Systems and methods for authenticating a user based on a biometric model associated with the user
First Claim
1. A device, comprising:
- a non-transitory memory;
one or more sensors configured to detect biometric responses;
a global positioning system configured to detect a location of the device;
a network interface component; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the device to perform operations comprising;
providing a challenge to a user, the challenge generated by a biometric model application configured to authenticate the user against a biometric model tailored to the user;
detecting, from the one or more sensors, a response from the user to the provided challenge;
detecting, by the global positioning system, the location of the device;
determining whether the detected response matches an expected response based on the biometric model within a predetermined degree of accuracy to identify the user;
transmitting, via the network interface component, an indication of successful authentication in response to determining the detected response matches the expected response within the predetermined degree of accuracy; and
receiving access to a service based on the detected response matching the expected response within the predetermined degree of accuracy and the detected location of the device.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that are presented to the user for authentication purposes. A user response to the challenge may be compared to an expected response, and if the user response matches within a predetermined error of the expected response, the user may be authenticated. The systems and methods may further generate challenges that are adaptively designed to address weaknesses or errors in the created model such that the model is more closely associated with a user and the user is more likely to be the only person capable of successfully responding to the generated challenges.
50 Citations
20 Claims
-
1. A device, comprising:
-
a non-transitory memory; one or more sensors configured to detect biometric responses; a global positioning system configured to detect a location of the device; a network interface component; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the device to perform operations comprising; providing a challenge to a user, the challenge generated by a biometric model application configured to authenticate the user against a biometric model tailored to the user; detecting, from the one or more sensors, a response from the user to the provided challenge; detecting, by the global positioning system, the location of the device; determining whether the detected response matches an expected response based on the biometric model within a predetermined degree of accuracy to identify the user; transmitting, via the network interface component, an indication of successful authentication in response to determining the detected response matches the expected response within the predetermined degree of accuracy; and receiving access to a service based on the detected response matching the expected response within the predetermined degree of accuracy and the detected location of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for authenticating a user, comprising:
-
providing, by one or more processors of a device, a challenge to the user generated by a biometric model application configured to authenticate the user against a biometric model tailored to the user; detecting, by one or more sensors of the device, a biometric response from the user to the provided challenge; determining, by the one or more processors, whether the detected biometric response matches an expected response based on the biometric model above a threshold degree of accuracy; providing, by the one or more processors, a subsequent challenge in response to determining that the detected biometric response does not match the expected response above the threshold degree of accuracy; and receiving, by the device, access to a service in response to an acceptable response to the subsequent challenge matching the expected response above the threshold degree of accuracy. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
generating a challenge for a user from a biometric model tailored to the user, and an expected response based on the biometric model; comparing a detected response to the challenge from the user to the expected response; generating, in response to the detected response not matching the expected response above a threshold degree of accuracy, a new challenge and a new expected response based on the biometric model; and transmitting an indication of a successful authentication in response to an acceptable response to the new challenge. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification