Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method and System for Adaptive Device Security

IP.com Disclosure Number: IPCOM000201323D
Publication Date: 2010-Nov-10
Document File: 2 page(s) / 20K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system for adapting security phrases, codes and identities based on changes in a user’s behavior, habits, or responses. Thus, the method and system may enable security identity of devices to be adapted based on change in the user behavior, responses, and habits.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Method and System for Adaptive Device Security

Disclosed is a method and system for adapting security phrases, codes and identities based on changes in a user's behavior, habits, or responses. The system obtains an acceptable security identity from a user. Examples of the security identity include a pass phrase or a pass code, a fingerprint scan, a voice sample, or other identity. After obtaining the security identity from the user, the system keeps track of the user. In a scenario, the system may track changes in the user's behavior, responses, and habits. For example, if the security identity corresponds to voice recognition, the system would keep track of the voice of the user to determine the gradual and consistent changes in the user's voice over a period of time. In the same manner, for location-based security, the system would analyze the changes in access pattern of the user. The changes in access pattern may correspond to repetitive unlocking and use of the device in a certain location, marked by the coordinates of the device used.

As a result of keeping track of changes in user's behavior, response, and habits, the system is able to detect a pattern of changes over time. Based on the changes in pattern, the system would then prompt the user to adapt the security identity. For example, the system may prompt the user if it is acceptable to update the security identity based upon the changes detected with respect to the user's behavior, responses, and habits.

Consider an exemplary scenario, where a child is accessing a security system to enter a room. The child is given access to the room when identity of the child is confirmed by the securi...