Systems and methods for performing security authentication based on responses to observed stimuli
First Claim
1. A method performed by a hardware processor for authenticating an unknown user claiming to be a legitimate user, the method comprising:
- presenting, by the hardware processor, to the unknown user a plurality of prime images, wherein the plurality of prime images are presented to the unknown user in an amount of time that is less than or equal to 16 milliseconds such that the plurality of prime images are consciously unperceivable and subconsciously perceivable by the unknown user to induce one or more conditioned responses;
observing, by the hardware processor, one or more responses, by the unknown user, to the plurality of prime images that are consciously unperceivable and subconsciously perceivable by the unknown user;
generating, by the hardware processor, an unknown user response metric based on the observed one or more responses;
comparing, by the hardware processor, a known conditioned user response metric to the unknown user response metric;
one of preventing access to a computer system and decreasing a level of access to the computer system when the unknown user response metric differs from the conditioned user response metric by more than a predefined degree of acceptable variation, wherein the conditioned user response metric represents observed changes in micro-behaviors of the legitimate user in response to viewing the plurality of prime images, and the unknown user response metric represents observed changes in micro-behaviors of the unknown user in response to viewing the plurality of prime images; and
one of granting access to the computer system and maintaining the level of access to the computer system when the unknown user response metric matches the legitimate user response metric by less than the predefined degree of acceptable variation.
1 Assignment
0 Petitions
Accused Products
Abstract
A method performed by an authentication processor for authenticating an unknown user claiming to be a legitimate user. The method includes comparing a legitimate user response metric to an unknown user response metric and one of preventing access to the computer system and decreasing a level of access to the computer system when the unknown user response metric differs from the legitimate user response metric by more than a predefined degree of acceptable variation. The legitimate user response metric represents observed changes in micro-behaviors of the legitimate user in response to viewing a plurality of prime images. The unknown user response metric represents observed changes in micro-behaviors of the unknown user in response to viewing the plurality of prime images.
-
Citations
20 Claims
-
1. A method performed by a hardware processor for authenticating an unknown user claiming to be a legitimate user, the method comprising:
-
presenting, by the hardware processor, to the unknown user a plurality of prime images, wherein the plurality of prime images are presented to the unknown user in an amount of time that is less than or equal to 16 milliseconds such that the plurality of prime images are consciously unperceivable and subconsciously perceivable by the unknown user to induce one or more conditioned responses; observing, by the hardware processor, one or more responses, by the unknown user, to the plurality of prime images that are consciously unperceivable and subconsciously perceivable by the unknown user; generating, by the hardware processor, an unknown user response metric based on the observed one or more responses; comparing, by the hardware processor, a known conditioned user response metric to the unknown user response metric; one of preventing access to a computer system and decreasing a level of access to the computer system when the unknown user response metric differs from the conditioned user response metric by more than a predefined degree of acceptable variation, wherein the conditioned user response metric represents observed changes in micro-behaviors of the legitimate user in response to viewing the plurality of prime images, and the unknown user response metric represents observed changes in micro-behaviors of the unknown user in response to viewing the plurality of prime images; and one of granting access to the computer system and maintaining the level of access to the computer system when the unknown user response metric matches the legitimate user response metric by less than the predefined degree of acceptable variation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer program product comprising a non-transitory, computer readable storage medium having computer-readable program code portions stored therein, the computer-readable program code configured for executing a method for verifying an identity of an unknown user attempting to access a computer system and claiming to be a legitimate user, comprising:
-
computer code for presenting, by a hardware processor, to the unknown user a plurality of prime images, wherein the plurality of prime images are presented to the unknown user an amount of time that is less than or equal to 16 milliseconds such that the plurality of prime images are consciously unperceivable and subconsciously perceivable by the unknown user to induce one or more conditioned responses; computer code for observing, by the hardware processor, one or more responses by the unknown user to the plurality of prime images that are consciously unperceivable and subconsciously perceivable by the unknown user; computer code for generating, by the hardware processor, an unknown user response metric based on the observed one or more responses; computer code for comparing a known conditioned user response signature to an unknown user response signature; one of computer code for preventing access to a computer system and computer code for decreasing a level of access to the computer system when the unknown user response signature differs from the conditioned user response signature by more than an acceptable threshold of variation, wherein the conditioned user response signature represents observed changes in micro-behaviors of the legitimate user in response to subconscious viewing of the plurality of prime images, and the unknown user response signature represents observed changes in micro-behaviors of the unknown user in response to subconscious viewing of the plurality of prime images; and one of computer code for granting access to the computer system and computer code for maintaining the level of access to the computer system when the unknown user response metric matches the legitimate user response metric by less than the predefined degree of acceptable variation. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A system for authenticating a user attempting to access a computer system, the system comprising:
a hardware processor operable with the computing system, wherein the processor is configured for; presenting, by the hardware processor, to the unknown user a plurality of prime images, wherein the plurality of prime images are presented to the unknown user in an amount of time that is less than or equal to 16 milliseconds such that the plurality of prime images are consciously unperceivable and subconsciously perceivable by the unknown user to induce one or more conditioned responses, observing, by the hardware processor, one or more responses by the unknown user to the plurality of prime images that are consciously unperceivable and subconsciously perceivable by the unknown user, generating, by the hardware processor, an unknown user response metric based on the observed one or more responses; comparing a known conditioned user response metric to an unknown user response metric, one of preventing access to a computer system and decreasing a level of access to the computer system when the unknown user response metric differs from the conditioned user response metric by more than a predefined degree of acceptable variation, wherein the conditioned user response metric represents observed changes in micro-behaviors of the legitimate user in response to subconscious viewing of the plurality of prime images, and the unknown user response metric represents observed changes in micro-behaviors of the unknown user in response to subconscious viewing of the plurality of prime images, and one of granting access to the computer system and maintaining the level of access to the computer system when the unknown user response metric matches the legitimate user response metric by less than the predefined degree of acceptable variation.
Specification