US 11,699,155 B2
Context-dependent authentication system, method and device
Deepak Chandra Dutt, Ottawa (CA); and Anil Buntwal Somayaji, Ottawa (CA)
Assigned to Zighra Inc., Ottawa (CA)
Filed by Zighra Inc., Ottawa (CA)
Filed on Jun. 29, 2020, as Appl. No. 16/915,165.
Application 16/915,165 is a continuation of application No. 15/447,253, filed on Mar. 2, 2017, granted, now 10,740,758.
Application 15/447,253 is a continuation of application No. 14/337,939, filed on Jul. 22, 2014, granted, now 9,619,852.
Application 14/337,939 is a continuation in part of application No. PCT/CA2013/050295, filed on Apr. 17, 2013.
Claims priority of provisional application 61/625,112, filed on Apr. 17, 2012.
Prior Publication US 2020/0327458 A1, Oct. 15, 2020
Int. Cl. G06Q 20/40 (2012.01); G06F 21/30 (2013.01); H04W 12/12 (2021.01); G06Q 10/00 (2023.01); G06Q 20/20 (2012.01); G06Q 20/32 (2012.01); G06Q 50/22 (2018.01); H04W 12/06 (2021.01); H04W 12/68 (2021.01); H04L 9/40 (2022.01); G06Q 50/26 (2012.01); H04W 12/065 (2021.01); H04W 12/126 (2021.01); G06F 21/31 (2013.01)
CPC G06Q 20/4016 (2013.01) [G06Q 10/00 (2013.01); G06Q 20/202 (2013.01); G06Q 20/322 (2013.01); G06Q 20/327 (2013.01); G06Q 20/40145 (2013.01); G06Q 50/265 (2013.01); H04L 63/08 (2013.01); H04L 63/1408 (2013.01); H04W 12/06 (2013.01); H04W 12/065 (2021.01); H04W 12/126 (2021.01); G06F 21/31 (2013.01); G06F 2221/2105 (2013.01); H04L 63/0861 (2013.01); H04W 12/68 (2021.01)] 19 Claims
OG exemplary drawing
 
1. A method for authenticating a user of a computing device, the method being performed by one or more processors and comprising:
at a first time interval, developing a model for a first user, wherein developing the model includes (i) detecting performance of a task by the first user; (ii) determining a first set of characteristics for performance of the task by the first user; (iii) learning a first set of model parameters based on the first set of characteristics; and (iv) adjusting the model based on the first set of model parameters;
at a second time interval, detecting performance of the task on the computing device;
determining a score that is indicative of the task being performed by the first user, based at least in part on the model; and
performing an authentication operation based on a comparison of the score to a threshold;
wherein detecting performance of the task during the first time interval and the second time interval includes detecting a kinetic motion, using sensor data obtained from at least one an accelerometer or gyroscope of the computing device, and correlating the kinetic motion to the task based on contextual information obtained from at least one of a non-kinetic sensor of the computing device and/or an application that runs on the computing device.