System and method of enhancing security of a wireless device through usage pattern detection
First Claim
Patent Images
1. A method of performing user identification on a device having a security policy and comprising a touch sensitive input device, the method comprising:
- receiving data corresponding to use of a virtual keyboard provided on said touch sensitive input device, received data including a set of data points indicating where on a key of the virtual keyboard a touch was registered when the key was actuated, at least a subset of the data points representing a single touch;
determining from said received data a first location on the key of the virtual keyboard, the first location indicating where the key was touched on the virtual keyboard when the data was received, the first location comprising one of the following;
a top left quadrant of the key, a top right quadrant of the key, a bottom left quadrant of the key, or a bottom right quadrant of the key;
determining, based on the first location and a signature associated with a user profile, whether an identity of a user inputting the received data corresponds to the user profile, wherein the signature is calculated based on a second location of the key on the virtual keyboard determined from training data received at the device, the second location indicating where the key on the virtual keyboard was touched when the training data was received, the second location comprising one of the following;
the top left quadrant of the key, the top right quadrant of the key, the bottom left quadrant of the key, or the bottom right quadrant of the key, the training data received in a sample of text to obtain biometric data relating to how the user types on the virtual keyboard;
modifying said security policy on said device, based on said determining of whether the identity of the user inputting the received data corresponds to the user profile, by selecting said security policy from a plurality of different levels of access to said device, each of said plurality of different levels of access associated with a respective conditions of whether unauthorized use has occurred at said device; and
,repeating, after every N number of touches at the virtual keyboard, where N is based on a level of access to said device as defined in said security policy, the determining from said received data the first location on the key, and the determining whether the identity of the user inputting the received data corresponds to the user profile, said security policy again modified when the identity of the user inputting the received data no longer matches the user profile.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of identifying a user of a device having a security policy and including a touch sensitive input device. The method includes receiving data corresponding to use of the touch sensitive input device by the user and determining from the received data at least one feature. Based on the at least one feature and a signature associated with an identifiable user, the method determines a likelihood that the user is the identifiable user and modifies, based on the likelihood, the security policy on the device.
-
Citations
14 Claims
-
1. A method of performing user identification on a device having a security policy and comprising a touch sensitive input device, the method comprising:
-
receiving data corresponding to use of a virtual keyboard provided on said touch sensitive input device, received data including a set of data points indicating where on a key of the virtual keyboard a touch was registered when the key was actuated, at least a subset of the data points representing a single touch; determining from said received data a first location on the key of the virtual keyboard, the first location indicating where the key was touched on the virtual keyboard when the data was received, the first location comprising one of the following;
a top left quadrant of the key, a top right quadrant of the key, a bottom left quadrant of the key, or a bottom right quadrant of the key;determining, based on the first location and a signature associated with a user profile, whether an identity of a user inputting the received data corresponds to the user profile, wherein the signature is calculated based on a second location of the key on the virtual keyboard determined from training data received at the device, the second location indicating where the key on the virtual keyboard was touched when the training data was received, the second location comprising one of the following;
the top left quadrant of the key, the top right quadrant of the key, the bottom left quadrant of the key, or the bottom right quadrant of the key, the training data received in a sample of text to obtain biometric data relating to how the user types on the virtual keyboard;modifying said security policy on said device, based on said determining of whether the identity of the user inputting the received data corresponds to the user profile, by selecting said security policy from a plurality of different levels of access to said device, each of said plurality of different levels of access associated with a respective conditions of whether unauthorized use has occurred at said device; and
,repeating, after every N number of touches at the virtual keyboard, where N is based on a level of access to said device as defined in said security policy, the determining from said received data the first location on the key, and the determining whether the identity of the user inputting the received data corresponds to the user profile, said security policy again modified when the identity of the user inputting the received data no longer matches the user profile. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A device having a security policy, the device comprising a touch sensitive input device and a computer readable memory storing computer executable instructions thereon that when executed, cause the device to:
-
receive data corresponding to use of a virtual keyboard provided on said touch sensitive input device, received data including a set of data points indicating where on a key of the virtual keyboard a touch was registered when the key was actuated, at least a subset of the data points representing a single touch; determine from said received data a first location on the key of the virtual keyboard, the first location indicating where the key was touched on the virtual keyboard when the data was received, the first location comprising one of the following;
a top left quadrant of the key, a top right quadrant of the key, a bottom left quadrant of the key, or a bottom right quadrant of the key;determine, based on the first location and a signature associated with a user profile, whether an identity of a user inputting the received data corresponds to the user profile, wherein the signature is calculated based on a second location of the key on the virtual keyboard determined from training data received at the device, the second location indicating where the key was touched on the virtual keyboard when the training data was received, the second location comprising one of the following;
the top left quadrant of the key, the top right quadrant of the key, the bottom left quadrant of the key, or the bottom right quadrant of the key, the training data received in a sample of text to obtain biometric data relating to how the user types on the virtual keyboard;modify said security policy on said device, based on said determining of whether the identity of the user inputting the received data corresponds to the user profile, by selecting said security policy from a plurality of different levels of access to said device, each of said plurality of different levels of access associated with a respective conditions of whether unauthorized use has occurred at said device by selecting said security policy from a plurality of different levels of access to said device, each of said plurality of different levels of access associated with a respective conditions of whether unauthorized use has occurred at said device; and
,repeat, after every N number of touches at the virtual keyboard, where N is based on a level of access to said device as defined in said security policy, the determining from said received data the first location on the key, and the determining whether the identity of the user inputting the received data corresponds to the user profile, such that a likelihood that an authorized user is or is not the user accessing the device is repeated after every of the N number of touches, said security policy again modified when the identity of the user inputting the received data no longer matches the user profile.
-
-
7. A method of modifying a security policy of a device, the method comprising:
-
receiving data corresponding to use of said device, wherein said data corresponding to use of said device comprises data corresponding to use of a touchscreen;
wherein said data corresponding to use of said touchscreen comprises data corresponding to use of key of a virtual keyboard displayed on said touchscreen;
wherein said use of the key of the virtual keyboard displayed on said touchscreen comprises interacting with said touchscreen at a plurality of areas on said touchscreen; and
wherein said data corresponding to use of said touchscreen further comprises data corresponding to said plurality of areas on said touchscreen;
received data including a set of data points indicating where on the key of the virtual keyboard a touch was registered when the key was actuated, at least a subset of the data points representing a single touch;determining a level of certainty that an identity of a user inputting the received data corresponds to a user profile, the level of certainty being based on at least one feature determined from said received data, wherein the at least one feature corresponds to a behavioural characteristic associated with how the received data was inputted into the device, the behavioral characteristic comprising where the key was touched when sample text was received to obtain biometric data relating to how the user types on the virtual keyboard; modifying said security policy on said device to correlate to said level of certainty, by selecting said security policy from a plurality of different levels of access to said device, each of said plurality of different levels of access associated with a respective conditions of whether unauthorized use has occurred at said device; receiving further data corresponding to further use of said device; determining, based on said further data, an increased or decreased level of certainty that the identity of the user corresponds to the user profile; modifying said security policy on said device to correlate to the increased or decreased level of certainty; and
,repeating, after every N number of touches at the virtual keyboard, where N is based on a level of access to said device as defined in said security policy, the determining the increased or decreased level of certainty that the identity of the user corresponds to the user profile, said security policy again modified when the level of certainty changes. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A device having a security policy, the device comprising a computer readable memory storing computer executable instructions thereon that when executed, cause the device to:
-
receive data corresponding to use of said device, wherein said data corresponding to use of said device comprises data corresponding to use of a touchscreen;
wherein said data corresponding to use of said touchscreen comprises data corresponding to use of key of a virtual keyboard displayed on said touchscreen;
wherein said use of the key of the virtual keyboard displayed on said touchscreen comprises interacting with said touchscreen at a plurality of areas on said touchscreen; and
wherein said data corresponding to use of said touchscreen further comprises data corresponding to said plurality of areas on said touchscreen;
received data including a set of data points indicating where on the key of the virtual keyboard a touch was registered when the key was actuated, at least a subset of the data points representing a single touch;determine a level of certainty that an identity of a user inputting the received data corresponds to a user profile, the level of certainty being based on at least one feature determined from said received data, wherein the at least one feature corresponds to a behavioural characteristic associated with how the received data was inputted into the device, the behavioral characteristic comprising where the key was touched when sample text was received to obtain biometric data relating to how the user types on the virtual keyboard; modify said security policy on said device to correlate to said level of certainty, by selecting said security policy from a plurality of different levels of access to said device, each of said plurality of different levels of access associated with a respective conditions of whether unauthorized use has occurred at said device; receive further data corresponding to further use of said device; determine, based on said further data, an increased or decreased level of certainty that the identity of the user corresponds to the user profile; modify said security policy on said device to correlate to the increased or decreased level of certainty; and
,repeat, after every N number of touches at the virtual keyboard, where N is based on a level of access to said device as defined in said security policy, the determining the increased or decreased level of certainty that the identity of the user corresponds to the user profile, said security policy again modified when the level of certainty changes.
-
Specification