×

Unobtrusive verification of user identity

  • US 10,248,770 B2
  • Filed: 08/04/2014
  • Issued: 04/02/2019
  • Est. Priority Date: 03/17/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • creating, by a computing device, a first verification model for a user, the first verification model being based upon enrollment data that is collected via an explicit enrollment procedure and including a first set of biometric data for verifying an identity of the user;

    verifying, by the computing device, the identity of the user a first time using the first verification model;

    unobtrusively collecting, by the computing device, one or more reliable data streams associated with the user, wherein the one or more reliable data streams are collected while the identity of the user is verified the first time using the first verification model;

    unobtrusively creating, by the computing device, a second verification model for the user, wherein the second verification model is based upon the one or more reliable data streams that are collected while the identity of the user is verified the first time using the first verification model, wherein the second verification model includes a second set of biometric data for verifying the identity of the user, and wherein the second set of biometric data included in the second verification model comprises biometric data of a different type than the first set of biometric data included in the first verification model;

    unobtrusively collecting, by the computing device, one or more verification data streams from the user, the one or more verification data streams being separate from the enrollment data used to create the first verification model, and the one or more reliable data streams used to create the second verification model; and

    verifying, by the computing device, the identity of the user a second time by applying the one or more verification data streams to the first and second verification models, wherein verifying the identity of the user the second time comprises;

    receiving, by the computing device, a first verification result generated by a server remote from the computing device, the first verification result being generated by the server based on instances of the first and second verification models stored on the server;

    comparing, by the computing device, the first verification result with a second verification result generated by the computing device based on instances of the first and second verification models stored on the computing device; and

    if the first verification result generated by the server is consistent with the second verification result generated by the computing device, authorizing the user to perform a secured action on the computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×