Authenticating users based upon an identity footprint
First Claim
Patent Images
1. A system, comprising:
- at least one sensor configured to determine at least one of a position or movement of the system; and
circuitry in communication with the at least one sensor, the circuitry being configured to;
identify, using the at least one sensor, at least one behavior associated with use of the system over a first period of time;
generate at least one timestamp associated with the at least one behavior and the first period of time;
generate a user signature corresponding to the use of the system over the first period of time based at least in part upon the at least one behavior and the at least one timestamp,obtain a request to authenticate a user of the system from a system requesting authentication, wherein the request to authenticate the user indicates one of a higher level of authentication or a lower level of authentication,in response to the request, determine whether use of the system over a second period of time other than the first period of time corresponds to the user signature and identify a deviation between the use of the computing device over the second period of time and the use of the computing device over the first period of time;
when the request to authenticate the user indicates the higher level of authentication, comparing the deviation against a lower level of deviation permitted for authentication of the user;
and when the request to authenticate the user indicates the lower level of authentication, comparing the deviation against a higher level of deviation permitted for authentication of the user; and
authenticating the user when the use of the computing device over the second period of time corresponds to the use of the computing device over the first period of time in accordance with the user signature.
7 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device is identified. A timestamp is generated and associated with the behavior. A user signature corresponding to a user based at least in part upon the behavior and the timestamp is generated and stored.
-
Citations
18 Claims
-
1. A system, comprising:
-
at least one sensor configured to determine at least one of a position or movement of the system; and circuitry in communication with the at least one sensor, the circuitry being configured to; identify, using the at least one sensor, at least one behavior associated with use of the system over a first period of time; generate at least one timestamp associated with the at least one behavior and the first period of time; generate a user signature corresponding to the use of the system over the first period of time based at least in part upon the at least one behavior and the at least one timestamp, obtain a request to authenticate a user of the system from a system requesting authentication, wherein the request to authenticate the user indicates one of a higher level of authentication or a lower level of authentication, in response to the request, determine whether use of the system over a second period of time other than the first period of time corresponds to the user signature and identify a deviation between the use of the computing device over the second period of time and the use of the computing device over the first period of time; when the request to authenticate the user indicates the higher level of authentication, comparing the deviation against a lower level of deviation permitted for authentication of the user; and when the request to authenticate the user indicates the lower level of authentication, comparing the deviation against a higher level of deviation permitted for authentication of the user; and authenticating the user when the use of the computing device over the second period of time corresponds to the use of the computing device over the first period of time in accordance with the user signature. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising:
-
identifying, with at least one circuit, at least one behavior associated with use of a computing device over a first period of time using data from at least one sensor; generating, with the at least one circuit, at least one timestamp associated with the at least one behavior and the first period of time; generating, with the at least one circuit, a user signature corresponding to the use of the computing device over the first period of time based at least in part upon the at least one behavior and the at least one timestamp, obtaining a request to authenticate a user of the computing device from a system requesting authentication, wherein the request to authenticate the user indicates one of a higher level of authentication or a lower level of authentication; in response to the request, determining whether use of the computing device over a second period of time other than the first period of time corresponds to the user signature and identifying a deviation between the use of the computing device over the second period of time and the use of the computing device over the first period of time; when the request to authenticate the user indicates the higher level of authentication, comparing the deviation against a lower level of deviation permitted for authentication of the user; and when the request to authenticate the user indicates the lower level of authentication, comparing the deviation against a higher level of deviation permitted for authentication of the user; and authenticating the user when the use of the computing device over the second period of time corresponds to the use of the computing device over the first period of time in accordance with the user signature. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable medium embodying a software program thereon, the software program, when executed by a computing device, directing the computing device to perform a method, comprising:
-
identifying, with the computing device, a behavior associated with use of the computing device over a first period of time using data from at least one sensor; generating, with the computing device, at least one timestamp associated with the behavior and the first period of time; generating, with the computing device, a user signature corresponding to the use of the computing device over the first period of time based at least in part upon the behavior and the at least one timestamp; obtaining a request to authenticate a user of the computing device from a system requesting authentication, wherein the request to authenticate the user indicates one of a higher level of authentication or a lower level of authentication; in response to the request, determining whether use of the computing device over a second period of time other than the first period of time corresponds to the user signature and identifying a deviation between the use of the computing device over the second period of time and the use of the computing device over the first period of time; and when the request to authenticate the user indicates the higher level of authentication, comparing the deviation against a lower level of deviation permitted for authentication of the user; and when the request to authenticate the user indicates the lower level of authentication, comparing the deviation against a higher level of deviation permitted for authentication of the user; and authenticating the user when the use of the computing device over the second period of time corresponds to the use of the computing device over the first period of time in accordance with the user signature. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification