Unobtrusive verification of user identity
First Claim
Patent Images
1. A method comprising:
- creating, by a computing device, a first verification model for a user, the first verification model being based upon enrollment data that is collected via an explicit enrollment procedure and including a first set of biometric data for verifying an identity of the user;
verifying, by the computing device, the identity of the user a first time using the first verification model;
unobtrusively collecting, by the computing device, one or more reliable data streams associated with the user, wherein the one or more reliable data streams are collected while the identity of the user is verified the first time using the first verification model;
unobtrusively creating, by the computing device, a second verification model for the user, wherein the second verification model is based upon the one or more reliable data streams that are collected while the identity of the user is verified the first time using the first verification model, wherein the second verification model includes a second set of biometric data for verifying the identity of the user, and wherein the second set of biometric data included in the second verification model comprises biometric data of a different type than the first set of biometric data included in the first verification model;
unobtrusively collecting, by the computing device, one or more verification data streams from the user, the one or more verification data streams being separate from the enrollment data used to create the first verification model, and the one or more reliable data streams used to create the second verification model; and
verifying, by the computing device, the identity of the user a second time by applying the one or more verification data streams to the first and second verification models, wherein verifying the identity of the user the second time comprises;
receiving, by the computing device, a first verification result generated by a server remote from the computing device, the first verification result being generated by the server based on instances of the first and second verification models stored on the server;
comparing, by the computing device, the first verification result with a second verification result generated by the computing device based on instances of the first and second verification models stored on the computing device; and
if the first verification result generated by the server is consistent with the second verification result generated by the computing device, authorizing the user to perform a secured action on the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for unobtrusively verifying the identity of a user of a computing device are provided. In one embodiment, the computing device can establish one or more verification models for verifying the user'"'"'s identity, where at least a subset of the one or more verification models is based on enrollment data that is collected in an unobtrusive manner from the user. The computing device can then verify the user'"'"'s identity using the one or more verification models.
-
Citations
13 Claims
-
1. A method comprising:
-
creating, by a computing device, a first verification model for a user, the first verification model being based upon enrollment data that is collected via an explicit enrollment procedure and including a first set of biometric data for verifying an identity of the user; verifying, by the computing device, the identity of the user a first time using the first verification model; unobtrusively collecting, by the computing device, one or more reliable data streams associated with the user, wherein the one or more reliable data streams are collected while the identity of the user is verified the first time using the first verification model; unobtrusively creating, by the computing device, a second verification model for the user, wherein the second verification model is based upon the one or more reliable data streams that are collected while the identity of the user is verified the first time using the first verification model, wherein the second verification model includes a second set of biometric data for verifying the identity of the user, and wherein the second set of biometric data included in the second verification model comprises biometric data of a different type than the first set of biometric data included in the first verification model; unobtrusively collecting, by the computing device, one or more verification data streams from the user, the one or more verification data streams being separate from the enrollment data used to create the first verification model, and the one or more reliable data streams used to create the second verification model; and verifying, by the computing device, the identity of the user a second time by applying the one or more verification data streams to the first and second verification models, wherein verifying the identity of the user the second time comprises; receiving, by the computing device, a first verification result generated by a server remote from the computing device, the first verification result being generated by the server based on instances of the first and second verification models stored on the server; comparing, by the computing device, the first verification result with a second verification result generated by the computing device based on instances of the first and second verification models stored on the computing device; and if the first verification result generated by the server is consistent with the second verification result generated by the computing device, authorizing the user to perform a secured action on the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium having stored thereon program code executable by a processor of a computing device, the program code comprising:
-
code that causes the processor to create a first verification model for a user, the first verification model being based upon enrollment data that is collected via an explicit enrollment procedure and including a first set of biometric data for verifying an identity of the user; code that causes the processor to verify the identity of the user a first time using the first verification model; code that causes the processor to unobtrusively collect one or more reliable data streams associated with the user, wherein the one or more reliable data streams are collected while the identity of the user is verified the first time using the first verification model; code that causes the processor to unobtrusively create a second verification model for the user, wherein the second verification model is based upon the one or more reliable data streams that are collected while the identity of the user is verified the first time using the first verification model, wherein the second verification model includes a second set of biometric data for verifying the identity of the user, and wherein the second set of biometric data included in the second verification model comprises biometric data of a different type than the first set of biometric data included in the first verification model; code that causes the processor to unobtrusively collect one or more verification data streams from the user, the one or more verification data streams being separate from the enrollment data used to create the first verification model and the one or more reliable data streams used to create the second verification model; and code that causes the processor to verify the identity of the user a second time by applying the one or more verification data streams to the first and second verification models wherein verifying the identity of the user the second time comprises; receiving, by the processor, a first verification result generated by a server remote from the computing device, the first verification result being generated by the server based on instances of the first and second verification models stored on the server; comparing, by the processor, the first verification result with a second verification result generated by the processor based on instances of the first and second verification models stored on the computing device; and if the first verification result generated by the server is consistent with the second verification result generated by the processor, authorizing the user to perform a secured action on the computing device.
-
-
13. A computing device comprising:
-
a processor; and a non-transitory computer readable medium having stored thereon executable program code which, when executed by the processor, causes the processor to; create a first verification model for a user, the first verification model being based upon enrollment data that is collected via an explicit enrollment procedure and including a first set of biometric data for verifying an identity of the user; verify the identity of the user a first time using the first verification model; unobtrusively collect one or more reliable data streams associated with the user, wherein the one or more reliable data streams are collected while the identity of the user is verified the first time using the first verification model; unobtrusively create a second verification model for the user, wherein the second verification model is based upon the one or more reliable data streams that are collected while the identity of the user is verified the first time using the first verification model, wherein the second verification model includes a second set of biometric data for verifying the identity of the user, and wherein the second set of biometric data included in the second verification model comprises biometric data of a different type than the first set of biometric data included in the first verification model; unobtrusively collect one or more verification data streams from the user, the one or more verification data streams being separate from the enrollment data used to create the first verification model and the one or more reliable data streams used to create the second verification model; and verify the identity of the user a second time by applying the one or more verification data streams to the first and second verification models, wherein verifying the identity of the user the second time comprises; receiving a first verification result generated by a server remote from the computing device, the first verification result being generated by the server based on instances of the first and second verification models stored on the server; comparing the first verification result with a second verification result generated by the computing device based on instances of the first and second verification models stored on the computing device; and if the first verification result generated by the server is consistent with the second verification result generated by the computing device, authorizing the user to perform a secured action on the computing device.
-
Specification