Motion-based identity authentication of an individual with a communications device
First Claim
1. A method for securely authenticating an identity of an individual using a communications device based on a pattern that is traced by the individual, comprising:
- identifying a defined pattern by a user interface of the communications device to the individual for the individual to currently trace;
receiving a currently traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via the user interface of the communications device;
capturing, from the currently traced pattern, current motion-based behavior data generated by the individual continuously tracing the defined pattern from the initial point to the end point, the current motion-based behavior data including a plurality of variables;
accumulating previously captured motion-based behavior data captured from each of a plurality of previously traced patterns previously traced by the individual, the previously captured motion-based behavior data including the plurality of variables;
determining, for each of the plurality of variables, a threshold that the variable is to be within using the previously captured motion-based behavior data; and
comparing each variable of the current motion-based behavior data with a corresponding variable of the previously captured motion-based behavior data to determine whether each variable of the current motion-based behavior data is within the threshold of the corresponding variable of the previously captured motion-based behavior data.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and computer storage mediums securely authenticate an identity of an individual based on a pattern that is traced by the individual. Embodiments of the present disclosure relate to prompting an individual with a pattern to trace when attempting to authenticate the identity of the individual during an identity authentication session. Motion-based behavior data that is generated by motions executed by the individual as the individual traces the pattern is captured via a motion-capturing sensor. The motion-based behavior data is unique to the individual and has a low likelihood of being duplicated by an unauthorized individual attempting to fraudulently pose as the individual. The captured motion-based behavior data is compared to previously captured motion-based behavior data from previous traces of the pattern completed by the individual. The identity of the individual is authenticated when the motion-based behavior data is within a threshold of the previously captured motion-based behavior data.
-
Citations
26 Claims
-
1. A method for securely authenticating an identity of an individual using a communications device based on a pattern that is traced by the individual, comprising:
-
identifying a defined pattern by a user interface of the communications device to the individual for the individual to currently trace; receiving a currently traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via the user interface of the communications device; capturing, from the currently traced pattern, current motion-based behavior data generated by the individual continuously tracing the defined pattern from the initial point to the end point, the current motion-based behavior data including a plurality of variables; accumulating previously captured motion-based behavior data captured from each of a plurality of previously traced patterns previously traced by the individual, the previously captured motion-based behavior data including the plurality of variables; determining, for each of the plurality of variables, a threshold that the variable is to be within using the previously captured motion-based behavior data; and comparing each variable of the current motion-based behavior data with a corresponding variable of the previously captured motion-based behavior data to determine whether each variable of the current motion-based behavior data is within the threshold of the corresponding variable of the previously captured motion-based behavior data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A communications device for securely authenticating an identity of an individual based on a pattern that is traced by the individual, comprising:
-
a user interface configured to identify a defined pattern to the individual for the individual to currently trace; a transceiver configured to receive a currently traced pattern generated from continuously tracing the defined pattern by the individual from an initial point on the defined pattern to an end point on the defined pattern via the user interface; at least one processor; and a memory coupled with the at least one processor, the memory including instructions that, when executed by the at least one processor cause the communications device to; capture, from the currently traced pattern, current motion-based behavior data generated by the individual continuously tracing the defined pattern from the initial point to the end point, the current motion-based behavior data including a plurality of variables; accumulate previously captured motion-based behavior data captured from a plurality of previously traced patterns previously traced by the individual, the previously captured motion-based behavior data including the plurality of variables; determine, for each of the plurality of variables, a threshold that the variable is to be within using the previously captured motion-based behavior data; and compare each variable of the current motion-based behavior data with a corresponding variable of the previously captured motion-based behavior data to determine whether each variable of the current motion-based behavior data is within the threshold of the corresponding variable of the previously captured motion-based behavior data. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification