Pre-Grant Publication Number: 20090049544
View Prior Art submitted by the community. You can see full text, rate and annotate the Prior Art by clicking on
any of the listed Prior Art references. You can also click on the name of the person who submitted art to view their profile
and any other Prior Art they have previously submitted.
How to Rate Prior ArtRating Prior Art - Click the thumbs up or down to indicate if a submission is relevant enough to the claims of the application to
deserve a spot in the Top 10 submissions that will be forwarded to the patent examiner. Rating should be based only on relevance.
For an explanation of prior art, please visit the Tutorial Page. Annotations(0)
Title IEE Proceedings online no. 20031000
Biometrics using inherited characteristics are frequently used in security systems. An
alternative metric is user behaviour. Examples of user behaviour are the set of web pages accessed
over a number of Internet sessions, or, the set of television programmes viewed by an individual
over a number of days. A mathematical framework is developed which enables simple and robust
identification algorithms based on this kind of user behaviour to be presented.
Annotations(0) Submitted by: Ashish JogiLast updated: about 4 years ago
Patent/Application # 6334121
A usage based pattern authenticator for monitoring and reporting on user usage patterns in an operating system using a set of security rules and user usage patterns.
Patent/Application # 20080222038
An improved location based authentication (LBA) system for detecting fraudulent transactions committed by means of misuse of payment cards is disclosed. The improved LBA system performs a series of transaction analysis and generates a fraud-score which provides an indication as whether to authorize an attempted transaction. The system is designed to increase profitability of credit card companies by reducing the accumulated losses due to fraud. In one embodiment, the system detects fraud by analyzing the behavior patterns of card holders and merchants.
Patent/Application # CN1517889
A keyboard device with authentication function based on user's behavious habit features that a user types in a character string by keyboard, the waveform variation of its electric signals is sampled to summerize the keystroke characteristics of the user, and the parameters of said keystroke characteristics are used to judge if the current keystrokes of a user are legal. If they are legal, relative resource is released to the user.
Patent/Application # JP2006065572
SOLUTION: The behavioral pattern extraction device comprises a history series extraction part for extracting history series of each user from a passage history database storing the user's passage history acquired from authentication devices and sensors, a history series database for storing the extracted history series, a behavioral pattern extraction part for extracting one or more behavior patterns of each user from a plurality of history series of each user, and a behavioral pattern database for storing the extracted behavioral patterns.
Patent/Application # PERSONAL AUTHENTICATION SYSTEM
PROBLEM TO BE SOLVED: To prevent the illegal use of a password or the like by a third person and to improve the reliability of personal authentication.
SOLUTION: Mouse button click timing pattern data and moving locus pattern data in which a personal habit (biometrics) is most expressed out of mouse operation are added to character string code data in a data format group of a password or the like.
[Derwent Record]: Authentication system for information processing system, registers information about clicking time pattern and movement pattern of mouse
Title CLAM behavioural pattern monitoring authenticates users
Human behavioral pattern is learnt and used in the authentication process.
Patent/Application # WO2008/060659 a2
Abstract: A method and system for inhibiting power of a vehicle given to a third party. The system includes a mode-indicating, an authenticator coupled to the mode-indicating device, and a power inhibiting device coupled to the mode-indicating device
and adapted to selectively inhibit the power of the vehicle.
Patent/Application # US 2008/0033637 A1
The identity of a user of a mobile device is verified by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing a feature of the current route to characteristic features of previous routes stored on the mobile device.
Patent/Application # US 2006/0224898 A1
Computer user profiling is based on behavioral biometrics. Distinctive profiles for users are established based on how they use a motion-based input device such as a mouse and/or a keyboard, during a training period. User identification is established by training neural networks. Experimental data is provided.
Title Inception of relation-based user authentication system coupled with user behavior analysis
This publication discloses an User Authentication can grow more than the typical login-password interface and can be more personalized and customized. Here an attempt is being made to bring forth a new paradigm of user authentication interface. We are trying to associate the user authentication process with a more intricate user behavior analysis where we try to comprehend user interest, tendencies and preferences.
Title Personal Identification Techniques Based on Operational Habit of Cellular Phone
This paper discloses personal identification techniques based on operational habit of a device in order to authenticate the person using the device.