Methods and system for passive authentication through user attributes

作者: Stavros Antonakakis , Suman Kumar Bhowmick , Ravi Prakash Mishra , Ajay Gordhandas Mulani , Erick Kobres

DOI:

关键词:

摘要: Data is automatically collected; the data relevant to user attributes. That provided as factors for passive authenticating access a device and/or resource. In an embodiment, used establish profile or pattern user.

参考文章(21)
Jonathan Hromi, Robert C. Toole, Hadley Rupert Stern, John McDonough, Seth Warren Brooks, Risk adjusted, multifactor authentication ,(2013)
Vidur Apparao, Jeremy King, Niall Browne, Scott Bailey, System and method for implementing adaptive security zones ,(2009)
Michael Vincent Fufidio, Reginald Gary Moffat, Giuseppe Pino Baldassarre, Portal intrusion detection apparatus and method ,(2001)
Brian Kolo, Marc Labgold, Credit fraud prevention systems and methods ,(2006)
Branko Sarcanin, Method and system for a virtual safe ,(2001)
David J. Steeves, Kim Cameron, Quentin S. Miller, Todd L. Carpenter, David Foster, Passive security enforcement ,(2010)
Elliott Harold Glazer, David E. Johnstone, Fred Alan Bishop, Dirk B. White, Coby Royer, Nick Swift, Russell Bennett, Michael G. Johnson, Marvin Simkin, Zygmunt Steven Gorgol, William G. Hohle, Walter Donald Lake, Methods and Apparatus for Conducting Electronic Transactions ,(2012)
Blayn Beenau, David Bonalle, Seth Fields, Carl Larkin, Joshua Montgomery, Peter Saunders, William Gray, Method for using a sensor to register a biometric for use with a transponder-reader system ,(2004)