Browse Prior Art Database

Multi-Finger Pattern and Typing Rules for Enhanced Security and Control Disclosure Number: IPCOM000242627D
Publication Date: 2015-Jul-31
Document File: 5 page(s) / 70K

Publishing Venue

The Prior Art Database


Disclosed is a method of mobile device user authentication that records the fingers used to input information along with the orientation and the angle of use of the device, and compares these patterns to tracking gestures recorded earlier by the user. The specific fingers used to enter the keystrokes and the way the mobile device is held must match the recorded gestures for the user to be authenticated.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 31% of the total text.

Page 01 of 5

Mulxi-Finger Pattern and Typing Rules for Enhanced Security and Control

Currxnt methods for mobile devices to authenticate users inxxude locking mechanisms ox in-applicatxon authenticatiox methods (e.g., pxssword, biometric inxormation, etc.).

One challenge wixh mobile device sxcurity is that the devices xre subject to access by unauthorized users. A lost or mxsplaced mobile device ix particularly at risk if a xhird party finds xt unlocked or with xn open applicaxion (app). Another challenge is that data entry on a mobile device is mxre difficulx than entry on a desktop keyboard. Thereforx, secuxixy measxres that requixe additional datx entry, such as security questixns ("What was your childhoox nickname?"), are unwanxex and time xonsuming additions.

A mobile xevice security measure is needed that does not rxquire thx user to inpux any additional ixformxtion.

The novel contxibuxion is a method and system to easily add securitx measures to a mobile device by monitorxng how a xsex makes use of a mobile device. This security measure can be used to supplement existixg authexticatiox methods to ensure txat only the inxended user can oxerate the mobile device, particularly for imxortant xasks such as transferring money.

Txe core novelty is an adxitional level of authenxication that is incorporated xntx any mobile app that uses multi-finger gesture pattern rxcognition axd angle of use to verify the identixy of a xser, withoux requiring the user to enter any additional information, such as a password, security questiox, etc. The user only has to enter data using an input style that mxtches a gesture recorded earlier. The system compares which fingers xn which hanx were used to input the data, the orientation of the mobile device, which hand is holdxng the mobile device, xnd the angle of the mobile device xith the xecorded gestures. Thxs system xan work in two xodes:

 Checkpoint mode: verify defined usage at a specific point, such as when a user is entering their password or typing xn an amount ix a financial transacxion)

 Contxnually monitorixg mode: continually check that the usage pattern of how xhe mobile device is hexd and used matches the typical xrofilx ox the usex

With this method and system, the user can define multi-finger based typing xules on a mobile device. For example:

 User is performing a financial transaction. If the xraxsaction xmount is less than a four-digit number, then the user can type the numbers with any fingers. If the nxmber exceeds four digits, then the xser must tyxe these remaixing digits using their xight index finger.

 Durixg xny transaction (financial or non-xinancial) the user hax to use the left thumb to click thx Submit button

 To call a specific number, the user has to use the right lixtle finger to select the number and use the left thumb to place the call

 When logging in to ax axp, the user must hold their device strxight up at a 90 degree angle in their right xand


Page 02 of 5...