Systems and methods for device based authentication
First Claim
Patent Images
1. A system comprising:
- at least one processor; and
a memory storing instructions that, when executed by the at least one processor, cause the system to perform;
retrieving a first sensor signature associated with first set of sensor data of a first device in a first context, wherein the first device is a wearable device worn by a user;
retrieving a second sensor signature associated with a second set of sensor data of a second device, wherein the second device is a mobile device;
performing a first comparison by comparing the first sensor signature with the second sensor signature;
determining a first comparison value based on the first comparison between a first sensor signature and the second sensor signature, wherein the sensor data relates to motion of the first device and the second device and is provided by at least one of a GPS sensor, an accelerometer, and a gyroscope;
determining whether the first comparison value satisfies a first threshold based upon a similarity between the first set of sensor data associated with the first context and the second set of sensor data;
determining the user should be authenticated on the second device based on satisfaction of the first threshold; and
providing a password to the second device to authenticate the user on the second device in response to satisfaction of the first threshold;
requesting a password for the second device when the first threshold is not satisfied;
comparing the password for the second device provided in response to the request with a known password;
updating the first threshold when it is determined that the password for the second device provided in response to the request for a password is correct; and
causing the user to be automatically logged off the second device in response to the user taking off the wearable device.
2 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, computer implemented methods, systems, and non-transitory computer readable media determine a first comparison value based on a first comparison between a first sensor signature associated with first set of sensor data of a first device in a first context and a second sensor signature associated with second set of sensor data of a second device. The first comparison is associated with a first authentication type. It is determined whether the first comparison value satisfies a first threshold. It is determined that a user should be authenticated on the second device based on satisfaction of the first threshold.
41 Citations
16 Claims
-
1. A system comprising:
-
at least one processor; and a memory storing instructions that, when executed by the at least one processor, cause the system to perform; retrieving a first sensor signature associated with first set of sensor data of a first device in a first context, wherein the first device is a wearable device worn by a user; retrieving a second sensor signature associated with a second set of sensor data of a second device, wherein the second device is a mobile device; performing a first comparison by comparing the first sensor signature with the second sensor signature; determining a first comparison value based on the first comparison between a first sensor signature and the second sensor signature, wherein the sensor data relates to motion of the first device and the second device and is provided by at least one of a GPS sensor, an accelerometer, and a gyroscope; determining whether the first comparison value satisfies a first threshold based upon a similarity between the first set of sensor data associated with the first context and the second set of sensor data; determining the user should be authenticated on the second device based on satisfaction of the first threshold; and providing a password to the second device to authenticate the user on the second device in response to satisfaction of the first threshold; requesting a password for the second device when the first threshold is not satisfied; comparing the password for the second device provided in response to the request with a known password; updating the first threshold when it is determined that the password for the second device provided in response to the request for a password is correct; and causing the user to be automatically logged off the second device in response to the user taking off the wearable device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
retrieving a first sensor signature associated with first set of sensor data of a first device in a first context, wherein the first device is a wearable device worn by a user; retrieving a second sensor signature associated with a second set of sensor data of a second device, wherein the second device is a mobile device; performing a first comparison by comparing the first sensor signature with the second sensor signature; determining, by a computing system, the first comparison value based on a first comparison between the first sensor signature and the second sensor signature, the first comparison associated with a first authentication type, wherein the sensor data relates to motion of the first device and the second device and is provided by at least one of a GPS sensor, an accelerometer, and a gyroscope; determining whether the first comparison value satisfies a first threshold based upon a similarity between the first set of sensor data associated with the first context and the second set of sensor data; determining that the user should be authenticated on the second device based on satisfaction of the first threshold; providing a password to the second device to authenticate the user on the second device in response to satisfaction of the first threshold; requesting a password for the second device when the first threshold is not satisfied; comparing the password for the second device provided in response to the request with a known password; updating the first threshold when it is determined that the password for the second device provided in response to the request for a password is correct; and causing the user to be automatically logged off the second device in response to the user taking off the wearable device.
-
-
16. A non-transitory computer-readable storage medium including instructions that, when executed by at least one processor of a computing system, cause the computing system to perform:
-
retrieving a first sensor signature associated with first set of sensor data of a first device in a first context, wherein the first device is a wearable device worn by a user; retrieving a second sensor signature associated with a second set of sensor data of a second device, wherein the second device is a mobile device; performing a first comparison by comparing the first sensor signature with the second sensor signature; determining a first comparison value based on the first comparison between the first sensor signature associated with the first set of sensor data of the first device in the first context and the second sensor signature associated with the second set of sensor data of the second device, the first comparison associated with a first authentication type, wherein the sensor data relates to motion of the first device and the second device and is provided by at least one of a GPS sensor, an accelerometer, and a gyroscope; determining whether the first comparison value satisfies a first threshold based upon a similarity between the first set of sensor data associated with the first context and the second set of sensor data; determining that the user should be authenticated on the second device based on satisfaction of the first threshold; and providing a password to the second device without manual entry of the password to authenticate the user on the second device in response to satisfaction of the first threshold; requesting a password for the second device when the first threshold is not satisfied; comparing the password for the second device provided in response to the request with a known password; updating the first threshold when it is determined that the password for the second device provided in response to the request for a password is correct; and causing the user to be automatically logged off the second device in response to the user taking off the wearable device.
-
Specification