摘要 |
This invention discloses a system for determining whether a purported or alleged authorized user is in fact the authorized user, by comparing new data on a real-time basis against probability distribution representations including an authorized user probability distribution representation and a global or wide population probability distribution representation, to provide a probability as to whether the purported authorized user is the authorized user. This invention may utilize keyboard dynamics or data, or X-Y device data, or other data from similar measurable characteristics, to determine the probability that the new data from the purported authorized user indicates or identifies that user as the authorized user. This invention identifies the user continuously as the user interacts with the system and to identify a change in situation in the environment of the user. This invention provides a means to identify an anonymous user by matching the continuous recorded behaviormetrics or a characteristic of the anonymous user with the behaviormetrics of known users. |
主权项 |
1. A computerized method for authenticating a user of an electronic system, comprising:
accessing, from a storage circuitry, data relating to measured parameters for a plurality of interactions with an input device for a purported authorized user; accessing, from the storage circuitry, a first situation probability distribution representation for the plurality of interactions for an authorized user, while in a known situation; accessing, from the storage circuitry, a first situation probability distribution representation for the plurality of interactions for a wide population, while in a known situation; determining with a computer processing circuitry, a value indicative of whether the purported authorized user is the authorized user, utilizing (a) the data for the purported authorized user for the plurality of interactions, (b) the first situation probability distribution representation for the authorized user for the plurality of interactions, and (c) the first situation probability distribution representation for the wide population for the plurality of interactions; and authenticating with the computer processing circuitry, the purported authorized user as the authorized user, if the value satisfies a prescribed threshold. |