Methods and system for passive authentication through user attributes
First Claim
Patent Images
1. A method, comprising:
- collecting, on a device, data relevant to attributes of a user;
passively authenticating the user based on the data by computing a value based on the data, wherein computing further includes chaining a first instance of a confidence calculator that executes on the device within a first processing environment with a second instance of the confidence calculator that executes on a second and different device within a second and different processing environment to produce the value by computing, by the first instance, a first portion of the value, providing, by the first instance, the first portion to the second instance as input data, computing, by the second instance, a second portion of the value from the first portion, and combining the first portion and the second portion as the value; and
automatically providing the user access to an electronic resource at a particular access level selected from a plurality of access levels based on a difference between a predetermined value and the value.
6 Assignments
0 Petitions
Accused Products
Abstract
Data is automatically collected; the data relevant to user attributes. That data is provided as factors for passive authenticating the user for access to a device and/or a resource. In an embodiment, the data is used to establish a profile or a pattern for the user.
-
Citations
12 Claims
-
1. A method, comprising:
-
collecting, on a device, data relevant to attributes of a user; passively authenticating the user based on the data by computing a value based on the data, wherein computing further includes chaining a first instance of a confidence calculator that executes on the device within a first processing environment with a second instance of the confidence calculator that executes on a second and different device within a second and different processing environment to produce the value by computing, by the first instance, a first portion of the value, providing, by the first instance, the first portion to the second instance as input data, computing, by the second instance, a second portion of the value from the first portion, and combining the first portion and the second portion as the value; and automatically providing the user access to an electronic resource at a particular access level selected from a plurality of access levels based on a difference between a predetermined value and the value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification