The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 25, 2018

Filed:

Feb. 28, 2017
Applicant:

Intel Corporation, Santa Clara, CA (US);

Inventors:

Jasmeet Chhabra, Hillsboro, OR (US);

Ned M. Smith, Hillsboro, OR (US);

Micah J. Sheller, Hillsboro, OR (US);

Nathan Heldt-Sheller, Portland, OR (US);

Assignee:

Intel Corporation, Santa Clara, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/57 (2013.01); G06F 21/31 (2013.01); G06F 21/32 (2013.01); G06F 21/53 (2013.01); G06N 99/00 (2010.01); H04W 12/06 (2009.01); H04W 12/12 (2009.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 21/31 (2013.01); G06F 21/316 (2013.01); G06F 21/32 (2013.01); G06F 21/53 (2013.01); G06N 99/005 (2013.01); H04L 63/083 (2013.01); H04W 12/06 (2013.01); H04W 12/12 (2013.01); G06F 2221/034 (2013.01); G06F 2221/2115 (2013.01); H04L 63/0861 (2013.01); H04L 2463/082 (2013.01);
Abstract

Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed.


Find Patent Forward Citations

Loading…