Authentication rules for locked and unlocked states

Aspects of the present disclosure include systems and methods for generating and managing user authentication rules of a computing device. In an example, a computing device may include a memory storing instructions and a processor communicatively coupled with the memory and configured to execute the...

Full description

Saved in:
Bibliographic Details
Main Authors McIntyre, Craig Thomas, Ismail, Ibrahim Mohammad, Kukreja, Pranav, Zhang, Jing, Rueda, Guillermo Enrique, Ide, Nathan Jeffrey, Rawat, Anshul, Davis, Peter Gregory
Format Patent
LanguageEnglish
Published 12.12.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Aspects of the present disclosure include systems and methods for generating and managing user authentication rules of a computing device. In an example, a computing device may include a memory storing instructions and a processor communicatively coupled with the memory and configured to execute the instructions. The processor may determine a state of the computing device, wherein the state of the computing device is one of a locked state or an unlocked state. The processor may determine a user authentication rule corresponding to the state of the computing device. The processor may also identify whether a combination of signals associated with the user authentication rule of the computing device are received by the computing device. The processor may also change or maintain the state of the computing device based on the combination of signals being received.
Bibliography:Application Number: US202217647382