Passive security enforcement
First Claim
1. A method for passive authentication by a computing system, the method comprising:
- receiving, by the computing system, a first subset of attributes comprising one or more attributes;
determining by the computing system, from a set of types, a corresponding first type for each attribute of the first subset of attributes;
passively authenticating, by the computing system, a user at a first authentication level by comparing each attribute of the first subset of attributes to one or more first previously stored attributes each having an assigned first type matching the corresponding first type determined for each attribute of the first subset of attributes;
receiving, by the computing system, a second subset of attributes comprising at least one attribute;
determining, from the set of types, corresponding second types for each attribute of the second subset of attributes; and
passively updating, by the computing system, the first authentication level to a second authentication level by comparing each attribute of the second subset of attributes to one or more second previously stored attributes each having an assigned second type matching the corresponding second type determined for each attribute of the second subset of attributes;
wherein each attribute of the first subset of attributes and of the second subset of attributes is an event indicative of the user or is a physical characteristic of the user; and
wherein each previously stored attribute comprises a previously stored event, a previously stored physical characteristic, or one or more previously determined acceptable values for the type corresponding to the stored attribute for one or more users.
2 Assignments
0 Petitions
Accused Products
Abstract
Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user'"'"'s interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.
-
Citations
20 Claims
-
1. A method for passive authentication by a computing system, the method comprising:
-
receiving, by the computing system, a first subset of attributes comprising one or more attributes; determining by the computing system, from a set of types, a corresponding first type for each attribute of the first subset of attributes; passively authenticating, by the computing system, a user at a first authentication level by comparing each attribute of the first subset of attributes to one or more first previously stored attributes each having an assigned first type matching the corresponding first type determined for each attribute of the first subset of attributes; receiving, by the computing system, a second subset of attributes comprising at least one attribute; determining, from the set of types, corresponding second types for each attribute of the second subset of attributes; and passively updating, by the computing system, the first authentication level to a second authentication level by comparing each attribute of the second subset of attributes to one or more second previously stored attributes each having an assigned second type matching the corresponding second type determined for each attribute of the second subset of attributes; wherein each attribute of the first subset of attributes and of the second subset of attributes is an event indicative of the user or is a physical characteristic of the user; and
wherein each previously stored attribute comprises a previously stored event, a previously stored physical characteristic, or one or more previously determined acceptable values for the type corresponding to the stored attribute for one or more users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable storage device having computer-executable instructions stored thereon that, when executed by a computing system, cause the computing system to perform operations for passive authentication, the operations comprising:
-
receiving, by the computing system, a first subset of attributes comprising one or more attributes; determining by the computing system, from a set of types, a corresponding first type for each attribute of the first subset of attributes; passively authenticating, by the computing system, a user at a first authentication level by comparing each attribute of the first subset of attributes to one or more first previously stored attributes each having an assigned first type matching the corresponding first type determined for each attribute of the first subset of attributes; receiving, by the computing system, a second subset of attributes comprising at least one attribute; determining, from the set of types, corresponding second types for each attribute of the second subset of attributes; and passively updating, by the computing system, the first authentication level to a second authentication level by comparing each attribute of the second subset of attributes to one or more second previously stored attributes each having an assigned second type matching the corresponding second type determined for each attribute of the second subset of attributes; wherein each attribute of the first subset of attributes and of the second subset of attributes is an event indicative of the user or is a physical characteristic of the user; and wherein each previously stored attribute comprises a previously stored event, a previously stored physical characteristic, or one or more previously determined acceptable values for the type corresponding to the stored attribute for one or more users. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computing system configured to passively authenticate a user, the computing system comprising:
-
one or more processors; a memory storing; an input component configured to receive at least two subsets of attributes including a first subset and a second subset, each comprising at least one attribute; and an authorization component configured to; determine, from a set of types, a corresponding first type for each attribute of the first subset of attributes; passively authenticate the user at a first authentication level based on the attributes in the first subset of attributes by comparing each attribute of the first subset of attributes to one or more first previously stored attributes each having an assigned first type matching the corresponding first type determined for each attribute of the first subset of attributes; determining, from the set of types, corresponding second types for each attribute of the second subset of attributes; and passively update the first authentication level to a second authentication level by comparing each attribute of the second subset of attributes to one or more previously stored attributes, each compared previously stored attribute having an assigned second type matching the corresponding second type determined for each attribute of the second subset of attributes; wherein each attribute of the first subset of attributes and each attribute of the second subset of attributes is an event indicative of the user or is a physical characteristic of the user, and wherein each previously stored attribute comprises a previously stored event, a previously stored physical characteristic, or one or more previously determined acceptable values for the type corresponding to the stored attribute for one or more users. - View Dependent Claims (18, 19, 20)
-
Specification