US20130198862A1 - Identity Verification for at Least One Party to a Text-Based Communication - Google Patents
Identity Verification for at Least One Party to a Text-Based Communication Download PDFInfo
- Publication number
- US20130198862A1 US20130198862A1 US13/611,858 US201213611858A US2013198862A1 US 20130198862 A1 US20130198862 A1 US 20130198862A1 US 201213611858 A US201213611858 A US 201213611858A US 2013198862 A1 US2013198862 A1 US 2013198862A1
- Authority
- US
- United States
- Prior art keywords
- user
- text
- based communication
- chat
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Definitions
- the present invention relates to instant messaging (IM) and other communication systems, and more particularly, to techniques for validating the identity of participants to a communication.
- IM instant messaging
- Instant messaging systems provide real-time communication over a network between two or more users employing client devices.
- Instant messaging systems typically provide an indication of whether a user is online and likely available to receive an instant message in a timely manner. While instant messaging systems offer many benefits, they also present a number of challenges.
- IM systems typically indicate which users in a buddy list are currently logged on to the IM server
- the parties to an IM session cannot be sure of the identity of the other party.
- a particular username may appear in a buddy list
- a person other than the actual user may be employing the username.
- a sender may inadvertently click on the wrong username when initiating a chat session. Either scenario can result in information being sent to an unintended recipient.
- an identity of at least one user to a text-based communication is verified by obtaining a plurality of characteristic features of at least one prior text-based communication between the at least one user and at least one additional user; comparing the plurality of characteristic features to a current session of the text-based communication; and verifying the identity of the at least one user based on a result of the comparison.
- the text-based communication can optionally be suspended if a user is not verified and/or an alarm can be generated.
- the characteristic features can be compared to a current session, for example, using statistical properties of the words entered by the user and/or statistical properties of the dynamics of the user's keystrokes.
- the characteristic features can be obtained, for example, using machine learning techniques.
- the characteristic features can be recorded, for example, in at least one feature vector and/or one or more rules.
- FIG. 1 illustrates an exemplary network environment in which the present invention can operate
- FIG. 2 illustrates an exemplary IM identity validation feature vector between a pair of exemplary chat participants
- FIG. 3 is a flow chart describing an exemplary implementation of an IM identity validation process incorporating aspects of the present invention.
- FIG. 4 is a block diagram of an IM identity validation system that can implement the processes of the present invention.
- aspects of the present invention provide methods and apparatus for validating the identity of one or more parties to an IM session.
- the disclosed IM identity validation techniques can detect if a sender inadvertently clicks on the wrong username when initiating a chat session, or if a person is disguising himself or herself as another user.
- the disclosed IM identity validation techniques can detect, for example, if a user leaves a current chat window unattended and another user enters the conversation with the same username as the absent user.
- the disclosed IM identity validation techniques validate the identities of both parties based on previous chatting patterns between the chat participants. In this manner, communicating sensitive or confidential information to an unintended recipient can be avoided.
- a number of existing IM identity validation techniques present one or more challenges to the user during an IM session. The participants, however, may be annoyed by the challenge questions.
- the disclosed IM identity validation techniques operate in the background and monitor the chat session relative to prior chatting patterns between the current chat participants. For example, the disclosed IM identity validation techniques observe current word use, keystroke patterns and/or other chat session dynamics and determine if they are consistent with previously observed chatting patterns between the current chat participants. In this manner, the disclosed approach does not require any explicit authenticity challenges and thereby avoids potentially annoying the users with such challenges.
- FIG. 1 illustrates an exemplary network environment 100 in which the present invention can operate.
- IM clients 110 two or more users employing IM clients 110 - 1 through 110 -N (hereinafter, collectively referred to as IM clients 110 ) communicate over a network 120 , such as the Internet, the Public Switched Telephone Network (PSTN), or any wired or wireless network (or combination thereof).
- the IM clients 110 are logged in to one or more IM servers 150 , in a known manner.
- the exemplary IM servers 150 employ an IM identity validation process 300 incorporating aspects of the present invention to validate the identity of one or more parties to an IM session.
- a storage device 180 optionally stores IM logs between chat participants, as well as feature vectors or other mechanisms for recording the prior chatting patterns between chat participants, as discussed further below in conjunction with FIG. 2 .
- the present invention also applies to other pair-wise text-based communications, such as electronic mail and texting or chat on cellular telephones, as would be apparent to a person of ordinary skill in the art.
- the present invention also applies to any text-based communication protocols, including, for example, Internet Relay Chat (IRC) and Short Message Service (SMS) protocols, as would be apparent to a person of ordinary skill in the art.
- IRC Internet Relay Chat
- SMS Short Message Service
- the features and functions of the present invention are performed by the exemplary IM server 150 . It is noted, however, that the features and functions of the present invention can optionally be employed by one or more IM clients 110 , or by another processor or hardware device.
- two-party chatting employ a writing style that is different than a formal writing style.
- two particular chat participants may utilize patterns, styles and/or keyboard dynamics when they chat with one another that can distinguish the pair-wise communication from communications involving other pairs.
- two particular chat participants may employ a distinct vocabulary when chatting with one another (e.g., frequent use of certain words, proper names, terms of endearment and/or nicknames).
- the relationship between the two particular chat participants such as whether they are close friends or colleagues, may lead to certain distinct patterns, styles and/or keyboard dynamics.
- chat participants may be close friends that chat often, leading to a higher frequency of using slang terms or a more relaxed concern about grammar, punctuation and/or spelling.
- chat participants that are business colleagues may employ frequent acronyms or technical terminology that may only be used by those familiar with a given project.
- keystroke dynamics e.g., typing speed and other statistical properties
- keystroke dynamics can distinguish the pair-wise communication from communications involving other pairs.
- habitual typing rhythm patterns can be monitored, such as, for example, keystroke latency, keystroke duration and overall typing speed.
- keystroke latencies are the elapsed times between successive keystrokes (e.g., the elapsed time between the release of the first key and the depression of the second).
- the duration of each keystroke is the amount of time a given key is held down.
- the exemplary embodiment employs machine learning techniques to observe the chat sessions between each pair (or larger group chat) of chatting participants.
- the machine learning techniques characterize particular features that can distinguish the distinct patterns, styles and/or keyboard dynamics of particular pairs of chatting participants.
- the machine learning techniques can observe, for example, whether a given chat session employs a plurality of languages (for example, using a mixture of Chinese and English in cases of one Chinese speaker chatting with another Chinese speaker), chat duration, as well as indicators such as gender, age, race and nationality that can be ascertained from prior chats.
- FIG. 2 illustrates an exemplary IM identity validation feature vector 200 between a pair of exemplary chat participants A and B.
- the exemplary IM identity validation feature vector 200 comprises the following features: emoticon usage frequency, acronym usage frequency, multi-language usage frequency, typing speed, all lower-case usage (a Boolean-valued feature indicating whether the chat thus far has all been typed in lower case by the given chat participant) and complicated sentence frequency.
- emoticon usage frequency the presence of emoticon usage in general, and especially certain emoticons, suggests a familiarity between the pair of users.
- acronyms and multiple languages in a chat session can distinguish particular pairs of chatting participants.
- the exemplary feature vector 200 could conceivably be Boolean values, expressing these feature vectors as frequencies (e.g., values between 0 and 1) can add precision to the identity authentication process. By watching many previous conversations between the pair of users, there would be a typical range of emoticon usage and acronym usage for each party. If several components of the feature vector for a given conversation start turning up with values outside of the 95% (two standard deviations) confidence range or 99.7% (three standard deviations) confidence range, for example, it may suggest that the person on the other end of the chat is not the person they are thought to be.
- emoticon and acronym usage frequency can be computed, for example, by treating emoticons and acronyms, respectively, as words and computing the fraction of words that are emoticons or acronyms.
- the multi-language frequency feature may be computed by counting the fraction of sentences that use words from two languages (or from two specific languages).
- the exemplary typing speed feature may be computed by taking the average number of words per minute typed from the time of the beginning of typing to the end of the message (or end of typing, if, e.g., it can be determined with some degree of likelihood that the typist has been distracted before completing the message).
- the all-lower-case usage feature here taken to be a binary value, may be computed by checking whether the user has typed entirely in lower case or not, and finally the exemplary complex sentence frequency feature may be computed by taking the fraction of sentences having more than a total of K words or K′ syllables for some suitable values of K and/or K′.
- FIG. 3 is a flow chart describing an exemplary implementation of an IM identity validation process 300 incorporating aspects of the present invention.
- the exemplary IM identity validation process 300 initially employs machine learning techniques during step 310 to observe each pair-wise chat. In this manner, by observing and analyzing chat messages and “keyboard dynamics” in real-time, the IM identity validation process 300 can validate the pair (or more) of participants. For example, standard statistical machine learning techniques can be employed during step 310 .
- the system may have a set of pre-defined features such as ⁇ slang frequency, acronym frequency, misspelling frequency ⁇ and it may learn from viewing many chats between two chat participants that once at 100 words of a chat are seen the frequencies for these values, for a given one of the participants, given the presence of the pair chat, are in the range ⁇ s ⁇ 2 ⁇ s.100 , ⁇ a,100 , ⁇ m ⁇ 2 ⁇ m,100 ⁇ , each with probability 95%, where ⁇ s , ⁇ a , ⁇ m ⁇ are the means, and ⁇ s,100 , ⁇ a,100 , ⁇ m,100 ⁇ are the standard deviations of ⁇ slang frequency, acronym frequency, misspelling frequency ⁇ given that 100 words of the chat have been seen.
- the IM identity validation process 300 can optionally verify that the chatting pattern of the individual initiating the chat matches the accustomed vocabulary and dynamics for this individual (e.g., with other participants).
- a number of keyboard dynamics of a given individual, such as the keystroke latency and duration, will be statistically similar regardless of who the given individual is chatting with.
- the IM identity validation process 300 updates (or creates) the IM identify validation feature vector 200 during step 320 .
- a test is performed during step 330 , to determine if any observed chat characteristics violate the IM identify validation feature vector 200 . If it is determined during step 330 that the observed chat characteristics do not violate IM identify validation feature vector 200 , then program returns to step 310 and continues in the manner described above (until the chat session is terminated).
- the LM identity validation process 300 If, however, it is determined during step 330 that one or more observed chat characteristics violate IM identify validation feature vector 200 , then the LM identity validation process 300 generates an identity validation alarm during step 350 . In one exemplary embodiment, if both participants ignore the warning, the chat conversation can continue. Alternatively, one participant may question the other participant, and if satisfied, the conversation can continue. The new pattern of usage is optionally added to the IM identity validation feature vector 200 for this pair.
- a confidence score can optionally be provided. For example, given a set of principle features (as determined, e.g. using well-known Principal Component Analysis statistical methods, described, for example, in K. Pearson, “On Lines and Planes of Closest Fit to Systems of Points in Space,” Philosophical Magazine 2 (6): 559-572 (1901)) and the null hypothesis that one of the chat parties is who they are supposed to be, the system can display the likelihood that the feature frequencies should fall within the currently observed ranges, given the amount of data (i.e. number of words) that have been seen.
- the IM identity validation process 300 can verify that various features of the current chat session are consistent with prior patterns for this pair of chat participants. As previously indicated, the IM identity validation process 300 optionally evaluates word usage, misspelling incidence, slang incidence, keystroke dynamics, and other chat characteristics captured by the IM identity validation feature vector 200 .
- B is a high level manager or a highly respected person. A carefully chooses the proper words, avoids spelling/grammar mistakes, and takes a longer time to type;
- a and B know each other very well.
- a and/or B use shorter or simpler words and more icons, emoticons and/or slang speech;
- A is a well-educated person and uses longer words, more sophisticated sentence structures.
- FIG. 3 shows an exemplary sequence of steps, it is also an embodiment of the present invention that these sequences may be varied. Various permutations of the algorithms are contemplated as alternate embodiments of the invention.
- aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
- a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
- a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- LAN local area network
- WAN wide area network
- Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
- These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- FIG. 4 is a block diagram of an IM identity validation system 400 that can implement the processes of the present invention.
- memory 430 configures the processor 420 to implement the IM identity validation methods, steps, and functions disclosed herein (collectively, shown as 480 in FIG. 4 ).
- the memory 430 could be distributed or local and the processor 420 could be distributed or singular.
- the memory 430 could be implemented as an electrical, magnetic or optical memory, or any combination of these or other types of storage devices.
- each distributed processor that makes up processor 420 generally contains its own addressable memory space.
- some or all of computer system 200 can be incorporated into a personal computer, laptop computer, handheld computing device, application-specific circuit or general-use integrated circuit.
- each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Social Psychology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Telephone Function (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
Methods and apparatus are provided for identity verification for at least one user to a text-based communication. An identity of at least one user to a text-based communication is verified by obtaining a plurality of characteristic features of at least one prior text-based communication between the at least one user and at least one additional user; comparing the plurality of characteristic features to a current session of the text-based communication; and verifying the identity of the at least one user based on a result of the comparison. The text-based communication can optionally be suspended if a user is not verified and/or an alarm can be generated.
Description
- This application is a continuation of U.S. patent application Ser. No. 13/362,487, filed Jan. 31, 2012, incorporated by reference herein.
- The present invention relates to instant messaging (IM) and other communication systems, and more particularly, to techniques for validating the identity of participants to a communication.
- Instant messaging systems provide real-time communication over a network between two or more users employing client devices. Instant messaging systems typically provide an indication of whether a user is online and likely available to receive an instant message in a timely manner. While instant messaging systems offer many benefits, they also present a number of challenges.
- For example, while IM systems typically indicate which users in a buddy list are currently logged on to the IM server, the parties to an IM session cannot be sure of the identity of the other party. In other words, even though a particular username may appear in a buddy list, a person other than the actual user may be employing the username. Alternatively, a sender may inadvertently click on the wrong username when initiating a chat session. Either scenario can result in information being sent to an unintended recipient.
- A need therefore exists for validating the identity of one or more parties to an IM session.
- Generally, methods and apparatus are provided for identity verification for at least one user to a text-based communication. According to one aspect of the invention, an identity of at least one user to a text-based communication is verified by obtaining a plurality of characteristic features of at least one prior text-based communication between the at least one user and at least one additional user; comparing the plurality of characteristic features to a current session of the text-based communication; and verifying the identity of the at least one user based on a result of the comparison. The text-based communication can optionally be suspended if a user is not verified and/or an alarm can be generated.
- The characteristic features can be compared to a current session, for example, using statistical properties of the words entered by the user and/or statistical properties of the dynamics of the user's keystrokes. The characteristic features can be obtained, for example, using machine learning techniques. The characteristic features can be recorded, for example, in at least one feature vector and/or one or more rules.
- A more complete understanding of the present invention, as well as further features and advantages of the present invention, will be obtained by reference to the following detailed description and drawings.
-
FIG. 1 illustrates an exemplary network environment in which the present invention can operate; -
FIG. 2 illustrates an exemplary IM identity validation feature vector between a pair of exemplary chat participants; -
FIG. 3 is a flow chart describing an exemplary implementation of an IM identity validation process incorporating aspects of the present invention; and -
FIG. 4 is a block diagram of an IM identity validation system that can implement the processes of the present invention. - Aspects of the present invention provide methods and apparatus for validating the identity of one or more parties to an IM session. In this manner, the disclosed IM identity validation techniques can detect if a sender inadvertently clicks on the wrong username when initiating a chat session, or if a person is disguising himself or herself as another user. In this manner, the disclosed IM identity validation techniques can detect, for example, if a user leaves a current chat window unattended and another user enters the conversation with the same username as the absent user.
- According to one aspect of the invention, the disclosed IM identity validation techniques validate the identities of both parties based on previous chatting patterns between the chat participants. In this manner, communicating sensitive or confidential information to an unintended recipient can be avoided.
- A number of existing IM identity validation techniques present one or more challenges to the user during an IM session. The participants, however, may be annoyed by the challenge questions. According to another aspect of the present invention, the disclosed IM identity validation techniques operate in the background and monitor the chat session relative to prior chatting patterns between the current chat participants. For example, the disclosed IM identity validation techniques observe current word use, keystroke patterns and/or other chat session dynamics and determine if they are consistent with previously observed chatting patterns between the current chat participants. In this manner, the disclosed approach does not require any explicit authenticity challenges and thereby avoids potentially annoying the users with such challenges.
-
FIG. 1 illustrates anexemplary network environment 100 in which the present invention can operate. As shown inFIG. 1 , two or more users employing IM clients 110-1 through 110-N (hereinafter, collectively referred to as IM clients 110) communicate over anetwork 120, such as the Internet, the Public Switched Telephone Network (PSTN), or any wired or wireless network (or combination thereof). TheIM clients 110 are logged in to one ormore IM servers 150, in a known manner. As discussed hereinafter, theexemplary IM servers 150 employ an IMidentity validation process 300 incorporating aspects of the present invention to validate the identity of one or more parties to an IM session. Astorage device 180 optionally stores IM logs between chat participants, as well as feature vectors or other mechanisms for recording the prior chatting patterns between chat participants, as discussed further below in conjunction withFIG. 2 . - While the exemplary embodiments are described herein in the context of IM communications, the present invention also applies to other pair-wise text-based communications, such as electronic mail and texting or chat on cellular telephones, as would be apparent to a person of ordinary skill in the art. In addition, the present invention also applies to any text-based communication protocols, including, for example, Internet Relay Chat (IRC) and Short Message Service (SMS) protocols, as would be apparent to a person of ordinary skill in the art. For illustration purposes, the features and functions of the present invention are performed by the
exemplary IM server 150. It is noted, however, that the features and functions of the present invention can optionally be employed by one ormore IM clients 110, or by another processor or hardware device. - Aspects of the present invention recognize that two-party chatting employ a writing style that is different than a formal writing style. For example, two particular chat participants may utilize patterns, styles and/or keyboard dynamics when they chat with one another that can distinguish the pair-wise communication from communications involving other pairs. As discussed hereinafter, two particular chat participants may employ a distinct vocabulary when chatting with one another (e.g., frequent use of certain words, proper names, terms of endearment and/or nicknames). In addition, the relationship between the two particular chat participants, such as whether they are close friends or colleagues, may lead to certain distinct patterns, styles and/or keyboard dynamics. For example, two particular chat participants may be close friends that chat often, leading to a higher frequency of using slang terms or a more relaxed concern about grammar, punctuation and/or spelling. Likewise, two particular chat participants that are business colleagues may employ frequent acronyms or technical terminology that may only be used by those familiar with a given project.
- Additional aspects of the present invention recognize that the keystroke dynamics (e.g., typing speed and other statistical properties) of one or both chat participants can distinguish the pair-wise communication from communications involving other pairs. For example, habitual typing rhythm patterns can be monitored, such as, for example, keystroke latency, keystroke duration and overall typing speed. As used herein, keystroke latencies are the elapsed times between successive keystrokes (e.g., the elapsed time between the release of the first key and the depression of the second). Likewise, the duration of each keystroke is the amount of time a given key is held down. For a more detailed discussion of keystroke dynamics, see, for example, Fabian Monrose and Aviel D. Rubin, “Keystroke Dynamics as a Biometric for Authentication,” Future Generation Computer Systems, 16, 351-59 (2000), or Anil K. Jain, “Biometric Authentication based on Keystroke Dynamics,” http://www.cse.msu.edu/˜cse891/Sect601/KeystrokeRcg.pdf (visited May 30, 2009), each incorporated by reference herein.
- The exemplary embodiment employs machine learning techniques to observe the chat sessions between each pair (or larger group chat) of chatting participants. The machine learning techniques characterize particular features that can distinguish the distinct patterns, styles and/or keyboard dynamics of particular pairs of chatting participants. In various implementations, the machine learning techniques can observe, for example, whether a given chat session employs a plurality of languages (for example, using a mixture of Chinese and English in cases of one Chinese speaker chatting with another Chinese speaker), chat duration, as well as indicators such as gender, age, race and nationality that can be ascertained from prior chats.
-
FIG. 2 illustrates an exemplary IM identityvalidation feature vector 200 between a pair of exemplary chat participants A and B. As shown inFIG. 2 , the exemplary IM identityvalidation feature vector 200 comprises the following features: emoticon usage frequency, acronym usage frequency, multi-language usage frequency, typing speed, all lower-case usage (a Boolean-valued feature indicating whether the chat thus far has all been typed in lower case by the given chat participant) and complicated sentence frequency. For example, the presence of emoticon usage in general, and especially certain emoticons, suggests a familiarity between the pair of users. Likewise, the usage of acronyms and multiple languages in a chat session can distinguish particular pairs of chatting participants. - Although some components of the
exemplary feature vector 200 could conceivably be Boolean values, expressing these feature vectors as frequencies (e.g., values between 0 and 1) can add precision to the identity authentication process. By watching many previous conversations between the pair of users, there would be a typical range of emoticon usage and acronym usage for each party. If several components of the feature vector for a given conversation start turning up with values outside of the 95% (two standard deviations) confidence range or 99.7% (three standard deviations) confidence range, for example, it may suggest that the person on the other end of the chat is not the person they are thought to be. - Generally, emoticon and acronym usage frequency can be computed, for example, by treating emoticons and acronyms, respectively, as words and computing the fraction of words that are emoticons or acronyms. The multi-language frequency feature may be computed by counting the fraction of sentences that use words from two languages (or from two specific languages). The exemplary typing speed feature may be computed by taking the average number of words per minute typed from the time of the beginning of typing to the end of the message (or end of typing, if, e.g., it can be determined with some degree of likelihood that the typist has been distracted before completing the message). The all-lower-case usage feature, here taken to be a binary value, may be computed by checking whether the user has typed entirely in lower case or not, and finally the exemplary complex sentence frequency feature may be computed by taking the fraction of sentences having more than a total of K words or K′ syllables for some suitable values of K and/or K′.
- While the exemplary embodiments are described herein using exemplary feature vectors, the present invention also applies to other mechanisms for recording prior chatting patterns between pair-wise chat participants, such as a rule-based mechanism, as would be apparent to a person of ordinary skill in the art.
-
FIG. 3 is a flow chart describing an exemplary implementation of an IMidentity validation process 300 incorporating aspects of the present invention. As shown inFIG. 3 , the exemplary IMidentity validation process 300 initially employs machine learning techniques duringstep 310 to observe each pair-wise chat. In this manner, by observing and analyzing chat messages and “keyboard dynamics” in real-time, the IMidentity validation process 300 can validate the pair (or more) of participants. For example, standard statistical machine learning techniques can be employed duringstep 310. For example, the system may have a set of pre-defined features such as {slang frequency, acronym frequency, misspelling frequency} and it may learn from viewing many chats between two chat participants that once at 100 words of a chat are seen the frequencies for these values, for a given one of the participants, given the presence of the pair chat, are in the range {μs±2σs.100, μa,100, μm±2σm,100}, each with probability 95%, where {μs, μa, μm} are the means, and {σs,100, σa,100, σm,100} are the standard deviations of {slang frequency, acronym frequency, misspelling frequency} given that 100 words of the chat have been seen. Thus if values of two of the features from the current chat fall outside of this range the system can suggest that there is some substantial likelihood the chat participant is not who you think it is. Note that as the number of words, N, increases, the values {σs,N, σa,N, σm,N} will tighten and the system will be in a better position to make recommendations about the identity (or lack of identity) of a chat participant. - It is noted that in some cases there may not be a chat history for a given pair of chat participants. In this event, the IM
identity validation process 300 can optionally verify that the chatting pattern of the individual initiating the chat matches the accustomed vocabulary and dynamics for this individual (e.g., with other participants). A number of keyboard dynamics of a given individual, such as the keystroke latency and duration, will be statistically similar regardless of who the given individual is chatting with. - Based on the observations of the machine learning techniques, the IM
identity validation process 300 updates (or creates) the IM identifyvalidation feature vector 200 duringstep 320. - A test is performed during
step 330, to determine if any observed chat characteristics violate the IM identifyvalidation feature vector 200. If it is determined duringstep 330 that the observed chat characteristics do not violate IM identifyvalidation feature vector 200, then program returns to step 310 and continues in the manner described above (until the chat session is terminated). - If, however, it is determined during
step 330 that one or more observed chat characteristics violate IM identifyvalidation feature vector 200, then the LMidentity validation process 300 generates an identity validation alarm duringstep 350. In one exemplary embodiment, if both participants ignore the warning, the chat conversation can continue. Alternatively, one participant may question the other participant, and if satisfied, the conversation can continue. The new pattern of usage is optionally added to the IM identityvalidation feature vector 200 for this pair. - In a further variation, a confidence score can optionally be provided. For example, given a set of principle features (as determined, e.g. using well-known Principal Component Analysis statistical methods, described, for example, in K. Pearson, “On Lines and Planes of Closest Fit to Systems of Points in Space,” Philosophical Magazine 2 (6): 559-572 (1901)) and the null hypothesis that one of the chat parties is who they are supposed to be, the system can display the likelihood that the feature frequencies should fall within the currently observed ranges, given the amount of data (i.e. number of words) that have been seen.
- In this manner, the IM
identity validation process 300 can verify that various features of the current chat session are consistent with prior patterns for this pair of chat participants. As previously indicated, the IMidentity validation process 300 optionally evaluates word usage, misspelling incidence, slang incidence, keystroke dynamics, and other chat characteristics captured by the IM identityvalidation feature vector 200. - The following are illustrative examples of distinguishing patterns in chatting sessions between a pair of exemplary chat participants A and B.
- A knows B's wife. B's wife's proper name appears in the conversation of A and B;
- B is a high level manager or a highly respected person. A carefully chooses the proper words, avoids spelling/grammar mistakes, and takes a longer time to type;
- A and B know each other very well. A and/or B use shorter or simpler words and more icons, emoticons and/or slang speech; and
- A is a well-educated person and uses longer words, more sophisticated sentence structures.
- While
FIG. 3 shows an exemplary sequence of steps, it is also an embodiment of the present invention that these sequences may be varied. Various permutations of the algorithms are contemplated as alternate embodiments of the invention. - While exemplary embodiments of the present invention have been described with respect to processing steps in a software program, as would be apparent to one skilled in the art, various functions may be implemented in the digital domain as processing steps in a software program, in hardware by a programmed general-purpose computer, circuit elements or state machines, or in combination of both software and hardware. Such software may be employed in, for example, a hardware device, such as a digital signal processor, application specific integrated circuit, micro-controller, or general-purpose computer. Such hardware and software may be embodied within circuits implemented within an integrated circuit.
- As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
-
FIG. 4 is a block diagram of an IMidentity validation system 400 that can implement the processes of the present invention. As shown inFIG. 4 ,memory 430 configures theprocessor 420 to implement the IM identity validation methods, steps, and functions disclosed herein (collectively, shown as 480 inFIG. 4 ). Thememory 430 could be distributed or local and theprocessor 420 could be distributed or singular. Thememory 430 could be implemented as an electrical, magnetic or optical memory, or any combination of these or other types of storage devices. It should be noted that each distributed processor that makes upprocessor 420 generally contains its own addressable memory space. It should also be noted that some or all ofcomputer system 200 can be incorporated into a personal computer, laptop computer, handheld computing device, application-specific circuit or general-use integrated circuit. - The flowcharts and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
- It is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention.
Claims (11)
1. A method for verifying an identity of at least one user to a text-based communication, comprising
obtaining a plurality of characteristic features of at least one prior text-based communication between said at least one user and at least one additional user;
comparing the plurality of characteristic features to a current session of said text-based communication; and
verifying said identity of said at least one user based on a result of said comparison.
2. The method of claim 1 , wherein the comparing step uses the statistical properties of the words entered by the user.
3. The method of claim 1 , wherein the comparing step uses the statistical properties of the dynamics of user keystrokes
4. The method of claim 1 , wherein said text-based communication comprises one or more of instant messaging, text messaging and electronic mail.
5. The method of claim 1 , wherein said plurality of characteristic features are obtained using machine learning techniques.
6. The method of claim 1 , further comprising the step of observing said text-based communication between said at least one user and at least one additional user using machine learning techniques to determine said plurality of characteristic features.
7. The method of claim 1 , wherein said plurality of characteristic features are recorded in at least one feature vector.
8. The method of claim 7 , further comprising the step of updating said at least one feature vector.
9. The method of claim 1 , wherein said plurality of characteristic features are recorded in one or more rules.
10. The method of claim 1 , further comprising the step of suspending said text-based communication if said at least one user is not verified.
11. The method of claim 1 , further comprising the step of generating an alarm if said at least one user is not verified.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/611,858 US20130198862A1 (en) | 2012-01-31 | 2012-09-12 | Identity Verification for at Least One Party to a Text-Based Communication |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/362,487 US9077749B2 (en) | 2012-01-31 | 2012-01-31 | Identity verification for at least one party to a text-based communication |
| US13/611,858 US20130198862A1 (en) | 2012-01-31 | 2012-09-12 | Identity Verification for at Least One Party to a Text-Based Communication |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/362,487 Continuation US9077749B2 (en) | 2012-01-31 | 2012-01-31 | Identity verification for at least one party to a text-based communication |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20130198862A1 true US20130198862A1 (en) | 2013-08-01 |
Family
ID=48871554
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/362,487 Active US9077749B2 (en) | 2012-01-31 | 2012-01-31 | Identity verification for at least one party to a text-based communication |
| US13/611,858 Abandoned US20130198862A1 (en) | 2012-01-31 | 2012-09-12 | Identity Verification for at Least One Party to a Text-Based Communication |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/362,487 Active US9077749B2 (en) | 2012-01-31 | 2012-01-31 | Identity verification for at least one party to a text-based communication |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US9077749B2 (en) |
| CN (1) | CN104094582A (en) |
| DE (1) | DE112013000449T5 (en) |
| GB (1) | GB2514941B (en) |
| WO (1) | WO2013115956A1 (en) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9645789B1 (en) * | 2012-09-17 | 2017-05-09 | Amazon Technologies, Inc. | Secure messaging |
| US9747275B1 (en) * | 2016-08-09 | 2017-08-29 | International Business Machines Corporation | Notification of potentially problematic textual messages |
| US20180048596A1 (en) * | 2016-08-10 | 2018-02-15 | Line Corporation | Method, system and recording medium for messenger service providing output effect |
| US20180359197A1 (en) * | 2016-07-20 | 2018-12-13 | Ping An Technology (Shenzhen) Co., Ltd. | Automatic reply method, device, apparatus, and storage medium |
| US10417928B2 (en) * | 2016-11-04 | 2019-09-17 | International Business Machines Corporation | Handwritten homework monitoring using wearable device |
| US20230283627A1 (en) * | 2022-03-03 | 2023-09-07 | Uab 360 It | Securing against network vulnerabilities |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2015176365A (en) * | 2014-03-14 | 2015-10-05 | 富士通株式会社 | Message transmission device, message reception device, message transmission program, message reception program, and message check method |
| US9602490B2 (en) * | 2014-11-10 | 2017-03-21 | Intel Corporation | User authentication confidence based on multiple devices |
| US9392460B1 (en) | 2016-01-02 | 2016-07-12 | International Business Machines Corporation | Continuous user authentication tool for mobile device communications |
| CN106487648A (en) * | 2016-09-12 | 2017-03-08 | 深圳市金立通信设备有限公司 | Authority configuring method and terminal that a kind of information sends |
| US11240184B2 (en) | 2017-06-23 | 2022-02-01 | Realpage, Inc. | Interaction driven artificial intelligence system and uses for same, including presentation through portions of web pages |
| US11138249B1 (en) | 2017-08-23 | 2021-10-05 | Realpage, Inc. | Systems and methods for the creation, update and use of concept networks to select destinations in artificial intelligence systems |
| US10872125B2 (en) | 2017-10-05 | 2020-12-22 | Realpage, Inc. | Concept networks and systems and methods for the creation, update and use of same to select images, including the selection of images corresponding to destinations in artificial intelligence systems |
| US10997259B2 (en) | 2017-10-06 | 2021-05-04 | Realpage, Inc. | Concept networks and systems and methods for the creation, update and use of same in artificial intelligence systems |
| CN109450776A (en) * | 2018-12-28 | 2019-03-08 | 苏州龙信信息科技有限公司 | Cohesion calculation method, device, equipment and medium |
| US10990762B2 (en) * | 2019-03-21 | 2021-04-27 | Verizon Patent And Licensing Inc. | Chat analysis using machine learning |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4393269A (en) * | 1981-01-29 | 1983-07-12 | International Business Machines Corporation | Method and apparatus incorporating a one-way sequence for transaction and identity verification |
| US4649233A (en) * | 1985-04-11 | 1987-03-10 | International Business Machines Corporation | Method for establishing user authenication with composite session keys among cryptographically communicating nodes |
| US7992194B2 (en) * | 2006-03-14 | 2011-08-02 | International Business Machines Corporation | Methods and apparatus for identity and role management in communication networks |
| US20110307355A1 (en) * | 2010-06-10 | 2011-12-15 | Verizon Patent And Licensing, Inc. | Secure instant message-based sales |
Family Cites Families (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6442692B1 (en) | 1998-07-21 | 2002-08-27 | Arkady G. Zilberman | Security method and apparatus employing authentication by keystroke dynamics |
| US7596606B2 (en) | 1999-03-11 | 2009-09-29 | Codignotto John D | Message publishing system for publishing messages from identified, authorized senders |
| WO2003050799A1 (en) * | 2001-12-12 | 2003-06-19 | International Business Machines Corporation | Method and system for non-intrusive speaker verification using behavior models |
| US7016939B1 (en) | 2001-07-26 | 2006-03-21 | Mcafee, Inc. | Intelligent SPAM detection system using statistical analysis |
| US7484175B2 (en) | 2003-09-30 | 2009-01-27 | International Business Machines Corporation | Method and apparatus for increasing personability of instant messaging with user images |
| US8566422B2 (en) | 2004-03-16 | 2013-10-22 | Uppfylla, Inc. | System and method for enabling identification of network users having similar interests and facilitating communication between them |
| US20060036689A1 (en) | 2004-06-04 | 2006-02-16 | John Buford | Personal messaging proxy |
| US7343624B1 (en) | 2004-07-13 | 2008-03-11 | Sonicwall, Inc. | Managing infectious messages as identified by an attachment |
| US7979703B2 (en) | 2005-10-19 | 2011-07-12 | Microsoft Corporation | Determining the reputation of a sender of communications |
| US20070156836A1 (en) | 2006-01-05 | 2007-07-05 | Lenovo(Singapore) Pte. Ltd. | System and method for electronic chat identity validation |
| WO2007094772A1 (en) | 2006-02-13 | 2007-08-23 | Epostal Services, Inc. | Messaging and document management system and method |
| US20070240230A1 (en) * | 2006-04-10 | 2007-10-11 | O'connell Brian M | User-browser interaction analysis authentication system |
| US8135780B2 (en) | 2006-12-01 | 2012-03-13 | Microsoft Corporation | Email safety determination |
| US8108528B2 (en) | 2007-07-11 | 2012-01-31 | International Business Machines Corporation | System and method for verifying the identity of a chat partner during an instant messaging session |
| US8950001B2 (en) | 2007-08-01 | 2015-02-03 | Avaya Inc. | Continual peer authentication |
| US20090320123A1 (en) * | 2008-06-20 | 2009-12-24 | Motorola, Inc. | Method and apparatus for user recognition employing motion passwords |
| US7809824B2 (en) | 2008-09-29 | 2010-10-05 | Yahoo! Inc. | Classification and cluster analysis spam detection and reduction |
| US8312157B2 (en) * | 2009-07-16 | 2012-11-13 | Palo Alto Research Center Incorporated | Implicit authentication |
| US20120084349A1 (en) * | 2009-12-30 | 2012-04-05 | Wei-Yeh Lee | User interface for user management and control of unsolicited server operations |
| US20120167170A1 (en) * | 2010-12-28 | 2012-06-28 | Nokia Corporation | Method and apparatus for providing passive user identification |
| US8590018B2 (en) * | 2011-09-08 | 2013-11-19 | International Business Machines Corporation | Transaction authentication management system with multiple authentication levels |
-
2012
- 2012-01-31 US US13/362,487 patent/US9077749B2/en active Active
- 2012-09-12 US US13/611,858 patent/US20130198862A1/en not_active Abandoned
-
2013
- 2013-01-11 DE DE112013000449.6T patent/DE112013000449T5/en active Pending
- 2013-01-11 WO PCT/US2013/021155 patent/WO2013115956A1/en not_active Ceased
- 2013-01-11 GB GB1414818.3A patent/GB2514941B/en active Active
- 2013-01-11 CN CN201380007193.7A patent/CN104094582A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4393269A (en) * | 1981-01-29 | 1983-07-12 | International Business Machines Corporation | Method and apparatus incorporating a one-way sequence for transaction and identity verification |
| US4649233A (en) * | 1985-04-11 | 1987-03-10 | International Business Machines Corporation | Method for establishing user authenication with composite session keys among cryptographically communicating nodes |
| US7992194B2 (en) * | 2006-03-14 | 2011-08-02 | International Business Machines Corporation | Methods and apparatus for identity and role management in communication networks |
| US20110307355A1 (en) * | 2010-06-10 | 2011-12-15 | Verizon Patent And Licensing, Inc. | Secure instant message-based sales |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9645789B1 (en) * | 2012-09-17 | 2017-05-09 | Amazon Technologies, Inc. | Secure messaging |
| US20180359197A1 (en) * | 2016-07-20 | 2018-12-13 | Ping An Technology (Shenzhen) Co., Ltd. | Automatic reply method, device, apparatus, and storage medium |
| US10404629B2 (en) * | 2016-07-20 | 2019-09-03 | Ping An Technology (Shenzhen) Co., Ltd. | Automatic reply method, device, apparatus, and storage medium |
| US9747275B1 (en) * | 2016-08-09 | 2017-08-29 | International Business Machines Corporation | Notification of potentially problematic textual messages |
| US9949103B2 (en) | 2016-08-09 | 2018-04-17 | International Business Machines Corporation | Notification of potentially problematic textual messages |
| US10588003B2 (en) | 2016-08-09 | 2020-03-10 | International Business Machines Corporation | Notification of potentially problematic textual messages |
| US10667113B2 (en) | 2016-08-09 | 2020-05-26 | International Business Machines Corporation | Notification of potentially problematic textual messages |
| US20180048596A1 (en) * | 2016-08-10 | 2018-02-15 | Line Corporation | Method, system and recording medium for messenger service providing output effect |
| US10798032B2 (en) * | 2016-08-10 | 2020-10-06 | Line Corporation | Method, system and recording medium for messenger service providing output effect |
| US10417928B2 (en) * | 2016-11-04 | 2019-09-17 | International Business Machines Corporation | Handwritten homework monitoring using wearable device |
| US20230283627A1 (en) * | 2022-03-03 | 2023-09-07 | Uab 360 It | Securing against network vulnerabilities |
| US11943252B2 (en) * | 2022-03-03 | 2024-03-26 | Uab 360 It | Securing against network vulnerabilities |
Also Published As
| Publication number | Publication date |
|---|---|
| CN104094582A (en) | 2014-10-08 |
| DE112013000449T5 (en) | 2014-09-11 |
| US9077749B2 (en) | 2015-07-07 |
| WO2013115956A1 (en) | 2013-08-08 |
| US20130198860A1 (en) | 2013-08-01 |
| GB201414818D0 (en) | 2014-10-01 |
| GB2514941A (en) | 2014-12-10 |
| GB2514941B (en) | 2016-12-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9077749B2 (en) | Identity verification for at least one party to a text-based communication | |
| US10129199B2 (en) | Ensuring that a composed message is being sent to the appropriate recipient | |
| US11615169B2 (en) | Authentication using cognitive analysis | |
| US10986123B2 (en) | Passive and active identity verification for online communications | |
| US20090299925A1 (en) | Automatic Detection of Undesirable Users of an Online Communication Resource Based on Content Analytics | |
| US12204573B2 (en) | System and method to avoid sending a message to the unintended recipient | |
| CN104508657B (en) | Mediation computing device and the method associated for producing semantic label | |
| US9887952B2 (en) | Intelligently splitting text in messages posted on social media website to be more readable and understandable for user | |
| US10528674B2 (en) | Cognitive agent for capturing referential information during conversation muting | |
| Jakobsson et al. | Rethinking passwords to adapt to constrained keyboards | |
| US10726205B2 (en) | Checking documents for spelling and/or grammatical errors and/or providing recommended words or phrases based on patterns of colloquialisms used among users in a social network | |
| Vertanen et al. | Mining, analyzing, and modeling text written on mobile devices | |
| US20190058608A1 (en) | Method and system to provide the trending news stories to the plurality of groups based on the plurality of group members existing conversations | |
| Roffo et al. | Trusting skype: Learning the way people chat for fast user recognition and verification | |
| US9280537B2 (en) | Techniques for automatically selecting a natural language for configuring an input method editor at a computing device | |
| CN107508834A (en) | A kind of Information Authentication method and electronic equipment | |
| US20250211614A1 (en) | Dynamic Language Model Prompts for Fraud Detection | |
| US11030413B2 (en) | Recommending message wording based on analysis of prior group usage | |
| CN105745701B (en) | identify contacts | |
| Figueiredo et al. | Sounds Vishy: Automating Vishing Attacks with AI-Powered Systems | |
| CN106936840B (en) | Information prompting method and device | |
| Woolham | Is deepfake technology shifting the gold standard of authentication? | |
| Gardiner | Stegchat: a synonym-substitution based algorithm for text steganography | |
| Gupta | Exploiting Human Factors in User Authentication | |
| KR20200073528A (en) | Method and apparatus for providing chatting service |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |