摘要:
A computer-implemented method, program-code, web-client device and computer system to realize and guard over a secure input routine based on their behavior.
摘要:
A computer-implemented method, program-code, web-client device and computer system to realize and guard over a secure input routine based on their behavior.
摘要:
Estimation of gyroscopic data on a mobile device is determined based on receiving a plurality of magnetometer-angle vectors from a magnetometer and receiving a plurality of accelerometer-angle vectors from an accelerometer. A plurality of matrices transform a coordinate system of the mobile device to an Earth coordinate system based on the magnetometer-angle vectors and the accelerometer-angle vectors. A plurality of estimated gyroscope vectors are then determined based on the plurality of matrices. A computer-implemented method), a program-code, and program-product, and devices for producing same are further disclosed herein.
摘要:
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure into input events. Such as, but not limited to, smart phones, touch pads and tablets. Humans may generate the input. The analysis of data may include statistical profiling of individual users as well as groups of users, the profiles can be stored in, but not limited to data containers such as files, secure storage, smart cards, databases, off device, in the cloud etc. A profile may be built from user/users behavior categorized into quantified types of behavior and/or gestures. The profile might be stored anonymized. The analysis may take place in real time or as post processing. Profiles can be compared against each other by all the types of quantified behaviors or by a select few.
摘要:
Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure into input events. Such as, but not limited to, smart phones, touch pads and tablets. Humans may generate the input. The analysis of data may include statistical profiling of individual users as well as groups of users, the profiles can be stored in, but not limited to data containers such as files, secure storage, smart cards, databases, off device, in the cloud etc. A profile may be built from user/users behavior categorized into quantified types of behavior and/or gestures. The profile might be stored anonymized. The analysis may take place in real time or as post processing. Profiles can be compared against each other by all the types of quantified behaviors or by a select few.
摘要:
A computer-implemented method, computer device and computer system for detecting multiple users based on a biometric user profile and/or a behavioral user profile.
摘要:
A method and a corresponding device for authenticating a user for access to protected information, the method comprising generating a behavioral user profile associated with a first user known to be a legitimate user of the protected information, obtaining from a second user, using a behavioral input device associated with a second computing device, a behavioral user sample, storing the behavioral user sample, associated with the second user, in a temporary user profile, comparing the behavioral user sample of the second user to the behavioral user profile, and if the behavioral user sample does not match the behavioral user profile contacting the legitimate first user and receiving from the legitimate first user information regarding the legitimacy of the second user and based on the information received from the first user, providing a response to the second user and updating the user profile.
摘要:
A computer-implemented method, computer device and computer system for detecting multiple users based on a biometric user profile and/or a behavioral user profile.
摘要:
A method and a corresponding device for authenticating a user for access to protected information, the method comprising generating a behavioral user profile associated with a first user known to be a legitimate user of the protected information, obtaining from a second user, using a behavioral input device associated with a second computing device, a behavioral user sample, storing the behavioral user sample, associated with the second user, in a temporary user profile, comparing the behavioral user sample of the second user to the behavioral user profile, and if the behavioral user sample does not match the behavioral user profile contacting the legitimate first user and receiving from the legitimate first user information regarding the legitimacy of the second user and based on the information received from the first user, providing a response to the second user and updating the user profile.
摘要:
An apparatus with a method, and or application, and or service to collect more fine rained or extra event data, that may not be accessible directly by the underlying architecture. This is been done by adding a virtual overlay over selected portion of the screen and detecting events inside or outside of his own context.