Method of detecting unauthorized access to a system or an electronic device
First Claim
Patent Images
1. ) A method comprising:
- (A) capturing at least one set of behaviors of a first user;
(B) generating a first signature from the first user'"'"'s set(s) of behaviors;
(C) capturing at least one set of behaviors of a second user;
(D) generating a second signature from the second user'"'"'s set(s) of behaviors; and
(E) calculating the difference between the two signatures, wherein the first user and the second user are purportedly the same user.
1 Assignment
0 Petitions
Accused Products
Abstract
Characteristics of a user'"'"'s behavior on an electronic device are captured and stored. These stored characteristics are compared to the characteristics of a subsequent user purporting to be the same person. If the differences in the characteristics are such that fraud is suspected, an alert is activated.
60 Citations
15 Claims
-
1. ) A method comprising:
-
(A) capturing at least one set of behaviors of a first user;
(B) generating a first signature from the first user'"'"'s set(s) of behaviors;
(C) capturing at least one set of behaviors of a second user;
(D) generating a second signature from the second user'"'"'s set(s) of behaviors; and
(E) calculating the difference between the two signatures, wherein the first user and the second user are purportedly the same user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. ) A method comprising:
-
(A) capturing a first subset of attributes of a first user in a first session;
(B) capturing a second subset of attributes of a second user in a second session;
(C) associating each subset of attributes with each user and the appropriate session;
(D) establishing a suspicion threshold; and
(E) comparing the difference between the first and the second subsets of attributes to the suspicion threshold. - View Dependent Claims (8)
-
-
9. ) A method to detect usage of a system that executes on an electronic device by an unauthorized individual, said method comprises:
-
(A) in a first user session, capturing and storing at least one of a first user'"'"'s attributes as a first set of data, and associating the data with the first user;
(B) generating and storing a first signature based on at least the first set of data;
(C) in a second user session, capturing and storing at least one of a second user'"'"'s attributes as a second set of data, and associating the data with the second user;
(D) generating and storing a second signature based on at least the second set of data;
(E) calculating the differences between the first signature and the second signature;
(F) determining if the differences between the first signature and the second signature suggest that the first user and the second user are not the same person. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification