Allowing access to applications based on user handling measurements
First Claim
1. A computer-implemented method to authenticate users via user handling of user computing devices, comprising:
- receiving, by one or more computing devices, a manual authentication input via a user interface of the one or more computing devices, the manual authentication being configured to begin a first authenticated session with the one or more computing devices;
receiving, by the one or more computing devices, first user handling characteristics captured by a gyroscope and an accelerometer, the first user handling characteristics obtained by the gyroscope and the accelerometer during multiple instances of physical manipulation of the one or more computing devices over a period of time during the first authenticated session;
storing, by the one or more computing devices, the first user handling characteristics;
receiving, by the one or more computing devices, an input to end the first authenticated session;
ending, by the one or more computing devices, the first authenticated session;
receiving, by one or more computing devices, an input to begin a second authenticated session with the one or more computing devices;
receiving, by the one or more computing devices, second user handling characteristics captured by the gyroscope and the accelerometer, the second user handling characteristics obtained by the gyroscope and the accelerometer during physical manipulation of the one or more computing devices at a time after the first authentication session ended;
comparing, by the one or more computing devices, the first user handling characteristics to the second user handling characteristics;
generating, by the one or more computing devices, a user authentication rating based on a number of the first user handling characteristics and the second user handling characteristics that match based on the comparison of the first user handling characteristics to the second user handling characteristics; and
determining, by the one or more computing devices, one or more applications operating on the one or more computing devices to which access is allowed based on a comparison of the generated user authentication rating to a database of applications, the database comprising a particular user authentication rating required for access to each particular application in the database.
2 Assignments
0 Petitions
Accused Products
Abstract
Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session.
62 Citations
15 Claims
-
1. A computer-implemented method to authenticate users via user handling of user computing devices, comprising:
-
receiving, by one or more computing devices, a manual authentication input via a user interface of the one or more computing devices, the manual authentication being configured to begin a first authenticated session with the one or more computing devices; receiving, by the one or more computing devices, first user handling characteristics captured by a gyroscope and an accelerometer, the first user handling characteristics obtained by the gyroscope and the accelerometer during multiple instances of physical manipulation of the one or more computing devices over a period of time during the first authenticated session; storing, by the one or more computing devices, the first user handling characteristics; receiving, by the one or more computing devices, an input to end the first authenticated session; ending, by the one or more computing devices, the first authenticated session; receiving, by one or more computing devices, an input to begin a second authenticated session with the one or more computing devices; receiving, by the one or more computing devices, second user handling characteristics captured by the gyroscope and the accelerometer, the second user handling characteristics obtained by the gyroscope and the accelerometer during physical manipulation of the one or more computing devices at a time after the first authentication session ended; comparing, by the one or more computing devices, the first user handling characteristics to the second user handling characteristics; generating, by the one or more computing devices, a user authentication rating based on a number of the first user handling characteristics and the second user handling characteristics that match based on the comparison of the first user handling characteristics to the second user handling characteristics; and determining, by the one or more computing devices, one or more applications operating on the one or more computing devices to which access is allowed based on a comparison of the generated user authentication rating to a database of applications, the database comprising a particular user authentication rating required for access to each particular application in the database. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising:
a non-transitory computer-readable storage device having computer-readable computer-executable program instructions embodied thereon that when executed by one or more computing devices cause the computer to authenticate users via user handling of user computing devices, the computer-readable program instructions comprising; computer-executable instructions to receive a manual authentication input via a user interface of the one or more computing devices, the manual authentication being configured to begin a first authenticated session with the one or more computing devices; computer-executable instructions to receive first user handling characteristics captured by a gyroscope and an accelerometer, the first user handling characteristics obtained by the gyroscope and the accelerometer during multiple instances of physical manipulation of the one or more computing devices over a period of time during the first authenticated session; computer-executable instructions to store the first user handling characteristics; computer-executable instructions to receive an input to end the first authenticated session; computer-executable instructions to end the first authenticated session; computer-executable instructions to receive an input to begin a second authorized session with the one or more computing devices; computer-executable instructions to receive second user handling characteristics captured by the gyroscope and the accelerometer, the second user handling characteristics obtained by the gyroscope and the accelerometer during physical manipulation of the one or more computing devices at a time after the first authentication session ended; computer-executable instructions to compare the first user handling characteristics to the second user handling characteristics; computer-executable instructions to generate a user authentication rating based on a plurality the first user handling characteristics and the second user handling characteristics that match based on the comparison of the first user handling characteristics to the second user handling characteristics; and computer-readable instructions to determine one or more applications operating on the one or more computing devices to which access is allowed based on a comparison of the generated user authentication rating to a database of applications, the database comprising a particular user authentication rating required for access to each particular application in the database. - View Dependent Claims (9, 10, 11, 12)
-
13. A system to authenticate users via user handling of user computing devices, comprising:
one or more computing devices comprising; a storage device; a user interface; and a processor communicatively coupled to the storage device and the user interface, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; receive a manual authentication input via a user interface of the one or more computing devices, the manual authentication being configured to begin a first authentication session with the one or more computing devices; receive first user handling characteristics captured by a gyroscope and an accelerometer, the first user handling characteristics obtained by the gyroscope and the accelerometer during multiple instances of physical manipulation of the one or more computing devices over a period of time during the first authentication session; store the first user handling characteristics; receive an input to end the first authentication session; end the first authentication session; receive an input to begin a second authentication session with the one or more computing devices; receive second user handling characteristics captured by the gyroscope and the accelerometer, the second user handling characteristics obtained by the gyroscope and the accelerometer during physical manipulation of the one or more computing devices at a time after the first authentication session ended; compare the first user handling characteristics to the second user handling characteristics; generate a user authentication rating based on a plurality the first user handling characteristics and the second user handling characteristics that match based on a comparison of the first user handling characteristics to the second user handling characteristics; and determine one or more applications operating on the one or more computing devices to which access is allowed based on a comparison of the generated user authentication rating to a database of applications, the database comprising a particular user authentication rating required for access to each particular application in the database. - View Dependent Claims (14, 15)
Specification