Abstract:
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on one or more environmental properties (e.g., ambient noise level, ambient luminosity, temperature, etc.), or one or more physiological properties of a user (e.g., heart rate, blood pressure, etc.), or both. Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity, as inferred from these properties. In addition, the illustrative embodiment enables the authentication challenge type to be tailored to particular environmental conditions (e.g., noisy environments, dark environments, etc.).
Abstract:
A geo-spatial grammar comprises rules, syntax, and other means by which a data input is determined to have a meaning associated with a particular event. The event may then be provided to an application, such as a calendaring or messaging application. As a benefit, an input, such as a user speaking the phrase, “I'll be there in an hour,” may be interpreted, via the geo-spatial grammar, as an event (e.g., “I'll be in the office,” “I'll join you for dinner,” “I'll be home,” etc.). An application may then perform an action based upon the event (e.g., reschedule the meeting that starts in five minutes, present directions to the restaurant on the user's car's navigation system, notify the user's spouse, etc.).
Abstract:
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.
Abstract:
A geo-spatial grammar comprises rules, syntax, and other means by which a data input is determined to have a meaning associated with a particular event. The event may then be provided to an application, such as a calendaring or messaging application. As a benefit, an input, such as a user speaking the phrase, “I'll be there in an hour,” may be interpreted, via the geo-spatial grammar, as an event (e.g., “I'll be in the office,” “I'll join you for dinner,” “I'll be home,” etc.). An application may then perform an action based upon the event (e.g., reschedule the meeting that starts in five minutes, present directions to the restaurant on the user's car's navigation system, notify the user's spouse, etc.).
Abstract:
Methods and apparatus are disclosed for authenticating a user based on the geo-location history of a geo-location-enabled wireless device (e.g., a GPS-enabled wireless telecommunications terminal, a smart card, an RFID tag, etc.). In a first illustrative embodiment, a user of a geo-location-enabled wireless telecommunications terminal (e.g., a GPS-enabled cell phone, a GPS-enabled notebook computer, etc.) who attempts to access a restricted resource is challenged with one or more questions that are generated from the terminal's geo-location history. In a second illustrative embodiment, a user of a data-processing system who attempts to access a restricted resource is asked to provide a username Z. The user is then challenged with one or more questions that are generated from the geo-location history of a wireless device that is associated with username Z (e.g., a cell phone that belongs to the user whose username is Z, etc.).