Screen-analysis based device security
First Claim
1. An electronic device comprising:
- at least one processor;
memory storing instructions that, when executed by the at least one processor, cause the electronic device to;
when a first user profile is active for the electronic device;
identify, based on one or more screen capture events performed at the electronic device, content rendered by the electronic device;
generate feature vectors from the content rendered by the electronic device;
process the feature vectors using a classification model stored locally at the electronic device, the classification model trained to predict whether activity at the electronic device corresponds to the first user profile or to one or more additional user profiles, including a second user profile that differs from the first user profile;
generate, based on processing the feature vectors using the classification model, a first confidence score for the first user profile and a second confidence score for the second user profile;
determine, based on the first confidence score and the second confidence score, that the first user profile is no longer active, and the second user profile is now active for the electronic device; and
initiate a profile switch, to the second user profile, at the electronic device responsive to determining that that the first user profile is no longer active, and the second user profile is now active for the electronic device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for a content-based security for computing devices. An example method includes identifying content rendered by a mobile application, the content being rendered during a session, generating feature vectors from the content and determining that the feature vectors do not match a classification model. The method also includes providing, in response to the determination that the feature vectors do not match the classification model, a challenge configured to authenticate a user of the mobile device. Another example method includes determining a computing device is located at a trusted location, capturing information from a session, the information coming from content rendered by a mobile application during the session, generating feature vectors for the session, and repeating this until a training criteria is met. The method also includes training a classification model using the feature vectors and authenticating a user of the device using the trained classification model.
41 Citations
20 Claims
-
1. An electronic device comprising:
-
at least one processor; memory storing instructions that, when executed by the at least one processor, cause the electronic device to; when a first user profile is active for the electronic device; identify, based on one or more screen capture events performed at the electronic device, content rendered by the electronic device; generate feature vectors from the content rendered by the electronic device; process the feature vectors using a classification model stored locally at the electronic device, the classification model trained to predict whether activity at the electronic device corresponds to the first user profile or to one or more additional user profiles, including a second user profile that differs from the first user profile; generate, based on processing the feature vectors using the classification model, a first confidence score for the first user profile and a second confidence score for the second user profile; determine, based on the first confidence score and the second confidence score, that the first user profile is no longer active, and the second user profile is now active for the electronic device; and initiate a profile switch, to the second user profile, at the electronic device responsive to determining that that the first user profile is no longer active, and the second user profile is now active for the electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method performed by one or more processors when a first user profile is active for an electronic device, the method comprising:
-
identifying, based on one or more screen capture events performed at the electronic device, content rendered by the electronic device; generating feature vectors from the content rendered by the electronic device; processing the feature vectors using a classification model trained to predict whether activity at the electronic device corresponds to the first user profile or to one or more additional user profiles, including a second user profile that differs from the first user profile; generating, based on processing the feature vectors using the classification model, a first confidence score for the first user profile and a second confidence score for the second user profile; determining, based on the first confidence score and the second confidence score, that the first user profile is no longer active, and the second user profile is now active for the electronic device; and initiating a profile switch, to the second user profile, at the electronic device responsive to determining that that the first user profile is no longer active, and the second user profile is now active for the electronic device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification