Method of and apparatus for combining artificial intelligence (AI) concepts with event-driven security architectures and ideas
First Claim
1. A method of providing additional security to a user'"'"'s accessing of a secure information system, by password, ID and dynamic biometric inputting characteristics of the user, comprising:
- incorporating an artificial intelligence (AI) architecture feature wherein highly personal questions said highly personal questions having not previously been answered by an owner of the password and ID are asked of the user that only said owner of the password and ID would be able to answer instantaneously from the subconscious mind, as distinguished from a user other than the owner who would require a finite response time, said response time being the time between said asking a highly personal question and commencement of a response by said user;
establishing access-authorization confidence levels in accordance with such response times;
measuring the time for the user to commence responding to such personal questions; and
assigning a level of confidence for access in accordance with such measured response times.
1 Assignment
0 Petitions
Accused Products
Abstract
User authentication apparatus controlling access to systems, inputs owner'"'"'s login name and password and then extracts the owner'"'"'s timing vectors from keystroke characteristics with which the owner forms a training set. A semantic network uses multiple links to indicate that different pattern components of user'"'"'s behavioral access create different kinds of relationships and “symbolic representations”. A neural network is trained by using each of the owner'"'"'s timing vectors in the training set as an input. When a user inputs the owner'"'"'s login name and password, it'"'"'s checked and the user'"'"'s timing vector is extracted to type the user'"'"'s password if checked and demoted in confidence level if otherwise. The user'"'"'s timing vector is applied to neural network and difference between the input/output is compared with a predetermined threshold; and if the difference is greater than the threshold, is prohibited. Preferably this is aided by response time to personal questions.
24 Citations
21 Claims
-
1. A method of providing additional security to a user'"'"'s accessing of a secure information system, by password, ID and dynamic biometric inputting characteristics of the user, comprising:
-
incorporating an artificial intelligence (AI) architecture feature wherein highly personal questions said highly personal questions having not previously been answered by an owner of the password and ID are asked of the user that only said owner of the password and ID would be able to answer instantaneously from the subconscious mind, as distinguished from a user other than the owner who would require a finite response time, said response time being the time between said asking a highly personal question and commencement of a response by said user; establishing access-authorization confidence levels in accordance with such response times; measuring the time for the user to commence responding to such personal questions; and assigning a level of confidence for access in accordance with such measured response times.
-
-
2. A method for identity confirmation in a secure system, comprising:
-
Prompting, with an artificial intelligence feature, input of highly personal user data by a user; Measuring response time from said prompting until commencement of data input by said user; Comparing said response time to baseline response time data of said user; Generating a user score from results of said comparing; and Allowing to said user a level of access to said secure system consistent with said user score and pre-set score access levels. - View Dependent Claims (3, 4, 5)
-
-
6. Apparatus for providing additional security to a user'"'"'s accessing of a secure information system, by password, ID and dynamic biometric inputting characteristics of the user comprising:
- an artificial intelligence (AI) engine architecture wherein highly personal questions are generated and asked of the user that only the owner of the password and ID would be able to answer instantaneously, as distinguished from another user other than the owner who would require a finite response time for commencing input of a response;
an access-authorization confidence level list established in accordance with such response times;
a timer for measuring the time for the user to commence responding to such personal questions; and
a confidence level rater for assigning a level of confidence for access in accordance with such measured response times. - View Dependent Claims (7, 8, 9)
- an artificial intelligence (AI) engine architecture wherein highly personal questions are generated and asked of the user that only the owner of the password and ID would be able to answer instantaneously, as distinguished from another user other than the owner who would require a finite response time for commencing input of a response;
-
10. A user authentication method for use in controlling user access to a data information system having an input, that comprises, inputting at such input the owner'"'"'s log-in name and password;
- extracting the owner'"'"'s timing vectors from biometric inputting characteristics with which the owner repeatedly inputs the owner'"'"'s password to form a training set;
setting up a semantic network using multiple links to indicate that different pattern components of a user'"'"'s behavioral access to the input create different kinds of symbolic representations rather than just simple connections or links;
setting up neural network training by using each of the owner'"'"'s timing vectors in the training set as the input thereto;
checking if the user'"'"'s password is identical to the owner'"'"'s password when a user thereafter inputs the owner'"'"'s log-in name and password;
extracting the user'"'"'s timing vector from said user'"'"'s inputting characteristics to derive the user'"'"'s password if user-checking is affirmative;
otherwise, demoting the user in confidence level for accessing the system;
applying the user'"'"'s timing vector to the training neural network as an input;
comparing the difference between such input and an output of the neural network with a predetermined threshold; and
permitting user access to the system if the difference is not greater than such threshold, while demoting the confidence level or totally prohibiting access to the system, if otherwise; and
wherein artificial intelligence (AI) architecture features are added to the system wherein highly personal questions are asked of the user that only the owner of the password and ID would be able to answer instantaneously, as distinguished from another user other than the owner who would require a finite response time to commence a response;
establishing access authorization confidence levels in accordance with such response times;
measuring the time for the user to commence responding to such personal questions; and
assigning a level of confidence for access in accordance with such measured response times. - View Dependent Claims (11, 12, 13)
- extracting the owner'"'"'s timing vectors from biometric inputting characteristics with which the owner repeatedly inputs the owner'"'"'s password to form a training set;
-
14. A user authentication method for use in controlling access to a computer system having a keyboard, that comprises, inputting at such keyboard the owner'"'"'s log-in name and password;
- extracting the owner'"'"'s timing vectors from keyboard stroke characteristics with which the owner repeatedly has typed the owner'"'"'s password to form a training set;
setting up a semantic network using multiple links to indicate that different pattern components of a user'"'"'s behavioral access create different kinds of symbolic representations rather than just simple connections or links;
setting up neural network training by using each of the owner'"'"'s timing vectors in the training set as input thereto;
thereafter when a user inputs the owner'"'"'s log-in name and password, checking if the user'"'"'s password is identical to the owner'"'"'s password;
extracting the user'"'"'s timing vector from a keystroke characteristic to type the user'"'"'s password if the checked result is affirmative;
otherwise, demoting the user in confidence level for accessing the system;
applying the user'"'"'s timing vector to the trained neural network as in input;
comparing the difference between such input and an output of the neural network with a predetermined threshold; and
permitting user access to the system if the difference is not greater than such threshold, while demoting the confidence level or prohibiting access to the system, if otherwise; and
monitoring the user'"'"'s response time to commence answering questions personal to the owner to adjust the setting of the confidence level. - View Dependent Claims (15, 16, 17, 18, 19)
- extracting the owner'"'"'s timing vectors from keyboard stroke characteristics with which the owner repeatedly has typed the owner'"'"'s password to form a training set;
-
20. A user authentication apparatus for use in controlling access to a data information system having an input, comprising:
- an input device to log-in the owner'"'"'s name and password;
an output extractor of the owner'"'"'s timing vectors from inputting characteristics with which the owner repeatedly has inputted the owner'"'"'s password to form a training set;
a semantic network using multiple links to indicate that different pattern components of a user'"'"'s behavioral access to the input device create different kinds of symbolic representations rather than just simple connections or links;
a neural network training set created by using each of the owner'"'"'s timing vectors in the training as the input thereto;
a comparer for checking if the user'"'"'s password is identical to the owner'"'"'s password when a user thereafter inputs the owner'"'"'s log-in name and password;
an extractor of the user'"'"'s timing vector from said user'"'"'s inputting characteristics to derive the user'"'"'s password if said checking is affirmative; and
otherwise, demoting the user in confidence level for accessing the system;
connections applying the user'"'"'s timing vector to the trained neural network as an input;
a further comparator for comparing the difference between such input and an output of the neural network with a predetermined threshold; and
a decision engine permitting user access to the system if the difference is not greater than such threshold, while demoting the confidence level or totally prohibiting access to the system, if otherwise; and
a processor for monitoring the user'"'"'s response time to commence answering questions personal to the owner to adjust the setting of the confidence level.
- an input device to log-in the owner'"'"'s name and password;
-
21. A method for identification confirmation of a user'"'"'s identity during login to a secure system, comprising:
-
Prompting input of highly personal user data with an artificial intelligence feature, said artificial intelligent feature having both semantic and neural components, said highly personal data being data which an owner user would commence answering substantially without hesitation, but which a non-owner user would have a measurable response commencement hesitation; Measuring response time of a user, said response time being the time between said prompting input and commencement of a response by said user; and Assigning, in accordance with preset access-authorized confidence levels, a level of confidence for access processed from said response time using said artificial intelligence feature, said feature measuring the reflective thinking ability of said user.
-
Specification