User authentication for mobile devices using behavioral analysis
Abstract:
Usage patterns of an authentic user of a mobile device are generated from data collected representing usage by the authentic user. These usage patterns may then be compared to monitored usage of the mobile device. If usage of the mobile device exceeds a threshold based on one or more of the usage patterns, access to data on the mobile device can be prevented.
Public/Granted literature
Information query
Patent Agency Ranking
0/0