发明名称 Authenticating users based upon an identity footprint
摘要 Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device is identified. A timestamp is generated and associated with the behavior. A user signature corresponding to a user based at least in part upon the behavior and the timestamp is generated and stored.
申请公布号 US8863307(B2) 申请公布日期 2014.10.14
申请号 US201213537672 申请日期 2012.06.29
申请人 Broadcom Corporation 发明人 Sorek Noam
分类号 G06Q99/00;G06Q20/40 主分类号 G06Q99/00
代理机构 McDermott Will & Emery LLP 代理人 McDermott Will & Emery LLP
主权项 1. A system, comprising: at least one sensor configured to determine at least one of a position or movement of the system; and circuitry in communication with the at least one sensor, the circuitry being configured to: identify, using the at least one sensor, at least one behavior associated with use of the system over a first period of time;generate at least one timestamp associated with the at least one behavior and the first period of time;generate a user signature corresponding to the use of the system over the first period of time based at least in part upon the at least one behavior and the at least one timestamp,obtain a request to authenticate a user of the system from a system requesting authentication, wherein the request to authenticate the user indicates one of a higher level of authentication or a lower level of authentication,in response to the request, determine whether use of the system over a second period of time other than the first period of time corresponds to the user signature and identify a deviation between the use of the computing device over the second period of time and the use of the computing device over the first period of time; when the request to authenticate the user indicates the higher level of authentication, comparing the deviation against a lower level of deviation permitted for authentication of the user;and when the request to authenticate the user indicates the lower level of authentication, comparing the deviation against a higher level of deviation permitted for authentication of the user; andauthenticating the user when the use of the computing device over the second period of time corresponds to the use of the computing device over the first period of time in accordance with the user signature.
地址 Irvine CA US