WEARABLE CAMERA SYSTEMS AND METHODS FOR AUTHENTICATING IDENTITY

作者: Shashua Amnon , Wexler Yonatan

DOI:

关键词: Identity (object-oriented programming)Wearable computerComputer scienceOperation modeRadiation exposureComputer hardware

摘要: Systems and methods may authenticate an identity of a wearer wearable device manage radiation exposure device. In one implementation, include housing configured to be worn by the at least sensor in housing. The generate output indicative aspect environment wearer. processor programmed to: alternatively operate unrestricted operation mode restricted mode; detect, based on generated sensor, whether is authenticated with device; after detects that

参考文章(9)
Lenitra M. Durham, Kathy Yuen, Daniel S. Lake, Giuseppe Raffa, John C. Weast, Glen J. Anderson, Authentication through tissue-conducted sound ,(2014)
Xiaogang Jiao, Yuan Gao, Xiaohui Pi, Method, apparatus and system for controlling emission ,(2015)
Alexander Oganezov, Shamim Begum, Skin texture-based authentication ,(2015)
James Park, Atiyeh Ghoreyshi, Shelten Gee Jao Yuen, User identification via collected sensor data from a wearable fitness monitor ,(2016)