CPC G06Q 20/4016 (2013.01) [G06Q 10/00 (2013.01); G06Q 20/202 (2013.01); G06Q 20/322 (2013.01); G06Q 20/327 (2013.01); G06Q 20/40145 (2013.01); G06Q 50/265 (2013.01); H04L 63/08 (2013.01); H04L 63/1408 (2013.01); H04W 12/06 (2013.01); H04W 12/065 (2021.01); H04W 12/126 (2021.01); G06F 21/31 (2013.01); G06F 2221/2105 (2013.01); H04L 63/0861 (2013.01); H04W 12/68 (2021.01)] | 19 Claims |
1. A method for authenticating a user of a computing device, the method being performed by one or more processors and comprising:
at a first time interval, developing a model for a first user, wherein developing the model includes (i) detecting performance of a task by the first user; (ii) determining a first set of characteristics for performance of the task by the first user; (iii) learning a first set of model parameters based on the first set of characteristics; and (iv) adjusting the model based on the first set of model parameters;
at a second time interval, detecting performance of the task on the computing device;
determining a score that is indicative of the task being performed by the first user, based at least in part on the model; and
performing an authentication operation based on a comparison of the score to a threshold;
wherein detecting performance of the task during the first time interval and the second time interval includes detecting a kinetic motion, using sensor data obtained from at least one an accelerometer or gyroscope of the computing device, and correlating the kinetic motion to the task based on contextual information obtained from at least one of a non-kinetic sensor of the computing device and/or an application that runs on the computing device.
|