METHODS AND A SYSTEM FOR PASSIVE AUTHENTICATION
First Claim
Patent Images
1. A method, comprising:
- obtaining, on a device, resource attributes associated with a resource; and
determining whether a user is to be passively authenticated for access to a second resource based on the resource attributes.
6 Assignments
0 Petitions
Accused Products
Abstract
Resource attributes for resources are continuously and regularly collected from hardware and software resources of one or more devices. The resource attributes are continuously fed to one or more confidence calculators. At any given point in time, a single confidence value is provided to an authentication for making a decision as to whether to authenticate a user for access to a particular resource.
-
Citations
20 Claims
-
1. A method, comprising:
-
obtaining, on a device, resource attributes associated with a resource; and determining whether a user is to be passively authenticated for access to a second resource based on the resource attributes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
continuously collecting resource attributes for a resource associated with a device; and providing the resource attributes to a passive authentication mechanism for passively authenticating a user for access to a second resource at given point in time based on automated detection of an event. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A system, comprising:
-
a device; and a resource profiler configured to;
i) execute on the device, ii) continuously collect resource attributes for a resource, and iii) provide the resource attributes to a passive authentication system to initiate passive authentication for access to a second resource. - View Dependent Claims (20)
-
Specification