Device, system, and method of user authentication based on user-specific characteristics of task performance

Information

  • Patent Grant
  • 11223619
  • Patent Number
    11,223,619
  • Date Filed
    Thursday, October 10, 2019
    4 years ago
  • Date Issued
    Tuesday, January 11, 2022
    2 years ago
Abstract
Devices, systems, and methods of detecting user identity, authenticating a user to a computerized service or to an electronic device, differentiating between users of a computerized service, and detecting possible attackers or possible fraudulent transactions. A method includes: generating a user authentication session that requires a user to enter a secret by performing a task; monitoring the user interactions during task performance; extracting a user-specific behavioral characteristic, and utilizing it as a factor in user authentication. The task requires the user to perform on-screen operations via a touch-screen or touchpad or mouse or other input unit of the electronic device, or to move in space or tilt in space the entirety of the electronic device in a way that causes inputting of the secret data-item.
Description
FIELD

The present invention is related to the security of electronic devices and systems.


BACKGROUND

Millions of people utilize mobile and non-mobile electronic devices, such as smartphones, tablets, laptop computers and desktop computers, in order to perform various activities. Such activities may include, for example, browsing the Internet, sending and receiving electronic mail (email) messages, taking photographs and videos, engaging in a video conference or a chat session, playing games, or the like.


Some activities may be privileged, or may require authentication of the user in order to ensure that only an authorized user engages in the activity. For example, a user may be required to enter a username and a password in order to access an email account, or in order to access an online banking interface or website.


SUMMARY

The present invention may include, for example, systems, devices, and methods for detecting identity of a user of an electronic device, for determining whether or not an electronic device is being used by a fraudulent user, and/or for differentiating between users of a computerized service or between users of an electronic device. For example, the present invention may provide device, system, and method of password-less user authentication and/or password-less detection of user identity, which may be based on unique user-specific biometric traits and/or behavioral traits; wherein the user-specific traits may be replaceable or changeable in certain circumstances (e.g., in contrast with human fingerprints, which belong to a person for his entire lifetime and cannot be changed or replaced).


The present invention provides devices, systems, and methods of password-less user authentication, and password-less detection of user identity. For example, a system or a computing device requires a user to perform a particular unique non-user-defined task, the task optionally being an on-screen connect-the-dots task or trace-a-pattern task. The system monitors user interactions, extracts user-specific features that characterizes the manner in which the user performs the tasks; and subsequently relies on such user-specific features as a means for user authentication, optionally without utilizing a password or passphrase. Optionally, a user interface anomaly or interference is intentionally introduced in order to elicit the user to perform corrective gestures, which are optionally used for extraction of additional user-specific features.


Some embodiments may include devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The methods may include, for example: monitoring of user-side input-unit interactions, in general and/or in response to an intentional interference (e.g., input unit interference, output unit interference, on-screen interference, combined input-output interference) which may be intentionally introduced or injected or added to user-interface elements or to a flor of utilizing an application or website or electronic service. The monitored interactions (e.g., monitored gestures that the user makes, mouse movements, mouse clicks, touch-screen gesture, or the like) and/or their characteristics or attributes (e.g., velocity, acceleration, deceleration, accuracy, inaccuracy, timing, time gaps, smoothness, or the like) may be used for verifying identity of a user, or for differentiating or distinguishing between or among users, or for detecting a fraudulent human user or attacker or imposter, or for detecting a “bot” or automated script or robotic user or emulated user or simulated user or machine-based non-human user.


The present invention may provide other and/or additional benefits or advantages.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic block-diagram illustration of a system, in accordance with some demonstrative embodiments of the present invention;



FIG. 2 is a schematic block-diagram illustration of password-less log-in sub-system, in accordance with some demonstrative embodiment of the present invention;



FIG. 3 is a schematic illustration of a touch-screen demonstrating an on-screen task for user authentication, in accordance with some embodiments of the present invention.





DETAILED DESCRIPTION OF THE PRESENT INVENTION

Reference is made to FIG. 1, which is a schematic block-diagram illustration of a system 100 in accordance with some demonstrative embodiments of the present invention. The components of system 100 may be implemented by using suitable hardware units and/or software units; and may be co-located within a single computer device or a single computing system, or may be scattered or distributed across two or more computing devices and/or computing systems. In some embodiments, client-server architecture may be used; such that some of the components and units may be implemented locally at the end-user device, whereas other components and units may be implemented remotely or by using a remote server or a “cloud computing” server or repository or computer. In some embodiments, some modules and functionality may be implemented by utilizing a web-browser, a plug-in or extension or add-on to a web-browser or to an Operating System (OS), by using a native application or a mobile-web application, by using JavaScript and/or CSS and/or HTML5, and/or by using other suitable technologies. Components of system 100 may interact or communicate over one or more wireless communication links, wired communication links, cellular communication, client/server communication, peer-to-peer communication, or the like.


System 100 may enable an end-user device 101 to interact with a computerized service 102. The end-user device 101 may be, for example, a smartphone, a tablet, a laptop computer, a notebook computer, a desktop computer, a cellular phone, a smart-watch (e.g., Apple iWatch), a fitness bracelet (e.g., similar to FitBit or JawBone wearable devices), a wearable device, a portable device, an Augmented Reality (AR) device or glasses or helmet or headgear (e.g., similar to Google Glass), a Virtual Reality (VR) device or glasses or helmet or headgear (e.g., similar to Oculus Rift), or the like. In some embodiments, the end-use device 101 may be a stand-alone machine or interface; a digital kiosk or kiosk-type machine, a vending machine, an Automated Teller Machine (ATM), a point-of-sale (POS) terminal or machine, or the like. In some embodiments, the end-user device 101 may be a point-of-entry terminal, or a user-identification terminal, such as a terminal or scanner or dashboard or touch-screen which may be used for secure physical entry or entrance or passage through a gate or door or lobby or turnstiles or room or corridor, or as part of (or replacement of) a physical entry monitoring system. In yet other embodiments, the end-user device 101 may be or may comprise, or may be comprised in, a vehicle, a vehicular device, a dashboard, a vehicular dashboard, a vehicular computing system, a vehicular computing device, a vehicular ignition unit or system, a vehicular component that is operable in conjunction with a vehicular ignition system, a vehicular immobilizer unit, a vehicular component that is operable in conjunction with a vehicular immobilizer unit, or the like.


The computerized service 102 may be a local and/or a remote computerized platform or service or application or web-site or web-page. The computerized service may be installed locally and entirely on the end-user device 101; or may be installed remotely and entirely on a remote server or a remote computer which is then accessed by the end-user device 101 either via one or more wired and/or wireless communication link(s); or may be a hybrid implementation which utilizes one or more remote components (e.g., a remote Application Server) and one or more local components (e.g., a local native application; a local mobile-web application; a local web-browser).


Some demonstrative and non-limiting examples, of suitable computerizes service(s) which may be used in conjunction with the present invention, may include: banking service, online banking services, retail banking services (e.g., performed within or at an ATM or a branch of a bank); brokerage or online brokerage services; usage and/or access to electronic mail, email, SMS accounts, instant messaging (IM) accounts and services, social networks; an enterprise network or corporate network or organizational network which is available only to employees or authorized users of an organization or enterprise; a members-only network or service, or a paying-members-only service or network, or a premium service, which are available only to certain users and/or to members and/or to paying users; applications and/or websites and/or services that enable or perform payment, electronic payment, utilization of credit card and/or debit card and/or wire transfer and/or electronic funds transfer; applications that access or utilize a secure database storing confidential or non-public information; and/or any suitable electronic service which may be accessed locally and/or remotely by end-user device 101.


In some embodiments, the computerized service 102 need not be external to the end-use device 101, and may be entirely internal to the end-user device 101, or may be the end-user device 101, or may be a particular functionality or a general functionality of the end-user device 101. For example, the end-user device may be a smartphone or tablet; and the computerized service 102 may be one or more features or functionalities or applications of that smartphone or tablets. In some embodiments, the present invention may be used as part of a locking or unlocking mechanism of a smartphone or tablet or other end-user device 101; or as part of a process in which a user unlocks or “wakes up” a hibernating device, or takes the device from reduced-power mode (or from “sleep mode”) to fully-operational mode.


End-user device comprises an input unit 111, for example, mouse, keyboard, stylus, touch-screen, multi-touch-screen, trackball, joystick, or the like. End-user device further comprises an output unit 112, for example, monitor, screen, touch-screen, multi-touch-screen, or the like. In some embodiments, the input unit and the output unit may be implemented as the same single unit, for example, as a touch-screen or multi-touch screen.


A user interactions monitoring/sampling module 113 may monitor some or all of the user interactions and/or user gestures; and may record, capture, or otherwise sample such interactions and/or gestures. Optionally, an interactions database 114 may log and/or may store data reflecting the monitored user interactions, for a single user or for multiple users.


User-specific features extractor 115 may extract or estimate user-specific features or traits or characteristics or attributes, that characterize an interaction (or a set or batch or group or flow of interactions, or a session of interactions) of a user with the computerized service 102. Optionally, an extracted features database 116 may store data or records which reflects users and their respective values of extracted (or estimated) user-specific features.


Optionally, a comparator/matching module 117 may compare or match, between (or among): (a) values of user-specific features that are extracted in a current user session (or user interaction), and (b) values of respective previously-captured or previously-extracted user-specific features (of the current user, and/or of other users, and/or of pre-defined sets of values that correspond to known automated scripts or “bots” or known attackers).


The user-specific features, whose values may be compared or matched across usage-sessions, may include, for example, curvature (or curvature radius) of mouse movement or mouse strokes; acceleration and/or speed of mouse movement in one or more directions; smoothness of movement; velocity or speed of gestures; acceleration or deceleration of gestures; rate or frequency of mouse clicks; accuracy or inaccuracy of gestures or clicks, or their relative location (e.g., whether the user typically clicks correctly an on-screen button, or sometimes misses the button and clicks nearby); the particular type of manner that the user chose to convey input (e.g., whether the user clicked on “submit” button, or pressed the “enter” key; or, whether the use moved between form fields by using the “tab” key or by using the mouse cursor); and/or other suitable features, for example: device movements or input-unit movement during interaction, movement and/or orientation and/or acceleration of the entire device (e.g., a smartphone or tablet) during the interaction, whether one single finger or multiple particular fingers are used for interacting, the relations between fingers while interacting, the relation to other body parts while interacting, and/or other suitable gesture parameters. Optionally a deep learning algorithm and/or a machine learning algorithm or other suitable Artificial Intelligence (A.I.) algorithm may be utilized, in order to learn and to define a user-specific profile based on the data that is monitored or produced during the interaction (and optionally, immediately prior to the interaction and/or immediately after the interaction); optionally, without necessarily using any specific pre-define features or characteristics or features, and optionally using a heuristic approach or holistic approach or “fuzzy logic” algorithm that attempts to find a unique identifier or a unique digital footprint without necessarily being tied to a specific biometric parameter or to a set of pre-defined biometric parameters. Some embodiments may thus generate a user-specific biometric profile or biometric signature, without pre-defining a set of biometric characteristics or parameters that are then used to calculate the signature or profile; but rather, by utilizing deep learning which utilizes mathematical generation of a unique profile or signature without necessarily defining or pre-defining the set of physical parameters that would be used for differentiating among users.


Optionally, an interference injector 118 may operate to introduce, add, inject, generate and/or otherwise cause an interference (or anomaly, or aberration, or inconsistency, or deviation) to the input and/or the output as they are reflected to the user who utilizes the end-user device. Such intentionally-introduced input/output interference may be, for example: temporarily hiding or removing the on-screen mouse-pointer or on-screen pointer, in order to elicit the user to react and to make gestures in an attempt to revive the hidden on-screen pointer; intentional deviations or “jumps” in the movement of the on-screen pointer, relative to the actual manual gesture that is performed by the human user (e.g., the human user drags the mouse eastbound, but the on-screen pointer deviates and moves north-east, thereby eliciting a corrective movement or corrective gestures by the user); intentionally moving or re-locating an on-screen interface component (e.g., a “submit” button or a “next” button) while the user is dragging an on-screen pointer; and/or other suitable interferences or anomalies, whose goal is to elicit the user to react and/or to perform corrective steps or corrective gestures; thereby enabling the user-specific features extractor 115 to further extract user-specific attributes or features that characterizes such corrective gestures or such reactions to anomalies; e.g., the time period that it takes the user to notice the anomaly and/or to correct it; the manner in which the user corrects the anomaly (e.g., whether the user tries to locate a disappeared on-screen pointer, by shaking his mouse, or by moving the mouse sideways, or by moving the mouse clockwise, or by moving the mouse counter-clockwise, or by clicking the mouse-button once, or by clicking the mouse-button multiple times, or by typing on the keyboard.


In some embodiments, a corrective gestures analyzer unit 119 may monitor, track, analyze and/or characterize such corrective actions or gestures of the user in response to such interference. In some embodiments, a user reaction analyzer unit 120 may monitor, track, analyze and/or characterize such gestures or reactions of the user in response to such interference (which may not necessarily involve a corrective action). In some embodiments, these functionalities, of the corrective gestures analyzer unit 119 and/or the user reaction analyzer unit 120 may be part of the functionality of the user-specific features extractor 115.


It is noted that in some embodiments, interferences may be injected or used continuously; or may be used only in particular portions or regions of the computerized service (e.g., only on certain pages of a website, or only when certain functionalities of the application are requested, such as high-risk or higher-risk functions); or may be injected pseudo-randomly, or at pre-defined time intervals; or may be injected if one or more other conditions are true (e.g., if there are other indicators of fraudulent activity or irregular activity); or may not be injected at all, for a particular user or for a particular usage-session, or for all users or for a group of users. In some embodiments, optionally, an interference selector module 121 may select or may determine, based on one or more criteria or conditions, whether or not to introduce an interference, or whether (or when exactly, or where exactly) to trigger or to command the interference generator 118 to generate an interference; optionally by selecting a suitable interference from a pre-defined interferences pool 122. For example, the interference selection may be based on user characteristics, and/or based on attributes of the computerized service, and/or based on pseudo-random selection; or by selecting interferences of a type that was not yet used for a particular user, or conversely by selecting interferences of a type that had been already used for a particular user, or by taking into account the level of risk associated with a user-requested functionality of the computerizes service, or the like. The injection of interferences, and/or the analysis of user reactions to interference, and/or the analysis of corrective gestures, may be optional.


If the comparator/matching module 117 determines that one or more features, or a set of features, that characterize the current interaction session of the current user, does not match those features as extracted in previous interaction session(s) of that user, then, a possible-fraud signal may be generated or sent or transmitted to other units of system 100 and/or to pre-defined recipients.


For example, combined factors and data may be taken into account by a user identity determination module 131, which may determine or estimate whether or not the current user is a “fraudster” or an attacker or an imposter. The user identity determination module 131 may trigger or activate a fraud mitigation module 132 able to perform one or more fraud mitigating steps based on that determination or estimation; for example, by requiring the current user to respond to a challenge, to answer security question(s), to contact customer service by phone, to perform two-step authentication or two-factor authentication, or the like.


In accordance with the present invention, system 100 may comprise a password-less log-in sub-system 150 (or a password-less user-authentication sub-system or module) which may enable system 100 and/or computerized service 102 and/or end-user device 101 to perform user authentication, or to authenticate or verify or confirm the identity of a user of end-user device 101 (or of computerized service 102). In some embodiments, the password-less log-in sub-system 150 may continuously operate without requiring the end-user to define, to remember and/or to type a PIN or password or pass-phrase; or may operate such manual entry of PIN or password or pass-phrase may be required only initially but not subsequently and not continuously.


Reference is made to FIG. 2, which is a schematic block-diagram illustration of password-less log-in sub-system 150 and its associated components, in accordance with some demonstrative embodiment of the present invention.


Sub-system 150 may comprise a user authentication module 151 to enable authentication of a user of the end-user device 101 (e.g., towards the computerized service, or towards the end-user device 101 itself), without necessarily requiring the user to define and/or remember and/or type a secret, a password, a pass-phrase or a PIN, or any shape or form or picture or image or drawing that the user is required to remember in his memory and later to draw or to convey based on his memory. For example, the sub-system 150 may utilize a Task Generator 152 to generate a task (e.g., an on-screen “connect the dots” task, or “trace a route” task), which requests the user of the end-user device 101 to perform a particular task, by utilizing an input unit (e.g., mouse, touch-pad, touch-screen) of the end-user device 101; and may monitor and track the precise manner (e.g., gestures, interactions, device movements during the interaction and any other type of data that the device's sensors collect or produce during the interaction, and/or immediately prior to the interaction, and/or immediately after the interaction; including, but not limited to, data collected by or monitored by an accelerometer, a gyroscope, an orientation sensor, or the like) in which the user performs the requested task; and may analyze the monitored interactions to extract from them user-specific characteristics or user-specific features or user-specific profile; which in turn may be used as user-identifying profile, instead of a password or in addition to a password. The present invention may thus comprise and enable cognitive behavioral biometric profiling of a user, or of multiple users.


In a demonstrative example, end-user device 101 may comprise a touch-screen. Any user that attempts to log-in to the end-user device, or to an application in this device or to a service that this device controls or is associated with, may optionally be requested to enter a username; and then, may be required to perform an on-screen task, for example, using a finger to touch the screen and to follow a pattern or image or on-screen structure or on-screen animation that have particular locations and/or timing.


In a demonstrative example, for example, the touch-screen displays a first icon or character (“Dot 1”); the user touches that on-screen circle with his finger, and does not lift his finger from the touch-screen; the touch-screen displays a second icon or character (“Dot 2”); the user drags his finger on the touch-screen, from Dot 1 to Dot 2, and continues to keep his finger on the touch-screen at all times; the touch-screen then displays a third icon or character (“Dot 3”); the user then drags his finger on the touch-screen, from Dot 2 to Dot 3, and continues to keep his finger on the touch-screen at all times; the process repeats for a pre-defined number of icons or characters of “Dots”, for example, 7 or 10 such Dots, which have different on-screen locations. Optionally, the entire batch or series of Dots, if followed correctly, resembles a generally-recognizable image or pattern or shape, for example, a star, a heart, a square, a triangle, a rectangle, an oval, a circle, a polygon, a pentagon, a hexagon, a particular letter of the alphabet (e.g., the letter “U” or “P”), a particular digit or number (e.g., the number “5” or “9”), a particular character or symbol (e.g., the character “@” or the character “&”), a series of letters and/or digits and/or characters and/or symbols, a word, a phrase, or the like.


It is clarified that the Dots or character(s) mentioned above are only a non-limiting example; other on-screen indicators may be used, for example, starts, circles, light-bulbs, glowing circles, asterisks, rotating cylinders, infinity symbol, using two or three fingers to collapse together two or three (or multiple) dots, question marks, arrows, small images or animated items, or any other suitable on-screen indicators or items or objects.


In some embodiments, the entire batch or the pattern of multiple Dots, that is presented for a user gradually in a staggered manner on the screen and which requires the user to follow with his finger or fingers (on the touch-screen or touch-pad) or with his hand (on a mouse), may be different from user to use, or from usage-session to usage-session, or may have other particular attributes which may be unique or different.


In some embodiments, optionally, a Task Allocator 153 may ensure that each user or each usage-session, or each login attempt, or each end-user device, is assigned a different task or a different shape or pattern pf icons (e.g., a star; a heart; a circle); and/or a different types of connect-the-dots icons (e.g., using Dots or “X” characters or “O” characters, using on-screen asterisks, using on-screen arrows, using consecutive digits or numbers); and/or may utilize staggered exposure of the subsequent icon at different rate, frequency and/or timing, or different time-delay after the user reaches each dot along the pattern; different size or scale or dimensions (e.g., a small Heart that occupies ¼ of the entire screen; or a larger Heart that occupies ½ of the entire screen); a different rotation of the shape or pattern (e.g., a Heart pattern; or a Heart pattern facing sideways or rotated by 90 degrees; or an upside-down Heart pattern, or rotated by 180 degrees); or the like. Optionally, the Task Allocator 153 may operate in conjunction with a Pool of Tasks 154 from which a particular task may be selected; and/or in conjunction with a real-time task constructor 155 which may assist the Task Generator 151 to construct on-the-fly a new task based on one or more Task Attributes selected from a Task Attributes Pool 156. Optionally, an Assigned Tasks database 157 may log and store data indicating which tasks have already been used or assigned or allocated to users; and/or which tasks are still available for allocation; and/or which particular task is allocated to which particular user or device or usage-session or application.


In some embodiments, a first user may be assigned a first unique on-screen task that has a first set of values of the above attributes (e.g., connect-the-dots of a Heart shape comprised of 7 dots to be connected); and a second user may be assigned a second unique on-screen task that has a second set of values of the above attributes (e.g., connect-the-dots of a Heart shape comprised of 9 dots to be connected); and a third user may be assigned a third unique on-screen task that has a third set of values of the above attributes (e.g., connect-the-dots of a Star shape comprised of 8 dots to be connected).


In some embodiments, a first login attempt to the computerized service may be assigned a first unique on-screen task that has a first set of values of the above attributes (e.g., connect-the-dots of a Star shape comprised of 6 dots to be connected); and a second login attempt to the computerized service (from the same end-user device; or from any other end-user device) may be assigned a second unique on-screen task that has a second set of values of the above attributes (e.g., connect-the-dots to form the number “6” comprised of seven dots to be connected); and a third login attempt to the computerized service (from the same end-user device; or from any other end-user device) may be assigned a third unique on-screen task that has a third set of values of the above attributes (e.g., connect-the-dots of an upside-down Heart shape comprised of ten dots to be connected).


In some embodiments, the system may select randomly or pseudo-randomly, a new unique on-screen task or a unique on-screen connect-the-dots pattern, for each user or for each new user that utilizes the end-user device and/or the computerized service; for example, by utilizing a permutations mechanism that mixes various attributes. For example, an on-screen task generator module may be associated with a pool of attributes for on-screen tasks. A first attribute may be the “shape” of the pattern, and may have seven possible values: a heart shape, a star shape, the digit “5”, the letter “P”, the symbol “@”, the letter “M”, and the digit “8”. A second attribute may be the “rotation” of the shape, and may have four possible values: no rotation, or 90-degrees clockwise rotation, or 180 degrees rotation (upside down rotation), or 270 clockwise rotation. A third attribute may be the “number of dots” to be connected in order to complete the entire pattern; for example, having six possible values (e.g., 7 dots, or 8 dots, or 9 dots, or 10 dots, or 11 dots, or 12 dots). A fourth attribute may be the “scale” (or size) of the connect-the-dots pattern; for example, having three possible values (e.g., small scale that occupies ¼ of the screen; medium scale that occupies ½ of the screen; large scale that occupies ⅔ of the screen). A fifth attribute may be a value of a time-delay that has to elapse, between the user reaching a dot, and the task generator presenting or exposing the next dot; for example, having three possible values (e.g., time-delay of 0.1 seconds, or 0.15 seconds, or 0.2 seconds). A sixth attribute may be a binary attribute indicating whether the time delay between dot exposures should be consistent across all dots, or should be randomized. In the demonstrative example shown above, by using only these six attributes, the number of possible permutations or combinations is 8×4×6×3×3×2×=3,456.


It would be appreciated that defining a dozen or two-dozens of such attributes, and/or defining multiple possible values for each attribute, may enable the task generator to generate millions, or billions, or even trillions of unique combinations or permutations; thereby ensuring a unique task for each user or for each usage-session or each login-session or login-attempt, across a single end-user device, or across a single computerized service, or across multiple devices and/or services. It would also be appreciated that the pool of possible permutations or combinations may be easily increased or modified, for example, by adding new patterns or new shapes, new attributes, new values for existing attributes, or the like.


The Applicants have realized that each user, when presented with such on-screen task, may perform the task in a slightly different manner relative to other users who are requested to perform the exact same task. For example, the task may be an on-screen connect-the-dots of a medium-size Heart shape; user Adam may complete the task within 3.6 seconds; whereas user Bob may complete the task within 5.4 seconds. Additionally or alternatively, user Adam typically moves from Dot 1 to Dot 2 in a straight line; whereas user Bob typically moves from Dot 1 to Dot 2 along a curved non-linear route. Additionally or alternatively, user Adam typically waits at least 0.2 seconds upon reaching Dot 4; whereas user Bob typically continues to move his finger beyond Dot 4 without waiting at Dot 4 at all. Additionally or alternatively, user Adam typically presses forcefully into the touch-screen (which may be a touch-force screen able to measure the amount of force applied) upon reaching a Dot, whereas user Bob typically does not presses forcefully into the touch-screen.


The system may thus utilize a User Interactions Monitoring Unit 158 to monitor the gestures and intricate details of interactions in performing the on-screen task, thereby enabling a User-Specific Features Extractor 159 to extract or estimate or determine user-specific features or attributes, and thereby enabling a Task-Based Behavioral Signature Generator 160 to construct or generate or assemble from them a user-specific behavioral signature or behavioral profile or behavioral feature-set; which may optionally be stored in a local repository (e.g., within the end-user device) and/or in Task-Based Behavioral Signature(s) Repository 161, for example, a remote repository (e.g., on a remote server or web-server or “cloud computing” server). The user-specific behavioral profile or signature or feature-set may be utilized in order to distinguish or differentiate between a first use and a second user; or between a first user and all other users; or between a genuine user and a fraudulent user (attacker, human imposter, computerized imposter, “bot”, automated script); or in order to authenticate a user to a computerized service or to an end-user device (e.g., without requiring a password or passphrase or PIN, or as an additional security measure to such password or passphrase or PIN).


For example, a Task-Based Behavioral Signature Comparator 162 may compare between: (a) a fresh or current or ad-hoc behavioral signature that is extracted from a current performance of a task by a user who contends to be the genuine user; and (b) a historical or original or previously-determined task-based behavioral signature which had been extracted and stored for that original or genuine user. If the two task-based behavioral signatures are identical, or match each other, or are different from each other only by a relatively-insignificant percentage value that is smaller than a pre-defined threshold, then the user is authenticated to the end-user device or the computerized service.


The Applicants have further realized that a human user may be “trained” by a Task-Based Training Unit 163 to more efficiently or more quickly or more precisely perform his user-specific on-screen task; in a manner that enables the system, after several iterations of such “training”, to more accurately distinguish between “trained” user Adam, and non-trained user Bob. For example, user Adam may be the owner of a smartphone which is locked, and which requires the user to connect-the-dot of a gradually-exposed Heart shape in order to unlock the smartphone. User Adam is the genuine or legitimate use of the smartphone (e.g., the owner of the smartphone). When user Adam buys the smartphone and utilizes it for the first time, the smartphone selects autonomously the on-screen task, without asking User Adam which task he prefers, and without letting user Adam select or define his own preferred task. For example, the smartphone in its first activation (or, during a first launch of a security application in accordance with the present invention) may pseudo-randomly select a task of connect-the-dots of an upside-down Heart shape comprising eight Dots that are gradually exposed. In the first few times, user Adam may need five seconds to complete the on-screen tasks. After a few such “unlock the smartphone” sessions, or within a few days, the time that it takes user Adam to complete the task may significantly decrease; user Adam may already continue from Dot 1 to the approximate location of Dot 2 based on his previous experience from previous unlocking sessions, even without waiting for Dot 2 to become visible or exposed; user Adam may be more accurate and more precise in his movements, may not “miss” a Dot; and may generally exhibit more proficiency, accuracy and efficiency in performing the on-screen task and completing it.


In a demonstrative example, user Adam leaves his smartphone on the table at a coffee-shop and goes to buy a drink; a neighboring user Bob captures the smartphone and attempts to unlock it. The smartphone shows to user Bob the same connect-the-dots on-screen task, as a condition for unlocking the smartphone. However, two major differences exist between Adam and Bob: firstly each one of them has a unique set of behavioral and cognitive abilities, enabling the system to differentiate between their performance of the same on-screen task; and enabling the system to refuse to unlock the smartphone for Bob, whose usage characteristics are different from Adam's (e.g., curves routes between dots instead of linear routes between dots; different delay after reaching each dot). Secondly, the already-trained user Adam, typically completes the task more quickly and in a more precise and accurate manner having specific traits of an “experienced” user, which are distinguishable (by the system) from the usage traits of Bob who is untrained with regard to performing the particular on-screen task. The system may thus refuse to unlock the smartphone for Bob, who fails to perform the same on-screen task in an entirely identical manner as Adam does.


In some embodiments, the system may learn on-the-fly the particular traits in which a new user performs an on-screen task, and may use them immediately (e.g., starting from the first or second iteration) for user authentication or for user identity detection. In other embodiments, the first K iterations of performing the on-screen task (e.g., K being an integer smaller than 50, or smaller than 20, or smaller than 10; for example, K being equal to 4 or 5 or 8), the system may only “learn” the particular characteristics of the manner in which user Adam performs and/or completes the task, without yet relying on them for actual user authentication; and only after such quota of training iterations are completed, or only if the system identifies sufficiently-unique user-specific features, only then would the system proceed to rely on the unique manner of performing the on-screen task as reliable means for user authentication.


For example, in some embodiments, the system may activate the security feature of the present invention; may then still require both manual entry of username and manual entry of password in order to access the computerized service or end-user device, and may also request the user to perform the on-screen task while logging in (or immediately prior to, or after, logging-in), but without yet relying on the on-screen task performance for actual user authentication, and only monitoring and “learning” the user-specific traits while also at the same time “training” the user to perform the on-screen task more efficiently; and only after K iterations of performing the on-screen task without utilizing it for authentication, or only after K successful logins that included the on-screen task, only then would the system modify its log-in process or authentication process, to require the user to enter his username and to perform the on-screen task, without requiring any more the user to enter any password. In some embodiments, the username may be entirely skipped or obviated, for example, in a use-case in which the present invention is utilized for unlocking a smartphone or for unlocking another electronic device; and/or in a use-case in which additional features (e.g., a fingerprint scan, a retina scan) are also used as part of a log-in process or an authentication process.


In accordance with the present invention, the particular and personal manner in which a user performs the on-screen task or challenge, is a user-specific trait that may be used for user authentication, and/or for distinguishing among users, and/or for confirming user identity, and/or for detecting a potential attacker or imposter (which may be human, or may be machine-based).


In accordance with the present invention, the user (or any user) does not select his own on-screen task or pattern from a pool of available (or offered) tasks or patterns; and the user does not modify the on-screen task, and does not replace it with another on-screen task; and does not edit, define and/or create by himself the on-screen task and/or pattern. This is in direct contrast with a password, a PIN or a passphrase, which are user-generated or user-defined, and which the user then needs to remember and to consciously convey (e.g., manually enter). Rather, in accordance with the present invention, the system automatically and autonomously generates (e.g., for each user, or for each device, or for each service) a pseudo-random on-screen task and/or pattern, or the system automatically and autonomously generates selects or defines such on-screen task and/or pattern for each user (or for each device or user or service) based on pre-defined attributes or criteria; and in some embodiments, the system does not allow and does not enable a user to switch or to modify the on-screen task or pattern that were allocated to him.


In some embodiments, optionally, the system may utilize a Task Resetting/Re-Allocating Unit 164 to allow or enable a user to switch or reset or replace an existing on-screen task with another, new, on-screen task (e.g., having a different connect-the-dots pattern and/or attributes), if one or more conditions are met; for example, if the end-user device (e.g., smartphone or tablet) is lost or stolen, and the user wishes to increase security of a replacement device by obtaining a new personal on-screen task that would be newly allocated to him by the system (for example, to prevent the thief who stole the smartphone, to “train” himself on the on-screen task of the stolen device and then apply the same behavior in order to attack the new device).


The present invention may thus enable to create and to utilize, a personal and unique and user-specific biometric trait or identifier (namely, the precise manner in which a user performs the on-screen task which is also unique to him), which is replaceable and changeable upon request; and this is in direct contrast with a human fingerprint, which is also a personal user-specific unique trait, but which is not replaceable and which follows a person “for life” without the ability to be replaced if the situation arises and such replacement would actually be desirable. For example, once a fingerprint of user Adam is “lifted” by attacker Bob from a dusty book that user Adam touched, the “lifted” fingerprint may be maliciously used by attacker Bob in order to gain access to various fingerprint-enabled devices of services of user Adam; without the user Adam ever being able to change or replace his own fingerprints. In contrast, if an attacker manages to imitate or duplicate the precise manner in which user Adam performs the on-screen task, then user Adam may request the system to issue to him a new on-screen task that would trigger him to perform a new, unique, manner of performing the new task, which the attacker cannot duplicate or replicate merely by already having duplicated the previous manner of performing the previous task.


The present invention may enable to create and to utilize a personal and unique and user-specific biometric trait or identifier, which may not be susceptible to duplication or copying; in direct contrast with a human fingerprint, which is also a unique biometric trait but which can be copied or duplicated by some attackers.


The present invention may optionally be utilized in conjunction with an existing smartphone, tablet, or other configuration of end-user device, without the need to necessarily add or install or connect a new biometric sensor (e.g., a fingerprint scanner or reader); thereby allowing, for example, low-cost deployment, efficient deployment, and/or small form-factor deployment of systems that utilize the present invention.


Some embodiments of the present invention may optionally utilize a two-fold mechanism, in which the user is required to perform an on-screen task, while also an interference or aberration is injected to the user-interface or to the task itself by an Interference Generator 165. For example, optionally, while the user is performing the on-screen task (e.g., dragging his finger from Dot 3 to Dot 4 of the Heart shape), Dot 4 may suddenly deviate or move to a different location, thereby requiring the user to notice the aberration and to react to the aberration (e.g., by performing corrective manual gestures). As another example, an interference may comprise displaying of the shape or patterns, or lines or curves or portions thereof, at a different speed or rate or timing, relative to the speed or rate or timing in which the Dots are gradually lit or exposed or shown or become visible. Other suitable aberrations or interferences may be used.


The user's reaction to the aberration, the attributes of the reaction (e.g., how long it took the user to notice and/or to correct), and the manner and attributes of the corrective action(s), may be analyzed and extracted and used as additional user-specific traits, in order to generate a user-specific profile that is more reliable and/or which relies on an increased depth of user-specific data, or is based on a larger user-specific data-set of user-specific features. In some embodiments, the injection of an aberration (or multiple aberrations) to the performance of the on-screen task, may increase the entropy of the system, and/or may increase the uniqueness of the manner in which the specific user performs the on-screen task presented to her; and/or may assist in “training” the particular user to be different and unique relative to other users; and/or in order to more efficiently identify or detect an attacker or an imposter.


In a demonstrative example of how an aberration may contribute to the above efficiency factors, user Adam owns a tablet which is unlocked by having Adam trace a connect-the-dot pattern that is Heart shaped and which includes 8 dots, that light-up (or become exposed or visible) at a particular time-interval or time-gap. An aberration may be, for example, a surprising movement of Dot 5 out of the eight dots; or a delayed exposure of Dot 7 of the eight dots. A genuine, trained, user (Adam) would react to this aberration differently from a first-time user (e.g., Bob the attacker or imposter). For example, Adam may continue to drag his finger from Dot 4 to the “original” (non-interfered) location of Dot 5 which user Adam is used to know from previous sessions; in contrast attacker Bob is non-trained, and will move his finger to the “interfered” new location of Dot 5, thereby indicating that Bob is not the genuine “trained” user Adam, but an imposter. Similarly, the user Adam may move his finger from Dot 6 to Dot 7 immediately, even though Dot 7 is not even lit or shown yet (due to a “delayed exposure” injected anomaly); whereas attacker Bob, who is not trained with performing the on-screen task, would patiently wait an additional 0.5 seconds until Dot 7 is exposed and lit, thereby indicating that user Bob is a non-trained attacker. Accordingly, the selective injection of interferences into the input/output of the on-screen task performing process, may increase the granularity and accuracy of the user-specific traits that are extracted; and/or may further contribute to improved detection of an attacker, an imposter, a first-time human user, a non-trained human user, an automatic script, a “bot” or a machine or emulator, or other non-genuine or unauthorized user(s).


In some embodiments, the requirement for a use to perform the on-screen task, may be additional to or alternative to other authentication methods (e.g., entering of a password or passphrase or PIN), or may be cumulative or augmenting to various other types of user authentication and/or fraud detection.


In some embodiments, the requirement for a user to perform the on-screen task, may be utilized as one of the steps in a two-step (or multi-step) authentication process; or may be utilized as one of the factors in a two-factor (or multi-factor) authentication process.


In some embodiments, the requirement for a user to perform the on-screen task, may be utilized as a “secret question” in a password recovery or password reset process; namely, as one of the means for the user to confirm his identity to a system in order to reset or recover a forgotten password, or in order to reset a defective (e.g., non-working) password. For example, when opening an email account, the user may define a username and a password; and may select a conventional password-recovery or password-reset question (e.g., “on which street did you grow up”), and/or may request to be allocated a unique on-screen task that the user would later have to complete in his user-specific manner in order to trigger password recovery or password reset. In the email account set-up stage, the system may immediately allocate to the user a unique on-screen task (e.g., connect-the-dots pattern); may require the user to immediately perform the task at least one time, or at least K times (e.g., for initial “training”); and may store the user-specific traits of the performance of the task as unique identifiers, that would later be used as a challenge to the user who requests to reset or recover his password or credentials.


The present invention may provide a log-in process, or sign-in process, or authentication process, which is based on extraction of a user-specific behavioral trait, which is extracted from user gestures when the user is requested to complete or to perform a particular computerized task or on-screen task (typically being a user-specific task that is unique to the user and/or to the device and/or to the user session, yet is repeated at each authentication session of the same user on the same device); the on-screen task being defined exclusively by the system and not by the user (in contrast with a user-defined password); the on-screen task being a replaceable task which may be discarded and replaced by another on-screen task for the same user if certain conditions are met (e.g., if the electronic device is stolen or lost or destroyed). This method may enable a password-less or PIN-less log-in process or authentication process; or may be used as an augmentation to other authentication methods or in combination with other authentication methods (e.g., password entry; physical token; two-step authentication; password entry; PIN entry; answering pre-defined security questions).


In some embodiments, the on-screen task generator may generate a unique on-screen task which elicits the user to react and to perform and complete the task in a particular behavioral manner which is unique relative to other users or relative to the entire population of users. For example, in some embodiments, the system may select or may generate a different task for each user, such that the same task would repeat consistently for that user, when he attempts to access a particular service (e.g., an email account, or a banking account), regardless of the particular device that the user is utilizing (smartphone, Tablet 1, Tablet 2); thereby providing a cross-platform password-less PIN-less authentication process which may be platform-agnostic or platform-independent. In some embodiments, the system may select or may generate a different task for each device, such that the same task would repeat consistently for that device, whenever a user (any user) attempts to access or unlock the device (e.g., attempts to unlock a smartphone or tablet); regardless of the identity of the user who is attempting to authenticate (legitimate user or attacker); thereby providing a password-less PIN-less authentication process that enables only the genuine user to unlock the device or to access the device.


The on-screen task may be, for example, a task in which the user is required to track with his finger an on-screen pattern or shape or line(s); or is required to connect-the-dots on a touch-screen or on a computer screen; or is required to connect dots or symbols which are gradually exposed or become visible in a staggered manner. The user does not define and does not select the particular on-screen task, which is automatically generated and allocated to him by the system. Accordingly, the user does not even need to remember or to memorize the particular task or any “preferred way” to perform the task, since the task is presented to the user in subsequent login sessions or login attempts, with integrated or built-in “instructions” or guidelines how to complete the task without the need to remember or to memorize any data-item or password or PIN or a previous-manner of completing the same task.


In some embodiments, the system may “train” the user, over K iterations, to efficiently and proficiently perform his unique on-screen task; thereby “training” the user to be familiar with his personal task, and allowing his manner of performing that task to be more consistent, un-changing, and even more unique as a “behavioral signature” relative to the rest of the population.


In some embodiments, the authentication process may utilize: (a) the fact realized by the Applicants, that each user performs a particular task differently and uniquely relative to other users; (b) the fact realized by the Applicants, that a user who “trained” to perform his particular task, performs that task in a more proficient or more efficient or more accurate manner, relative to that user performing a new task that he encounters for the first time; (c) optionally, the fact realized by the Applicants, that injecting an input/output interference or anomaly or aberration, to the performance of the task, may further contribute to the uniqueness of the user-extracted traits or the extracted “behavioral signature”, and/or may further improve the differentiation between the legitimate user and other user(s) such as an attacker or impostor.


The present invention may thus “learn” or deduce, over multiple iterations or log-in sessions, the particular “behavioral signature” of each user, reflecting the particular's user attributes of his unique manner of performing the task; and such “behavioral signature” may be stored in a long-term repository, a short-term repository, a local repository within the end-user device, a remote repository on a remote server or a “cloud computing” server, or the like.


During a subsequent log-in attempt or access attempt or authentication attempt, the system may present the same task for performance and completion, and may monitor and track the current user-specific traits that are reflected in current user gestures, thereby generating a current, ad hoc, “behavioral signature” of the current user. The system may compare the current behavioral signature with the historic or previously-stored behavioral signature, in order to determine whether the current user who is attempting to access the service (or the device) is indeed the same human user as the human user who had been initially presented with the same task (e.g., upon activation or initiation of a user account for that service; or upon initial activation of the end-user device).


In some embodiments, optionally, the system may utilize an Enrollment Module 166 to perform an enrollment process; in which a new user is requested to perform the same user-specific task, several times (e.g., K times, five times, ten times) in a row, in order to rapidly establish a data-set of generally-consistent user-specific traits that characterize that user when he performs that task; optionally discarding the first one or two or three iterations data; and/or optionally using a weighting formula to allocate a greater weight to latter task-performing sessions, and to allocate a smaller weight to earlier or initial task-performing sessions. In other embodiments, no such formal or visible “enrollment process” is needed; and rather, the system may autonomously learn over time, or over K iterations or login sessions or login attempts, to extract or to identify the consistent user-specific traits.


In some embodiments, the system may require the user to enter a password/PIN and also to perform the allocated user-specific task; and this may be performed across multiple, K, iterations of login sessions. Then, after K iterations (e.g., after 8 or 10 successful logins, that involved both password/PIN entry and also on-screen task completion), the system may determine the user-specific behavioral signature, which is reliable and strong since the user is already “trained” in performing that task for several times. In some embodiments, from that point in time and onward, the system no longer requires the user to enter a password/PIN for authentication or for accessing a service; but rather, the system relies on the behavioral traits of the user completing the task, as a password-less authentication means.


In some embodiments, optionally, once the system determines that the behavioral signature of the user is sufficiently unique or strong or reliable, the system may even utilize a Password/PIN Discarding Unit 167 to discard or delete or erase or over-write the original password/PIN of the user (or its hash value, or other indication or equivalent of it); such that no user, not even the legitimate user himself, would be able to access the account using the password/PIN; but rather, only the correct behavioral performance of the task would be the condition for authorizing access or for rejecting a login attempt. In some embodiments, if the end-user device is stolen or destroyed or lost, or if the user's record is destroyed or is damaged, the system may provide a suitable solution; for example, allowing the user to reset his registration with the system (e.g., optionally requiring the user to present certain credentials), and initializing the process from the beginning (e.g., setting a password; training the user with a new task; and then discarding also the new password, and relying exclusively on the behavioral traits of performing the new task).


The present invention may be utilized in a variety of implementations and systems. In a first example, a tablet or a smartphone or a dashboard or a device having a touch-screen may be placed at an entrance to an access-controlled physical area (e.g., building, room, floor in a building, organization, office); and users may be required to perform an initial advance registration process, such that each authorized user (who is allowed to enter the physical area) would be associated with a particular user-specific task that can be performed on that touch-screen. Subsequently, that touch-screen device may be used as an authentication terminal, requiring each guest or visitor to authenticate by entering his name or username, then presenting to the user his suitable pre-defined on-screen task, and then allowing (or blocking) the user's physical entry based on the behavioral traits of how the user performs that task. This may be an addition to, or an alternative to, other user authentication methods for entering a secure area or a controlled-access physical location (such as, showing a badge or an I.D. card; scanning a barcode; showing a token; retina scan; fingerprint scan; voice recognition or voice signature; or the like).


In another example, a tablet or a smartphone or a dashboard or a device having a touch-screen may be embedded in (or connected to) a vehicle, or a vehicular dashboard; such that starting the vehicles motor, and/or driving the vehicle, may be conditioned upon the user (e.g., the driver) performing the pre-defined task on the touch-screen, in the same manner that would yield the same behavioral signature that had been defined for the legitimate user (e.g., the car owner or the previously-authorized driver). The device of the present invention may thus be utilized in order to allow or to block access to a vehicle, or in order to allow or block an attempt to start a vehicle or to drive a vehicle. Similarly, the invention may be used with allowing or blocking access to various electronic devices, electric devices, kitchen appliances, household appliances (e.g., a television set, a smart television), a gaming device or gaming console, or the like.


It is noted that for demonstrative purposes, some portions of the discussion herein may relate to an on-screen task that is performed via a touch-screen; or to a “connect the dots” task, or to trace an on-screen trail; however, other suitable tasks may be used, which may not necessarily involve connecting of dots or other items, and which may not necessarily require or involve a touch-screen. In a first example, the user-specific task may require the user to utilize a mouse of a computer, in order to trace an on-screen trail or route, or in order to connect dots or icons on the screen, vie mouse gestures or via touch-pad gestures, and without dragging a finger over a touch-screen. In a second example, the user may be requested to perform certain gestures on the touch-screen or via another input unit (mouse, keyboard), such as typing a particular phrase via a physical keyboard or an on-screen keyboard, as an input task that is analyzed and from which user-specific behavioral traits are extracted and are then assembled or fused into a user-specific behavioral signature which is subsequently used for user authentication.


Reference is made to FIG. 3, which is a schematic illustration of a touch-screen 300 demonstrating an on-screen task for user authentication, in accordance with some embodiments of the present invention. The task may be, for example, a “connect the dots” on-screen task. Firstly, only Dot 1 is shown to the user, who is requested to place his finger on Dot 1. Then, while the user keeps his finger onto Dot 1, the second dot (Dot 2) becomes visible, and the user is supposed to drag his finger from Dot 1 to Dot 2, generally along the arrow shown between Dot 1 and Dot 2. When the user's finger reaches Dot 3, optionally after a pre-defined delay, Dot 3 may become visible, such that the user needs to draft his finger from Dot 2 to Dot 3. The process may continue similarly until Dot 9 is reached. Optionally, the route that was traced by the user may be drawn on the screen; or alternatively, the traced route may not be drawn and the screen may show only the Dots without their connections. Optionally, only upon completion of the entire pattern of nine dots, the entire trace is shown or illuminated, to indicate to the user that he completed a Heart shape (in the shown example).


It is noted that two different users may drag their finger differently between dots. For example, user Adam may drag his finger from Dot 2 to Dot 3 along a generally-curved line 301; whereas user Bob may drag his finger from Dot 2 to Dot 3 along a generally-straight line 302; thereby enabling the system to distinguish between users, or to distinguish between these two users, or to distinguish between user Adam and all other users, or to distinguish between user Bob and all other users.


In some embodiments, a “trained” user (e.g., the genuine user) who performed this task several times or many times, may already be trained to use the curved line 301 since he intends to draw the already-familiar Heart shape that he trained to draw in the past; whereas, a fresh user or non-trained user, for example attacker or impostor who attempts to perform this task for the first time, may draw the straight line 302. Additionally or alternatively, the timing of the tracing may be different; such that the original or genuine user may proceed with the tracing task more rapidly than an attacker, and may even proceed to trace towards the correct direction before the next Dot becomes visible to him; whereas an attacker may linger and wait for each subsequent Dot to illuminate in order to trace a route towards it. Accordingly, the system may differentiate between user Adam and user Bob, or between the original genuine user and an attacker or impostor.


Other suitable shapes, tasks and/or challenges may be used.


In some embodiments of the present invention, a machine-implemented method may enable or may make or may force users to behave (or to react) differently in a distinctive and user-specific manner, for the purpose of password-less login or password-less authentication (e.g., towards an end-user device, or towards a local service or local application running on the end-user device, or towards a remote service or remote application that is accessible through the end-user device), based on changeable biometrics or replaceable biometrics. For example, the method may comprise: (a) autonomously selecting or allocate a different specific task to each device or to each user; (b) optionally, training each specific user to perform his allocated task, over at least K iterations; (c) monitoring user interactions, and learning or determining or generating a behavioral cognitive biometric signature of the trained user; (d) testing against it any fresh attempt to perform the user-specific login task (or user-authentication task, or device-authentication task), optionally without requiring the user to define and/or to remember and/or to enter any password or PIN. Optionally, if the biometric signature is stolen or lost or becomes defective (e.g., not working) or needs to be reset or replaced for any reason, then a new task may be selected and allocated, and a new behavioral cognitive biometric signature will be trained and stored for that specific user or device.


It is noted that in accordance with the present invention, monitoring and/or analyzing of “user interactions” and/or “user gestures”, may further comprise the monitoring and/or analyzing of interactions, gestures, and/or sensed data that is collected shortly before or immediately before the actual interaction, and/or interactions, gestures, and/or sensed data that is collected shortly after or immediately after the actual interaction; in addition to the data collected or sensed or monitored during the interaction itself.


It is noted that in accordance with the present invention, the “user interaction data” may comprise, for example, any data that is sensed or captured by the end-user device or by any sensors thereof or by other (e.g., external) sensors, and which may relate directly or indirectly to the user interaction or to the input-output exchange between the user and the device (or the service). For example, data sensed by the accelerometer and/or gyroscope(s) and/or orientation sensor(s) of the end-user device, during the interaction and/or shortly prior to the interaction and/or shortly after the interaction, may be utilized as part of the data from which a user-specific behavioral profile or cognitive biometric profile is generated; for example, identifying that user Adam typically orients his smartphone at a 30 degrees angle during the actual touch-screen interaction; identifying that user Bob typically rotates his smartphone clockwise by 20 degrees immediately prior to performing a touch-screen gestures; identifying that use Carl typically causes a movement sideways, or a movement to the left side, or a tilting to a certain direction, of the entire electronic device, prior to the interaction (the task performance) or immediately prior to it or immediately after it; or the like.


It is noted that in some embodiments, the system and method of the present invention may utilize the password-less log-in or the password-less user authentication or controlled access, in conjunction with sensing and/or analyzing other user-specific features or biometric traits; for example, using an image or photo or video of the user (e.g., before or during or after the actual interaction is performed), or using an audio or speech utterance or voice utterance by the user (e.g., before or during or after the actual interaction is performed). For example, the image or voice of the user, may be utilized as an assisting parameter in the decision whether or not the current user, who is performing the required task by interactions or gestures, is indeed the genuine user. For example, if the system of the present invention is utilized in order to authorize or reject the access of a user into a building or a vehicle, then utilization of the user's image and/or voice may further be used as part of the decision-making process in which the user is authenticated or is blocked.


In some embodiments, the user-specific task that is allocated by the system to a user or to a device, may be or may include, for example: a task to draw or to follow an on-screen pattern or shape that is similar to the digit “8” or to the letter “O” or to the character “&” or to the character “@” or to the mathematical symbol for infinity; wherein the user is required, by the task generator unit, to draw or to trace the drawing by using only one finger, or by using two fingers, or by using three fingers, or by using four fingers, or by using five fingers. Optionally, the monitoring of user interactions may comprise, for example, the additional data that may be collected or sensed with regard the relative progress or the relative movement of each finger relative to other finger(s); and/or additional information which the system may deduce, with regard to the length or relative length of finger(s), based on the relation or the rate of progress of such fingers on the touch-screen. In another demonstrative example, the user-specific task may require the user to drag or move multiple dots (e.g., three dots, or four dots) towards a central point or towards a target point on the touch-screen by utilizing multiple fingers; thereby enabling the system to extract unique user-specific features with regard to the manner of performing the task, and optionally with regard to actual characteristics of the fingers of the user or his hand. In some embodiments, such extracted data may also be paired with, or augmented with, data sensed by accelerometer and/or gyroscope and/or device-orientation sensor, during the task performance and/or immediately prior to task performance and/or immediately after task performance; thereby augmenting and fine-tuning the user-specific profile, or thereby enabling finer distinction among multiple users.


The Applicants have realized that conventional user-authentication systems typically utilize for authentication purposes a “something you know” data-item (e.g., a user-defined password), and/or a “something you have” item (e.g., a physical key, or a magnetic card, or a human fingerprint). In contrast, some embodiments of the present invention may perform user authentication based on “something you are”, or a cognitive behavioral trait that is utilized as a user-specific biometric feature or signature, which cannot be accurately imitated by other users; and which may optionally be reset or replaced (e.g., by generating a replacement task) if the need arises.


In some embodiments, the first K iterations of performing the task, by each user or for each new device, may be regarded by the system as “training sessions” or “learning sessions”, in which the system allows the user to become trained or proficient in performing the task; without yet utilizing the initial interactions (during those K iterations, or during some of them) for constructing the user-specific biometric profile or signature; and only after K iterations elapse, or only after the system determines that the user is sufficiently trained in performing the task, then the system generates the user-specific biometric profile based on user interactions that are performed while the user is already trained or proficient; optionally discarding the user interactions that were monitored during the training sessions, without using them for biometric profile generation.


Some embodiments may comprise a method for capturing and obtaining different data with regard to different users, by allocating to them different tasks. The Applicants have realized that it may be beneficial and advantageous not only to generate and to utilize the user-specific cognitive behavioral biometric profile, but also to significantly increase the possible data-set or the possible range of behaviors, thereby enabling the analysis unit or comparing unit or matching unit to operate more efficiently and/or more accurately.


The terms “mobile device” or “mobile electronic device” as used herein may include, for example, a smartphone, a cellular phone, a mobile phone, a tablet, a handheld device, a portable electronic device, a portable gaming device, a portable audio/video player, or the like.


The term “pointing device” as used herein may include, for example, a mouse, a trackball, a pointing stick, a stylus, a joystick, a motion-sensing input device, a touch screen, a touch-pad, or the like.


The term “device” or “electronic device” as used herein may include, for example, a mobile device, a non-mobile device, a non-portable device, a desktop computer, a workstation, a computing terminal, a laptop computer, a notebook computer, a netbook computer, a computing device associated with a mouse or a similar pointing accessory, or the like.


The term “genuine user” as used herein may include, for example, an owner of a device; a legal or lawful user of a device; an authorized user of a device; a person who has legal authorization and/or legal right to utilize a device, for general purpose(s) and/or for one or more particular purpose(s); or the person who had originally defined user credentials (e.g., username and password) for performing an activity through the device.


The term “fraudulent user” as used herein may include, for example, any person who is not the “genuine user” of the device; an attacker; an intruder; a man-in-the-middle attacker; a man-in-the-browser attacker; an unauthorized user; an impersonator; a hacker; a cracker; a person attempting to hack or crack or compromise a security measure utilized by the device or by a system or a service or a website, or utilized by an activity or service accessible through the device; a fraudster; a human fraudster; a “bot” or a malware or an automated computerized process (e.g., implemented by using software modules and/or hardware components) which attempts to imitate human behavior or which attempts to act as if such “bot” or malware or process was the genuine user; or the like.


The present invention may be used in conjunction with various suitable devices and systems, for example, various devices that have a touch-screen; an ATM; a kiosk machine or vending machine that has a touch-screen; a touch-keyboard; a system that utilizes Augmented Reality (AR) components or AR glasses (e.g., Google Glass); a device or system that may detect hovering gestures that do not necessarily touch on the screen or touch-screen; a hovering screen; a system or device that utilize brainwave analysis or brainwave control in which the user's brainwaves are captured or read and the user's brain may directly control an application on the mobile device; and/or other suitable devices or systems.


Some embodiments may identify multiple (different) users that utilize the same device, or the same account, before or after a typical user profile is built, or even during a training period in which the system learns the behavioral patterns. This may be used for detection of “friendly fraud” incidents, or identification of users for accountability purposes, or identification of the user that utilized a particular function in an Administrator account (e.g., optionally used in conjunction with a requirement that certain users, or users with certain privileges, may not share their password or credentials with any other person); or identification of a licensee in order to detect or prevent software piracy or unauthorized usage by non-licensee user(s), for software or products that are sold or licensed on a per-user basis or a per-seat basis.


In some embodiments, the present invention may be utilized to decrease (or increase, or modify) friction from an authentication process. For example, after a login form was filled and submitted by the user, a demonstrative system may skip or not skip an additional authentication step (e.g., a security question) if the system recognizes the user as the genuine user.


Some embodiments may identify or detect a remote access attacker, or an attacker or a user that utilizes a remote access channel to access (or to attack, or to compromise) a computerized service.


In some embodiments of the present invention, a method comprises: differentiating between a first user and a second user of a computerized service, by performing: (a) autonomously selecting a unique and non-user-defined task, that is intended to be performed by a specific user via an input unit of an electronic device; (b) generating the task, and collecting user interactions data via the input unit while the user is performing the task; (c) repeating step (b) for at least N iterations for said specific user, wherein N is a positive integer; (d) during step (b) and during step (c), determining from said user interactions data a user-specific cognitive behavioral biometric profile; (e) storing the user-specific cognitive behavioral profile in a repository; (f) subsequently, generating said task again upon a subsequent request of a user to access said computerized service, and collecting fresh user interactions data from fresh performance of said task; (g) if the fresh user interactions data that was collected from said fresh performance of said task, does not match the previously-stored user-specific cognitive behavioral biometric profile, then un-authorizing access of the user to the computerized service.


In some embodiments, the task is unique to said user relative to all other users of the computerized service.


In some embodiments, the task is unique to said electronic device relative to all other electronic devices that access the computerized service.


In some embodiments, the task is both (i) unique to said electronic device relative to all other electronic devices that access the computerized service, and (ii) unique to said user relative to all other users of the computerized service.


In some embodiments, the task comprises an on-screen dot-connecting task.


In some embodiments, the task comprises an on-screen dot-connecting task in which all dots are visible to the user immediately upon commencement of the task.


In some embodiments, the task comprises an on-screen dot-connecting task in which only a single dot is visible to the user immediately upon commencement of the task, and each subsequent dot is exposed to the user gradually as the user connects each dot that was exposed to him.


In some embodiments, the task is generated by selecting at least: a particular shape from a pool of available shapes, a particular scale from a pool of available scales, a particular number of dots from a number-of-dots pool.


In some embodiments, the method comprises: while the user is performing the task, introducing an input/output interference that triggers the user to perform corrective gestures; extracting one or more user-specific features from said corrective gestures; taking into account said one or more user-specific features, that were extracted from said corrective gestures, during at least one of these steps: (i) during constructing the reference user-specific behavioral signature; (ii) during constructing the fresh user-specific behavioral signature.


In some embodiments, the method comprises: during a first K usage-sessions of the user with the computerized service, wherein K is a positive integer: (a) requiring the user to both enter a password and to perform the task; (b) relying on the password for user authentication towards the computerized service; (c) not-relying on the task for user authentication towards the computerized service; starting at the K+1 usage-session of the user with the computerized service: (i) enabling the user to authenticate towards the computerized service without entering any password, if the user performs the task in a manner that matches the reference user-specific behavioral profile.


In some embodiments, the method comprises: during a first K usage-sessions of the user with the computerized service, wherein K is a positive integer: (a) requiring the user to both enter a password and to perform the task; (b) relying on the password for user authentication towards the computerized service; (c) not-relying on the task for user authentication towards the computerized service; upon completion of the first K usage-sessions, discarding the password; starting at the K+1 usage-session of the user with the computerized service: (i) enabling the user to authenticate towards the computerized service without entering any password, if the user performs the task in a manner that matches the reference user-specific behavioral profile.


In some embodiments, said task is utilized for user authentication in addition to requiring the user to manually enter a password.


In some embodiments, said task is utilized for user authentication instead of requiring the user to manually enter a password.


In some embodiments, said task is utilized for user authentication as a condition for granting access to the user to a physical location.


In some embodiments, said task is utilized for user authentication as a condition for granting access to the user to a vehicle, or for allowing a user to drive or to mobilize a vehicle.


In some embodiments, said task is utilized for user authentication as part of a multi-factor authentication process.


In some embodiments, said task is utilized as a secret question that the user is required to successfully perform in order to reset user credentials.


In some embodiments, collecting the user interactions data comprises collecting user interactions data both (i) during performance of the task, and (ii) immediately prior to performance of the task; wherein generating the user-specific cognitive behavioral biometric profile is performed based on both (I) the user interactions during performance of the task, and (II) the user interactions immediately prior to performance of the task.


In some embodiments, collecting the user interactions data comprises collecting user interactions data both (i) during performance of the task, and (ii) immediately after performance of the task; wherein generating the user-specific cognitive behavioral biometric profile is performed based on both (I) the user interactions during performance of the task, and (II) the user interactions immediately after performance of the task.


In some embodiments, collecting the user interactions data comprises collecting user interactions data (i) during performance of the task, and (ii) immediately prior to performance of the task, and (iii) immediately after performance of the task; wherein generating the user-specific cognitive behavioral biometric profile is performed based on (I) the user interactions during performance of the task, and (II) the user interactions immediately prior to performance of the task, and (III) the user interactions immediately after performance of the task.


In some embodiments, collecting the user interactions data comprises both (i) collecting user interactions data via the input unit, and (ii) collecting one or more sensed parameters that are sensed via a sensor of the electronic device during task performance; wherein generating the user-specific cognitive behavioral biometric profile is performed based on both (I) the user interactions via the input unit during performance of the task, and (II) the one or more sensed parameters that are sensed via said sensor of the electronic device during task performance.


In some embodiments, collecting the user interactions data comprises both (i) collecting user interactions via the input unit, and (ii) collecting one or more sensed device-acceleration parameters that are sensed via an accelerometer of the electronic device during task performance; wherein generating the user-specific cognitive behavioral biometric profile is performed based on both (I) the user interactions via the input unit during performance of the task, and (II) the one or more sensed device-acceleration parameters that are sensed via said accelerometer of the electronic device during task performance.


In some embodiments, collecting the user interactions data comprises both (i) collecting user interactions via the input unit, and (ii) collecting one or more sensed device parameters that are sensed via a gyroscope of the electronic device during task performance; wherein generating the user-specific cognitive behavioral biometric profile is performed based on both (I) the user interactions via the input unit during performance of the task, and (II) the one or more device parameters that are sensed via said gyroscope of the electronic device during task performance.


In some embodiments, collecting the user interactions data comprises both (i) collecting user interactions data via the input unit, and (ii) collecting one or more sensed device-orientation parameters that are sensed via an orientation-sensing unit of the electronic device during task performance; wherein generating the user-specific cognitive behavioral biometric profile is performed based on both (I) the user interactions via the input unit during performance of the task, and (II) the one or more device-orientation parameters that are sensed via said orientation-sensing unit of the electronic device during task performance.


In some embodiments, collecting the user interactions data comprises both (i) collecting user interactions data via the input unit, and (ii) collecting one or more images of the user that are captured via an imager during task performance; wherein generating the user-specific cognitive behavioral biometric profile is performed based on both (I) the user interactions via the input unit during performance of the task, and (II) the one or more images that are captured visa said imager during task performance.


In some embodiments, the method comprises: if said user-specific cognitive behavioral biometric profile is compromised, then: (A) autonomously selecting a replacement unique and non-user-defined task, that is intended to be performed by the specific user via the input unit of the electronic device; (B) generating the replacement task, and collecting user interactions data via the input unit while the user is performing the replacement task; (C) repeating step (B) for at least N iterations for said specific user; (D) during step (B) and during step (C), determining from said user interactions a replacement user-specific cognitive behavioral biometric profile; (E) in a subsequent user-authentication session: generating the replacement task; based on monitored user interactions, generating a fresh ad-hoc cognitive behavioral biometric profile; and authenticating the user based on a comparison between the fresh ad-hoc cognitive behavioral biometric profile and the replacement user-specific cognitive behavioral biometric profile.


In some embodiments, the method comprises: if said user-specific cognitive behavioral biometric profile becomes non-usable, then: (A) autonomously selecting a replacement unique and non-user-defined task, that is intended to be performed by the specific user via the input unit of the electronic device; (B) generating the replacement task, and collecting user interactions data via the input unit while the user is performing the replacement task; (C) repeating step (B) for at least N iterations for said specific user; (D) during step (B) and during step (C), determining from said user interactions a replacement user-specific cognitive behavioral biometric profile; (E) in a subsequent user-authentication session: (i) generating the replacement task; (ii) based on collected user interactions data during performance of the replacement task, generating a fresh ad-hoc cognitive behavioral biometric profile; (iii) authenticating the user based on a comparison between the fresh ad-hoc cognitive behavioral biometric profile and the replacement user-specific cognitive behavioral biometric profile.


In some embodiments, the method comprises: upon loss or theft of said electronic device is lost or stolen, performing: (A) autonomously selecting a replacement unique and non-user-defined task, that is intended to be performed by the specific user via the input unit of the electronic device; (B) generating the replacement task, and collecting user interactions data via the input unit while the user is performing the replacement task; (C) repeating step (B) for at least N iterations for said specific user; (D) during step (B) and during step (C), determining from said user interactions a replacement user-specific cognitive behavioral biometric profile; (E) in a subsequent user-authentication session: (i) generating the replacement task; (ii) based on collected user interactions data during performance of the replacement task, generating a fresh ad-hoc cognitive behavioral biometric profile; (iii) authenticating the user based on a comparison between the fresh ad-hoc cognitive behavioral biometric profile and the replacement user-specific cognitive behavioral biometric profile.


In some embodiments, an apparatus comprises: a memory unit to store code; a processor to execute said code; an input unit to receive manual user interactions; a user-authentication unit to perform: (a) increasing a range of possible manual user interactions that are usable for automated distinguishing among different users, by autonomously selecting and allocating, to each user in a group of users or to each electronic device in a group of electronic devices, a unique task that is performed via an input unit; (b) collecting user interactions data, at least during performance of said unique task; (c) based on the collected user interactions data, generating a user-specific cognitive behavioral biometric signature; (d) subsequently, during a fresh attempt for user authentication: (i) generating said unique task; (ii) collecting fresh user interactions data at least during performance of said unique task; (iii) if the fresh user interactions data does not match said user-specific cognitive behavioral biometric signature, then rejecting the fresh attempt for user authentication.


In some embodiments, the apparatus comprises (or is connected to, or is comprised in, or is part of, or is operably associated with) a physical gate for blocking or allowing entrance (or exit, or passage) of a human to an access-controlled physical location.


In some embodiments, the apparatus comprises (or is connected to, or is comprised in, or is part of, or is operably associated with) a vehicular unit that is operably associated with an ignition unit (or an immobilizer unit) of a vehicle; wherein the apparatus is to block or allow ignition and/or mobilization and/or driving and/or other functions of said vehicle.


Although portions of the discussion herein relate, for demonstrative purposes, to wired links and/or wired communications, some embodiments of the present invention are not limited in this regard, and may include one or more wired or wireless links, may utilize one or more components of wireless communication, may utilize one or more methods or protocols of wireless communication, or the like. Some embodiments may utilize wired communication and/or wireless communication.


The present invention may be implemented by using hardware units, software units, processors, CPUs, DSPs, integrated circuits, logic units, memory units, storage units, wireless communication modems or transmitters or receivers or transceivers, cellular transceivers, a power source, input units, output units, Operating System (OS), drivers, applications, and/or other suitable components.


In accordance with the present invention, a method comprises: (a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN); (b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item; (c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task; (d1) determining whether or not said user gestures correspond to correct entry of said secret data-item; (d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions; (e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected.


For example, a user logs-in to his online bank account or email account or social network account, or to his electronic device. Optionally, the user may enter a username; or the device (or system, or service) may utilize a pre-defined username already filled out (e.g., based on a “cookie” data-item that indicates to the system that this is a returning user). The user has to input a secret data-item (PIN or password, or other secret string of characters). However, the user is not inputting the secret data-item via typing on a keyboard or keypad (neither physical, nor virtual, nor on-screen). Rather, the user operates one or more input-units of the electronic device that he is using, in order to complete a task that indirectly causes or indirectly involves indirect inputting of the characters of the secret data-item. For example, a set of on-screen reels or wheels or rotating elements are generated and shown, enabling the user to virtually rotate them by moving his finger on the touch-screen (or the touch-pad) or by utilizing a computer mouse or other pointing device or input unit; each such reel or rotating element shows thereon a set of digits and/or letters and/or characters, such that the user rotates each on-screen reel to a position that shows a particular character (e.g., at a central line). This way, the user indirectly enters each character, by rotating the on-screen reels, to form an on-screen representation of his secret data-item (PIN or password).


Once the user “submits” his current position of the on-screen task to the system (e.g., by clicking or tapping on a “submit” button or link or GUI element; or, upon automatic submission process once he rotated all the on-screen reels, one after the other), two checks are performed. Firstly, the system checks whether the content that the user has indicated via his interactions, matches the secret data-item. For example, if the user's password is “swordfish”, the system checks whether the nine on-screen reels have been correctly rotated by the user to show that password in a single horizontal line across the nine reels. Secondly, the system checks whether the user interactions, as monitored and captured and logged during the rotating operations of the reels, enable extraction of a user-specific behavioral characteristic (or a set of characteristics) that match a previously-extracted characteristic that this particular user had exhibited when he had defined his reference password or PIN, and/or that he has exhibited in previous log-in sessions to that account or device.


For example, when user Adam had defined his original secret data-item, he rotated the on-screen reels (one by one) by pulling them vertically in straight (linear) gestures (e.g., dragging downwardly straight lines, vertically, downwardly, on the touch-screen; or on the touch-pad; or moving the mouse vertically in straight line), at high-speed (e.g., dragging at least N pixels per 0.1 seconds of interaction), and with average pause of less than T seconds between reels. In contrast, user Bob rotates the on-screen wheels slowly, by pulling them upwardly (and not downwardly as Adam does), slightly diagonally in direction (and not exactly vertically as Adam does), at a slower speed (e.g., moving them less than N pixels per 0.1 seconds of interaction), and with longer pauses between reels (e.g., average pause greater than T seconds between reels). Accordingly, if user Bob attempts to impersonate user Adam, and attempts to log-in into the system as if he was user Adam and by entering the secret data-item of user Adam, even when the entered secret-item is correct (e.g., matches the reference password or the reference PIN that had been defined by user Adam), the system can still differentiate and distinguish between the users, and may still raise a flag or generate a notification of a possible fraud, since the behavioral characteristic(s) that are extracted from the input-unit interactions performed by user Bob when he performs the task that corresponds to password entry, do not match those that were exhibited by (and extracted from interactions of) user Adam (the genuine user, the account owner) when Adam had defined his reference password or PIN and/or when Adam logged-in in recent or historical log-in sessions.


For example, the speed in which Adam rotated the on-screen reels, when he defined his original password, was 400 pixels per second; the average speed (or the median speed) that characterized Adam in his most-recent 20 log-in sessions was 394 pixels per second; and currently, in a fresh or current log-in attempt, by a user that claims to be Adam, the rotation speed is only 170 pixels per second. Similarly, when Adam defined his original password, and also in all the most-recent 15 log-in sessions of Adam, the on-screen reels where rotated downwardly (or: clockwise), whereas in a current or fresh log-in attempt the reels are rotated upwardly (or: counter-clockwise). Such differences may trigger the system to raise a flag of possible fraud, and/or to block or reject the log-in attempt, and/or to perform fraud mitigation operations, such as, to require the attempting user to utilize an additional authentication factor or to contact a customer service representative by phone.


In some embodiments, the task excludes and does not require typing of characters via a physical keyboard or via an on-screen keyboard; and/or, the task excludes and does not require typing of characters via a physical keypad or via an on-screen keypad. The task may comprise other suitable operations, such as: connecting on-screen dots or connecting on-screen objects in a manner that corresponds to character-by-character inputting of the password; completing a missing piece into a puzzle, out of several possibilities; selecting a picture out of several pictures and/or dragging it from a first on-screen location to a second on-screen location; or the like.


In some embodiments, said task comprises: requiring the user to rotate on-screen reels, each reel indicating at least letters and digits, each reel corresponding to one character of said secret data-item.


In some embodiments, monitoring user gestures of performance of said task, comprises: monitoring a rotation speed in which each of said reels is rotated by the user, and utilizing said rotation speed as a user-specific characteristic for user authentication.


In some embodiments, monitoring user gestures of performance of said task, comprises: monitoring a rotation direction in which each of said reels is rotated by the user, and utilizing said rotation direction as a user-specific characteristic for user authentication.


In some embodiments, said task comprises: generating an on-screen arrangement of digits and letters; requiring the user to input said secret data-item by drawing on-screen lines among consecutive characters of said secret data-item; determining a curvature level of said lines, and utilizing said curvature level of said lines as a user-specific characteristic for user authentication.


In some embodiments, the method comprises authenticating said user, or rejecting authentication of said user, based on a cumulative assessment that takes into account (i) the secret data-item that the user knows, and (ii) the specific behavioral way in which the user interacted with the electronic device to input said secret data-item.


In some embodiments, said task is performed via a touch-screen of an electronic device, and requires said user to drag or move on-screen objects in order to convey said secret data-item.


In some embodiments, said task is performed via a touch-screen of an electronic device, and requires said user to connect on-screen objects with on-screen lines.


In some embodiments, said secret data-item is a password represented by a particular two-dimensional drawing; wherein said task is performed via a touch-screen of an electronic device, and requires said user to draw said particular two-dimensional drawing on said touch-screen.


In some embodiments, the method authenticates, or rejects authentication, of a user that attempts to log-in via an electronic device to an online account managed by a remote server.


In some embodiments, the task requires said user to convey the secret data-item via a touch-screen of an electronic device, without typing said secret data-item on a physical keyboard or on an on-screen keyboard.


In some embodiments, said task comprises: generating an on-screen arrangement of digits and letters; requiring the user to input said secret data-item by drawing on-screen lines among consecutive characters of said secret data-item; determining a speed of task completion of said user drawing lines, and utilizing said speed of task completion as a user-specific characteristic for user authentication.


In some embodiments, said task requires said particular user to perform steps by on-screen dragging operations or on-screen moving operations, that are performed via a touch-screen of an electronic device of said particular user; wherein the step of monitoring user gestures comprises monitoring touch-screen gestures via said touch-screen; wherein the step of extracting comprises extracting said behavioral characteristic from said touch-screen gestures.


In some embodiments, said task requires said particular user to perform steps by on-screen dragging operations or on-screen moving operations, that are performed via a touchpad of an electronic device of said particular user; wherein the step of monitoring user gestures comprises monitoring touch gestures inputted via said touchpad; wherein the step of extracting comprises extracting said behavioral characteristic from said touchpad gestures.


In some embodiments, said task requires said particular user to perform steps by on-screen dragging operations or on-screen moving operations, that are performed via a computer mouse of an electronic device of said particular user; wherein the step of monitoring user gestures comprises monitoring computer mouse gestures; wherein the step of extracting comprises extracting said behavioral characteristic from said computer mouse gestures.


Some embodiments may include a process comprising: (a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN); (b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of spatially moving an entirety of an electronic device, wherein spatial movements of the entirety of the electronic device cause inputting of consecutive characters of said secret-item; (c) during said user authentication session, monitoring spatial properties of the electronic device; and extracting from said spatial properties a behavioral characteristic that characterizes user performance of said task; (d1) determining whether or not said spatial movements correspond to correct entry of said secret data-item; (d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from previous log-in sessions in which said user had inputted the secret data-item via a set of spatial movements of the entirety of the electronic device; (e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected.


For example, the user holds in his hand(s) the entirety of the portable electronic device (e.g., smartphone, tablet); and spatially moves or tilts or rotates in the air the entirety of the electronic device in a manner that causes task completion and entry of the user's password or PIN. For example, an on-screen representation of a ball is generated; located initially within a circle that has the 26 letters and the 10 digits; the user tilts and moves the smartphone or tablet in mid-air; the device senses the orientation change or the slanting or tilting, via its accelerometer and/or gyroscope and/or compass unit and/or device-orientation sensor; and the on-screen ball moves on the screen in a direction that corresponds to the vertically-lower region of the slanting, imitating a gravitational effect on the on-screen ball; thereby enabling the user to move the ball towards an on-screen character, and to thus indirectly input his password or PIN by making the ball “visit” those on-screen locations by tilting or spatially moving the entirety of the device.


The process performs two checks. The first check focuses on the correctness of the inputted password; namely, did the user indeed cause the ball to visit “f” then “i” then “s” then “h” in order to convey the pre-defined password of “fish”. The second check focuses on the behavioral manner in which the device was manipulated or tilted or oriented or spatially engaged in order to effectuate the password entry, and compares such behavioral characteristic(s) to a previously-stored behavioral characteristics that was extracted wen the genuine user (e.g., the account owner) had defined his password or PIN, and/or that was extracted from the most-recent N log-in sessions of the genuine user.


In some embodiments, the task is performed by the user utilizing a portable electronic device; wherein step (c) comprises: monitoring data sensed by an accelerometer of said portable electronic device during task performance by said user; wherein step (d2) comprises: checking whether a behavioral characteristic that was extracted from accelerometer measurements in step (c), match a previously-stored reference behavioral characteristic that was extracted from accelerometer data during previous log-in sessions in which said user had inputted the secret data-item via a set of spatial movements of the entirety of the electronic device.


In some embodiments, the task is performed by the user utilizing a portable electronic device; wherein step (c) comprises: monitoring data sensed by a gyroscope of said portable electronic device during task performance by said user; wherein step (d2) comprises: checking whether a behavioral characteristic that was extracted from gyroscope measurements in step (c), match a previously-stored reference behavioral characteristic that was extracted from gyroscope data during previous log-in sessions in which said user had inputted the secret data-item via a set of spatial movements of the entirety of the electronic device.


In some embodiments, the task is performed by the user utilizing a portable electronic device; wherein step (c) comprises: monitoring data sensed by a spatial orientation sensor of said portable electronic device during task performance by said user; wherein step (d2) comprises: checking whether a behavioral characteristic that was extracted from spatial orientation sensor measurements in step (c), match a previously-stored reference behavioral characteristic that was extracted from spatial orientation sensor data during previous log-in sessions in which said user had inputted the secret data-item via a set of spatial movements of the entirety of the electronic device.


In some embodiments, the task requires said user to convey the secret data-item via spatial movement of the entirety of the electronic device, without typing said secret data-item on a physical keyboard or on an on-screen keyboard.


In some embodiments, the process comprises authenticating said user, or rejecting authentication of said user, based on a cumulative assessment that takes into account (i) the secret data-item that the user knows, and (ii) the specific behavioral way in which the user interacted with the electronic device to input said secret data-item by moving in space or tilting in space the entirety of the electronic device.


In some embodiments, a combined method or process may authenticate the user (or, may reject an authentication attempt of a user), by taking into account three checking results: (i) whether the password that was conveyed now by interacting with the device, matches the reference password; and also, cumulatively, (ii) whether the behavioral characteristic(s) that are extracted from the fresh user interactions during task performance, match the behavioral characteristic(s) that had been extracted from the interactions of the genuine user when he had defined the password; and also, cumulatively, (iii) whether the spatial characteristics of the entirety of the end-user device, that are sensed during the current task performance, match the spatial characteristics of the end-user device when the genuine user had defined the password. For example, user Adam rotates on-screen reels downwardly and slowly while he slants the device 30 degrees to the right; in contrast, user Bob rotates on-screen reels upwardly and rapidly while he slants the device 45 degrees to the left; thereby enabling the system to differentiate between the two users, and to generate a fraud notification when Bob attempts to impersonate as Adam.


In some embodiments, a combined method or process may authenticate the user (or, may reject an authentication attempt of a user), by taking into account three checking results: (I) whether the password that was conveyed now by interacting with the device, matches the reference password; and also, cumulatively, (II) whether the behavioral characteristic(s) that are extracted from the fresh user interactions during task performance, match the behavioral characteristic(s) that had been extracted from the interactions of the genuine user during his most-recent N log-in sessions; and also, cumulatively, (iii) whether the spatial characteristics of the entirety of the end-user device, that are sensed during the current task performance, match the spatial characteristics of the end-user device during the most-recent N log-in sessions of the genuine user.


Functions, operations, components and/or features described herein with reference to one or more embodiments of the present invention, may be combined with, or may be utilized in combination with, one or more other functions, operations, components and/or features described herein with reference to one or more other embodiments of the present invention.


While certain features of the present invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those skilled in the art. Accordingly, the claims are intended to cover all such modifications, substitutions, changes, and equivalents.

Claims
  • 1. A method comprising: (a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected;wherein said task comprises:generating an on-screen arrangement of digits and letters;requiring the user to input said secret data-item by drawing on-screen lines among consecutive characters of said secret data-item;determining a curvature level of said lines, and utilizing said curvature level of said lines as a user-specific characteristic for user authentication.
  • 2. The method of claim 1, wherein said task excludes and does not require typing of characters via a physical keyboard or via an on-screen keyboard.
  • 3. The method of claim 1, wherein said task excludes and does not require typing of characters via a physical keypad or via an on-screen keypad.
  • 4. The method of claim 1, wherein the method comprises authenticating said user, or rejecting authentication of said user, based on a cumulative assessment that takes into account (i) the secret data-item that the user knows, and (ii) the specific behavioral way in which the user interacted with the electronic device to input said secret data-item.
  • 5. The method of claim 1, wherein the method authenticates, or rejects authentication, of a user that attempts to log-in via an electronic device to an online account managed by a remote server.
  • 6. A method comprising: (a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected;wherein said task comprises: requiring the user to rotate on-screen reels, each reel indicating at least letters and digits, each reel corresponding to one character of said secret data-item;wherein monitoring user gestures of performance of said task, comprises:monitoring a rotation speed in which each of said reels is rotated by the user, and utilizing said rotation speed as a user-specific characteristic for user authentication.
  • 7. The A method of claim 4, comprising: (a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected; wherein said task comprises: requiring the user to rotate on-screen reels, each reel indicating at least letters and digits, each reel corresponding to one character of said secret data-item;wherein monitoring user gestures of performance of said task, comprises:monitoring a rotation direction in which each of said reels is rotated by the user, and utilizing said rotation direction as a user-specific characteristic for user authentication.
  • 8. A method comprising: (a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected;wherein said task comprises:generating an on-screen arrangement of digits and letters;requiring the user to input said secret data-item by drawing on-screen lines among consecutive characters of said secret data-item;determining a speed of task completion of said user drawing lines, and utilizing said speed of task completion as a user-specific characteristic for user authentication.
  • 9. A system comprising: one or more processors configured to execute code;one or more memory units configured to store code;wherein the one or more processors are configured to perform:(a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected;wherein said task comprises:generating an on-screen arrangement of digits and letters;requiring the user to input said secret data-item by drawing on-screen lines among consecutive characters of said secret data-item;determining a curvature level of said lines, and utilizing said curvature level of said lines as a user-specific characteristic for user authentication.
  • 10. A system comprising: one or more processors configured to execute code;one or more memory units configured to store code;wherein the one or more processors are configured to perform:(a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected;wherein said task comprises: requiring the user to rotate on-screen reels, each reel indicating at least letters and digits, each reel corresponding to one character of said secret data-item;wherein monitoring user gestures of performance of said task, comprises:monitoring a rotation speed in which each of said reels is rotated by the user, and utilizing said rotation speed as a user-specific characteristic for user authentication.
  • 11. A system comprising: one or more processors configured to execute code;one or more memory units configured to store code;wherein the one or more processors are configured to perform:(a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected;wherein said task comprises: requiring the user to rotate on-screen reels, each reel indicating at least letters and digits, each reel corresponding to one character of said secret data-item;wherein monitoring user gestures of performance of said task, comprises:monitoring a rotation direction in which each of said reels is rotated by the user, and utilizing said rotation direction as a user-specific characteristic for user authentication.
  • 12. A system comprising: one or more processors configured to execute code;one or more memory units configured to store code;wherein the one or more processors are configured to perform:(a) storing a representation of a secret data-item of a particular user, wherein said secret data-item is one of: a password, a Personal Identification Number (PIN);(b) generating a user authentication session that requires said particular user to enter said secret data-item by performing a task comprised of on-screen operations in which said user drags or moves on-screen objects to input said secret data-item;(c) during said user authentication session, monitoring user gestures of user performance of said task; and extracting from said user gestures a behavioral characteristic that characterizes user performance of said task;(d1) determining whether or not said user gestures correspond to correct entry of said secret data-item;(d2) determining whether or not the behavioral characteristic that was extracted in step (c), matches a previously-stored reference behavioral characteristic that was extracted from past on-screen operations that were previously associated with said particular user during previous log-in sessions;(e) if the determining of step (d1) is negative or the determining of step (d2) is negative, then: generating a notification that user authentication is rejected;wherein said task comprises:generating an on-screen arrangement of digits and letters;requiring the user to input said secret data-item by drawing on-screen lines among consecutive characters of said secret data-item;determining a speed of task completion of said user drawing lines, and utilizing said speed of task completion as a user-specific characteristic for user authentication.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation-in-Part (CIP) of U.S. Ser. No. 15/051,700, filed on Feb. 24, 2016, which is hereby incorporated by reference in its entirety. The above-mentioned U.S. Ser. No. 15/051,700 is a Continuation-in-Part (CIP) of U.S. Ser. No. 14/325,397, filed on Jul. 8, 2014, now U.S. Pat. No. 9,450,971 (issued on Sep. 20, 2016), which is hereby incorporated by reference in its entirety. The above-mentioned U.S. Ser. No. 14/325,397 claims priority and benefit from US 61/843,915, filed on Jul. 9, 2013, which is hereby incorporated by reference in its entirety. The above-mentioned U.S. Ser. No. 14/325,397 is also a Continuation-in-Part (CIP) of U.S. Ser. No. 13/922,271, filed on Jun. 20, 2013, now U.S. Pat. No. 8,938,787 (issued on Jan. 20, 2015), which is hereby incorporated by reference in its entirety. The above-mentioned U.S. Ser. No. 14/325,397 is also a Continuation-in-Part (CIP) of U.S. Ser. No. 13/877,676, filed on Apr. 4, 2013, now U.S. Pat. No. 9,069,942 (issued on Jun. 30, 2015); which was a National Stage of PCT International Application number PCT/IL2011/000907, filed on Nov. 29, 2011; which claimed priority and benefit from US 61/417,479, filed on Nov. 29, 2010; all of which are hereby incorporated by reference in their entirety. The above-mentioned U.S. Ser. No. 14/325,397 is also a Continuation-in-Part (CIP) of U.S. Ser. No. 14/320,653, filed on Jul. 1, 2014, now U.S. Pat. No. 9,275,337 (issued on Mar. 1, 2016), which is hereby incorporated by reference in its entirety. The above-mentioned U.S. Ser. No. 14/325,397 is also a Continuation-in-Part (CIP) of U.S. Ser. No. 14/320,656, filed on Jul. 1, 2014, now U.S. Pat. No. 9,665,703 (issued on May 30, 2017), which is hereby incorporated by reference in its entirety.

US Referenced Citations (503)
Number Name Date Kind
3618019 Nemirovsky Nov 1971 A
3699517 Dyche Oct 1972 A
3983535 Herbst Sep 1976 A
4128829 Herbst Dec 1978 A
4621334 Garcia Nov 1986 A
4760386 Heath Jul 1988 A
4805222 Young Feb 1989 A
5305238 Starr Apr 1994 A
5442342 Kung Aug 1995 A
5485171 Copper Jan 1996 A
5557686 Brown Sep 1996 A
5565657 Merz Oct 1996 A
5581261 Hickman Dec 1996 A
5838306 O'Connor Nov 1998 A
5874941 Yamada Feb 1999 A
5999162 Takahashi Dec 1999 A
6028271 Gillespie Feb 2000 A
6202023 Hancock Mar 2001 B1
6209102 Hoover Mar 2001 B1
6337686 Wong Jan 2002 B2
6337919 Dunton Jan 2002 B1
6442692 Zilberman Aug 2002 B1
6572014 Lambert Jun 2003 B1
6819219 Bolle Nov 2004 B1
6836554 Bolle Dec 2004 B1
6895514 Kermani May 2005 B1
6931131 Becker Aug 2005 B1
6938061 Rumynin Aug 2005 B1
6938159 O'Connor Aug 2005 B1
6957185 Labaton Oct 2005 B1
6957186 Guheen Oct 2005 B1
6983061 Ikegami Jan 2006 B2
7092926 Cerrato Aug 2006 B2
7130452 Bolle Oct 2006 B2
7133792 Murakami Nov 2006 B2
7139916 Billingsley Nov 2006 B2
7158118 Liberty Jan 2007 B2
7236156 Liberty Jun 2007 B2
7245218 Ikehara Jul 2007 B2
7366919 Sobel Apr 2008 B1
7395436 Nemovicher Jul 2008 B1
7494061 Reinhold Feb 2009 B2
7523191 Thomas Apr 2009 B1
7535456 Liberty May 2009 B2
7606915 Calinov Oct 2009 B1
7796013 Murakami Sep 2010 B2
7818290 Davis Oct 2010 B2
7860870 Sadagopan Dec 2010 B2
8031175 Rigazio Oct 2011 B2
8065624 Morin Nov 2011 B2
8125312 Orr Feb 2012 B2
8156324 Shnowske Apr 2012 B1
8170953 Tullis May 2012 B1
8201222 Inoue Jun 2012 B2
8244211 Clark Aug 2012 B2
8285658 Kellas-Dicks Oct 2012 B1
8402533 LeBeau Mar 2013 B2
8417960 Takahashi Apr 2013 B2
8433785 Awadallah Apr 2013 B2
8449393 Sobel May 2013 B2
8499245 Froment Jul 2013 B1
8510113 Conkie Aug 2013 B1
8548208 Schultz Oct 2013 B2
8549629 Mccreesh Oct 2013 B1
8555077 Davis Oct 2013 B2
8621209 Johansson Dec 2013 B1
8745729 Poluri Jun 2014 B2
8788838 Fadell Aug 2014 B1
8803797 Scott Aug 2014 B2
8819812 Weber Aug 2014 B1
8832823 Boss Sep 2014 B2
8838060 Walley Sep 2014 B2
8880441 Chen Nov 2014 B1
8898787 Thompson Nov 2014 B2
8938787 Turgeman Jan 2015 B2
8941466 Bayram Jan 2015 B2
8990959 Zhu Mar 2015 B2
9069942 Turgeman Jun 2015 B2
9071969 Turgeman Jun 2015 B2
9154534 Gayles Oct 2015 B1
9174123 Nasiri Nov 2015 B2
9195351 Rosenberg Nov 2015 B1
9203860 Casillas Dec 2015 B1
9275337 Turgeman Mar 2016 B2
9282112 Filatov Mar 2016 B2
9301140 Costigan Mar 2016 B1
9304915 Adams Apr 2016 B2
9355231 Disraeli May 2016 B2
9355234 Magi Shaashua May 2016 B1
9418221 Turgeman Aug 2016 B2
9430629 Ziraknejad Aug 2016 B1
9450971 Turgeman Sep 2016 B2
9477826 Turgeman Oct 2016 B2
9483292 Turgeman Nov 2016 B2
9526006 Turgeman Dec 2016 B2
9529987 Deutschmann Dec 2016 B2
9531701 Turgeman Dec 2016 B2
9531733 Turgeman Dec 2016 B2
9536071 Turgeman Jan 2017 B2
9541995 Turgeman Jan 2017 B2
9547766 Turgeman Jan 2017 B2
9552470 Turgeman Jan 2017 B2
9558339 Turgeman Jan 2017 B2
9589120 Samuel Mar 2017 B2
9621567 Turgeman Apr 2017 B2
9626677 Turgeman Apr 2017 B2
9654485 Neumann May 2017 B1
9665703 Turgeman May 2017 B2
9674218 Turgeman Jun 2017 B2
9690915 Turgeman Jun 2017 B2
9703953 Turgeman Jul 2017 B2
9710316 Chheda Jul 2017 B1
9712558 Turgeman Jul 2017 B2
9747436 Turgeman Aug 2017 B2
9779423 Turgeman Oct 2017 B2
9838373 Turgeman Dec 2017 B2
9848009 Turgeman Dec 2017 B2
9927883 Lin Mar 2018 B1
10032010 Turgeman Jul 2018 B2
10037421 Turgeman Jul 2018 B2
10049209 Turgeman Aug 2018 B2
10055560 Turgeman Aug 2018 B2
10069837 Turgeman Sep 2018 B2
10069852 Turgeman Sep 2018 B2
10079853 Turgeman Sep 2018 B2
10083439 Turgeman Sep 2018 B2
10164985 Turgeman Dec 2018 B2
10198122 Turgeman Feb 2019 B2
10262324 Turgeman Apr 2019 B2
10298614 Turgeman May 2019 B2
10395018 Turgeman Aug 2019 B2
10397262 Karabchevsky Aug 2019 B2
10404729 Turgeman Sep 2019 B2
10474815 Turgeman Nov 2019 B2
10476873 Turgeman Nov 2019 B2
10523680 Turgeman Dec 2019 B2
10579784 Turgeman Mar 2020 B2
10586036 Turgeman Mar 2020 B2
10621585 Turgeman Apr 2020 B2
20010004733 Eldering Jun 2001 A1
20020023229 Hangai Feb 2002 A1
20020089412 Heger Jul 2002 A1
20030033526 French Feb 2003 A1
20030074201 Grashey Apr 2003 A1
20030137494 Tulbert Jul 2003 A1
20030149803 Wilson Aug 2003 A1
20030212811 Thornton Nov 2003 A1
20040015714 Abraham Jan 2004 A1
20040017355 Shim Jan 2004 A1
20040021643 Hoshino Feb 2004 A1
20040034784 Fedronic Feb 2004 A1
20040062423 Doi Apr 2004 A1
20040111523 Hall Jun 2004 A1
20040123156 Hammond Jun 2004 A1
20040128240 Yusin Jul 2004 A1
20040143737 Teicher Jul 2004 A1
20040186882 Ting Sep 2004 A1
20040221171 Ahmed Nov 2004 A1
20050008148 Jacobson Jan 2005 A1
20050060138 Wang Mar 2005 A1
20050179657 Russo Aug 2005 A1
20050289264 Illowsky Dec 2005 A1
20060006803 Huang Jan 2006 A1
20060080263 Willis Apr 2006 A1
20060090073 Steinberg Apr 2006 A1
20060123101 Buccella Jun 2006 A1
20060143454 Walmsley Jun 2006 A1
20060195328 Abraham Aug 2006 A1
20060215886 Black Sep 2006 A1
20060224898 Ahmed Oct 2006 A1
20060238490 Stanley Oct 2006 A1
20060280339 Cho Dec 2006 A1
20060282660 Varghese Dec 2006 A1
20060284969 Kim Dec 2006 A1
20070118804 Raciborski May 2007 A1
20070156443 Gurvey Jul 2007 A1
20070174082 Singh Jul 2007 A1
20070183633 Hoffmann Aug 2007 A1
20070214426 Ruelle Sep 2007 A1
20070226797 Thompson Sep 2007 A1
20070236330 Cho Oct 2007 A1
20070240230 O'Connell Oct 2007 A1
20070241861 Venkatanna Oct 2007 A1
20070250920 Lindsay Oct 2007 A1
20070255821 Ge Nov 2007 A1
20070266305 Cong Nov 2007 A1
20070271466 Mak Nov 2007 A1
20070283416 Renaud Dec 2007 A1
20080046982 Parkinson Feb 2008 A1
20080059474 Lim Mar 2008 A1
20080068343 Hoshino Mar 2008 A1
20080084972 Purke Apr 2008 A1
20080091453 Meehan Apr 2008 A1
20080091639 Davis Apr 2008 A1
20080092209 Davis Apr 2008 A1
20080092245 Alward Apr 2008 A1
20080097851 Bemmel Apr 2008 A1
20080098456 Alward Apr 2008 A1
20080120717 Shakkarwar May 2008 A1
20080136790 Hio Jun 2008 A1
20080162449 Chao-Yu Jul 2008 A1
20080183745 Cancel Jul 2008 A1
20080192005 Elgoyhen Aug 2008 A1
20080200310 Tagliabue Aug 2008 A1
20080211766 Westerman Sep 2008 A1
20080215576 Zhao Sep 2008 A1
20080263636 Gusler Oct 2008 A1
20080298588 Shakkarwar Dec 2008 A1
20080301808 Calo Dec 2008 A1
20080306897 Liu Dec 2008 A1
20080309616 Massengill Dec 2008 A1
20090037983 Chiruvolu Feb 2009 A1
20090038010 Ma Feb 2009 A1
20090049555 Cho Feb 2009 A1
20090089879 Wang Apr 2009 A1
20090094311 Awadallah Apr 2009 A1
20090132395 Lam May 2009 A1
20090133106 Bentley May 2009 A1
20090134972 Wu, Jr. May 2009 A1
20090157792 Fiatal Jun 2009 A1
20090172551 Kane Jul 2009 A1
20090189736 Hayashi Jul 2009 A1
20090199296 Xie Aug 2009 A1
20090203355 Clark Aug 2009 A1
20090227232 Matas Sep 2009 A1
20090241188 Komura Sep 2009 A1
20090254336 Dumais Oct 2009 A1
20090281979 Tysowski Nov 2009 A1
20090293119 Jonsson Nov 2009 A1
20090300589 Watters Dec 2009 A1
20090303204 Nasiri Dec 2009 A1
20090320123 Yu Dec 2009 A1
20100007632 Yamazaki Jan 2010 A1
20100040293 Hermann Feb 2010 A1
20100042387 Gibbon Feb 2010 A1
20100042403 Chandrasekar Feb 2010 A1
20100042954 Rosenblatt Feb 2010 A1
20100046806 Baughman Feb 2010 A1
20100070405 Joa Mar 2010 A1
20100077470 Kozat Mar 2010 A1
20100082747 Yue Apr 2010 A1
20100082998 Kohavi Apr 2010 A1
20100097324 Anson Apr 2010 A1
20100115610 Tredoux May 2010 A1
20100122082 Deng May 2010 A1
20100125816 Bezos May 2010 A1
20100138370 Wu Jun 2010 A1
20100164897 Morin Jul 2010 A1
20100171753 Kwon Jul 2010 A1
20100197352 Runstedler Aug 2010 A1
20100225443 Bayram Sep 2010 A1
20100245553 Schuler Sep 2010 A1
20100269165 Chen Oct 2010 A1
20100281539 Burns Nov 2010 A1
20100284532 Burnett Nov 2010 A1
20100287229 Hauser Nov 2010 A1
20100321304 Rofougaran Dec 2010 A1
20100325721 Bandyopadhyay Dec 2010 A1
20100328074 Johnson Dec 2010 A1
20110010209 McNally Jan 2011 A1
20110012829 Yao Jan 2011 A1
20110016320 Bergsten Jan 2011 A1
20110016534 Jakobsson Jan 2011 A1
20110018828 Wu Jan 2011 A1
20110023115 Wright Jan 2011 A1
20110029902 Bailey Feb 2011 A1
20110039529 Kim Feb 2011 A1
20110039602 McNamara Feb 2011 A1
20110043475 Rigazio Feb 2011 A1
20110050394 Zhang Mar 2011 A1
20110055077 French Mar 2011 A1
20110063211 Hoerl Mar 2011 A1
20110065504 Dugan Mar 2011 A1
20110066682 Aldunate Mar 2011 A1
20110102570 Wilf May 2011 A1
20110105103 Ullrich May 2011 A1
20110105859 Popovic May 2011 A1
20110113388 Eisen May 2011 A1
20110154273 Aburada Jun 2011 A1
20110154497 Bailey Jun 2011 A1
20110159650 Shiraishi Jun 2011 A1
20110159850 Faith Jun 2011 A1
20110162076 Song Jun 2011 A1
20110191820 Ivey Aug 2011 A1
20110193737 Chiueh Aug 2011 A1
20110202453 Issa Aug 2011 A1
20110221684 Rydenhag Sep 2011 A1
20110223888 Esaki Sep 2011 A1
20110225644 Pullikottil Sep 2011 A1
20110246902 Tsai Oct 2011 A1
20110248941 Abdo Oct 2011 A1
20110251823 Davis Oct 2011 A1
20110271342 Chung Nov 2011 A1
20110276414 Subbarao Nov 2011 A1
20110300831 Chin Dec 2011 A1
20110304531 Brooks Dec 2011 A1
20110320822 Lind Dec 2011 A1
20120005483 Patvarczki Jan 2012 A1
20120005719 McDougal Jan 2012 A1
20120007821 Zaliva Jan 2012 A1
20120054834 King Mar 2012 A1
20120096555 Mahaffey Apr 2012 A1
20120102551 Bidare Apr 2012 A1
20120113061 Ikeda May 2012 A1
20120123932 LeCuyer May 2012 A1
20120124662 Baca May 2012 A1
20120133055 Machida May 2012 A1
20120151559 Koudys Jun 2012 A1
20120154173 Chang Jun 2012 A1
20120154273 McDade Jun 2012 A1
20120154823 Sakamoto Jun 2012 A1
20120158503 Mardikar Jun 2012 A1
20120159599 Szoke Jun 2012 A1
20120164978 Conti Jun 2012 A1
20120167170 Shi Jun 2012 A1
20120167204 Akka Jun 2012 A1
20120174213 Geiger Jul 2012 A1
20120188198 Jeong Jul 2012 A1
20120204257 O'Connell Aug 2012 A1
20120218193 Weber Aug 2012 A1
20120239557 Weinflash Sep 2012 A1
20120246737 Paxton Sep 2012 A1
20120252410 Williams Oct 2012 A1
20120278804 Narayanasamy Nov 2012 A1
20120284380 Anderson Nov 2012 A1
20120297476 Zeljkovic Nov 2012 A1
20130018796 Kolhatkar Jan 2013 A1
20130024239 Baker Jan 2013 A1
20130036416 Raju Feb 2013 A1
20130061169 Pearcy Mar 2013 A1
20130076650 Vik Mar 2013 A1
20130088434 Masuda Apr 2013 A1
20130097682 Zeljkovic Apr 2013 A1
20130097706 Titonis Apr 2013 A1
20130109944 Sparacino May 2013 A1
20130111586 Jackson May 2013 A1
20130133055 Ali May 2013 A1
20130135218 Jain May 2013 A1
20130139248 Rhee May 2013 A1
20130154999 Guard Jun 2013 A1
20130162603 Peng Jun 2013 A1
20130167212 Azar Jun 2013 A1
20130198832 Draluk Aug 2013 A1
20130212674 Boger Aug 2013 A1
20130237272 Prasad Sep 2013 A1
20130239195 Turgeman Sep 2013 A1
20130239206 Draluk Sep 2013 A1
20130243208 Fawer Sep 2013 A1
20130254642 Seo Sep 2013 A1
20130282637 Costigan Oct 2013 A1
20130288647 Turgeman Oct 2013 A1
20130301830 Bar-El Nov 2013 A1
20130305357 Ayyagari Nov 2013 A1
20130312097 Turnbull Nov 2013 A1
20130335349 Ferren Dec 2013 A1
20130346309 Giori Dec 2013 A1
20140033317 Barber Jan 2014 A1
20140041020 Zhao Feb 2014 A1
20140078061 Simons Mar 2014 A1
20140078193 Barnhoefer Mar 2014 A1
20140082369 Waclawsky Mar 2014 A1
20140111451 Park Apr 2014 A1
20140114843 Klein Apr 2014 A1
20140118520 Slaby May 2014 A1
20140123275 Azar May 2014 A1
20140143304 Hegarty May 2014 A1
20140168093 Lawrence Jun 2014 A1
20140196119 Hill Jul 2014 A1
20140200953 Mun Jul 2014 A1
20140223531 Outwater Aug 2014 A1
20140244499 Gruner Aug 2014 A1
20140250538 Rapaport Sep 2014 A1
20140259130 Li Sep 2014 A1
20140270571 Dwan Sep 2014 A1
20140283059 Sambamurthy Sep 2014 A1
20140283068 Call Sep 2014 A1
20140289833 Briceno Sep 2014 A1
20140317028 Turgeman Oct 2014 A1
20140317726 Turgeman Oct 2014 A1
20140317734 Valencia Oct 2014 A1
20140317744 Turgeman Oct 2014 A1
20140325223 Turgeman Oct 2014 A1
20140325645 Turgeman Oct 2014 A1
20140325646 Turgeman Oct 2014 A1
20140325682 Turgeman Oct 2014 A1
20140337786 Luo Nov 2014 A1
20140344927 Turgeman Nov 2014 A1
20150002479 Kawamura Jan 2015 A1
20150012920 De Santis Jan 2015 A1
20150062078 Christman Mar 2015 A1
20150081549 Kimberg Mar 2015 A1
20150091858 Rosenberg Apr 2015 A1
20150094030 Turgeman Apr 2015 A1
20150101031 Harjanto Apr 2015 A1
20150128252 Konami May 2015 A1
20150146945 Han May 2015 A1
20150205944 Turgeman Jul 2015 A1
20150205955 Turgeman Jul 2015 A1
20150205957 Turgeman Jul 2015 A1
20150205958 Turgeman Jul 2015 A1
20150212843 Turgeman Jul 2015 A1
20150213244 Lymberopoulos Jul 2015 A1
20150213245 Tartz Jul 2015 A1
20150213246 Turgeman Jul 2015 A1
20150213251 Turgeman Jul 2015 A1
20150242601 Griffiths Aug 2015 A1
20150256528 Turgeman Sep 2015 A1
20150256556 Kaminsky Sep 2015 A1
20150264572 Turgeman Sep 2015 A1
20150268768 Woodhull Sep 2015 A1
20150279155 Chun Oct 2015 A1
20150310196 Turgeman Oct 2015 A1
20150348038 Femrite Dec 2015 A1
20150358317 Deutschmann Dec 2015 A1
20160006800 Summers Jan 2016 A1
20160012465 Sharp Jan 2016 A1
20160034673 Chandra Feb 2016 A1
20160042164 Goldsmith Feb 2016 A1
20160048937 Mathura Feb 2016 A1
20160055324 Agarwal Feb 2016 A1
20160057623 Dutt Feb 2016 A1
20160077620 Choi Mar 2016 A1
20160087952 Tartz Mar 2016 A1
20160109969 Keating Apr 2016 A1
20160132105 Turgeman May 2016 A1
20160155126 D'Uva Jun 2016 A1
20160164905 Pinney Wood Jun 2016 A1
20160164906 Pinney Wood Jun 2016 A1
20160174044 Jones Jun 2016 A1
20160179245 Johansson Jun 2016 A1
20160182503 Cheng Jun 2016 A1
20160191237 Roth Jun 2016 A1
20160196414 Stuntebeck Jul 2016 A1
20160197918 Turgeman Jul 2016 A1
20160209948 Tulbert Jul 2016 A1
20160226865 Chen Aug 2016 A1
20160241555 Vo Aug 2016 A1
20160294837 Turgeman Oct 2016 A1
20160300049 Guedalia Oct 2016 A1
20160300054 Turgeman Oct 2016 A1
20160306974 Turgeman Oct 2016 A1
20160307191 Turgeman Oct 2016 A1
20160307201 Turgeman Oct 2016 A1
20160321445 Turgeman Nov 2016 A1
20160321689 Turgeman Nov 2016 A1
20160328572 Valacich Nov 2016 A1
20160342826 Apostolos Nov 2016 A1
20160344783 Kushimoto Nov 2016 A1
20160364138 Luo Dec 2016 A1
20160366177 Turgeman Dec 2016 A1
20160371476 Turgeman Dec 2016 A1
20170011217 Turgeman Jan 2017 A1
20170012988 Turgeman Jan 2017 A1
20170017781 Turgeman Jan 2017 A1
20170032114 Turgeman Feb 2017 A1
20170034210 Talmor Feb 2017 A1
20170048272 Yamamura Feb 2017 A1
20170054702 Turgeman Feb 2017 A1
20170063858 Bandi Mar 2017 A1
20170076089 Turgeman Mar 2017 A1
20170085587 Turgeman Mar 2017 A1
20170090418 Tsang Mar 2017 A1
20170091450 Turgeman Mar 2017 A1
20170126735 Turgeman May 2017 A1
20170127197 Mulder May 2017 A1
20170140279 Turgeman May 2017 A1
20170149958 Xian May 2017 A1
20170154366 Turgeman Jun 2017 A1
20170177999 Novik Jun 2017 A1
20170193526 Turgeman Jul 2017 A1
20170195354 Kesin Jul 2017 A1
20170195356 Turgeman Jul 2017 A1
20170221064 Turgeman Aug 2017 A1
20170302340 Berlin Oct 2017 A1
20170364674 Grubbs Dec 2017 A1
20170364919 Ranganath Dec 2017 A1
20180012003 Asulin Jan 2018 A1
20180012227 Tunnell Jan 2018 A1
20180034850 Turgeman Feb 2018 A1
20180095596 Turgeman Apr 2018 A1
20180103047 Turgeman Apr 2018 A1
20180107836 Boger Apr 2018 A1
20180115899 Kedem Apr 2018 A1
20180121640 Turgeman May 2018 A1
20180160309 Turgeman Jun 2018 A1
20180314816 Turgeman Nov 2018 A1
20180349583 Turgeman Dec 2018 A1
20180350144 Rathod Dec 2018 A1
20180351959 Turgeman Dec 2018 A1
20180373780 Pascarella Dec 2018 A1
20190028497 Karabchevsky Jan 2019 A1
20190057200 Sabag Feb 2019 A1
20190121956 Turgeman Apr 2019 A1
20190156034 Kedem May 2019 A1
20190158535 Kedem May 2019 A1
20190220863 Novick Jul 2019 A1
20190236391 Novik Aug 2019 A1
20190272025 Turgeman Sep 2019 A1
20190342328 Rivner Nov 2019 A1
20190342329 Turgeman Nov 2019 A1
20200012770 Turgeman Jan 2020 A1
20200045044 Turgeman Feb 2020 A1
20200076816 Turgeman Mar 2020 A1
Foreign Referenced Citations (15)
Number Date Country
2410450 Jan 2012 EP
2477136 Jul 2012 EP
2541452 Jan 2013 EP
2610776 Jul 2013 EP
2646904 Aug 2018 EP
3019991 Feb 2019 EP
2338092 May 2010 ES
2005099166 Oct 2005 WO
2007146437 Dec 2007 WO
2012001697 Jan 2012 WO
2012073233 Jun 2012 WO
2013161077 Oct 2013 WO
2018007821 Jan 2018 WO
2018007823 Jan 2018 WO
2018055406 Mar 2018 WO
Non-Patent Literature Citations (42)
Entry
Communication from the European Patent Office (EPO) in EP 14814408, dated Oct. 15, 2019.
Ahmed et al., “A New Biometric Technology Based on Mouse Dynamics”, Jul.-Sep. 2007, IEEE Transactions on Dependable and Secure Computing, vol. 4, No. 3, pp. 165-179.
Bailey, Kyle O., “Computer Based Behavioral Biometric Authentication Via Multi-Modal Fusion”, Thesis, 2013, Air Force Insitute of Technology.
Elizabeth Stinson and John C. Mitchell, “Characterizing the Remote Control Behavior of Bots”, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, p. 89-108. Dec. 31, 2007.
Todorov, “Optimality Principles in Sensorimotor Control (Review)”, Sep. 2004, Nature Neuroscience 7, pp. 907-915.
Cleeff et al., “Security Implications of Virtualization: A Literature Study”, Science and Engineering, 2009.
Hibbeln et al., “Detecting Deception in Online Environments: Measuring Fraud Through Mouse Cursor Movements”, Jun. 7, 2014, Gmunden Retreat on NeurolS 2014 Gmunden Austria, p. 38.
Ferrie Peter, “Attack on Virtual Machine Emulators”, Symantec Technology Exchange, 2007.
Yampolskiy et al., “Behavioural Biometrics: a survey and classification”, 2008, International Journal of Biometrics, vol. 1, No. 1, pp. 81-113.
Provos et al., 2007, “The Ghost in the Browser: Analysis of Web-based Malware”.
Huang Yao-Wen et al., “Web application security assessment by fault injection and behavior monitoring”, 2003, Proceedings of the 12th international conference on World Wide Web, ACM.
Ben Hansen, “The Blur Busters Mouse Guide”, dated Feb. 1, 2014; printed from the Internet on Aug. 5, 2019 from: https://www.blurbusters.com/faq/mouse-guide/.
Chris Cain, “Analyzing Man-in-the-Browser (MITB) Attacks”, dated Dec. 2014; downloaded from the Internet on Aug. 5, 2019 from: https://www.sans.org/reading-room/whitepapers/forensics/analyzing-man-in-the-browser-mitb-attacks-35687.
International Search Report for PCT international application PCT/IL2018/051246, dated Mar. 11, 2019.
Written Opinion of the International Searching Authority for PCT international application PCT/IL2018/051246, dated Mar. 11, 2019.
Written Opinion of the International Searching Authority for PCT international application PCT/IL2011/000907, dated Apr. 19, 2012.
Written Opinion of the International Searching Authority for PCT international application PCT/IB2014/062293, dated Oct. 1, 2014.
Written Opinion of the International Searching Authority for PCT international application PCT/IB2014/062941, dated Dec. 17, 2014.
Written Opinion of the International Searching Authority for PCT international application PCT/IB2016/054064, dated Jul. 9, 2015.
Syed Ahsan Abbas et al., “What is the difference between a rooted and unrooted Android?” Ouora.com, dated Jul. 22, 2016, printed on Aug. 12, 2019 from: www.Quora.com/What-is-the-difference-between-a-rooted-and-unrooted-Android.
Sebastian Lindstrom, “Getting to know asynchronous JavaScript: Callbacks, Promises and Async / Await”, Medium.com, dated Jul. 2, 2017, printed on Aug. 12, 2019 from: Medium.com/codebuddies/getting-to-know-asynchronous-javascript-callbacks-promises-and-async-await-17e0673281ee.
Machine translation of WO 2013/161077 A1, “Biometric authentication device, biometric authentication program, and biometric authentication method”, Obtained on Jan. 24, 2020 from: https://patents.google.com/patent/WO2013161077A1/en?oq=JP2006277341A.
Oriana Riva et al., “Progressive authentication: Deciding when to authenticate on mobile phones”, USENIX Security Symposium 2012.
Faisal Alkhateeb et al., “Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies”, International Journal of Security and its Applications 6(4):53-66, Oct. 2012.
Sungzoon Cho et al., “Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication”, International Conference on Biometrics (ICB)—Advances in Biometrics, pp. 626-632, year 2006.
International Search Report for PCT/IB2017/055995, dated Feb. 15, 2018.
Written Opinion of the International Search Authority for PCT/IB2017/055995, dated Feb. 15, 2018.
Supplementary European Search Report for application 11844440 dated Nov. 17, 2017.
International Search Report for application PCT/IB2016/054064 dated Nov. 21, 2016.
International Search Report for application PCT/IB2014/062941 dated Dec. 17, 2014.
International Search Report for application PCT/IB2014/062293 dated Oct. 1, 2014.
International Search Report for application PCT/IL2011/000907 dated Apr. 19, 2012.
Nakkabi et al., “Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors with Separate Features”, Nov. 2010, IEEE Transactions on System, Man, and Cybernetics; vol. 40, No. 6.
Nance et al., “Virtual Machine Inkrospection”, IEEE Security & Privacy, 2008.
Garfinkel and Rosenblum, “A virtual Machine Introspection-Based Architecture for Intrusion Detection.”, 2003, Proc. Network and Distributed Systems Security Symp., The Internet Society, pp. 191-206.
Spafford et al., “Software Forensics: Can We Track Code to its Authors?”, Feb. 1992, Computer Science Technical Report, Purdue e-Pubs, Report No. CSD-TR-92-010.
Tavis Ormandy, “An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments”, retrieved from the Internet on May 3, 2017, from: http://taviso.decsystem.org/virtsec.pdf.
Zheng et al., “An Efficient User Verification System via Mouse Movements”, Oct. 17-21, 2011, CCS' 11, Chicago, Illinois.
Liston et al., “On the Cutting Edge: Thwarting Virtual Machine Detection” retrieved from the Internet on May 3, 2017, from: http://docplayer.net/9791309-On-the-cutting-edge-thwarting-virtual-machine-detection.html.
Georgia Frantzeskou et al., “Identifying Authorship by Byte-Level N-Grams: The source Code Author Profile (SCAP) Method”, Spring 2007, International Journal of Digital Evidence, vol. 6, issue 1.
Franklin et al., “Remote Detection of Virtual Machine Monitors with Fuzzy benchmarking”, ACM SIGOPS Operating Systems Review, V42, Issue 3, Apr. 2008.
Emmanouil Vasilomanolakis, “A honeypot-driven cyber incident monitor: Lessons learned and steps ahead”; Sep. 2015; SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks; Publisher: ACM; pp. 1-7.
Related Publications (1)
Number Date Country
20200045044 A1 Feb 2020 US
Provisional Applications (2)
Number Date Country
61843915 Jul 2013 US
61417479 Nov 2010 US
Continuation in Parts (6)
Number Date Country
Parent 15051700 Feb 2016 US
Child 16597860 US
Parent 14325397 Jul 2014 US
Child 15051700 US
Parent 13922271 Jun 2013 US
Child 14325397 US
Parent 13877676 US
Child 13922271 US
Parent 14320653 Jul 2014 US
Child 14325397 US
Parent 14320656 Jul 2014 US
Child 14320653 US