USER IDENTITY BASED ON LOCATION PATTERNS OF NON-ASSOCIATED DEVICES
First Claim
Patent Images
1. A method comprising:
- storing a reference set of environmental signals for a specified location;
receiving an authentication information from a user device at the specified location;
responsive to receiving the authentication information, determining a current set of environmental signals for the specified location; and
comparing the reference set of environmental signals with the current set of environmental signals to establish a risk score;
wherein;
at least the steps of determining and comparing are performed by computer software running on computer hardware.
1 Assignment
0 Petitions
Accused Products
Abstract
Authentication of users is based at least in part on a comparison of environmental signals of a present location with environmental signals identified earlier for the present location. Verification of the user location supports authentication where a conventional user logon actions are insufficient.
-
Citations
18 Claims
-
1. A method comprising:
-
storing a reference set of environmental signals for a specified location; receiving an authentication information from a user device at the specified location; responsive to receiving the authentication information, determining a current set of environmental signals for the specified location; and comparing the reference set of environmental signals with the current set of environmental signals to establish a risk score; wherein; at least the steps of determining and comparing are performed by computer software running on computer hardware. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising a computer readable storage medium having stored thereon:
-
first program instructions programmed to store a reference set of environmental signals for a specified location; second program instructions programmed to receive an authentication information from a user device at the specified location; third program instructions programmed to, responsive to receiving the authentication information, determine a current set of environmental signals for the specified location; and fourth program instructions programmed to compare the reference set of environmental signals with the current set of environmental signals to establish a risk score. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer system comprising:
-
a processor(s) set; and a computer readable storage medium; wherein; the processor set is structured, located, connected, and/or programmed to run program instructions stored on the computer readable storage medium; and the program instructions include; first program instructions programmed to store a reference set of environmental signals for a specified location; second program instructions programmed to receive an authentication information from a user device at the specified location; third program instructions programmed to, responsive to receiving the authentication information, determine a current set of environmental signals for the specified location; and fourth program instructions programmed to compare the reference set of environmental signals with the current set of environmental signals to establish a risk score. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification