SYSTEMS AND METHODS FOR AUTHENTICATING A USER THROUGH AN UNOBSERVABLE RE-AUTHENTICATION SYSTEM
First Claim
Patent Images
1. A method to authenticate an user of a device through an unobservable authentication process, the method comprising:
- collecting a plurality of data related to an authorized owner;
capturing a plurality of data related to a user'"'"'s interaction with a device; and
authenticating the user based on the user'"'"'s interaction with the device through an authentication module to determine if the user is the authorized owner, wherein authenticating the user is automatic and does not require specific prompts to the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating a user through an unobservable re-authentication process are disclosed.
-
Citations
15 Claims
-
1. A method to authenticate an user of a device through an unobservable authentication process, the method comprising:
-
collecting a plurality of data related to an authorized owner; capturing a plurality of data related to a user'"'"'s interaction with a device; and authenticating the user based on the user'"'"'s interaction with the device through an authentication module to determine if the user is the authorized owner, wherein authenticating the user is automatic and does not require specific prompts to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method to authenticate an authorized owner of a smartphone, the method comprising:
-
collecting a plurality of data related to an authorized owner of a smartphone; capturing a plurality of data related to a user'"'"'s interaction with the smartphone; determining whether the captured user interaction data matches up with the data related to the authorized owner; and authenticating the authorized owner wherein authenticating the user is automatic and does not require specific prompts for user interaction with the smartphone. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of un-observably authenticating an authorized owner of a smartphone, the method comprising:
-
capturing a plurality of data from the smartphone; comparing the captured data with a plurality of already known data about the authorized owner; and authenticating the authorized owner, wherein the authentication process is performed without prompting a smartphone user for specific information.
-
-
15. The method of claim 17, wherein an error message may be presented in the case that the authorized owner cannot be authenticated.
Specification