×

Determining user authentication based on user/device interaction

  • US 9,965,606 B2
  • Filed: 10/30/2015
  • Issued: 05/08/2018
  • Est. Priority Date: 02/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus for user authentication based on user/device interactions, the apparatus comprising:

  • a memory;

    one or more processors; and

    a security module stored in the memory, executable by the one or more processors, and configured to cause the one or more processors to;

    communicate, to a computing device, code executable by the computing device that causes the computing device to monitor user patterns of a user based on the user physically interacting with the computing device;

    receive, from the computing device, a baseline set of physical user patterns of the user for identifying the user, wherein the physical user patterns of the user comprise a manner in which the user performs correction of typing errors;

    identify, from the baseline set of physical user patterns, one or more routine actions performed by the user while physically interacting with the computing device;

    receive, from the user, a request to perform a transaction using the computing device, wherein the transaction is associated with a level of security that must be authenticated prior to completing the transaction;

    receive, from the computing device, an identification set of physical user patterns of the user based on the user physically interacting with the computing device;

    determine a threshold score based on comparing the identification set of physical user patterns with the baseline set of physical user patterns;

    based on the threshold score, alter the level of security that must be authenticated prior to completing the transaction;

    cause the one or more processors to update the baseline set of physical user patterns using the identification set of physical user patterns based on successfully validating one or more authentication credentials associated with the level of security;

    communicate a request for the user to submit a response to one or more credentials associated with the level of security;

    receive the response to the one or more credentials associated with the level of security;

    authenticate the user based on validating the response to the one or more credentials associated with the level of security; and

    perform the transaction based on authenticating the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×