Method of and apparatus for combining artificial intelligence (AI) concepts with event-driven security architectures and ideas
First Claim
1. A method of providing additional security to a user'"'"'s accessing of a secure information system, by password, ID and dynamic biometric inputting characteristics of the user, that comprises,incorporating an artificial intelligence (AI) architecture feature wherein highly personal questions are asked of the user that only the owner of the password and ID would be able to answer instantaneously from the subconscious mind, as distinguished from a user other than the owner who would require a finite response time;
- establishing access-authorization confidence levels in accordance with such response times;
measuring the time for the user to commence responding to such personal questions; and
assigning a level of confidence for access in accordance with such measured response times.
1 Assignment
0 Petitions
Accused Products
Abstract
User authentication apparatus controlling access to systems, inputs owner'"'"'s login name and password and then extracts the owner'"'"'s timing vectors from keystroke characteristics with which the owner forms a training set. A semantic network uses multiple links to indicate that different pattern components of user'"'"'s behavioral access create different kinds of relationships and “symbolic representations”. A neural network is trained by using each of the owner'"'"'s timing vectors in the training set as an input. When a user inputs the owner'"'"'s login name and password, it'"'"'s checked and the user'"'"'s timing vector is extracted to type the user'"'"'s password if checked and demoted in confidence level if otherwise. The user'"'"'s timing vector is applied to neural network and difference between the input/output is compared with a predetermined threshold; and if the difference is greater than the threshold, is prohibited. Preferably this is aided by response time to personal questions.
-
Citations
21 Claims
-
1. A method of providing additional security to a user'"'"'s accessing of a secure information system, by password, ID and dynamic biometric inputting characteristics of the user, that comprises,
incorporating an artificial intelligence (AI) architecture feature wherein highly personal questions are asked of the user that only the owner of the password and ID would be able to answer instantaneously from the subconscious mind, as distinguished from a user other than the owner who would require a finite response time; -
establishing access-authorization confidence levels in accordance with such response times; measuring the time for the user to commence responding to such personal questions; and assigning a level of confidence for access in accordance with such measured response times. - View Dependent Claims (2, 3, 4)
-
-
5. Apparatus for providing additional security to a user'"'"'s accessing of a secure information system, by password, ID and dynamic biometric inputting characteristics of the user having, in combination,
an artificial intelligence (AI) engine architecture wherein highly personal questions are generated and asked of the user that only the owner of the password and ID would be able to answer instantaneously from the subconscious mind, as distinguished from another user other than the owner who would require a finite response time for responding; -
an access-authorization confidence level list established in accordance with such response times; a timer for measuring the time for the user to commence responding to such personal questions; and a confidence level rater for assigning a level of confidence for access in accordance with such measured response times. - View Dependent Claims (6, 7, 8)
-
-
9. A user authentication method for use in controlling user access to a data information system having an input, that comprises,
inputting at such input the owner'"'"'s log-in name and password; -
extracting the owner'"'"'s timing vectors from biometric inputting characteristics with which the owner repeatedly inputs the owner'"'"'s password to form a training set; setting up a semantic network using multiple links to indicate that different pattern components of a user'"'"'s behavioral access to the input create different kinds of symbolic representations rather than just simple connections or links; setting up neural network training by using each of the owner'"'"'s timing vectors in the training set as the input thereto; checking if the user'"'"'s password is identical to the owner'"'"'s password when a user thereafter inputs the owner'"'"'s log-in name and password; extracting the user'"'"'s timing vector from said user'"'"'s inputting characteristics to derive the user'"'"'s password if user-checking is affirmative; otherwise, demoting the user in confidence level for accessing the system; applying the user'"'"'s timing vector to the training neural network as an input; comparing the difference between such input and an output of the neural network with a predetermined threshold; and permitting user access to the system if the difference is not greater than such threshold, while demoting the confidence level or totally prohibiting access to the system, if otherwise. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A user authentication method for use in controlling access to a computer system having a keyboard, that comprises,
inputting at such keyboard the owner'"'"'s log-in name and password; -
extracting the owner'"'"'s timing vectors from keyboard stroke characteristics with which the owner repeatedly has typed the owner'"'"'s password to form a training set; setting up a semantic network using multiple links to indicate that different pattern components of a user'"'"'s behavioral access create different kinds of symbolic representations rather than just simple connections or links; setting up neural network training by using each of the owner'"'"'s timing vectors in the training set as input thereto; thereafter when a user inputs the owner'"'"'s log-in name and password, checking if the user'"'"'s password is identical to the owner'"'"'s password; extracting the user'"'"'s timing vector from a keystroke characteristic to type the user'"'"'s password if the checked result is affirmative; otherwise, demoting the user in confidence level for accessing the system; applying the user'"'"'s timing vector to the trained neural network as in input; comparing the difference between such input and an output of the neural network with a predetermined threshold; and permitting user access to the system if the difference is not greater than such threshold, while demoting the confidence level or prohibiting access to the system, if otherwise. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
15. A user authentication apparatus for use in controlling access to a data information system having an input, that comprises,
an input device to log-in the owner'"'"'s name and password; -
an output extractor of the owner'"'"'s timing vectors from inputting characteristics with which the owner repeatedly has inputted the owner'"'"'s password to form a training set; a semantic network using multiple links to indicate that different pattern components of a user'"'"'s behavioral access to the input device create different kinds of symbolic representations rather than just simple connections or links; a neural network training set created by using each of the owner'"'"'s timing vectors in the training as the input thereto; a comparer for checking if the user'"'"'s password is identical to the owner'"'"'s password when a user thereafter inputs the owner'"'"'s log-in name and password; an extractor of the user'"'"'s timing vector from said user'"'"'s inputting characteristics to derive the user'"'"'s password if said checking is affirmative; and
otherwise, demoting the user in confidence level for accessing the system;connections applying the user'"'"'s timing vector to the trained neural network as an input; a further comparator for comparing the difference between such input and an output of the neural network with a predetermined threshold; and means for permitting user access to the system if the difference is not greater than such threshold, while demoting the confidence level or totally prohibiting access to the system, if otherwise.
-
Specification