User authentication device, user authentication method, and user authentication computer program

Information

  • Patent Grant
  • 12321428
  • Patent Number
    12,321,428
  • Date Filed
    Thursday, July 8, 2021
    4 years ago
  • Date Issued
    Tuesday, June 3, 2025
    6 months ago
Abstract
A user authentication device includes: a collection part collecting information of a user; a generation part generating a question for the user on the basis of the information of the user collected by the collection part and a skill model of the user; a presentation part presenting the question for the user generated by the generation part to the user; a reception part receiving, from the user, a response to the question presented by the presentation part; and a determination part determining authentication of the user on the basis of the response received by the reception part.
Description
BACKGROUND OF THE INVENTION
1. Field of the Invention

The present invention relates to a user authentication device, a user authentication method, and a user authentication computer program.


2. Description of the Related Art

The general problem coped with by a current user authentication method is to authenticate a person with high safety using an application (at the time of log in a computer network, for example).


Two-element authentication is a technique established to confirm the identity of a user. For this practical use, the second authentication method is required to satisfy the followings:

    • The method is safe and constantly available.
    • The method suppresses a burden to the minimum (to be entertaining if possible).


Any of the methods being used today does not satisfy all of the above-described standards. Moreover, it is considerably preferable to authenticate a user on user's channel.


Most of the two-element authentication methods include, as at least one element, a biometric authentication process. For this function, one method trusts the other method. For example, it is difficult to confirm that a photo is taken at the time and that a photo is not a copy (of a screen or a piece of paper as the means conducted by hackers in the past). Every time the authentication method is improved to be safer, a new problem tends to appear.


U.S. patent application No. 2015/0096002 (Method of Criminal Profiling and Person Identification Using Cognitive/Behavioral Biometric Fingerprint Analysis) discloses a use of cognitive/behavioral identification information for identifying a criminal psychological state (see U.S. patent application No. US 2015/0096002). As a solution in this patent literature, a fingerprint at the time of a criminal behavior is formed for a general user (the fingerprint is formed while a user is showing a criminal behavior).


U.S. patent application No. 2013/0185071 (VERIFYING A USER) discloses the determination of a response time by a speech ability using voice transition patterns (see U.S. patent application No. US 2015/0096002). The solution in this patent literature is a solution by biometric voice authentication.


SUMMARY OF THE INVENTION

It is an object of the present invention to at least partially solve the problems in the conventional technology.


However, the above-described conventional techniques do not enable, in two-element authentication, user authentication with higher accuracy. This is because the above-described conventional techniques have the following problems.


First, U.S. patent application No. 2015/0096002 discloses a use of cognitive/behavioral identification information for identifying a criminal physical state, while it does not disclose a solution for identifying a person.


Second, U.S. patent application No. 2013/0185071 discloses the determination of a response time by a speech ability using voice transition patterns, while it does not measure an online response time for a problem requiring a specific skill.


The above and other objects, features, advantages and technical and industrial significance of this invention will be better understood by reading the following detailed description of presently preferred embodiments of the invention, when considered in connection with the accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a diagram illustrating an example of a user authentication system according to a first embodiment;



FIG. 2 is a block diagram illustrating a configuration example of a user authentication device according to the first embodiment;



FIG. 3 is a flowchart illustrating an example of a flow of the entire user authentication processing according to the first embodiment;



FIG. 4 is a flowchart illustrating an example of a flow of user authentication determination processing according to the first embodiment; and



FIG. 5 is a diagram illustrating a computer executing a computer program.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The following will specifically describe the user authentication device, the user authentication method, and the user authentication computer program according to the invention, with reference to the enclosed drawings. Note that the invention is not limited to the embodiment described in the following.


First Embodiment

The following will sequentially describe a configuration of the user authentication system, a configuration of the user authentication device, a concrete example of the user authentication processing, a flow of the entire user authentication processing, and a flow of the user authentication determination processing, and will lastly describe the effects of the embodiment.


Configuration of User Authentication System


The following will specifically describe a configuration of a user authentication system (appropriately referred to as this system) 100 according to the first embodiment, with reference to FIG. 1. FIG. 1 is a diagram illustrating a configuration example of a user authentication system according to the first embodiment. This system 100 includes a user authentication device 10, a user 20, and a user information source 30. Here, the user authentication device 10, the user 20, and the user information source 30 are connected to be communicable wiredly or wirelessly through a given communication network (not illustrated). Note that the user authentication system illustrated in FIG. 1 may include a plurality of user information sources 30.


First, the user authentication device 10 collects information of the user 20 from the user information source 30 (Step S1). Next, in accordance with the collected information of the user 20, the user authentication device 10 constructs a skill model of the user 20 (appropriately referred to as a “user skill model”, a “user model”, or a “model”), and generates a question set for authenticating the user 20 (Step S2).


The above-described Steps S1 and S2 are steps for generating, with the use of the authentication system, a model for each user regarding the ability (appropriately referred to as a “user skill”) of solving a complicated but simple task (appropriately referred to as a “question” or a “problem”). Such a model is constructed first in accordance with the background of the user 20 (for example, a Mathematical Olympiad participant, a musician, or the like). After various authentication problems, the model is constantly refined for each user by a machine learning method. Moreover, the model learns how the user 20 copes with the task.


Furthermore, in the above-described Steps S1 and S2, the user authentication device 10 generates a question/problem for the user 20 so as to test a response time and the characteristics at the time of solving the problem of the user 20, and similarly generates other indices related to the question.


Then, the user authentication device 10 presents the question to the user 20 (Step S3), and receives a response from the user 20 (Step S4). Here, the user authentication device 10 determines the authentication of the user 20 on the basis of the response from the user 20 (Step S5).


In the above-described Step S3 to Step S5, if the response time and the characteristics at the time of solving the problem of the user are within model parameters, the user 20 is authenticated. Otherwise, the user 20 may be tested further or warned. In this manner, when the user 20 intends to log in a network or the like or when the user 20 intends to access specific data or the like with high confidentiality, it is possible to confirm the identity of the user 20. Note that the details of the user authentication determination processing will be described later in “Flow of user authentication determination processing”.


Then, the user authentication device 10 notifies the user 20 of a determination result of the user 20 (Step S6). Furthermore, the user authentication device 10 updates the skill model of the user 20 on the basis of the response from the user 20 (Step S7).


In the above-described Step S7, it is possible to refine, by an unsupervised machine learning method, a model regarding the ability of the user 20 for solving a task within a domain, on the basis of the response time of the user 20, the accuracy of the result, and other parameters.


The above-described user authentication system 100 according to the first embodiment constructs a signature such as a predicted response time required for a person to perform a complicated task, and is a new authentication technique that can be used as the second authentication method of the two-element authentication. For example, unlike the authentication technique of the above-described U.S. patent application No. 2015/0096002, this system 100 can construct a model regarding a user skill, and present a question with a different difficulty level generated by artificial intelligence (AI) in accordance with a specific user so as to authenticate the specific user. Moreover, unlike the authentication technique of the above-described U.S. patent application No. 2013/0185071, this system 100 can perform processing based on user modeling using behavioral analysis and skill-based behaviors. Furthermore, this system 100 authenticates a user on a network, and constructs a skill model unique to each regular user, thus enabling user authentication with higher accuracy.


Configuration of User Authentication Device


The following will specifically describe the configuration of the user authentication device 10 according to the first embodiment with reference to FIG. 2. FIG. 2 is a block diagram illustrating a configuration example of the user authentication device according to the first embodiment. The user authentication device 10 includes an input unit 11, an output unit 12, a communication unit 13, a storage unit 14, and a control unit 15.


The input unit 11 controls input of various kinds of information to the user authentication device 10. The input unit 11 is, for example, a mouse, a keyboard, or the like, and receives input of setting information and the like to the user authentication device 10. Moreover, the output unit 12 controls output of various kinds of information from the user authentication device 10. The output unit 12 is, for example, a display or the like, and outputs setting information and the like stored in the user authentication device 10.


The communication unit 13 controls data communication with other devices. For example, the communication unit 13 performs data communication with communication devices. Moreover, the communication unit 13 can perform data communication with an operator terminal (not illustrated).


The storage unit 14 stores various kinds of information referred to by the control unit 15 for operation and various kinds of information obtained by the control unit 15 during operation. The storage unit 14 includes a user information storage 14a, a skill model storage 14b, and a question set storage 14c. Here, the storage unit 14 is, for example, a random access memory (RAM), a semiconductor memory element such as a flash memory, or a storage device such as a hard disk or an optical disk. Note that although the storage unit 14 is provided in the user authentication device 10 in the example of FIG. 2, the storage unit 14 may be provided outside the user authentication device 10, or a plurality of storage units may be provided.


The user information storage 14a stores information related to a resume of the user 20, a hobby of the user 20, a skill of the user 20, and the like that are collected from the user information source 30. Moreover, the skill model storage 14b stores information related to a skill model constructed for each user. Moreover, the question set storage 14c stores a plurality of questions and correct answers generated for each user.


The control unit 15 controls the entire user authentication device 10. The control unit 15 includes a collection part 15a, a construction part 15b, a generation part 15c, a presentation part 15d, a reception part 15e, a determination part 15f, an application part 15g, and an update part 15h. Here, the control unit 15 is, for example, an electronic circuit such as a central processing unit (CPU) or a micro processing unit (MPU) or an integrated circuit such as an application specific integrated circuit (ASIC) or a field programmable gate array (FPGA).


The collection part 15a collects information of the user 20. For example, the collection part 15a collects information of the user 20 using text analysis, natural language processing, or semantic analysis. The collection part 15a also collects information of the user 20 by analyzing the user information source 30 such as a resume, a LinkedIn, and ResearchGate of the user 20, and a nonprofessional social network such as Facebook including information of hobbies and other skills of the user 20. Meanwhile, the collection part 15a stores the collected information of the user 20 in the user information storage 14a.


The construction part 15b constructs a skill model of the user 20 using the information of the user 20 collected by the collection part 15a. For example, the construction part 15b constructs an initial model regarding a problem-solving skill of the user 20, using all of the information of the user 20 collected by the collection part 15a and a general-purpose model preliminarily constructed by the construction part 15b and then refined. Meanwhile, the construction part 15b stores the information related to the constructed skill model of the user 20 in the skill model storage 14b.


The generation part 15c generates a question for the user 20 on the basis of the information of the user 20 collected by the collection part 15a and the skill model of the user 20. For example, the generation part 15c generates, as a question for the user 20, a numerical question, a mathematic question, a physical question, a mechanical question, a reading exercise, or a speed chess. The generation part 15c also generates a question set for user authentication on the basis of the skill model of the user 20, and predicts time required for the user 20 to answer the questions correctly. Meanwhile, the generation part 15c stores, in the question set storage 14c, the generated question set, and the predicted time required for the user 20 to answer the questions correctly.


The presentation part 15d presents a question for the user 20 generated by the generation part 15c to the user 20. If a response to the question does not satisfy a given condition, the presentation part 15d presents another question to the user 20. For example, if the response time of the user 20 or the accuracy deviates largely from a predicted range, the presentation part 15d further presents one or more different questions to the user 20.


The reception part 15e receives, from the user 20, a response to the question presented by the presentation part 15d. For example, the reception part 15e receives, as a response to a question, an answer to the question, a response time, and the characteristics at the time of solving the question. Meanwhile, the reception part 15e may store the received various kinds of information in the storage unit 14.


The determination part 15f determines authentication of the user 20 on the basis of the response received by the reception part 15e. For example, if the accuracy of an answer to the question, the response time, and the characteristics at the time of solving the question are within a range of parameters set by the skill model of the user 20, the determination part 15f determines that the authentication of the user 20 is successful. If one of the accuracy of an answer to the question, the response time, and the characteristics at the time of solving the question is out of a range of parameters set by the skill model of the user 20, the determination part 15f determines that the authentication of the user 20 is failed.


If a response to the question does not satisfy a given condition, the application part 15g applies a given flag to the response to the question. For example, if the determination part 15f has determined that the authentication of the user 20 is failed, the application part 15g applies a flag indicating that a user is suspicious to the response of the user 20. Moreover, if the response time of the user 20 or the accuracy deviates largely from the predicted range, the application part 15g applies a flag indicating that a problem exists in cognitive ability to the response of the user 20. Meanwhile, the application part 15g may store the information related to the applied flag in the storage unit 14. The application part 15g may also transmit the information related to the applied flag to the user 20 and a system administrator.


The update part 15h updates a skill model of the user 20 on the basis of the response to the question received by the reception part 15e. For example, the update part 15h inputs, as data, the accuracy of an answer to the question, the response time, or the characteristics at the time of solving the question of the user 20, and updates the skill model of the user 20 using an unsupervised machine learning method. The update part 15h may also input the information of the user 20 newly collected by the collection part 15a and update the skill model of the user 20.


Concrete Example of User Authentication Processing


The following will describe concrete examples of the user authentication processing according to the first embodiment. The following will describe the concrete example 1 to the concrete example 3. However, the embodiment does not limit to the following concrete examples.


Concrete Example 1

In the first embodiment, the accuracy of a model regarding the problem-solving ability of each user can be improved constantly. In the following concrete example, there will be described processing of improving the accuracy of a model by increasing the number of dimensions used.


First, in the processing of the concrete example 1, the user authentication device 10 uses a plurality of domains for each user and constructs super space of user ability over such domains. For example, the user authentication device 10 constructs, as constructed super space of user ability, super space of numerical questions, chess problems, inference problems, and the like.


Moreover, in the processing of the concrete example 1, the user authentication device 10 can add the number of dimensions of skills acquired by the user 20 at a workplace. For example, the user authentication device 10 can ask a network system administrator of a company a question about a consequence predicted when a specific network component of a network managed by the administrator is changed. The user authentication device 10 can also generate arithmetic questions with high complicity for an accountant.


As described above, in the processing of the concrete example 1, the user authentication device 10 increases the number of dimensions used and keeps refining, with every authentication question, a model for each user by machine learning. Therefore, even if an attacker solves the same task as the user 20, the attacker needs to solve the task in the same way as the user 20 in the same time frame. For example, a chess problem can be solved in various ways, and the specific way of solving the problem by the user is grasped. Thus, if the way of solving the problem is different, a flag is applied. In this manner, the accuracy of user authentication is improved, thereby making it difficult for an intruder to pretend to be a true user.


Concrete Example 2

In the following concrete example, there will be described processing using a reading exercise as a different task example, which is in the same category as the above-described processing. In the processing of the concrete example 2, the user authentication device 10 generates a sample text, and observes the movement of the eyes of the user 20 reading the text, with a camera provided in the device (laptop or mobile). Here, each person has an extremely different pattern of eye movement during reading a text on a screen, and the pattern may differ also depending on reading ability, reading comprehension, and reading habit of each user.


The user authentication device 10 constructs a model regarding the eye movement of the user 20 during reading a text, improves the model by observing the user 20 reading a text, and adjusts the model by a machine learning method. The user authentication device 10 then uses such a model so as to determine a user to be authenticated on a network. The possibility that a swindler can imitate even the eye movement of the user 20 is low. Thus, with the processing of the concrete example 2, it is possible to protect the system from deepfake being used increasingly by hackers.


The above-described concrete example 1 and concrete example 2 are acting solutions constantly improving access monitoring in a single channel, and are methods considerably difficult for an attacker to break. More importantly, the method is difficult to break by automatic attacks. That is, if a response is excessively quick or slow, a flag is applied as suspicious, and thus simply knowing an answer is not enough.


Concrete Example 3

In the following concrete example, there will be described processing of thoroughly checking the intelligence of a user to be authenticated. For example, in a case of a system administrator or a programmer under the influence of alcohol or drugs, a problem in cognitive ability appears in an answer to a question. In the processing of the concrete example 3, if such a response is received, the user authentication device 10 applies such information as a flag to the response. Therefore, with the processing of the concrete example 3, it is possible to prevent unintentional damages to a network or a product of a company.


Flow of Entire User Authentication Processing


The following will specifically describe a flow of the entire user authentication processing according to the first embodiment with reference to FIG. 3. FIG. 3 is a flowchart illustrating an example of a flow of the entire user authentication processing according to the first embodiment.


First, the collection part 15a of the user authentication device 10 collects information of the user 20 from the user information source 30 (Step S101). Here, the collection part 15a may obtain the information of the user 20 from the user information storage 14a of the storage unit 14.


Next, the construction part 15b constructs a skill model of the user 20 using the information of the user 20 collected by the collection part 15a (Step S102). Here, the construction part 15b may construct the skill model of the user 20 using the information of the user 20 stored in the user information storage 14a. Note that the user authentication device 10 may obtain a skill model of the user 20 constructed by another device.


Subsequently, the generation part 15c generates a question set including questions (problems) for the user 20 and correct answers on the basis of the information of the user 20 collected by the collection part 15a and the skill model of the user 20 (Steps S103). Here, the generation part 15c generates, using the skill model of the user 20, a problem required to be solved within a few seconds by the user 20. However, the time required for response is not especially limited. For example, if a problem is an entertaining game, the generation part 15c may generate a problem required to be solved within a longer time.


Moreover, the generation part 15c predicts a time required for the user 20 to respond to a question (response time) on the basis of the skill model of the user 20 (Step S104). Here, the generation part 15c may predict the characteristics at the time of solving a question of the user 20, on the basis of the skill model of the user 20.


Then, the presentation part 15d presents the question for the user 20 generated by the generation part 15c to the user 20 (Step S105). Here, the presentation part 15d may present the question for the user 20 in a form of text data or image data through the output unit 12, or present the question for the user 20 in a form of voice data through the output unit 12.


Moreover, the reception part 15e receives, from the user 20, a response to the question presented by the presentation part 15d (Step S106). Here, the reception part 15e may receive the response to the question in a form of text data or image data through the input unit 11, or receive the response to the question in a form of voice data through the output unit 11.


Thereafter, the determination part 15f determines authentication of the user 20 on the basis of the response received by the reception part 15e (Step S107). The details of the user authentication determination processing by the determination part 15f will be described later in “Flow of user authentication determination processing”. Moreover, the determination part 15f notifies the user 20 of a determination result of whether the authentication is successful, for example (Step S108). Here, the determination part 15f may notify the user 20 of the determination result through the output unit 12 or transmit the determination result to the terminal of the user 20 or a system administrator through the communication unit 13.


Moreover, if the response to the question does not satisfy a given condition, the application part 15g applies a given flag to the response to the question (Step S109). Here, the application part 15g applies a flag indicating that a user is suspicious, a flag indicating that a problem exists in cognitive ability of the user 20, or the like. However, the kind of a flag is not especially limited.


Lastly, the update part 15h updates the skill model of the user 20 on the basis of the response to the question received by the reception part 15e (Step S110), and finishes processing. Note that the processing at Step S110 may be performed before the processing at Step S107.


Flow of User Authentication Determination Processing


The following will specifically describe a flow of the user authentication determination processing according to the first embodiment with reference to FIG. 4. FIG. 4 is a flowchart illustrating an example of a flow of the user authentication determination processing according to the first embodiment. First, the determination part 15f of the user authentication device 10 extracts an answer to a question, a response time, and characteristics at the time of solving the question, which are included in the response received by the reception part 15e. The determination part 15f performs the following processing of Steps S201 to S203 and determines authentication of the user 20.


First, the determination part 15f determines whether the extracted response time of the user 20 is within a range of a model parameter of an expected range (Step S201). Here, if the response time is within the model parameter (Yes at Step S201), the processing is shifted to Step S202. In contrast, if the response time is not within the model parameter (No at Step S201), the processing is shifted to Step S205.


Secondly, the determination part 15f determines whether the accuracy of the extracted answer result of the user 20 is within a range of a model parameter of an expected range (Step S202). Here, if the accuracy of the answer result is within the model parameter (Yes at Step S202), the processing is shifted to Step S203. In contrast, if the accuracy of the answer result is not within the model parameter (No at Step S202), the processing is shifted to Step S205.


Thirdly, the determination part 15f determines whether the extracted other characteristics (characteristics at the time of solving the problem) of the user 20 are within a range of a model parameter of an expected range (Step S203). Here, if the other characteristics are within the model parameter (Yes at Step S203), the processing is shifted to Step S204. In contrast, if the accuracy of the result is not within the model parameter (No at Step S203), the processing is shifted to Step S205.


If numerical values based on all of the responses are within the model parameters in the processing of Step S201 to S203, the determination part 15f determines that the authentication of the user 20 is successful (Step S204), and finishes processing. Note that the determination part 15f can also perform the processing of Step S201 to S203 in a different order.


In contrast, if any one of numerical values based on all of the responses is not within the model parameter in the processing of Step S201 to S203, the determination part 15f determines whether another question is to be presented to the user 20 (Step S205). If another question is to be presented to the user 20 (Yes at Step S205), the processing is shifted to Step S201 where the determination part 15f performs processing again on an answer to a new question. If another question is not to be presented to the user 20 (No at Step S205), the determination part 15f determines that the authentication of the user 20 is failed (Step S206), and the processing is finished.


Here, if the response time, the accuracy, or other characteristics of the user 20 deviates largely from the model parameter of an expected range, the application part 15g applies a flag indicating that the user 20 is suspicious. Moreover, if the user 20 is suspicious, the presentation part 15d may allow the user to solve one or more problems before taking some actions such as warning. If the user 20 is suspicious, the determination part 15f may also warn the user 20 immediately after the first question. Note that a security system administrator or the like can change settings of the kind of warning issued by the determination part 15f and the situation in which a warning is issued.


Effects of First Embodiment


First, in the user authentication processing according to the above-described first embodiment, the information of a user is collected, and a question for the user is generated on the basis of the collected information of the user and a skill model of the user. The generated question for the user is presented to the user, and a response to the presented question is received from the user. Then, the authentication of the user is determined on the basis of the received response. In this manner, this processing enables, in the two-element authentication, user authentication with higher accuracy.


Secondly, in the above-described user authentication processing according to the first embodiment, the information of the user is collected using text analysis, natural language processing, or semantic analysis. In this manner, more detailed information of the user is collected, whereby this processing enables, in the two-element authentication, user authentication with higher accuracy.


Thirdly, in the above-described user authentication processing according to the first embodiment, a skill model of the user is constructed using the collected information of the user. In this manner, a more effective skill model of the user is constructed, whereby this processing enables, in the two-element authentication, user authentication with higher accuracy.


Fourthly, in the above-described user authentication processing according to the first embodiment, there is generated, as a question for a user, a numerical question, a mathematic question, a physical question, a mechanical question, a reading exercise, or a speed chess. In this manner, a more effective question for a user is generated, whereby this processing enables, in the two-element authentication, user authentication with higher accuracy.


Fifthly, in the above-described user authentication processing according to the first embodiment, if an answer to a question does not satisfy a given condition, another question is presented to the user. In this manner, a plurality of questions are presented to a suspicious user, whereby this processing enables, in the two-element authentication, user authentication with higher accuracy.


Sixthly, in the above-described user authentication processing according to the first embodiment, if the accuracy of an answer to a question, the response time, and the characteristics at the time of solving the question of the user are within a range of parameters set by the skill model of the user, it is determined that the authentication of the user is successful. In this manner, the response of the user is determined more effectively, whereby this processing enables, in the two-element authentication, authentication with higher accuracy.


Seventhly, in the above-described user authentication processing according to the first embodiment, if a response to a question does not satisfy a given condition, a given flag is applied to the response to the question. In this manner, the response of the user is determined more specifically, whereby this processing enables, in the two-element authentication, authentication with higher accuracy.


Eighthly, in the above-described user authentication processing according to the first embodiment, the skill model of the user is updated on the basis of a received response to a question. In this manner, the skill model is refined at every user authentication processing, whereby this processing enables, in the two-element authentication, user authentication with higher accuracy.


The invention enables, in the two-element authentication, user authentication with high accuracy.


Computer Program


A computer program that describes processing executed by the user authentication device 10 according to the embodiment in a computer-executable language can be created. As one embodiment, the user authentication device 10 can be implemented by installing a user authentication computer program that executes the user authentication processing described above as packaged software and online software into a desired computer. For example, by causing an information-processing device to execute the user authentication computer program described above, the information-processing device can function as the user authentication device 10. The information-processing device mentioned here includes a desktop or a laptop personal computer. Besides, mobile communication terminals such as a smartphone, a mobile phone, and a personal handyphone system (PHS), slate terminals such as a personal digital assistant (PDA), and the like are in the category of the information-processing device. In addition, functions of the user authentication device 10 may be implemented in a cloud server.



FIG. 5 is a view illustrating an example of a computer that executes a user authentication computer program. A computer 1000 includes, for example, a memory 1010, a CPU 1020, a hard disk drive interface 1030, a disk drive interface 1040, a serial port interface 1050, a video adapter 1060, and a network interface 1070. Those units are connected one another by a bus 1080.


The memory 1010 includes a read only memory (ROM) 1011 and a RAM 1012. The ROM 1011 stores therein, for example, a boot program of a basic input output system (BIOS) and the like. The hard disk drive interface 1030 is connected to a hard disk drive 1031. The disk drive interface 1040 is connected to a disk drive 1041. For example, attachable/detachable storage media such as a magnetic disk and an optical disk are inserted into the disk drive 1041. For example, a mouse 1051 and a keyboard 1052 are connected to the serial port interface 1050. For example, a display 1061 is connected to the video adapter 1060.


The hard disk drive 1031 stores therein, for example, an operating system (OS) 1091, an application program 1092, a program module 1093, and program data 1094. Each information described in the embodiment is stored in, for example, the hard disk drive 1031 and the memory 1010.


The user authentication computer program is stored in the hard disk drive 1031 as, for example, the program module 1093 that describes commands executed by the computer 1000. Specifically, the program module 1093 that describes each processing executed by the user authentication device 10 described in the embodiment is stored in the hard disk drive 1031.


Data used in information processing by the user authentication computer program is stored as the program data 1094 in, for example, the hard disk drive 1031. The CPU 1020 reads the program module 1093 and the program data 1094 stored in the hard disk drive 1031 into the RAM 1012 as needed, and executes each procedure described above.


The program module 1093 and the program data 1094 according to the user authentication computer program are not always stored in the hard disk drive 1031, and may be stored in, for example, an attachable/detachable storage medium and be read by the CPU 1020 via the disk drive 1041 and the like. The program module 1093 and the program data 1094 according to the user authentication computer program may be stored in the other computer connected via networks such as a local area network (LAN) and a wide area network (WAN), and be read by the CPU 1020 via the network interface 1070.


Although the invention has been described with respect to specific embodiments for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art that fairly fall within the basic teaching herein set forth.

Claims
  • 1. A user authentication device comprising: a memory; anda processor coupled to the memory and programmed to execute a process comprising;collecting information of a user, wherein the information specifies a user skill;constructing, using the collected information, a skill model that has learned a category of a task to be performed by the user and the user skill, wherein the task is according to the user skill;generating, using the constructed skill model, a question for the user that causes the user to perform a task corresponding to the category and the user skill;presenting the generated question to the user via an application that outputs the question and instructing the user to perform the task, when authentication of the user is required;receiving, from the user via an application into which the response is input, an accuracy of an answer of the user to the question, a response time, or characteristics at a time of solving the question a result of performing the task as a response to the presented question;determining that the authentication of the user is successful if the accuracy of an answer to the question, the response time, and the characteristics at a time of solving the question are within a range of parameters set by the skill model;applying, by the application, a given flag indicating that the received response does not satisfy a given condition, as two-element authentication of the user, wherein an element of the two-element authentication comprises authentication of the user on the basis of the user skill of the performed task indicated by the received response, and the other element of the two-element authentication comprises authentication that is distinct from the authentication on the basis of the user skill;updating the skill model each time the user is authenticated, by inputting the accuracy of an answer of the user to the question, the response time, or the characteristics at a time of solving the question of data; andgranting intended access to data by logging into the application by indicating, by the application, on the basis of a result of the two-element authentication, a warning on a display to the user to control the intended access to data by logging into the application.
  • 2. The user authentication device according to claim 1, further comprising collecting the information using text analysis, natural language processing, or semantic analysis.
  • 3. The user authentication device according to claim 1, further comprising generating, as the question, a numerical question, a mathematic question, a physical question, a mechanical question, a reading exercise, or a speed chess.
  • 4. The user authentication device according to claim 1, further comprising presenting another question if the response does not satisfy a given condition.
  • 5. The user authentication device according to claim 1, further comprising applying a given flag to the response if the response does not satisfy a given condition.
  • 6. A user authentication method performed by a user authentication device, the user authentication method comprising: collecting information of a user, wherein the information specifies a user skill;constructing, using the collected information, a skill model that has learned a category of a task to be performed by the user and the user skill, wherein the task is according to the user skill;generating, using the constructed skill model, a question for the user, that causes the user to perform a task corresponding to the category and the user skill;presenting the generated question to the user via an application that outputs the question and instructing the user to perform the task, when authentication of the user is required;receiving, from the user via an application into which the response is input, an accuracy of an answer of the user to the question, a response time, or characteristics at a time of solving the question as a response to the presented question;determining that the authentication of the user is successful if the accuracy of an answer to the question, the response time, and the characteristics at a time of solving the question are within a range of parameters set by the skill model;applying, by the application, a given flag indicating that the received response does not satisfy a given condition, as two-element authentication of the user, wherein an element of the two-element authentication comprises authentication of the user on the basis of the user skill of the performed task indicated by the received response, and the other element of the two-element authentication comprises authentication that is distinct from the authentication on the basis of the user skill;updating the skill model each time the user is authenticated, by inputting the accuracy of an answer of the user to the question, the response time, or the characteristics at a time of solving the question as data; andgranting intended access to data by logging into the application by indicating, by the application, on the basis of a result of the two-element authentication, a warning on a display to the user to control the intended access to data by logging into the application.
  • 7. A non-transitory recording medium recording a user authentication computer program to be executed by a computer, the program causing the computer to perform operations comprising: collecting information of a user, wherein the information specifies a user skill;constructing, using the collected information, a skill model that has learned a category of a task to be performed by the user and the user skill, wherein the task is according to the user skill;generating, using the constructed skill model, a question for the user that causes the user to perform a task corresponding to the category and the user skill;presenting the generated question to the user via an application that outputs the question and instructing the user to perform the task, when authentication of the user is required;receiving, from the user via an application into which the response is input, an accuracy of an answer of the user to the question, a response time, or characteristics at a time of solving the question as a response to the presented question;determining that the authentication of the user is successful if the accuracy of an answer to the question, the response time, and the characteristics at a time of solving the question are within a range of parameters set by the skill model;applying, by the application, a given flag indicating that the received response does not satisfy a given condition, as two-element authentication of the user, wherein an element of the two-element authentication comprises authentication of the user on the basis of the user skill of the performed task indicated by the received response, and the other element of the two-element authentication comprises authentication that is distinct from the authentication on the basis of the user skill;updating the skill model each time the user is authenticated, by inputting the accuracy of an answer of the user to the question, the response time, or the characteristics at a time of solving the question as data; andgranting intended access to data by logging into the application by indicating, by the application, on the basis of the two-element authentication, a warning on a display to the user to control the intended access to data by logging into the application.
US Referenced Citations (654)
Number Name Date Kind
5251131 Masand Oct 1993 A
6421453 Kanevsky Jul 2002 B1
7555431 Bennett Jun 2009 B2
7725321 Bennett May 2010 B2
7912701 Gray Mar 2011 B1
8180713 Rigby May 2012 B1
8392188 Riccardi Mar 2013 B1
8869019 Sampath-Kumar Oct 2014 B1
8997191 Stark Mar 2015 B1
9015476 Juels Apr 2015 B1
9116890 King Aug 2015 B2
9185095 Moritz Nov 2015 B1
9237146 Casillas Jan 2016 B1
9311461 Basson Apr 2016 B2
9336268 Moudy May 2016 B1
9430624 Mortensen Aug 2016 B1
9438604 Addala Sep 2016 B1
9471771 Liu Oct 2016 B1
9535901 Allen Jan 2017 B2
9578499 Brill Feb 2017 B2
9715496 Sapoznik Jul 2017 B1
9760627 Bradley Sep 2017 B1
9838384 Kane-Parry Dec 2017 B1
9911413 Kumar Mar 2018 B1
9965462 Werth May 2018 B2
9985943 Reading May 2018 B1
10078688 Kolotienko Sep 2018 B2
10162956 Truong Dec 2018 B1
10170107 Dreyer Jan 2019 B1
10231122 Childress Mar 2019 B2
10235507 Rome Mar 2019 B1
10282531 Davey May 2019 B1
10331791 Anbazhagan Jun 2019 B2
10431210 Huang Oct 2019 B1
10440184 Mackie Oct 2019 B1
10460728 Anbazhagan Oct 2019 B2
10470043 Cherala Nov 2019 B1
10496809 Pham Dec 2019 B1
10503888 Spencer, III Dec 2019 B2
10587553 Ghafourifar Mar 2020 B1
10607598 Larson Mar 2020 B1
10614207 Truong Apr 2020 B1
10616343 Alameh Apr 2020 B1
10645219 Mackie May 2020 B1
10732789 Marcinelli Aug 2020 B1
10748538 Lewis Aug 2020 B2
10754936 Hawes Aug 2020 B1
10762190 Cuan Sep 2020 B1
10798030 Igure Oct 2020 B1
10803458 Vokes Oct 2020 B1
10817782 Rando Oct 2020 B1
10827071 Adibi Nov 2020 B1
10854206 Liu Dec 2020 B1
10867025 Whaley Dec 2020 B2
10867129 Fregly Dec 2020 B1
10915227 Proud Feb 2021 B1
10922493 Das Feb 2021 B1
10936962 Neumann Mar 2021 B1
10943072 Jaganmohan Mar 2021 B1
10970780 Kraemer Apr 2021 B2
10997315 Barday May 2021 B2
11004075 Lee May 2021 B2
11025439 Theodore Jun 2021 B2
11055394 Norris, III Jul 2021 B2
11061800 Prakash Jul 2021 B2
11069351 Menon Jul 2021 B1
11074509 Wray Jul 2021 B1
11080375 Fuentes Aug 2021 B2
11086869 Aleti Aug 2021 B1
11087739 Rastrow Aug 2021 B1
11106569 Chapagain Aug 2021 B1
11110288 Kaib Sep 2021 B2
11113372 Lewis Sep 2021 B2
11115353 Crowley Sep 2021 B1
11140193 Patel Oct 2021 B2
11157498 James Oct 2021 B1
11178521 Roth Nov 2021 B1
11182697 Murakonda Nov 2021 B1
11195522 Makashir Dec 2021 B1
11196774 Wei Dec 2021 B2
11200892 Stoops Dec 2021 B1
11210636 Hughes Dec 2021 B1
11216801 Bohra Jan 2022 B2
11218817 Ganot Jan 2022 B1
11227122 Gill Jan 2022 B1
11232220 Thibadeau, Sr. Jan 2022 B2
11233788 Hitchcock Jan 2022 B1
11238049 James Feb 2022 B1
11250855 Vozila Feb 2022 B1
11288319 Das Mar 2022 B1
11288351 Lewis Mar 2022 B2
11288513 Desai Mar 2022 B1
11289075 Pandey Mar 2022 B1
11289200 Gregg Mar 2022 B1
11295738 Bhaya Apr 2022 B2
11316865 Gallopyn Apr 2022 B2
11321527 Gopalarao May 2022 B1
11327992 Batsakis May 2022 B1
11347392 Germann May 2022 B1
11354599 Hübl Jun 2022 B1
11361571 Fusco Jun 2022 B1
11366842 Swaminathan Jun 2022 B1
11373146 Yerastov Jun 2022 B1
11379843 Saka Jul 2022 B2
11386158 Bourbie Jul 2022 B1
11392578 James Jul 2022 B1
11399048 Huang Jul 2022 B2
11404075 Lakhani Aug 2022 B1
11449946 Gutsell Sep 2022 B1
11468239 Olabiyi Oct 2022 B2
11475053 Das Oct 2022 B1
11475245 Foltz Oct 2022 B2
11494514 Amico Nov 2022 B1
11507752 Bhowmik Nov 2022 B1
11508372 Schwartz Nov 2022 B1
11531735 Patel Dec 2022 B1
11531736 Sun Dec 2022 B1
11544470 Zhang Jan 2023 B2
11551663 Bissell Jan 2023 B1
11568087 Kinai Jan 2023 B2
11568246 Yeh Jan 2023 B2
11573955 James Feb 2023 B1
11587559 Newendorp Feb 2023 B2
11593466 Kuttappa Feb 2023 B1
11600263 Blair Mar 2023 B1
11614952 Goldberg Mar 2023 B2
11644955 Singamneni May 2023 B1
11654357 Johnston May 2023 B1
11676220 Natarajan Jun 2023 B2
11681364 Zhang Jun 2023 B1
11699155 Dutt Jul 2023 B2
11736423 Wang Aug 2023 B2
11755848 Dan Sep 2023 B1
11756538 Dell Sep 2023 B1
11783824 Mars Oct 2023 B1
11853975 Leblang Dec 2023 B1
11868381 Müller Jan 2024 B2
11868728 Meissner Jan 2024 B1
11907676 Pemberton Feb 2024 B1
11908027 Theoharis Feb 2024 B1
11924637 Holman Mar 2024 B1
11972463 Nguyen Apr 2024 B1
12014192 Riva Jun 2024 B2
12020250 Miller Jun 2024 B2
12026630 Thornley Jul 2024 B2
12028433 Walsh Jul 2024 B2
12141791 Khalfan Nov 2024 B2
12182950 Greunke Dec 2024 B2
12206789 Ladd Jan 2025 B2
20010049707 Tran Dec 2001 A1
20020002450 Nunberg Jan 2002 A1
20020174073 Nordman Nov 2002 A1
20020174106 Martin Nov 2002 A1
20020198909 Huynh Dec 2002 A1
20040143749 Tajalli Jul 2004 A1
20060143157 Landsman Jun 2006 A1
20060156385 Chiviendacz Jul 2006 A1
20060294390 Navratil Dec 2006 A1
20070005967 Mister Jan 2007 A1
20070055656 Tunstall-Pedoe Mar 2007 A1
20080060051 Lim Mar 2008 A1
20080189307 Sankaran Aug 2008 A1
20090037983 Chiruvolu Feb 2009 A1
20090077124 Spivack Mar 2009 A1
20090089869 Varghese Apr 2009 A1
20090198587 Wagner Aug 2009 A1
20090265163 Li Oct 2009 A1
20100023319 Bikel Jan 2010 A1
20100037056 Follis Feb 2010 A1
20110035208 Hale Feb 2011 A1
20110191838 Yanagihara Aug 2011 A1
20110231913 Feng Sep 2011 A1
20110270604 Qi Nov 2011 A1
20110307435 Overell Dec 2011 A1
20110320816 Yao Dec 2011 A1
20120016678 Gruber Jan 2012 A1
20120151559 Koudys Jun 2012 A1
20120214442 Crawford Aug 2012 A1
20120254333 Chandramouli Oct 2012 A1
20130007864 Puflea Jan 2013 A1
20130019286 Barborak Jan 2013 A1
20130036458 Liberman Feb 2013 A1
20130044055 Karmarkar Feb 2013 A1
20130073280 O'Neil Mar 2013 A1
20130110498 Bekkerman May 2013 A1
20130124189 Baldwin May 2013 A1
20130132091 Skerpac May 2013 A1
20130133048 Wyn-Harris May 2013 A1
20130138428 Chandramouli May 2013 A1
20130185071 Chen et al. Jul 2013 A1
20130227700 Dhillon Aug 2013 A1
20130339141 Stibel Dec 2013 A1
20140019385 Dawson Jan 2014 A1
20140123256 Curren May 2014 A1
20140127219 Sahin May 2014 A1
20140237577 Li Aug 2014 A1
20140258324 Mauro Sep 2014 A1
20140282964 Stubblefield Sep 2014 A1
20140317726 Turgeman Oct 2014 A1
20140317744 Turgeman Oct 2014 A1
20140325223 Turgeman Oct 2014 A1
20140325645 Turgeman Oct 2014 A1
20140325646 Turgeman Oct 2014 A1
20140325682 Turgeman Oct 2014 A1
20140344927 Turgeman Nov 2014 A1
20140364099 Pai Dec 2014 A1
20150026796 Alan Jan 2015 A1
20150033305 Shear Jan 2015 A1
20150039297 Greer Feb 2015 A1
20150046145 Hamahata Feb 2015 A1
20150066479 Pasupalak Mar 2015 A1
20150073777 Assam Mar 2015 A1
20150089623 Sondhi Mar 2015 A1
20150096002 Shuart et al. Apr 2015 A1
20150106704 Towle Apr 2015 A1
20150135309 Karmarkar May 2015 A1
20150156208 Kirkham Jun 2015 A1
20150194149 Faizakof Jul 2015 A1
20150205955 Turgeman Jul 2015 A1
20150205957 Turgeman Jul 2015 A1
20150213251 Turgeman Jul 2015 A1
20150242605 Du Aug 2015 A1
20150269139 McAteer Sep 2015 A1
20150286790 Ahmad Oct 2015 A1
20150310195 Bailor Oct 2015 A1
20150310196 Turgeman Oct 2015 A1
20150324563 Deutschmann Nov 2015 A1
20150326570 Publicover Nov 2015 A1
20150339477 Abrams Nov 2015 A1
20150348565 Rhoten Dec 2015 A1
20150363384 Williams Dec 2015 A1
20150381652 Wardman Dec 2015 A1
20160027198 Terry Jan 2016 A1
20160057623 Dutt Feb 2016 A1
20160103827 Nguyen Manh Apr 2016 A1
20160110528 Gupta Apr 2016 A1
20160162456 Munro Jun 2016 A1
20160162458 Munro Jun 2016 A1
20160247061 Trask Aug 2016 A1
20160248803 O'Connell Aug 2016 A1
20160253434 Yu Sep 2016 A1
20160330573 Masoud Nov 2016 A1
20160350283 Carus Dec 2016 A1
20160371476 Turgeman Dec 2016 A1
20170017635 Leliwa Jan 2017 A1
20170017781 Turgeman Jan 2017 A1
20170032138 Navda Feb 2017 A1
20170034183 Enqvist Feb 2017 A1
20170070510 Ramalingam Mar 2017 A1
20170075877 Lepeltier Mar 2017 A1
20170076518 Patterson Mar 2017 A1
20170091450 Turgeman Mar 2017 A1
20170103472 Shah Apr 2017 A1
20170116204 Davulcu Apr 2017 A1
20170124462 Arbajian May 2017 A1
20170140141 Yan May 2017 A1
20170140279 Turgeman May 2017 A1
20170147910 Mao May 2017 A1
20170154366 Turgeman Jun 2017 A1
20170161372 Fernández Jun 2017 A1
20170193526 Turgeman Jul 2017 A1
20170200093 Motahari Nezhad Jul 2017 A1
20170220786 Guo Aug 2017 A1
20170221064 Turgeman Aug 2017 A1
20170228365 Levy Aug 2017 A1
20170235824 Liu Aug 2017 A1
20170237628 Purdy Aug 2017 A1
20170242843 Jiao Aug 2017 A1
20170278417 Ur Sep 2017 A1
20170278510 Zhao Sep 2017 A1
20170323203 Matusov Nov 2017 A1
20170364503 Anisimovich Dec 2017 A1
20170366480 Sagar Dec 2017 A1
20170366481 Sagar Dec 2017 A1
20170366621 Sagar Dec 2017 A1
20180007553 Dutt Jan 2018 A1
20180034850 Turgeman Feb 2018 A1
20180052842 Hewavitharana Feb 2018 A1
20180052884 Kale Feb 2018 A1
20180052885 Gaskill Feb 2018 A1
20180060306 Starostin Mar 2018 A1
20180061401 Sarikaya Mar 2018 A1
20180068031 Hewavitharana Mar 2018 A1
20180075554 Clark Mar 2018 A1
20180089163 Ben Ami Mar 2018 A1
20180089601 Link Mar 2018 A1
20180097940 Beilis Apr 2018 A1
20180113856 Anisimovich Apr 2018 A1
20180114219 Setchell Apr 2018 A1
20180114234 Fighel Apr 2018 A1
20180123997 Celedonia May 2018 A1
20180129181 Kratzer, III May 2018 A1
20180129648 Chakravarthy May 2018 A1
20180143975 Casal May 2018 A1
20180144309 Rolle May 2018 A1
20180150524 Anger May 2018 A1
20180157642 Matskevich Jun 2018 A1
20180160309 Turgeman Jun 2018 A1
20180181559 Matskevich Jun 2018 A1
20180181651 Pospelova Jun 2018 A1
20180191699 Assali Jul 2018 A1
20180205727 Hwang Jul 2018 A1
20180218303 Cole Aug 2018 A1
20180225281 Song Aug 2018 A1
20180232110 Cheung Aug 2018 A1
20180232111 Jones Aug 2018 A1
20180232651 Potter Aug 2018 A1
20180239959 Bui Aug 2018 A1
20180242149 Verma Aug 2018 A1
20180247191 Katz Aug 2018 A1
20180247272 Cunico Aug 2018 A1
20180253706 Miller Sep 2018 A1
20180260385 Fan Sep 2018 A1
20180260746 Xiong Sep 2018 A1
20180267958 Danielyan Sep 2018 A1
20180286265 Matsumoto Oct 2018 A1
20180288211 Kim Oct 2018 A1
20180300465 Esman Oct 2018 A1
20180314689 Wang Nov 2018 A1
20180314816 Turgeman Nov 2018 A1
20180324186 Dintenfass Nov 2018 A1
20180324215 Kalia Nov 2018 A1
20180338032 Baek Nov 2018 A1
20180341396 Yaseen Nov 2018 A1
20180349583 Turgeman Dec 2018 A1
20180365784 Sartori Dec 2018 A1
20180366021 Zertuche Dec 2018 A1
20180373994 Doucette Dec 2018 A1
20180374375 Doucette Dec 2018 A1
20190012441 Tuli Jan 2019 A1
20190025800 Goyal Jan 2019 A1
20190026106 Burton Jan 2019 A1
20190043054 Crank Feb 2019 A1
20190065453 Bulgakov Feb 2019 A1
20190065625 Shinn Feb 2019 A1
20190074006 Kumar Mar 2019 A1
20190089701 Mercury Mar 2019 A1
20190095599 Iliofotou Mar 2019 A1
20190116136 Baudart Apr 2019 A1
20190138639 Pal May 2019 A1
20190138640 Pal May 2019 A1
20190138641 Pal May 2019 A1
20190140996 Silberstein May 2019 A1
20190147084 Pal May 2019 A1
20190156292 Wehrle May 2019 A1
20190156921 Kohli May 2019 A1
20190171660 Kershaw Jun 2019 A1
20190179896 Anisimovich Jun 2019 A1
20190179897 Matskevich Jun 2019 A1
20190180175 Meteer Jun 2019 A1
20190236140 Canim Aug 2019 A1
20190236210 Makaremi Aug 2019 A1
20190236469 Canim Aug 2019 A1
20190258701 Leshem Aug 2019 A1
20190258900 Baikadi Aug 2019 A1
20190259293 Hellman Aug 2019 A1
20190260804 Beck Aug 2019 A1
20190272361 Kursun Sep 2019 A1
20190279767 Bates Sep 2019 A1
20190297498 Verma Sep 2019 A1
20190306107 Galbraith Oct 2019 A1
20190311036 Shanmugam Oct 2019 A1
20190320038 Walsh Oct 2019 A1
20190332669 Lewis Oct 2019 A1
20190340217 Tran Nov 2019 A1
20190355346 Bellegarda Nov 2019 A1
20190361966 Munro Nov 2019 A1
20190377825 Chang Dec 2019 A1
20190377853 Obaidi Dec 2019 A1
20190384895 Jin Dec 2019 A1
20190385595 Wabgaonkar Dec 2019 A1
20190392035 Indenbom Dec 2019 A1
20200012584 Walters Jan 2020 A1
20200012800 Karako Jan 2020 A1
20200012935 Goodsitt Jan 2020 A1
20200042596 Ravi Feb 2020 A1
20200050620 Clark Feb 2020 A1
20200051178 Albouyeh Feb 2020 A1
20200058299 Lee Feb 2020 A1
20200065384 Costello Feb 2020 A1
20200074052 Cunico Mar 2020 A1
20200089847 Poole Mar 2020 A1
20200103244 Cella Apr 2020 A1
20200104731 Oliner Apr 2020 A1
20200104966 Cella Apr 2020 A1
20200117791 Bingham Apr 2020 A1
20200118559 Huang Apr 2020 A1
20200119922 Bingham Apr 2020 A1
20200125944 Jauhar Apr 2020 A1
20200160458 Bodin May 2020 A1
20200169543 Vaughn May 2020 A1
20200183928 Wu Jun 2020 A1
20200184016 Roller Jun 2020 A1
20200184052 Ellison Jun 2020 A1
20200184151 Ekmekci Jun 2020 A1
20200201967 Maxwell Jun 2020 A1
20200202029 Tadayon Jun 2020 A1
20200226479 Germanakos Jul 2020 A1
20200234003 Bakman Jul 2020 A1
20200234605 Shuart Jul 2020 A1
20200234700 Heltewig Jul 2020 A1
20200243174 Burgess Jul 2020 A1
20200250230 Abhyankar Aug 2020 A1
20200250235 Abhyankar Aug 2020 A1
20200250275 Chowdhury Aug 2020 A1
20200257503 Weng Aug 2020 A1
20200272606 Leonov Aug 2020 A1
20200279020 Bar-on Sep 2020 A1
20200285700 Narayanan Sep 2020 A1
20200293950 Sanchez Sep 2020 A1
20200302913 Marcinkiewicz Sep 2020 A1
20200311210 Nama Oct 2020 A1
20200311615 Jammalamadaka Oct 2020 A1
20200311683 Chua Oct 2020 A1
20200320414 Neumann Oct 2020 A1
20200322361 Ravindra Oct 2020 A1
20200334334 Keskar Oct 2020 A1
20200342175 Gadde Oct 2020 A1
20200342850 Vishnoi Oct 2020 A1
20200342874 Teserra Oct 2020 A1
20200349199 Jayaraman Nov 2020 A1
20200349464 Lin Nov 2020 A1
20200349919 Wanas Nov 2020 A1
20200364271 Seol Nov 2020 A1
20200364737 Surati Nov 2020 A1
20200387594 Sandstrom Dec 2020 A1
20200394733 Lewis Dec 2020 A1
20210005190 Ji Jan 2021 A1
20210026943 Tiller Jan 2021 A1
20210027222 Rando Jan 2021 A1
20210044659 Kursun Feb 2021 A1
20210064726 Mannby Mar 2021 A1
20210065320 Bleiweiss Mar 2021 A1
20210073526 Zeng Mar 2021 A1
20210081609 Johnson Mar 2021 A1
20210081615 McRitchie Mar 2021 A1
20210081819 Polleri Mar 2021 A1
20210082397 Kennewick Mar 2021 A1
20210082400 Vishnoi Mar 2021 A1
20210082410 Teserra Mar 2021 A1
20210082424 Johnson Mar 2021 A1
20210083994 Pan Mar 2021 A1
20210089934 Thornley Mar 2021 A1
20210089936 Zhao Mar 2021 A1
20210097140 Chatterjee Apr 2021 A1
20210097571 Jin Apr 2021 A1
20210099464 Seaborn Apr 2021 A1
20210109769 Yang Apr 2021 A1
20210110014 Turgeman Apr 2021 A1
20210110330 Li Apr 2021 A1
20210118442 Poddar Apr 2021 A1
20210120206 Liu Apr 2021 A1
20210124843 Vass Apr 2021 A1
20210125058 Chowdhury Apr 2021 A1
20210133533 Adibi May 2021 A1
20210133627 Neumann May 2021 A1
20210133764 Adibi May 2021 A1
20210134179 Zilca May 2021 A1
20210136208 Adibi May 2021 A1
20210142164 Liu May 2021 A1
20210152507 Pengiel May 2021 A1
20210157715 Hand May 2021 A1
20210158234 Sivasubramanian May 2021 A1
20210158235 Sivasubramanian May 2021 A1
20210158805 Sivasubramanian May 2021 A1
20210158813 Sivasubramanian May 2021 A1
20210160223 Hwang May 2021 A1
20210167964 Fuerstner Jun 2021 A1
20210168148 Boodaei Jun 2021 A1
20210173905 Kursun Jun 2021 A1
20210174015 Bhattacharya Jun 2021 A1
20210174426 Isaacson Jun 2021 A1
20210176276 Kursun Jun 2021 A1
20210182098 Wardell Jun 2021 A1
20210182496 Shi Jun 2021 A1
20210191506 Wang Jun 2021 A1
20210192418 Kishore Jun 2021 A1
20210209480 Wang Jul 2021 A1
20210209513 Torres Jul 2021 A1
20210216726 Qin Jul 2021 A1
20210224671 Cristache Jul 2021 A1
20210224799 Ongpin Jul 2021 A1
20210224818 Choudhary Jul 2021 A1
20210224975 Ranca Jul 2021 A1
20210226961 Clark Jul 2021 A1
20210241231 Mullins Aug 2021 A1
20210241362 Nguyen Aug 2021 A1
20210241760 Whalin Aug 2021 A1
20210248425 Zong Aug 2021 A1
20210256052 Luo Aug 2021 A1
20210256417 Kneller Aug 2021 A1
20210258428 Fouquet Aug 2021 A1
20210266500 Taylor Aug 2021 A1
20210286989 Zhong Sep 2021 A1
20210295822 Tomkins Sep 2021 A1
20210303638 Zhong Sep 2021 A1
20210303798 Duong Sep 2021 A1
20210304075 Duong Sep 2021 A1
20210304149 Al-Sinan Sep 2021 A1
20210304297 Al-Sinan Sep 2021 A1
20210304733 Jalaluddin Sep 2021 A1
20210311973 Radhakrishnan Oct 2021 A1
20210312942 Rudzicz Oct 2021 A1
20210319527 Benkreira Oct 2021 A1
20210326428 Edwards Oct 2021 A1
20210326799 Leen Oct 2021 A1
20210327413 Suwandy Oct 2021 A1
20210334823 Warren Oct 2021 A1
20210334921 Austin Oct 2021 A1
20210342361 Radzewsky Nov 2021 A1
20210342399 Sisto Nov 2021 A1
20210342785 Mann Nov 2021 A1
20210350084 Zhang Nov 2021 A1
20210357378 Urdiales Nov 2021 A1
20210357766 Paul Nov 2021 A1
20210357835 Modi Nov 2021 A1
20210367778 Hamel Nov 2021 A1
20210374397 Zeng Dec 2021 A1
20210375272 Madwed Dec 2021 A1
20210379758 Chu Dec 2021 A1
20210383064 Wang Dec 2021 A1
20210390643 Fairchild Dec 2021 A1
20210390951 Gadde Dec 2021 A1
20210397984 Sun Dec 2021 A1
20210406836 Bar-on Dec 2021 A1
20210407504 Colleen Dec 2021 A1
20210407638 Neumann Dec 2021 A1
20210407679 Liu Dec 2021 A1
20220001549 Vadayadiyil Raveendran Jan 2022 A1
20220009370 Suhas Kulkarni Jan 2022 A1
20220012352 Boding Jan 2022 A1
20220027745 Podgorny Jan 2022 A1
20220028371 Xu Jan 2022 A1
20220067439 Zhang Mar 2022 A1
20220076283 Oliveira Mar 2022 A1
20220084151 Tripathi Mar 2022 A1
20220086131 Kinai Mar 2022 A1
20220092265 Bhattacharya Mar 2022 A1
20220092403 Jiang Mar 2022 A1
20220100772 Kadarundalagi Raghura Mar 2022 A1
20220100963 Anubhai Mar 2022 A1
20220100967 Pushkin Mar 2022 A1
20220101839 George Mar 2022 A1
20220101844 Yang Mar 2022 A1
20220105944 Ghannam Apr 2022 A1
20220108086 Wu Apr 2022 A1
20220121809 Bakman Apr 2022 A1
20220121820 Chopra Apr 2022 A1
20220129626 Liu Apr 2022 A1
20220129637 Kohita Apr 2022 A1
20220129766 Potts Apr 2022 A1
20220129917 Sloat Apr 2022 A1
20220156462 Mcnamara May 2022 A1
20220164643 Charnock May 2022 A1
20220166731 Rey May 2022 A1
20220167163 Dutt May 2022 A1
20220172633 Jha Jun 2022 A1
20220180888 Karri Jun 2022 A1
20220199075 Padmanabhan Jun 2022 A1
20220207452 Rorro Jun 2022 A1
20220208182 Zhang Jun 2022 A1
20220210150 Neubauer Jun 2022 A1
20220222235 Menghani Jul 2022 A1
20220237635 Das Jul 2022 A1
20220238183 Franco Jul 2022 A1
20220239489 Maruyama Jul 2022 A1
20220269589 Aggarwal Aug 2022 A1
20220270721 Schrempf Aug 2022 A1
20220300924 Mudumbai Srinivasa Sep 2022 A1
20220300970 Mudumbai Srinivasa Sep 2022 A1
20220309230 Lawrence Sep 2022 A1
20220318499 Xiao Oct 2022 A1
20220318763 Lee Oct 2022 A1
20220327487 Vontobel Oct 2022 A1
20220343257 Mohanty Oct 2022 A1
20220358152 Sultan Nov 2022 A1
20220366427 Stoops Nov 2022 A1
20220374604 Sivakumar Nov 2022 A1
20220374605 Sethi Nov 2022 A1
20220385703 Joshi Dec 2022 A1
20220399009 Okada Dec 2022 A1
20220399023 Gyanchandani Dec 2022 A1
20220414340 Zhang Dec 2022 A1
20220414694 Sokolovsky Dec 2022 A1
20220415467 Shin Dec 2022 A1
20220417238 Maiman Dec 2022 A1
20230004830 Arevalo Jan 2023 A1
20230004972 Rapowitz Jan 2023 A1
20230005603 Rahman Jan 2023 A1
20230008868 Ur Jan 2023 A1
20230019006 Villarroel Humérez Jan 2023 A1
20230020843 Bowers Jan 2023 A1
20230024033 Gaspardone Jan 2023 A1
20230033904 Tokarev Sela Feb 2023 A1
20230037119 Ganot Feb 2023 A1
20230038940 Barbe Feb 2023 A1
20230052381 Khalfan Feb 2023 A1
20230056672 Kim Feb 2023 A1
20230066957 Gambon Mar 2023 A1
20230075023 Zhu Mar 2023 A1
20230098405 Weisman-Smith Mar 2023 A1
20230098418 Nagaraja Mar 2023 A1
20230100264 Baker Mar 2023 A1
20230126720 Kim Apr 2023 A1
20230153136 Dennis May 2023 A1
20230153449 Li May 2023 A1
20230162124 Takahashi May 2023 A1
20230179622 Underwood Jun 2023 A1
20230198764 Panicker Jun 2023 A1
20230237504 Porter Jul 2023 A1
20230245552 Lewis Aug 2023 A1
20230254699 Chaudhary Aug 2023 A1
20230262054 Marasco Aug 2023 A1
20230274085 Su Aug 2023 A1
20230275766 Wagner Aug 2023 A1
20230298015 Kiraz Sep 2023 A1
20230316101 Pan Oct 2023 A1
20230317257 Kim Oct 2023 A1
20230352189 Sun Nov 2023 A1
20230359736 Deen Nov 2023 A1
20230360027 Jain Nov 2023 A1
20230360159 Leng Nov 2023 A1
20240005351 Sakamoto Jan 2024 A1
20240021100 Glaser Jan 2024 A1
20240033648 Johnston Feb 2024 A1
20240070234 Wells Feb 2024 A1
20240093267 Hsieh Mar 2024 A1
20240095617 Edwards Mar 2024 A1
20240110806 Bahnsen Apr 2024 A1
20240114037 Todasco Apr 2024 A1
20240146734 Southgate May 2024 A1
20240161071 Gnap May 2024 A1
20240171402 Ramezan May 2024 A1
20240177082 Leedom May 2024 A1
20240185096 Zhang Jun 2024 A1
20240202460 Schillace Jun 2024 A1
20240205013 Sorniotti Jun 2024 A1
20240211949 Edwards Jun 2024 A1
20240236094 Beaver Jul 2024 A1
20240242625 Reyna Jul 2024 A1
20240249189 Wang Jul 2024 A1
20240268762 Reiner Aug 2024 A1
20240289255 Mendelowitz Aug 2024 A1
20240303305 Chan Sep 2024 A1
20240331469 Moshe Oct 2024 A1
20240341244 Kim Oct 2024 A1
20240345832 Iruvanti Oct 2024 A1
20240370837 Rozovski Nov 2024 A1
20240371208 Igrec Nov 2024 A1
20240378067 Bakshi Nov 2024 A1
20240379101 Bhuwalka Nov 2024 A1
20240395159 Chang Nov 2024 A1
20240412168 Shrader Dec 2024 A1
20250013655 Mohanty Jan 2025 A1
Foreign Referenced Citations (1)
Number Date Country
WO-2017173263 Oct 2017 WO
Non-Patent Literature Citations (6)
Entry
Sulayman et al “Designing Security User Profiles via Anomaly Detection for User Authentication,” Crown, pp. 1-6 (Year: 2020).
Zhao et al “Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions,” IEEE Transactions on Mobile Computing, vol. 16, No. 2, pp. 552-565 (Year: 2017).
Kim et al “General Authentication Scheme in User-Centric IdM,” ICACT 2016, pp. 737-740 (Year: 2016).
Ren et al “A Novel Dynamic User Authentication Scheme,” 2012 International Symposium on Communications and Information Technologies (ISCIT), IEEE, pp. 713-717 (Year: 2012).
Ren et al “A Novel Dynamic User Authentication Scheme,” 2012 International Symposium on Communications and Information Technologies, IEEE, pp. 713-717 (Year: 2012).
Park et al “A Secure Remote User Authentication Scheme,” Third 2008 International Conference on Convergence and Hybrid Information Technology, IEEE Computer Society, pp. 368-373 (Year: 2008).
Related Publications (1)
Number Date Country
20230008868 A1 Jan 2023 US