×

System and method for non-intrusive, privacy-preserving authentication

  • US 9,396,320 B2
  • Filed: 12/31/2013
  • Issued: 07/19/2016
  • Est. Priority Date: 03/22/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • entering into a legitimate user state on a client device for a specified time period following a first explicit authentication by an end user;

    recording reference data related to user behavior while in the legitimate user state;

    measuring user behavior when outside of the legitimate user state and arriving at an authentication assurance level based on a distance between the measured user behavior and the recorded reference data;

    entering into a first transaction with a relying party over a network resulting in an authentication request from the relying party;

    in response to receiving the authentication request within the legitimate user state, transmitting an authentication assurance level at or above a defined threshold from the client device to the relying party over the network, the authentication assurance level being sufficient to authenticate the user to the relying party, and the relying party to responsively allow the first transaction; and

    in response to an authentication request while outside of the legitimate user state, transmitting the authentication assurance level based on a distance between the measured user behavior and the recorded reference data from the client device to the relying party over the network;

    wherein in response to receiving the authentication assurance level, determining at the relying party whether the authentication assurance level is acceptable to complete the first transaction, wherein if the assurance level is acceptable, then the relying party to responsively allow the first transaction and wherein if the assurance level is not acceptable, then the relying party to transmit a response requesting additional authentication, the method further comprising;

    performing a second explicit authentication by the end user on the client device to re-enter the legitimate user state; and

    transmitting an authentication assurance level from the client device to the relying party, and the relying party to responsively allow the first transaction.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×