PASSIVE SECURITY ENFORCEMENT
First Claim
1. A method performed by a computing system for passively authenticating a user, comprising:
- detecting an attribute of an action;
comparing the detected attribute of the action to a previously stored attribute of a similar action;
determining whether the detected attribute is substantially equivalent to the previously stored attribute of the similar action; and
if the detected attribute is substantially equivalent to the previously stored attribute of the similar action, passively authenticating the user without requiring the user to actively authenticate.
2 Assignments
0 Petitions
Accused Products
Abstract
Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user'"'"'s interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.
-
Citations
20 Claims
-
1. A method performed by a computing system for passively authenticating a user, comprising:
-
detecting an attribute of an action; comparing the detected attribute of the action to a previously stored attribute of a similar action; determining whether the detected attribute is substantially equivalent to the previously stored attribute of the similar action; and if the detected attribute is substantially equivalent to the previously stored attribute of the similar action, passively authenticating the user without requiring the user to actively authenticate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-readable storage medium storing computer-executable instructions that, when executed, perform a method of passively authenticating a user, the method comprising:
-
setting a confidence level to a default value; identifying a set of confidence factors; for each identified confidence factor in the set of confidence factors, computing a confidence; and modifying the confidence level based on the computed confidence; and if the modified confidence level exceeds a specified threshold, passively authenticating the user without requiring the user to actively authenticate. - View Dependent Claims (15, 16, 17)
-
-
18. A system for passively authenticating a user, comprising:
-
a component that initiates a request; and a comparator component that is configured to compare an detected input to a previously stored input without prompting the user to provide the detected input and, if the comparison is substantially equivalent, passively authenticates the user so that the initiated request can be satisfied. - View Dependent Claims (19, 20)
-
Specification