Personalized inferred authentication for virtual assistance
First Claim
1. A computing device comprising a computer memory and a computer processor that is configured to allow a personal digital assistant to control access to secure computing resources based on a measure of legitimacy for a current user, the computing device comprising:
- the personal digital assistant that is a computer program stored on the computer memory having computer instructions that when executed by the computer processor cause the personal digital assistant to;
monitor ongoing user-related activity for a user associated with a current user-session on the computing device;
determine an authentication confidence score for the user associated with the current user-session on the computing device, the authentication confidence score determined based on a comparison of information from the monitored ongoing user-related activity and a persona model corresponding to a legitimate user associated with the computing device, wherein the persona model comprises activity patterns of the legitimate user, and wherein the authentication confidence score is determined from the monitored ongoing user-related activity and the persona model by an application or service to be used when the current user attempts to access secure data, applications, or services;
receive an indication of a request to access a first secure computing resource from a set of secure computing resources;
if the determined authentication confidence score indicates the current user is likely the legitimate user, then granting access to the first secure computing resource; and
if the determined authentication confidence score does not indicate that the current user is likely to be the legitimate user, then restricting access to the set of secure computing resources,wherein the persona model is determined from user-related activity information of the legitimate user.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the technology described herein provide a mechanism for controlling access to secure computing resources based on inferred user authentication. A current user may be authenticated and access to secure computing resources permitted based on a determined probability that the current user is a legitimate user associated with the secure computing resource. Legitimacy of the current user may be inferred based on a comparison of user-related activity of the current user to a persona model, which may comprise behavior patterns, rules, or other information for identifying a legitimate user. If it is determined that the current user is likely legitimate, then access to secure information may be permitted. However, if it is determined that the current user is likely illegitimate, than a verification procedure may be provided to the current user, such as a temporal, dynamic security challenge based on recent activity conducted by the legitimate user.
-
Citations
20 Claims
-
1. A computing device comprising a computer memory and a computer processor that is configured to allow a personal digital assistant to control access to secure computing resources based on a measure of legitimacy for a current user, the computing device comprising:
-
the personal digital assistant that is a computer program stored on the computer memory having computer instructions that when executed by the computer processor cause the personal digital assistant to; monitor ongoing user-related activity for a user associated with a current user-session on the computing device; determine an authentication confidence score for the user associated with the current user-session on the computing device, the authentication confidence score determined based on a comparison of information from the monitored ongoing user-related activity and a persona model corresponding to a legitimate user associated with the computing device, wherein the persona model comprises activity patterns of the legitimate user, and wherein the authentication confidence score is determined from the monitored ongoing user-related activity and the persona model by an application or service to be used when the current user attempts to access secure data, applications, or services; receive an indication of a request to access a first secure computing resource from a set of secure computing resources; if the determined authentication confidence score indicates the current user is likely the legitimate user, then granting access to the first secure computing resource; and if the determined authentication confidence score does not indicate that the current user is likely to be the legitimate user, then restricting access to the set of secure computing resources, wherein the persona model is determined from user-related activity information of the legitimate user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computerized method for controlling access to secure computing resources, comprising:
-
monitoring, during a current user session, ongoing user-related activity associated with at least one computing device; determining an initial authenticity score for a current user associated with the current user-session, the initial authenticity score determined based on a comparison of information from the monitored ongoing user-related activity and a persona model corresponding to a legitimate user associated with the at least one computing device, the initial authenticity score to be used when the current user attempts to access secure data, applications, or services; receiving a first indication of a request to access a first secure computing resource, the first secure computing resource having a corresponding first authenticity score threshold; determining that the initial authenticity score does not satisfy the first authenticity score threshold; providing a security challenge to the current user, wherein the security challenge is derived from user-related activity information of the legitimate user for one or more previous user sessions during which an authenticity score for the one or more previous user sessions was above a given threshold; receiving a response to the security challenge; based on an evaluation of the received response, updating the initial authenticity score to an updated authenticity score to be used to authenticate the current user; and based on a comparison of the updated authenticity score and the first authenticity score threshold, if the updated authenticity score satisfies the first authenticity score threshold, then providing access to the first secure computing resource; and if the updated authenticity score does not satisfy the first authenticity score threshold, then restricting access to the first secure computing resource. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computerized system comprising:
-
one or more sensors configured to provide sensor data; one or more computing devices, at least one of the computing devices including a credentials manager configured to control access to a secure computing resource; one or more processors; and one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to perform operations comprising; monitoring ongoing user-related activity for a current user-session on the one or more computing devices, the user-related activity for the current user-session including sensor data from the one or more sensors; determining an authentication confidence score for a user associated with the current user-session on the one or more computing devices, the authentication confidence score determined based on a comparison of information from the monitored ongoing user-related activity and a persona model corresponding to a legitimate user associated with the one or more computing devices, the authentication confidence score to be used when the current user attempts to access secure data, applications, or services; receiving an indication of a request to access the secure computing resource; if the determined authentication confidence score indicates the current user is likely the legitimate user, then granting, by the credentials manager, access to the secure computing resource; and if the determined authentication confidence score does not indicate that the current user is likely to be the legitimate user, then restricting, by the credentials manager, access to the secure computing resource, wherein the persona model is determined from user-related activity information of the legitimate user detected on at least two of the one or more computing devices. - View Dependent Claims (20)
-
Specification