SYSTEMS, METHODS AND APPARATUS FOR MULTIVARIATE AUTHENTICATION
First Claim
Patent Images
1. A computer-based method of authenticating, the method comprising:
- receiving a request for authentication of a user, wherein the request for authentication comprises biometric feature of the user collected by a user device and contextual data from the user device;
comparing the biometric feature of the user to baseline biometric feature of the user;
comparing the contextual data to an expected contextual data value; and
determining whether to authenticate the user based on the comparison of the biometric feature of the user to the baseline biometric feature of the user and the comparison of the contextual data to the expected contextual data value.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and apparatus are disclosed for user authentication using a plurality of authentication variables, such as biometrics and contextual data. Example contextual data includes the geographical location of the user, a gesture of the user, and the machine identification of the individual'"'"'s user device.
-
Citations
37 Claims
-
1. A computer-based method of authenticating, the method comprising:
-
receiving a request for authentication of a user, wherein the request for authentication comprises biometric feature of the user collected by a user device and contextual data from the user device; comparing the biometric feature of the user to baseline biometric feature of the user; comparing the contextual data to an expected contextual data value; and determining whether to authenticate the user based on the comparison of the biometric feature of the user to the baseline biometric feature of the user and the comparison of the contextual data to the expected contextual data value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-based authentication system, comprising:
-
a baseline image database; a contextual data database; an authentication computing system, the authentication system configured to; receive a request for authentication of a user from a user device, wherein the request for authentication comprises an image of the user; and contextual data; compare the image of the user to a baseline image of the user stored in the baseline image database; compare the contextual data to an expected contextual data value stored in the contextual data database; and determine whether to authenticate the user based on the comparison of the biometric feature of the user to the baseline image of the user and the comparison of the contextual data to the expected contextual data value. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium having instructions stored thereon which when executed by a processor cause the processor to:
-
receive a request for authentication of a user, wherein the request for authentication comprises an image of the user collected by a user device; and contextual data from the user device; compare the image of the user to a baseline image of the user; compare the contextual data to an expected contextual data value; and determine whether to authenticate the user based on the comparison of the biometric feature of the user to the baseline image of the user and the comparison of the contextual data to the expected contextual data value. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A non-transitory computer readable medium having instructions stored thereon which when executed by a processor cause the processor to:
-
receive from a first user device via a network communication a network packet comprising an electronic data file and recipient biometrics; receive from a second user device via network communication biometric data obtained from a user of the second user device; and when the biometric data obtained from the user of the second user device matches the recipient biometrics, permit the electronic data file to be accessed on the second user device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A method of electronically sharing data, comprising:
-
identifying an electronic file; providing biometrics associated with a recipient; providing contextual data associated with a recipient; causing the electronic file to be encrypted based on the provided biometrics and the provided contextual data; and causing the transmission of the encrypted electronic file to the recipient over an electronic communications network. - View Dependent Claims (34, 35, 36, 37)
-
Specification