SYSTEM AND METHOD OF ENHANCING SECURITY OF A WIRELESS DEVICE THROUGH USAGE PATTERN DETECTION
First Claim
Patent Images
1. A method of identifying a user of a device having a security policy and comprising a touch sensitive input device, the method comprising:
- receiving data corresponding to use of said touch sensitive input device by said user;
determining from said received data at least one feature;
determining, based on said at least one feature and a signature associated with an identifiable user, a likelihood that said user is said identifiable user; and
modifying, based on said likelihood, said security policy on said device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of identifying a user of a device having a security policy and including a touch sensitive input device. The method includes receiving data corresponding to use of the touch sensitive input device by the user and determining from the received data at least one feature. Based on the at least one feature and a signature associated with an identifiable user, the method determines a likelihood that the user is the identifiable user and modifies, based on the likelihood, the security policy on the device.
-
Citations
20 Claims
-
1. A method of identifying a user of a device having a security policy and comprising a touch sensitive input device, the method comprising:
-
receiving data corresponding to use of said touch sensitive input device by said user; determining from said received data at least one feature; determining, based on said at least one feature and a signature associated with an identifiable user, a likelihood that said user is said identifiable user; and modifying, based on said likelihood, said security policy on said device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 20)
-
-
11. A method of modifying a security policy of a device, the method comprising:
-
receiving data corresponding to use of said device by a user; determining, based on said data, a first likelihood that said user is an identifiable user; modifying said security policy on said device to correlate to said first likelihood; receiving further data corresponding to further use of said device by said user; determining, based on said further data, a second likelihood that said user is said identifiable user; and modifying said security policy on said device to correlate to said second likelihood. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification