MOBILE DEVICE USER AUTHENTICATION BASED ON USER BEHAVIOR INFORMATION
First Claim
1. A method, comprising:
- receiving, by a device and over a plurality of time periods, user information associated with a behavior of a user relative to a mobile device associated with the user;
generating, by the device, at least one frequency distribution based on the user information;
determining, by the device, whether sufficient user information is received to generate baseline user data, representing typical user behavior, when a statistic associated with the at least one frequency distribution satisfies a threshold;
processing, by the device, the user information to generate the baseline user data when sufficient user information is received;
receiving, by the device and after the baseline user data is generated, additional user information associated with the behavior of the user relative to the mobile device;
comparing, by the device, the additional user information to the baseline user data;
determining, by the device, a difference between the additional user information and the baseline user data based on the comparing;
selecting, by the device, an authentication procedure, from a plurality of authentication procedures, based on the difference between the additional user information and the baseline user data and applying, by the device, the authentication procedure to authenticate the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication involves collecting information relating to a user'"'"'s behavior relative to a mobile device carried by the user, over a number of time periods that correspond to each other. An authentication technique includes processing the collected information to generate baseline data representing typical user behavior. The authentication technique includes collecting additional information relating to the user'"'"'s behavior relative to the mobile device over another time period that corresponds to the time periods used to generate the baseline data. The additional information relating to the user'"'"'s behavior is compared to the baseline data, and a difference between the additional information and the baseline data is determined. An authentication procedure is then applied based on the difference. The authentication may be performed by a mobile device such as a smartphone.
30 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a device and over a plurality of time periods, user information associated with a behavior of a user relative to a mobile device associated with the user; generating, by the device, at least one frequency distribution based on the user information; determining, by the device, whether sufficient user information is received to generate baseline user data, representing typical user behavior, when a statistic associated with the at least one frequency distribution satisfies a threshold; processing, by the device, the user information to generate the baseline user data when sufficient user information is received; receiving, by the device and after the baseline user data is generated, additional user information associated with the behavior of the user relative to the mobile device; comparing, by the device, the additional user information to the baseline user data; determining, by the device, a difference between the additional user information and the baseline user data based on the comparing; selecting, by the device, an authentication procedure, from a plurality of authentication procedures, based on the difference between the additional user information and the baseline user data and applying, by the device, the authentication procedure to authenticate the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A mobile device, comprising:
-
at least one sensor to; receive, over a plurality of time periods, user information associated with a behavior of a user relative to the mobile device; and receive, over a time period occurring after the plurality of time periods, additional user information associated with the behavior of the user relative to the mobile device; and at least one processor to; generate at least one frequency distribution based on the user information; determine whether sufficient user information is received to generate baseline user data, representing typical user behavior, when a statistic associated with the at least one frequency distribution satisfies a threshold; process the user information to generate the baseline user data when sufficient user information is received; compare the additional user information to the baseline user data; determine a difference between the additional user information and the baseline user data based on the comparing; select an authentication procedure, from a plurality of authentication procedures, based on the difference between the additional user information and the baseline user data and apply the authentication procedure to authenticate the user. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium for storing instructions, the instructions comprising:
-
one or more instructions that, when executed by one or more processors of a device, cause the one or more processors to; receive, over a plurality of time periods, user information associated with a behavior of a user relative to a mobile device associated with the user; generate at least one frequency distribution based on the user information; determine whether sufficient user information is received to generate baseline user data, representing typical user behavior, when a statistic associated with the at least one frequency distribution satisfies a threshold; process the user information to generate the baseline user data when sufficient user information is received; receive, after the baseline user data is generated, additional user information associated with the behavior of the user relative to the mobile device; compare the additional user information to the baseline user data; determine a difference between the additional user information and the baseline user data based on the comparing; select an authentication procedure, from a plurality of authentication procedures, based on the difference between the additional user information and the baseline user data; and apply the authentication procedure to authenticate the user. - View Dependent Claims (18, 19, 20)
-
Specification