白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Opportunistically collecting sensor data from a mobile device to facilitate user identification

專利號(hào)
US10867025B2
公開日期
2020-12-15
申請(qǐng)人
UnifyID(US CA San Francisco)
發(fā)明人
John C. Whaley
IPC分類
G06F21/31; G06F21/35; H04L29/06; H04W4/38; G06F21/32; H04W12/06; G06K9/00; G06N20/00; H04W12/00
技術(shù)領(lǐng)域
sensor,data,user,or,device,in,collection,beacon,can,trigger
地域: CA CA San Francisco

摘要

The inventors recently developed a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to a trigger event, the system collects sensor data from one or more sensors in the electronic device, wherein the sensor data includes movement-related sensor data caused by movement of the portable electronic device while the portable electronic device is in control of the user. Next, the system extracts a feature vector from the sensor data, and analyzes the feature vector to authenticate and/or identify the user. During this process, the feature vector is analyzed using a model trained with sensor data previously obtained from the portable electronic device while the user was in control of the portable electronic device.

說明書

There presently exist a number of techniques for identifying and authenticating computer system users. At present, most techniques rely on knowledge-based factors, such as passwords. However, passwords have limitations, especially with respect to the user's experience. Human users are simply not good at creating new passwords, which include strong and unique combinations of characters that are also memorable. Furthermore, passwords are commonly phished or stolen. Moreover, the password-creation rules that websites and services enforce are ever-changing and growing increasingly more complex. To keep up with this complexity, users often reuse passwords across multiple services, or make only small, predictable changes among passwords for different services. Also, because passwords are hard to remember, users often write them down or store them in a file for easy access, which also makes them easier to steal. Some users employ password managers to handle all of their passwords. However, password managers reduce security by creating a single point of failure.

Some systems rely on a two-factor authentication technique, which requires a user to carry an extra device to authenticate. However, this can be burdensome to the user because the device can be forgotten, run out of power, or break.

Other systems authenticate a user based on biometric factors, such as fingerprints. However, it is often inconvenient to use such systems, and they can require specialized hardware. Moreover, it is very difficult (or impossible) to alter a biometric signature in case it is compromised.

Hence, what is needed is a technique for identifying and authenticating users of computing systems without drawbacks of the above-described existing techniques.

SUMMARY

權(quán)利要求

1
微信群二維碼
意見反饋