Multi-granular authentication techniques
First Claim
1. A method for authenticating a user of a mobile device, the method comprising:
- generating a first profile and second profile of user behavior for an authorized user of the mobile device, the first profile comprising a first type of profile having at least a first duration and comprising information indicative of expected behavior of the authorized user over at least the first duration, the second profile comprising a second type of profile having a second duration that is shorter than the first duration and comprising information indicative of expected behavior of the authorized user over at least the second duration;
monitoring user behavior to generate usage behavior data;
comparing the usage behavior data to the first profile and the second profile;
performing a first type of authentication action responsive to the usage behavior data deviating from the first profile; and
performing a second type of authentication action responsive to the usage behavior data deviating from the second profile.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for authenticating a user of a mobile device at a computing platform are provided. A method according to these techniques includes generating a first profile and second profile of user behavior for the user of the mobile device, the first profile comprising a first type of profile having at least a first duration and the second profile comprising a second type of profile having a second duration that is shorter than the first duration, monitoring user behavior to generate usage behavior data, comparing the usage behavior data to the first profile and the second profile, performing a first type of authentication action responsive to the usage behavior data deviating from the first profile, and performing a second type of authentication action responsive to the usage behavior data deviating from the second profile.
-
Citations
33 Claims
-
1. A method for authenticating a user of a mobile device, the method comprising:
-
generating a first profile and second profile of user behavior for an authorized user of the mobile device, the first profile comprising a first type of profile having at least a first duration and comprising information indicative of expected behavior of the authorized user over at least the first duration, the second profile comprising a second type of profile having a second duration that is shorter than the first duration and comprising information indicative of expected behavior of the authorized user over at least the second duration; monitoring user behavior to generate usage behavior data; comparing the usage behavior data to the first profile and the second profile; performing a first type of authentication action responsive to the usage behavior data deviating from the first profile; and performing a second type of authentication action responsive to the usage behavior data deviating from the second profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
means for generating a first profile and second profile of user behavior for an authorized user of the mobile device, the first profile comprising a first type of profile having at least a first duration and comprising information indicative of expected behavior of the authorized user over at least the first duration, the second profile comprising a second type of profile having a second duration that is shorter than the first duration and comprising information indicative of expected behavior of the authorized user over at least the second duration; means for monitoring user behavior to generate usage behavior data; means for comparing the usage behavior data to the first profile and the second profile; means for performing a first type of authentication action responsive to the usage behavior data deviating from the first profile; and means for performing a second type of authentication action responsive to the usage behavior data deviating from the second profile. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computing device comprising:
a processor configured to; generate a first profile and second profile of user behavior for an authorized user of the mobile device, the first profile comprising a first type of profile having at least a first duration and comprising information indicative of expected behavior of the authorized user over at least the first duration, the second profile comprising a second type of profile having a second duration that is shorter than the first duration and comprising information indicative of expected behavior of the authorized user over at least the second duration; monitor user behavior to generate usage behavior data; compare the usage behavior data to the first profile and the second profile; perform a first type of authentication action responsive to the usage behavior data deviating from the first profile; and perform a second type of authentication action responsive to the usage behavior data deviating from the second profile. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
26. A non-transitory, computer-readable medium, having stored thereon computer-readable instructions for authenticating a user of a mobile device, comprising instructions configured to cause a computer to:
-
generate a first profile and second profile of user behavior for an authorized user of the mobile device, the first profile comprising a first type of profile having at least a first duration and comprising information indicative of expected behavior of the authorized user over at least the first duration, the second profile comprising a second type of profile having a second duration that is shorter than the first duration and comprising information indicative of expected behavior of the authorized user over at least the second duration; monitor user behavior to generate usage behavior data; compare the usage behavior data to the first profile and the second profile; perform a first type of authentication action responsive to the usage behavior data deviating from the first profile; and perform a second type of authentication action responsive to the usage behavior data deviating from the second profile. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
-
Specification