CONTINUOUS AUTHENTICATION OF MOBILE DEVICE USERS
First Claim
Patent Images
1. A method for securing a mobile electronic device, the method comprising:
- by one or more sensors in communication with the mobile electronic device, collecting sensor data from which a plurality of different biometric signatures of a user of the mobile electronic device can be derived;
based on at least some of the sensor data, determining an activity context of the mobile electronic device, the activity context relating to a current activity of the user in relation to the mobile electronic device;
selecting a biometric signature of the plurality of different biometric signatures based on the activity context of the mobile electronic device;
according to the selected biometric signature, executing a routine to verify the identity of the user; and
configuring access to one or more features of the mobile electronic device in response to execution of the routine to verify the identity of the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Technology for performing continuous authentication of a mobile device utilizes user activity context data and biometric signature data related to the user. A biometric signature can be selected based on the activity context, and the selected biometric signature can be used to verify the identity of the user.
61 Citations
20 Claims
-
1. A method for securing a mobile electronic device, the method comprising:
-
by one or more sensors in communication with the mobile electronic device, collecting sensor data from which a plurality of different biometric signatures of a user of the mobile electronic device can be derived; based on at least some of the sensor data, determining an activity context of the mobile electronic device, the activity context relating to a current activity of the user in relation to the mobile electronic device; selecting a biometric signature of the plurality of different biometric signatures based on the activity context of the mobile electronic device; according to the selected biometric signature, executing a routine to verify the identity of the user; and configuring access to one or more features of the mobile electronic device in response to execution of the routine to verify the identity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 17, 18)
-
-
10. A user authentication subsystem for a mobile electronic device, the user authentication system comprising a plurality of instructions embodied in one or more non-transitory machine accessible storage media and configured to cause a computing system of the mobile electronic device to, at regular time intervals:
-
by one or more sensors in communication with the mobile electronic device, collect sensor data from which a plurality of different biometric signatures of a user of the mobile electronic device can be extracted; based on at least some of the sensor data, determine an activity context of the mobile electronic device, the activity context relating to a current activity of the user in relation to the mobile electronic device; select a biometric signature of the plurality of different biometric signatures based on the activity context of the mobile electronic device; according to the selected biometric signature, execute a routine to verify the identity of the user; and configure the mobile electronic device based on output of the routine to verify the identity of the user. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
19. A computing system comprising at least a mobile electronic device, the computing system comprising:
-
one or more hardware processors; one or more sensors coupled to the one or more processors; and memory comprising instructions executable by the one or more processors to cause the mobile electronic device to, over time; receive sensor data from which a plurality of different biometric signatures of a user of the mobile electronic device can be extracted; based on at least some of the sensor data, determine an activity context of the mobile electronic device, the activity context relating to a current activity of the user in relation to the mobile electronic device; select a biometric signature of the plurality of different biometric signatures based on the activity context of the mobile electronic device; with the selected biometric signature, execute a routine to verify the identity of the user; and adjust one or more access privileges of the mobile electronic device in response to output of the routine to verify the identity of the user. - View Dependent Claims (20)
-
Specification