Abstract: A mechanism for providing additional layer of security to the already existing and authentication mechanism available on a mobile device is provided. According to an embodiment, the system comprises a usage authentication interface (114) that displays one or more mobile software applications for usage based authentication, wherein the usage based authentication interface allows the user to select one or more software applications for usage based authentication. The usage pattern computing module (116) calculates plurality of usage statistics for one or more selected mobile software applications by user wherein usage statistic comprises a set of calculated value. The usage bracket matrix stores one or more usage patterns which comprise plurality of calculated values generated by the usage pattern computing module (116). An authentication application module (118) authenticates user to log on to the mobile device based on successful matching of patterns stored in usage bracket matrix with user-fed usage pattern. If the matching fails, the user will not be authenticated to the mobile device.
Claims:1. A computer implemented method for authenticating a user using one or more mobile applications in a mobile device, the method comprising:
selecting one or more mobile applications in the mobile device by the user, for a usage bracket matrix computation wherein a usage based authentication software application is enabled in the mobile device;
enabling the mobile application for usage based authentication computation by a usage authentication interface (114);
calculating usage statistics for one or more selected mobile applications by a usage pattern computing module (116), wherein usage statistic comprises a set of calculated values;
generating the usage pattern for the one or more selected mobile applications by a usage pattern computing module (116), wherein the usage pattern are stored in a memory (102);
storing the one or more usage pattern in the usage bracket matrix, wherein the usage bracket matrix stores one or more calculated values generated by the usage pattern computing module (116);
enabling the user to enter a usage pattern through an I/O interface (106) wherein the user-fed usage pattern is matched with one or more usage patterns stored in the usage bracket matrix; and
authenticating the user by a authentication applications module (118) to log on to the mobile device based on successful matching of usage pattern in usage bracket matrix with one or more user-fed usage patterns as input.
2. The method of claim 1, wherein the usage pattern computing module (116) further configured to perform the steps of:
configuring one or more parameter to create usage pattern, wherein the parameter comprises a wave “w”, a time “t” and one or more weights “W”;
collecting a set of data points for the mobile software application for one or more usage based authentication computation;
defining / configuring the Constants Wave “w” in hours, time “t” in hours, and Parameter Weights as (W1, W2, W3);
collecting data points for the applications identified for usage based computation using total usage time , number of launches and longest duration);
calculating a set of usage pattern parameters (p1, p2, p3) for each application using the data collected and constant defined above periodically at time interval of “t”;
evaluating rank (r1, r2, ..rn) of one or more mobile software application with the set of the usage pattern parameters (P1, P2, .. Pn);
calculating a usage number of one or more software applications, wherein the usage number is calculated using plurality of weights (W1, W2, ..Wn), plurality of parameters (P1, P2, ..Pn) and plurality of ranks (r1, r2, ..rn); and
storing and mapping one or more usage numbers with the usage bracket, wherein the usage bracket is defined by a range of usage numbers.
3. The method of claim 1, wherein the usage based authentication identifies a set of mobile software applications to calculate the usage frequency of the mobile software applications by user;
4. The method of claim 1, wherein the usage pattern parameter for each mobile software application further performing the steps of;
calculating a usage percentage (p1), wherein the usage percentage (p1) is calculated by total time spent on one or more mobile software application (in hours) in a wave/w)*100;
calculating the application launch frequency percentage (p2), wherein the application launch frequency percentage (p2) is calculated by number of times one or more mobile software application is launched in a wave/Total number of one or more mobile software application launches in a wave)*100; and
calculating a longest Active Duration (p3) for the one or more mobile software application, wherein longest Active Duration (p3) indicates the longest duration usage of the one or more mobile software application in a single session.
5. The method of claim 2, wherein the usage statistics comprises one or more mobile software applications, one or more usage number, wherein the usage number is calculated for an identified mobile software application during a wave using formula UN = (W1(r1) + W2(r2) + W3(r3) ) / (W1 + W2 + W3).
6. The method of claim 2, wherein the usage statistics comprises one or more mobile software applications, one or more usage Bracket, wherein usage bracket is configured to determine the usage bracket of mobile software application usage as high, medium and low, wherein a range from 5 to 10 is defined for low level, wherein 3 to 5 is defined for medium and wherein 1 to 3 is defined for high.
7. The method of claim 2, wherein one or more parameters (P1, P2… Pn) are ranked (r1, r2, … rn) based on one or more calculated values.
8. A system for authenticating a user in a mobile device, the system comprising:
a memory storing instructions;
a processor coupled to the memory, wherein the processor further comprises:;
an identification module (112) to select one or more mobile applications in the mobile device by the user, wherein a usage based authentication software application is enabled in the mobile device;
a usage authentication interface (114), to display and select the mobile applications to compute usage based authentication;
a usage pattern computing module (116) to calculate usage pattern for one or more selected mobile applications, wherein usage pattern comprises a set of calculated values;
a usage bracket matrix, wherein the usage bracket matrix stores one or more calculated values generated by the usage pattern computing module (116);
an I/O interface (106) to enable user to enter a usage pattern, wherein the user-fed usage pattern is matched with one or more usage pattern stored in usage bracket matrix; and
an authentication applications module (118), wherein the authentication applications module (118) allows user to log on to the mobile device based on successful matching of usage pattern in usage bracket matrix with one or more user-fed usage patterns as input. If the matching fails, the user will not be authenticated to the mobile device.
, Description:As Attached
| # | Name | Date |
|---|---|---|
| 1 | 201621003562-IntimationOfGrant29-11-2023.pdf | 2023-11-29 |
| 1 | Form 5 [01-02-2016(online)].pdf | 2016-02-01 |
| 2 | Form 3 [01-02-2016(online)].pdf | 2016-02-01 |
| 2 | 201621003562-PatentCertificate29-11-2023.pdf | 2023-11-29 |
| 3 | Form 18 [01-02-2016(online)].pdf | 2016-02-01 |
| 3 | 201621003562-CLAIMS [01-05-2020(online)].pdf | 2020-05-01 |
| 4 | Drawing [01-02-2016(online)].pdf | 2016-02-01 |
| 4 | 201621003562-FER_SER_REPLY [01-05-2020(online)].pdf | 2020-05-01 |
| 5 | Description(Complete) [01-02-2016(online)].pdf | 2016-02-01 |
| 5 | 201621003562-OTHERS [01-05-2020(online)].pdf | 2020-05-01 |
| 6 | REQUEST FOR CERTIFIED COPY [29-03-2016(online)].pdf | 2016-03-29 |
| 6 | 201621003562-FORM 3 [16-04-2020(online)].pdf | 2020-04-16 |
| 7 | 201621003562-POWER OF ATTORNEY-(21-04-2016).pdf | 2016-04-21 |
| 7 | 201621003562-Information under section 8(2) [16-04-2020(online)].pdf | 2020-04-16 |
| 8 | 201621003562-FER.pdf | 2019-11-01 |
| 8 | 201621003562-CORRESPONDENCE-(21-04-2016).pdf | 2016-04-21 |
| 9 | REQUEST FOR CERTIFIED COPY [04-05-2016(online)].pdf | 2016-05-04 |
| 9 | 201621003562-Correspondence-020516.pdf | 2018-08-11 |
| 10 | 201621003562-Correspondence-110216.pdf | 2018-08-11 |
| 10 | Form 3 [06-09-2016(online)].pdf | 2016-09-06 |
| 11 | 201621003562-Form 1-110216.pdf | 2018-08-11 |
| 11 | 201621003562-Form 3-020516.pdf | 2018-08-11 |
| 12 | 201621003562-Form 1-110216.pdf | 2018-08-11 |
| 12 | 201621003562-Form 3-020516.pdf | 2018-08-11 |
| 13 | 201621003562-Correspondence-110216.pdf | 2018-08-11 |
| 13 | Form 3 [06-09-2016(online)].pdf | 2016-09-06 |
| 14 | 201621003562-Correspondence-020516.pdf | 2018-08-11 |
| 14 | REQUEST FOR CERTIFIED COPY [04-05-2016(online)].pdf | 2016-05-04 |
| 15 | 201621003562-CORRESPONDENCE-(21-04-2016).pdf | 2016-04-21 |
| 15 | 201621003562-FER.pdf | 2019-11-01 |
| 16 | 201621003562-Information under section 8(2) [16-04-2020(online)].pdf | 2020-04-16 |
| 16 | 201621003562-POWER OF ATTORNEY-(21-04-2016).pdf | 2016-04-21 |
| 17 | 201621003562-FORM 3 [16-04-2020(online)].pdf | 2020-04-16 |
| 17 | REQUEST FOR CERTIFIED COPY [29-03-2016(online)].pdf | 2016-03-29 |
| 18 | 201621003562-OTHERS [01-05-2020(online)].pdf | 2020-05-01 |
| 18 | Description(Complete) [01-02-2016(online)].pdf | 2016-02-01 |
| 19 | Drawing [01-02-2016(online)].pdf | 2016-02-01 |
| 19 | 201621003562-FER_SER_REPLY [01-05-2020(online)].pdf | 2020-05-01 |
| 20 | Form 18 [01-02-2016(online)].pdf | 2016-02-01 |
| 20 | 201621003562-CLAIMS [01-05-2020(online)].pdf | 2020-05-01 |
| 21 | Form 3 [01-02-2016(online)].pdf | 2016-02-01 |
| 21 | 201621003562-PatentCertificate29-11-2023.pdf | 2023-11-29 |
| 22 | Form 5 [01-02-2016(online)].pdf | 2016-02-01 |
| 22 | 201621003562-IntimationOfGrant29-11-2023.pdf | 2023-11-29 |
| 1 | SearchStrategy_31-10-2019.pdf |