`
`[19]
`
`[11] Patent Number:
`
`5,963,908
`
`Chadha
`
`[45 J Date of Patent:
`
`Oct. 5, 1999
`
`US005963908A
`
`[54]
`
`SECURE LOGON TO NOTEBOOK OR
`
`[75]
`
`Inventor: Tejpal Chadha, San Jose, Calif.
`
`g
`73 Assi nee:
`
`P
`Intel Cor oration, Santa Clara, Calif.
`
`5,430,827
`5,499,288
`5,623,539
`
`7/1995 Rissanen ............................... .. 704/272
`.. 379/88
`3/1996 Hunt et al.
`................ ..
`
`704/273
`4/1997 Bassenyemnkasa et al.
`
`Primary Examiner—Richemond Dorvil
`Attorney, Agent, or Firm—Blakely, Sokoloff, Taylor &
`Zafman LLP
`
`[22]
`[51]
`[52]
`[58]
`
`[56]
`
`Dec‘ 23’ 1996
`Filed:
`Int. CL6 ...................................................... .. G10L 5/06
`U_S_ CL
`........... N 704/273
`
`Field of Search ..................................... 704/236, 273,
`704/272’ 270’ 275’ 231’ 246’ 250’ 200;
`379/88
`
`References Cited
`
`5,216,720
`5,402,492
`
`U~S~ PATENT DOCUMENTS
`6/1993 Naik et al.
`............................ .. 704/272
`3/1995 Goodman et al.
`...................... .. 380/25
`
`A system and method for controlling user access to stored
`C0111€Ht
`and i{1t€TC0HH€Cli0HS
`10 VaFi011S Sites aCC§SSib1€
`through a publicly accessible network, In one embodiment,
`the Wstem Includes a Cflmpmer héwmg 3. mlcrophone to
`receive analog Voice audio. The Voice audio is filtered and
`digitized to produce a digital Voice pattern. The digital Voice
`pattern is compared to a master digital voice pattern. If
`successful, the amount of access afforded to a requesting
`user is determined based on the priority level of master
`digital Voice pattern.
`
`15 Claims, 4 Drawing Sheets
`
`160
`
`|—VOICE c7x$ru7zEc1EEZ/1r— '7 -7 7- _01GHLV
`
`140
`
`
`
`BIOMETRIC
`
`VOICE
`
`L
`
`130
`
`
`
`MEMOR Y
`
`ELEMENT
`
`
`
`
`1
`
`Samsung v. IXI
`IPRZO15-01444
`Exhibit 1017
`
`1
`
`Samsung v. IXI
`IPR2015-01444
`Exhibit 1017
`
`
`
`8
`
`WSmzmm
`
`a$43:05:.%NDE
`
`
`
`5m$§8umm~%mm~ml:1I|InInI.llI::_95%
`
`Q:
`
`....G~§
`
`tnBtaPQMU
`
`99H5,m0
`
`1whS
`
`4§M$2
`
`2
`
`2
`
`
`
`
`5,963,908
`
`
`
`U.S. Patent
`
`Oct. 5, 1999
`
`Sheet 2 of4
`
`205
`
`ELECTRONIC
`
`
`
`5 Y5TEM
`
` START-UP or
`
`
`
`
`AC77VA TE MICROPHONE
`
`TO CJ4P7'URE VOICE AUDIO
`
` 215
`
`TO PRODUCE
`
`F71. TERED AUDIO
`
`
`
`
`TRANSFORM ANALOG
`220
`FIL 75/250 A UDIO INTO A
`
`
`
`DIGITAL VOICE PA TTER/V
`
` COMPARE DIGITAL VOICE
`PA 775/z/v T0 MASTER
`
`225
`
`DIGITAL VOICE
`
`PA 7TERA/(S)
`
`FIL TER VOICE AUDIO
`
`
`
`3
`
`
`
`U.S. Patent
`
`Oct. 5, 1999
`
`Sheet 3 of4
`
`5,963,908
`
`FROM 225
`
`230
`
`
`
`COMPARISON
`
`.7
` ELECTRONIC
`
`SYSTEM
`
`
`
`
`SHUT-DOWN
`
`PROVIDE ACCESS
`
`TO STORED
`
`CONTENTS
`
`240
`
` RESTRICTED
`ACCESS TO SITES ON
`
`PUBLICL YA CCESSIBLE
`
`NETWORK {< THRESHOLD
`PRIORTY)
`.7
`
`
`
`RESTRICTED OR
`
`
`LIMITED ACCESS
`TO NETWORK
`
` UNLIMITED ACCESS
`
`
`
`TO NETWORK 250
`
`FIG. 3b
`
`4
`
`
`
`QMU
`
`tHBtaD1
`
`.0"O
`
`WE59
`
`4M4whS
`
`809.,3699
`
`5$33TQ
`
`QNN5$.36
`
`5
`
`5
`
`
`
`5,963,908
`
`1
`SECURE LOGON TO NOTEBOOK OR
`DESKTOP COMPUTERS
`BACKGROUND OF THE INVENTION
`1. Field of the Invention
`
`The present invention relates to the field of data security.
`More particularly, the present invention relates to a system
`including biometric circuitry which, upon verification that
`voice audio is from an authorized user, permits access stored
`contents within the computer and various sites on a publicly
`accessible network.
`
`2. Description of Art Related to the Invention
`Currently, there have been many security mechanisms
`that can be used to protect data stored within a laptop or
`desktop computer. For example, one widely-used security
`mechanism involves an alphanumeric, password-based pro-
`gram normally stored on a hard disk drive of the computer.
`This program may be part of the Operating System (“OS”).
`Upon being executed after power-up of the computer, the
`password-based program causes a message to be displayed
`on a display screen of the computer. This message prompts
`the user to input a correct alphanumeric password before
`data access is granted. The password is normally input into
`the computer by depressing selected keys of its keyboard.
`Over the last few years, several disadvantages associated
`with the use of alphanumeric, password-based programs
`have been realized. One disadvantage is that this type of
`security mechanism can be easily circumvented through
`repeated attempts to uncover the correct password. This
`circumvention can be facilitated through the assistance of a
`random sequence generation program continuously gener-
`ating various alphanumeric combinations. Another disad-
`vantage is that alphanumeric password-based systems
`become less effective because passwords tend to be used for
`long periods of time, and thus, are learned by others through
`normal course of business or family life.
`In addition to protecting stored content (e.g., data) of the
`computer,
`there is a growing need for persons, namely
`parents, to preclude minors from gaining access to various
`web sites accessible by Internet Service Providers (e.g.,
`AMERICA ON-LINETM) to which they believe are not
`suitable for viewing by their child. In fact, there are addi-
`tional needs to protect their child from accessing various
`“chat lines” to prevent possibly unwanted persons from
`communicating with their child. Currently, there are current
`versions of Browser programs (e.g., Netscape 3.0”‘ pro-
`vided by Netscape Communications Corporation of Moun-
`tain View, Calif., and IETM from Microsoft Corporation of
`Redmond, Wash.) which require password logon. Likewise,
`there exist additional utilities, such as Net Nanny” having
`a web page at “www.NetNanny.com,” which allows parents
`to restrict the use of Internet
`to certain sites by forcing
`minors/children to enter their password when going to a site
`that is not authorized for under 18 years of age. However,
`there is no mechanism to offer such protection alone or in
`combination with protecting stored content of the computer
`through a secure, biometric mcchanism.
`Therefore, it would be advantageous to develop a system
`that includes biometric circuitry that analyzes a voice pattern
`of the user to verify whether the user has access to stored
`content of the computer, and in addition, to regulate access
`to various web sites on a publicly accessible network based
`on the priority assigned to the user.
`SUMMARY OF THE INVENTION
`
`The present invention relates to a system and method for
`controlling user access to stored content and interconnec-
`
`2
`tions to various sites accessible through a publicly accessible
`network. In one embodiment, this method may include the
`following operational steps. First, a voice audio spoken by
`a requesting user to received in an analog form by the
`system. The system transforms the analog voice audio into
`a digital voice pattern for use in comparison with one or
`more master digital voice patterns. After a successful com-
`parison is performed, a determination is made as to whether
`a priority level, assigned to the master digital voice pattern,
`is lesser in priority than a predetermined priority level. If so,
`the requesting user’s access to various sites accessible
`through a publicly accessible network is partially or com-
`plctcly rcstrictcd as well as possibly access to various storcd
`contents. Otherwise,
`the requesting user has unlimited
`access to stored content and sites accessible through the
`publicly accessible network.
`
`BRIEF DESCRII"I‘ION OF THE DRAWINGS
`
`The features and advantages of the present invention will
`become apparent from the following detailed description of
`the present invention in which:
`FIG. 1 is an illustrative block diagram of a personal
`computer includes biometric circuitry that regulates access
`to a computer.
`FIG. 2 is a block diagram of an embodiment of the voice
`capture circuit used to capture voice audio to produce a
`digital voice pattern for comparison with one or more master
`digital voice patterns.
`FIGS. 3A and 3B is an illustrative flowcharts of the
`operations of the electronic system of FIG. 1 in order to
`control access to stored content within that electronic system
`as well as various web sites.
`
`5
`
`10
`
`15
`
`25
`
`30
`
`35
`
`FIG. 4 is an illustrative perspective view of another
`embodiment of the present invention.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`The present invention relates to an electronic system and
`method for internally performing biometric operations to
`verify (authenticate or identify) an individual before allow-
`ing him or her access to stored content within the electronic
`system as well as access to various sites on a publicly
`accessible network including, but not limited to one or more
`Wide Area Network(s). In the following description, some
`terminology is used herein to discuss certain well-known
`functionality. For example, an “electronic system” is a
`personal computer (e.g., a laptop or desktop computer), or
`other electronic hardware capable of processing data such as
`a facsimile machine, printer and the like. “Voice audio” is
`sound in an analog format produced by a person talking. A
`“digital voice pattern” is defined as voice audio digitized
`into a predetermined number of bits used during calculations
`in authenticating or identifying whether the voice audio
`originating from an authorized user. A “site” is a unique
`location along a publicly accessible network such as the
`Internet.
`
`In the present invention, access to stored contents of the
`electronic system and certain sites may be controlled by
`implementing biometric-related circuitry within the elec-
`tronic system in order to conduct voice recognition in
`accordance with well-known verification techniques such as
`user authentication or user identification. Under a user
`
`authentication technique, voice audio from the requesting
`user is captured and subsequently compared with a pre-
`stored master digital voice pattern assigned to the requesting
`
`6
`
`
`
`5,963,908
`
`3
`user. Under a user identification technique, however, there is
`no previous identification by the person seeking access to
`the electronic system; instead, digital voice pattern(s) until
`a successful comparison is detected or all of the pre-stored
`master digital voice pattern(s) have been checked without a
`successful comparison being detected. This reliance on
`voice pattern attributes of the user for verification purposes
`mitigates the likelihood of an unauthorized user gaining
`access to stored contents of the electronic system. However,
`other types of biometric access control systems (e.g., fin-
`gerprint or retinal scanners) may be utilized; however, they
`may be costly to implement on typical desktops and/or
`notebooks.
`
`10
`
`4
`contained within a memory element 180 connected to the
`biometric device 140. The memory element 180 may include
`non-volatile memory (e.g., Random Access Memory
`“RAM”, Erasable Programmable Read-Only Memory
`“EPROM”, Electrically Erasable Programmable Read-Only
`Memory “EEPROM”, etc.) whose contents can be easily
`updated.
`Referring now to FIGS. 3A and 3B, the operational steps
`performed by the electronic system to authenticate or iden-
`tify a requesting user of the electronic system is shown. In
`Step 205, typically after start-up of the electronic system
`based on one or more actions by the requesting user (e.g.,
`depressing a key, flipping a switch or touching a selected
`portion of a “touch screen”), the electronic system may be
`configured to activate the microphone to capture audio for a
`predetermined period of time (Step 210). Optionally,
`a
`prompt message may be displayed on the display monitor
`requesting the user to speak into the microphone of the PC
`(not shown). Upon capturing voice audio for the predeter-
`mined period of time, the microphone routes the voice audio
`to computational circuitry that initially filters the voice audio
`to eliminate noise and focus on unique frequencies of the
`voice audio through use of FFT, and that transforms the
`filtered audio into a digital voice pattern (Steps 215-220).
`Thereafter, the digital voice pattern is compared with one or
`more master digital voice pattern(s), depending on whether
`a user authentication or user identification technique is
`employed (Step 225). If no comparison is detected,
`the
`electronic system may be shut-down by any conventional
`manner such as, for example, disabling
`the host processor
`contained in the electronic system, (ii) biometric device or
`(iii) circuitry controlling power distribution within the elec-
`tronic system (Steps 230 and 235).
`Otherwise, upon successful comparison, the requesting
`user is provided access to the electronic system (Step 240).
`However, the access may be restricted based on the priority
`of the master digital voice pattern matching the digital voice
`pattern (Step 245). If the master digital voice pattern has a
`priority level greater than a threshold priority, when execut-
`ing a Browser program, the requesting user will be given
`unlimited access to all web sites located on the Internet (Step
`250). However, if the master digital voice pattern has a
`priority level less than the threshold level, when executing
`the Browser program, the requesting user may be precluded
`from interconnecting with various web sites or even limited
`access to connect to only certain authorized web sites (Step
`255).
`It
`is contemplated that preclusion may be easily
`adapted to current versions of Browser programs as now
`performed by Netscape Communications Corporation and
`Microsoft Corporation. It is further contemplated that the
`master digital voice pattern may be assigned a priority level
`based on its address location within the non-volatile memory
`and that a staggered scale of multiple priority levels may be
`used so that older children may be give more access to the
`Internet than younger children.
`Referring to FIG. 4, another embodiment of the electronic
`system is shown in which the user identification technique is
`utilized. The operations of the two types of electronic
`systems are similar. However, the electronic system 300 is
`interconnected to a centralized database 310 to download a
`
`number of master digital voice patterns into memory (not
`shown) for temporary buffering storage or storage for a
`longer duration. It is contemplated that a communication
`line 320 between the electronic system 300 and the central-
`ized database 310 is secure through cryptographic schemes
`such as symmetric key cryptography or public/private key
`cryptography.
`
`Referring to FIG. 1, an illustrative embodiment of an
`electronic system 100 implemented with biometric circuitry
`to control access to stored content of the electronic system,
`or access to certain sites of a publicly accessible network
`(e.g., web site on the Internet) through an interconnection
`program (e .g., a Browser program) is shown. For illustrative
`purposes, however, the electronic system 100 is portrayed as ,
`a laptop personal computer (“PC”).
`As shown, the electronic system 100 comprises a display
`monitor 110 and a transceiver device 120 (e.g., a modem,
`fax/modem card, Network Interface Circuit (“NIC”) Card,
`etc.) which may be implemented within a casing 150 of the
`electronic system 100 (not shown) or external to the casing
`150 as shown. The electronic system 100 further comprises
`a plurality of input devices 1301-130” (“n” being a positive
`whole number, n>1). These input devices 1301-130" include
`an alphanumeric keyboard 1301, cursor control device 1302
`(e.g., a mouse, touch pad, trackball, joystick, ThinkpadTM,
`etc.) and a microphone 1303. It is contemplated that other
`input devices may be used such as a numeric keypad, a credit
`card reading device and the like.
`In this embodiment, a biometric device 140 is enclosed
`within the casing 150 of the electronic system 100 and is
`electrically interconnected to receive information captured
`by a voice capture circuit 160. It is contemplated that the
`biometric device 140 may include, but is not limited to a host
`processor of the electronic system 100 executing voice
`comparison software or a separate application specific inte-
`grated circuit (“ASIC”) performing the voice comparison
`independent of the host processor, or any other device
`capable of processing data (e.g., a controller, state machine,
`and the like). It is further contemplated that the biometric
`device 140 may be positioned within an input device (not
`shown) physically outside the casing 150.
`As shown in FIG. 2, the voice capture circuit 160 includes
`the microphone 1303 and computational circuitry 170. As a
`result, the voice capture circuit 160 captures voice audio.
`More specifically, the microphone 1303 obtains analog audio
`signals (e.g., voice audio) and the computational circuitry
`170 appropriately filters the analog audio signals through the
`use of, for example, a Fast Fourier Transform (“FFT”) to
`obtain unique portions of voice audio. This filtering may be
`performed by hardware wired to perform the FFT function,
`or more likely, hardware executing a FFT program. This
`hardware may include, but
`is not solely limited to an
`application specific integrated circuit (ASIC). The compu-
`tational circuitry 170 further includes analog-to-digital (“A/'
`D”) conversion circuitry (e.g., an A/D converter or logic
`gates collectively performing A/D conversion) which trans-
`forms the unique, filtered portions of voice audio into a
`digital voice pattern. Thereafter, the digital voice pattern is
`input into the biometric device 140.
`The biometric device 140 compares the digital voice
`pattern with one or more master digital voice patterns
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`7
`
`
`
`5,963,908
`
`5
`While this invention has been described with reference to
`illustrative embodiments, this description is not intended to
`be construed in a hmiting sense. Various modifications of the
`illustrative embodiments, as well as other embodiments of
`the invention, which are apparent to persons skilled in the art
`to which the invention pertains, are deemed to lie within the
`spirit and scope of the invention.
`What is claimed is:
`1. An electronic system comprising:
`a microphone to receive audio in an analog format;
`computational circuitry coupled to the microphone, the
`computational circuitry to filter the audio to produce a
`filtered audio,
`the filtered audio subsequently being
`used to produce a digital voice pattern; and
`a biometric device coupled to the computational circuitry,
`the biometric device including circuitry to receive the
`digital voice pattern as an input, to compare the digital
`voice pattern with a master digital voice pattern, and if
`matching, to provide limited access to a publicly acces-
`siblc network by allowing access to a predetermined
`group of web sites when the master digital voice pattern
`has a priority level equal to or greater than a predeter-
`mined priority level and by excluding access to the
`predetermined group of web sites when master digital
`voice pattern has a priority level lower than the prede-
`termined priority level.
`2. The electronic system according to claim 1, wherein the
`computational circuitry includes filtering hardware to per-
`form a Fast Fourier Transformation on the audio to produce
`the filtered audio.
`3. The electronic system according to claim 2, wherein the
`computational circuitry further includes an analog-to-digital
`converter to transform the filtered audio into the digital
`voice pattern.
`4. The electronic system according to claim 1 f11rther
`comprising a memory clcmcnt coupled to the biometric
`device, the memory element to contain at least the master
`digital voice pattern.
`5. The electronic system according to claim 1, wherein the
`biometric device includes an application specific integrated
`circuit.
`6. An electronic system comprising:
`a microphone to receive audio in an analog format;
`computational circuitry coupled to the microphone, the
`computational circuitry to filter the audio to produce a
`filtered audio,
`the filtered audio subsequently being
`used to produce a digital voice pattern; and
`a biometric device coupled to the computational circuitry,
`the biometric device to limit access to a publicly
`accessible network by preventing access to at least one
`web site associated with the publicly accessible net-
`work when a master digital voice pattern either differs
`from the digital voice pattern or has a priority level and
`allows full access to the publicly accessible network
`when the priority level of the master digital voice
`pattern is at least equal to the predetermined priority
`level.
`7. The electronic system according to claim 6, wherein the
`computational circuitry includcs filtcring hardware, the fil-
`
`6
`tering hardware being used to perform a Fast Fourier Trans-
`formation on the audio to produce the filtered audio.
`8. The electronic system according to claim 7, wherein the
`computational circuitry further includes analog-to-digital
`conversion circuitry to transform the filtered audio into the
`digital voice pattern.
`9. The electronic system according to claim 7 further
`comprising a memory element coupled to the biometric
`device, the memory element being used to contain at least
`the master digital voice pattern.
`10. The electronic system according to claim 6, wherein
`the biometric device includes a host processor.
`11. An clcctronic system comprising:
`audio input means for receiving audio;
`computc means for filtcring the audio to produce a filtcrcd
`audio subsequently being digitized to produce a digital
`voice pattern, the compute means being coupled to the
`audio input means;
`biometric means for receiving a master digital voice
`pattern and the digital voice pattern as inputs,
`for
`performing a comparison between the digital voice
`pattern and the master digital voice pattern, for ana-
`lyzing a priority level assigned to the master digital
`voice pattern, and for limiting access to a publicly
`accessible network by precluding access to at least one
`web site while still allowing access to the publicly
`accessible network when the digital voice pattern is not
`substantially identical
`to the master digital voice
`pattern,
`the biometric means being coupled to the
`compute means.
`12. The electronic system according to claim 11, wherein
`the biometric means further for precluding access to the at
`least one web site when the priority level is less than a
`predetermined threshold level.
`13. The electronic system according to claim 12, wherein
`the compute means includes filtering hardware being used to
`perform a Fast Fourier Transformation on the audio to
`produce the filtered audio.
`14. A method for regulating access by an electronic
`system to a plurality of web sites accessible through a
`publicly accessible network, comprising:
`comparing a digital voice pattern with a master digital
`voice pattern;
`determining a priority level assigned to the master digital
`voice pattern when a successful comparison is per-
`formed; and
`limiting access to a publicly accessible network by pre-
`cluding the requesting user from accessing at least one
`web site of the plurality of web sites accessible through
`publicly accessible network when the priority level is
`less than a priority threshold level while still allowing
`access to the remaining web sites.
`15. The method of claim 14 further comprising:
`capturing a voice audio associated with a requesting user;
`and
`
`transforming the voice audio in an analog format into a
`digital voice pattern.
`
`10
`
`15
`
`,
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`8