Method for modeling user possession of mobile device for user authentication framework
First Claim
1. A method for modeling user possession of a mobile device for a user authentication framework, the method comprising:
- analyzing sensor data, the sensor data representing information captured from sensors associated with at least two of a plurality of devices;
determining, based on the analyzed sensor data, a probability that the user is in possession of the mobile device, the mobile device being one of the plurality of the devices; and
configuring the probability for use in determining whether to require authentication,wherein the determination of the probability that the user is in possession of the mobile device is further based on an analysis of a difference between a first action of the user represented by the sensor data associated with a first one of the two devices and a second action of the user represented by the sensor data associated with a second one of the two devices;
allowing the user to access a first set of functionality of the mobile device without requiring authentication based on the determined probability being higher than a first threshold; and
requiring the user to perform authentication in order to access a second set of functionality of the mobile device based on the determined probability being lower than a second threshold.
6 Assignments
0 Petitions
Accused Products
Abstract
Method and systems for modeling user possession of a mobile device for a user authentication framework are provided. The method includes analyzing sensor data representing information captured from sensor(s) associated with at least one of a plurality of devices, the plurality including the user'"'"'s mobile device. The method allows for determining, based on the analyzed sensor data, a probability that the user maintains possession of the user'"'"'s mobile device; and configuring the probability for use in determining whether to require authentication. The determination may include configuring a probabilistic model that includes a first state indicating that the user possesses the mobile device and a second state indicating that the user does not; classifying motions of the mobile device by types, the motions being determined based on the sensor data; and updating probabilities of the two states in response to determining that at least one of the motions has occurred.
-
Citations
18 Claims
-
1. A method for modeling user possession of a mobile device for a user authentication framework, the method comprising:
-
analyzing sensor data, the sensor data representing information captured from sensors associated with at least two of a plurality of devices; determining, based on the analyzed sensor data, a probability that the user is in possession of the mobile device, the mobile device being one of the plurality of the devices; and
configuring the probability for use in determining whether to require authentication,wherein the determination of the probability that the user is in possession of the mobile device is further based on an analysis of a difference between a first action of the user represented by the sensor data associated with a first one of the two devices and a second action of the user represented by the sensor data associated with a second one of the two devices; allowing the user to access a first set of functionality of the mobile device without requiring authentication based on the determined probability being higher than a first threshold; and requiring the user to perform authentication in order to access a second set of functionality of the mobile device based on the determined probability being lower than a second threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11)
-
-
8. A method, for modeling user possession of a mobile device for a user authentication framework, the method comprising:
-
analyzing sensor data, the sensor data representing information captured from one or more sensors associated with at least one of a plurality of devices; determining, based on the analyzed sensor data, a probability that the user is in possession of the mobile device, the mobile device being one of the plurality of the devices; and
configuring the probability for use in determining whether to require authentication, wherein the determining probability that user possesses the mobile device comprises;
configuring a first probabilistic model, the first probabilistic model including at least two states, the at least two states including a first state indicating that the user possesses the mobile device and a second state indicating that the user does not possess the mobile device;classifying motions of the mobile device by types, the motions being determined based on the sensor data received from one or more devices of the plurality of the devices; and updating probabilities of the at least two states in response to determining that at least one of the motions has occurred, and wherein probabilities of the at least two states are reset to predetermined initial values using a user authentication mechanism of the mobile device provided by an original equipment manufacturer; allowing the user to access a first set of functionality of the mobile device without requiring authentication based on the determined probability being higher than a first threshold; and requiring the user to perform authentication in order to access a second set of functionality of the mobile device based on the determined probability being lower than a second threshold.
-
-
12. A system for modeling user possession of a mobile device for a user authentication framework, the system comprising a plurality of devices including the mobile device, the mobile device comprising:
- a processor; and
a memory communicatively coupled to the processor, the memory storing instructions which when executed by the processor perform a method comprising; analyzing sensor data, the sensor data representing information captured from sensors associated with at least two of a the plurality of devices; determining, based on the analyzed sensor data, a probability that the user is in possession of the mobile device; and configuring the probability for use in determining whether to require authentication, wherein the determination of the probability that the user is in possession of the mobile device is further based on an analysis of a difference between a first action of the user represented by the sensor data associated with a first one of the two devices and a second action of the user represented by the sensor data associated with a second one of the two devices; allowing the user to access a first set of functionality of the mobile device without requiring authentication based on the determined probability being higher than a first threshold; and requiring the user to perform authentication in order to access a second set of functionality of the mobile device based on the determined probability being lower than a second threshold. - View Dependent Claims (13, 14, 15, 16, 17)
- a processor; and
-
18. A non-transitory computer-readable storage medium having embodied thereon instructions, which when executed by one or more processors, perform a method modeling user possession of a mobile device for a user authentication framework, the method comprising:
-
analyzing sensor data, the sensor data representing information captured from one or more sensors associated with at least two of a plurality of devices; determining, based on the analyzed sensor data, a probability that the user is in possession of the mobile device, the mobile device being one of the plurality of the devices; and
configuring the probability for use in determining whether to require authentication,wherein the determination of the probability that the user is in possession of the mobile device is further based on an analysis of a difference between a first action of the user represented by the sensor data associated with a first one of the two devices and a second action of the user represented by the sensor data associated with a second one of the two devices; allowing the user to access a first set of functionality of the mobile device without requiring authentication based on the determined probability being higher than a first threshold; and requiring the user to perform authentication in order to access a second set of functionality of the mobile device based on the determined probability being lower than a second threshold.
-
Specification