Unlock instant, AI-driven research and patent intelligence for your innovation.

Asset accessibility through continuous authentication to mobile devices

A technology of mobile devices and assets, applied in security devices, wireless communications, instruments, etc., can solve problems such as infringing on user experience

Active Publication Date: 2018-08-28
QUALCOMM INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, after typing in a password, PIN or fingerprint to obtain data and / or access a relying party, there is still a window of opportunity for thieves
Furthermore, at the same time, today's frequent requirement for users to continuously manually authenticate themselves via PIN, password or fingerprint keying laterally violates the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset accessibility through continuous authentication to mobile devices
  • Asset accessibility through continuous authentication to mobile devices
  • Asset accessibility through continuous authentication to mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The word "exemplary" or "example" is used herein to mean "serving as an example, instance, or illustration." Any aspect or embodiment described herein as "exemplary" or as "example" is not necessarily to be construed as preferred or advantageous over other aspects or embodiments.

[0013] As used herein, the term "mobile device" refers to any form of programmable computer device, including (but not limited to) laptop computers, tablet computers, smartphones, televisions, desktop computers, home appliances, cellular phones, personal televisions Devices, Personal Data Assistants (PDAs), Palmtop Computers, Wireless Email Receivers, Cellular Phones with Multimedia Internet Capability, Global Positioning System (GPS) Receivers, Wireless Game Controllers, Receivers in Vehicles (e.g., Cars) , interactive game devices, notebook computers, smartbooks, netbooks, mobile TV devices, mobile health devices, smart wearable devices or any computing device or data processing equipment. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A mobile device may contain multiple sensors and processors. The processor may be configured to determine trust data for the asset based on input from the plurality of sensors, determine whether the asset is accessible or inaccessible based on evaluating the trust data with a trust determination algorithm, and based on information from all The input from the plurality of sensors continuously updates the trust data to continue to allow access to the asset or to revoke access to the asset.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Patent Application Serial No. 14 / 681,972, filed April 8, 2015, filed February 3, 2015, and entitled "Continuously Updating Assets Based on Sensor Inputs" State of the Mobile Device (Mobile Device to Continuously Update the Status of Asset Based upon Sensor Inputs)", the contents of which are hereby incorporated by reference for all purposes as All manners cited are incorporated herein by reference. technical field [0003] The present invention relates to a mobile device that provides enhanced security by continuously monitoring whether the correct user is accessing assets. Background technique [0004] Mobile devices can be very prone to loss or theft due to their mobile nature. Today, the main defense available to protect data on mobile devices is the timeout / lock screen feature. Unfortunately, many people do not use the timeout / lock screen feature due to its inconvenience...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/31G06F21/32G06F2221/2111G06F2221/2149H04W12/065H04W12/082H04W12/08
Inventor 劳伦斯·伦德布拉德马克·巴普斯特乔治·迈克尔·米利基希约恩·阿泽恩伊恩·布雷特尔伊丽莎·樱子·杜乔纳森·格里菲思苏耶普拉卡什·甘蒂萨米尔·古普塔戴维·威廉·伯恩斯穆哈麦德·伊布雷赫·塞赞
Owner QUALCOMM INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More