Movatterモバイル変換


[0]ホーム

URL:


US20170180363A1 - User profile selection using contextual authentication - Google Patents

User profile selection using contextual authentication
Download PDF

Info

Publication number
US20170180363A1
US20170180363A1US15/449,568US201715449568AUS2017180363A1US 20170180363 A1US20170180363 A1US 20170180363A1US 201715449568 AUS201715449568 AUS 201715449568AUS 2017180363 A1US2017180363 A1US 2017180363A1
Authority
US
United States
Prior art keywords
computing device
user
user profile
biometric
profile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/449,568
Inventor
Ned M. Smith
Hannah L. Scurfield
Nathan Heldt-Sheller
Micah J. Sheller
Nathaniel J. Goss
Kevin C. Wells
Sindhu Pandian
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel CorpfiledCriticalIntel Corp
Priority to US15/449,568priorityCriticalpatent/US20170180363A1/en
Publication of US20170180363A1publicationCriticalpatent/US20170180363A1/en
Priority to US15/812,956prioritypatent/US20180069855A1/en
Priority to US15/813,823prioritypatent/US20180103034A1/en
Priority to US15/813,789prioritypatent/US20180077154A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with user profile selection using contextual authentication. In various embodiments, a first user of a computing device may be authenticated and have an access control state corresponding to a first user profile established, the computing device may select a second user profile based at least in part a changed user characteristic, and the computing device may present a resource based at least in part on the second user profile. In various embodiments, the computing device may include a sensor and a user profile may be selected based at least in part on an output of the sensor and a previously stored template generated by a machine learning classifier.

Description

Claims (24)

What is claimed is:
1. A computing device comprising:
one or more processors;
a memory coupled with the one or more processors;
a login module operated by the one or more processors to authenticate a first user of the device and establish a first access control state corresponding to a first user profile associated with the first user;
a contextual authentication module operated by the one or more processors to select a second user profile based at least in part on a changed user characteristic; and
a presentation module operated by the one or more processors to present a resource based at least in part on the second user profile.
2. The computing device ofclaim 1, wherein the computing device further comprises a sensor, and wherein the contextual authentication module comprises:
a profile selection module operated by the one or more processors to select the second user profile based at least in part on an output of the sensor and a previously stored template generated by a machine learning classifier.
3. The computing device ofclaim 2, wherein the sensor is a motion sensor and wherein the profile selection module comprises a biometric machine learning classifier, wherein the profile selection module is to perform a biometric information classification of the output of the sensor and select the second user profile based at least in part on the biometric information classification and the previously stored template.
4. The computing device ofclaim 1, wherein the login module is to authenticate the first user of the device based at least in part on an active authentication factor.
5. The computing device ofclaim 1, wherein the computing device further comprises:
an access control module operated by the one or more processors to establish a second access control state based at least in part on the second user profile; and
a user proximity module operated by the one or more processors to determine a proximity status associated with the first user , wherein the access control module is operated by the one or more processors to terminate the second access control state if the proximity status reaches a predetermined value.
6. The computing device ofclaim 1, further comprising a trusted execution environment operated by one of the processors to host operation of the contextual authentication module.
7. The computing device ofclaim 1, wherein the contextual authentication module is operated by the one or more processor to select a delegate profile as the second user profile.
8. The computing device ofclaim 1, wherein the computing device is a tablet computing device, wherein the contextual authentication module comprises a profile selection module operated by the one or more processors in a trusted execution environment to select a second user profile based at least in part on a previously stored template generated by a machine learning classifier.
9. A computer implemented method comprising:
authenticating, by a computing device, a first user of the device;
establishing, by the computing device, a first access control state corresponding to a first user profile associated with the first user;
selecting, by the computing device, a second user profile based at least in part on a changed user characteristic; and
presenting, by the computing device, a resource based at least in part on the second user profile.
10. The method according toclaim 9, wherein selecting, by the computing device, the second user profile comprises:
receiving, by the computing device, a sensor output;
performing a classification of the sensor output to generate sample data; and
selecting, by the computing device, the second user profile based at least in part on the sample data and a previously stored template generated by a machine learning classifier.
11. The method according toclaim 10, wherein receiving comprises receiving a sensor output from a motion sensor, wherein performing comprises performing a biometric classification of the motion sensor output to generate biometric sample data, and wherein selecting comprises selecting the second user profile based at least in part on the biometric sample data and a previously stored biometric template generated by a biometric machine learning classifier.
12. The method according toclaim 9, wherein authenticating, by the computing device, the first user of the device is based at least in part on an active authentication factor.
13. The method according toclaim 9, further comprising:
establishing, by the computing device, a second access control state based at least in part on the second user profile;
determining, by the computing device, a proximity status associated with the first user; and
terminating, by the computing device, the second access control state if the proximity status reaches a predetermined value.
14. The method according toclaim 9, wherein selecting, by the computing device, the second user profile based at least in part on the changed user characteristic is performed in a trusted execution environment.
15. The method according toclaim 9, wherein the second user profile is a delegate profile.
16. The method according toclaim 9, wherein the computing device is a tablet computing device, wherein selecting, by the computing device, the second user profile based at least in part on the changed user characteristic comprises selecting in a trusted execution environment, by the computing device, a second user profile based at least in part on a previously stored template generated by a machine learning classifier.
17. At least one non-transitory computer-readable medium comprising instructions stored thereon that, in response to execution of the instructions by a computing device, cause the computing device to:
authenticate a first user of the device;
establish a first access control state corresponding to a first user profile associated with the first user;
select a second user profile based at least in part on a changed user characteristic; and
present a resource based at least in part on the second user profile.
18. The at least one non-transitory computer-readable medium ofclaim 17, wherein to select the second user profile, the computing device is caused to:
perform a classification of a sensor output to generate sample data; and
select a second user profile based at least in part on the sample data and a previously stored template generated by a machine learning classifier.
19. The at least one non-transitory computer-readable medium ofclaim 18, wherein the computing device is caused to perform a biometric classification of a motion sensor output to generate biometric sample data and wherein the computing device is caused to select the second user profile based at least in part on the biometric sample data and a previously stored biometric template generated by a biometric machine learning classifier.
20. The at least one non-transitory computer-readable medium ofclaim 17, wherein the computing device is caused to authenticate the first user of the device based at least in part on an active authentication factor.
21. The at least one non-transitory computer-readable medium ofclaim 17, wherein the computing device is further caused to:
establish a second access control state based at least in part on the second user profile;
determine a proximity status associated with the first user; and
terminate the second access control state if the proximity status reaches a predetermined value.
22. The at least one non-transitory computer-readable medium ofclaim 17, wherein the computing device is further caused to select the second user profile in a trusted execution environment.
23. The at least one non-transitory computer-readable medium ofclaim 17, wherein the computing device is further caused to select a delegate profile as the second user profile.
24. The at least one non-transitory computer-readable medium ofclaim 17, wherein the computing device is a tablet computing device, wherein the tablet computing device is caused to select the second user profile in a trusted execution environment of the tablet computing device based at least in part on a previously stored template generated by a machine learning classifier.
US15/449,5682014-12-232017-03-03User profile selection using contextual authenticationAbandonedUS20170180363A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US15/449,568US20170180363A1 (en)2014-12-232017-03-03User profile selection using contextual authentication
US15/812,956US20180069855A1 (en)2014-12-232017-11-14User profile selection using contextual authentication
US15/813,823US20180103034A1 (en)2014-12-232017-11-15User profile selection using contextual authentication
US15/813,789US20180077154A1 (en)2014-12-232017-11-15User profile selection using contextual authentication

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US14/581,659US9628477B2 (en)2014-12-232014-12-23User profile selection using contextual authentication
US15/449,568US20170180363A1 (en)2014-12-232017-03-03User profile selection using contextual authentication

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/581,659ContinuationUS9628477B2 (en)2014-12-232014-12-23User profile selection using contextual authentication

Related Child Applications (3)

Application NumberTitlePriority DateFiling Date
US15/812,956ContinuationUS20180069855A1 (en)2014-12-232017-11-14User profile selection using contextual authentication
US15/813,789ContinuationUS20180077154A1 (en)2014-12-232017-11-15User profile selection using contextual authentication
US15/813,823ContinuationUS20180103034A1 (en)2014-12-232017-11-15User profile selection using contextual authentication

Publications (1)

Publication NumberPublication Date
US20170180363A1true US20170180363A1 (en)2017-06-22

Family

ID=56130849

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US14/581,659ActiveUS9628477B2 (en)2014-12-232014-12-23User profile selection using contextual authentication
US15/449,568AbandonedUS20170180363A1 (en)2014-12-232017-03-03User profile selection using contextual authentication
US15/812,956AbandonedUS20180069855A1 (en)2014-12-232017-11-14User profile selection using contextual authentication
US15/813,823AbandonedUS20180103034A1 (en)2014-12-232017-11-15User profile selection using contextual authentication
US15/813,789AbandonedUS20180077154A1 (en)2014-12-232017-11-15User profile selection using contextual authentication

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/581,659ActiveUS9628477B2 (en)2014-12-232014-12-23User profile selection using contextual authentication

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US15/812,956AbandonedUS20180069855A1 (en)2014-12-232017-11-14User profile selection using contextual authentication
US15/813,823AbandonedUS20180103034A1 (en)2014-12-232017-11-15User profile selection using contextual authentication
US15/813,789AbandonedUS20180077154A1 (en)2014-12-232017-11-15User profile selection using contextual authentication

Country Status (1)

CountryLink
US (5)US9628477B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20210056226A1 (en)*2019-08-232021-02-25Microsoft Technology Licensing, LlcSecure and private hyper-personalization system and method
US11526745B2 (en)2018-02-082022-12-13Intel CorporationMethods and apparatus for federated training of a neural network using trusted edge devices
US11556730B2 (en)2018-03-302023-01-17Intel CorporationMethods and apparatus for distributed use of a machine learning model
US11985132B2 (en)2018-05-022024-05-14Samsung Electronics Co., Ltd.System and method for resource access authentication
US12111895B2 (en)2020-07-092024-10-08Veracity, Inc.Group-based authentication technique

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9888119B2 (en)2014-03-052018-02-06Cisco Technology, Inc.Contacts service for call center
US9754093B2 (en)*2014-08-282017-09-05Ncr CorporationMethods and a system for automated authentication confidence
US9628477B2 (en)*2014-12-232017-04-18Intel CorporationUser profile selection using contextual authentication
US10757216B1 (en)2015-02-202020-08-25Amazon Technologies, Inc.Group profiles for group item recommendations
US11363460B1 (en)2015-03-032022-06-14Amazon Technologies, Inc.Device-based identification for automated user detection
US10078803B2 (en)*2015-06-152018-09-18Google LlcScreen-analysis based device security
US10095746B2 (en)*2015-12-032018-10-09At&T Intellectual Property I, L.P.Contextual ownership
US20170227995A1 (en)*2016-02-092017-08-10The Trustees Of Princeton UniversityMethod and system for implicit authentication
US10016896B2 (en)*2016-06-302018-07-10Brain CorporationSystems and methods for robotic behavior around moving bodies
CA2972732A1 (en)*2016-07-072018-01-07David FranklinGesture-based user interface
US10274325B2 (en)2016-11-012019-04-30Brain CorporationSystems and methods for robotic mapping
US10001780B2 (en)2016-11-022018-06-19Brain CorporationSystems and methods for dynamic route planning in autonomous navigation
MY195303A (en)*2016-11-102023-01-12Eyeverify IncVerified and Private Portable Indentity
US10723018B2 (en)2016-11-282020-07-28Brain CorporationSystems and methods for remote operating and/or monitoring of a robot
US10885188B1 (en)*2016-12-302021-01-05Comodo Security Solutions, Inc.Reducing false positive rate of statistical malware detection systems
US10852730B2 (en)2017-02-082020-12-01Brain CorporationSystems and methods for robotic mobile platforms
JP2018136625A (en)*2017-02-202018-08-30Kddi株式会社 Identification device, identification method, and identification program
US10366347B2 (en)2017-06-022019-07-30At&T Intellectual Property I, L.P.Methods, systems and devices for monitoring and controlling media content using machine learning
US11030603B1 (en)2017-06-262021-06-08Wells Fargo Bank, N.A.Systems and methods for distinguishing between profiles in a passive authentication scheme
GB201802615D0 (en)*2018-02-182018-04-04Esc Digital Media LtdInteractive mirror
DE102018214632A1 (en)*2018-08-292020-03-05Ford Global Technologies, Llc Computer-implemented identification procedure
US11151254B2 (en)*2018-09-112021-10-19Amari.Ai IncorporatedSecure communications gateway for trusted execution and secure communications
US12125054B2 (en)2018-09-252024-10-22Valideck International CorporationSystem, devices, and methods for acquiring and verifying online information
KR102758937B1 (en)*2019-02-182025-01-23삼성전자주식회사Electronic device for authenticating biometric information and operating method thereof
EP3935528A1 (en)2019-03-072022-01-12British Telecommunications public limited companyAccess control classifier training
EP3935526A1 (en)2019-03-072022-01-12British Telecommunications public limited companyMulti-level classifier based access control
US10863219B2 (en)*2019-03-262020-12-08Rovi Guides, Inc.Systems and methods for identifying unknown users of a device to provide personalized user profiles
US11556628B2 (en)*2019-04-302023-01-17International Business Machines CorporationMultidimensional attribute authentication
US10652238B1 (en)*2019-06-102020-05-12Capital One Services, LlcSystems and methods for automatically performing secondary authentication of primary authentication credentials
US11372474B2 (en)*2019-07-032022-06-28Saec/Kinetic Vision, Inc.Systems and methods for virtual artificial intelligence development and testing
EP3999980A1 (en)2019-07-162022-05-25British Telecommunications public limited companyUser authentication based on behavioural biometrics
WO2021018468A1 (en)2019-07-302021-02-04British Telecommunications Public Limited CompanyDuct blockage risk location prediction
GB2586149A (en)*2019-08-072021-02-10British TelecommBehavioural blometric control policy application
US12425193B2 (en)2019-09-122025-09-23British Telecommunications Public Limited CompanyResource access control
US11392707B2 (en)2020-04-152022-07-19Capital One Services, LlcSystems and methods for mediating permissions
US11195170B1 (en)*2021-05-312021-12-07BehavioSec IncMethod and a system for creating a behavioral user profile
US20230052407A1 (en)*2021-08-122023-02-16Mastercard Technologies Canada ULCSystems and methods for continuous user authentication
US20230095816A1 (en)*2021-09-242023-03-30Apple Inc.Adaptive user enrollment for electronic devices
US12141316B2 (en)2021-10-112024-11-12International Business Machines CorporationObfuscation of sensitive information through non-visual feedback

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070005988A1 (en)*2005-06-292007-01-04Microsoft CorporationMultimodal authentication
US20070280225A1 (en)*2006-05-312007-12-06Microsoft CorporationExtended services and recommendations
US20080189360A1 (en)*2007-02-062008-08-075O9, Inc. A Delaware CorporationContextual data communication platform
US20120204257A1 (en)*2006-04-102012-08-09International Business Machines CorporationDetecting fraud using touchscreen interaction behavior
US20120323717A1 (en)*2011-06-162012-12-20OneID, Inc.Method and system for determining authentication levels in transactions
US20140096215A1 (en)*2012-09-282014-04-03Christian J. HesslerMethod for mobile security context authentication
US20140282877A1 (en)*2013-03-132014-09-18Lookout, Inc.System and method for changing security behavior of a device based on proximity to another device
US20150033305A1 (en)*2013-03-152015-01-29Advanced Elemental Technologies, Inc.Methods and systems for secure and reliable identity-based computing
US20150286813A1 (en)*2014-04-042015-10-08Qualcomm IncorporatedMethod and apparatus that facilitates a wearable identity manager
US20160182502A1 (en)*2014-12-232016-06-23Ned M. SmithUser profile selection using contextual authentication

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9003488B2 (en)*2007-06-062015-04-07Datavalet TechnologiesSystem and method for remote device recognition at public hotspots
US20100281427A1 (en)*2009-04-302010-11-04Riddhiman GhoshSelecting one of plural user profile personae based on context
US9160730B2 (en)2013-03-152015-10-13Intel CorporationContinuous authentication confidence module
JP6186080B2 (en)*2013-05-292017-08-23ヒューレット パッカード エンタープライズ デベロップメント エル ピーHewlett Packard Enterprise Development LP Passive application security
US9411780B1 (en)*2013-06-032016-08-09Amazon Technologies, Inc.Employing device sensor data to determine user characteristics
US9100392B2 (en)*2013-09-202015-08-04Verizon Patent And Licensing Inc.Method and apparatus for providing user authentication and identification based on a one-time password
US9747428B2 (en)*2014-01-302017-08-29Qualcomm IncorporatedDynamic keyboard and touchscreen biometrics
US9992207B2 (en)*2014-09-232018-06-05Qualcomm IncorporatedScalable authentication process selection based upon sensor inputs
US9684775B2 (en)*2014-10-152017-06-20Qualcomm IncorporatedMethods and systems for using behavioral analysis towards efficient continuous authentication

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070005988A1 (en)*2005-06-292007-01-04Microsoft CorporationMultimodal authentication
US8079079B2 (en)*2005-06-292011-12-13Microsoft CorporationMultimodal authentication
US20120204257A1 (en)*2006-04-102012-08-09International Business Machines CorporationDetecting fraud using touchscreen interaction behavior
US20070280225A1 (en)*2006-05-312007-12-06Microsoft CorporationExtended services and recommendations
US20080189360A1 (en)*2007-02-062008-08-075O9, Inc. A Delaware CorporationContextual data communication platform
US20120323717A1 (en)*2011-06-162012-12-20OneID, Inc.Method and system for determining authentication levels in transactions
US20140096215A1 (en)*2012-09-282014-04-03Christian J. HesslerMethod for mobile security context authentication
US20140282877A1 (en)*2013-03-132014-09-18Lookout, Inc.System and method for changing security behavior of a device based on proximity to another device
US20150033305A1 (en)*2013-03-152015-01-29Advanced Elemental Technologies, Inc.Methods and systems for secure and reliable identity-based computing
US20150286813A1 (en)*2014-04-042015-10-08Qualcomm IncorporatedMethod and apparatus that facilitates a wearable identity manager
US20160182502A1 (en)*2014-12-232016-06-23Ned M. SmithUser profile selection using contextual authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Susan Gauch; personalized based on user search history; IEEE:2005; page: 1-7*

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11526745B2 (en)2018-02-082022-12-13Intel CorporationMethods and apparatus for federated training of a neural network using trusted edge devices
US11556730B2 (en)2018-03-302023-01-17Intel CorporationMethods and apparatus for distributed use of a machine learning model
US12169584B2 (en)2018-03-302024-12-17Intel CorporationMethods and apparatus for distributed use of a machine learning model
US11985132B2 (en)2018-05-022024-05-14Samsung Electronics Co., Ltd.System and method for resource access authentication
US20210056226A1 (en)*2019-08-232021-02-25Microsoft Technology Licensing, LlcSecure and private hyper-personalization system and method
WO2021040840A1 (en)*2019-08-232021-03-04Microsoft Technology Licensing, LlcSecure and private hyper-personalization system and method
CN114270316A (en)*2019-08-232022-04-01微软技术许可有限责任公司Secure and private super-personalization system and method
US11568081B2 (en)*2019-08-232023-01-31Microsoft Technology Licensing, LlcSecure and private hyper-personalization system and method
US20230169209A1 (en)*2019-08-232023-06-01Microsoft Technology Licensing, LlcSecure and private hyper-personalization system and method
EP4478234A3 (en)*2019-08-232024-12-25Microsoft Technology Licensing, LLCSecure and private hyper-personalization system and method
US12353595B2 (en)*2019-08-232025-07-08Microsoft Technology Licensing, LlcSecure and private hyper-personalization system and method
US12111895B2 (en)2020-07-092024-10-08Veracity, Inc.Group-based authentication technique

Also Published As

Publication numberPublication date
US20180077154A1 (en)2018-03-15
US20180069855A1 (en)2018-03-08
US20160182502A1 (en)2016-06-23
US20180103034A1 (en)2018-04-12
US9628477B2 (en)2017-04-18

Similar Documents

PublicationPublication DateTitle
US9628477B2 (en)User profile selection using contextual authentication
US20220103432A1 (en)Systems and methods for workspace continuity and remediation
US11487881B2 (en)Systems and methods for endpoint context-driven, dynamic workspaces
US11316902B2 (en)Systems and methods for securing a dynamic workspace in an enterprise productivity ecosystem
US10938743B1 (en)Systems and methods for continuous evaluation of workspace definitions using endpoint context
US12105609B2 (en)Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem
TWI793667B (en)Creating and handling workspace indicators of compromise (ioc) based upon configuration drift
US11537694B2 (en)Motion-based challenge-response authentication mechanism
US20120167170A1 (en)Method and apparatus for providing passive user identification
TWI811734B (en)Trusted local orchestration of workspaces
US20210133298A1 (en)Systems and methods for dynamic workspace targeting with crowdsourced user context
US20220198043A1 (en)Systems and methods for securely deploying a collective workspace across multiple local management agents
US11941631B2 (en)Trust platform
US12405839B2 (en)Migration of workloads across cloud services based upon endpoint performance
US20230153150A1 (en)Systems and methods for migrating users and modifying workspace definitions of persona groups
US12141625B2 (en)Intelligent selection of optimization methods in heterogeneous environments
US11595322B2 (en)Systems and methods for performing self-contained posture assessment from within a protected portable-code workspace
US10341858B1 (en)Systems and methods for obscuring user location
US20230195904A1 (en)Architecture swapping for workspaces
US20220376902A1 (en)Resource access control
US20250291885A1 (en)Systems and methods for providing multifactor authentication for immersive environments
US20250245585A1 (en)Predictive workspace orchestration
US20250301019A1 (en)Workspace orchestration based on contributor scores
US20250254040A1 (en)Workspace orchestration with ephemeral hardware attestation
US20250245355A1 (en)Third-pary evaluation of workspace orchestration services

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp