×

Providing malicious identity profiles from failed authentication attempts involving biometrics

  • US 9,509,688 B1
  • Filed: 03/13/2013
  • Issued: 11/29/2016
  • Est. Priority Date: 03/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of providing malicious identity profiles, the method comprising:

  • storing, by processing circuitry, unsuccessful authentication entries in a database, the unsuccessful authentication entries including (i) descriptions of failed attempts to authenticate users and (ii) biometric records captured from the users during the failed attempts to authenticate the users;

    generating, by the processing circuitry, a set of malicious identity profiles based on the descriptions and the biometric records of the unsuccessful authentication entries stored in the database, each malicious identity profile including a profile biometric record for comparison with new biometric records during new authentication attempts; and

    outputting, by the processing circuitry, the set of malicious identity profiles;

    wherein generating the set of malicious identity profiles includes;

    performing comparison operations on the descriptions and the biometric records of the unsuccessful authentication entries to group at least some of the unsuccessful authentication entries into sets of similar unsuccessful authentication entries, each set of similar unsuccessful authentication entries including multiple unsuccessful authentication entries which are alike based on a set of similarity scores resulting from the comparison operations, andforming the set of malicious identity profiles from at least some of the sets of similar unsuccessful authentication entries;

    wherein forming the set of malicious identity profiles from at least some of the sets of similar unsuccessful authentication entries includes;

    creating suspicion profiles from the sets of similar unsuccessful authentication entries, each suspicion profile including a particular profile biometric record created from a particular set of similar unsuccessful authentication entries, andcollecting historical data from the database for each created suspicion profile; and

    wherein the method further comprises;

    distributing, as the set of malicious identity profiles, the suspicion profiles and suspicion scores which are assigned to the suspicion profiles to a set of adaptive-authentication servers through a computerized network, each adaptive-authentication server being constructed and arranged to perform adaptive-authentication (i) which includes biometric authentication as an adaptive-authentication factor and (ii) which is based on the malicious identity profiles.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×