CPC G06F 21/40 (2013.01) [G06F 21/316 (2013.01); G06F 21/32 (2013.01); G06F 21/36 (2013.01); G06F 21/602 (2013.01); G06N 5/04 (2013.01); G06N 20/00 (2019.01); G06F 2221/2111 (2013.01); G06F 2221/2137 (2013.01)] | 24 Claims |
1. A method comprising:
receiving a request to unlock a portion of capabilities of a computing device;
receiving, via one or more inputs of the computing device, a first authentication parameter, wherein the first authentication parameter comprises a first background image captured as part of a request for biometric authentication;
determining, using one or more transceivers, a location of the computing device;
determining that the first background image matches a second background image associated with the location of the computing device;
determining, based on the first background image matching the second background image, that an unlock condition has been satisfied;
deriving, based on a determination that the unlock condition has been satisfied, an encryption key; and
unlocking, based on a determination that the unlock condition has been satisfied, the portion of capabilities of the computing device, wherein the unlocking the portion of capabilities of the computing device comprises decrypting a storage device associated with the computing device using the encryption key.
|