×

Passive security enforcement

  • US 9,641,502 B2
  • Filed: 09/25/2014
  • Issued: 05/02/2017
  • Est. Priority Date: 01/23/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for passive authentication by a computing system, the method comprising:

  • receiving, by the computing system, a first subset of attributes comprising one or more attributes;

    determining by the computing system, from a set of types, a corresponding first type for each attribute of the first subset of attributes;

    passively authenticating, by the computing system, a user at a first authentication level by comparing each attribute of the first subset of attributes to one or more first previously stored attributes each having an assigned first type matching the corresponding first type determined for each attribute of the first subset of attributes;

    receiving, by the computing system, a second subset of attributes comprising at least one attribute;

    determining, from the set of types, corresponding second types for each attribute of the second subset of attributes; and

    passively updating, by the computing system, the first authentication level to a second authentication level by comparing each attribute of the second subset of attributes to one or more second previously stored attributes each having an assigned second type matching the corresponding second type determined for each attribute of the second subset of attributes;

    wherein each attribute of the first subset of attributes and of the second subset of attributes is an event indicative of the user or is a physical characteristic of the user; and

    wherein each previously stored attribute comprises a previously stored event, a previously stored physical characteristic, or one or more previously determined acceptable values for the type corresponding to the stored attribute for one or more users.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×