白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Opportunistically collecting sensor data from a mobile device to facilitate user identification

專利號
US10867025B2
公開日期
2020-12-15
申請人
UnifyID(US CA San Francisco)
發(fā)明人
John C. Whaley
IPC分類
G06F21/31; G06F21/35; H04L29/06; H04W4/38; G06F21/32; H04W12/06; G06K9/00; G06N20/00; H04W12/00
技術(shù)領(lǐng)域
sensor,data,user,or,device,in,collection,beacon,can,trigger
地域: CA CA San Francisco

摘要

The inventors recently developed a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to a trigger event, the system collects sensor data from one or more sensors in the electronic device, wherein the sensor data includes movement-related sensor data caused by movement of the portable electronic device while the portable electronic device is in control of the user. Next, the system extracts a feature vector from the sensor data, and analyzes the feature vector to authenticate and/or identify the user. During this process, the feature vector is analyzed using a model trained with sensor data previously obtained from the portable electronic device while the user was in control of the portable electronic device.

說明書

Authentication agent 304 and other clients 442 can then connect to the query component 314 to retrieve the security score 443 for a user from analysis component 441. Query component 314 can also be used by clients to query and verify user identities continuously throughout the usage of their service. Also, instead of merely identifying and authenticating a specific user, the system can potentially be used to determine whether a user's smartphone has been stolen, or borrowed, or if another user is trying to log into a user's device on behalf of the user.

Authentication Process

FIG. 5 presents a flow chart illustrating operations involved in the authentication process in accordance with the disclosed embodiments. First, the system detects a trigger event (step 502). As mentioned above, this trigger event can involve: detecting an activity of the user (such as detecting whether the user is walking, stationary, or driving a car); a state change associated in an electronic device belonging to a user (such as a smartphone waking up, changing its charging state, going in and out of range of a wireless access point, or moving a certain distance); a timer-based trigger; and a broadcast trigger received by the electronic device.

權(quán)利要求

1
微信群二維碼
意見反饋