US 12,235,342 B2
Method, electronic device, and computer program product for monitoring authentication based on radar
Pedro Fernandez, Shanghai (CN); Qiang Chen, Shanghai (CN); and Zhen Jia, Shanghai (CN)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Nov. 10, 2022, as Appl. No. 17/984,886.
Claims priority of application No. 202211294946.4 (CN), filed on Oct. 21, 2022.
Prior Publication US 2024/0134026 A1, Apr. 25, 2024
Prior Publication US 2024/0230873 A9, Jul. 11, 2024
Int. Cl. G01S 13/44 (2006.01); G01S 7/41 (2006.01); G01S 13/18 (2006.01); G06F 21/44 (2013.01)
CPC G01S 13/4427 (2013.01) [G01S 13/18 (2013.01); G01S 13/449 (2013.01); G06F 21/44 (2013.01); G01S 7/417 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
determining that a first object authenticated by an electronic device is accessing the electronic device;
in response to a second object being detected within a detection range using a radar apparatus of the electronic device, determining, based on a detected signal, that the second object is a person;
determining a distance and an angle between the second object and the electronic device based on an azimuth signal in the detected signal;
in response to determining that the distance is less than a first distance threshold and the angle is less than an angle threshold, determining, based on a biological feature signal in the detected signal, whether the second object is trustworthy; and
deauthenticating the first object in response to determining that the second object is untrustworthy.