USER AUTHENTICATION
    4.
    发明申请
    USER AUTHENTICATION 审中-公开

    公开(公告)号:US20190220592A1

    公开(公告)日:2019-07-18

    申请号:US16329467

    申请日:2016-09-09

    Abstract: Examples associated with user authentication are described. One example method includes authenticating a user of a device using a static authentication technique. A behavior profile associated with the user is loaded. The behavior profile describes a pattern of device usage behavior by the user in a three-dimensional space over a time slice. The behavior profile also identifies distinctive user habits. Usage of the device is monitored, and a behavior similarity index is periodically updated. The behavior similarity index describes a similarity between the usage of the device and the pattern of device usage behavior. The behavior similarity index is weighted based on the distinctive user habits. Access to the device is restricted when the behavior similarity index reaches a predefined threshold.

    CAPACITIVE CODE COMPARING
    6.
    发明申请

    公开(公告)号:US20210240950A1

    公开(公告)日:2021-08-05

    申请号:US17052068

    申请日:2018-06-25

    Abstract: Apparatus, systems, articles of manufacture, and methods to facilitate capacitive code comparing are disclosed. An example apparatus includes a comparator to receive a first portion of a first input and a second portion of a second input, the comparator including a capacitor. The example apparatus further includes a peripheral determination circuit to cause the capacitor to couple the first portion to the second portion; in response to coupling the first portion to the second portion, ground the capacitor; sense a current discharged by the grounded capacitor; and determine a Hamming distance of the first input and the second input based on the sensed current discharged by the capacitor.

    User authentication
    10.
    发明授权

    公开(公告)号:US11151245B2

    公开(公告)日:2021-10-19

    申请号:US16329467

    申请日:2016-09-09

    Abstract: Examples associated with user authentication are described. One example method includes authenticating a user of a device using a static authentication technique. A behavior profile associated with the user is loaded. The behavior profile describes a pattern of device usage behavior by the user in a three-dimensional space over a time slice. The behavior profile also identifies distinctive user habits. Usage of the device is monitored, and a behavior similarity index is periodically updated. The behavior similarity index describes a similarity between the usage of the device and the pattern of device usage behavior. The behavior similarity index is weighted based on the distinctive user habits. Access to the device is restricted when the behavior similarity index reaches a predefined threshold.

Patent Agency Ranking