Systems and methods for authenticating a user through an unobservable re-authentication system
First Claim
Patent Images
1. A method to authenticate a user of a device through an unobservable authentication process, the method comprising:
- accessing first gesture data associated with an authorized owner;
implementing a training module to apply machine learning to the first gesture data, comprisingextracting features from the first gesture data, andgenerating a plurality of classification modules from the first gesture data;
capturing second gesture data related to a user'"'"'s interaction with the device;
implementing a first instance of an authentication module to authenticate whether the second gesture data is associated with the authorized owner, comprisingextracting user features from the second gesture data,forming a feature vector from the user features of the second gesture data,selecting a classification module from the plurality of classification modules based upon the feature vector,predicting whether the second gesture data is associated with the authorized owner by processing the feature vector with the classification module; and
continuously authenticating the user based on the user'"'"'s interaction with a content displayed by the device through the authentication module to determine if the user is the authorized owner,wherein authenticating the user is automatic and does not require specific prompts to the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating a user through an unobservable re-authentication process are disclosed.
13 Citations
11 Claims
-
1. A method to authenticate a user of a device through an unobservable authentication process, the method comprising:
-
accessing first gesture data associated with an authorized owner; implementing a training module to apply machine learning to the first gesture data, comprising extracting features from the first gesture data, and generating a plurality of classification modules from the first gesture data; capturing second gesture data related to a user'"'"'s interaction with the device; implementing a first instance of an authentication module to authenticate whether the second gesture data is associated with the authorized owner, comprising extracting user features from the second gesture data, forming a feature vector from the user features of the second gesture data, selecting a classification module from the plurality of classification modules based upon the feature vector, predicting whether the second gesture data is associated with the authorized owner by processing the feature vector with the classification module; and continuously authenticating the user based on the user'"'"'s interaction with a content displayed by the device through the authentication module to determine if the user is the authorized owner, wherein authenticating the user is automatic and does not require specific prompts to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method to authenticate an authorized owner of a smartphone, the method comprising;
-
collecting authorized owner data associated with an authorized owner of a smartphone; capturing user data associated with a user'"'"'s interaction with the smartphone; determining whether the user data is associated with the authorized owner, comprising extracting features from the user data, forming a feature vector from the features of the user data, selecting a classification module based upon the feature vector, predicting whether the user data is associated with the authorized owner by processing the feature vector with the classification module; continuously capturing additional user data related to the user'"'"'s interaction with the smartphone; and wherein authenticating the user is automatic and does not require specific prompts for user interaction with the smartphone. - View Dependent Claims (10, 11)
-
Specification