Behavioral fingerprint based authentication
First Claim
1. A computationally-implemented system, comprising:
- circuitry for determining that a first user of a computing device is associated with the computing device; and
circuitry for determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least circuitry for determining the behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of the computing device.
8 Assignments
0 Petitions
Accused Products
Abstract
A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. A level of authentication determination may additionally/alternatively include at least determining a behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of a computing device. A level of authentication determination may additionally/alternatively include at least determining an authentication level with respect to a computing device at least partially based on a behavioral fingerprint determined from interaction(s) with another device. In addition to the foregoing, other example aspects are described in the claims, drawings, and written description forming a part of the present disclosure.
-
Citations
35 Claims
-
1. A computationally-implemented system, comprising:
-
circuitry for determining that a first user of a computing device is associated with the computing device; and circuitry for determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least circuitry for determining the behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computationally-implemented system, comprising:
-
circuitry for determining that a first user of a computing device is associated with the computing device; and circuitry for determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least circuitry for determining the level of authentication associated with the first user at least partially via a reconstructed key formed via gathered data from at least one social network. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. A computationally-implemented system, comprising:
-
circuitry for determining that a first user of a computing device is associated with the computing device; and circuitry for determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least circuitry for determining a level of authentication associated with the first user with respect to the computing device at least partially based on a behavioral fingerprint that is based, at least in part, on one or more interactions between another device and an authorized user of the computing device.
-
-
30. A computationally-implemented method, comprising:
-
determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint including at least determining the behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of the computing device.
-
-
31. At least one processor-accessible medium bearing processor-executable instructions, the processor-executable instructions comprising:
-
one or more instructions for determining that a first user of a computing device is associated with the computing device; and one or more instructions for determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least one or more instructions for determining the behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of the computing device.
-
-
32. A computationally-implemented method, comprising:
-
determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least determining the level of authentication associated with the first user at least partially via a reconstructed key formed via gathered data from at least one social network.
-
-
33. At least one processor-accessible medium bearing processor-executable instructions, the processor-executable instructions comprising:
-
one or more instructions for determining that a first user of a computing device is associated with the computing device; and one or more instructions for determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least one or more instructions for determining the level of authentication associated with the first user at least partially via a reconstructed key formed via gathered data from at least one social network.
-
-
34. A computationally-implemented method, comprising:
-
determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least determining a level of authentication associated with the first user with respect to the computing device at least partially based on a behavioral fingerprint that is based, at least in part, on one or more interactions between another device and an authorized user of the computing device.
-
-
35. At least one processor-accessible medium bearing processor-executable instructions, the processor-executable instructions comprising:
-
one or more instructions for determining that a first user of a computing device is associated with the computing device; and one or more instructions for determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint, including at least one or more instructions for determining a level of authentication associated with the first user with respect to the computing device at least partially based on a behavioral fingerprint that is based, at least in part, on one or more interactions between another device and an authorized user of the computing device.
-
Specification