Systems and methods for authenticating users
First Claim
Patent Images
1. A computer-implemented method for authenticating users, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying a constellation of digital devices with which a user interacts by monitoring, via a router that directs traffic on a network connected to the constellation of digital devices, network traffic generated by the constellation of digital devices, wherein the constellation of digital devices comprises a constellation of smart-home appliances;
creating a digital fingerprint for the user that is based on the constellation of digital devices;
generating an authentication protocol for authenticating the user by creating a policy that prescribes authenticating the user if a current digital environment of the user matches the digital fingerprint based on at least one of;
a threshold number of digital devices within the current digital environment of the user matching digital devices included within the digital fingerprint; and
a threshold percentage of the digital devices within the current digital environment of the user matching the digital devices included within the digital fingerprint; and
using the authentication protocol to authenticate the user.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for authenticating users may include (1) identifying at least one digital device with which a user interacts, (2) gathering information about how the user interacts with the digital device, (3) generating, based on the gathered information, an authentication protocol for authenticating the user, and (4) using the authentication protocol to authenticate the user. Various other methods, systems, and computer-readable media are also disclosed.
45 Citations
20 Claims
-
1. A computer-implemented method for authenticating users, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying a constellation of digital devices with which a user interacts by monitoring, via a router that directs traffic on a network connected to the constellation of digital devices, network traffic generated by the constellation of digital devices, wherein the constellation of digital devices comprises a constellation of smart-home appliances; creating a digital fingerprint for the user that is based on the constellation of digital devices; generating an authentication protocol for authenticating the user by creating a policy that prescribes authenticating the user if a current digital environment of the user matches the digital fingerprint based on at least one of; a threshold number of digital devices within the current digital environment of the user matching digital devices included within the digital fingerprint; and a threshold percentage of the digital devices within the current digital environment of the user matching the digital devices included within the digital fingerprint; and using the authentication protocol to authenticate the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for authenticating users, the system comprising:
-
an identification module, stored in memory, that identifies a constellation of digital devices with which a user interacts by monitoring, via a router that directs traffic on a network connected to the constellation of digital devices, network traffic generated by the constellation of digital devices, wherein the constellation of digital devices comprises a constellation of smart-home appliances; a generation module, stored in memory, that; creates a digital fingerprint for the user that is based on the constellation of digital devices; and generates an authentication protocol for authenticating the user by creating a policy that prescribes authenticating the user if a current digital environment of the user matches the digital fingerprint based on at least one of; a threshold number of digital devices within the current digital environment of the user matching digital devices included within the digital fingerprint; and a threshold percentage of the digital devices within the current digital environment of the user matching the digital devices included within the digital fingerprint; an using module, stored in memory, that uses the authentication protocol to authenticate the user; and at least one physical processor configured to execute the identification module, the generation module, and the using module. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify a constellation of digital devices with which a user interacts by monitoring, via a router that directs traffic on a network connected to the constellation of digital devices, network traffic generated by the constellation of digital devices, wherein the constellation of digital devices comprises a constellation of smart-home appliances; create a digital fingerprint for the user that is based on the constellation of digital devices; generate an authentication protocol for authenticating the user by creating a policy that prescribes authenticating the user if a current digital environment of the user matches the digital fingerprint based on at least one of; a threshold number of digital devices within the current digital environment of the user matching digital devices included within the digital fingerprint; and a threshold percentage of the digital devices within the current digital environment of the user matching the digital devices included within the digital fingerprint; and use the authentication protocol to authenticate the user.
-
Specification