Determining user authentication based on user/device interaction
First Claim
1. An apparatus for user authentication based on user/device interactions, the apparatus comprising:
- a memory;
one or more processors; and
a security module stored in the memory, executable by the one or more processors, and configured to cause the one or more processors to;
communicate, to a computing device, code executable by the computing device that causes the computing device to monitor user patterns of a user based on the user physically interacting with the computing device;
receive, from the computing device, a baseline set of physical user patterns of the user for identifying the user, wherein the physical user patterns of the user comprise a manner in which the user performs correction of typing errors;
identify, from the baseline set of physical user patterns, one or more routine actions performed by the user while physically interacting with the computing device;
receive, from the user, a request to perform a transaction using the computing device, wherein the transaction is associated with a level of security that must be authenticated prior to completing the transaction;
receive, from the computing device, an identification set of physical user patterns of the user based on the user physically interacting with the computing device;
determine a threshold score based on comparing the identification set of physical user patterns with the baseline set of physical user patterns;
based on the threshold score, alter the level of security that must be authenticated prior to completing the transaction;
cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security;
communicate a request for the user to submit a response to one or more credentials associated with the level of security;
receive the response to the one or more credentials associated with the level of security;
authenticate the user based on validating the response to the one or more credentials associated with the level of security; and
perform the transaction based on authenticating the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments of the present invention may be configured to communicate code executable by a computing device that causes the computing device to monitor user patterns of a user based on the user interacting with the computing device; receive baseline user patterns to identify the user; identify, from the baseline user patterns, one or more routine actions performed by the user operating the computing device; receive a request to perform a transaction, wherein the transaction is associated with a level of security that must be authenticated; receive identification user patterns of the user based on the user interacting with the computing device; determine a threshold score based on comparing the identification user patterns with the baseline user patterns; and alter the level of security.
-
Citations
18 Claims
-
1. An apparatus for user authentication based on user/device interactions, the apparatus comprising:
-
a memory; one or more processors; and a security module stored in the memory, executable by the one or more processors, and configured to cause the one or more processors to; communicate, to a computing device, code executable by the computing device that causes the computing device to monitor user patterns of a user based on the user physically interacting with the computing device; receive, from the computing device, a baseline set of physical user patterns of the user for identifying the user, wherein the physical user patterns of the user comprise a manner in which the user performs correction of typing errors; identify, from the baseline set of physical user patterns, one or more routine actions performed by the user while physically interacting with the computing device; receive, from the user, a request to perform a transaction using the computing device, wherein the transaction is associated with a level of security that must be authenticated prior to completing the transaction; receive, from the computing device, an identification set of physical user patterns of the user based on the user physically interacting with the computing device; determine a threshold score based on comparing the identification set of physical user patterns with the baseline set of physical user patterns; based on the threshold score, alter the level of security that must be authenticated prior to completing the transaction; cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security; communicate a request for the user to submit a response to one or more credentials associated with the level of security; receive the response to the one or more credentials associated with the level of security; authenticate the user based on validating the response to the one or more credentials associated with the level of security; and perform the transaction based on authenticating the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for user authentication based on user/device interactions, the method comprising:
-
communicating, to a computing device, code executable by the computing device that causes the computing device to monitor user patterns of a user based on the user physically interacting with the computing device; receiving, from the computing device, a baseline set of physical user patterns of the user for identifying the user, wherein the physical user patterns of the user comprise a manner in which the user performs correction of typing errors; identifying, from the baseline set of physical user patterns, one or more routine actions performed by the user while operating the computing device; receiving, from the user, a request to perform a transaction using the computing device, wherein the transaction is associated with a level of security that must be authenticated prior to completing the transaction; receiving, from the computing device, an identification set of physical user patterns of the user based on the user physically interacting with the computing device; determining a threshold score based on comparing the identification set of physical user patterns with the baseline set of physical user patterns; based on the threshold score, altering the level of security that must be authenticated prior to completing the transaction; cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security; cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security; communicate a request for the user to submit a response to one or more credentials associated with the level of security; receive the response to the one or more credentials associated with the level of security; authenticate the user based on validating the response to the one or more credentials associated with the level of security; and perform the transaction based on authenticating the user. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for user authentication based on user/device interactions, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to:
-
communicate, to a computing device, code executable by the computing device that causes the computing device to monitor user patterns of a user based on the user physically interacting with the computing device; receive, from the computing device, a baseline set of physical user patterns of the user for identifying the user, wherein the physical user patterns of the user comprise a manner in which the user performs correction of typing errors; identify, from the baseline set of physical user patterns, one or more routine actions performed by the user while operating the computing device; receive, from the user, a request to perform a transaction using the computing device, wherein the transaction is associated with a level of security that must be authenticated prior to completing the transaction; receive, from the computing device, an identification set of physical user patterns of the user based on the user physically interacting with the computing device; determine a threshold score based on comparing the identification set of physical user patterns with the baseline set of physical user patterns; based on the threshold score, alter the level of security that must be authenticated prior to completing the transaction; cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security; cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security; communicate a request for the user to submit a response to one or more credentials associated with the level of security; receive the response to the one or more credentials associated with the level of security; authenticate the user based on validating the response to the one or more credentials associated with the level of security; and perform the transaction based on authenticating the user. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system for user authentication to perform at least one user action of a plurality of user actions associated with an application running on an apparatus and based on user/device interactions patterns, the system comprising:
-
a memory; one or more processors; and computer-executable instructions stored in the memory, executable by the one or more processors, and configured to cause the one or more processors to; receive from a user, a request to execute the at least one user action from a plurality of user actions associated with an application, wherein execution of the at least one user action requires validation of one or more authentication credentials; collect a set of data comprising information related to one or more physical user patterns based on the user physically interacting with an apparatus, wherein the physical user patterns of the user comprise a manner in which the user performs correction of typing errors; determine a normal pattern of usage based on the collected set of data; determine a present pattern of usage based on the user physically interacting with the apparatus; determine a user pattern score of the user, comprising; comparing the present pattern of usage to the normal pattern of usage; determining that the present pattern of usage is outside the normal pattern of usage; setting the user pattern score by determining an extent to which the present pattern of usage is outside the normal pattern of usage; determine a level of security associated with the determined user pattern score; determine which one or more authentication types from a plurality of authentication types are associated with the level of security associated with the user pattern score; request one or more authentication credentials corresponding to the determined one or more authentication types; receive one or more authentication credentials from the user; validate the one or more authentication credentials, thereby resulting in a successful validation of the one or more authentication credentials; in response to the successful validation of the one or more authentication credentials, execute the at least one user action; cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security; cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security; communicate a request for the user to submit a response to one or more credentials associated with the level of security; receive the response to the one or more credentials associated with the level of security; authenticate the user based on validating the response to the one or more credentials associated with the level of security; and perform the transaction based on authenticating the user.
-
Specification