TECHNOLOGIES FOR ENHANCED USER AUTHENTICATION USING ADVANCED SENSOR MONITORING
First Claim
1. A computing device for coerced authentication response, the computing device comprising:
- an authentication module to verify a user authentication factor provided by a user;
a coercion detection module to (i) analyze sensor data to generate a coercion detection score in response to verifying the user authentication factor, wherein the sensor data is indicative of a physical condition of the user of the computing device while the user provided the user authentication factor, and (ii) determine whether the coercion detection score has a predetermined relationship to a threshold coercion detection score; and
a security response module to perform a security operation in response to a determination that the coercion detection score has the predetermined relationship to the threshold coercion detection score.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed.
99 Citations
25 Claims
-
1. A computing device for coerced authentication response, the computing device comprising:
-
an authentication module to verify a user authentication factor provided by a user; a coercion detection module to (i) analyze sensor data to generate a coercion detection score in response to verifying the user authentication factor, wherein the sensor data is indicative of a physical condition of the user of the computing device while the user provided the user authentication factor, and (ii) determine whether the coercion detection score has a predetermined relationship to a threshold coercion detection score; and a security response module to perform a security operation in response to a determination that the coercion detection score has the predetermined relationship to the threshold coercion detection score. - View Dependent Claims (2, 3, 4, 5)
-
-
6. One or more computer-readable storage media comprising a plurality of instructions that in response to being executed cause a computing device to:
-
verify a user authentication factor provided by a user; analyze sensor data to generate a coercion detection score in response to verifying the user authentication factor, wherein the sensor data is indicative of a physical condition of the user of the computing device while the user is providing the authentication factor; determine whether the coercion detection score has a predetermined relationship to a threshold coercion detection score; and perform a security operation in response to determining the coercion detection score has the predetermined relationship to the threshold coercion detection score. - View Dependent Claims (7, 8)
-
-
9. A computing device for elevated risk response, the computing device comprising:
-
a sensor module to monitor, by a trusted execution environment, sensor data from a plurality of sensors of the computing device; a risk classifier module to apply, by the trusted execution environment, a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack to the computing device; and a risk actuator module to trigger, by the trusted execution environment, a security response in response to identification of the elevated risk. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. One or more computer-readable storage media comprising a plurality of instructions that in response to being executed cause a computing device to:
-
monitor, by a trusted execution environment of the computing device, sensor data from a plurality of sensors of the computing device; apply, by the trusted execution environment, a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack to the computing device; and identify, by the trusted execution environment, the elevated risk of malicious attack in response to applying the machine-learning classifier; and trigger, by the trusted execution environment, a security response in response to identifying the elevated risk. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification