Authenticating users based upon an identity footprint
First Claim
Patent Images
1. A device comprising:
- at least one processor circuit configured to;
identify a first behavioral pattern of a user over a first period of time based at least in part on a first plurality of data items generated by at least one sensor device over the first period of time, wherein the first plurality of data items relate to physical behaviors of the user that are external to the device, and a user signature is generated based at least in part on the first behavioral pattern of the user;
receive a request for authentication of the user, the request specifying an authentication level, wherein the authentication level is associated with a behavior deviation level;
identify a second behavioral pattern over a second period of time based at least in part on a second plurality of data items generated by the at least one sensor device over the second period of time;
determine a degree of deviation of the second behavioral pattern with respect to the user signature;
determine whether the degree of deviation satisfies the behavior deviation level associated with the authentication level, wherein different behavior deviation levels are satisfied by different degrees of deviation between the second behavioral pattern and the user signature, the behavior deviation level decreases as the authentication level with which the behavior deviation level is associated increases, and the behavior deviation level increases as the authentication level with which the behavior deviation level is associated decreases; and
provide an authentication success indication when the degree of deviation satisfies the behavior deviation level, otherwise providing an authentication failure indication.
7 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device is identified. A timestamp is generated and associated with the behavior. A user signature corresponding to a user based at least in part upon the behavior and the timestamp is generated and stored.
-
Citations
20 Claims
-
1. A device comprising:
at least one processor circuit configured to; identify a first behavioral pattern of a user over a first period of time based at least in part on a first plurality of data items generated by at least one sensor device over the first period of time, wherein the first plurality of data items relate to physical behaviors of the user that are external to the device, and a user signature is generated based at least in part on the first behavioral pattern of the user; receive a request for authentication of the user, the request specifying an authentication level, wherein the authentication level is associated with a behavior deviation level; identify a second behavioral pattern over a second period of time based at least in part on a second plurality of data items generated by the at least one sensor device over the second period of time; determine a degree of deviation of the second behavioral pattern with respect to the user signature; determine whether the degree of deviation satisfies the behavior deviation level associated with the authentication level, wherein different behavior deviation levels are satisfied by different degrees of deviation between the second behavioral pattern and the user signature, the behavior deviation level decreases as the authentication level with which the behavior deviation level is associated increases, and the behavior deviation level increases as the authentication level with which the behavior deviation level is associated decreases; and provide an authentication success indication when the degree of deviation satisfies the behavior deviation level, otherwise providing an authentication failure indication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A method implemented by at least one device, the method comprising:
-
obtaining a first plurality of data items generated by at least one sensor device over a first period of time, wherein the first plurality of data items relate to behaviors of a user; identifying, based at least in part on the first plurality of data items, a first behavioral pattern of the user over the first period of time, wherein a user signature is generated based at least in part on the first behavioral pattern of the user; receiving a request for authentication of the user, the request specifying an authentication level for the request, wherein the authentication level is associated with a behavior deviation level; obtaining a second plurality of data items, the second plurality of data items having been generated by the at least one sensor device over a second period of time that immediately preceded receiving the request for authentication; identifying, based at least in part on the second plurality of data items, a second behavioral pattern of the user over the second period of time; determining a degree of deviation of the second behavioral pattern of the user with respect to the user signature; determining whether the degree of deviation satisfies the behavior deviation level associated with the authentication level, wherein different behavior deviation levels are satisfied by different degrees of deviation between the second behavioral pattern and the user signature, the behavior deviation level decreases as the authentication level with which the behavior deviation level is associated increases, and the behavior deviation level increases as the authentication level with which the behavior deviation level is associated decreases; and providing an authentication success indication when the degree of deviation satisfies the behavior deviation level, otherwise providing an authentication failure indication. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer program product comprising instructions stored in a tangible non-transitory computer-readable storage medium executed by a computing device, the instructions comprising:
-
instructions to identify a first behavioral pattern of a user for a first period of time based at least in part on monitored behaviors of the user over the first period of time and generate a user signature based at least in part on the first behavioral pattern of the user; instructions to receive a request for authentication of the user, the request specifying an authentication level for the request, wherein the authentication level is associated with a behavior deviation level; instructions to generate a second behavioral pattern of the user for a second period of time based at least in part on monitored behaviors of the user over the second period of time, wherein the second period of time immediately preceded receipt of the request; instructions to determine a degree of deviation of the second behavioral pattern of the user with respect to the user signature; instructions to determine whether the degree of deviation satisfies the behavior deviation level associated with the authentication level, wherein different behavior deviation levels are satisfied by different degrees of deviation between the second behavioral pattern and the user signature, the behavior deviation level decreases as the authentication level with which the behavior deviation level is associated increases, and the behavior deviation level increases as the authentication level with which the behavior deviation level is associated decreases; and instructions to provide an authentication success indication when the degree of deviation satisfies the behavior deviation level, otherwise providing an authentication failure indication. - View Dependent Claims (19, 20)
-
Specification