The patent's assignee is
News editors obtained the following quote from the background information supplied by the inventors: "The last decade has seen rapid growth in the number of mobile devices and their uses. Mobile devices include, but are not limited to, cellular phones, smart phones, tablet computers, and the like. However, as a result of their popularity and functionality, mobile devices have become a burgeoning target for theft. In addition, mobile devices are typically used to store private and/or confidential information. Such mobile devices are typically installed with applications (e.g. emails, etc.) that provide an access to or contain private and/or confidential information. Consequently, mobile devices have become more sensitive and valuable. Thus, security measures are usually required to verify the identity of the user before allowing access to the mobile devices.
"Several applications for securing the access to the mobile devices are currently available. Unfortunately, such applications are static by nature and are usually configured to authenticate the user identification based on only one, or in some cases two parameters, i.e., fingerprint, voice recognition or eye scan, and so on. The use of a passcode alone has become a less reliable means to authenticate the user. This is due to a computer hacker's ability to locate, copy, or electronically identify or track the required password, using specialized software programs. Alternative prior art solutions allow verification of the user identity based on implicit inputs entered by a user of the device for the purpose of authentication, which are then verified by the device's operating system. Such inputs include a password, a passcode, or a fingerprint identifier. The passcode may be in a sequence of digits or a geometric shape drawn by the user on the device's display.
"Nevertheless, the use of a password or passcode is a less secure means to verify the user identity because a passcode can be tracked, locked, or discovered using malicious software programs, and further, some users simply do not keep their password protected. The use of a fingerprint has also not proven to provide a reliable method to verify a user, as fingerprints can be easily duplicated or simulated to hack to the mobile device.
"Therefore, it would be advantageous to provide a solution that overcomes the deficiencies for verifying the user identity for at least providing an access to at least the user's mobile device."
As a supplement to the background information on this patent application, VerticalNews correspondents also obtained the inventors' summary information for this patent application: "Certain embodiments disclosed herein include a system and for method for verifying an identity of a user accessing a user device. The method comprises receiving a request to verify the user identity accessing the user device; receiving a plurality of multimedia identification signals from the user device; querying a deep-content-classification (DCC) system to find a match between at least one concept structure associated with the user and the plurality of received multimedia identification signals, wherein the concept structure is created during a sign-in procedure; and sending an authentication notification upon determination of a match between the at least one concept structure and the plurality of received multimedia identification signals.
BRIEF DESCRIPTION OF THE DRAWINGS
"The subject matter disclosed herein is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features and advantages of the invention will be apparent from the following detailed description taken in conjunction with the accompanying drawings.
"FIG. 1 is a diagram of a DCC system for creating concept structures.
"FIG. 2 is a flowchart illustrating the operation of the patch attention processor of the DCC system.
"FIG. 3 is a block diagram depicting the basic flow of information in a large-scale video matching system.
"FIG. 4 is a diagram showing the flow of patches generation, response vector generation, and signature generation in a large-scale speech-to-text system.
"FIG. 5 is a flowchart illustrating the operation of the clustering processor of the DCC system.
"FIG. 6 is a flowchart illustrating the operation of the concept generator of the DCC system.
"FIG. 7 is a diagram of a network system utilized to describe certain disclosed embodiments.
"FIG. 8 is a flowchart illustrating a method for verifying user identification based on multimedia identification parameters (MMIDPs) according to one embodiment.
"FIG. 9 is a flowchart illustrating a method for verifying the identification of the user according to an embodiment."
For additional information on this patent application, see: Raichelgauz, Igal; Ordinaev,
Keywords for this news article include: Software.
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Chobani Counters Competition With Expanded Lineup
- Reid: Bundy Backers Are 'Domestic Terrorists'
- Ex-BP Employee Settles Insider Trading Charges
- Venture Investments in U.S. Highest Since 2001
- Colo. Cleantech Program Calls for Entrepreneurs
- Unemployment Rates Down, Job Gains Up in March
- Hiring Fair for Veterans, Job Seekers
- VW Beetle Marks 65th Year in U.S.
- 8 Million Signups Put Obamacare Ahead of Predictions
- The Biebs Crashes Drake's Release Party