Abstract
Reporters obtained the following quote from the background information supplied by the inventors: “Currently, portable device authentication or identification ( for example as used for cell phones or laptops) may be based upon recognition ve ctors generated by user actuated devices such as fingerprint sensors, facial ide ntification (ID), eye scans or other biometric sensing devices. These types of d evices generally require conscious interaction by the user to place their finger on a sensor, situate their face in front of the sensor, or provide a scan of th eir eye to use the authentication means.