白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Opportunistically collecting sensor data from a mobile device to facilitate user identification

專利號
US10867025B2
公開日期
2020-12-15
申請人
UnifyID(US CA San Francisco)
發(fā)明人
John C. Whaley
IPC分類
G06F21/31; G06F21/35; H04L29/06; H04W4/38; G06F21/32; H04W12/06; G06K9/00; G06N20/00; H04W12/00
技術(shù)領(lǐng)域
sensor,data,user,or,device,in,collection,beacon,can,trigger
地域: CA CA San Francisco

摘要

The inventors recently developed a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to a trigger event, the system collects sensor data from one or more sensors in the electronic device, wherein the sensor data includes movement-related sensor data caused by movement of the portable electronic device while the portable electronic device is in control of the user. Next, the system extracts a feature vector from the sensor data, and analyzes the feature vector to authenticate and/or identify the user. During this process, the feature vector is analyzed using a model trained with sensor data previously obtained from the portable electronic device while the user was in control of the portable electronic device.

說明書

FIG. 6 presents a flow chart illustrating operations a client performs during the authentication process in accordance with the disclosed embodiments. First, the client sends a query to the query component asking to authenticate a user (step 602). The client then receives a security score from the query component in response to the query (step 604). Then, the system determines whether the security score is greater than a threshold (step 606). (Note that the threshold can be different for different services and actions.) If the security score is greater than the threshold (YES at step 606), the client authenticates the user (step 612). In some embodiments, this may involve combining a cryptographically signed response received from the query component with local cryptographic data to perform the authentication operation.

In some embodiments, instead of using the security score for an authentication decision, the security score is used to detect fraud. In these embodiments, the security score is fed to a fraud/risk engine, which makes a determination about whether an interaction may be fraudulent, and if so performs some action, such as: blocking the transaction; flagging the transaction as potentially fraudulent; or logging the transaction to be investigated at a later time.

Otherwise, if the security score is not greater than the threshold (NO at step 606), the client causes a challenge to be issued to the user (step 608) either on the same device or on a different device. The challenge can be an “active challenge” that requires the user to perform some action, or a “passive challenge” that happens unbeknownst to the user and requires the system to obtain more-detailed sensor data or perform more-sophisticated processing of the sensor data.

權(quán)利要求

1
微信群二維碼
意見反饋