CPC G01S 13/4427 (2013.01) [G01S 13/18 (2013.01); G01S 13/449 (2013.01); G06F 21/44 (2013.01); G01S 7/417 (2013.01)] | 20 Claims |
1. A method comprising:
determining that a first object authenticated by an electronic device is accessing the electronic device;
in response to a second object being detected within a detection range using a radar apparatus of the electronic device, determining, based on a detected signal, that the second object is a person;
determining a distance and an angle between the second object and the electronic device based on an azimuth signal in the detected signal;
in response to determining that the distance is less than a first distance threshold and the angle is less than an angle threshold, determining, based on a biological feature signal in the detected signal, whether the second object is trustworthy; and
deauthenticating the first object in response to determining that the second object is untrustworthy.
|