Internet based training
First Claim
1. An apparatus for verifying the identity of a user while said user operates a secure application, said user exhibiting one or more behavioral patterns unique to said user, said user exhibited behavioral patterns captured using one or more interface devices, said apparatus comprising:
- a habit capture system adapted to receive said user exhibited behavioral patterns, including one of response patterns to queries generated by the secure application, typing patterns, misspelling patterns, and mouse click patterns;
a database coupled to said habit capture system, said database adapted to store predetermined habits and personal characteristics upon initialization of said database;
a verifier coupled to said database and said habit capture system, said verifier sampling the user'"'"'s behavioral patterns and comparing said behavioral patterns to said database, said verifier asserting an error signal when said user behavioral patterns and said database predetermined habits and personal characteristics fail to match; and
a lock coupled to said verifier and to said application, said lock either generating a warning or ejecting said user from said secure application when said verifier asserts said error signal.
2 Assignments
0 Petitions
Accused Products
Abstract
A verifier is provided for assessing unique characteristics exhibits by a user over a period of time. The unique characteristics are captured through various interactions with the user over time using a habit capture system which models the user'"'"'s characteristics when he or she uses a keyboard, a mouse or a digitizer, among others. When the system is first used, the user is prompted to answer various questions, some of which inquire into personal information. As the user responds, information representative of the user is captured, including keyboard typing patterns, mouse click patterns, misspelling patterns, among others. Data captured by the habit capture system is provided to a verifier which samples the user'"'"'s characteristics and compares the characteristics of the current user with that stored in a database.
166 Citations
20 Claims
-
1. An apparatus for verifying the identity of a user while said user operates a secure application, said user exhibiting one or more behavioral patterns unique to said user, said user exhibited behavioral patterns captured using one or more interface devices, said apparatus comprising:
-
a habit capture system adapted to receive said user exhibited behavioral patterns, including one of response patterns to queries generated by the secure application, typing patterns, misspelling patterns, and mouse click patterns; a database coupled to said habit capture system, said database adapted to store predetermined habits and personal characteristics upon initialization of said database; a verifier coupled to said database and said habit capture system, said verifier sampling the user'"'"'s behavioral patterns and comparing said behavioral patterns to said database, said verifier asserting an error signal when said user behavioral patterns and said database predetermined habits and personal characteristics fail to match; and a lock coupled to said verifier and to said application, said lock either generating a warning or ejecting said user from said secure application when said verifier asserts said error signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A program storage device for verifying the identity of a user while said user operates a secure application, said user exhibiting one or more characteristics unique to said user, said user exhibited characteristics captured using one or more input devices, said program storage device comprising:
-
a habit capture system adapted to receive said user exhibited characteristics, the characteristics including one of response patterns to queries generated by the secure application, typing patterns, misspelling patterns, and mouse click patterns; a database coupled to said habit capture system, said database adapted to store predetermined habits and personal characteristics upon initialization of said database; a verifier code coupled to said database and said habit capture code, said verifier code sampling the user'"'"'s characteristics and comparing said characteristics to said database, said verifier code asserting an error signal when said user characteristics and said database predetermined characteristics fails to match; and a lock code coupled to said verifier code and to said application, said lock code either generating a warning or ejecting said user from said secure application when said verifier code asserts said error signal. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method for verifying the identity of a user while said user operates a secure application, said user exhibiting one or more characteristics unique to said user, said user exhibited characteristics captured using one or more input devices, said method comprising the steps of:
-
storing predetermined habits and personal characteristics into a database upon initialization; capturing the user'"'"'s exhibited habits and characteristics, the habits and characteristics including one of response patterns to queries generated by the secure application, typing patterns, misspelling patterns, and mouse click patterns; verifying the captured habits and characteristics against the predetermined habits and characteristics stored in the database; asserting an error signal when said user characteristics and said database predetermined characteristics fail to match; and generating a warning or locking the user from the application when the error signal is asserted. - View Dependent Claims (19, 20)
-
Specification