SCREEN-ANALYSIS BASED DEVICE SECURITY
First Claim
1. A mobile device comprising:
- at least one processor; and
memory storing instructions that, when executed by the at least one processor, cause the mobile device to;
identify content rendered by a mobile application, the content being rendered during a session,generate feature vectors from the content,determine that the feature vectors do not match a classification model, andprovide, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile application, the content being rendered during a session, generating feature vectors from the content and determining that the feature vectors do not match a classification model. The method also includes providing, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device. Another example method includes determining a computing device is located at a trusted location, capturing information from a session, the information coming from content rendered by a mobile application during the session, generating feature vectors for the session, and repeating this until a training criteria is met. The method also includes training a classification model using the feature vectors and authenticating a user of the device using the trained classification model.
35 Citations
20 Claims
-
1. A mobile device comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the mobile device to; identify content rendered by a mobile application, the content being rendered during a session, generate feature vectors from the content, determine that the feature vectors do not match a classification model, and provide, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining that a mobile device is located at a trusted location; capturing information from a session, the information coming from content rendered by a mobile application running on the mobile device during the session; generating feature vectors for the session; repeating the capturing and determining until a training criteria is met; training a classification model using at least some of the feature vectors; and authenticating a user of the mobile device using the trained classification model. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A mobile device comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the mobile device to; identify content rendered by a mobile application, the content being rendered during a session, generate feature vectors from the content, apply a classification model to the feature vectors, determine whether the feature vectors match a first user profile based on application of the classification model, the first user profile differing from a second user profile, the mobile device being currently associated with the second user profile, and initiate a profile switch responsive to determining that the feature vectors match the first user profile. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification