Multi-touch device behaviormetric user authentication and dynamic usability system
First Claim
1. An authorized user authentication method with a frustrated total internal reflection device, comprising:
- accessing data from an authorized user, said data being touch dynamic data;
using the data to create a first characteristic probability distribution representation indicative of the authorized user;
accessing new data from a purported authorized user, said new data being touch dynamic data;
comparing the new data of the purported authorized user to the first characteristic probability distribution representation for the authorized user; and
determining a probability that the purported authorized user is the authorized user based on the comparing.
3 Assignments
0 Petitions
Accused Products
Abstract
This invention discloses a system for determining whether a purported or alleged authorized user is in fact the authorized user, by comparing new data on a real-time basis against probability distribution representations including an authorized user probability distribution representation and a global or wide population probability distribution representation, to provide a probability as to whether the purported authorized user is the authorized user. This invention may utilize touch dynamics or data, or other data from similar measurable characteristics, to determine the probability that the new data from the purported authorized user indicates or identifies that user as the authorized user. This invention uses the same data to determine the probability for the most optimal position and sizes for user interface components.
263 Citations
13 Claims
-
1. An authorized user authentication method with a frustrated total internal reflection device, comprising:
-
accessing data from an authorized user, said data being touch dynamic data;
using the data to create a first characteristic probability distribution representation indicative of the authorized user;
accessing new data from a purported authorized user, said new data being touch dynamic data;
comparing the new data of the purported authorized user to the first characteristic probability distribution representation for the authorized user; and
determining a probability that the purported authorized user is the authorized user based on the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for determining a more probable authentication method with a frustrated total internal reflection device, comprising:
-
accessing data from an authorized user;
using the data to create a first characteristic probability distribution representation indicative of the authorized user;
using the data to create a second characteristic probability distribution representation indicative of the authorized user;
providing a wide population first characteristic probability distribution representation indicative of the first characteristic of a wide population;
providing a wide population second characteristic probability distribution representation indicative of the second characteristic of a wide population;
comparing the first characteristic probability distribution representation indicative of the authorized user to the wide population first characteristic probability distribution representation indicative of the first characteristic of a wide population;
comparing the second characteristic probability distribution representation indicative of the authorized user to the wide population second characteristic probability distribution representation indicative of the second characteristic of a wide population determining which of the comparings yields a more probable characteristic for authenticating the authorized user from the wide population. - View Dependent Claims (11, 12, 13)
-
Specification