×

Allowing access to applications based on user handling measurements

  • US 9,639,680 B2
  • Filed: 11/12/2014
  • Issued: 05/02/2017
  • Est. Priority Date: 07/29/2014
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method to authenticate users via user handling of user computing devices, comprising:

  • receiving, by one or more computing devices, a manual authentication input via a user interface of the one or more computing devices, the manual authentication being configured to begin a first authenticated session with the one or more computing devices;

    receiving, by the one or more computing devices, first user handling characteristics captured by a gyroscope and an accelerometer, the first user handling characteristics obtained by the gyroscope and the accelerometer during multiple instances of physical manipulation of the one or more computing devices over a period of time during the first authenticated session;

    storing, by the one or more computing devices, the first user handling characteristics;

    receiving, by the one or more computing devices, an input to end the first authenticated session;

    ending, by the one or more computing devices, the first authenticated session;

    receiving, by one or more computing devices, an input to begin a second authenticated session with the one or more computing devices;

    receiving, by the one or more computing devices, second user handling characteristics captured by the gyroscope and the accelerometer, the second user handling characteristics obtained by the gyroscope and the accelerometer during physical manipulation of the one or more computing devices at a time after the first authentication session ended;

    comparing, by the one or more computing devices, the first user handling characteristics to the second user handling characteristics;

    generating, by the one or more computing devices, a user authentication rating based on a number of the first user handling characteristics and the second user handling characteristics that match based on the comparison of the first user handling characteristics to the second user handling characteristics; and

    determining, by the one or more computing devices, one or more applications operating on the one or more computing devices to which access is allowed based on a comparison of the generated user authentication rating to a database of applications, the database comprising a particular user authentication rating required for access to each particular application in the database.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×