Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SELECTING DATA ITEMS USING BIOMETRIC FEATURES
Document Type and Number:
WIPO Patent Application WO/2019/159166
Kind Code:
A1
Abstract:
A method, apparatus and computer program product for biometric-based encryption and selection of user-associated data items. A biometric feature of a user, such as a fingerprint, is obtained. Based on the biometric feature, a data item is selected from a plurality of data items of the user, wherein each item in the plurality of data items of the user is associated with a different biometric feature and potentially encrypted thereby. The data item is used, such as in a program. The encrypted data item is decrypted using the biometric feature prior to being used.

Inventors:
SHILO RONEN (IL)
Application Number:
PCT/IL2019/050170
Publication Date:
August 22, 2019
Filing Date:
February 13, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SHILO RONEN (IL)
International Classes:
G06F21/31; G06F21/32
Foreign References:
US20160378966A12016-12-29
JP2018005521A2018-01-11
US20100134248A12010-06-03
Attorney, Agent or Firm:
GLAZBERG, Ziv (IL)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when read by a processor, cause the processor to perform: 5 obtaining a biometric feature of a user;

selecting a data item from a plurality of data items, wherein each item in the plurality of data items is associated with a different biometric feature, wherein said selecting the data item is based on the biometric feature of the user; and 10 using the data item in a program as part of an operation, wherein the program is executed by the processor, wherein the operation depends on a current context of the program, whereby different results are achieved for a same data item in different contexts of the program.

2. The computer program product of Claim 1, wherein the plurality of data items are 15 encrypted, wherein each item in the plurality of data items is encrypted using the different biometric feature of the user, wherein the program instructions are further configured to cause the processor to decrypt the data item using the biometric feature.

3. The computer program product of Claim 1, wherein the current context of the 20 program having a location in a display, wherein the location in the display is determined using a user input preceding a user input utilized in said obtaining the biometric feature of the user, whereby said using the data item is performed so as to modify the display at the location in the display .

4. The computer program product of Claim 1, wherein the current context of the 25 program is a context of filling a form in the program, wherein the context of filling the form, comprises displaying to the user a form to be filled by the user, wherein the form to be filled comprises a plurality of input fields, wherein said using comprises utilizing the data item to fill one or more of the plurality of input fields in the form, whereby the form is filled, at least in part, automatically instead of 30 manually, whereby using different biometric features of the user, different data is filled in to the form.

5. The computer program product of Claim 1, wherein the current context is a context of pasting data, wherein a location where data is pasted to is determined based on a user action preceding a user action used in said obtaining the biometric feature, wherein said using comprises pasting the data item to the location, whereby using different biometric features of the user, different data is pasted . 5

6. The computer program product of Claim 1, wherein the plurality of data items are associated with the current context of the program, whereby using the same biometric feature of the user yields different data items in different contexts .

7. The computer program product of Claim 1, wherein biometric feature is a feature extracted from a fingerprint of the user. 10

8. The computer program product of Claim 1, wherein said obtaining is performed

using an input device capable of obtaining the biometric feature from a fingerprint of the user.

9. The computer program product of Claim 8, wherein said using comprises using the data item in a location in a display, wherein the location in the display is 15 determined without using the input device capable of obtaining the biometric feature that is used in said obtaining the biometric feature of the user .

10. The computer program product of Claim 1, wherein the plurality of data items comprises: alternative credit card or debit card information of the user, wherein each alternative card information is selected based on the user providing a different 20 body part from which the biometric feature is extracted.

11. The computer program product of Claim 1, wherein the plurality of data items comprises: alternative login information of the user, wherein each login information is selected based on the user providing a different body part from which the biometric feature is extracted. 25

12. The computer program product of Claim 1, wherein the plurality of data items comprises: alternative signatures of the user, wherein each signature is selected based on the user providing a different body part from which the biometric feature is extracted, wherein the current context of the program is a context of composing a communication, wherein the communication ends with a human-readable 30 signature of a composing user of the communication .

13. The computer program product of Claim 1, wherein said obtaining the biometric feature comprises obtaining the biometric feature from an input device that is configured to indirectly interact with a graphical user interface of the program.

14. The computer program product of Claim 1, wherein said obtaining, selecting and

using are performed on a first device, wherein the first device comprising the 5 peripheral device for obtaining the biometric feature of the user, wherein the data item is set to be associated with the biometric feature of the user on a second device that is operated by the user.

15. The computer program product of Claim 14, wherein the data item is set to be associated with the biometric feature of the user by the user. 10

16. A method comprising:

obtaining user input causing a program in a mobile device to change context from a first context into a second context, wherein in the second context, information is to be inputted by a user;

in response to the user providing a fingerprint sample, comparing the 15 fingerprint sample against a set of pre-existing fingerprint samples of the user, wherein each pre-existing fingerprint sample corresponds a data item;

in response to matching the fingerprint sample with a pre-existing fingerprint sample, retrieving a data item corresponding the pre-existing fingerprint sample; and 20 inputting the data item in the second context of the program, wherein said inputting is affected by the second context, whereby different results are achieved for a same data item in different contexts.

17. The method of Claim 16 ,

wherein each pre-existing fingerprint sample corresponds an encrypted data 25 item, wherein the encrypted data item is encrypted using the corresponding pre existing fingerprint sample of the user;

wherein the method further comprises decrypting the data item using the fingerprint sample, whereby obtaining a decrypted data;

wherein said inputting the data item comprises inputting the decrypted data. 30

18. A computerized apparatus comprising:

a peripheral device for obtaining a biometric feature of a user; a memory retaining a plurality of data items, wherein each item in the plurality of data items is associated with a different biometric feature;

a processor configured to select a data item from the plurality of data items, wherein the selection is based on the biometric feature; and

wherein said processor is further configured to utilize the data item based 5 on a current context of the computerized apparatus, whereby different results are achieved for a same data item in different contexts of the computerized apparatus.

19. The computerized apparatus of Claim 18, wherein the plurality of data items are encrypted, wherein each item in the plurality of data items is encrypted using the 10 different biometric feature of the user, wherein said processor is further configured to decrypt the data item using the biometric feature.

20. The computerized apparatus of Claim 18, wherein the plurality of data items are associated with a current context of the computerized apparatus, whereby using the same biometric feature of the user yields different data items in different contexts . 15

21. The computerized apparatus of Claim 18, wherein the plurality of data items comprises at least one of:

alternative credit card or debit card information of the user, wherein each alternative card information is selected based on the user providing a different body part from which the biometric feature is extracted; 20 alternative login information of the user, wherein each login information is selected based on the user providing a different body part from which the biometric feature is extracted; and

alternative signatures of the user to be provided in a human-readable form as part of a communication composed by the user, wherein each signature is 25 selected based on the user providing a different body part from which the biometric feature is extracted .

22. The computerized apparatus of Claim 18, wherein the plurality of data items are set to be associated with different biometric features by the user using a second device, wherein the second device comprises a second peripheral device for 30 obtaining a biometric feature of a user using the second device, whereby data is shared between the second device and the computerized apparatus based on a user action in the second device, and whereby the user is capable of utilizing shared data in the computerized apparatus.

23. The computerized apparatus of Claim 22, wherein the computerized apparatus is a mobile device and the second device is a second mobile device.

24. The computerized apparatus of Claim 22, wherein the computerized apparatus is a 5 device mounted on or installed in a vehicle, wherein the second device is a mobile device of the user.

25. A computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when 10 read by a processor, cause the processor to perform:

obtaining a biometric feature of a user;

selecting an encrypted data item from a plurality of encrypted data items, wherein the plurality of encrypted data items is associated with the user, wherein each item in the plurality of encrypted data items is encrypted using a 15 different biometric feature of the user, wherein said selecting the data is based on the biometric feature of the user;

decrypting the encrypted data item using the biometric feature of the user, whereby obtaining a decrypted data item;

using the decrypted data item in a program executed by the processor. 20

26. The computer program product of Claim 25, wherein said using the decrypted data item in the program comprises inputting the decrypted data item in a location in a display, wherein the location in the display is determined based on a user input preceding a user input utilized in said obtaining the biometric feature of the user.

27. The computer program product of Claim 25, wherein said using the decrypted data 25 item in the program comprises using the decrypted data item to fill fields in a form, wherein the form is presented in a display by the program, wherein the form is used to receive input from the user in a plurality of fields that comprise the fields, whereby using different biometric features of the user, different encrypted data is used to fill the form. 30

28. The computer program product of Claim 25, wherein said using the decrypted data item in the program comprises pasting the decrypted data to a location, wherein the location where data is pasted to is determined based on a user action preceding a user action used in said obtaining the biometric feature, whereby using different biometric features of the user, different data is pasted.

29. The computer program product of Claim 25, wherein the biometric feature of the user is a feature extracted from a fingerprint of the user.

30. The computer program product of Claim 25, wherein said obtaining is performed 5 using an input device capable of obtaining the biometric feature from a fingerprint of the user.

31. The computer program product of Claim 30, wherein said using comprises using the decrypted data item in a location in a display, wherein the location in the display is determined using a user input preceding said without using the input 10 device capable of obtaining the biometric feature that is using in said obtaining the biometric feature of the user.

32. The computer program product of Claim 25, wherein the plurality of encrypted data items comprises: alternative credit card or debit card information of the user, wherein each alternative card information is selected based on the user providing a 15 different body part from which the biometric feature is extracted.

33. The computer program product of Claim 25, wherein the plurality of encrypted data items comprises: alternative login information of the user, wherein each login information is selected based on the user providing a different body part from which the biometric feature is extracted. 20

34. The computer program product of Claim 25, wherein the plurality of encrypted data items comprises: alternative signatures of the user, wherein each signature is selected based on the user providing a different body part from which the biometric feature is extracted, wherein said the decrypted data item comprising inputting a signature selected from the alternative signatures in a human-readable 25 form within a user-edited communication.

35. The computer program product of Claim 25, wherein said obtaining the biometric feature comprises obtaining the biometric feature from an input device that is configured to indirectly interact with a graphical user interface of the program.

36. The computer program product of Claim 25, wherein said obtaining, selecting and 30 using are performed on a first device, wherein the first device comprising the peripheral device for obtaining the biometric feature of the user, wherein a second device is used to set the encrypted data item to be associated with the biometric feature of the user.

37. The computer program product of Claim 25, wherein said obtaining the biometric feature comprises obtaining the biometric feature from an input device that is configured to indirectly interact with a graphical user interface of the program. 5

38. The computer program product of Claim 25, wherein said obtaining, selecting and

using are performed on a first device, wherein the first device comprising the peripheral device for obtaining the biometric feature of the user, wherein a second device is used to set the encrypted data item to be associated with the biometric feature of the user. 10

39. A method performed by a user device, the method comprising:

in response to the user providing a fingerprint sample, comparing the fingerprint sample against a set of pre-existing fingerprint samples of the user, wherein each pre-existing fingerprint sample corresponds an encrypted data 15 item and encrypted thereby;

in response to matching the fingerprint sample with a pre-existing fingerprint sample, retrieving an encrypted data item corresponding the pre existing fingerprint sample;

decrypting the encrypted data item corresponding the pre-existing 20 fingerprint sample using the fingerprint sample, whereby obtaining a decrypted data item; and

using the decrypted data item by the user device.

40. The method of Claim 39, wherein said using the decrypted data item comprises inputting the decrypted data item in a location in a display, wherein the location in 25 the display is determined based on a user input preceding a user input providing the fingerprint sample.

41. The method of Claim 39, wherein said using the decrypted data item comprises using the decrypted data item to fill fields in a form, wherein the form is presented in a display by the user device, wherein the form is used to receive input from the 30 user in a plurality of fields that comprise the fields, whereby using different biometric features of the user, different encrypted data is used to fill the form.

42. The method of Claim 39, wherein said using the decrypted data item comprises pasting the decrypted data to a location, wherein the location where data is pasted to is determined based on a user action preceding a user action providing the fingerprint sample, whereby using different biometric features of the user, different data is pasted. 5

43. A method performed by a user device, the method comprising:

obtaining a biometric feature of a user;

selecting from a plurality of alternative cards information of the user, a selected card information based on the biometric feature, wherein each card 10 information in the plurality of alternative cards information of the user is associated with a different biometric feature of the user, wherein each card information in the plurality of alternative cards information is information about a credit card or debit card information of the user; and

inputting the selected card information as part of an operation of the user 15 device.

44. A method performed by a user device, the method comprising:

obtaining a biometric feature of a user;

selecting from a plurality of alternative login credentials of the user, a selected login credential based on the biometric feature, wherein each login 20 credential in the plurality of alternative login credentials of the user is associated with a different biometric feature of the user; and

using the selected login credential in the user device to perform a login operation.

45. The method of Claim 44, wherein each login credential comprises a password and 25 a user name, wherein said using comprises: inputting the user name of the selected login credential and inputting the password of the selected login credential.

46. A computerized apparatus comprising:

a peripheral device for obtaining a biometric feature of a user;

a memory retaining a plurality of encrypted data items, wherein each item 30 in the plurality of encrypted data items is associated with a different biometric feature and encrypted thereby; a processor configured to select an encrypted data item from the plurality of encrypted data items, wherein the selection is based on the biometric feature; and

wherein said processor is further configured to decrypt the encrypted data item using the biometric feature, whereby obtaining a decrypted data item; and 5 wherein said processor is further configured to utilize the decrypted data item.

47. A computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when 10 read by a processor, cause the processor to perform:

obtaining a biometric feature of a user;

obtaining a current context of a computerized device used by the user;

selecting a data item from a plurality of data items, each of which is associated with a biometric feature of the user and a context of the 15 computerized device, wherein said selecting the data item is based on the biometric feature of the user and on the current context, whereby using the same biometric feature of the user yields different data items in different contexts; and

using the data item in the computerized device to perform an operation. 20

48. The computer program product of Claim 47, wherein the current context of the computerized device is a context of a program executed by the computerized device.

49. The computer program product of Claim 47, wherein the current context of the computerized device is a context of a program executed by the computerized 25 device.

50. The computer program product of Claim 47, wherein the plurality of data items are encrypted, wherein each item in the plurality of data items is encrypted using the different biometric feature of the user, wherein the program instructions are further configured to cause the processor to decrypt the data item using the biometric 30 feature.

51. The computer program product of Claim 47, wherein the current context of the computerized device comprises a location in a display of the computerized device, wherein the location in the display is determined using a user input preceding a user input utilized in said obtaining the biometric feature of the user, whereby said using the data item is performed so as to modify the display at the location in the 5 display.

52. The computer program product of Claim 47, wherein the current context of the computerized device is a context of filling a form, wherein the context of filling the form comprises displaying to the user a form to be filled by the user, wherein the form to be filled comprises a plurality of input fields, wherein said using 10 comprises utilizing the data item to fill one or more of the plurality of input fields in the form, whereby the form is filled, at least in part, automatically instead of manually.

53. The computer program product of Claim 47, wherein the current context is a context of pasting data, wherein a location where data is pasted to is determined 15 based on a user action preceding a user action used in said obtaining the biometric feature, wherein said using comprises pasting the data item to the location.

54. The computer program product of Claim 47, wherein biometric feature is a feature extracted from a fingerprint of the user.

55. The computer program product of Claim 47, wherein said obtaining is performed 20 using an input device capable of obtaining the biometric feature from a fingerprint of the user, wherein the input device is operatively coupled to the computerized device.

56. The computer program product of Claim 55, wherein said using comprises using the data item in a location in a display, wherein the location in the display is 25 determined without using the input device that is used in said obtaining the biometric feature of the user.

57. The computer program product of Claim 47, wherein the plurality of data items comprises at least two data items of the following:

a credit card or debit card information of the user; 30 a login information of the user;

a signature of the user; and a clipboard content;

wherein each of the at least two items is associated with a different context and a same biometric feature, whereby based on different context, the same biometric feature yields a data item of a different type.

58. The computer program product of Claim 47, wherein said obtaining the biometric 5 feature comprises obtaining the biometric feature from an input device that is configured to indirectly interact with a graphical user interface of a program executed by the computerized device.

59. The computer program product of Claim 47, wherein said obtaining, selecting and using are performed on the computerized device, wherein the computerized device 10 comprising the peripheral device for obtaining the biometric feature of the user, wherein the data item is set to be associated with the biometric feature of the user on a second device that is operated by the user.

60. The computer program product of Claim 59, wherein the data item is set to be associated with the biometric feature of the user by the user. 15

61. A method comprising :

obtaining user input causing a program in a mobile device to change context from a first context into a second context, wherein in the second context, information is to be inputted by a user; 20 in response to the user providing a fingerprint sample, comparing the fingerprint sample against a set of pre-existing fingerprint samples of the user, wherein each pre-existing fingerprint sample corresponds a data item;

in response to matching the fingerprint sample with a pre-existing fingerprint sample, retrieving a data item corresponding the pre-existing 25 fingerprint sample and corresponding the second context; and

inputting the data item in the second context of the program.

62. The method of Claim 61 ,

wherein each pre-existing fingerprint sample corresponds to at least one encrypted data item, wherein the at least one encrypted data item is encrypted 30 using the corresponding pre-existing fingerprint sample of the user, wherein each of the at least one encrypted data item corresponds a different context; wherein the method further comprises decrypting the data item using the fingerprint sample, whereby obtaining a decrypted data;

wherein said inputting the data item comprises inputting the decrypted data.

63. A computerized apparatus comprising:

a peripheral device for obtaining a biometric feature of a user; 5 a memory retaining a plurality of data items, wherein each item in the plurality of data items is associated with a biometric feature and a context, wherein for each pair of a biometric feature and a context of the computerized device, said memory retaining a single data item corresponding thereto;

a processor configured to select a data item from the plurality of data items, 10 wherein the selection is based on the biometric feature and one a current context of the computerized device; and

wherein said processor is further configured to utilize the data item.

64. The computerized apparatus of Claim 63, wherein the plurality of data items are encrypted, wherein each item in the plurality of data items is encrypted using the 15 biometric feature of the user corresponding thereto, wherein said processor is further configured to decrypt the data item using the biometric feature obtained by said peripheral device.

65. The computerized apparatus of Claim 63, wherein said processor is configured to

select different data items for the same biometric feature given different contexts. 20

66. The computerized apparatus of Claim 63, wherein the plurality of data items comprises at least two data items of different types that correspond a same context, wherein the at least two data items of different types comprise two of:

a credit card or debit card information of the user;

a login information of the user; 25 a signature of the user to be provided in a human-readable form as part of a communication composed by the user; and

a content of a clipboard.

67. The computerized apparatus of Claim 63, wherein the plurality of data items are set to be associated with different biometric features by the user using a second 30 device, wherein the second device comprises a second peripheral device for obtaining a biometric feature of a user using the second device, whereby data is shared between the second device and the computerized apparatus based on a user action in the second device, and whereby the user is capable of utilizing shared data in the computerized apparatus.

68. The computerized apparatus of Claim 67, wherein the computerized apparatus is a mobile device and the second device is a second mobile device. 5

69. The computerized apparatus of Claim 67, wherein the computerized apparatus is a device mounted on or installed in a vehicle, wherein the second device is a mobile device of the user.

AMENDED CLAIMS

received by the International Bureau on 29 April 2019 (29.04.2019)

1. A computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when read by a processor, cause the processor to perform:

in response to a copy operation performed by a user, obtaining a data item to be retained in a clipboard;

obtaining a fingerprint from a fingerprint scanner;

selecting a selected clipboard from a plurality of clipboards based on the fingerprint, wherein each clipboard of the plurality of clipboards is associated with a different fingerprint of a plurality of fingerprints; and

storing the data item in the selected clipboard.

2. The computer program product of Claim 1, wherein each of the plurality of clipboards is associated with a different fingerprint of the user, whereby the user selects a clipboard by selecting a finger for scanning.

3. The computer program product of Claim 1, wherein said obtaining the data item comprises:

receiving a user selection of the data item; and

retrieving the data item.

4. The computer program product of Claim 1, wherein the program instructions, when read by the processor, cause the processor to perform:

in response to an instruction to perform a paste operation,

obtaining a second fingerprint from the fingerprint scanner;

selecting the selected clipboard from the plurality of clipboards based on the second fingerprint; and

providing the data item stored in the selected clipboard for performing the paste operation.

5. The computer program product of Claim 4, wherein the program instructions, when read by the processor, cause the processor to perform:

receiving the instruction to perform the paste operation;

receiving a user selection of a location to paste the data item to during the paste operation; and

performing the paste operation using the data item by pasting the data item to the location.

6. The computer program product of Claim 4, wherein the fingerprint and the second fingerprint are scanned fingerprints of a same finger of the user.

7. A computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when read by a processor, cause the processor to perform:

in response to an instruction to perform a paste operation,

obtaining a fingerprint from a fingerprint scanner;

selecting a selected clipboard from a plurality of clipboards based on the fingerprint, wherein each clipboard of the plurality of clipboards is associated with a different fingerprint of a plurality of fingerprints; and

providing a data item stored in the selected clipboard for performing the paste operation.

8. The computer program product of Claim 7, wherein the program instructions, when read by the processor, cause the processor to perform:

receiving a user selection of a location for pasting the data item, wherein the user selection is performed prior to an instruction to perform the paste operation; and performing the paste operation by pasting the data item to the location.

9. A method comprising: obtaining a data item previously selected by a user to be copied; obtaining a fingerprint scan from a fingerprint scanner, wherein the fingerprint scan is a scan of a fingerprint of the user;

selecting a selected clipboard from a plurality of clipboards based on the fingerprint scan, wherein each clipboard of the plurality of clipboards is associated with a different fingerprint of a plurality of fingerprints; and

storing the data item in the selected clipboard.

10. The method of Claim 9, further comprising:

obtaining a second fingerprint scan from the fingerprint scanner, wherein the second fingerprint scan is a scan of the fingerprint of the user;

selecting, from the plurality of clipboards, and based on the fingerprint, the selected clipboard; and

retrieving the data item from the selected clipboard to be utilized in a paste operation.

11. The method of Claim 10, wherein the paste operation is associated with a location for pasting, wherein the location is determined based on a user instruction performed prior to said obtaining the second fingerprint scan.

12. The method of Claim 10 further comprising performing the paste operation using the data item, wherein said storing the data item in the selected clipboard is performed by a first mobile device, and wherein said performing the paste operation is performed by a second mobile device, whereby a user performs a copy-paste operation using two different mobile devices.

13. An apparatus comprising:

a fingerprint scanner configured to scan fingerprints of users;

a memory retaining a plurality of clipboards, wherein each clipboard in the plurality of clipboards is associated with a different fingerprint of a plurality of fingerprints, wherein each clipboard in the plurality of clipboards is configured to retain a data item in response to a copy operation and to provide the data item for performing a paste operation;

a processor configured to perform the copy operation by:

obtaining a first data item to be copied;

obtaining a fingerprint from said fingerprint scanner;

selecting a first clipboard of the plurality of clipboards based on the obtained fingerprint; and

retaining the first data item in the first clipboard; and wherein said processor is further configured to perform the paste operation by: obtaining a paste location;

obtaining a second fingerprint from said fingerprint scanner;

selecting a second clipboard, from the plurality of clipboards, that is associated with the second fingerprint;

retrieving a second data item from the second clipboard; and pasting the second data item to the paste location.

14. A system comprising: a first mobile device; and

a second mobile device;

wherein said first mobile device comprising a first processor and a first memory unit, wherein said first mobile device is configured to:

obtain a data item selected by a user for copying;

obtain a first fingerprint scan, wherein the first fingerprint scan is a scan of a fingerprint of the user;

select a clipboard from a plurality of clipboards based on the first fingerprint scan, wherein each clipboard of the plurality of clipboards is associated with a different fingerprint from a plurality of fingerprints;

store the data item in the clipboard; and transmit a content of the clipboard to said second mobile device; wherein said second mobile device comprising a second processor and a second memory unit, wherein said second mobile device is configured to:

receive the content of the clipboard from said first mobile device; receive a user instruction to perform a paste operation;

obtain a second fingerprint scan, wherein the second fingerprint scan is a scan of the fingerprint of the user;

select the clipboard from the plurality of clipboards based on the second fingerprint scan; and

in response to the selection of the clipboard, perform the paste operation using the content of the clipboard.

15. A method of using a computerized apparatus for copying data, the method comprising:

for each fingerprint of a plurality of fingerprints of a user:

receiving a data item that has been copied by the user,

obtaining the fingerprint from a fingerprint scanner, and storing the data item in a clipboard that is associated with the fingerprint; and

for any selected fingerprint of the plurality of fingerprints:

obtaining the selected fingerprint from the fingerprint scanner, and

providing the data item stored in the clipboard that is associated with the selected fingerprint, for pasting by the user.

Description:
SELECTING DATA ITEMS USING BIOMETRIC FEATURES

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This application claims the benefit of patent application No. 15/895,395, entitled "SELECTING DATA ITEMS USING BIOMETRIC FEATURES", filed February 13, 5 2018, which is hereby incorporated by reference in its entirety without giving rise to disavowment.

TECHNICAL FIELD

[0001] The present disclosure relates to user interfaces in general, and to user 10 interfaces that utilize biometric features, in particular.

BACKGROUND

[0002] An input device is a peripheral used to provide data and control signals to an information processing system such as a computer or other information appliance. The 15 peripheral may be a hardware equipment, integral to a computing device or coupled thereto.

[0003] Input devices can be classified according to their modality of input (e.g., mechanical motion, audio, visual, etc.), number of degrees of freedom involved, and the type of digital or analogue input. For example, a touchscreen is an electronic visual 20 display that can detect the presence and location of a touch (e.g., of a finger, hand, or a stylus) within the display area. A touchpad (or trackpad) is a pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on screen. A mouse is a pointing device that functions by detecting two-dimensional motion relative to its supporting surface. The mouse's 25 motion typically translates into the motion of a pointer on a display, which allows for fine control of a graphical user interface.

[0004] Input devices can interact with graphical user interfaces directly (e.g., when using a touchscreen) or indirectly (e.g., when using a touchpad or a mouse).

30 BRIEF SUMMARY

[0005] One exemplary embodiment of the disclosed subject matter is a computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when read by a processor, cause the processor to perform a method comprising: obtaining a biometric feature of a 5 user; selecting a data item from a plurality of data items, wherein each item in the plurality of data items is associated with a different biometric feature, wherein said selecting is based on the biometric feature; and using the data item.

[0006] Optionally, using the data item is performed in a program as part of an operation, wherein the operation depends on the current context of the program or 10 computerized device.

[0007] Optionally, the selection of the data item is based on the current context of the program or computerized device.

[0008] Optionally, the plurality of data items are encrypted, wherein each item in the plurality of data items is encrypted using the different biometric feature, wherein the 15 method further comprises decrypting the data item using the biometric feature.

[0009] Optionally, the current context having a location, wherein the location is determined using a user input preceding said obtaining the biometric feature of the user.

[0010] Optionally, the current context is a context of filling a form, wherein said using comprises utilizing the data item to fill one or more fields in the form, whereby using 20 different biometric features of the user, different data is filled in to the form.

[0011] Optionally, the current context is a context of pasting data, wherein a location where data is pasted to is determined based on a user action preceding said obtaining the biometric feature, wherein said using comprises pasting the data item, whereby using different biometric features of the user, different data is pasted. 25

[0012] Optionally, the plurality of data items are associated with the current context of the program, whereby using the same biometric feature of the user yields different data items in different contexts.

[0013] Optionally, biometric feature is a feature extracted from a fingerprint of the user. 30 [0014] Optionally, said obtaining is performed using an input device capable of obtaining the biometric feature from a fingerprint of the user.

[0015] Optionally, said using comprises using the data item in a location, wherein the location is determined using a user input preceding said using the input device, and without using the input device. 5

[0016] Optionally, the plurality of data items comprises: alternative credit card or debit card information of the user, wherein each alternative card information is selected based on the user providing a different body part from which the biometric feature is extracted.

[0017] Optionally, the plurality of data items comprises: alternative login information 10 of the user, wherein each login information is selected based on the user providing a different body part from which the biometric feature is extracted.

[0018] Optionally, the plurality of data items comprises: alternative signatures of the user, wherein each signature is selected based on the user providing a different body part from which the biometric feature is extracted. 15

[0019] Optionally, said obtaining the biometric feature comprises obtaining the biometric feature from an input device that is configured to indirectly interact with a graphical user interface of the program.

[0020] Optionally, said obtaining, selecting and using are performed on a first device, wherein the data item is set to be associated with the biometric feature of the user on a 20 second device.

[0021] Optionally, the data item is set to be associated with the biometric feature of the user by the user.

[0022] Another exemplary embodiment of the disclosed subject matter is a method comprising: obtaining user input causing a program in a mobile device to change 25 context into a context, wherein in the context, information is to be inputted by a user; in response to the user providing a fingerprint sample, comparing the fingerprint sample against a set of pre-existing fingerprint samples of the user, wherein each pre-existing fingerprint sample corresponds a data item; in response to matching the fingerprint sample with a pre-existing fingerprint sample, retrieving a data item corresponding the 30 pre-existing fingerprint sample; and providing the data item to be inputted in the context of the program. [0023] Optionally, each pre-existing fingerprint sample corresponds an encrypted data item, wherein the encrypted data item is encrypted using the corresponding pre-existing fingerprint sample; wherein the method further comprises decrypting the data item using the fingerprint sample, whereby obtaining a decrypted data; and wherein said providing the data item comprises providing the decrypted data. 5

[0024] Yet another exemplary embodiment of the disclosed subject matter is a computerized apparatus comprising: a peripheral device for obtaining a biometric feature of a user; a memory retaining a plurality of data items, wherein each item in the plurality of data items is associated with a different biometric feature; a processor configured to select a data item from the plurality of data items, wherein the selection is 10 based on the biometric feature; and wherein said processor is further configured to utilize the data item.

[0025] Optionally, the utilization of the data item depends on a context of the computerized apparatus.

[0026] Optionally, the plurality of data items are encrypted, wherein each item in the 15 plurality of data items is encrypted using the different biometric feature, wherein said processor is further configured to decrypt the data item using the biometric feature.

[0027] Optionally, the plurality of data items are associated with a current context of the computerized apparatus, whereby using the same biometric feature of the user yields different data items in different contexts. 20

[0028] Optionally, the plurality of data items comprises at least one of: alternative credit card or debit card information of the user, wherein each alternative card information is selected based on the user providing a different body part from which the biometric feature is extracted; alternative login information of the user, wherein each login information is selected based on the user providing a different body part from 25 which the biometric feature is extracted; and alternative signatures of the user, wherein each signature is selected based on the user providing a different body part from which the biometric feature is extracted.

[0029] Optionally, the plurality of data items are set to be associated with different biometric features by the user using a second device. 30

[0030] Optionally, the computerized apparatus is a mobile device and the second device is a second mobile device. [0031] Optionally, the computerized apparatus is a device mounted on or installed in a vehicle, wherein the second device is a mobile device of the user.

[0032] Optionally, said memory is a remote memory accessible by the computerized device via a network connection.

5

[0033] Yet another exemplary embodiment of the disclosed subject matter is a computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when read by a processor, cause the processor to perform: obtaining a biometric feature of a user;

obtaining a current context of a computerized device used by the user; selecting a data 10 item from a plurality of data items, each of which is associated with a biometric feature of the user and a context of the computerized device, wherein said selecting the data item is based on the biometric feature of the user and on the current context, whereby using the same biometric feature of the user yields different data items in different contexts; and using the data item in the computerized device to perform an operation. 15

[0034] Yet another exemplary embodiment of the disclosed subject matter is a method comprising: obtaining user input causing a program in a mobile device to change context from a first context into a second context, wherein in the second context, information is to be inputted by a user; in response to the user providing a fingerprint sample, comparing the fingerprint sample against a set of pre-existing fingerprint 20 samples of the user, wherein each pre-existing fingerprint sample corresponds a data item; in response to matching the fingerprint sample with a pre-existing fingerprint sample, retrieving a data item corresponding the pre-existing fingerprint sample and corresponding the second context; and inputting the data item in the second context of the program. 25

[0035] Yet another exemplary embodiment of the disclosed subject matter is a computerized apparatus comprising: a peripheral device for obtaining a biometric feature of a user; a memory retaining a plurality of data items, wherein each item in the plurality of data items is associated with a biometric feature and a context, wherein for each pair of a biometric feature and a context of the computerized device, said memory 30 retaining a single data item corresponding thereto; a processor configured to select a data item from the plurality of data items, wherein the selection is based on the biometric feature and one a current context of the computerized device; and wherein said processor is further configured to utilize the data item.

5

THE BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

[0036] The present disclosed subject matter will be understood and appreciated more fully from the following detailed description taken in conjunction with the drawings in which corresponding or like numerals or characters indicate corresponding or like components. Unless indicated otherwise, the drawings provide exemplary embodiments 5 or aspects of the disclosure and do not limit the scope of the disclosure. In the drawings:

[0037] Figures 1A-1E show illustrations of computerized environments, in accordance with the disclosed subject matter;

[0038] Figure 2 shows a flowchart diagram of a method, in accordance with some exemplary embodiments of the disclosed subject matter; and 10

[0039] Figure 3 shows a flowchart diagram of a method, in accordance with some exemplary embodiments of the disclosed subject matter.

DETAILED DESCRIPTION

[0040] One technical problem dealt with by the disclosed subject matter is to provide for a method of data retrieval. In some cases, data retrieval of confidential data is required to be secure and require some a-priori authorization. In some cases, the retrieved data may be data that is used frequently. Additionally or alternatively, it may 5 be desired to provide for a relatively simple procedure to input data into a program. In some cases, the same procedure may be used to provide different data items in different circumstances.

[0041] One technical solution is to utilize biometric features of the user to select a data item. In some cases, the user may provide a biometric feature thereof, which is 10 used to select one data item from a set of alternative potential data items to be used. As a biometric feature may be a feature that is hard to forge, such retrieval method provides inherent authorization prior to retrieving the data item.

[0042] As an example, fingerprints of the user may be used as the basis of the biometric features. Each finger of the user can be associated with a different data item, 15 thereby allowing the user to select which data she wants to be used and retrieve it using the correct finger. For example, the user's business credit card information may be associated with her right index finger, while her personal credit card information may be associated with her right middle finger. The user's electronic signature may be accessible using her right ring finger, while her home address may be accessed using 20 her left thumb.

[0043] Another technical solution is to use the data items in a predetermined manner that is based on the context of the program. In some cases, the program may be put into a context by a previous user-action. For example, the user may select a field and select "paste" operation, indicating that data is to be pasted. The user may then provide her 25 biometric feature to select a data item to be pasted into the selected field. As another example, the program may include a form having multiple fields that can be filled. The context of the program may be a context of filling the form. If at such a time, the user provides her biometric features, the data may be obtained and the form filled using the data. As yet another example, the context of the program may be a log-in context, 30 where the program requires logging in. The context may be set by the previous user action that launched the program or caused the program to reach a login page. [0044] In some exemplary embodiments, the same biometric feature (e.g., fingerprint of the same finger) may be used to represent different data items in different contexts.

For example, if a form in which credit card information is active in the program, each biometric feature may be associated with an alternative credit card information to be used. However, if the current context of the program is one where a single field is in 5 focus, each finger may represent alternative single-line values.

[0045] In some cases, the association between biometric features and data items may be per general context, such as a context that is applicable to different programs.

Additionally or alternatively, the association may be per specific context. The specific context may be specific to a program. In some cases, the specific context may be the 10 identity of the program, such that the association may be based on the identity of the program being executed, displayed, shown in the foreground, or the like. Additionally or alternatively, the specific context may be a context of a program. For example, in a first program, the left middle finger may be associated with one data item in a first screen, and with a second data item in a second screen. The same left middle finger may 15 also be associated with a third data item for a screen of a second program. In some exemplary embodiments, in case the program is a web browser, or another program that accesses resources via URLs, the URL may define the context (e.g., the entire URL, the domain name, a subdomain, the URL excluding parameters passed via GET method, or the like). It is noted that context granularity may be mixed, such that a general context 20 may be used and in some cases may be overridden, such as when the user defined different information for a specific program, specific contexts within the program, or the like.

[0046] One technical effect of the disclosed subject matter is to provide a relatively simple user interface for selecting data items. The user may consider the information at 25 "the palm of her hand", and by using the correct body part - e.g., finger, eye, palm, or the like - she may retrieve the data.

[0047] In some exemplary embodiments, the user may consider her body parts as storage device. The user may "store" information in her right index finger, and be able to retrieve and use such data when convenient, simply by using such finger. The user 30 may thus consider the data as if it is being stored in her right index finger. In some cases, data stored on one device may be shared with other devices to be used thereby, enabling a personalized "cut" and "paste" operation from different devices as long as both operations are performed by the same user.

[0048] In some exemplary embodiments, the retrieval method may provide for secure retrieval which is contingent on the user using the device. Instead of relying on the user logging in to a system, such as by providing credentials, password, biometric feature or 5 the like, the disclosed subject matter may ensure that only the authorized user retrieves and uses the data, even if the user had previously logged in to the system. For example, the user may log in to the system, and allow a friend to use her device. The friend may be authorized to perform all the actions that the user is authorized to perform. However, the friend may not be able to access the data items, as such retrieval requires the 10 biometric features of the user herself.

[0049] In some exemplary embodiments, the disclosed subject matter may provide for granularity of privileges, such as enabling the system to define authorized user, but requiring additional information and authentication if the user wants to retrieve the data items. 15

[0050] In some exemplary embodiments, the disclosed subject matter enables a multi user system, where each user is authorized to use the system, and each user has different data items available thereto. For example, Alice and Bob may both be authorized to use the same device and log into the device. In some cases, both users may log using the same credentials. Still, Alice's fingerprints may be used to retrieve 20 different data items than that that are available to Bob.

[0051] The disclosed subject matter may provide for one or more technical improvements over any pre-existing technique and any technique that has previously become routine or conventional in the art.

[0052] Additional technical problem, solution and effects may be apparent to a person 25 of ordinary skill in the art in view of the present disclosure.

[0053] Referring now to Figures 1A-1E, showing an illustration of a computerized environment, in accordance with the disclosed subject matter. In the illustrated embodiment, a mobile device, such as a smartphone, Personal Digital Assistant (PDA), tablet computer, or the like, is shown. However, the disclosed subject matter is not 30 limited to such embodiment and can be used with other forms of devices, such as personal computers, laptops, or the like. [0054] Additionally, the illustrated embodiment focuses on use of fingerprints as the biometric feature. However, the disclosed subject matter is not limited to such embodiment, and other biometric features may be used in addition to, or instead of, fingerprints.

[0055] Mobile Device 110 comprises a Screen 120, such as a touch screen. The user 5 can interact directly with the GUI using Screen 120 or using another peripheral.

Fingerprint Scanner 130, which may be located externally to Screen 120, at the bottom thereof, at the backside of Mobile Device 110, or in other similar locations, may be configured to obtain a fingerprint reading from a user.

[0056] The user may employ different fingers with Fingerprint Scanner 130, such as 10 Thumb 142, Index Finger 144, Middle Finger 146, Ring Finger 148, Little Finger 150, or the like.

[0057] In some exemplary embodiments, in order to utilize Mobile Device 110, the user may require to provide credentials. In some exemplary embodiments, the credentials may include a password, a biometric measurement, or the like. In some 15 exemplary embodiments, the biometric measurement may be a sampling of a fingerprint of the user. In some cases, the user may utilize a specific finger in order to authenticate herself and log in. Additionally or alternatively, the user may utilize any one of different fingers to log in, using Fingerprint Scanner 130. In such a case, a malicious user may log in using by spoofing Fingerprint Scanner 130 and providing a sample 20 mimicking one of user's fingerprints, however, the malicious user may not have access to samples of other fingerprints of the user or may not otherwise be able to spoof the Fingerprint Scanner 130 with relation to other fingerprints. In some cases, the user may provide a fingerprint from her left hand for authentication and logging in to the system, and fingerprints of her right hand for selecting data items. 25

[0058] In Figure 1B, Form 150 is shown in the GUI of Mobile Device 110. As an example, the form may be a web form shown in a browser. Additionally or alternatively, the form may be a form in a screen of an app or other program that is executed on Mobile Device 110. Form 150 may require inputting several different fields, such as credit card information. Similarly, debit card information may be 30 inputted. As an example, the credit card information may include a number of the credit card, expiration date, and Credit Card Verification (CCV) number. Additionally or alternatively, the information may include name and identification number of the card holder, billing information, or the like.

[0059] The user may opt to manually input the data. However, instead, the user may provide a finger to be scanned by Scanner 130 in order to retrieve the relevant data. As an example, the user's personal credit card information may be associated with her right 5 Thumb (142), while her business credit card information may be associated with her right Index Finger (144). Upon providing the fingerprint, a data repository may be accessed to retrieve the data item corresponding the fingerprint. The data repository may be stored locally on Mobile Device 110, may be stored remotely, such as on a remote server (not shown), or the like. In some cases, the query provides in addition to 10 the fingerprint, a current context of the Mobile Device 110. The current context may be the active program that the user is interacting with (e.g., the program in which From 150 is shown). Additionally or alternatively, the current context may be the context within the active program (e.g., having Form 150 be shown an active in the program).

Additionally or alternatively, current context may be defined based on potential input, 15 such as the names of the one or more fields that are in-focus, shown on screen, shown on the active form, or the like. Based on the fingerprint and potentially also the current context, data may be retrieved from the repository to be used. The data may be inputted into Form 150 automatically.

[0060] In some exemplary embodiments, the data item may be a record of credit card 20 information. The record may comprise multiple fields. In some exemplary embodiments, the business card information may be inputted automatically. In some cases, the retrieved data item may comprise additional information not required by Form 150, such as billing address. Only a subset of the retrieved data, such as only a portion of the fields, may be utilized. 25

[0061] In Figure 1C, Email Composer 160 is shown in the foreground. The user may perform a user action, such as touching Screen 120, using a pointing device, or the like, to indicate a location in the composed message. Following the user's interaction, a Curser 162 is shown at a current location. The user may scan a finger on Scanner 130 to provide information to be entered at the location of Curser 162. In some exemplary 30 embodiments, the scanning operation may be used to retrieve a user's signature, such as one signature selected from a set of variety of signatures (e.g., personal, business, signatures associated with different organizations). In some exemplary embodiments, the signature may be hardcoded, such as include constant text, images, links, or the like, with predetermined and constant formatting. Additionally or alternatively, the signature or parts thereof may be generated dynamically, such as by including at predetermined locations within the signature, changing text, images, or the like. For example, the signature may be retrieved and indicate a location which is replaced by the 5 organization's current slogan. Additionally or alternatively, an ad may be matched and inserted into the signature when the information is inputted.

[0062] In some exemplary embodiments, the user's interaction with Scanner 130 may not affect a location where the data is inserted or otherwise used. In some exemplary embodiments, the location is determined based on a previous action setting the current 10 location (at Curser 162).

[0063] Figure 1D shows Form 170 of an app comprising a plurality of fields. The user may select one field. The field that is selected, such as Field 172, may be considered the focused field. The current context of the app may accordingly be set to be Field 172.

When the user provides her fingerprint, the data item that is retrieved may be inserted 15 into Field 172. For example, the address information may be retrieved and inserted into Field 172. In some cases, however, if the retrieved record comprises fields that match the other potential input fields in the form, such as name, city, or the like, the entire form may be updated. In some exemplary embodiments, user's action may dictate whether to input information solely to the focused field (172) or to all relevant fields in 20 a form that is presented in the foreground. For example, the user may place her finger on Scanner 130 for a longer period of time, if she wants the entire record to be used.

Additionally or alternatively, the user may press against Scanner 130, as opposed to merely placing her finger, to indicate her selection of using the entire record.

[0064] In Figure 1E, the user may select a portion of a text, Selected Text 190. Curser 25 162 may indicate a location in which text is to be entered. The location of Curser 162 may be set by a previous user action. In response to the user's selection of Selected Text 190, a contextual menu may be displayed. The contextual menu is illustrated as comprising Finger Copy 182 and Finger Paste 184 operations, however additional operations may be available, such as regular copy, cut, search or the like. The user may 30 select Finger Copy 182 operation (186). The selection may indicate a context of the operation to be performed in response to retrieval of data items using fingerprints. The selection of Finger Copy 182 may be indifferent of the finger used. In some cases, the selection may be performed using a touch screen and using the same or a different finger than the finger to be scanned. Additionally or alternatively, the selection may be made using different peripherals, such as input devices having different modalities and not requiring the use of a finger at all.

[0065] After Finger Copy 182 is selected, the context is set to indicate that the next 5 scanning operation would be used for a copy operation using a finger-associated clipboard. When the user provides her Ring Finger 148 to Scanner 130 (188), the clipboard associated with her Ring Finger 148 is accessed and Selected Text 190 is copied thereto.

[0066] When the user selects Finger Paste 184 operation, the paste operation is 10 performed with respect to the data in the finger-associated clipboard of the finger that is used. For example, if the user provides her Ring Finger 148, the same copied text of Selected Text 190 is pasted. If the user provides another finger, a different clipboard is used and its content is pasted.

[0067] In some exemplary embodiments, the clipboards may be associated with 15 specific body parts, such as right ring finger, left index finger, or the like, or a group of body parts, such as ring fingers (left or right), eyes (left or right), or the like.

[0068] In some exemplary embodiments, the finger- associated clipboard may be stored remotely in addition to or instead of being stored locally. When the data item is retrieved, if the data item is not available locally, a remote storage may be queried to 20 obtain the data. In some exemplary embodiments, the user may copy the information to a finger-associated clipboard in one device, and paste it in a second device, in a manner that does not require the user to explicitly send the data to the second device. In some exemplary embodiments, such an embodiment increases the overall impression that the data is stored in the finger, as the user may change devices and still use the data. 25

[0069] In some exemplary embodiments, the disclosed subject matter may be employed to retain and use multiple alternative login credentials such as passwords and usernames. When the device is in a login context, such as when the device itself needs to be authenticated, when the user logs into an app or service, or the like, the biometric feature may be used to select login credentials. For example, login credentials of a first 30 account in an email service may be associated with the index finger, while the credentials of a second account in the email service (or another service) may be associated with the thumb. The fingerprints may be used not only to obtain or replace a password, but also to provide the username, username, account number, or other identifying information used in the login process.

[0070] Referring now to Figure 2 showing a flowchart of a method, in accordance with some exemplary embodiments of the disclosed subject matter.

[0071] On Step 200, the user performs a user action, setting a device into a context. 5 The user may perform the user action using any input device having any modality. The user action may set a location of a next action to be performed, such as determining a location of a curser. In some exemplary embodiments, the user action may be to select a field to be focused. Additionally or alternatively, the user action may be select an operation to be performed (e.g, paste operation using a finger-associated clipboard). 10 Additionally or alternatively, the user action may be to open an app, to open a window in the app, or the like.

[0072] On Step 210, the user may provide a reading of a biometric feature, such as a scanning of a fingerprint of a finger. In some exemplary embodiments, the scanning operation may be performed using a peripheral of the device, which is located near or 15 on the display. In some exemplary embodiments, the scanning operation may be performed on the display itself, however the location of the operation may be irrelevant to the use thereof. For example, the scanning operation of a fingerprint may be performed on the screen itself, without affecting the current location, cursor location, or the like. 20

[0073] In some exemplary embodiments, the user may provide a sequence of biometric features, such as her right index finger, followed by her right ring finger. The disclosed subject matter may associate a sequence of biometric features with a data item. As an example, the user may provide biometric features of her fingers that are used for the V gesture (either in a sequence or at the same time), and such biometric 25 features may be used to retrieve a contact information of the user. In some cases, third parties may desire to be associated with a single notable sequence, such as the V gesture, a sequence of three taps by the little finger, or the like.

[0074] On Step 220, a current context of the device may be determined. The current context may be selected from a default context and alternative contexts which may 30 override the default context. The alternative contexts may comprise contexts indicating the program that is being used, that program that is in the foreground, the program that has focus, or the like. In some exemplary embodiments, there may be a default alternative context for a program, which may be overridden by concrete alternative contexts within the program. The concrete alternative contexts may be contexts depending on the focused form, depending on the focused field, or the like. In some exemplary embodiments, the context may depend on potential user input, such as based on the names of the fields of the form that has focus, based on the name of the focused 5 field, or the like. In some exemplary embodiments, different screens of forms may share a same context. Additionally or alternatively, the context may be extracted from a URL that is shown or used by the program, such as the URL of the displayed page of a web browser.

[0075] In some exemplary embodiments, each context may be associated with a type 10 of input to be provided, such as signature, credit/debit card information, address, or the like. The association between the context and the type of input may be based on user- defined associations of the user, of an administrator, of a vendor of a system in accordance with the disclosed subject matter, or the like. The association may be automatic, such as by automatically determining the type of information to be inputted. 15 The automatic determination may be performed using machine learning. For example, a machine learning algorithm may be employed to determine that at the current cursor location, it is likely the user would input her signature, as opposed to a different location where she is expected to input her mailing address.

[0076] On Step 230, a data item may be selected. The selection may be performed 20 with respect to a repository comprising for each biometric feature different data items.

In some exemplary embodiments, the repository may be a table mapping fingerprints and records corresponding thereto. Additionally or alternatively, the selection may be based on the context. The repository may map each context to a table, mapping fingerprints and records corresponding thereto. In some exemplary embodiments, there 25 may be different context granularities, abstraction levels, or otherwise there may be different alternative contexts that are determined at the same time. The selection may be performed so as to first select a table. If there are several potential tables corresponding alternative current contexts, the selection of a table may be performed in accordance with a predetermined order. For example, concrete context may override abstract 30 contexts, and hence if a concrete context has an associated table such table may be used instead of the table that corresponds the abstract context. Different orderings may be defined and utilized. [0077] The data item may be retrieved from a digital memory, storage, or the like. In some exemplary embodiments, the repository may identify the location where the data item is being digitally retained. In some exemplary embodiments, the repository and the data items may be retained in the same media. Additionally or alternatively, the repository and the data items may be retained in different medias. In some exemplary 5 embodiments, the repository may be retained locally, and the data items themselves may be retained in a remote location, to reduce storage requirements. In some exemplary embodiments, the repositories may be replicated over different devices, so as to enable different devices to use the disclosed subject matter. The data items may be retrieved on demand from a remote data storage, and retained locally thereafter. In 10 some exemplary embodiments, the data items and repository may be replicated and duplicate copies thereof may be retained on different devices. In some exemplary embodiments, when the user logs in into a device, if the repository and data items are not retained locally, the device may automatically retrieve the repository and data items to allow the user to utilize the data items in accordance with the disclosed subject 15 matter.

[0078] In some exemplary embodiments, the data items may be complex objects that can be transformed, modified, or otherwise manipulated to provide different useful data in different contexts. As an example, the data item may be a contact object comprising the contact's name, address, mobile number, facebook handle, email address, or the like. 20 If the data item is used within a dialer program, the mobile number may be extracted and the dialer may dial to the mobile number. If, on the other hand, the context is of an email program, the contact's email address may be inputted into a new composed email.

As another example, the same contact information may be used in a navigation application, such as GOOGLE MAPS™ or WAZE™. In such a case, the address of the 25 contact person may be used as the destination. As another example, the object may be an image of the contact's business card and the information may be extracted therefrom using Optical Character Recognition (OCR). In some contexts, the image itself may be used.

[0079] On Step 240, the data item may be decrypted. In some exemplary 30 embodiments, the data items may be encrypted. In some exemplary embodiments, the encryption may be based on the biometric feature. For example, the same biometric feature extracted from the fingerprint that is used to select the data item in Step 230, may also be as a symmetric key used to encrypt the data item. Additionally or alternatively, different biometric features extracted from the same fingerprint may also be used, such that one feature is used as the retrieval key and the other is used as the encryption key.

[0080] On Step 250, the data item may be used. The data item may be used as part of an operation of a program being executed by the device. In some exemplary 5 embodiments, the operation may depend on the context of the current program. In some exemplary embodiments, the operation may be performed with respect to a location which was determined based on the user action of Step 200.

[0081] In some exemplary embodiments, in case the context may be a context of filling a form. The data item may be used to fill one or more fields of the form. As a 10 result, if the same user provides different biometric features, different data may be filled into the form.

[0082] Additionally or alternatively, the context may be a context of pasting data, such as a "Finger Paste" operation (184). The data may be pasted to a location determined based on an action preceding the user providing her biometric feature (e.g., 15 preceding Step 210). The data item or portion thereof may be pasted to the location. As a result, if the same user provides different biometric features, different data may be pasted. In some exemplary embodiments, the data item may be an identifier of a finger- associated clipboard from which data is retrieved.

[0083] Additionally or alternatively, the context may be a context of copying data, 20 such as "Finger Copy" operation (182). The data may be copied from a selection that is made in an action preceding the user providing her biometric features (e.g., in the action of Step 200). On Step 230, one clipboard out of a set of alternative clipboards, such as finger-associated clipboards, may be selected based on the biometric feature. The selected clipboard may be used to retain the information copied in the "Finger Copy" 25 operation. In some exemplary embodiments, the content of the clipboard may be transmitted to other devices, such as to a server, to other devices where the user is logged in, other devices that are associated with the user, or the like.

[0084] Additionally or alternatively, the data may be used to perform a login operation. The data item may be used to retrieve user credentials comprising two or 30 more items, such as an identifier item and a password item. In some exemplary embodiments, the data item may be a record comprising the user credentials, such as comprising a field retaining a user name, an account identifier, or the like, and a field comprising a password, such as textual password, pattern password, or the like. In some exemplary embodiments, the current context may be a context of performing log-in into a system, the device, a program, a service, or the like. On Step 250, the credentials may be used to log in.

[0085] In some exemplary embodiments, based on the context, a manipulation of the 5 object may be performed to provide a subset of the retrieved data item, or information based thereon, to be used in the current context, such as providing the information of the magnetic stripe of the credit card in a context of a barcode reader, and providing the textual information of the credit card number and expiration date and CCV, in case of a form to be filled. 10

[0086] In some exemplary embodiments, the use of the same data item may be different in different contexts. For example, a phone number may be inputted to a field in a fill form context and may be dialed in a dialing context of a dialer program.

[0087] Referring now to Figure 3 showing a flowchart diagram of a method, in accordance with some exemplary embodiments of the disclosed subject matter. Figure 3 15 depicts an embodiment of copy-paste operations using user's fingerprints.

[0088] On Step 300, a user makes a selection of content. The selection may be performed using touchscreen, using a mouse, a keyboard, speech, gestures, or using any other interaction method.

[0089] On Step 310, the user may provide her fingerprint to be scanned. The 20 fingerprint may be scanned to obtain a biometric feature of the fingerprint.

[0090] On Step 320, a copy context may be determined. The copy context may be determined based on a user action, such as the user selecting a copy operation from a menu. However, the context may be determined using other methods.

[0091] On Step 330, a clipboard may be selected based on the biometric feature. In 25 some exemplary embodiments, the clipboard may be a finger-associated clipboard. The association between the biometric feature and clipboards may be performed using a mapping between biometric features and clipboards.

[0092] On Step 340, the selected content may be copied into the selected clipboard. In some exemplary embodiments, the data is copied verbatim. Additionally or 30 alternatively, the content of the clipboard may be encrypted using a key. The key may be an encryption key, such as user defined password, credentials, or the like. Additionally or alternatively, the key may be the biometric feature used to select the clipboard.

[0093] On Step 350, the content of the clipboard may be transmitted to a second device. The content may be transmitted to the second device directly or indirectly, such as via a server. In some exemplary embodiments, the transmission may occur 5 immediately or in a later time.

[0094] On Step 360, the user may perform a user action in the second device. The user action may set the second device into a context of pasting data from one of the finger- associated clipboard.

[0095] On Step 370, the user may provide the fingerprint of the same finger to be 10 scanned in the second device. The fingerprint may be scanned to obtain a biometric feature of the fingerprint.

[0096] On Step 380, it may be determined that the current context is a paste context.

[0097] On Step 390, the clipboard may be selected, such as in a similar manner to the selection on Step 330. As the same biometric feature is used, the same clipboard may be 15 obtained. It is noted that in some cases, the clipboard may be context-dependent, such as having a different clipboard for different programs.

[0098] On Step 395, the content of the clipboard may be used and pasted. The content may be pasted into a location set by the user action of Step 360. In some exemplary embodiments, the content may be decrypted prior to being pasted, such as using the 20 biometric feature as a decryption key.

[0099] In one embodiment of the disclosed subject matter, the disclosed subject matter may be used to store and retrieve passwords that are hard for users to memorize. Strong passwords may be passwords having no meaning, combining different letters, digits and special characters, and comprising a large number of characters. However, such 25 passwords may be hard to memorize. A user may select a finger to be associated with her password. Different passwords may be associated with different programs. In a create-pas sword context, using the finger may be automatically identified as a request to generate a strong password, paste the generated password to the appropriate field (or fields, such as in case of a form requiring password verification), and store the 30 password as a data item associated with the finger in a login context of the same program, site, service, or the like. When the user wishes to login using the password, she need not remember the password at all. Instead, she needs to remember which of her fingers is associated with the password for the specific program, site, service or the like. In some exemplary embodiments, the finger and the login context of a specific program, site or service are used together in order to retrieve the password and paste it to the correct input field. It is noted that the program, site, service, or the like, need not 5 be aware of the use of the user's finger for providing the password. There is no need for each login process to be specifically designed to work with biometric features. Instead, the disclosed subject matter is used to link the biometric feature with a different password modality that is being used by the program. In the present example, using password-based identification which is more common and widespread than a 10 fingerprint-based identification.

[0100] In one exemplary embodiment of the disclosed subject matter, the disclosed subject matter may be used in a plurality of devices, which may be different than one another. As an example, the user may define fingerprint mapping on her mobile phone, and utilize such mapping in her car. The user may provide a fingerprint reading by 15 placing her finger on a peripheral device in the car, such as a device embedded within the wheel. The device that is being used, such as the user's car, may be part of the context. In some cases, an object of a contact person may be retrieved based on the user's fingerprint, and as the context is that of a car, the physical address may be used to set a destination in the vehicle's navigation system. As another example, if a destination 20 is already set, or if the vehicle is already in motion, the contact's phone number may be extracted and dialed to. In some cases, the system may provide an audible feedback for the user to indicate its action. In some cases, the user may verify the action is acceptable before being executed. As yet another example, the user may provide a first fingerprint to retrieve the data item of the contact, and a second fingerprint to retrieve an action to 25 be taken with the data item. As an example, the user's index finger may indicate set a new destination, the user's ring finger may indicate set a new waypoint, the user's middle finger may indicate dial number. In some cases, if the user does not follow her first input of fingerprint with a second one, the system may perform a default action. In some cases, the default action may be predetermined and hard-coded, such as based on 30 the context of the vehicle. As another example, the default action may be determined by a machine learning classifier that may be trained over time and based on the user's activity to predict the user's intent. For example, the prediction of the action to be taken may be based on features such as vehicle's speed, vehicle's location (e.g., exact location, located on a highway, on a street with a relatively low speed limit, such as 50 KPH, 30 KPH, or the like), the contact person, the status of the navigation system (e.g., route set, percent of the route traveled), status of the radio (e.g., quality of reception indicator, current station), or the like. Every time the user provides an explicit selection of an action, the features may be determined and used together with a label of the action as 5 part of a training set for the classifier. The classifier may be trained periodically, iteratively, or the like. In some exemplary embodiments, after a prediction is made and an action is predicted and performed, the user may abort the action, to indicate a wrong prediction, thereby providing additional training data to improve the prediction of the classifier. 10

[0101] In some exemplary embodiments, the disclosed subject matter may be implemented as an Software Development Kit (SDK) that can be used by third parties.

In some cases, Application Program Interface (API) may be provided to enable third parties to utilize the functionality provided by the disclosed subject matter, such as set a context, set association of fingerprint with data item, retrieve data item based on 15 fingerprint or based on fingerprint and context, or the like.

[0102] The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention. 20

[0103] The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non- 25 exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a 30 memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.

[0104] Computer readable program instructions described herein can be downloaded 5 to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A 10 network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.

[0105] Computer readable program instructions for carrying out operations of the 15 present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural 20 programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be 25 connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or 30 programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention. [0106] Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be 5 implemented by computer readable program instructions.

[0107] These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, 10 create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions 15 stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.

[0108] The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a 20 series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks. 25

[0109] The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention.

In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable 30 instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out 5 combinations of special purpose hardware and computer instructions.