Authentication involving authentication operations which cross reference authentication factors
First Claim
1. In electronic circuitry, a method of authenticating a person, the method comprising:
- during a current authentication session to authenticate the person, obtaining a first authentication factor from the person and a second authentication factor from the person, at least one of the first and second authentication factors being a biometric input;
performing an authentication operation which cross references the first authentication factor with the second authentication factor; and
outputting, as a result of the authentication operation, an authentication result signal indicating whether the authentication operation has determined the person in the current authentication session likely to be legitimate or an imposter,wherein performing the authentication operation which cross references the first authentication factor with the second authentication factor includes;
generating a correlation result based on an amount of correlation between the first authentication factor and the second authentication factor;
wherein the authentication result signal is based on the correlation result;
wherein the first authentication factor is a first biometric input;
wherein the second authentication factor is a second biometric input; and
wherein generating the correlation result based on the amount of correlation between the first authentication factor and the second authentication factor includes providing, as the correlation result, a correlation score indicating the amount of correlation between the first biometric input and the second biometric input;
wherein performing the authentication operation further includes providing the correlation result to a risk engine which is constructed and arranged to perform an adaptive authentication operation based on the correlation result, the authentication result signal being outputted by the risk engine and being based on the correlation result;
further comprising the risk engine comparing authentication factors from the current authentication session to expected authentication factors, wherein the expected authentication factors are received from a user profile; and
further comprising performing a vitality test, adjusting the test for circadian rhythm, age and elapsed time since a last successful authentication, and comparing against the user profile.
9 Assignments
0 Petitions
Accused Products
Abstract
A technique of authenticating a person involves obtaining, during a current authentication session to authenticate the person, a first authentication factor from the person and a second authentication factor from the person, at least one of the first and second authentication factors being a biometric input. The technique further involves performing an authentication operation which cross references the first authentication factor with the second authentication factor. The technique further involves outputting, as a result of the authentication operation, an authentication result signal indicating whether the authentication operation has determined the person in the current authentication session likely to be legitimate or an imposter. Such authentication, which cross references authentication factors to leverage off of their interdependency, provides stronger authentication than conventional naïve authentication.
66 Citations
21 Claims
-
1. In electronic circuitry, a method of authenticating a person, the method comprising:
-
during a current authentication session to authenticate the person, obtaining a first authentication factor from the person and a second authentication factor from the person, at least one of the first and second authentication factors being a biometric input; performing an authentication operation which cross references the first authentication factor with the second authentication factor; and outputting, as a result of the authentication operation, an authentication result signal indicating whether the authentication operation has determined the person in the current authentication session likely to be legitimate or an imposter, wherein performing the authentication operation which cross references the first authentication factor with the second authentication factor includes; generating a correlation result based on an amount of correlation between the first authentication factor and the second authentication factor; wherein the authentication result signal is based on the correlation result; wherein the first authentication factor is a first biometric input; wherein the second authentication factor is a second biometric input; and wherein generating the correlation result based on the amount of correlation between the first authentication factor and the second authentication factor includes providing, as the correlation result, a correlation score indicating the amount of correlation between the first biometric input and the second biometric input; wherein performing the authentication operation further includes providing the correlation result to a risk engine which is constructed and arranged to perform an adaptive authentication operation based on the correlation result, the authentication result signal being outputted by the risk engine and being based on the correlation result; further comprising the risk engine comparing authentication factors from the current authentication session to expected authentication factors, wherein the expected authentication factors are received from a user profile; and further comprising performing a vitality test, adjusting the test for circadian rhythm, age and elapsed time since a last successful authentication, and comparing against the user profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An electronic system to authenticate a person, the electronic system comprising:
-
receiving circuitry to obtain, during a current authentication session to authenticate the person, a first authentication factor from the person and a second authentication factor from the person, at least one of the first and second authentication factors being a biometric input; processing circuitry coupled to the receiving circuitry to perform an authentication operation which cross references the first authentication factor with the second authentication factor; and outputting circuitry coupled to the processing circuitry to output, as a result of the authentication operation, an authentication result signal indicating whether the authentication operation has determined the person in the current authentication session likely to be legitimate or an imposter; wherein the processing circuitry performing the authentication operation which cross references the first authentication factor with the second authentication factor is constructed and arranged to generate a correlation result based on an amount of correlation between the first authentication factor and the second authentication factor; wherein the authentication result signal is based on the correlation result; wherein the first authentication factor is a first biometric input; wherein the second authentication factor is a second biometric input; and wherein, when constructed and arranged to generate the correlation result based on the amount of correlation between the first authentication factor and the second authentication factor, the processing circuitry is further constructed and arranged to provide, as the correlation result, a correlation score indicating the amount of correlation between the first biometric input and the second biometric input; wherein the processing circuitry performing the authentication operation further includes providing the correlation result to a risk engine which is constructed and arranged to perform an adaptive authentication operation based on the correlation result, the authentication result signal being outputted by the risk engine and being based on the correlation result; further comprising the risk engine comparing authentication factors from the current authentication session to expected authentication factors, wherein the expected authentication factors are received from a user profile; and further comprising performing a vitality test, adjusting the test for circadian rhythm, age and elapsed time since a last successful authentication, and comparing against the user profile.
-
-
21. A computer program product which includes a non-transitory computer readable medium storing a set of instructions to authenticate a person, the set of instructions causing computing circuitry to perform a method, comprising:
-
during a current authentication session to authenticate the person, obtaining a first authentication factor from the person and a second authentication factor from the person, at least one of the first and second authentication factors being a biometric input; performing an authentication operation which cross references the first authentication factor with the second authentication factor; and outputting, as a result of the authentication operation, an authentication result signal indicating whether the authentication operation has determined the person in the current authentication session likely to be legitimate or an imposter; wherein performing the authentication operation which cross references the first authentication factor with the second authentication factor includes; generating a correlation result based on an amount of correlation between the first authentication factor and the second authentication factor; wherein the authentication result signal is based on the correlation result; wherein the first authentication factor is a first biometric input; wherein the second authentication factor is a second biometric input; and wherein generating the correlation result based on the amount of correlation between the first authentication factor and the second authentication factor includes providing, as the correlation result, a correlation score indicating the amount of correlation between the first biometric input and the second biometric input; wherein performing the authentication operation further includes providing the correlation result to a risk engine which is constructed and arranged to perform an adaptive authentication operation based on the correlation result, the authentication result signal being outputted by the risk engine and being based on the correlation result; further comprising the risk engine comparing authentication factors from the current authentication session to expected authentication factors, wherein the expected authentication factors are received from a user profile; and further comprising performing a vitality test, adjusting the test for circadian rhythm, age and elapsed time since a last successful authentication, and comparing against the user profile.
-
Specification