Dynamic authorization
First Claim
1. A computer-implemented method performed by a data processing apparatus, the method comprising:
- receiving one or more signals from one or more sensors;
determining at least one concept from the one or more signals, wherein the at least one concept is a location of a computing device, a temporal context for the computing device, an action being performed with the computing device, or an identity of a user of the computing device;
determining a current pattern from the at least one concept;
matching the current pattern to a stored pattern, wherein the stored pattern is associated with a security outcome;
implementing the security outcome;
displaying a security message indicating the security outcome and at least part of the stored pattern that was matched to the current pattern;
determining a second current pattern;
matching the second current pattern to a second stored pattern;
determining a security preference associated with the second stored pattern that overrides a security outcome associated with the second stored pattern;
implementing a security outcome associated with the security preference instead of the security outcome associated with the second stored pattern; and
displaying a security message indicating the security outcome associated with the security preference instead of the security outcome associated with the second stored pattern.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques are provided for dynamic authorization. A signal may be received from a sensor. A concept may be determined from the signal. The concept may be a location of a computing device, an action being performed with the computing device, an identity of a user of the computing device, or a temporal context for the computing device. A current pattern may be determined from the concept. The current pattern may be matched to a stored pattern. The stored pattern may be associated with a security outcome. The security outcome may be sent to be implemented. A security message may displayed indicating the security outcome and part of the stored pattern that was matched to the current pattern. The security outcome may be causing presentation of an authentication prompt or not causing presentation of an authentication prompt.
36 Citations
21 Claims
-
1. A computer-implemented method performed by a data processing apparatus, the method comprising:
-
receiving one or more signals from one or more sensors; determining at least one concept from the one or more signals, wherein the at least one concept is a location of a computing device, a temporal context for the computing device, an action being performed with the computing device, or an identity of a user of the computing device; determining a current pattern from the at least one concept; matching the current pattern to a stored pattern, wherein the stored pattern is associated with a security outcome; implementing the security outcome; displaying a security message indicating the security outcome and at least part of the stored pattern that was matched to the current pattern; determining a second current pattern; matching the second current pattern to a second stored pattern; determining a security preference associated with the second stored pattern that overrides a security outcome associated with the second stored pattern; implementing a security outcome associated with the security preference instead of the security outcome associated with the second stored pattern; and displaying a security message indicating the security outcome associated with the security preference instead of the security outcome associated with the second stored pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method performed by a data processing apparatus, the method comprising:
-
receiving a plurality of signals from a plurality of sensors, wherein the plurality of sensors comprises hardware and software sensors of a computing device; determining a plurality of concepts from the plurality of signals, wherein each of the plurality of concepts regards an aspect of the current usage context of the computing device; detecting a current pattern from the plurality of concepts, wherein the current pattern regards the current usage context of the computing device; storing the current pattern with a plurality of stored patterns; applying a machine learning system to the current pattern and the plurality of stored patterns to modify at least one of the stored patterns; associating a first security outcome with the stored pattern modified by the machine learning system; and storing the stored pattern, modified by the machine learning system, and associated first security outcome with the plurality of stored patterns; receiving a second plurality of signals from the plurality of sensors; determining a second plurality of concepts from the second plurality of signals; detecting a second current pattern for the second plurality of signals; matching the second current pattern to one of the plurality of stored patterns; implementing a second security outcome associated with the one of the plurality of stored patterns matched with the second current pattern; displaying a message indicating the one of the plurality of stored patterns matched with the second current pattern and the second security outcome; detecting a third current pattern; matching the third current pattern to one of the plurality of stored patterns; determining a security preference associated with the stored pattern that overrides a third security outcome associated with the stored pattern; implementing a fourth security outcome associated with the security preference instead of the third security outcome associated with the stored pattern; and displaying a message indicating the fourth security outcome associated with the security preference instead of the third security outcome associated with the third stored pattern. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer-implemented system comprising:
-
a storage comprising security preferences and stored patterns; one or more sensors configured to generate at least one signal; at least one concept detector configured to receive the at least one signal from the one or more sensors and determine at least one concept based on the at least one received signal, wherein the at least one concept is a location of a computing device, a temporal context for the computing device, an action being performed with the computing device, or an identity of a user of the computing device; a pattern detector configured to detect a current pattern from the at least one concept, store the current pattern in the stored patterns, modify and create new stored patterns, and associate at least one of the stored patterns with a security outcome; and a security outcome generator configured to detect the current pattern, match the current pattern with one of the stored patterns, determine a security outcome associated with a matched stored pattern and a security preference of the security preferences in the storage wherein the security preference is associated with the matched stored pattern, determine that the security preference associated with the matched stored pattern overrides the security outcome associated with the matched stored pattern; implement a second security outcome associated with the security preference instead of the security outcome associated with the matched stored pattern, and display a security message indicating the second security outcome associated with the security preference instead of the security outcome associated with the matched stored pattern. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system comprising:
- one or more computers and one or more storage devices storing instructions which operate, when executed by the one or more computers, to cause the one or more computers to perform operations comprising;
receiving one or more signals from one or more sensors; determining at least one concept from the one or more signals, wherein the at least one concept is a location of a computing device, a temporal context for the computing device, an action being performed with the computing device, or an identity of a user of the computing device; determining a current pattern from the at least one concept; matching the current pattern to a stored pattern, wherein the stored pattern is associated with a security outcome; implementing the security outcome; displaying a security message indicating the security outcome and at least part of the stored pattern that was matched to the current pattern; determining a second current pattern; matching the second current pattern to a second stored pattern; determining a security preference associated with the second stored pattern that overrides a security outcome associated with the second stored pattern; implementing a security outcome associated with the security preference instead of the security outcome associated with the second stored pattern; and displaying a security message indicating the security outcome associated with the security preference instead of the security outcome associated with the second stored pattern.
- one or more computers and one or more storage devices storing instructions which operate, when executed by the one or more computers, to cause the one or more computers to perform operations comprising;
Specification