×

Passive security enforcement

  • US 10,389,712 B2
  • Filed: 03/29/2017
  • Issued: 08/20/2019
  • Est. Priority Date: 01/23/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for passive authentication by a computing system, the method comprising:

  • receiving, by the computing system, a first attribute;

    passively authenticating, by the computing system, a user at a first authentication level based on comparing the first attribute to one or more first previously stored attributes, the first attribute having a first weight;

    computing a confidence level associated with the first attribute and first weight;

    receiving, by the computing system, a request to complete a transaction;

    determining a confidence level to complete the transaction;

    receiving, by the computing system, a second attribute;

    passively updating, by the computing system, the first authentication level to a second authentication level different from the first authentication level based on comparing the second attribute to one or more second previously stored attributes, the second attribute having a second weight;

    modifying the confidence level based upon the second attribute and the second weight;

    determining the confidence level based upon the second attribute is sufficient to complete the transaction; and

    completing the transaction,wherein the first and second attributes each comprise an event indicative of the user or a physical characteristic of the user,and wherein each previously stored attribute comprises a previously stored event, a previously stored physical characteristic, or one or more previously determined acceptable values for one or more users.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×