×

System and method for implicit authentication

  • US 9,788,203 B2
  • Filed: 08/19/2015
  • Issued: 10/10/2017
  • Est. Priority Date: 08/19/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for implicit authentication for a mobile device associated with a user, wherein the implicit authentication is behavioural, biometric and task-based and includes at least one authentication task selected so as to leverage the user'"'"'s muscle memory,wherein the mobile device comprisesa touchscreen;

  • a transaction authentication information unit;

    one or more sensors coupled to the transaction authentication information unit comprising(1) one or more touchscreen sensors coupled to the touchscreen,(2) an accelerometer, and(3) a gyroscope,the one or more sensors used to obtain and transmit one or more sets of data to the transaction authentication information unit,the one or more sets of data associated with one or more performances of the at least one authentication task by the user, the one or more sets of data comprising data related to the tracking of a user'"'"'s input on the touchscreen and the movement of the mobile device during the at least one authentication task; and

    an anomaly detector coupled to the transaction authentication information unit,wherein the anomaly detector generates an authentication model using the one or more data sets transmitted to the transaction authentication information unit,said generating comprising constructing a set of features for a user profile associated with the one or more performances of the at least one authentication task, and one or more parameters associated with said set of features;

    the anomaly detector performs training using the one or more data sets transmitted to the transaction authentication information unit, said training comprisinglearning so as to adjust the one or more parameters associated with the set of features, said learning performed using one or more learning algorithms, andstoring the user profile associated with the adjusted one or more parameters in the database;

    the anomaly detector authenticates the user using the one or more data sets transmitted to the transaction authentication information unit, whereinthe anomaly detector analyzes at least one of the one or more data sets corresponding to at least one of the one or more performances of the at least one authentication task using one or more anomaly detection algorithms together with the stored user profile, andbased on said analyzing, the anomaly detector decides whether the authentication is successful or unsuccessful.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×