TRANSPARENTLY VERIFIYING USER IDENTITY DURING AN E-COMMERCE SESSION USING SET-TOP BOX INTERACTION BEHAVIOR
First Claim
1. A method for verifying a user based on data of interactions between the user and a set-top box, the method comprising the steps of:
- a set-top box device detecting a user interaction associated with a remote control proximate to the set-top box device;
the set-top box device storing the user interaction within a storage device as user interaction data;
the set-top box device conveying the user interaction data to a remotely located server; and
the set-top box device receiving a response from the remotely located server indicating that a behavior pattern in the interaction data is substantially equivalent to a behavior pattern in previously stored interaction data of a behavior profile, wherein the response verifies the identity of the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A set-top box device can detect a user interaction associated with a remote control proximate to the set-top box device. The set-top box device can store the user interaction within a storage device as user interaction data. The set-top box device can convey the user interaction data to a remotely located server. The set-top box device can receive a response from the remotely located server indicating that a behavior pattern in the interaction data is substantially equivalent to a behavior pattern in previously stored interaction data of a behavior profile. The response can verify the identity of the user.
-
Citations
22 Claims
-
1. A method for verifying a user based on data of interactions between the user and a set-top box, the method comprising the steps of:
-
a set-top box device detecting a user interaction associated with a remote control proximate to the set-top box device; the set-top box device storing the user interaction within a storage device as user interaction data; the set-top box device conveying the user interaction data to a remotely located server; and the set-top box device receiving a response from the remotely located server indicating that a behavior pattern in the interaction data is substantially equivalent to a behavior pattern in previously stored interaction data of a behavior profile, wherein the response verifies the identity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system for verifying a user based on data of interactions between the user and a set-top box, said computer system comprising:
-
one or more processors, one or more computer-readable memories and one or more computer-readable tangible storage devices; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to detect a user interaction between a user and a remote control device associated with a set-top box executing a graphical user interface, wherein the graphical user interface is an interface of an e-commerce session, and wherein the graphical user interface is associated with a browser session associated with a Web server; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to store the user interaction within a storage device as user interaction data; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to verify or refute a user identity using a two factor authentication process by evaluating a behavior pattern in the user interaction data against a behavior pattern in previously stored interaction data contained within a behavior profile specific to the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product for verifying a user based on data of interactions between the user and a set-top box, the computer program product comprising:
-
one or more computer-readable tangible storage devices; program instructions, stored on at least one of the one or more storage devices, to detect user interaction data associated with a remote control proximate to the set-top box device;
program instructions, stored on at least one of the one or more storage devices, to store the user interaction data within a storage device as user interaction data;program instructions, stored on at least one of the one or more storage devices, to convey the user interaction data to a remotely located server; and program instructions, stored on at least one of the one or more storage devices, to receive a response from the remotely located server indicating that a behavior pattern in the interaction data is substantially equivalent to a behavior pattern in previously stored interaction data of a behavior profile, wherein the response verifies the identity of the user. - View Dependent Claims (21, 22)
-
Specification