computer system is consistent with an enrolled biometric feature, transitioning the computer system from the locked state to an unlocked state;