System and method for implicit authentication
First Claim
1. A system for implicit authentication for a mobile device associated with a user, wherein the implicit authentication is behavioural, biometric and task-based and includes at least one authentication task selected so as to leverage the user'"'"'s muscle memory,wherein the mobile device comprisesa touchscreen;
- a transaction authentication information unit;
one or more sensors coupled to the transaction authentication information unit comprising(1) one or more touchscreen sensors coupled to the touchscreen,(2) an accelerometer, and(3) a gyroscope,the one or more sensors used to obtain and transmit one or more sets of data to the transaction authentication information unit,the one or more sets of data associated with one or more performances of the at least one authentication task by the user, the one or more sets of data comprising data related to the tracking of a user'"'"'s input on the touchscreen and the movement of the mobile device during the at least one authentication task; and
an anomaly detector coupled to the transaction authentication information unit,wherein the anomaly detector generates an authentication model using the one or more data sets transmitted to the transaction authentication information unit,said generating comprising constructing a set of features for a user profile associated with the one or more performances of the at least one authentication task, and one or more parameters associated with said set of features;
the anomaly detector performs training using the one or more data sets transmitted to the transaction authentication information unit, said training comprisinglearning so as to adjust the one or more parameters associated with the set of features, said learning performed using one or more learning algorithms, andstoring the user profile associated with the adjusted one or more parameters in the database;
the anomaly detector authenticates the user using the one or more data sets transmitted to the transaction authentication information unit, whereinthe anomaly detector analyzes at least one of the one or more data sets corresponding to at least one of the one or more performances of the at least one authentication task using one or more anomaly detection algorithms together with the stored user profile, andbased on said analyzing, the anomaly detector decides whether the authentication is successful or unsuccessful.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for implicit authentication for a mobile device associated with a user, wherein the implicit authentication is behavioral, biometric and task-based and includes at least one authentication task selected so as to leverage the user'"'"'s muscle memory. The mobile device comprises a touchscreen; a transaction authentication information unit; one or more sensors coupled to the transaction authentication information unit; and an anomaly detector coupled to the transaction authentication information unit. The sensors comprise one or more touchscreen sensors coupled to the touchscreen, an accelerometer, and a gyroscope, and are used to obtain and transmit one or more sets of data to the transaction authentication information unit. The sets of data are associated with one or more performances of the authentication task by the user. The anomaly detector generates an authentication model using the one or more data sets transmitted to the transaction authentication information unit.
29 Citations
20 Claims
-
1. A system for implicit authentication for a mobile device associated with a user, wherein the implicit authentication is behavioural, biometric and task-based and includes at least one authentication task selected so as to leverage the user'"'"'s muscle memory,
wherein the mobile device comprises a touchscreen; -
a transaction authentication information unit; one or more sensors coupled to the transaction authentication information unit comprising (1) one or more touchscreen sensors coupled to the touchscreen, (2) an accelerometer, and (3) a gyroscope, the one or more sensors used to obtain and transmit one or more sets of data to the transaction authentication information unit, the one or more sets of data associated with one or more performances of the at least one authentication task by the user, the one or more sets of data comprising data related to the tracking of a user'"'"'s input on the touchscreen and the movement of the mobile device during the at least one authentication task; and an anomaly detector coupled to the transaction authentication information unit, wherein the anomaly detector generates an authentication model using the one or more data sets transmitted to the transaction authentication information unit, said generating comprising constructing a set of features for a user profile associated with the one or more performances of the at least one authentication task, and one or more parameters associated with said set of features; the anomaly detector performs training using the one or more data sets transmitted to the transaction authentication information unit, said training comprising learning so as to adjust the one or more parameters associated with the set of features, said learning performed using one or more learning algorithms, and storing the user profile associated with the adjusted one or more parameters in the database; the anomaly detector authenticates the user using the one or more data sets transmitted to the transaction authentication information unit, wherein the anomaly detector analyzes at least one of the one or more data sets corresponding to at least one of the one or more performances of the at least one authentication task using one or more anomaly detection algorithms together with the stored user profile, and based on said analyzing, the anomaly detector decides whether the authentication is successful or unsuccessful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for implicit authentication for a mobile device associated with a user, wherein
the implicit authentication is behavioural, biometric and task-based, the task-based behavioral biometric implicit authentication comprises at least one authentication task, and the authentication task chosen so as to leverage the user'"'"'s muscle memory; -
wherein said mobile device comprises a touchscreen, a transaction authentication information unit, one or more sensors coupled to the transaction authentication information unit, the one or more sensors comprising; (1) one or more touchscreen sensors coupled to said touchscreen, (2) an accelerometer, and (3) a gyroscope, and an anomaly detector coupled to the transaction authentication information unit; said method comprising; obtaining, by the one or more sensors, one or more sets of data associated with one or more performances of the at least one authentication task by the user, the one or more sets of data comprising data related to the tracking of a user'"'"'s input on the touchscreen and the movement of the mobile device during the at least one authentication task; transmitting, by the one or more sensors, the obtained one or more sets of data to the transaction authentication information unit; generating, using the anomaly detector, an authentication model using the transmitted one or more data sets, said generating comprising constructing a set of features for a user profile associated with the one or more performances of the at least one authentication task, and one or more parameters associated with said set of features; training the anomaly detector using the one or more data sets transmitted to the transaction authentication information unit, said training comprising learning so as to adjust the one or more parameters associated with the set of features, said learning performed using one or more learning algorithms, storing the user profile associated with the adjusted one or more parameters in the database; and authenticating, by the anomaly detector, the user using the one or more data sets transmitted to the transaction authentication information unit, the authenticating comprising analyzing, by the anomaly detector, at least one of the one or more data sets using one or more anomaly detection algorithms together with the stored user profile, and deciding, by the anomaly detector, whether the authentication is successful or unsuccessful based on said analyzing. - View Dependent Claims (20)
-
Specification