Security device, methods, and systems for continuous authentication
First Claim
1. A security computing device comprising:
- a processor;
a memory; and
a connector for coupling the security computing device to a second computing device, wherein the second computing device is configured to receive periodically images of a user from an image capture device coupled to the second computing device and images of a display screen associated with the second computing device, wherein the processor is configured to execute instructions obtained from the memory of the security computing device for;
enabling communication between the security computing device and the second computing device;
authenticating the user for accessing content via the second computing device;
receiving the images of the display screen and the periodic images of the user from the second computing device that the user is utilizing for accessing the content;
receiving, after the user is authenticated, from the second computing device user inputs entered via a keyboard of the second computing device, the user inputs being entered while accessing the content, the images and the user inputs used to monitor digital and physical activities of the user and to establish a link between the digital and physical activities of the user;
performing continuous authentication operations to validate an identification of the user based on the periodic images of the user, images of the display screen, and the user inputs;
transmitting the user inputs with the received periodic images to a security server using an out of band channel to create audit data of the digital and physical activities of the user while accessing the second computing device; and
when the authentication of the user or any one of the continuous authentication operations to validate the identification of the user fails, sending a message from the security computing device to the second computing device to disable the user from using the second computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails.
-
Citations
19 Claims
-
1. A security computing device comprising:
-
a processor; a memory; and a connector for coupling the security computing device to a second computing device, wherein the second computing device is configured to receive periodically images of a user from an image capture device coupled to the second computing device and images of a display screen associated with the second computing device, wherein the processor is configured to execute instructions obtained from the memory of the security computing device for; enabling communication between the security computing device and the second computing device; authenticating the user for accessing content via the second computing device; receiving the images of the display screen and the periodic images of the user from the second computing device that the user is utilizing for accessing the content; receiving, after the user is authenticated, from the second computing device user inputs entered via a keyboard of the second computing device, the user inputs being entered while accessing the content, the images and the user inputs used to monitor digital and physical activities of the user and to establish a link between the digital and physical activities of the user; performing continuous authentication operations to validate an identification of the user based on the periodic images of the user, images of the display screen, and the user inputs; transmitting the user inputs with the received periodic images to a security server using an out of band channel to create audit data of the digital and physical activities of the user while accessing the second computing device; and when the authentication of the user or any one of the continuous authentication operations to validate the identification of the user fails, sending a message from the security computing device to the second computing device to disable the user from using the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for securing a computer device, the method comprising:
-
enabling communication between a security computing device and a second computing device, the security computing device having a processor, wherein the second computing device is configured to receive periodically images of a user from an image capture device coupled to the second computing device and images of a display screen associated with the second computing device; authenticating the user for accessing content via the second computing device, using the images of the user; determining that the user is accessing the second computing device; receiving, by the security computing device and after the user is authenticated, the images of the user and images of the display screen from the second computing device, and receiving from the second computing device user inputs entered via a keyboard of the second computing device, the user inputs being entered while accessing the content, the images and the user inputs used to monitor digital and physical activities of the user and to establish a link between the digital and physical activities of the user; performing, by the security computing device, continuous authentication operations to validate an identification of the user based on the images of the user, images of the display screen and the user inputs; transmitting, by the security computing device, the user inputs with the received images of the user and of the display screen to a security server using an out of band channel to create audit data of digital and physical activities of the user while accessing the second computing device; and when the authentication of the user or any one of the continuous authentication operations fails, sending a message from the security computing device to the second computing device to disable the user from using the second computing device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program embedded in a non-transitory computer-readable storage medium for securing a computer device, the computer program comprising:
-
program instructions for enabling communication between a security computing device and a second computing device, the security computing device having a processor, wherein the second computing device is configured to receive periodically images of a user from an image capture device coupled to the second computing device and images of a display screen associated with the second computing device; program instructions for authenticating the user for accessing content via the second computing device, using images of the user; program instructions for receiving, by the security computing device, the images of the user and images of the display screen from the second computing device that the user is utilizing for accessing the content; program instructions for receiving, by the security computing device and after the user is authenticated, from the second computing device user inputs entered via a keyboard of the second computing device, the user inputs being entered while accessing the content, the images and the user inputs used to monitor digital and physical activities of the user and to establish a link between the digital and physical activities of the user; program instructions for performing, by the security computing device, continuous authentication operations to validate an identification of the user based on the images of the user, images of the display screen, and the user inputs; program instructions for transmitting, by the security computing device, the user inputs with the received images of the user and of the display screen to a security server using an out of band channel to create audit data of digital and physical activities of the user while accessing the second computing device; and program instructions for, when the authentication of the user or any one of the continuous authentication operations fails, sending a message from the security computing device to the second computing device to disable the user from using the second computing device. - View Dependent Claims (18, 19)
-
Specification