×

System and method of enhancing security of a wireless device through usage pattern detection

  • US 9,275,210 B2
  • Filed: 03/11/2013
  • Issued: 03/01/2016
  • Est. Priority Date: 01/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of performing user identification on a device having a security policy and comprising a touch sensitive input device, the method comprising:

  • receiving data corresponding to use of a virtual keyboard provided on said touch sensitive input device, received data including a set of data points indicating where on a key of the virtual keyboard a touch was registered when the key was actuated, at least a subset of the data points representing a single touch;

    determining from said received data a first location on the key of the virtual keyboard, the first location indicating where the key was touched on the virtual keyboard when the data was received, the first location comprising one of the following;

    a top left quadrant of the key, a top right quadrant of the key, a bottom left quadrant of the key, or a bottom right quadrant of the key;

    determining, based on the first location and a signature associated with a user profile, whether an identity of a user inputting the received data corresponds to the user profile, wherein the signature is calculated based on a second location of the key on the virtual keyboard determined from training data received at the device, the second location indicating where the key on the virtual keyboard was touched when the training data was received, the second location comprising one of the following;

    the top left quadrant of the key, the top right quadrant of the key, the bottom left quadrant of the key, or the bottom right quadrant of the key, the training data received in a sample of text to obtain biometric data relating to how the user types on the virtual keyboard;

    modifying said security policy on said device, based on said determining of whether the identity of the user inputting the received data corresponds to the user profile, by selecting said security policy from a plurality of different levels of access to said device, each of said plurality of different levels of access associated with a respective conditions of whether unauthorized use has occurred at said device; and

    ,repeating, after every N number of touches at the virtual keyboard, where N is based on a level of access to said device as defined in said security policy, the determining from said received data the first location on the key, and the determining whether the identity of the user inputting the received data corresponds to the user profile, said security policy again modified when the identity of the user inputting the received data no longer matches the user profile.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×