Securing a Device Based on Atypical User Behavior
First Claim
1. A system for securing a device comprising:
- a. a behavior module for authorizing events, updating rule data, and securing the device; and
b. an authentication module responsive to a first event being a secure event, for determining if the first event is authenticated;
c. responsive to the first event being authenticated, for directing the behavior module to authorize the first event and to update the rule data;
d. responsive to the first event not being authenticated, for determining if an authentication is valid;
e. responsive to the authentication being valid, for directing the behavior module to authorize the first event and update the rule data; and
f. responsive to the authentication not being valid, for directing the behavior module to secure the device.
23 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing the mobile device applies the rules to determine if an event associated with an application is a secure event. If the event is a secure event, the system applies the rules to determine if the event is authenticated. If the event is authenticated, the event is authorized and the system updates rule data associated with the event and/or other associated events. Updating the rule data allows other associated events to be authenticated. If the event is not authenticated, the system requests authentication from a user. If the authentication is valid, the event is authorized and the system updates the rule data associated with the event and/or other associated events. If the authentication is not valid, the system secures the mobile device. Authorizing the event enables a user to access the application and/or data associated with the application.
41 Citations
33 Claims
-
1. A system for securing a device comprising:
-
a. a behavior module for authorizing events, updating rule data, and securing the device; and b. an authentication module responsive to a first event being a secure event, for determining if the first event is authenticated; c. responsive to the first event being authenticated, for directing the behavior module to authorize the first event and to update the rule data; d. responsive to the first event not being authenticated, for determining if an authentication is valid; e. responsive to the authentication being valid, for directing the behavior module to authorize the first event and update the rule data; and f. responsive to the authentication not being valid, for directing the behavior module to secure the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for securing a device comprising:
-
a. determining if a first event is a secure event; b. in response to determining that the first event is a secure event, determining if the first event is authenticated; c. in response to determining that the first event is authenticated, proceeding to step (f); d. in response to determining that the first event is not authenticated, determining if an authentication is valid; e. in response to determining that the authentication is valid, proceeding to step (f); f. authorizing the first event and updating rule data for the first event; and g. in response to determining that the authentication is not valid, securing the device. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. An apparatus for securing a device comprising:
-
a. means for updating rule data for a first event and authorizing the first event; b. means for determining if the first event is a secure event; c. means responsive to determining that the first event is a secure event, for determining if the first event is authenticated; d. means responsive to determining that the first event is authenticated, for activating the updating means; e. means responsive to determining that the first event is not authenticated, for determining if an authentication is valid; f. means responsive to determining that the authentication is valid, for activating the updating means; and g. means responsive to determining that the authentication is not valid, for securing the device.
-
-
33. A system for securing a device comprising:
-
a. an authentication module responsive to a first event being a secure event, for determining if the first event is authenticated; b. responsive to the first event not being a secure event, for directing a behavior module to authorize the first event and to update the rule data; c. responsive to the first event being authenticated, for directing the behavior module to authorize the first event and to update the rule data; d. responsive to the first event not being authenticated, for determining if an authentication is valid; e. responsive to the authentication not being valid, for directing the behavior module to secure the device; f. responsive to the authentication being valid, for directing the behavior module to determine if the first event is a static event; g. responsive to the authentication not being valid, for directing the behavior module to secure the device ; and h. the behavior module, adapted to authorize an event, update rule data, and secure the device, the behavior module further for determining if an event is a static event, and responsive to the event not being a static event, for authorizing the event and updating the rule data.
-
Specification