Motion-based identity authentication of an individual with a communications device
First Claim
1. A method for securely authenticating an identity of an individual using a communications device based on a defined pattern that is traced by the individual, comprising:
- receiving a traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via a user interface of the communications device;
analyzing contact data generated from a finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern;
capturing a plurality of pressure clouds generated from the finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern, wherein each pressure cloud is an imprint the individual generates on a multi-touch display of the user interface based on an amount of pressure that is applied by the individual onto the multi-touch display as the individual continuously traces the defined pattern;
calculating an area, a length of a major axis, a length of a minor axis, and an angle for an ellipse formed by each pressure cloud; and
comparing the area, the length of the major axis, the length of the minor axis, and the angle of the ellipse formed by each pressure cloud with each previously captured area, length of the major axis, length of the minor axis, and the angle of the ellipse formed by each previously captured pressure cloud to thereby authenticate the identity of the individual.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods securely authenticate an identity of an individual based on a pattern that is traced by the individual. Embodiments relate to prompting an individual with a pattern to trace when attempting to authenticate the identity of the individual during an identity authentication session. Motion-based behavior data that is generated by motions executed by the individual as the individual traces the pattern is captured via a motion-capturing sensor. The motion-based behavior data is unique to the individual and has a low likelihood of being duplicated by an unauthorized individual attempting to fraudulently pose as the individual. The captured motion-based behavior data is compared to previously-captured motion-based behavior data from previous traces of the pattern completed by the individual. The identity of the individual is authenticated when the motion-based behavior data is within a threshold of the previously captured motion-based behavior data.
15 Citations
23 Claims
-
1. A method for securely authenticating an identity of an individual using a communications device based on a defined pattern that is traced by the individual, comprising:
-
receiving a traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via a user interface of the communications device; analyzing contact data generated from a finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern; capturing a plurality of pressure clouds generated from the finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern, wherein each pressure cloud is an imprint the individual generates on a multi-touch display of the user interface based on an amount of pressure that is applied by the individual onto the multi-touch display as the individual continuously traces the defined pattern; calculating an area, a length of a major axis, a length of a minor axis, and an angle for an ellipse formed by each pressure cloud; and comparing the area, the length of the major axis, the length of the minor axis, and the angle of the ellipse formed by each pressure cloud with each previously captured area, length of the major axis, length of the minor axis, and the angle of the ellipse formed by each previously captured pressure cloud to thereby authenticate the identity of the individual. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A communications device for securely authenticating an identity of an individual based on a defined pattern that is traced by the individual, comprising:
-
a transceiver configured to; receive a traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via a user interface of the communications device, a capturing module configured to capture a plurality of pressure clouds generated from a finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern, wherein each pressure cloud is an imprint the individual generates on a multi-touch display of the user interface based on an amount of pressure that is applied by the individual onto the multi-touch display as the individual continuously traces the defined pattern; an analyzer configured to analyze contact data generated from the finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern; a calculation module configured to calculate an area, a length of a major axis, a length of a minor axis, and an angle for an ellipse formed by each pressure cloud; and a comparing module configured to compare the area, the length of the major axis, the length of the minor axis, and the angle of the ellipse formed by each pressure cloud with each previously captured area, length of the major axis, length of the minor axis, and the angle of the ellipse formed by each previously captured pressure cloud to thereby authenticate the identity of the individual. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for securely authenticating an identity of an individual using a communications device based on a defined pattern that is traced by the individual, comprising:
-
receiving a traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via a user interface of the communications device; capturing a plurality of forces generated from the finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern; and comparing the plurality of forces with previously captured pluralities of forces to thereby authenticate the identity of the individual. - View Dependent Claims (14, 15)
-
-
16. A method for securely authenticating an identity of an individual using a communications device based on a defined pattern that is traced by the individual, comprising:
-
receiving a traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via a user interface of the communications device; capturing a plurality of moments generated from the finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern, wherein each moment represents an orientation of the finger as the individual continuously traces the defined pattern; and comparing the plurality of moments with previously captured pluralities of moments to thereby authenticate the identity of the individual. - View Dependent Claims (17)
-
-
18. A communications device for securely authenticating an identity of an individual based on a defined pattern that is traced by the individual, comprising:
-
a transceiver configured to receive a traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via a user interface of the communications device; a capturing module configured to capture a plurality of forces generated from the finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern; and a comparing module configured to compare the plurality of forces with previously captured pluralities of forces to thereby authenticate the identity of the individual. - View Dependent Claims (19, 20, 21)
-
-
22. A communications device for securely authenticating an identity of an individual based on a defined pattern that is traced by the individual, comprising:
-
a transceiver configured to receive a traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via a user interface of the communications device; a capturing module configured to capture a plurality of moments generated from the finger of the individual being in contact with the user interface of the communications device as the individual continuously traces the defined pattern, wherein each moment represents an orientation of the finger as the individual continuously traces the defined pattern; and a comparing module configured to compare the plurality of moments with previously captured pluralities of moments to thereby authenticate the identity of the individual. - View Dependent Claims (23)
-
Specification