Step-up authentication

Information

  • Patent Grant
  • 11055395
  • Patent Number
    11,055,395
  • Date Filed
    Thursday, July 6, 2017
    7 years ago
  • Date Issued
    Tuesday, July 6, 2021
    3 years ago
Abstract
A method for identifying and/or authenticating a user on a device, the method comprising: requesting identification or authentication of the user for a first task; determining a first threshold in dependence on the first task; selecting a first authentication process from a plurality of authentication processes; determining a confidence score in dependence on a performance of the selected first authentication process, wherein the confidence score indicates a level of confidence in the user's identity; determining whether the confidence score is above or below the first threshold; and if the confidence score is below the first threshold, selecting a second authentication process from the plurality of authentication processes, otherwise identifying or authenticating the user for the first task.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a U.S. national phase application under 35 U.S.C. § 371 of International Application No. PCT/GB2017/051997, filed on Jul. 6, 2017, which claims the benefit of priority to GB Application No. 1611932.3, filed on Jul. 8, 2016, the entire contents of each of which are incorporated by reference herein for all purposes.


This invention relates to identifying or authenticating a user.


Identification and/or authentication of a user is an essential step in accessing many secure services or devices, such as banking, stored personal details or other restricted data. This identification and/or authentication is usually achieved by the use of passwords or personal identification numbers (PINs), which are usually assumed to be known only by the authorised user or users of a service or device.


However, knowledge of a user's password or PIN is enough for an unauthorised third party to gain access to the service or device. Thus, improved security measures have been introduced to reduce the risk of passwords and PINs from being used by unauthorised third parties. Such measures include using biometric information about the user, for example, scanning a user's fingerprint or using a camera to perform facial recognition. These improved measures have made it more difficult for unauthorised third parties to gain access but they can still be circumvented and may not always be available to the user. For example, a fingerprint scanner on a smartphone may not be functioning correctly and so a user may be required to use another less secure measure such as entering a PIN. There is, therefore, a need to ensure that a user can be securely identified/authenticated whilst also considering the user experience during identification/authentication so that the procedure is not overly onerous.


According to a first aspect there is provided a method for identifying and/or authenticating a user on a device, the method comprising: requesting identification or authentication of the user for a first task; determining a first threshold in dependence on the first task; selecting a first authentication process from a plurality of authentication processes; determining a confidence score in dependence on a performance of the selected first authentication process, wherein the confidence score indicates a level of confidence in the user's identity; determining whether the confidence score is above or below the first threshold; and if the confidence score is below the first threshold, selecting a second authentication process from the plurality of authentication processes, otherwise identifying or authenticating the user for the first task.


The second authentication process may be selected in dependence on a difference between the confidence score and the first threshold.


The first and/or second authentication process may be selected in dependence on the first task.


The method may further comprise updating the confidence score in dependence on a performance of the selected second authentication process.


The method may further comprise: requesting identification or authentication of the user for a second task; and determining a second threshold for the second task, wherein the second threshold is different to the first threshold.


The method may further comprise: determining whether the confidence score is above or below the second threshold; and if the confidence score is below the second threshold, selecting a third authentication process from the plurality of authentication processes, otherwise identifying or authenticating the user for the second task.


The first and/or second authentication process may be performed automatically by the device and/or a remote computing device.


The first threshold may be determined in dependence on the significance of the first task.


The plurality of authentication processes may comprise one or more biometric identification or authentication processes.


The method may further comprise: determining a lower threshold, wherein authentication of the user is rejected if the confidence score is determined to be below the lower threshold.


A system may be provided that is configured to perform the above method.


There may be provided computer program code for performing a method as claimed in any preceding claim. There may be provided non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system, cause the computer system to perform the above method.


The above features may be combined as appropriate, as would be apparent to a skilled person, and may be combined with any of the aspects of the examples described herein.





The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:



FIG. 1 shows an example of a device for identifying and/or authenticating a user.



FIG. 2 shows a flow chart that illustrates one example of identifying or authenticating a user for a task.





The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art.


The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.


For the purposes of this disclosure, identification typically involves the collection of data and a determination of who a user is from a database or other predetermined population of users, while authentication typically involves the use of data to confirm a user is who they present themselves to be (i.e. to verify a user's identity).



FIG. 1 illustrates an example of a device 10 which could be used to identify and/or authenticate a user for particular tasks. Identification and/or authentication of a user may be required in order to, for example: access the device 10 (e.g. unlocking the device); access local functions on the device 10 (e.g. accessing files or programs stored at the device 10); access remote functions via device 10 (e.g. accessing online banking facilities or databases at a remote server via a communications connection on the device 10), etc. Device 10 may be, for example, a smart device such as a smartphone or smartwatch, an ATM or other type of banking terminal, a payment terminal (such as a credit card machine) or any other suitable computing device.


The device 10 may comprise a camera 11, a display 12, a processor 13, a non-volatile memory or ROM 14, working memory or RAM 15, one or more sensors 16, a user input device 17 such a keypad or mouse and a communications interface 18 (which may a wired or wireless transceiver). In one example the display 12 may be a touchscreen, so it provides user input to the processor 13 in addition or alternatively to a separate user input device 17. The device may comprise a storage medium 19 such as flash memory. The ROM 14 may store program code that is executable by the processor 13. The program code may be stored in a non-transient form. The program code is executable by the processor 13 to perform some or all of the processes and functions described herein. Some of the processes and functions described herein may be performed at a computing device or system that is remote to device 10, such as one or more servers or cloud computing devices. The distribution of the processing burden may at least partly depend on the computational capabilities of the device 10 and remote computing device, and on the communication capabilities between the device 10 and remote computing device and/or the availability of communications networks between the devices. Preferably, device 10 collects information and sends that information to the remote computing device, where the majority of the processing is performed. However, the processes and functions described herein could be performed wholly or partly at either device.


The sensors 16 may be one or more sensors that are capable of gathering information about the user. For example, a GPS may be used to determine the location of the device and thus the user of the device. A motion sensor(s) (such as a gyroscope, accelerometer, pedometer, etc) may be used to derive biometric information about the user of the device (e.g. by using the sensors to determine typical movements and motions made by the user). The sensors 16 could be biometric sensors such as a fingerprint sensor, iris scanner, etc. Other ways of determining information about the user via other means are possible, for example, facial recognition via camera 11 and voice recognition via a microphone (not shown). The information gathered about the user may be used for certain authentication processes, as described below.


In operation, processor 13 may receive information from the user or information gathered about the user via the user input devices, the camera, sensors and/or the communications interface. That information may be processed to identify and/or authenticate the user, as described below. As mentioned above, some or all of the processing of this information may be performed at a remote computing device.


One way of providing increased security is to use multiple identification and/or authentication methods/processes and require that the user to pass all of the methods/processes before granting access. For example, a user may be required to position themselves in front camera for facial recognition as well as providing a passcode via a keypad. Although requiring a user to perform both of these methods increases security compared to performing just one of the methods, it also increases the time and effort required by the user to identify/authenticate themselves. Disclosed herein is an identification/authentication method that provides the improved security achieved from using multiple, different authentication processes but also allows the user to be identified/authenticated in a user-friendly manner.


A user may wish to be granted access for a particular task (e.g. accessing a smartphone, viewing bank account details, making a payment, etc). Each task may have different security requirements based on their significance or value. For example, it could be considered that accessing emails on a smartphone is more significant or valuable than taking a picture with that smartphone and so accessing emails may be considered to be a task requiring higher security than taking a picture. In another example, initiating a bank transfer may be considered to be more significant or valuable than viewing a bank statement and so initiating a bank transfer may be considered to be a task requiring higher security than viewing a bank statement. Thus, each task may be associated with certain level of security that is required to be met in order to allow a user to perform that task and each task may have a different level of security to other tasks. As will be discussed in more detail below, the present system may be configured such that in order for a user to be permitted to undertake an operation of greater significance or value that user must be identified or authenticated to a greater degree of confidence than in order for a user to be permitted to undertake an operation of lesser significance or value.


In the process described below, one or more processes for identifying and/or authenticating a user (also referred to herein as “authentication processes”) may be performed in order to determine if a user has met the security requirements for a particular task. These authentication processes could require the user to perform some sort of action and could be authentication processes such as entering a password/passcode, placing a finger on a fingerprint sensor, etc. The authentication processes could also be passive processes that could help identify or authenticate a user without requiring the user to perform a specific action or an action whose function is solely for identification or authentication purposes. For example, a passive authentication process could be determining a user location via GPS, monitoring user movement characteristics via an accelerometer, determining characteristics of a user's typing behaviour, etc.


The results of each authentication process may be checked against known data about an authorised user to determine a likelihood that the user being authenticated is the authorised user. The determined likelihood from each process may be used to determine a confidence score that indicates how likely the user is an authorised user. The confidence score may be generated based on the results from the authentication processes individually or a collective score from the results from multiple authentication processes.



FIG. 2 shows a flow diagram for identifying or authenticating a user for a task. That task may be, for example, unlocking a smartphone, accessing a bank account, accessing an email account, etc. The task may be associated with a level of security, as described above.


At step 201, an acceptance threshold for the task is determined. The acceptance threshold may be determined in dependence on the nature of the task. The acceptance threshold may be derived from the significance or level of security required for the task. For example, accessing a bank account may require a higher level of security than accessing an email account and so the acceptance threshold for accessing the bank account will be higher than the acceptance threshold for accessing the email account. The acceptance threshold may be a minimum confidence score that is required to be met in order to identify/authenticate the user for the particular task. The acceptance threshold for each task may be predetermined by the entity requesting the authentication (e.g. by a bank requesting authentication of a user attempting to access a bank account).


At step 202, an initial authentication process is determined. The initial authentication process for a particular task may be predetermined or may be selectable from a number of different authentication processes. In a first example, an initial authentication process for accessing a smartphone may be selected or predetermined to be a behavioural biometric associated with a user's activity with the smartphone, such as the user's location. In a second example, an initial authentication method for accessing a bank account may be selected or predetermined to be inputting a bank account number by a user.


At step 203, the initial authentication process is performed. For a passive authentication process (as described above) the process is performed automatically without requesting or requiring an input from the user. E.g., in the first example above, to perform the behavioural biometric authentication process, a processor at the smartphone may access a GPS sensor to determine the user's location. The initial authentication process may require a user to perform an action for the process. E.g., in the second example above, a user may be prompted to enter their bank account number.


At step 204, an initial confidence score is determined based on the performance of the initial authentication process. The confidence score determined may indicate the likelihood of the user being an authorised user based on the performance of the authentication process. Data generated about the performance of the authentication process may be compared to known data/attributes about an authorised user and the confidence score may be determined based on how closely the generated data correlates with the known data/attributes. The comparison may be performed by the user device 10 or at a remote computing device. E.g., in the first example above, the GPS data may indicate that the user of the smartphone is at the home address of the authorised user and so it is likely that the smartphone user is an authorised user. Whereas, if the GPS data indicated that the smartphone user was at a location that an authorised user had never visited before, then it is less likely that the smartphone user is an authorised user. The likelihood (which may be a probability value) of the user being an authorised user may be used to determine the confidence score. In the second example, a user may enter a correct or an incorrect bank account number and a confidence score is determined based on the entry. If incorrect numbers are entered, a confidence score may be determined based on how closely the inputted numbers match the correct bank account number. For example, if only a single digit was incorrect, a higher confidence score may be determined than if multiple numbers were incorrect.


Each authentication process may be weighted according to how secure or risky it is, or the level of confidence that it can provide in the identity of a user. For example, fingerprint scanning may be considered to be more secure (and less risky) at identifying a user than entering a pin number and so the result (whether positive or negative) of the fingerprint scanning process may be provided with a greater weighting than the result of the pin number process. The confidence score may be determined in dependence on the weighting attributed to each authentication process.


At step 205, it is determined if the confidence score is greater than or equal to the acceptance threshold. If so, then the process moves on to step 206, where the user is authorised and accepted for the task. If not, then the process moves on to step 207.


A lower rejection threshold may be provided. A user may be rejected from being identified/authorised for a task if the confidence score is below the rejection threshold. The rejection threshold may be adjustable and dependent on which authentication process is used. For example, a negative result from a facial recognition process is more reliable than a negative result from a behavioural biometric associated with the way a device is held (e.g. because an injured arm may cause a false-negative result). Thus, the rejection threshold for the facial recognition authentication process may be higher than the rejection threshold for the behavioural biometric associated with the way a device is held. The rejection threshold may be based on a measure of the cumulative reliability of multiple authentication processes. Alternatively, the rejection threshold may be a fixed, predetermined threshold.


At step 207, it is determined if the confidence score is less than the rejection threshold. If the confidence score is less than the rejection threshold, then the process moves on to step 208 where the user is not authorised and rejected (and the process ends for the task). If the confidence score is greater than the rejection threshold, then the process moves on to step 209. As mentioned above, the confidence score and rejection threshold used at this step may a confidence score and rejection threshold determined from a single authentication process. Alternatively, the confidence score may be a cumulative confidence score determined from the performance of multiple authentication processes and compared with a predetermined rejection threshold or a threshold based on the multiple authentication processes used.


At step 209, the confidence score has not yet met the acceptance threshold and so another authentication process is selected. The next authentication process may be selected from a set of authentication process available to the device performing the identification/authentication. The set of authentication processes may depend on the type of device and it capabilities. For example, a smartphone may have a camera, microphone, motion sensors and so numerous types of authentication process can be carried out at the smartphone. An ATM machine, however, may only be equipped with a keypad and touchscreen and so only a limited number of authentication process are available to the ATM machine.


If a cumulative confidence score is being used, the next authentication process may be selected based on a difference between the confidence score and the acceptance threshold. For example, if there is a large difference between the confidence score and the acceptance threshold, a more secure and reliable authentication process may be selected. If there is a small difference between the confidence score and the acceptance threshold, then a less secure and less reliable authentication process may be selected but may provide a confidence score sufficient to meet the threshold. E.g., in the first example above, there may be a large difference in the confidence score and the acceptance threshold (e.g. because the smartphone was in an unfamiliar location for the location test) and so a secure and reliable authentication process may be selected such as a fingerprint scan. Alternatively, if in the first example, there was a small difference in the confidence score, then an authentication process that may be considered to be less secure and reliable may be selected, such as a behavioural biometric associated with the way the user is holding the smartphone (e.g. in a portrait or landscape orientation). This authentication process is convenient for the user as it does not require any additional action from the user and can be determined automatically from accelerometer information indicating the smartphone's orientation.


At step 210, the selected authentication process is performed. Depending on the authentication process selected, performance of the process may require a user input or the authentication process may be performed by a processor and without user input, as described above.


At step 211, a confidence score is determined based on the performance of the selected authentication process. The confidence score for the selected authentication process may be determined as described above.


The process then returns to step 205, where the new confidence score is tested against the threshold. The new confidence score tested at step 205 may be the last determined confidence score based on a single authentication process being performed or a combined score of some or all of the confidence scores that that been determined (e.g. from step 204 and from the loops around steps 205-211). If the confidence score is now above the acceptance threshold, the process moves on to step 206. If the confidence score remains below the acceptance threshold, then the process continues again from step 207.


If a combined confidence score is accumulated from the performance of some of all of the authentication processes, then a confidence score may be maintained in memory and updated each time the process loops from step 211 to step 205. Each update may increase or decrease the maintained confidence score depending on the result of the authentication process. For example, a positive result may increase the confidence score and a negative result may decrease the score. The amount of increase or decrease may be dependent on the likelihood that the user is an authorised user from each authentication process performed.


The process can loop between steps 205 and 211 until all of the available authentication process have been exhausted. If, after all of the available authentication process have been used and the confidence score is still below the acceptance threshold (and above the rejection threshold) then the user may be rejected. This is indicated in FIG. 2 by the dashed arrow from step 209 to step 208.


The confidence score determined by the end of the process of FIG. 2 for a particular task may be maintained and used for the identification or authentication of the user for a subsequent task. For example, if a user was accepted for a first task (at step 206), the confidence score used to accept the user for that first task may be stored so that it can be used for a subsequent second task. For the subsequent second task, an acceptance threshold for that task is determined, similarly to step 201. Subsequently, steps 202 and 203 may be skipped as a confidence score has already been determined from authenticating the user for the first task. At step 204, the initial confidence score for the second task is determined to be the confidence score from the first task. This confidence score is then compared with the threshold for the second task at step 205. The process for the second task then continues from step 205 until the user is either accepted or rejected for that task. In the time between the first and second tasks, the maintained confidence score may be updated in dependence on behavioural biometrics sensed about the user. For example, after the user is authenticated for the first task on a smartphone, the user's activity with the smartphone may be monitored and compared with previous known activity of an authorised user to update the confidence score. The updated confidence score may then be compared against the thresholds determined for the second task.


As mentioned above, the acceptance threshold may vary depending on the task for which the user is being identified/authenticated for. Providing a variable threshold in this way allows a device to select an appropriate authentication process for each task. For example, an appropriate high-security or low-security authentication process can be selected depending on the confidence score required to meet the acceptance threshold. E.g., as mentioned above, if the difference between the confidence score and the acceptance threshold is low, a low-security authentication process may be selected instead of a high-security process, which may be more onerous than a low-security process. In some cases, the low-security authentication process selected may not require any effort by the user and the device can automatically perform the low-security process without involving the user. This can lead to an overall reduction in the amount of actions required to be performed by the user without compromising on the increased security afforded by the use of multiple authentication processes.


If a user has been identified and/or authenticated to a first level of confidence by a first process and it is desired to select a second process for identify and/or authenticate the user to an increased level of confidence, the method for selecting the second process may take account of the degree of independence between the two processes. The second process may be selected as being one with a relatively high independence of the first process. For example, if in a first process the user has been identified based on their location, a second process that is dependent on the wireless networks currently available to the device might be considered to have a low level of independence. This allows the second process to provide a greater degree of additional confidence than would otherwise be the case.


The device of FIG. 1 is shown as comprising a number of functional blocks. This is schematic only and is not intended to define a strict division between different logic elements of such entities. Each functional block may be provided in any suitable manner.


Generally, any of the functions, methods, techniques or components described above can be implemented in software, firmware, hardware (e.g., fixed logic circuitry), or any combination thereof. The terms “module,” “functionality,” “component”, “element”, “unit”, “block” and “logic” may be used herein to generally represent software, firmware, hardware, or any combination thereof. In the case of a software implementation, the module, functionality, component, element, unit, block or logic represents program code that performs the specified tasks when executed on a processor. The algorithms and methods described herein could be performed by one or more processors executing code that causes the processor(s) to perform the algorithms/methods. Examples of a computer-readable storage medium include a random-access memory (RAM), read-only memory (ROM), an optical disc, flash memory, hard disk memory, and other memory devices that may use magnetic, optical, and other techniques to store instructions or other data and that can be accessed by a machine.


A processor, computer, or computer system may be any kind of device, machine or dedicated circuit, or collection or portion thereof, with processing capability such that it can execute instructions. A processor may be any kind of general purpose or dedicated processor, such as a CPU, GPU, System-on-chip, state machine, media processor, an application-specific integrated circuit (ASIC), a programmable logic array, a field-programmable gate array (FPGA), or the like. A computer or computer system may comprise one or more processors.


The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.

Claims
  • 1. A method for identifying and/or authenticating a user on a device capable of performing a plurality of tasks, the method comprising:
  • 2. The method as claimed in claim 1, wherein the first and/or second authentication process is performed automatically by the device and/or a remote computing device.
  • 3. The method as claimed in claim 1, wherein the ATV is determined in dependence on the significance of the first task.
  • 4. The method as claimed in claim 1, wherein the plurality of authentication processes comprises one or more biometric identification or authentication processes.
  • 5. A non-transitory storage medium having stored thereon instructions that, when executed by one or more processors, cause the one or more processor to perform a method, wherein the method is a method for identifying and/or authenticating a user on a device capable of performing a plurality of tasks, the method comprising:
  • 6. A system comprising: one or more processors, operably associated with one or more memory units;wherein the one or more processors are configured to identify and/or authenticate a user on a device capable of performing a plurality of tasks,wherein the one or more processors are configured:
Priority Claims (1)
Number Date Country Kind
1611932 Jul 2016 GB national
PCT Information
Filing Document Filing Date Country Kind
PCT/GB2017/051997 7/6/2017 WO 00
Publishing Document Publishing Date Country Kind
WO2018/007823 1/11/2018 WO A
US Referenced Citations (551)
Number Name Date Kind
3618019 Nemirovsky Nov 1971 A
3699517 Dyche Oct 1972 A
3983535 Herbst Sep 1976 A
4128829 Herbst Dec 1978 A
4621334 Garcia Nov 1986 A
4760386 Heath Jul 1988 A
4805222 Young Feb 1989 A
5305238 Starr Apr 1994 A
5442342 Kung Aug 1995 A
5485171 Copper Jan 1996 A
5557686 Brown Sep 1996 A
5565657 Merz Oct 1996 A
5581261 Hickman Dec 1996 A
5838306 O'Connor Nov 1998 A
5874941 Yamada Feb 1999 A
5999162 Takahashi Dec 1999 A
6202023 Hancock Mar 2001 B1
6337686 Wong Jan 2002 B2
6337919 Dunton Jan 2002 B1
6442692 Zilberman Aug 2002 B1
6572014 Lambert Jun 2003 B1
6743022 Sarel Jun 2004 B1
6819219 Bolle Nov 2004 B1
6836554 Bolle Dec 2004 B1
6895514 Kermani May 2005 B1
6931131 Becker Aug 2005 B1
6938061 Rumynin Aug 2005 B1
6938159 O'Connor Aug 2005 B1
6957185 Labaton Oct 2005 B1
6957186 Guheen Oct 2005 B1
6983061 Ikegami Jan 2006 B2
7092926 Cerrato Aug 2006 B2
7130452 Bolle Oct 2006 B2
7133792 Murakami Nov 2006 B2
7139916 Billingsley Nov 2006 B2
7158118 Liberty Jan 2007 B2
7236156 Liberty Jun 2007 B2
7245218 Ikehara Jul 2007 B2
7366919 Sobel Apr 2008 B1
7395436 Nemovicher Jul 2008 B1
7494061 Reinhold Feb 2009 B2
7523191 Thomas Apr 2009 B1
7535456 Liberty May 2009 B2
7606915 Calinov Oct 2009 B1
7796013 Murakami Sep 2010 B2
7815106 McConnell Oct 2010 B1
7818290 Davis Oct 2010 B2
7860870 Sadagopan Dec 2010 B2
8031175 Rigazio Oct 2011 B2
8065624 Morin Nov 2011 B2
8125312 Orr Feb 2012 B2
8156324 Shnowske Apr 2012 B1
8170953 Tullis May 2012 B1
8171085 Tevanian, Jr. May 2012 B1
8201222 Inoue Jun 2012 B2
8244211 Clark Aug 2012 B2
8285658 Kellas-Dicks Oct 2012 B1
8417960 Takahashi Apr 2013 B2
8433785 Awadallah Apr 2013 B2
8449393 Sobel May 2013 B2
8499245 Froment Jul 2013 B1
8510113 Conkie Aug 2013 B1
8548208 Schultz Oct 2013 B2
8549629 Mccreesh Oct 2013 B1
8555077 Davis Oct 2013 B2
8621209 Johansson Dec 2013 B1
8745729 Poluri Jun 2014 B2
8788838 Fadell Jul 2014 B1
8803797 Scott Aug 2014 B2
8819812 Weber Aug 2014 B1
8832823 Boss Sep 2014 B2
8838060 Walley Sep 2014 B2
8880441 Chen Nov 2014 B1
8898787 Thompson Nov 2014 B2
8904479 Johansson Dec 2014 B1
8938787 Turgeman Jan 2015 B2
8941466 Bayram Jan 2015 B2
8990959 Zhu Mar 2015 B2
9069942 Turgeman Jun 2015 B2
9071969 Turgeman Jun 2015 B2
9154534 Gayles Oct 2015 B1
9174123 Nasiri Nov 2015 B2
9195351 Rosenberg Nov 2015 B1
9203860 Casillas Dec 2015 B1
9275337 Turgeman Mar 2016 B2
9282112 Filatov Mar 2016 B2
9301140 Costigan Mar 2016 B1
9304915 Adams Apr 2016 B2
9355231 Disraeli May 2016 B2
9355234 Magi Shaashua May 2016 B1
9418221 Turgeman Aug 2016 B2
9430629 Ziraknejad Aug 2016 B1
9450971 Turgeman Sep 2016 B2
9477826 Turgeman Oct 2016 B2
9483292 Turgeman Nov 2016 B2
9526006 Turgeman Dec 2016 B2
9529987 Deutschmann Dec 2016 B2
9531701 Turgeman Dec 2016 B2
9531733 Turgeman Dec 2016 B2
9536071 Turgeman Jan 2017 B2
9541995 Turgeman Jan 2017 B2
9547766 Turgeman Jan 2017 B2
9552470 Turgeman Jan 2017 B2
9558339 Turgeman Jan 2017 B2
9589120 Samuel Mar 2017 B2
9621567 Turgeman Apr 2017 B2
9626677 Turgeman Apr 2017 B2
9654485 Neumann May 2017 B1
9665703 Turgeman May 2017 B2
9674218 Turgeman Jun 2017 B2
9690915 Turgeman Jun 2017 B2
9703953 Turgeman Jul 2017 B2
9710316 Chheda Jul 2017 B1
9712558 Turgeman Jul 2017 B2
9747436 Turgeman Aug 2017 B2
9779423 Turgeman Oct 2017 B2
9832192 Alonso Cebrian Nov 2017 B2
9838373 Turgeman Dec 2017 B2
9848009 Turgeman Dec 2017 B2
9927883 Lin Mar 2018 B1
10032010 Turgeman Jul 2018 B2
10037421 Turgeman Jul 2018 B2
10049209 Turgeman Aug 2018 B2
10055560 Turgeman Aug 2018 B2
10069837 Turgeman Sep 2018 B2
10069852 Turgeman Sep 2018 B2
10079853 Turgeman Sep 2018 B2
10083439 Turgeman Sep 2018 B2
10164985 Turgeman Dec 2018 B2
10198122 Turgeman Feb 2019 B2
10262324 Turgeman Apr 2019 B2
10298614 Turgeman May 2019 B2
10395018 Turgeman Aug 2019 B2
10397262 Karabchevsky Aug 2019 B2
10404729 Turgeman Sep 2019 B2
10474815 Turgeman Nov 2019 B2
10476873 Turgeman Nov 2019 B2
10523680 Turgeman Dec 2019 B2
10579784 Turgeman Mar 2020 B2
10586036 Turgeman Mar 2020 B2
10621585 Turgeman Apr 2020 B2
10685355 Novick Jun 2020 B2
10719765 Novik Jul 2020 B2
10728761 Kedem Jul 2020 B2
10747305 Turgeman Aug 2020 B2
10776476 Turgeman Sep 2020 B2
10834090 Turgeman Nov 2020 B2
10834590 Turgeman Nov 2020 B2
10897482 Rivner Jan 2021 B2
10917431 Turgeman Feb 2021 B2
10949514 Turgeman Mar 2021 B2
10949757 Turgeman Mar 2021 B2
20010004733 Eldering Jun 2001 A1
20020023229 Hangai Feb 2002 A1
20020089412 Heger Jul 2002 A1
20030033526 French Feb 2003 A1
20030074201 Grashey Apr 2003 A1
20030137494 Tulbert Jul 2003 A1
20030149803 Wilson Aug 2003 A1
20030212811 Thornton Nov 2003 A1
20040015714 Abraham Jan 2004 A1
20040017355 Shim Jan 2004 A1
20040021643 Hoshino Feb 2004 A1
20040034784 Fedronic Feb 2004 A1
20040062423 Doi Apr 2004 A1
20040111523 Hall Jun 2004 A1
20040123156 Hammond Jun 2004 A1
20040128240 Yusin Jul 2004 A1
20040143737 Teicher Jul 2004 A1
20040186882 Ting Sep 2004 A1
20040187037 Checco Sep 2004 A1
20040221171 Ahmed Nov 2004 A1
20050008148 Jacobson Jan 2005 A1
20050060138 Wang Mar 2005 A1
20050179657 Russo Aug 2005 A1
20050289264 Illowsky Dec 2005 A1
20060006803 Huang Jan 2006 A1
20060080263 Willis Apr 2006 A1
20060090073 Steinberg Apr 2006 A1
20060123101 Buccella Jun 2006 A1
20060143454 Walmsley Jun 2006 A1
20060195328 Abraham Aug 2006 A1
20060215886 Black Sep 2006 A1
20060224898 Ahmed Oct 2006 A1
20060238490 Stanley Oct 2006 A1
20060239430 Gue Oct 2006 A1
20060280339 Cho Dec 2006 A1
20060282660 Varghese Dec 2006 A1
20060284969 Kim Dec 2006 A1
20060287079 Nonaka Dec 2006 A1
20070118804 Raciborski May 2007 A1
20070156443 Gurvey Jul 2007 A1
20070174082 Singh Jul 2007 A1
20070183633 Hoffmann Aug 2007 A1
20070198286 Tomita Aug 2007 A1
20070214426 Ruelle Sep 2007 A1
20070226797 Thompson Sep 2007 A1
20070236330 Cho Oct 2007 A1
20070240230 O'Connell Oct 2007 A1
20070241861 Venkatanna Oct 2007 A1
20070250920 Lindsay Oct 2007 A1
20070255821 Ge Nov 2007 A1
20070266305 Cong Nov 2007 A1
20070271466 Mak Nov 2007 A1
20070283416 Renaud Dec 2007 A1
20080046982 Parkinson Feb 2008 A1
20080059474 Lim Mar 2008 A1
20080066167 Andri Mar 2008 A1
20080068343 Hoshino Mar 2008 A1
20080084972 Burke Apr 2008 A1
20080091453 Meehan Apr 2008 A1
20080091639 Davis Apr 2008 A1
20080092209 Davis Apr 2008 A1
20080092245 Alward Apr 2008 A1
20080097851 Bemmel Apr 2008 A1
20080098456 Alward Apr 2008 A1
20080120717 Shakkarwar May 2008 A1
20080136790 Hio Jun 2008 A1
20080162449 Chao-Yu Jul 2008 A1
20080183745 Cancel Jul 2008 A1
20080192005 Elgoyhen Aug 2008 A1
20080200310 Tagliabue Aug 2008 A1
20080211766 Westerman Sep 2008 A1
20080215576 Zhao Sep 2008 A1
20080263636 Gusler Oct 2008 A1
20080298588 Shakkarwar Dec 2008 A1
20080301808 Calo Dec 2008 A1
20080306897 Liu Dec 2008 A1
20080307236 Lu Dec 2008 A1
20080309616 Massengill Dec 2008 A1
20080319841 Oliver Dec 2008 A1
20090037983 Chiruvolu Feb 2009 A1
20090038010 Ma Feb 2009 A1
20090049555 Cho Feb 2009 A1
20090083850 Fadell Mar 2009 A1
20090089879 Wang Apr 2009 A1
20090094311 Awadallah Apr 2009 A1
20090132395 Lam May 2009 A1
20090133106 Bentley May 2009 A1
20090134972 Wu, Jr. May 2009 A1
20090157792 Fiatal Jun 2009 A1
20090172551 Kane Jul 2009 A1
20090177562 Peace Jul 2009 A1
20090189736 Hayashi Jul 2009 A1
20090199296 Xie Aug 2009 A1
20090203355 Clark Aug 2009 A1
20090227232 Matas Sep 2009 A1
20090241188 Komura Sep 2009 A1
20090254336 Dumais Oct 2009 A1
20090281979 Tysowski Nov 2009 A1
20090293119 Jonsson Nov 2009 A1
20090299967 Li Dec 2009 A1
20090300589 Watters Dec 2009 A1
20090303204 Nasiri Dec 2009 A1
20090320123 Yu Dec 2009 A1
20100007632 Yamazaki Jan 2010 A1
20100040293 Hermann Feb 2010 A1
20100042387 Gibbon Feb 2010 A1
20100042403 Chandrasekar Feb 2010 A1
20100046806 Baughman Feb 2010 A1
20100070405 Joa Mar 2010 A1
20100077470 Kozat Mar 2010 A1
20100082747 Yue Apr 2010 A1
20100082998 Kohavi Apr 2010 A1
20100097324 Anson Apr 2010 A1
20100115610 Tredoux May 2010 A1
20100122082 Deng May 2010 A1
20100125816 Bezos May 2010 A1
20100138370 Wu Jun 2010 A1
20100164897 Morin Jul 2010 A1
20100171753 Kwon Jul 2010 A1
20100197352 Runstedler Aug 2010 A1
20100203876 Krishnaswamy Aug 2010 A1
20100225443 Bayram Sep 2010 A1
20100245553 Schuler Sep 2010 A1
20100269165 Chen Oct 2010 A1
20100281539 Burns Nov 2010 A1
20100284532 Burnett Nov 2010 A1
20100287229 Hauser Nov 2010 A1
20100321304 Rofougaran Dec 2010 A1
20100328074 Johnson Dec 2010 A1
20110010209 McNally Jan 2011 A1
20110012829 Yao Jan 2011 A1
20110016320 Bergsten Jan 2011 A1
20110016534 Jakobsson Jan 2011 A1
20110018828 Wu Jan 2011 A1
20110023115 Wright Jan 2011 A1
20110029902 Bailey Feb 2011 A1
20110039529 Kim Feb 2011 A1
20110039602 McNamara Feb 2011 A1
20110043475 Rigazio Feb 2011 A1
20110050394 Zhang Mar 2011 A1
20110055077 French Mar 2011 A1
20110063211 Hoerl Mar 2011 A1
20110065504 Dugan Mar 2011 A1
20110066682 Aldunate Mar 2011 A1
20110082768 Eisen Apr 2011 A1
20110102570 Wilf May 2011 A1
20110105103 Ullrich May 2011 A1
20110105859 Popovic May 2011 A1
20110113388 Eisen May 2011 A1
20110119370 Huang May 2011 A1
20110134240 Anderson Jun 2011 A1
20110154273 Aburada Jun 2011 A1
20110154497 Bailey Jun 2011 A1
20110159650 Shiraishi Jun 2011 A1
20110159850 Faith Jun 2011 A1
20110162076 Song Jun 2011 A1
20110191820 Ivey Aug 2011 A1
20110193737 Chiueh Aug 2011 A1
20110196791 Dominguez Aug 2011 A1
20110202453 Issa Aug 2011 A1
20110221684 Rydenhag Sep 2011 A1
20110223888 Esaki Sep 2011 A1
20110225644 Pullikottil Sep 2011 A1
20110246902 Tsai Oct 2011 A1
20110248941 Abdo Oct 2011 A1
20110251823 Davis Oct 2011 A1
20110271342 Chung Nov 2011 A1
20110276414 Subbarao Nov 2011 A1
20110286730 Gallagher Nov 2011 A1
20110300831 Chin Dec 2011 A1
20110304531 Brooks Dec 2011 A1
20110320822 Lind Dec 2011 A1
20120005483 Patvarczki Jan 2012 A1
20120005719 McDougal Jan 2012 A1
20120007821 Zaliva Jan 2012 A1
20120054834 King Mar 2012 A1
20120072982 Ranganathan Mar 2012 A1
20120096555 Mahaffey Apr 2012 A1
20120101930 Li Apr 2012 A1
20120102551 Bidare Apr 2012 A1
20120113061 Ikeda May 2012 A1
20120123932 LeCuyer May 2012 A1
20120124662 Baca May 2012 A1
20120133055 Machida May 2012 A1
20120151044 Luna Jun 2012 A1
20120151559 Koudys Jun 2012 A1
20120154173 Chang Jun 2012 A1
20120154273 McDade Jun 2012 A1
20120154823 Sakamoto Jun 2012 A1
20120158503 Mardikar Jun 2012 A1
20120159599 Szoke Jun 2012 A1
20120164978 Conti Jun 2012 A1
20120167170 Shi Jun 2012 A1
20120167204 Akka Jun 2012 A1
20120174213 Geiger Jul 2012 A1
20120188198 Jeong Jul 2012 A1
20120204257 O'Connell Aug 2012 A1
20120218193 Weber Aug 2012 A1
20120239557 Weinflash Sep 2012 A1
20120246737 Paxton Sep 2012 A1
20120252410 Williams Oct 2012 A1
20120278804 Narayanasamy Nov 2012 A1
20120278886 Luna Nov 2012 A1
20120284380 Anderson Nov 2012 A1
20120297476 Zeljkovic Nov 2012 A1
20130018796 Kolhatkar Jan 2013 A1
20130024239 Baker Jan 2013 A1
20130036416 Raju Feb 2013 A1
20130061169 Pearcy Mar 2013 A1
20130076650 Vik Mar 2013 A1
20130088434 Masuda Apr 2013 A1
20130097682 Zeljkovic Apr 2013 A1
20130097706 Titonis Apr 2013 A1
20130109944 Sparacino May 2013 A1
20130111586 Jackson May 2013 A1
20130132091 Skerpac May 2013 A1
20130133055 Ali May 2013 A1
20130135218 Jain May 2013 A1
20130139248 Rhee May 2013 A1
20130154999 Guard Jun 2013 A1
20130162603 Peng Jun 2013 A1
20130167212 Azar Jun 2013 A1
20130173737 Liu Jul 2013 A1
20130198832 Draluk Aug 2013 A1
20130212674 Boger Aug 2013 A1
20130226992 Bapst Aug 2013 A1
20130237272 Prasad Sep 2013 A1
20130239195 Turgeman Sep 2013 A1
20130239206 Draluk Sep 2013 A1
20130243208 Fawer Sep 2013 A1
20130254642 Seo Sep 2013 A1
20130282637 Costigan Oct 2013 A1
20130288647 Turgeman Oct 2013 A1
20130305357 Ayyagari Nov 2013 A1
20130312097 Turnbull Nov 2013 A1
20130335349 Ferren Dec 2013 A1
20130346309 Giori Dec 2013 A1
20130346311 Boding Dec 2013 A1
20140033317 Barber Jan 2014 A1
20140041020 Zhao Feb 2014 A1
20140078061 Simons Mar 2014 A1
20140078193 Barnhoefer Mar 2014 A1
20140082369 Waclawsky Mar 2014 A1
20140111451 Park Apr 2014 A1
20140114843 Klein Apr 2014 A1
20140118520 Slaby May 2014 A1
20140123275 Azar May 2014 A1
20140143304 Hegarty May 2014 A1
20140168093 Lawrence Jun 2014 A1
20140196119 Hill Jul 2014 A1
20140200953 Mun Jul 2014 A1
20140223531 Outwater Aug 2014 A1
20140244499 Gruner Aug 2014 A1
20140250538 Rapaport Sep 2014 A1
20140259130 Li Sep 2014 A1
20140270571 Dwan Sep 2014 A1
20140283059 Sambamurthy Sep 2014 A1
20140283068 Call Sep 2014 A1
20140289833 Briceno Sep 2014 A1
20140310764 Tippett Oct 2014 A1
20140317028 Turgeman Oct 2014 A1
20140317726 Turgeman Oct 2014 A1
20140317734 Valencia Oct 2014 A1
20140317744 Turgeman Oct 2014 A1
20140325223 Turgeman Oct 2014 A1
20140325645 Turgeman Oct 2014 A1
20140325646 Turgeman Oct 2014 A1
20140325682 Turgeman Oct 2014 A1
20140337786 Luo Nov 2014 A1
20140344927 Turgeman Nov 2014 A1
20150002479 Kawamura Jan 2015 A1
20150012920 De Santis Jan 2015 A1
20150062078 Christman Mar 2015 A1
20150081549 Kimberg Mar 2015 A1
20150091858 Rosenberg Apr 2015 A1
20150094030 Turgeman Apr 2015 A1
20150101031 Harjanto Apr 2015 A1
20150128252 Konami May 2015 A1
20150146945 Han May 2015 A1
20150205944 Turgeman Jul 2015 A1
20150205955 Turgeman Jul 2015 A1
20150205957 Turgeman Jul 2015 A1
20150205958 Turgeman Jul 2015 A1
20150212843 Turgeman Jul 2015 A1
20150213244 Lymberopoulos Jul 2015 A1
20150213245 Tartz Jul 2015 A1
20150213246 Turgeman Jul 2015 A1
20150213251 Turgeman Jul 2015 A1
20150242601 Griffiths Aug 2015 A1
20150256528 Turgeman Sep 2015 A1
20150256556 Kaminsky Sep 2015 A1
20150264572 Turgeman Sep 2015 A1
20150268768 Woodhull Sep 2015 A1
20150279155 Chun Oct 2015 A1
20150310196 Turgeman Oct 2015 A1
20150348038 Femrite Dec 2015 A1
20150358317 Deutschmann Dec 2015 A1
20160006800 Summers Jan 2016 A1
20160012465 Sharp Jan 2016 A1
20160019546 Eisen Jan 2016 A1
20160034673 Chandra Feb 2016 A1
20160042164 Goldsmith Feb 2016 A1
20160048937 Mathura Feb 2016 A1
20160055324 Agarwal Feb 2016 A1
20160057623 Dutt Feb 2016 A1
20160077620 Choi Mar 2016 A1
20160087952 Tartz Mar 2016 A1
20160109969 Keating Apr 2016 A1
20160132105 Turgeman May 2016 A1
20160155126 D'Uva Jun 2016 A1
20160164905 Pinney Wood Jun 2016 A1
20160164906 Pinney Wood Jun 2016 A1
20160174044 Jones Jun 2016 A1
20160179245 Johansson Jun 2016 A1
20160182503 Cheng Jun 2016 A1
20160191237 Roth Jun 2016 A1
20160196414 Stuntebeck Jul 2016 A1
20160197918 Turgeman Jul 2016 A1
20160209948 Tulbert Jul 2016 A1
20160226865 Chen Aug 2016 A1
20160241555 Vo Aug 2016 A1
20160294837 Turgeman Oct 2016 A1
20160300049 Guedalia Oct 2016 A1
20160300054 Turgeman Oct 2016 A1
20160306974 Turgeman Oct 2016 A1
20160307191 Turgeman Oct 2016 A1
20160307201 Turgeman Oct 2016 A1
20160321445 Turgeman Nov 2016 A1
20160321689 Turgeman Nov 2016 A1
20160328572 Valacich Nov 2016 A1
20160342826 Apostolos Nov 2016 A1
20160344783 Kushimoto Nov 2016 A1
20160364138 Luo Dec 2016 A1
20160366177 Turgeman Dec 2016 A1
20160371476 Turgeman Dec 2016 A1
20170011217 Turgeman Jan 2017 A1
20170012988 Turgeman Jan 2017 A1
20170017781 Turgeman Jan 2017 A1
20170032114 Turgeman Feb 2017 A1
20170034210 Talmor Feb 2017 A1
20170048272 Yamamura Feb 2017 A1
20170054702 Turgeman Feb 2017 A1
20170063858 Bandi Mar 2017 A1
20170076089 Turgeman Mar 2017 A1
20170085587 Turgeman Mar 2017 A1
20170090418 Tsang Mar 2017 A1
20170091450 Turgeman Mar 2017 A1
20170126735 Turgeman May 2017 A1
20170127197 Mulder May 2017 A1
20170140279 Turgeman May 2017 A1
20170149958 Xian May 2017 A1
20170154366 Turgeman Jun 2017 A1
20170177999 Novik Jun 2017 A1
20170193526 Turgeman Jul 2017 A1
20170195354 Kesin Jul 2017 A1
20170195356 Turgeman Jul 2017 A1
20170221064 Turgeman Aug 2017 A1
20170302340 Berlin Oct 2017 A1
20170364674 Grubbs Dec 2017 A1
20170364919 Ranganath Dec 2017 A1
20180012003 Asulin Jan 2018 A1
20180012227 Tunnell Jan 2018 A1
20180034850 Turgeman Feb 2018 A1
20180046792 Toqan Feb 2018 A1
20180095596 Turgeman Apr 2018 A1
20180097841 Stolarz Apr 2018 A1
20180103047 Turgeman Apr 2018 A1
20180107836 Boger Apr 2018 A1
20180115899 Kedem Apr 2018 A1
20180121640 Turgeman May 2018 A1
20180160309 Turgeman Jun 2018 A1
20180302425 Esman, Sr. Oct 2018 A1
20180314816 Turgeman Nov 2018 A1
20180349583 Turgeman Dec 2018 A1
20180350144 Rathod Dec 2018 A1
20180351959 Turgeman Dec 2018 A1
20180373780 Pascarella Dec 2018 A1
20190028497 Karabchevsky Jan 2019 A1
20190057200 Sabag Feb 2019 A1
20190121956 Turgeman Apr 2019 A1
20190124068 Anders Apr 2019 A1
20190156034 Kedem May 2019 A1
20190158535 Kedem May 2019 A1
20190220863 Novick Jul 2019 A1
20190236391 Novik Aug 2019 A1
20190272025 Turgeman Sep 2019 A1
20190342328 Rivner Nov 2019 A1
20190342329 Turgeman Nov 2019 A1
20200012770 Turgeman Jan 2020 A1
20200045044 Turgeman Feb 2020 A1
20200076816 Turgeman Mar 2020 A1
20200234306 Turgeman Jul 2020 A1
20200273040 Novick Aug 2020 A1
20200327212 Kedem Oct 2020 A1
20200327422 Novik Oct 2020 A1
20210004451 Novik Jan 2021 A1
20210014236 Turgeman Jan 2021 A1
20210021997 Turgeman Jan 2021 A1
20210051172 Turgeman Feb 2021 A1
Foreign Referenced Citations (17)
Number Date Country
2410450 Jan 2012 EP
2477136 Jul 2012 EP
2541452 Jan 2013 EP
2610776 Jul 2013 EP
2646904 Aug 2018 EP
3019991 Feb 2019 EP
2338092 May 2010 ES
2005099166 Oct 2005 WO
2007146437 Dec 2007 WO
2012001697 Jan 2012 WO
2012073233 Jun 2012 WO
2013161077 Oct 2013 WO
2015127253 Aug 2015 WO
2016080995 May 2016 WO
2018007821 Jan 2018 WO
2018007823 Jan 2018 WO
2018055406 Mar 2018 WO
Non-Patent Literature Citations (54)
Entry
International Search Report and Written Opinion for PCT/GB2017/051997 dated Jan. 9, 2017, 12 pages.
Search Report for GB 1611932.3 dated Jan. 5, 2017, 4 pages.
Riva et al.; “Progressive authentication: deciding when to authenticate on mobile phones,” Jan. 2012, 16 pages.
Faisal Alkhateeb et al., “Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies”, International Journal of Security and its Applications 6(4):53-66, Oct. 2012.
Sungzoon Cho et al., “Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication”, International Conference on Biometrics (ICB)—Advances in Biometrics, pp. 626-632, year 2006.
International Search Report for PCT/IB2017/055995, dated Feb. 15, 2018.
Written Opinion of the International Search Authority for PCT/IB2017/055995, dated Feb. 15, 2018.
Supplementary European Search Report for application 11844440 dated Nov. 17, 2017.
International Search Report for application PCT/IB2016/054064 dated Nov. 21, 2016.
International Search Report for application PCT/IB2014/062941 dated Dec. 17, 2014.
International Search Report for application PCT/IB2014/062293 dated Oct. 1, 2014.
International Search Report for application PCT/IL2011/000907 dated Apr. 19, 2012.
Nakkabi et al., “Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors with Separate Features”, Nov. 2010, IEEE Transactions on System, Man, and Cybernetics; vol. 40, No. 6.
Nance et al., “Virtual Machine Introspection”, IEEE Security & Privacy, 2008.
Garfinkel and Rosenblum, “A virtual Machine Introspection-Based Architecture for Intrusion Detection.”, 2003, Proc. Network and Distributed Systems Security Symp., The Internet Society, pp. 191-206.
Spafford et al., “Software Forensics: Can We Track Code to its Authors?”, Feb. 1992, Computer Science Technical Report, Purdue e-Pubs, Report No. CSD-TR-92-010.
Tavis Ormandy, “An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments”, retrieved from the Internet on May 3, 2017, from: http://taviso.decsystem.org/virtsec.pdf.
Zheng et al., “An Efficient User Verification System via Mouse Movements”, Oct. 17-21, 2011, CCS' 11, Chicago, Illinois.
Liston et al., “On the Cutting Edge: Thwarting Virtual Machine Detection”; retrieved from the Internet on May 3, 2017, from: http://docplayer.net/9791309-On-the-cutting-edge-thwarting-virtual-machine-detection.html.
Georgia Frantzeskou et al., “Identifying Authorship by Byte-Level N-Grams: The source Code Author Profile (SCAP) Method”, Spring 2007, International Journal of Digital Evidence, vol. 6, issue 1.
Franklin et al., “Remote Detection of Virtual Machine Monitors with Fuzzy benchmarking”, ACM SIGOPS Operating Systems Review, V42, Issue 3, Apr. 2008.
Emmanouil Vasilomanolakis, “A honeypot-driven cyber incident monitor: Lessons learned and steps ahead”; Sep. 2015; SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks; Publisher: ACM; pp. 1-7.
Ahmed et al., “A New Biometric Technology Based on Mouse Dynamics”, Jul.-Sep. 2007, IEEE Transactions on Dependable and Secure Computing, vol. 4, No. 3, pp. 165-179.
Bailey, Kyle O., “Computer Based Behavioral Biometric Authentication Via Multi-Modal Fusion”, Thesis, 2013, Air Force Insitute of Technology.
Elizabeth Stinson and John C. Mitchell, “Characterizing the Remote Control Behavior of Bots”, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, p. 89-108. Dec. 31, 2007.
Todorov, “Optimality Principles in Sensorimotor Control (Review)”, Sep. 2004, Nature Neuroscience 7, pp. 907-915.
Cleeff et al., “Security Implications of Virtualization: A Literature Study”, Science and Engineering, 2009.
Hibbeln et al., “Detecting Deception in Online Environments: Measuring Fraud Through Mouse Cursor Movements”, Jun. 7, 2014, Gmunden Retreat on NeuroIS 2014 Gmunden Austria, p. 38.
Ferrie Peter, “Attack on Virtual Machine Emulators”, Symantec Technology Exchange, 2007.
Yampolskiy et al., “Behavioural Biometrics: a survey and classification”, 2008, International Journal of Biometrics, vol. 1, No. 1, pp. 81-113.
Provos et al., 2007, “The Ghost in the Browser: Analysis of Web-based Malware”.
Huang Yao-Wen et al., “Web application security assessment by fault injection and behavior monitoring”, 2003, Proceedings of the 12th international conference on World Wide Web, ACM.
Ben Hansen, “The Blur Busters Mouse Guide”, dated Feb. 1, 2014; printed from the Internet on Aug. 5, 2019 from: https://www.blurbusters.com/faq/mouse-guide/.
Chris Cain, “Analyzing Man-in-the-Browser (MITB) Attacks”, dated Dec. 2014; downloaded from the Internet on Aug. 5, 2019 from: https://www.sans.org/reading-room/whitepapers/forensics/analyzing-man-in-the-browser-mitb-attacks-35687.
communication from the European Patent Office (EPO) in EP 14814408, dated Oct. 15, 2019.
Bassam Sayed, “A Static Authentication Framework Based on Mouse Gesture Dynamics”, Helwan University, 2003.
communication from the European Patent Office (EPO) in EP 17739666, dated Jun. 17, 2020.
Communication from the European Patent Office (EPO) in EP 17777357, dated Jul. 23, 2020.
International Search Report (ISR) in PCT/IL2020/050724, dated Sep. 7, 2020.
Written Opinion of the International Searching Authority in PCT/IL2020/050724, dated Sep. 7, 2020.
J. D. Crawford et al., “Spatial Transformations for Eye—Hand Coordination”, Journal of Neurophysiology, vol. 92, Issue 1, pp. 10-19, Jul. 2004.
Communication from the European Patent Office (EPO) in patent application No. EP 17739667, dated Oct. 20, 2020.
Machine Translation of patent application No. EP 2338092 A1, Obtained on Jan. 14, 2021 from: https://patents.google.com/patent/EP2338092A1/en.
Asaf Shabtai et al., “Andromaly”: a behavioral malware detection framework for android devices, Journal of Intelligent Information Systems, Jan. 6, 2011.
International Search Report for PCT international application PCT/IL2018/051246, dated Mar. 11, 2019.
Written Opinion of the International Searching Authority for PCT international application PCT/IL2018/051246, dated Mar. 11, 2019.
Written Opinion of the International Searching Authority for PCT international application PCT/IL2011/000907, dated Apr. 19, 2012.
Written Opinion of the International Searching Authority for PCT international application PCT/IB2014/062293, dated Oct. 1, 2014.
Written Opinion of the International Searching Authority for PCT international application PCT/IB2014/062941, dated Dec. 17, 2014.
Written Opinion of the International Searching Authority for PCT international application PCT/IB2016/054064, dated Jul. 9, 2015.
Syed Ahsan Abbas et al., “What is the difference between a rooted and unrooted Android?” Quora.com, dated Jul. 22, 2016, printed on Aug. 12, 2019 from: www.Quora.com/What-is-the-difference-between-a-rooted-and-unrooted-Android.
Sebastian Lindstrom, “Getting to know asynchronous JavaScript: Callbacks, Promises and Async / Await”, Medium.com, dated Jul. 2, 2017, printed on Aug. 12, 2019 from: Medium.com/codebuddies/getting-to-know-asynchronous-javascript-callbacks-promises-and-async-await-17e0673281ee.
Machine translation of WO 2013/161077 A1, “Biometric authentication device, biometric authentication program, and biometric authentication method”, Obtained on Jan. 24, 2020 from: https://patents.google.com/patent/WO2013161077A1/en?oq=JP2006277341A.
Oriana Riva et al., “Progressive authentication: Deciding when to authenticate on mobile phones”, USENIX Security Symposium 2012.
Related Publications (1)
Number Date Country
20210004451 A1 Jan 2021 US