Methods and Systems for Using Behavioral Analysis Towards Efficient Continuous Authentication
First Claim
1. A method of performing multifactor user authentication in a computing device, comprising:
- determining in a processor of the computing device one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value;
using one or more of the transaction type criticality value, the user confidence value, the software integrity confidence value, and the historical behavior value to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device; and
authenticating the user by evaluating the determined number of authentication factors.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device processor may be configured with processor-executable instructions to implement methods of using behavioral analysis and machine learning techniques to identify, prevent, correct, and/or otherwise respond to malicious or performance-degrading behaviors of the computing device. As part of these operations, the processor may perform multifactor authentication operations that include determining one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value, using the one or more of these values to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device, and authenticating the user by evaluating the determined number of authentication factors.
105 Citations
32 Claims
-
1. A method of performing multifactor user authentication in a computing device, comprising:
-
determining in a processor of the computing device one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value; using one or more of the transaction type criticality value, the user confidence value, the software integrity confidence value, and the historical behavior value to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device; and authenticating the user by evaluating the determined number of authentication factors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing device, comprising:
a processor configured with processor-executable instructions to perform operations comprising; determining one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value; using one or more of the transaction type criticality value, the user confidence value, the software integrity confidence value, and the historical behavior value to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device; and authenticating the user by evaluating the determined number of authentication factors. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A non-transitory computer readable storage medium having stored thereon processor-executable software instructions configured to cause a processor of a computing device to perform operations, comprising:
-
determining one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value; using one or more of the transaction type criticality value, the user confidence value, the software integrity confidence value, and the historical behavior value to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device; and authenticating the user by evaluating the determined number of authentication factors. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A computing device, comprising:
-
means for determining one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value; means for using one or more of the transaction type criticality value, the user confidence value, the software integrity confidence value, and the historical behavior value to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device; and means for authenticating the user by evaluating the determined number of authentication factors. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
Specification